Applying Kali Linux itself is authorized. Even so, the legality depends on how you employ it. You may’t hack into someone else's Laptop or community without having their authorization. Pretexting is often a social engineering approach which is used by hackers, spammers, and pranksters to suppose and exploit the trust https://topazdirectory.com/listings13277962/5-easy-facts-about-kali-described