
May 27, 2014
Kali Encrypted USB Persistence
A couple of days ago, we added an awesome new feature to Kali allowing users to set up a Live Kali USB with encrypted persistence. What this means is that you can now set up a bootable Kali USB drive allowing you to either boot to a “clean” Kali image or alternatively, overlay it with the contents of a persistent encrypted partition, allowing you to securely save your changes on the USB drive between reboots. If you add our LUKS nuke feature into this mix together with a 32GB USB 3.0 thumb drive, you’ve got yourself a fast, versatile and secure “Penetration Testing Travel Kit”.
Secure, Persistent Kali Linux Live USB
A few days ago, we added an awesome new feature to Kali allowing users to set up a Live Kali USB with encrypted persistence. What this means is that you can now create a bootable Kali USB drive allowing you to either live boot to a “clean” Kali image or alternatively, overlay it with the contents of a persistent encrypted partition, allowing you to securely save your changes on the USB drive between reboots. If you add our LUKS nuke feature into this mix together with a 32GB USB 3.0 thumb drive, you’ve got yourself a fast, versatile, and secure “Penetration Testing Travel Kit”.
New Default Kali Boot Options
From Kali 1.0.7 onwards, everything needed for encrypted Live USB persistence to work is already available in our ISO release, including an altered boot menu which now also contains two persistent boot options:
For either of these persistence options to work, we first need to image the Kali ISO to the USB device and then prepare a persistence partition, which can now also be encrypted. We’ve updated our Kali Linux documentation site to include the instructions for setting up your own Kali Linux Live USB with encrypted persistence.
Following these few simple commands, you can now secure your USB persistent data while traveling. Of course, if you’re über paranoid, you can also enable the Kali LUKS nuke feature to this persistent storage. Following the example from our Kali documentation site, our LUKS encrypted partition is located at /dev/sdb2. We can add a LUKS nuke key as follows:
[cc lang=”bash]
root@kali:~# cryptsetup luksAddNuke /dev/sdb2
Enter any existing passphrase: (the existing password)
Enter new passphrase for key slot: (the nuke password)
[/cc]
Once the nuke key is set, all the data on the encrypted persistent partition would be rendered useless should the nuke key be entered at boot time.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Insights
OffSec’s Take on the Global Generative AI Adoption Index
Discover OffSec’s take on the latest Global Generative AI Adoption Index report released by AWS.
May 30, 2025
3 min read

Research & Tutorials
CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint.
May 29, 2025
2 min read

Insights
Recompiling Your “Self”: A Cybersecurity-Inspired Guide to Resilience
A recap of our mental health OffSec LIVE session, with tips on ensuring intentional change, self-awareness, and digital resilience in cybersecurity.
May 28, 2025
8 min read