Skip to content
  •   Thursday, February 9, 2023
  • Advertise
  • Contact us
Yeah Hub

Yeah Hub

Kali Linux Tutorials | Tech News | SEO Tips and Tricks

  • Home
  • Tutorials
    • Kali Linux Tutorials
    • Metasploit Tutorials
    • Wireless Hacking
    • Android Hacking
    • PHP Tutorials
  • CTF Challenges
  • Q&A
    • CEHv11 – MCQ
    • CEHv10 – MCQ
    • CEHv9 – MCQ
    • Linux MCQ
    • Infosec Q&A
    • HTML Q&A
    • Wireless Q&A
    • Abbrevations
  • Contact us
  • Home
  • Tutorials
  • Auto Login Root User – Kali Linux (At System Startup)
Tutorials

Auto Login Root User – Kali Linux (At System Startup)

4 years ago
Nancy Culbreth

Kali Linux is a Linux-based penetration testing arsenal that aids security professionals in performing assessments in a purely native environment dedicated to hacking. Kali Linux is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is a successor to the popular BackTrack distribution.

By default every Kali Linux version uses Gnome Display Manager (GMD3) which always shows a login screen in starting and root is the only user account in Kali Linux which doesn’t present any option to create another user during installation. But sometimes it might get tedious to type root password every time you login.

Practicing ethical hacking using Kali Linux requires you to have a quality desktop or Kali Linux laptop. Make sure you have one that helps you work smoothly.

This tutorial will show you how to make a simple few line changes to allow your auto root login user at system start for both GNOME and KDE Environments.

For GNOME Environments, edit the following file and uncomment the both lines as shown in below screenshot.

Command: gedit /etc/gdm3/daemon.conf

[daemon]
# Enabling automatic login
AutomaticLoginEnable = true
AutomaticLogin = root

In case if you’ve some other user, then you can change the 3rd line and replace root with your username. (AutomaticLogin = yeahhub)

Make sure you Reboot the machine by typing either init 6 or reboot.

For KDE Environments, edit the following file and add the following lines to the end of the file.

Command: gedit /etc/kde4/kdm/kdmrc

[X-:0-Core]
AllowRootLogin=true
AutoLoginAgain=true
AutoLoginDelay=0
AutoLoginEnable=true
AutoLoginLocked=false
AutoLoginUser=root
ClientLogFile=.xsession-errors

As always reboot to confirm if auto login root user is working or not.

Nancy Culbreth
Nancy Culbreth

Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.

Tags: auto login kali linux, Auto Login Root, auto login root user, Auto Login Root User System Startup, Auto Login User, GNOME And KDE auto Login, Gnome Auto login, Kali Linux System Startup Autologin, KDE Auto Login

Post navigation

Webacoo – Web Backdoor Generator Tool [Kali Linux]
10 Cool Netstat Commands You Need to Know

No.1 Best Web Hosting


DomainRacer Web Hosting

Yeahhub’s Best Stuff

Kioptrix All Levels CTF Challenges Certified Ethical Hacker Questions CEHv9

Online Safety Quiz Yeahhub

CISSP Question Bank MCQ

DOS Attack Types

Information Security Abbreviations

Python Built-in Functions

OVER 1000+ INFORMATION SECURITY Q&A

Useful Linux Commands

Wireless Networking Questions

Related Posts

Tutorials

5 Windows 10 Features: How to Use Them

1 year ago
Nancy Culbreth
Tutorials

Some Useful PowerShell Cmdlets

3 years ago
Nancy Culbreth
Tutorials

Create Free SSL Certificate – ZEROSSL.COM [2020 Tutorial]

3 years ago
Nancy Culbreth
Tutorials

Generate Self-Signed SSL Certificate with OPENSSL in Kali Linux

3 years ago
Nancy Culbreth

You Missed

Articles

How Are Online Casinos Preventing DDoS Attacks?

7 hours ago
Nancy Culbreth
Articles

When is it necessary to rent a server(s)?

1 day ago
Nancy Culbreth
Articles

Now is the time to rent hosting with VPS! Why?

1 day ago
Nancy Culbreth
Articles

The Power of the Web: A Short Guide to How the Internet Can Supercharge Your Business

5 days ago
Nancy Culbreth

Disclaimer

Yeahhub.com does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed,purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein.

Recent Comments

  • trool on SSLKILL – Forced Man in the Middle Attack – Sniff HTTPS/HTTP
  • web root on Top 20 High Profile Creation Backlink Sites – 2018 Update
  • daebak on How to Download Wistia Videos without any Tool
  • Daniel on How to Download Wistia Videos without any Tool
  • ulong jep on Exploitation of EternalBlue DoublePulsar [Windows 7 – 64bit] with Metasploit Framework

Latest Articles

  • How Are Online Casinos Preventing DDoS Attacks? February 8, 2023
  • When is it necessary to rent a server(s)? February 7, 2023
  • Now is the time to rent hosting with VPS! Why? February 7, 2023
  • The Power of the Web: A Short Guide to How the Internet Can Supercharge Your Business February 3, 2023

Newsletter

Copyright © All rights reserved | Theme by Mantrabrain