{"id":25153,"date":"2023-09-15T13:10:00","date_gmt":"2023-09-15T13:10:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25153"},"modified":"2024-01-12T19:14:36","modified_gmt":"2024-01-12T19:14:36","slug":"open-source-distros-for-pentesting-and-forensics","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/","title":{"rendered":"8 Best Linux Distros for Forensics &amp; Pentesting"},"content":{"rendered":"\n<p>Linux has an extensive range of open-source distributions, and a number of those distros have been developed primarily for cybersecurity uses. Linux forensics and pentesting distros have been developed with pentesters, ethical hackers, network defenders and forensic investigators in mind.<\/p>\n\n\n\n<p>These professionals use them in their work, whether for <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">pentesting<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\">digital forensics<\/a> or other cybersecurity uses.<\/p>\n\n\n\n<p>Each distro has a specific Linux kernel design and comes with its own package manager. They can be broadly classified as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Debian-based distros:<\/strong> These are based on the Debian Project such as Kali Linux and ParrotOS.<\/li>\n\n\n\n<li><strong>Arch-based distros:<\/strong> These lightweight but technical distributions are aimed at experienced users, among whom they are very popular.<\/li>\n\n\n\n<li><strong>Computer forensic distros:<\/strong> These Linux forensic distros are aimed at the challenging field of computer forensics and retrieving meaningful information from tons of data.<\/li>\n\n\n\n<li><strong>Other pentesting OSes:<\/strong> While some of those above are used widely by pentesters, there are a couple of other Linux distros that are used by experienced pentesters.<\/li>\n<\/ul>\n\n\n\n<p>Here are eight of the best Linux distros for cybersecurity use cases, for beginners through advanced users, along with some issues to consider as you select a Linux security distro or a Linux forensic distro.<\/p>\n\n\n\n<p><strong>Also see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">Best Penetration Testing Tools<\/a> and the <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-penetration-testing-tools\/\">Best Open Source Pentesting Tools<\/a><\/strong><\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Kali vs. Parrot: Debian-based Distros<\/strong><\/h2>\n\n\n\n<p>Both Kali Linux and Parrot OS are Debian-based distros that are often used for pentesting. The two systems can be employed by intermediate and experienced security professionals. They have a relatively fast learning curve, but their approach differs.<\/p>\n\n\n\n<p>These Linux distros have specific variations, so make sure you pick the right one. You can leverage lite editions if you prefer minimal installations, but such versions might not contain the pentesting resources you\u2019re looking for, and you\u2019ll probably have to install them manually.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Kali Linux<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.kali.org\/get-kali\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kali Linux<\/a> is by far the most widely used Linux distro in cybersecurity and in security tests. Built on Debian, it provides a range of tools for pen testing, digital forensics, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a> analysis, ethical hacking, security evaluations and more. While Kali has good performance, some think it requires too much customization and is missing a few features that other distros possess. Kali should not be viewed as a primary or general Linux distro, but as a tool aimed at cybersecurity. Kali celebrated its 10th year earlier this year by adding defensive open source tools, increasing its utility for security pros.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/kali-linux-tutorial\/\">Kali Linux Penetration Testing Tutorial: Step-By-Step Process<\/a><\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The distro is easy to install.<\/li>\n\n\n\n<li>Kali Linux provides a high level of safety (e.g., custom kernel) and is actively maintained by <a href=\"https:\/\/www.offensive-security.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Offensive Security<\/a>.<\/li>\n\n\n\n<li>There are hundreds of pre-packaged tools for pentesting, security research, forensics, web app testing, and reverse engineering.<\/li>\n\n\n\n<li>Support is available for various architectures and platforms, such as x86, ARM, Cloud, Mobile Android, as well as multi-language support.<\/li>\n\n\n\n<li>Support is available for various modes of installation like bare metal, VM, live boot, containers, WSL.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kali Linux is not beginner friendly despite notable enhancements in recent versions.<\/li>\n\n\n\n<li>It can be slower than other distros like ParrotOS for some tasks, especially on low-end systems (expect some lags).<\/li>\n\n\n\n<li>It isn\u2019t the most attractive interface and some complain that it needs too much customization.<\/li>\n\n\n\n<li>Can be resource intensive for certain tasks.<\/li>\n\n\n\n<li>Lacks pre-packaged IDEs for programming.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"548\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-kali.png\" alt=\"Screencapture of Kali Linux interface.\" class=\"wp-image-31866\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-kali.png 975w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-kali-300x169.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-kali-768x432.png 768w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><figcaption class=\"wp-element-caption\">Kali Linux<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ParrotOS Security Edition<\/strong><\/h3>\n\n\n\n<p>ParrotOS offers a <a href=\"https:\/\/www.parrotsec.org\/download\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Edition<\/a> that is in some ways the mirror image of Kali: It\u2019s user-friendly and manageable for beginners and is less resource-intensive on hardware than Kali. There are five editions to choose from depending on your needs, but the cybersecurity edition is the one that is most relevant. It is used heavily in pentesting and includes pretty much all the tools included in Kali plus a few others for threat prevention, security analysis, risk assessment and Wi-Fi cracking.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Parrot OS is easy to install, user-friendly and beginner friendly.<\/li>\n\n\n\n<li>The distro is privacy-focused, with features like anonymization services, telemetry, logs and trackers disabled by default.<\/li>\n\n\n\n<li>Parrot OS contains pre-packaged IDEs for programming.<\/li>\n\n\n\n<li>It is lighter than Kali and requires less memory, free space, and RAM (also GPU is not required).<\/li>\n\n\n\n<li>Parrot OS is secure with features like sandboxes and regular updates.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Parrot OS adds its own commands for generic operations like upgrading packages and that entails a learning curve for some.<\/li>\n\n\n\n<li>Doesn\u2019t have as extensive community support as Kali.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"500\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-parrot.png\" alt=\"Screencapture of Parrot Security interface.\" class=\"wp-image-31865\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-parrot.png 975w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-parrot-300x154.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-parrot-768x394.png 768w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><figcaption class=\"wp-element-caption\">Parrot Security<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Arch-Based Security Distros<\/strong><\/h2>\n\n\n\n<p>Arch Linux standards are the reference for many professionals. While Arch requires a good amount of patience because of its complexity, ethical hackers and pentesters that learn it get to know a lot about how to use and abuse GNU\/Linux. Arch Linux distros are flexible, light and easily customizable. Users have the freedom to pick and choose and adjust the look and feel as they desire. This makes it attractive to professionals and perhaps a little scary to novices.<\/p>\n\n\n\n<p><strong>Black Arch<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.blackarch.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Black Arch<\/a> is a pentest distro based on Arch Linux. It can be challenging to learn but boasts a number of advantages for those who make the effort. There are full and slim versions: The full one contains all available tools and a complete OS; the slim version has a lighter OS and fewer tools.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>While it is minimalist, users will find lots of packages to install.<\/li>\n\n\n\n<li>An existing Arch Linux install can be upgraded to Black Arch.<\/li>\n\n\n\n<li>Black Arch leverages continuous updates, which is part of its philosophy.<\/li>\n\n\n\n<li>There is no bloat or unnecessary services.<\/li>\n\n\n\n<li>Black Arch is a good fit for those wishing to install and test bleeding-edge resources, offering a better package manager and release system.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Black Arch may be difficult to install and use and is not beginner friendly.<\/li>\n\n\n\n<li>It functions more like a hacker OS than a pentest OS.<\/li>\n\n\n\n<li>It does not come with its own GUI.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ArchStrike<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/archstrike.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">ArchStrike<\/a> is an Arch Linux repository containing a variety of tools for professionals. Another one with a learning curve, it was developed specifically with ethical hackers in mind. It comes with extra packages for pentesting and ethical hacking. ArchStrike is powered by the Openbox window manager.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ArchStrike can be installed on existing Arch installations to turn them into hacking environments.<\/li>\n\n\n\n<li>It is easy to install and remove (see the new ISO installer).<\/li>\n\n\n\n<li>ArchStrike is made by hackers for hackers.<\/li>\n\n\n\n<li>There are dedicated modules for investigations.<\/li>\n\n\n\n<li>A hardware detection facility is available.<\/li>\n\n\n\n<li>It requires only a lightweight install.<\/li>\n\n\n\n<li>Among the many pen testing tools available are the Argus network flow analyzer and the Wireshark network scanner.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ArchStrike is not beginner friendly.<\/li>\n\n\n\n<li>It&#8217;s more of a hacking toolset than a full Linux distro.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Distros for Computer Forensics<\/strong><\/h2>\n\n\n\n<p>Computer forensics can be particularly challenging, as retrieving meaningful information among tons of data can take many hours.&nbsp; Linux is especially popular in forensics due to its support for so many file systems. There are several Linux distros designed specifically for forensics. These Linux computer forensic distros have gained favor among those wanting to get to the bottom of breaches and incursions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CAINE<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.caine-live.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">CAINE<\/a> (Computer Aided Investigative Environment) is one of the top Linux computer forensic distros. It comes with many built-in forensic investigation tools. Its investigative environment integrates with different software and forensic tools and has an easy to use graphical user interface.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It has a user-friendly GUI.<\/li>\n\n\n\n<li>CAINE provides a complete investigative environment, including Autopsy and Sleuth Kit.<\/li>\n\n\n\n<li>It eases forensics significantly, especially memory analysis.<\/li>\n\n\n\n<li>All block devices are set to read-only mode by default.<\/li>\n\n\n\n<li>The live environment can be used to analyze running Windows installations.<\/li>\n\n\n\n<li>It can run via command line or GUI.<\/li>\n\n\n\n<li>Fulfills investigative processes like preservation, collection, examination and analysis.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CAINE lacks documentation, which limits the kind of support users can receive.<\/li>\n\n\n\n<li>Some may find it challenging to install.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>DEFT<\/strong><\/h3>\n\n\n\n<p>DEFT stands for Digital Evidence and Forensic Toolkit. It is a distro employed by military, government officers, law enforcement, investigators, researchers, system admins, universities, and forensics specialists. The project is no longer actively maintained, but downloads can be <a href=\"https:\/\/web.archive.org\/web\/20181026032008\/http:\/\/www.deftlinux.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">found online<\/a> in some places still. It is based on Lubuntu and has a GUI for forensic applications.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It is user-friendly and easy to install.<\/li>\n\n\n\n<li>DEFT can help recover broken drives.<\/li>\n\n\n\n<li>Enhanced hardware detection is available.<\/li>\n\n\n\n<li>DEFT is especially good for advanced integrity checking, computer forensics, and incident response.<\/li>\n\n\n\n<li>It includes specific guides to learn how to use the environment.<\/li>\n\n\n\n<li>It ensures the integrity of data structures and metadata under analysis.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deft is not actively under development.<\/li>\n\n\n\n<li>Despite the guides, DEFT is not beginner-friendly and requires advanced knowledge to use it.<\/li>\n\n\n\n<li>Primarily aimed at forensic specialists as opposed to general IT personnel wanting to learn the basics of forensics investigations.<\/li>\n<\/ul>\n\n\n\n<p><strong>See more of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\">Best Digital Forensics Tools<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Other Pentesting Distros<\/strong><\/h2>\n\n\n\n<p>These last two distros may be lesser known, but they have some desirable features in their own right.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Pentoo<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/pentoo.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pentoo<\/a> is based on Gentoo Linux, a bare-bones minimalist distro for advanced Linux users. It has a distinct security focus and comes with various customized tools for Wi-Fi hacking, pentesting and security assessment.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pentoo is great for Wi-Fi hacking and hardware-accelerated cracking.<\/li>\n\n\n\n<li>It\u2019s a relatively light distro.<\/li>\n\n\n\n<li>Pentoo is <a href=\"https:\/\/api.github.com\/repos\/pentoo\/pentoo-overlay\/git\/commits\/208687cc97458917cd780176ca928c9409c348df\" target=\"_blank\" rel=\"noreferrer noopener\">actively maintained<\/a>, even if the project may look dead when you browse the website.<\/li>\n\n\n\n<li>It uses Portage as package manager, which compiles programs from sources instead of downloading binaries.<\/li>\n\n\n\n<li>Pentoo is worth installing on a live USB key as a complementary set of tools.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It is not beginner friendly; good mainly for Linux enthusiasts.<\/li>\n\n\n\n<li>Pentoo may be difficult to install and use, but it is easier than Black Arch.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"731\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-pentoo.png\" alt=\"Screencapture of Pentoo interface.\" class=\"wp-image-31864\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-pentoo.png 975w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-pentoo-300x225.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics-pentoo-768x576.png 768w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><figcaption class=\"wp-element-caption\">Pentoo<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SamuraiWTF<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/SamuraiWTF\/samuraiwtf\" target=\"_blank\" rel=\"noreferrer noopener\">SamuraiWTF<\/a> aims to be \u201ca complete Linux desktop for use in application security training.\u201d WTF stands for Web Training Framework as it is a framework used to train people to learn security and penetration testing. It grew out of an Open Web Applications Security Project (OWASP) to boost cybersecurity skills on Ubuntu Linux.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pros<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SamuraiWTF is maintained by the respected OWASP community.<\/li>\n\n\n\n<li>It is lightweight and easy to install, with various prebuilt images for virtual machines like Kali.<\/li>\n\n\n\n<li>Quick setup is possible with the CLI (command line interface), which utilizes custom \u201ckatana\u201d commands.<\/li>\n\n\n\n<li>SamuraiWTF is perfect for web pentesting, with a focus on training users.<\/li>\n\n\n\n<li>It offers good documentation.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SamuraiWTF is only helpful as an add-on tool.<\/li>\n\n\n\n<li>Once people are trained on it they will probably move on to advanced tools.<\/li>\n<\/ul>\n\n\n\n<p><strong>Also see the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">Best Vulnerability Scanning Tools<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-vulnerability-scanners\/\">Best Open Source Vulnerability Scanning Tools<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Choosing a Forensics &amp; Pentesting Linux Distro<\/strong><\/h2>\n\n\n\n<p>Choosing the right Linux forensics distro or pentesting distro is no easy task. There are many options and most can get the job done. The important factors to consider are compatibility and experience. Some distros are more compatible with various OSes and applications than others. Be sure to select a platform that fits your own environment.<\/p>\n\n\n\n<p>Further, go easy on yourself. If you are familiar with Linux distros and Linux development, the advanced options should be fine. Even then, stick close to the distros that most align with the Linux environments you are used to working on. Also, be aware that some distributions demand a lot of performance and may struggle on aging machines.<\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Bottom Line: Getting Started with Pentesting and Forensics Distros<\/strong><\/h2>\n\n\n\n<p>Whether you need a pentesting and forensic distro will depend on your needs and experience. Common operations like enumerating services, cracking passwords, intercepting HTTP requests, or even analyzing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> do not necessarily require a pentesting OS. Popular tools such as the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/getting-started-with-burp-suite-pentest-tutorial\/\">Burp Suite<\/a>, OWASP ZAP, Nikto, or BeEF are available as standalone apps and packages.<\/p>\n\n\n\n<p>If you\u2019re an absolute beginner, I would not recommend using a pentesting distro. Most pentesting distros have two major drawbacks: They can be overwhelming, and they require advanced knowledge.<\/p>\n\n\n\n<p>You get hundreds of packages, scripts, wordlists, and other software, but it usually requires solid knowledge and experience to master each tool, prevent misuses and rabbit holes, and conduct tests in safe conditions.<\/p>\n\n\n\n<p>You can totally use a classic distro like Ubuntu with a few packages and the right configurations and you\u2019ll be able to achieve most tasks. Besides, if you\u2019re new to Linux, it\u2019s probably better to start with generic systems.<\/p>\n\n\n\n<p>In any case, it is strongly recommended to use VMs (virtual machines). Do not install the above distros as your primary system unless you know what you are doing.<\/p>\n\n\n\n<p>For example, if you need to test for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a>, it\u2019s better to have it on a VM and in a <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/sandboxing-advanced-malware-analysis\/\">sandbox<\/a> environment that can be compromised without affecting your personal files. Besides, you can take snapshots to quickly restore a working environment at will. The idea is to isolate your testing environment.<\/p>\n\n\n\n<p>We have much more content on using open source pentesting and vulnerability scanning tools. Here are a few tutorials to get you started:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/metasploit-framework-tutorial\/\">Getting Started With the Metasploit Framework: A Pentesting Tutorial<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/nmap-vulnerability-scanning-made-easy\/\">Nmap Vulnerability Scanning Made Easy: Tutorial<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/getting-started-with-burp-suite-pentest-tutorial\/\">Getting Started with the Burp Suite: A Pentesting Tutorial<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/rapid7-insightidr-review\/\">Testing &amp; Evaluating SIEM Systems: A Review of Rapid7 InsightIDR<\/a><\/li>\n<\/ul>\n\n\n\n<p><em>This updates an August 2022 article by <a href=\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\">Julien Maury<\/a><\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fa91c5871-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fa91c5871\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fa91c5871\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fa91c5871\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fa91c5871\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fa91c5871\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fa91c5871\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.<\/p>\n","protected":false},"author":213,"featured_media":31863,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[2369,3790,3414,4296,31708,730,10917,5277],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[382],"class_list":["post-25153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-cloud-security","tag-cybersecurity","tag-network-security","tag-penetration-testing","tag-pentesting","tag-security","tag-vulnerability-scanning","tag-web-security","b2b_audience-evaluation-and-selection","b2b_product-application-security-vulnerability-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8 Best Linux Distros for Forensics &amp; Pentesting<\/title>\n<meta name=\"description\" content=\"Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Best Linux Distros for Forensics &amp; Pentesting\" \/>\n<meta property=\"og:description\" content=\"Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-15T13:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-12T19:14:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"8 Best Linux Distros for Forensics &amp; Pentesting\",\"datePublished\":\"2023-09-15T13:10:00+00:00\",\"dateModified\":\"2024-01-12T19:14:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\"},\"wordCount\":2214,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"network security\",\"penetration-testing\",\"pentesting\",\"security\",\"vulnerability scanning\",\"Web security\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\",\"name\":\"8 Best Linux Distros for Forensics & Pentesting\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png\",\"datePublished\":\"2023-09-15T13:10:00+00:00\",\"dateModified\":\"2024-01-12T19:14:36+00:00\",\"description\":\"Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: photon_photo\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Best Linux Distros for Forensics &amp; Pentesting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Best Linux Distros for Forensics & Pentesting","description":"Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/","og_locale":"en_US","og_type":"article","og_title":"8 Best Linux Distros for Forensics & Pentesting","og_description":"Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.","og_url":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/","og_site_name":"eSecurity Planet","article_published_time":"2023-09-15T13:10:00+00:00","article_modified_time":"2024-01-12T19:14:36+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"8 Best Linux Distros for Forensics &amp; Pentesting","datePublished":"2023-09-15T13:10:00+00:00","dateModified":"2024-01-12T19:14:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/"},"wordCount":2214,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png","keywords":["cloud security","cybersecurity","network security","penetration-testing","pentesting","security","vulnerability scanning","Web security"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/","url":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/","name":"8 Best Linux Distros for Forensics & Pentesting","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png","datePublished":"2023-09-15T13:10:00+00:00","dateModified":"2024-01-12T19:14:36+00:00","description":"Here are the best Linux distros for ethical hacking, pentesting and digital forensics, from beginners through advanced.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/esp_09152023-open-source-distros-for-pentesting-and-forensics.png","width":1400,"height":900,"caption":"Image: photon_photo\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"8 Best Linux Distros for Forensics &amp; Pentesting"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25153"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25153"}],"version-history":[{"count":4,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25153\/revisions"}],"predecessor-version":[{"id":33592,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25153\/revisions\/33592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/31863"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25153"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25153"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25153"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}