• We just launched and are currently in beta. Join us as we build and grow the community.

Kodachi Linux Installation

ninja10

Humor Tactician
N Rep
0
0
0
Rep
0
N Vouches
0
0
0
Vouches
0
Posts
163
Likes
117
Bits
1 MONTH
1 1 MONTH OF SERVICE
LEVEL 1 400 XP
Forest-with-Path-Wide-Presentation-2.png


Hey Folks, in this tutorial we will install kodachi linux operating system on VMware in windows machine. Linux Kodachi operating system is based on Xubuntu 18.04 LTS it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. If you want to read more about it you can go here.

Let’s take a look 😛 !!

Installation of VMware

Installing VMware software in a Windows machine is quite easy which you can do by downloading it from here.

1-1.png


Fire 😛 !! Boot the vmware software, look at the top left corner, click on the file and choose the “New Virtual Machine” option.

3-2.png


Just go with the software recommended option and click on Next.

4-2.png


Now click on the browse button to select the Kodachi downloaded ISO image. You can download ISO image from here.

5-2.png


Select the operating system type “Linux” and version as well.

6-2.png


Give the machine name and the location where you want to save the logs and data.

7-1.png

Storage Management

Here you can give storage to your operating system but make sure it should be more than 30 GB.

8-2.png

Hardware Customization

After that just click on “customize hardware” option and proceed. You can provide memory as per availability but minimum should be 3 GB to run perfectly.

9-2.png


You need to give the same number of processors in both.

10-2.png


Just change the network connection from “NAT” to “Bridge” and exit from the hardware customization.

11-2.png


Boot 😛 !! Now power up the operating system and boot the operating system by choosing second option.

12-3.png


Great 😛 !! Now you can directly use the Kodachi operating system without any configuration.

13-3.png


The interface of this operating system is such that hackers in movies.

14-2.png


Completely Anonymous 😛 !! The operating system is specially designed for hackers through which they can protect themselves completely.

15-2.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

417,812

310,149

310,158

Top