
Kali Linux is a Linux-based penetration testing arsenal that aids security professionals in performing assessments in a purely native environment dedicated to hacking. Kali Linux is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is a successor to the popular BackTrack distribution.
By default every Kali Linux version uses Gnome Display Manager (GMD3) which always shows a login screen in starting and root is the only user account in Kali Linux which doesn’t present any option to create another user during installation. But sometimes it might get tedious to type root password every time you login.
Practicing ethical hacking using Kali Linux requires you to have a quality desktop or Kali Linux laptop. Make sure you have one that helps you work smoothly.
This tutorial will show you how to make a simple few line changes to allow your auto root login user at system start for both GNOME and KDE Environments.
For GNOME Environments, edit the following file and uncomment the both lines as shown in below screenshot.
Command: gedit /etc/gdm3/daemon.conf
[daemon]
# Enabling automatic login
AutomaticLoginEnable = true
AutomaticLogin = root
In case if you’ve some other user, then you can change the 3rd line and replace root with your username. (AutomaticLogin = yeahhub)
Make sure you Reboot the machine by typing either init 6 or reboot.
For KDE Environments, edit the following file and add the following lines to the end of the file.
Command: gedit /etc/kde4/kdm/kdmrc
[X-:0-Core]
AllowRootLogin=true
AutoLoginAgain=true
AutoLoginDelay=0
AutoLoginEnable=true
AutoLoginLocked=false
AutoLoginUser=root
ClientLogFile=.xsession-errors
As always reboot to confirm if auto login root user is working or not.
You may also like:- Top 6 Advanced Techniques in Penetration Testing
- Top 4 Advanced Metasploit Techniques for Penetration Testers
- Exploit Writing for Beginners – A Step-by-Step Guide
- 15 Essential Windows Command Prompt Commands for Everyday Use
- Most Common DNS Record Types and Their Roles
- Top Skills Needed to Become a Cybersecurity Analyst
- Mastering Windows Management with WMIC Commands – Top 20 Examples
- Edit and Compile Code with the Best 5 Code Editors
- 50+ Top DevSecOps Tools You Need To Know
- Learn How to Add Proxy and Multiple Accounts in MoreLogin