Linux

Emergency Self Destruction of LUKS in Kali

Kali Linux Full Disk Encryption
As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensi...
Cybersecurity

Kali Linux 1.0.5 and Software Defined Radio

Today we are pleased to announce the immediate availability of Kali Linux 1.0.5 with a rollup of various tool additions, fixes, and upgrades, including our fix for the encrypted encrypted LVM installation issue that we documented last week. As usual, u...
Cybersecurity

Kali Linux on Android using Linux Deploy

Kali Linux on any Android Phone or Tablet






Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. So far, we’ve built native images for the Samsung Chromebook, Odroid U2, Raspberry Pi, RK3306, Galaxy Note 10.1,...
Cybersecurity

Tracking and Fixing an Installer Bug

A little while back, a bug with the LVM encrypted install in Kali Linux 1.0.4 was reported in our bug tracker. This bug was high priority in our TODO as encrypted installs are an important feature in our industry so we wanted to squash this bug ASAP. T...
Cybersecurity

Kali Linux 1.0.4 Summer Update Release

In keeping with our tradition of publishing new releases during the annual Black Hat and DEF CON conferences, we are pleased to announce the availability of Kali Linux 1.0.4. The last few months since the initial release of Kali have seen a large numbe...
Cybersecurity

Pass the Hash toolkit, Winexe and more.

We’ve just pushed a bunch of packages, tools, and utilities to the main Kali repositories. These tools have been on the top of our wish list for a while and some of them were quite challenging to package. Before we start telling you of our packag...
Cybersecurity

Kali Linux Accessibility Improvements

A couple of weeks ago, we were approached (independently) by two blind security enthusiasts who both drew our attention to the fact that Kali Linux had no built-in accessibility features. This made Kali difficult, if not impossible, to both install and...
Cybersecurity

Bleeding Edge Kali Linux

We’ve been busy this week, still behind on our emails, but going strong with Kali development. We packaged some new tools which were pointed out by the community as missing, such as inguma, arachni, bully, lbd, uniscan, automater, as well as star...
Cybersecurity

Kali Linux Release Aftermath

Five days into the Kali Linux release at BlackHat EU in Amsterdam, and we’re still not fully recovered. Since the release, we’ve had just over 90,000 downloads, a dozen or so package updates, added more articles to the Kali Documentation, s...
Cybersecurity

What’s New in Kali Linux?

Enter Kali Linux
“So, what’s the difference between BackTrack and Kali?” you might be asking. Unfortunately for us, that’s not a simple question to answer. It’s a mix between “everything” and “not much&rd...
Cybersecurity