Blog
Kali Linux
Nov 4, 2022
17 min read
Staged Payloads from Kali Linux | PT Phone Home – PHP
Tristram shows you how to host a PHP web page on Kali Linux and how you can use it to stage payloads that are hidden behind a wall of conditional access requirements.
Kali Linux
Staged Payloads from Kali Linux | PT Phone Home – DNS
In part one of this post, Tristram teaches you how to use TXT records to stage payloads that can be retrieved through DNS lookups.
Sep 15, 2022
30 min read
Kali Linux
Creating Kali i3-gaps
i3 is a tiling window manager for Linux and BSD systems. In this blog post, Arszilla gives a walk through on how he created his custom Kali i3-gaps ISO.
Aug 11, 2020
14 min read
Kali Linux
PowerShell Hacking: Mastering PSSession and Reverse Shells on Kali Linux
In this series, Tony Punturiero (TJ Null) will be showing how to use PowerShell on Kali Linux to obtain initial access with PSSession on Windows and Linux.
Jun 30, 2020
10 min read
Kali Linux
Customizing Kali Linux
One of the designers on the Kali Linux team shares his top tips and tools to customize Kali Linux. Dig in under the hood with Daniel Ruiz de Alegría.
Mar 31, 2020
12 min read
Kali Linux
Kali Linux 2.1.2 ARM Releases
The time has come for yet another Kali ARM image release with new and updated images. Our collection of supported ARM hardware grows constantly with new images from Raspberry Pi 3, Banana Pi and Odroid-C2, with the latter being our first real arm64 image. We’re really excited about our new arm64 build environment and hope to see more 64bit ARM devices running Kali in the future. Feel free to visit our Kali Linux ARM downloads page to get the latest goodness.
Mar 21, 2016
2 min read
Kali Linux
Kali Rolling ISO of DOOM, Too.
A while back we introduced the idea of Kali Linux Customization by demonstrating the Kali Linux ISO of Doom. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment. The customised Kali ISO would undergo an unattended autoinstall in a remote client site, and automatically connect back to our OpenVPN server over TCP port 443. The OpenVPN connection would then bridge the remote and local networks, allowing us full “layer 3” access to the internal network from our remote location. The resulting custom ISO could then be sent to the client who would just pop it into a virtual machine template, and the whole setup would happen automagically with no intervention – as depicted in the image below.
Feb 11, 2016
4 min read
Kali Linux
Kali Linux Rolling Virtual & ARM Images
With the recent release of Kali Rolling 2016.1 completed, we’ve gone ahead and updated our custom Kali VMware, VirtualBox, and ARM images. Here’s a few news items and updates that we have regarding these images for those who prefer to get them pre-built.
Feb 2, 2016
2 min read
Kali Linux
MASSCAN Web Interface
A couple of weeks ago, we had the opportunity to scan and map a large IP address space covering just over 3 million hosts. Our tool of choice for this was the fast and capable masscan, which is packaged in Kali. While masscan has several convenient output formats, such as binary and XML, one feature we were missing was an easy way to search our results. We quickly whipped up a little web interface that would allow us to import and search within a masscan XML output file. This feature proved very useful for us – as once we identified a specific vulnerable pattern on a machine, we could easily cross reference this pattern with over the millions of discovered hosts in our database.
Dec 4, 2015
3 min read
Kali Linux
Kali Linux 2.0 Top 10 Post Install Tips
With Kali 2.0 now released, we wanted to share a few post install procedures we find ourselves repeating over and over, in the hopes that you will find them useful as well. We’ve also slapped in some answers to common questions we’ve been getting. Here is our top 10 list:
Aug 12, 2015
3 min read
Kali Linux
Kali 2.0 Dojo Black Hat / DEF CON USA 2015
Last years event was a rousing success, with many attendees staying all day long and working through the multiple exercises. We had such a great time, we wanted to do it again. This is a great chance to get hands on with Kali 2.0, learning the cutting edge features and how to best put them to use. In this two session workshop series, we will be covering how to create your own custom Kali ISO that is tweaked and modified to exactly fit your needs. This will be followed up in the second session with a hands-on exercise of deploying Kali on USB sticks so that it contains several persistent storage profiles, both regular and encrypted – including the LUKS nuke feature.
Jun 8, 2015
3 min read
Kali Linux
Booting Kali Linux Live Over HTTP
Kali Linux Features Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often making use of some really amazing features that Kali Linux has to offer. One of these interesting use-cases includes booting instances of Kali Linux Live over HTTP, directly to RAM. We realized there’s little documentation around this
May 11, 2015
2 min read
Kali Linux
Kali Linux on a Raspberry Pi (A/B+/2) with Disk Encryption
With the advent of smaller, faster ARM hardware such as the new Raspberry Pi 2 (which now has a Kali image built for it), we’ve been seeing more and more use of these small devices as “throw-away hackboxes“. While this might be a new and novel technology, there’s one major drawback to this concept – and that is the confidentiality of the data stored on the device itself. Most of the setups we’ve seen do little to protect the sensitive information saved on the SD cards of these little computers.
Mar 9, 2015
7 min read