best laptop for Kali Linux

Being a hacker in the 21st century is now fashionable, as these guys have a lot of opportunities.
The best laptop for hacking depends on what you really want to do with that laptop ?
Being in the niche of hacking and penetration is not a simple task, and largely depends on your skills. Do you want to connect to a WiFi point or attack a internal network , perform pentesting let's just say you are a ethical hacking, Another benefit of  pentesting laptop it will be used s a portable hacking station , and just using a laptop as a remote access connection will also not be amiss.
Again, it all depends on what you wan to do. And anyway, let's figure out where to start and what requirements of the laptop will be associated with hacking.
best laptop for hacking

What the best laptop for pentesting have ?
Performance is the main aspect, as most hacker activities require a lot of processor resources. To do this, you must be sure that you have the minimum requirement to run your hacking programs. We will not call them, since we are sure that you are already an experienced hacker who can cope with the search for the necessary information about hacks, etc.

If you are going to crack passwords from a laptop, we recommend using a modern processor based on i5 or i7. These processors have several cores, which will allow you to work faster. If you have a good budget, then you can purchase a Xeon processor. Just do not forget to check your programs for multi-threading before buying, otherwise you will spend your money in vain on buying a multi-core processor, which in the end will not work at full capacity. If your programs have GPU support, you can take a laptop with the latest GPU, since these processors easily surpass traditional processor cores for most hacker applications.

I would like to say about the amount of disk space on the laptop. If you do not need a large volume, but at the same time you want fast work, we recommend buying a laptop with an SSD drive. These discs allow you to run programs instantly, without feeling the brakes.
Depending on your requirements, the choice of RAM memory will also depend. If you want to use the laptop without Virtual machines, you can get by with 8 GB of RAM. As experience suggests, the processor will be more dependent on hacker tasks if the RAM.

However, if your hacking technique requires running virtual machines, then RAM will certainly be a valuable commodity. Virtual machines require a lot of resources., you can buy a laptop that will even have 16 GB of RAM.
Sometimes even hacking methods are not as important as compactness. This is due to the fact that now hackers have become smarter and use desktop computers or even servers, which are connected via remote access using a laptop. Therefore, it is better to invest money in a computer that will be at home. It will come out cheaper. But with a laptop everything is different here, here you need to focus on the battery and the weight of the device.

If the laptop will not have very powerful components, then it will start to use less energy, which will allow the battery to last longer, thereby your laptop will hold a charge for a long time. Processors with a lower clock speed (in GHz) will reduce heat and prevent battery consumption during fan operation. The entry-level graphics card is suitable for most major games and saves significant energy compared to the high-performance Nvidia. If you want the battery to not discharge quickly, then invest in an SSD drive, which is very energy efficient than traditional drives that rotate heavy disks at a speed of 7–10,000 rpm.

Which laptop to choose a hacker?
If you ask this question, then novice hackers should take a closer look at the following laptop models from our rating. The choice is yours!
ASUS ZenBook 13 Ultra-Slim UX333FA
best laptop for hacking
ASUS ZenBook 13
The laptop from ASUS falls into the ranking of the best hacking laptops for a reason, because its main advantage is a long working time. Buyers rated it not only for such a dignity, but also for the screen size, it is only 13.3 inches, which allows you to put it in any bag. Problems with a lack of RAM you definitely will not appear, because the laptop has 16 GB, which is enough for a hacker.
ASUS ZenBook 13 Price

Dell Inspiron i7577
pentesting laptop
Dell Inspiron i7577
Description and specifications
As was said, the Inspiron 7577 replaced the Inspiron 7567, significantly updating the stuffing and almost without affecting the appearance. This is a 15-inch laptop, which, despite the fact that by its characteristics it tries to seem like a game model, is still a very smart, capable multi-purpose universal mid-range laptop.
  • Screen:15.6 inches, 1920x1080 / 3840x2160, IPS, matte
  • CPU:7th Generation Intel Core i5-7300HQ Quad Core 2.50 GHz
  • Video card:NVIDIA GeForce  GTX 1050 Ti 4 GB
  • Memory:8GB DDR4 (2xDIMM)
  • Storage device:HDD + SSD (128-512 GB)
  • Wireless connection:802.11ac 2.4 and 5 GHz, Bluetooth 4.2
Dell Inspiron i7577 price

Lenovo ThinkPad Edge E590
laptop for pentesting
Lenovo ThinkPad Edge E590
Almost a leader is a laptop from Lenovo, it costs slightly more expensive than its predecessors, but the difference is immediately noticeable in the characteristics. Its display is 15.6 inches, which is much larger than others. It can work continuously for five hours. You can find the rest of the information if you go to the market. Depending on the choice of characteristics, its price will also depend. You can put the volume of the hard drive: 256 GB, 512 GB and 1 TB. The amount of RAM in this device is 8 GB.
  • Processor: Intel Dual Core i3-8145U (2.1GHz - 3.9GHz, 4MB Cache)
  • RAM: 8GB DDR4 2400MHz
  • Display: 15.6" HD anti-glare (1366x768)
  • Graphics: Intel UHD 620
  • Storage: 250GB Solid State Drive
Lenovo ThinkPad Edge E590 price

Razer Blade Stealth 13
Razer Blade Stealth 13
Razer Blade Stealth 13

The winner of today's rating is a laptop from the well-known company Razer. This company produces not only gaming peripherals, but also excellent laptops that allow you to perform quality work. This laptop model may seem too expensive, because powerful components were introduced into it. If you are looking for a laptop not only for hacking, but also for your pleasure, then you can look at this look.
  • Processor: 8th Gen Intel Core i7-8565U
  • RAM: 16GB dual-channel - 2133MHz
  • Display: 13.3" FHD 60Hz
  • Graphics: NVIDIA MX150 4GB GDDR5 VRAM
  • Storage: 256GB, Upgradeable
Razer Blade Stealth 13 Price
Computer for hacker
Let's start with the good news - for penetration testing, hacking, any average computer is suitable. If you decide to get involved in a new hobby or learn computer security (very useful for web application programmers, and everyone else who would not like to become a victim of hackers), then you do not need to go to the store for a new computer.

However, when choosing a new computer, you can take into account some aspects that will help your computer (and therefore you) be more effective in some tasks.

Desktop or laptop?
The desktop computer has many advantages: it is more powerful, cheaper, easier to upgrade and repair, it has a more convenient keyboard, more ports, a larger screen and much more. And only one drawback is the lack of mobility. If you do not have the task of traveling to objects, and in general you are just learning, then a desktop computer will be preferable.

Pentester Graphics Card
We need a video card, of course, not for games. We need it to iterate over the hash sums (hashes). A hash is a result of data processing using a special algorithm (hash function). Their feature is that the same data has the same hashes. But from the hash, it is impossible to restore the original data. This is especially often used, for example, in web applications. Instead of storing passwords in clear text, most websites have hashes of these passwords. If you enter your username and password, the website calculates the hash for the password you entered and compares whether it matches the one that was saved earlier. If it matches, then you entered the correct password and get access to the site. What is all this for? Imagine that a hacker managed to gain access to the database (for example, through SQL injection) and he recognized all the hashes on the site.

You can recover a password from a hash, for example, by brute force (there are still rainbow tables , but now it’s not about them, and the essence of them comes down to the same thing - computing hashes for password candidates). We take the candidate for passwords, for example, “superbit” considers the hash amount for it, compares it with the existing hash amount - if they match, then the password for the user is “superbit”, if not, then we take the next candidate for passwords, for example, “Dklma7love”, we consider the hash amount for it, compare it with the one that we learned from the site database, if it matches, then we know the password, if not, we continue.

This operation (hashing enumeration) can be done using the central processor; there are many programs that can do this. But it was noticed that it is much faster to sort out hashes using a video card. Compared to the CPU, the use of the GPU increases the search speed by tens, hundreds, thousands and more times! Naturally, the faster the hashes get over, the more likely it is to bring a successful hack closer.

Popular graphics cards are AMD, GeForce and Intel HD Graphics. Intel HD Graphics is not always useful, they are not particularly powerful and they are not bought separately - therefore, we will not dwell on them much.

The main choice is between AMD and GeForce. Much more popular are the GeForce graphics cards. They have proven themselves in games, they have a huge army of fans. But AMD is better suited for sorting hashes, as if this would not upset GeForce fans. AMD video cards from the middle price category show about the same results as the GeForce video cards from the top category. Those. instead of one top-end GeForce, you can buy 2 AMD cheaper and get a higher hash speed.

I rethought this moment. Comparing the data from this table and prices in online stores, I came to the conclusion that there is no difference. Top-end GeForce more than twice the power of top-end Radeon. And the price is about twice as high. Plus, you need to know that AMD drivers have a very painful relationship with most Linux distributions. Currently, hashcat on Linux only supports AMDGPU-Pro, which only supports newer graphics cards. And even if you plan to buy a computer with a new AMD graphics card, for a start, check out the list of supported Linux distributions - it’s scanty, it’s possible that your OS is not there.

In general, it is possible that at one time Radeon was really better than GeForce for sorting passwords, at one time AMD drivers were installed in Linux with one command, but now this is not so. If I were building a computer or buying a laptop now, I would choose models with a GeForce.

Iteration of hashes will be needed:
  • when testing for penetration of web applications (sometimes);
  • when hacking WiFi (almost always)
  • when breaking the password for encrypted disks, wallets, files, password-protected documents, etc.) (always).
Network equipment / WiFi adapter
Almost any network adapter will do for Internet access. Even when testing web applications, we rarely run into limitations on network card bandwidth. Most often, the slowdowns are related to the response speed of the tested server / website, DoS / anti-brute force protection, lack of RAM on the Pentester computer, insufficient bandwidth of the Internet channel, etc. But I never encountered the insufficient bandwidth of my network card.

If you are going to crack WiFi, then not all wireless network cards are suitable. If this is important to you, then the details are here .

Only when using one program did I encounter a lack of RAM. This program is IVRE . For most other situations, the RAM of an average and even low-power computer should be enough to run almost any application in one thread.

If you plan to use the OS for pentesting in a virtual machine, then in this situation it is better to take care of a sufficient amount of RAM.

The needs of virtual machines in RAM:
  • Arch Linux with a graphical interface - 2 gigabytes of RAM for very comfortable work
  • Kali Linux with GUI - 2 gigabytes of RAM for normal operation
  • Kali Linux with a graphical interface - 3-4 gigabytes of RAM for very comfortable work
  • Any Linux without a graphical interface - about 100 megabytes for the system itself + the amount that the programs you run will consume
  • Windows latest versions - 2 GB to just start (a lot of brakes)
  • Windows latest versions - 4 GB or more for comfortable work.
For example, I have 8 gigabytes in the main system, I allocated 2 gigabytes of RAM on Arch Linux and Kali Linux, I run them (if necessary) at the same time and work comfortably in them. If you plan to use the OS for Pententing in virtual machines, then I would recommend having at least 8 gigabytes in any way - this is enough to comfortably run one or two systems, and in these systems most programs.

Nevertheless, if you plan to run many programs (or one program in many threads), or if you want to build a virtual sit down from several virtual machines, then 16 gigabytes will not be superfluous (I plan to increase up to 16 gigabytes on my laptop, since there are two empty slots).

Anything more than 16 gigabytes of RAM is unlikely to ever be useful to you when pentesting.

If you are going to iterate over the hashes and do it with the help of the central processor, and not the graphics card, then the more powerful the processor, the faster the search will go. Also, a powerful processor with a large number of cores will allow working with great comfort in virtual machines (I allocate 2 cores to each virtual machine with a graphical interface).

The vast majority of programs (except those that sort hashes) are not demanding on processor power.

There are no special requirements. Naturally, working with SSDs is more pleasant.
August 7, 2019


  1. Do you know how to install kali linux in Razer Blade 15 ?


Post a Comment


Popular Posts

how to update Kali Linux and Fix update error

Kali Linux one of the best Linux distro for penetration testing it's freq…

Fix Kali Linux sources.list Repositories

Fix default repository First after installing a clean Kali Linux the sou…

USB WiFi adapters that support monitor mode and wireless injection

usb wifi adapter with monitor mode and wireless injection (100% compatibl…

Recent Comments

Contact Me