2024 Global Infosec Award Winner

OffSec Wins Seven Global InfoSec Awards during RSA Conference 2024

Read blog

Kali Linux

Kali Linux related news and updates from the OffSec Team

Kali with Raspberry Pi TFT support

Kali with Raspberry Pi TFT support

<p style="text-align: justify;">Several weeks ago a request in the <a href="https://forums.kali.org/showthread.php?22949-Raspberry-pi-B-with-Adafruit-2-8in-TFT" title="Kali Linux Forums" target="_blank" rel="noopener noreferrer">Kali forums</a> prompted us to look at the integration of the <a href="http://www.adafruit.com/product/376" title="2.8&quot; TFT Touch Shield for Arduino" target="_blank" rel="noopener noreferrer">Adafruit 2.8in TFT touch screen</a> for Kali Linux. A few weeks and much less hair later, we are happy to announce the availability of this image in our <a href="https://www.offsec.com/kali-linux-vm-vmware-virtualbox-image-download/" title="Kali Linux Downloads">Offensive Security custom Kali images</a> section.</p>

Read more

Kali Nexus NetHunter 1.0.2

Kali Nexus NetHunter 1.0.2

<p style="text-align: justify;">It&#8217;s been a week since our release of the <a href="https://www.offsec.com/kali-linux-nethunter-download/" title="Kali Linux NetHunter Download">Kali Linux NetHunter</a>, and the feedback is amazing. A NetHunter community has sprung up from nowhere, and the <a title="Kali Linux NetHunter Forums" href="https://forums.kali.org/forumdisplay.php?14-NetHunter-Forums" target="_blank">forums</a> and <a title="Kali NetHunter Github" href="https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project" target="_blank">github</a> pages are really active. We&#8217;re completely stoked about this community response, and are eager to see it grow. After an intense week of community testing and a slew of bugfixes (including shellshock), we thought it would be a good opportunity to release a NetHunter update. <span style="color: #800000;"><strong>Please welcome NetHunter 1.0.2</strong></span>.</p>

Read more

Kali Linux Evil Wireless Access Point

Kali Linux Evil Wireless Access Point

<p style="text-align: justify;">A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using a fake, captive web portal, and provide MITM&#8217;d Internet services via 3G. We needed reliability and scalability in our environment as there would potentially be a large amount of, erm&#8230;.&#8221;participants&#8221; in this wireless network. We were pretty happy with the result and quickly realized that we had created a new &#8220;Kali Linux recipe&#8221;. Or in other words, we could <strong>create a custom, bootable wireless evil access point image</strong>, which could do all sorts of wondrous things.</p>

Read more

Announcing the Kali Linux Dojo

Announcing the Kali Linux Dojo

<p style="text-align: justify;">For the past 6 months, we&#8217;ve been busy silently developing an advanced Kali Linux course the likes of which has not yet been seen in the industry. This set of in-depth, practical workshops focuses on the Kali operating system itself, demonstrating some of its advanced features and use-cases by its developers. As with all &#8220;Offensive Security&#8221; training, this workshop is intensive, educational, and addictively engaging. If you&#8217;ve ever wished for fluent proficiency with Kali Linux, this workshop is for you.</p>

Read more

Kali Encrypted USB Persistence

Kali Encrypted USB Persistence

<p style="text-align: justify;">A couple of days ago, we added an awesome new feature to Kali allowing users to set up a Live Kali USB with encrypted persistence. What this means is that you can now set up a bootable Kali USB drive allowing you to either boot to a &#8220;clean&#8221; Kali image or alternatively, overlay it with the contents of a persistent encrypted partition, allowing you to securely save your changes on the USB drive between reboots. If you add our <a href="https://www.kali.org/tutorials/emergency-self-destruction-luks-kali/" title="Kali Linux LUKS nuke" target="_blank">LUKS nuke feature</a> into this mix together with a 32GB USB 3.0 thumb drive, you&#8217;ve got yourself a fast, versatile and secure &#8220;Penetration Testing Travel Kit&#8221;.</p>

Read more

Kali Linux Recipes

Kali Linux Recipes

<p style="text-align: justify;">A couple of days ago, we received an e-mail from a university professor asking for advice regarding Linux distributions to be used in his security 101 classes. In its default configuration, Kali Linux wasn&#8217;t a 100% match for his needs, which were quite specific:</p>

Read more

Kali Linux Trademarks

Kali Linux Trademarks

<p style="text-align: justify;">It’s been a year since we’ve released <a href="https://www.kali.org" title="Kali Linux" target="_blank">Kali Linux</a>, and we’re happy to see it succeed. Kali has surpassed BackTrack Linux in many ways and the community is responding accordingly. Between the improved development cycle, more attentive support, and larger community, Kali Linux has reached new heights of popularity. This popularity however, does not come without its own issues. One of the big problems we&#8217;ve been facing in the past year is rampant violations of our Kali Linux <a href="http://docs.kali.org/kali-policy/kali-linux-trademark-policy" title="Kali Linux Trademark Policy" target="_blank">Trademarks</a>.</p>

Read more

Generating Kali Raspberry Pi Images

Generating Kali Raspberry Pi Images

<p style="text-align: justify;">&#8220;<span style="color: #000000;"><strong>Kali Linux Raspberry Pi Image Updated!</strong></span>&#8221; That was supposed to be the &#8220;tweet&#8221; we would release, telling everyone our new Kali Linux Raspberry Pi image was supposedly better than our old one. We often update our followers with news like this on twitter, and this tweet would be no different. However, this time, we thought it would be interesting to tell you about the mechanics of updates like these, and shed some light on how these &#8220;news items&#8221; come about. This post will also give us the opportunity to describe the process of running our custom <a title="Kali Linux ARM image build scripts" href="https://gitlab.com/kalilinux/build-scripts/kali-arm" target="_blank" rel="noopener noreferrer">Kali Linux ARM build scripts</a>, by way of a story. If you couldn&#8217;t care less about this story, and just want the updated image &#8211; head straight to our <a href="https://www.offsec.com/kali-linux-vm-vmware-virtualbox-image-download/" title="Kali Linux Downloads" target="_blank" rel="noopener noreferrer">Kali Linux Custom Image page</a>!</p>

Read more

Kali Linux ISO of Doom

Kali Linux ISO of Doom

<p style="text-align: justify;">In our last blog post, we provided an example of running an <a title="Kali Linux Unattended PXE Install" href="https://www.offsec.com/kali-linux/kali-linux-unattended-network-install-pxe/">unattended network installation of Kali Linux</a>. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment using OpenVAS and the Metasploit Framework.</p>

Read more

Kali Linux Unattended PXE Install

Kali Linux Unattended PXE Install

<p style="text-align: justify;">Our last blog post on the <a href="https://www.kali.org/" title="Kali Linux" target="_blank" rel="noopener">Kali Linux</a> site discussed <a href="https://www.kali.org/penetration-testing/kali-linux-penetration-testing-platform/" title="Kali Linux Penetration Testing Platform" target="_blank" rel="noopener">implementing some cool scenarios with Kali Linux</a>, such as remote unattended installations, creating custom Kali Linux ISOS, and getting Kali working on <a href="https://www.offsec.com/kali-linux/kali-linux-on-galaxy-note/" title="Kali Linux on a Galaxy Note 10.1" target="_blank" rel="noopener">funky ARM hardware</a>. We received several emails from people asking for more information on how to implement these scenarios, so we thought we&#8217;d make a few blog posts with more detailed examples.</p>

Read more

Kali Linux on a Galaxy Note 10.1

Kali Linux on a Galaxy Note 10.1

<p style="text-align: justify;">Here at Offsec, we love playing with hardware. Be it something like the <a title="Onity Door Unlocker, Round Two." href="https://www.offsec.com/offsec/onity-door-unlock-round-two/" target="_blank" rel="noopener noreferrer">Onity Hotel Door Unlocker</a>, a <a title="Advanced Teensy Penetration Testing Payloads" href="https://www.offsec.com/offsec/advanced-teensy-penetration-testing-payloads/" target="_blank" rel="noopener noreferrer">Teensy USB HID attack payload</a>, or <a title="Cloning RFID Tags with Proxmark 3" href="https://www.offsec.com/offsec/cloning-rfid-tags-with-proxmark-3/" target="_blank" rel="noopener noreferrer">RFID hacks</a> &#8211; if it&#8217;s shiny, we like it. While we were in the last stages of developing Kali Linux, we made the effort to to get Kali working on some ARM hardware, such as the <a href="http://docs.kali.org/armel-armhf/install-kali-samsung-chromebook" title="Kali Linux ARM Samsung Chromebook" target="_blank" rel="noopener noreferrer">Samsung Chromebook</a>, <a href="http://docs.kali.org/armel-armhf/install-kali-linux-odroid-x2u2" title="Kali Linux ARM Odroid U2" target="_blank" rel="noopener noreferrer">Odroid U2</a>, <a href="http://docs.kali.org/armel-armhf/install-kali-linux-arm-raspberry-pi" title="Kali Linux ARM Raspberry Pi" target="_blank" rel="noopener noreferrer">Raspberry Pi</a> and RK3306 devices such as the <a href="http://docs.kali.org/armel-armhf/install-kali-arm-on-ss808" title="Kali Linux ARM on SS808" target="_blank" rel="noopener noreferrer">SS808</a>, and then contributed these to the community as &#8220;Unofficial Trusted Images&#8221;, together with the Official Kali Linux downloads.</p>

Read more

Kali Linux Has Been Released!

Kali Linux Has Been Released!

<p style="text-align: justify;">Seven years of developing <a href="http://www.backtrack-linux.org" title="BackTrack Linux" target="_blank">BackTrack Linux</a> has taught us a significant amount about what we, and the security community, think a penetration testing distribution should look like. We&#8217;ve taken all of this knowledge and experience and implemented it in our &#8220;next generation&#8221; penetration testing distribution.</p>

Read more