I’m new to the cyber-security/privacy space. I am interested in teaching myself about it, as well as dabbling in OSINT and general linux-type-stuff too. ATM this is all a hobby so while it is not crucial to have everything air-tight, I would like to do my best to follow best practices.

That being said, I am currently using a Mac M1 so my VM capabilities are (AFAIK) limited to the OS’s provided by the UTM virtual machine software. For those who are unaware, the OS’s they provide can be found here:

https://mac.getutm.app/gallery/

From a security/privacy perspective, which of these OS’s would you consider to be the most secure or, able to be the most secure with configuration? At first glance and with my limited knowledge, I want to say Kali, but I feel this may be cliché as it’s what your stereotypical-hacker-type would use.

Any guidance would be appreciated.

N.B., ease of use/convenience is not a top priority for me, as I’m using this as a learning experience and I’m open to trying different things and making mistakes along the way.

Thanks!

***EDIT: Thank you to all who provided information. I learned a lot. I’ve decided to try a few different distros that work with UTM namely, Parrot OS (both home and security editions for different purposes), as well as Kali and Debian.

  • KISSmyOSFeddit@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    edit-2
    1 month ago

    Kali is the least secure of all distros, it runs everything as root and is meant as a tool to boot from an USB stick for pentesting, not for installation on your machine.

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 month ago

      And everything on Kali can easily be installed on something else. If you want “hacker tools,” just apt install them on Debian 12. I use nmap pretty frequently on openSUSE Tumbleweed (not on the list) for testing my own domains, and pretty much any Linux distro will have those tools in the repos.