Skip to main content

Kali Linux Features

Kali Linux Features


Makings of a Great Penetration Testing Distribution

What are the makings of a great penetration testing distribution? The number of users it has? The number of tools it contains? Perhaps it’s the update cycle of various tools used, or possibly even the quality of the packaging of these tools. In our opinion, while all the parameters above are relevant, the true indication of a great Penetration Testing distribution is the selection of useful and relevant features that it offers security professionals. What kind of features are we talking about? We’re happy you asked! We’ve made a short list of some of these Kali Linux features, and linked them to their respective sources.

Special Kali Linux Features of Note

  • Full Customisation of Kali ISOs

Full customisation of Kali ISOs with live-build allowing you to create your own Kali Linux images – Kali Linux is heavily integrated with live-build, allowing endless flexibility in customising and tailoring every aspect of your Kali Linux ISO images. Want a non-root user, KDE version of Kali with only the top 10 tools installed? We have a Kali Linux live build recipe for that!

  • Kali Linux ISO of Doom and Other Kali Recipes

The Kali Linux ISO of doom – a great example of the flexibility of live-build, and the types and complexity of customisations possible. Build a self installing, reverse VPN auto-connecting, network bridging Kali image – for the perfect hardware backdoor.

  • Kali Linux Live USB with LUKS Encrypted Persistence

Kali Linux Live USB persistence with LUKS encryption – Kali has extensive support for USB live installs, allowing for features such as file persistence or full (USB) disk encryption.

  • Kali Linux Live USB with Multiple Persistence Stores

Kali Linux Live USB with multiple persistence stores – What’s more, Kali Linux supports multiple persistence USB stores on a single USB drive. You can create a live Kali USB bootable drive which supports encryption and multiple store profiles.

  • Kali Linux Full Disk Encryption

Kali Linux LUKS Full Disk Encryption (FDE) – Having the ability to perform a full disk encryption of your sensitive penetration testing computer drive is an essential feature needed in our industry. Just the thought of unencrypted client data getting lost or mishandled is horrific.

  • Kali Linux LUKS Encryption Nuke

Nuking your Kali Linux hard disk with the Kali LUKS nuke option – While being able to encrypt your drives is important, we believe it’s also important to be able to quickly control the destruction of data on these drives. Our Kali LUKS nuke feature is unique to our distribution.

  • Kali Linux Metapackages

Mastering Kali Linux tool sets with Kali Metapackages – Kali contains a bunch of metapackage collections which aggregate different toolsets. This makes it easy to get custom, minimized environments set up. For example, if all you need are some wireless tools for an upcoming assessment, you can apt-get install kali-linux-wireless.

  • Kali Linux Amazon EC2 AWS Images

Kali Linux in the cloud – Kali Amazon EC2 images available – Need to spin up a Kali box quickly? Perhaps you need some serious bandwidth or disk space for your upcoming tasks. You can easily set up a cloud version of Kali Linux in the Amazon Elastic Compute Cloud.

  • Kali Linux Accessibility Features

Kali Linux accessibility features for visually impaired users – Kali is one of the very few Linux distributions which have a working accessibility system for blind or visually impaired users through both voice feedback and braille hardware support.

  • Automating Kali Linux Deployment

Automating Kali Linux deployment via Unattended PXE installations – You can automate and customize your Kali Linux installations over the network. You are one PXE boot away from a fresh, custom Kali installation, or 10,000 of them.

  • Kali Linux on a Raspberry Pi and Other ARM Devices

Kali Linux on a Raspberry Pi and a bunch of other interesting ARM devices – Kali supports over a dozen different ARM devices and common hardware such as Raspberry Pi, Odroid, Beaglebone, and more. We’re very active in the ARM arena and constantly add new interesting hardware to our repertoire.

  • Kali Linux Forensics Mode

Kali Linux forensics mode – The bootable “Forensics” mode available in Kali makes it perfect for forensics work, as the forensics Kali live image option does not mount any drives (including swap) with this option. The wealth of forensics tools on Kali (metapackage – kali-forensics-tools) makes Kali a good choice for any forensics work you need.

  • Kali Linux NetHunter

Kali Linux NetHunter ROM overlay for Nexus Android devices – Kali is so versatile that creating the “Kali NetHunter” Android was a natural extension to our distribution. NetHunter is a custom Android ROM overlay for ASOP which brings together all the toolset of Kali Linux (and more!) to your Nexus or OnePlus phones.

  • Kali Linux Running on Android

Kali Linux running on Android through Linux Deploy – Have a recent Android device other than a Nexus or OnePlus phone? Try using the Android App “Linux Deploy” to get Kali seamlessly installed in a chroot environment.

  • Disk Encryption on Raspberry Pi 2

Disk Encryption on Raspberry Pi 2 and other ARM hardware – There’s no easy way of having LUKS disk encryption on ARM hardware. We’ve simplified the process and gave it bells and whistles.

Comments

Popular posts from this blog

Can you acce Marianas web!!???

The legend of  Mariana's Web  appears to get its name from the deepest part of the ocean,  Mariana's Trench . It's supposedly the  deepest  part of the web, a forbidden place of mysterious evil or at least, that's the myths a subset of online believers has cultivated. Marianas Web, named after the deepest ocean trench on Earth. Source:   The myth of Mariana's Web The Dark Net is made for anonymity; the sharing of information without fear of detection or prosecution. Due to its nature this attract many people, both bad and good. some to speak freely of political jurisdiction and others to engage in all manners of illegal activity. Like the ‘normal’ web, Marianas web has a range of topics, but mainly illegal. And that’s exactly what Marianas Web is, its the Deepest part of the Web, where people don’t want you to go. Source: Marianas web and the other levels Some  intrepid Internet  mavericks even claim that the Marianas Web is the location of a super intel

Bettercap : MITM attack for sniffing traffic and passwords

Bettercap : MITM attack for sniffing traffic and passwords Contents Installation Sniffing Traffic Getting password We will be installing Bettercap, doing a quick sniffing exercise, and then a more detailed section on grabbing the password. Will demonstrate the password grabbing on outlook.com, which seems to be particularly vulnerable to this attack. Installing bettercap Installation is simple- apt-get update apt-get dist-upgrade apt-get install bettercap The above three commands will leave you with latest versions of Kali and bettercap. PS: I am writing this tutorial from a location with slow internet connection, and hence didn't perform the dist-upgrade step. However, bettercap seems to be running  mostly  fine. There may be a few difference in what you observe and what I show in this demo due to this difference in versions. For those who want to know the versions of various utilities that I'm using, take a look below. If you are unfamiliar with

Kali Installation : Dual Boot VS Live Boot VS Virtual Machine

Kali Installation : Dual Boot VS Live Boot VS Virtual Machine If you are yet to have a Kali instance running on your machine, then you have quite a dilemma ahead of you. There are three ways to go about running Kali, each with their own advantages and disadvantages. In this article, I'll tell you what exactly the terms Dual Boot, Live Boot, and Virtual machine installation mean, how easy/difficult these are to perform, and what are the advantages/disadvantages of each of them. In the end, I'll tell you how to find guides for doing all of these. PS: This guide (and the blog) is focused on Kali, but everything in this post is applicable to Linux in general. Certain parts are related to hacking, but you can take networking lessons from them regardless, even if you aren't interested in hacking per se. Dual Boot Most of you would be running a single operating system on your system right now. However, that doesn't have to be the case. We can partition our hard disk, an