This paper discusses the assessment of information system security. When referring to the security of an information system, the authors focus on three major features of the system: confidentiality, integrity and availability. Diverse methods are used to identify existing security eaknesses and security assessment, including the Kali Linux operating system. This work offers a wide-ranging overview of possible uses, benefits and drawbacks. The greatest advantage of implementing this operating system is the considerable collection of various tools for
vulnerability assessment and penetration testing, mainly intended for ethical hacking. Further, the paper outlines which present forms of vulnerabilities are best identified by Kali.