As we saw in the TV series Mr. Robot and movies like Snowden we realized that the good ones certainly do not use a Windows PC to do their operations and intrusions, but Linux systems with special command line tools are not easy to understand for those who are not expert.
Out of curiosity, if you want to know what kind of PC use the best hackers, we see this list of 5 operating systems based on Linux, which are equipped with some of the major programs of scanning and intrusion in computer networks, which also include tools used from technicians to do safety tests and recovery.
1) Kali Linux
Kali Linux is definitely the most popular operating system to perform hacker activity on networks and look for open ports and security holes within a secure network.
Kali Linux, formerly known as Backtrack, includes all the tools for testing networks, and for maintaining online privacy.
Kali Linux comes pre-installed with over 300 penetration-testing programs, including Armitage (a graphical tool used for cyber attacks), Nmap (popular port scanner program), Wireshark (a network traffic analyzer), John the Ripper (a program to find out password), Aircrack-ng (the most famous tool to get a password for a protected wifi network) and many others.
Kali Linux can be used on any PC as a Live CD without installation even if for network operations a computer with a compatible network card may be needed.
Kali Linux is also an operating system used for computer forensics, to recover data deleted from computers.
In Mr.Robot, the Kali Linux logo appears in the background in episode 5 of the first series.
This is one of the best hacker operating systems available as Live CD, inside a USB stick, to be tested and used on a computer without having to install it.
Pentoo is available in 32-bit and 64-bit versions, which is significantly better and faster.
Based on Linux Gentoo, it allows you to inject packets on wifi networks, to use cracking software and tools for doing penetration and security assessment tests.
Parrot Security OS is an operating system based on Debian Linux that includes many of the Kali Linux tools with the aim of providing a test tool for computer and network security.
This system offers many tools for analyzing computer systems and forensic and forensic police use to recover deleted files and files and force encryption keys.
Furthermore, it allows you to browse and work anonymously.
The project is certified to work even on machines that only have 265MB of RAM and is suitable for 32-bit (i386) and 64bit (amd64) computers.
Network Security Toolkit (NST) is another popular security test operating system and can be used as a Live CD by running it directly from the computer without installing anything.
BackBox is a Linux distribution for doing security testing and penetration in networks, based on Ubuntu and that includes many analysis tools and to create an environment that protects privacy.
BackBox is designed to be fast, easy to use and provide a minimal but complete desktop environment.
Among the operating systems for hackers, it is the easiest to use even for inexperienced people.
This system is also a great free solution for monitoring individual network devices in a company.