

From your VM, start Kali Linux and log in with root/toor (user ID/password).Virtual machines Needed: Kali Linux and Android Emulator VM The walkthrough Kali Linux is one of the most-used operating systems for penetration testing.Īndroid Emulator is used as an Android device on which penetration testing tasks can be performed (if you don’t have an actual Android device). Kali Linux is one of the Debian-based operating systems with several tools aimed at various information security tasks such as penetration testing, forensics and reverse engineering.


In this lab, we are using Kali Linux and an Android device to perform mobile penetration testing.
