Install Windows 10 on Fedora and set up Kali Linux for multiple booting options.
Install Windows 10 on Fedora and set up Kali Linux for multiple booting options.
I aimed to run several operating systems on my laptop. Right now it’s just Windows 10, but I wanted Fedora and Kali too. My friend suggested using Fedora alongside Windows in dual boot mode, then switching to a virtual machine for Kali. I need Fedora for a class and Kali for personal use, which is why I want both. I’m curious whether it’s better to follow the advice and run Kali in a VM or set up multiple boot options. Also, my laptop has only 500GB, so I planned to expand it with an SSD like a Samsung 850 Evo.
You're considering how to set up a testing environment for Fedora and various tools. It's good to think about keeping your testing separate from production. You might want to use a VM or a dedicated machine for this purpose. Alternatively, you could use an old laptop—maybe one you found or borrowed—and install Fedora there. I also suggest setting up a virtualization setup with Kali and other tools like Metasploit. Adding a new Wi-Fi router can help isolate your network during testing. Just remember to double-check configurations after changes, as past setups sometimes needed extra tweaking.
I thought you were using a desktop, so I didn’t expect this setup. It’s hard to say how fast it would run, but I tried booting from USB. I plan to ask friends and family if they have an old laptop for a lab project. You might be surprised by what you find—broken screens or other issues—and then fix them. For real pentesting work, having a clean, isolated system is essential.
Sure, I understand. You have a spare laptop at home, but it needs more storage, so I’ll opt for an SSD. I plan to use the system for pentesting. Booting from USB might be better since you mentioned having about 400 GB free space and prefer that setup. Also, the current laptop uses a M.2 SSD—maybe that affects performance.
You can boot Linux via USB easily, though I’m not sure about virtualization. My test laptop is a 7-year-old A8 and it runs perfectly. I’d like to try both approaches—learning by experimenting. If that fails, identify the issue, understand which protocols are affected, and see if it can be exploited as a vulnerability.
When aiming to enter pentesting, it's crucial to grasp the OSI model and various methods to reach your objectives. In a professional setting, there might be four viable approaches, yet focusing on just two could limit your ability to thoroughly evaluate a system.