Kali Linux Light Armhf

Kali Linux Light Armhf 3,7/5 372 reviews
  1. Kali Linux Virtualbox
  2. Kali Linux Light Armhf System
  3. ماهو Kali Linux Light Armhf
Kali Linux
DeveloperOffensive Security
OS familyUnix-like
Working stateActive
Initial release13 March 2013 (6 years ago)[1]
Latest release2019.2[2] / 21 May 2019; 32 days ago
Update methodAPT (several front-ends available)
Package managerdpkg
Platformsx86, x86-64, armel, armhf
Kernel typeMonolithic kernel (Linux)
Default user interfaceGNOME 3
LicenseVarious
Official websiteOfficial website

Kali Linux 2019.1 Released, folks can download the ISO / Torrent or upgrade. Kali Linux 2019.1 has significant Updates like Metasploit 5. The Lite version is XFCE, rather than GNOME. It also has far fewer packages, pentesting or otherwise. The idea is to run a lighter resource demanding environment whereby you can download the pentesting tools individually o by groups at a time as y.

Kali Linux[3] is a Debian-derived Linux distribution designed for digital forensics and penetration testing.[4][5][6][7] It is maintained and funded by Offensive Security Ltd. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix. The third core developer, Raphaël Hertzog, joined them as a Debian expert.[8][9][10][11][12]

Development[edit]

Kali Linux has over 600[13] preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripperpassword cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAPweb application security scanners.[14][15] Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.[14]

It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix. The third core developer, Raphaël Hertzog, joined them as a Debian expert.[16][17]

Kali Linux is based on Debian Testing. Most packages Kali uses are imported from the Debian repositories.[18]

The Kali Linux project began quietly in 2012, when Offensive Security decided that they wanted to replace their venerable BackTrack Linux project, which was manually maintained, with something that could become a genuine Debian derivative, complete with all of the required infrastructure and improved packaging techniques. The decision was made to build Kali on top of the Debian distribution because it is well known for its quality, stability, and wide selection of available software.

The first release (version 1.0) happened one year later, in March 2013, and was based on Debian 7 “Wheezy”, Debian’s stable distribution at the time. In that first year of development, they packaged hundreds of pen-testing-related applications and built the infrastructure. Even though the number of applications is significant, the application list has been meticulously curated, dropping applications that no longer worked or that duplicated features already available in better programs.

During the two years following version 1.0, Kali released many incremental updates, expanding the range of available applications and improving hardware support, thanks to newer kernel releases. With some investment in continuous integration, they ensured that all important packages were kept in an installable state and that customized live images (a hallmark of the distribution) could always be created.[19]

Requirements[edit]

  • Kali Linux requires a minimum of 3.8GB hard disk space for installation.[20]
  • A minimum of 512MB RAM for i386 and AMD64 architectures.
  • A bootable CD-DVD drive or a USB stick.

Supported platforms[edit]

Kali Linux is distributed in 32-bit and 64-bit images for use on hosts based on the x86instruction set and as an image for the ARM architecture for use on the Beagle Board computer and on Samsung's ARM Chromebook.[21]

The developers of Kali Linux aim to make Kali Linux available for even more ARM devices.[17]

Kali Linux is already available for BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1, and SS808.[22]

With the arrival of Kali NetHunter, Kali Linux is also officially available on Android devices such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models.

Kali Linux is available on Windows 10, on top of Windows Subsystem for Linux (WSL). The official Kali distribution for Windows can be downloaded from the Microsoft Store.[23]

Features[edit]

Kali Linux has a dedicated project set aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter.[24]

It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member 'BinkyBear' and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.[24]

BackTrack (Kali's predecessor) contained a mode known as forensic mode, which was carried over to Kali via live boot. This mode is very popular for many reasons, partly because many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. When booted in forensic mode, the system doesn't touch the internal hard drive or swap space and auto mounting is disabled. However, the developers recommend that users test these features extensively before using Kali for real world forensics.[25]

Tools[edit]

Kali Linux includes security tools, such as:[13]

  • Cisco Global Exploiter, a hacking tool used to find and exploit vulnerabilities in Cisco Network systems
  • Metasploit framework
  • Social engineering tools.
  • Reverse Engineering tools

These tools can be used for a number of purposes, most of which involve exploiting a victim network or application, performing network discovery, or scanning a target IP address. Many tools from the previous version (BackTrack) were eliminated to focus on the most popular penetration testing applications.

See also[edit]

References[edit]

  1. ^'Official Kali Linux Releases'. Retrieved 2019-04-10.
  2. ^'Official Kali Linux Releases'. Retrieved 2019-05-21.
  3. ^'Kali Linux 1.0 review'. LinuxBSDos.com. 2013-03-14. Retrieved 2019-04-10.
  4. ^Simionato, Lorenzo (2007-04-24). 'Review: BackTrack 2 security live CD'. Linux.com. Retrieved 2019-04-10.
  5. ^Barr, Joe. 'Test your environment's security with BackTrack'. Linux.com. Retrieved 2019-04-10.
  6. ^'BackTrack 4 - Hacking galore'. Dedoimedo.com. 2009-05-15. Retrieved 2019-04-10.
  7. ^'BackTrack 5 R3 review'. LinuxBSDos.com. 2012-08-17. Retrieved 2019-04-10.
  8. ^Watson, J.A. (2014-05-28). 'Hands-on with Kali Linux 1.0.7'. ZDNet.com. Retrieved 2019-04-10.
  9. ^'Kali Linux 1.0.7 review'. LinuxBSDos.com. 2014-05-30. Retrieved 2019-04-10.
  10. ^'Kali Linux review'. Dedoimedo.com. 2014-12-15. Retrieved 2019-04-10.
  11. ^Watson, J.A. (2016-01-22). 'Hands-on with Kali Linux Rolling'. ZDNet.com. Retrieved 2019-04-10.
  12. ^Smith, Jesse (2016-04-25). 'Kali Linux 2016.1'. DistroWatch Weekly. No. 658. Retrieved 2019-04-10.
  13. ^ ab'Kali Linux Penetration Testing Tools'. tools.kali.org. Retrieved 2019-04-10.
  14. ^ ab'Kali Linux arrives as enterprise-ready version of BackTrack'. The H. 2013-03-13. Retrieved 2019-04-10.
  15. ^'Kali Linux Metapackages'. Offensive Security. Retrieved 2019-04-10.
  16. ^'The Birth of Kali Linux'. Offensive Security. 2012-12-12. Retrieved 2019-04-10.
  17. ^ abOrin, Andy (2014-12-03). 'Behind the App: The Story of Kali Linux'. Lifehacker. Retrieved 2019-04-10. Mati Aharoni: One of our goals with Kali is to provide images of the operating system for all sorts of exotic hardware—mainly ARM based. This includes everything from Raspberry Pi's to tablets, to Android TV devices, with each piece of hardware having some unique property.
  18. ^'Kali's Relationship With Debian'. Kali Linux. 2013-03-11. Retrieved 2019-04-10.
  19. ^'A Bit of History'. kali.training. Retrieved 2019-04-10.
  20. ^'Kali Linux Hard Disk Install'. Kali Linux Official Documentation. Retrieved 2019-04-10.
  21. ^Pauli, Darren (2013-03-13). 'BackTrack successor Kali Linux launched'. SC Magazine. Retrieved 2019-04-10.
  22. ^'04. Kali Linux on ARM'. Retrieved 2019-04-10.
  23. ^muts (2018-03-05). 'Kali Linux in the Windows App Store'. Kali Linux. Retrieved 2019-04-10.
  24. ^ ab'Kali Linux NetHunter for Nexus and OnePlus'. Retrieved 2019-04-10.
  25. ^'Kali Linux Forensics Mode'. Retrieved 2019-04-10.

External links[edit]

  • Kali Linux at DistroWatch
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Kali_Linux&oldid=902907984'

Linux distributions designed for security analysis, penetration testing, and forensic analysis are all the rage these days. It seems like you can hardly swing a dead cat (or a dead computer) without hitting one.

As a dedicated Linux user I consider that to be a good thing, simply because choice is always good, and it is always good to have several groups of talented and dedicated people working on something. But as a long-time user of Kali Linux (and BackTrack before that) I honestly believe that Kali is still the best in the field, so I am always pleased when I hear there is a new Kali release.

The new release, 2017.3, is primarily a roll-up, incorporating all patches and updates issued since the last release into a clean set of installation images. Remember, though, Kali is a rolling-release distribution, so if you already have it installed you don't need to reinstall from these new images; just make sure that you have the latest updates installed.

If you do want or need to make a fresh installation, the distribution images for the PC version (32 and 64 bit) can be obtained from the Kali downloads page. There are a number of different versions there, and people sometimes get confused by them, so here is a quick summary:

  • Kali 64 bit / Kali 32 bit -- These are the full versions, which include all of the tools and have a Gnome 3 desktop.
  • Kali 64 bit Light / Kali 32 bit Light -- These versions have been trimmed down to reduce the download size. They do not include the tools, and they have an Xfce desktop.
  • Kali 64 bit e17/MATE/Xfce/LXDE -- These are full versions with all the tools, but based on one of these alternate desktops rather than Gnome 3. There are no 32 bit images for these alternate desktops.
  • Kali armel/armhf -- These are generic ARM images, but be aware that there are a lot of system-specific ARM images (such as Raspberry Pi) on a different download page, as detailed next.

In addition to these standard versions, the Offensive Security downloads page offers a variety of ARM and Virtual images. (Offensive Security is the company behind the Kali Linux distribution.)

  • Kali for ARM devices -- Custom images for at least 10 different ARM-based devices, including the Raspberry Pi, and Chromebooks from HP, Samsung, and Acer. These are a sort of 'intermediate' image, they include some but not all of the tools, and they have an Xfce desktop.
  • Kali for VMware/VirtualBox/Hyper-V -- Full versions with all tools and Gnome 3 desktop. VMware and Virtual box have both 32 and 64 bit versions; Hyper-V has only a 64 bit version.

The download pages include sha256 checksums for all of these images. Make sure you verify the checksum before installing -- just think about how embarrassing it would be to install a security-focused distribution from a compromised distribution image!

I have downloaded and installed the 64-bit full version, the Raspberry Pi 2 and 3 version, and the VirtualBox 64-bit version. All of them installed and ran with absolutely no problem. Here are some notes about them:

PC 64-bit full version

This is a hybrid ISO image, so just copy it directly to a USB stick or burn it to a DVD. The boot menu offers you a variety of Live boots and an installer.

Notes:

  • Booting to Live mode first is always a good idea, just to find out that things like display, keyboard, mouse, and networks all work properly before you install.
  • The Kali installer is a slightly modified version of the Debian installer, so don't expect anything flashy or modern-looking. But like the Debian installer, it just works, very well.
  • During the installation process, when it asks if you want to use a network mirror, you should answer yes, or else your installed system won't have the Kali repositories configured in the APT sources list, which means you wouldn't ever get any updates.
  • The installation works just fine on both MBR and UEFI systems. On UEFI, it uses its own name for the UEFI boot directory, so there is no conflict if there happens to also be a Debian installation on the same system.
  • You have to define the root password during installation. So when you boot the installed system, and it comes up with the login window, don't try to use the old standard or default Kali root password. This is the voice of experience talking to you: when you don't have much hair left anyway, you really don't want to tear out a lot of what's left out for such a silly reason.

Raspberry Pi 2/3 version

Unlike the PC version, this is not an installation image it is a snapshot. You install it in the same way that you install Raspbian, just uncompress the image and dump it to a microSD card.

Notes:

  • Kali does not automatically expand the root file system during the first boot. This could catch you unaware, because Raspbian always does this. This is a good thing, however, because if you are running Kali, you probably don't want a totally lame single-partition installation. This way you can partition the SD card however you want after installation.
  • Don't forget, this was a snapshot, not an installation image. You don't run through the installer, so you don't get to set the root password. The Raspberry Pi comes up with the old default root password. The very first thing you should do, immediately after logging in for the very first time, is change the password.
  • One minor irritant: the keyboard layout doesn't seem to be stored across reboots properly. The snapshot image has a US keyboard, of course, but if I change that (through the Xfce menu / Settings / Keyboard / Layout), I can get a Swiss German layout -- but the next time I boot, it is back to a US keyboard. Even more strange is that if I go back to the keyboard layout preferences, it shows German (Switzerland), but in fact that map is not installed. Very strange.
  • One other minor irritant: Bluetooth is not enabled by default on the Pi 2/3.
Kali

As I mentioned above, the Kali ARM images include a selection of the most commonly used Kali tools. If you want the full set of Kali tools, all you have to do is install the package kali-linux-full.

I have said in previous posts that I think Kali linux on a Raspberry Pi 3 is one of the best tools a security professional could have. But now I want to go one step further, so get ready for this...

Kali Linux Virtualbox

I have tried a lot of different Linux distributions on the Raspberry Pi. I would say with no hesitation that if you are interested in an alternative to Raspbian, Kali Linux is the best choice I have seen yet. Obviously, if you are using the Raspberry Pi for educational or hobby purposes, Raspbian is the best choice. I has all the tools, libraries, languages, interfaces and such that you need for that. But if you are using a Raspberry Pi as a very low-cost desktop system, you might be happier with Kali Linux. One obvious reason might be that you either don't like the PIXEL desktop (based on LXDE), or that you absolutely want or need the Xfce desktop.

Kali

Virtual Machine Version

I have loaded the VirtualBox image, and ran it with no problem. It is an image of the full version, with all tools included, and the Gnome 3 desktop:

Notes:

  • There was an issue with the USB 2.0 support. I got around that by simply going to the VM Settings and disabling USB altogether.
  • The image is fairly large (around 3.3GB), and when that is imported into VirtualBox, it uses something like 8.5GB. Make sure you have enough free disk space.
  • As with the ARM version, this is a snapshot not an installation image. So you don't get to set the root password during installation, it comes up with the default Kali root password.

Finally, I want to add a few words about another excellent Kali Linux project/product, the Kali Linux Revealed book and online course.

It is an in-depth description of using, installing, and customizing Kali Linux. It includes sections on package management, building and modifying the Linux kernel, deploying and managing Kali installations, including network deployment, and more. It is not only an excellent resource for anyone who wants to use Kali Linux, a lot of the information it contains is of general interest and use for other Linux distributions, so even experienced users and administrators are likely to find the book very useful.

The book is available free in PDF format from the link above, and as a paperback from Amazon. One way or another, if you are serious about using and/or administering Kali Linux, you definitely need to get this book and study it thoroughly.

Recent and related coverage

Kali Linux Light Armhf System

In addition to their full distribution, Kali Linux offers Light and Mini versions. Here's how I got on with them.

ماهو Kali Linux Light Armhf

Combining two of my favorite things: Kali Linux and variety of Raspberry Pi models.

Read more on Linux

  • 5 fundamental differences between Windows 10 and Linux (TechRepublic)
  • Ataribox will have AMD inside, run Linux, cost under $300 (CNET)

Related Topics:

Open Source Enterprise Software Developer Cloud