8-bit video game blocks with pixel art of the Learn One and Learn Enterprise logos

Level up your training with limited-time offers - Discounts for Individuals and Enterprise

Kali Linux | OffSec

Blog

Kali Linux

Kali Linux related news and updates from the OffSec Team
Kali Linux

Nov 4, 2022

17 min read

Staged Payloads from Kali Linux | PT Phone Home – PHP

Tristram shows you how to host a PHP web page on Kali Linux and how you can use it to stage payloads that are hidden behind a wall of conditional access requirements.

Read more

Kali Linux

Staged Payloads from Kali Linux | PT Phone Home – DNS

In part one of this post, Tristram teaches you how to use TXT records to stage payloads that can be retrieved through DNS lookups.

Sep 15, 2022

30 min read

kali-i3-gaps-arszilla

Kali Linux

Creating Kali i3-gaps

i3 is a tiling window manager for Linux and BSD systems. In this blog post, Arszilla gives a walk through on how he created his custom Kali i3-gaps ISO.

Aug 11, 2020

14 min read

Using Powershell For Pentesting In Kali Linux

Kali Linux

PowerShell Hacking: Mastering PSSession and Reverse Shells on Kali Linux

In this series, Tony Punturiero (TJ Null) will be showing how to use PowerShell on Kali Linux to obtain initial access with PSSession on Windows and Linux.

Jun 30, 2020

10 min read

kali-customization

Kali Linux

Customizing Kali Linux

One of the designers on the Kali Linux team shares his top tips and tools to customize Kali Linux. Dig in under the hood with Daniel Ruiz de Alegría.

Mar 31, 2020

12 min read

kali-arm-releases

Kali Linux

Kali Linux 2.1.2 ARM Releases

The time has come for yet another Kali ARM image release with new and updated images. Our collection of supported ARM hardware grows constantly with new images from Raspberry Pi 3, Banana Pi and Odroid-C2, with the latter being our first real arm64 image. We’re really excited about our new arm64 build environment and hope to see more 64bit ARM devices running Kali in the future. Feel free to visit our Kali Linux ARM downloads page to get the latest goodness.

Mar 21, 2016

2 min read

iso-of-doom-2-b

Kali Linux

Kali Rolling ISO of DOOM, Too.

A while back we introduced the idea of Kali Linux Customization by demonstrating the Kali Linux ISO of Doom. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment. The customised Kali ISO would undergo an unattended autoinstall in a remote client site, and automatically connect back to our OpenVPN server over TCP port 443. The OpenVPN connection would then bridge the remote and local networks, allowing us full “layer 3” access to the internal network from our remote location. The resulting custom ISO could then be sent to the client who would just pop it into a virtual machine template, and the whole setup would happen automagically with no intervention – as depicted in the image below.

Feb 11, 2016

4 min read

kali-rolling-arm-virtual-3

Kali Linux

Kali Linux Rolling Virtual & ARM Images

With the recent release of Kali Rolling 2016.1 completed, we’ve gone ahead and updated our custom Kali VMware, VirtualBox, and ARM images. Here’s a few news items and updates that we have regarding these images for those who prefer to get them pre-built.

Feb 2, 2016

2 min read

offsec-masscan-web-ui

Kali Linux

MASSCAN Web Interface

A couple of weeks ago, we had the opportunity to scan and map a large IP address space covering just over 3 million hosts. Our tool of choice for this was the fast and capable masscan, which is packaged in Kali. While masscan has several convenient output formats, such as binary and XML, one feature we were missing was an easy way to search our results. We quickly whipped up a little web interface that would allow us to import and search within a masscan XML output file. This feature proved very useful for us – as once we identified a specific vulnerable pattern on a machine, we could easily cross reference this pattern with over the millions of discovered hosts in our database.

Dec 4, 2015

3 min read

Kali Top 10 Post Install Tips

Kali Linux

Kali Linux 2.0 Top 10 Post Install Tips

With Kali 2.0 now released, we wanted to share a few post install procedures we find ourselves repeating over and over, in the hopes that you will find them useful as well. We’ve also slapped in some answers to common questions we’ve been getting. Here is our top 10 list:

Aug 12, 2015

3 min read

Offsec BlackHat Kali Dojo and Defcon 2015

Kali Linux

Kali 2.0 Dojo Black Hat / DEF CON USA 2015

Last years event was a rousing success, with many attendees staying all day long and working through the multiple exercises. We had such a great time, we wanted to do it again. This is a great chance to get hands on with Kali 2.0, learning the cutting edge features and how to best put them to use. In this two session workshop series, we will be covering how to create your own custom Kali ISO that is tweaked and modified to exactly fit your needs. This will be followed up in the second session with a hands-on exercise of deploying Kali on USB sticks so that it contains several persistent storage profiles, both regular and encrypted – including the LUKS nuke feature.

Jun 8, 2015

3 min read

How to BOOT Kali Linux over HTTP

Kali Linux

Booting Kali Linux Live Over HTTP

Kali Linux Features Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often making use of some really amazing features that Kali Linux has to offer. One of these interesting use-cases includes booting instances of Kali Linux Live over HTTP, directly to RAM. We realized there’s little documentation around this

May 11, 2015

2 min read

Kali Raspberry Pi with LUKS Encryption

Kali Linux

Kali Linux on a Raspberry Pi (A/B+/2) with Disk Encryption

With the advent of smaller, faster ARM hardware such as the new Raspberry Pi 2 (which now has a Kali image built for it), we’ve been seeing more and more use of these small devices as “throw-away hackboxes“. While this might be a new and novel technology, there’s one major drawback to this concept – and that is the confidentiality of the data stored on the device itself. Most of the setups we’ve seen do little to protect the sensitive information saved on the SD cards of these little computers.

Mar 9, 2015

7 min read

Showing 1 - 13 of 84 entries