Using Kali Linux for Penetration Testing: A Comprehensive Guide