Sponsored
OS installation

Kodachi Linux Installation

Hey Folks, in this tutorial we will install kodachi linux operating system on VMware in windows machine. Linux Kodachi operating system is based on Xubuntu 18.04 LTS it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. If you want to read more about it you can go here.

Let’s take a look πŸ˜› !!

Installation of VMware

Installing VMware software in a Windows machine is quite easy which you can do by downloading it from here.

Fire πŸ˜› !! Boot the vmware software, look at the top left corner, click on the file and choose the β€œNew Virtual Machine” option.

Just go with the software recommended option and click on Next.

Now click on the browse button to select the Kodachi downloaded ISO image. You can download ISO image from here.

Select the operating system type β€œLinux” and version as well.

Give the machine name and the location where you want to save the logs and data.

Storage Management

Here you can give storage to your operating system but make sure it should be more than 30 GB.

Hardware Customization

After that just click on β€œcustomize hardware” option and proceed. You can provide memory as per availability but minimum should be 3 GB to run perfectly.

You need to give the same number of processors in both.

Just change the network connection from β€œNAT” to β€œBridge” and exit from the hardware customization.

Boot πŸ˜› !! Now power up the operating system and boot the operating system by choosing second option.

Great πŸ˜› !! Now you can directly use the Kodachi operating system without any configuration.

The interface of this operating system is such that hackers in movies.

Completely Anonymous πŸ˜› !! The operating system is specially designed for hackers through which they can protect themselves completely.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.