With Kali 2.0 now released, we wanted to share a few post install procedures we find ourselves repeating over and over, in the hopes that you will find them useful as well. We’ve also slapped in some answers to common questions we’ve been getting.
Stay up-to-date with the latest news and updates by subscribing to our RSS feed!
Try Harder – stay up-to-date with the latest Offensive Security News and Kali updates by subscribing to our RSS feed!
Offensive Security penetration testing articles about our online training courses, Kali Linux development, exploit research and security services.
Last years event was a rousing success, with many attendees staying all day long and working through the multiple exercises. We had such a great time, we wanted to do it again. This is a great chance to get hands on with Kali 2.0, learning the cutting edge features and how to best put them to use. In this two session workshop series, we will be covering how to create your own custom Kali ISO that is tweaked and modified to exactly fit your needs. This will be followed up in the second session with a hands-on exercise of deploying Kali on USB sticks so that it contains several persistent storage profiles, both regular and encrypted – including the LUKS nuke feature.
New Features in the Exploit Database Over the past 6 years, we have been maintaining and updating the Exploit Database on a daily basis, which now boasts over 35,000 exploits. While we constantly work on improving our back-end and entry quality. Over the years there haven’t really been any updates…
Kali Linux Features Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often making use of some really amazing features that Kali Linux has to offer. One of these interesting use-cases includes booting instances of Kali Linux Live over HTTP, directly to RAM. We realized…
Kali NetHunter 1.2 Released! Kali NetHunter 1.2 is fresh out, with a whole bunch of improvements, bug fixes….and yes, Android Lollipop support. This means that NetHunter now supports the Nexus6 and Nexus 9 devices too! This is awesome news to all those who have bought these new Nexus devices and…
With the advent of smaller, faster ARM hardware such as the new Raspberry Pi 2 (which now has a Kali image built for it), we’ve been seeing more and more use of these small devices as “throw-away hackboxes“. While this might be a new and novel technology, there’s one major drawback to this concept – and that is the confidentiality of the data stored on the device itself. Most of the setups we’ve seen do little to protect the sensitive information saved on the SD cards of these little computers.
One of the markings of the 1.0.7 Kali release was the introduction of Kali Live USB LUKS encrypted persistent storage, on which we further elaborated in one of our previous blog posts. However, we’re not done yet with USB persistent storage as more features in Kali remain to be explored.
Offsec students go through hell. They endure levels of stress and frustration beyond what is considered normal, and we at Offsec appreciate this. So much in fact, that we’ve dedicated the following song to anyone who’s taken an Offsec course, and tried harder!
With the opening shots of 2015 fired, we are happy to make some announcements in the NetHunter arena! One of the things that excite us the most about Kali Linux is how our Kali projects always end up being greater than the sum of their parts. This is most evident in our Kali NetHunter Project – the first open source Android based penetration testing platform for Nexus and OnePlus devices. Wait, OnePlus phones? Yes! Our new NetHunter v1.1 release brings with it some great news – and so we begin.
We at Offensive Security would like to thank all of our students, customers, and friends for a wonderful 2014. Its been a busy but productive year, with major upgrades to Kali Linux, the release of Kali NetHunter, the public launch of the hosted virtual labs, the first ever Kali Linux Dojo, upgrades to our student labs, lots of interesting R&D, a bunch of 0-days and a number of other accomplishments. We enjoyed the journey with all of you and here is to a fun and productive 2015! We wanted to thank you with this video we produced for all y’all.
For the past few months, we have been quietly beta testing and perfecting our new “Offensive Security Penetration Testing Labs”, or as we fondly call it, the “Offsec Playground”. Today, we are proud to unveil our hosted penetration testing labs – a safe virtual network environment designed to be attacked and penetrated as a means of learning and sharpening your penetration testing skills. The new design of the “Offsec Playground” includes multiple interconnected subnets with a wide array of modern operating systems, including Active Directory domains, Citrix systems, corporate Antivirus solutions as well as Intrusion Prevention Systems which attackers must learn to cope with.
The Kali Linux NetHunter platform has many hidden features which we still haven’t brought to light. One of them is the DriveDroid application and patch set, which have been implemented in NetHunter since v1.0.2. This tool allows us to have NetHunter emulate a bootable ISO or USB, using images of our choosing. That’s right, you can use NetHunter as a boot device which holds a library of bootable ISOs and images…And so we begin:
Several weeks ago a request in the Kali forums prompted us to look at the integration of the Adafruit 2.8in TFT touch screen for Kali Linux. A few weeks and much less hair later, we are happy to announce the availability of this image in our Offensive Security custom Kali images section.
Last week Microsoft released EMET 5.1 to address some compatibility issues and strengthen mitigations to make them more resilient to attacks and bypasses. We, of course, were curious to see if our EMET 5.0 disarming technique has been addressed by the latest version of the toolkit.