But that is not all; penetration testers also need servers: to use collaboration software within a
team of pen-testers, to set up a web server for use in phishing campaigns, to run vulnerability
scanning tools, and other related activities.
Once you have booted Kali, you will quickly discover that Kali Linux’s main menu is organized by
theme across the various kinds of tasks and activities that are relevant for pen-testers and other
information security professionals as shown in Figure
1.1
, “
Kali Linux’s Applications Menu
” [page
6].