A couple of days ago one of us had the idea of adding a "nuke" option to our Kali install. In other words, having a boot password that would destroy, rather than decrypt the data on our drive. A few Google searches later, we found an old cryptsetup patch by Juergen Pabel which does just that - adds a "nuke" password to cryptsetup, which when used, deletes all keyslots and makes the data on the drive inacessible. We ported this patch for a recent version of cryptsetup, and posted it on github.
We're always on the lookout for and interesting ARM hardware for Kali Linux. Whether it's a Galaxy Note or a USB stick sized SS808, we want to see Kali run on it. You can therefore imagine our excitement, when we first laid our eyes on the Utilite pro.
Today we are pleased to announce the immediate availability of Kali Linux 1.0.5 with a rollup of various tool additions, fixes, and upgrades. In particular, Software Defined Radio (SDR) researchers will be especially pleased to know that we have made some significant tool additions in this growing field.
Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. So far, we've built native images for the Samsung Chromebook, Odroid U2, Raspberry Pi, RK3306, Galaxy Note 10.1, CuBox, Efika MX, and BeagleBone Black to name a few. This however does not mean you cannot install Kali Linux in a chroot on almost any modern device that runs Android. In fact, the developers of Linux Deploy have made it extremely easy to get any number of Linux distributions installed in a chroot environment using a simple GUI builder.
A while back a bug with the LVM encrypted install in Kali Linux 1.0.4 was reported in our bug tracker. This bug was high priority in our TODO as encrypted installs are an important feature in our industry, so we wanted to squash this bug asap. This article will describe the process of debugging, identifying and fixing this bug in Kali, and ultimately in Debian as well.
Whenever we are given the opportunity to describe Kali Linux, we use the word "powerful". Have you ever wondered or asked yourself why exactly we consider Kali to be so "Powerful"? Why is Kali any different or better from say, an Ubuntu machine with a bunch of security tools preinstalled on it? After all, our nmap package isn't any better than anyone else's, is it?