Kali Linux is a distribution especially aimed at penetration testing and network security applications. (It's a successor to Backtrack Linux.)
Kali isn't intended as a general-purpose desktop OS for end users. Instead, it's a collection of useful tools for monitoring, exploring, and attacking networks. It comes out of the box with tools like Wireshark, nmap, and Aircrack-ng, and is particularly useful in situations where you just want a disposable machine/installation with some network tools.
Enter the Raspberry Pi: Cheap, portable, low-power, and easy to customize. There's been a lot of interest in using small ARM boxes like the Pi with Kali, and it's well-supported by the maintainers.
Since the Raspberry Pi 2 was released, we've gotten a series of requests for help with getting PiTFT displays to work with Kali on the Pi 2. This guide explains how to do that, and includes a kernel package built with both our PiTFT configuration and the patches applied for a standard Kali Linux build.
Three guidelines for using these tools:
- Be good to other people: Don't violate people's privacy, steal their resources, or break their networks.
- Do the reading: Learn the purposes and effects of your tools.
- Remember that even considered, ethical use of the tools on networks you don't own can be received badly by authorities, or violate some broadly-written laws.
If you're new to topics like pentesting, start by exploring networks you own or have sanctioned access to.
You'll need the following:
- A Raspberry Pi or Pi 2 (this guide is intended for the Pi 2, but may be of use to others)
- An SD card appropriate for your hardware, 4 gigs or larger
- A network connection on the Pi
- PiTFT Plus (best for use with the Pi 2 and Pi A+ or B+)
- PiTFT original (best used with the Pi 1 model B)
This guide assumes some experience with GNU/Linux systems, and relies heavily on the command line.
Text editor powered by tinymce.