On this page

The Kali Linux Dojo: A Penetration Testing Platform Explored

The developers of Kali Linux present the first official all-day Kali Linux event at Black Hat USA 2014. Consisting of five, one-hour workshops, we will take you on a unique journey through Kali Linux while providing rare insights and an in-depth look at the most powerful features available in our advanced penetration-testing platform.

Created by the Kali Linux development team and debuted at Black Hat USA 2014, this event will also includes an interactive Q&A session with the developers, hands on instructions on creating your own custom Kali Linux ISOs, automatic unattended installations of Kali Linux, enterprise management of the distribution, building and utilizing Kali Linux on ARM platforms, and a step by step creation of a custom Raspberry Pi image – transforming it into an effective hardware backdoor. If you’ve ever wished for fluent proficiency with Kali Linux, this workshop is for you.

If you want to play along with us, you’ll need to come prepared with a fast laptop running an updated version of Kali Linux. For more details about the workshop and its requirements, check out our "Kali Linux Workshop Release Notes."

Workshop Notes:

Workshop #1: Kali Linux - Under the Hood

August 7 1015-1115 - Technical Level: 1/5

In this workshop, we will introduce the Kali Linux security auditing distribution, its history, development, architecture, and features. We will delve into how we got to where we are today, how penetration-testing tools are evaluated for inclusion in the distribution, and a look at the road ahead. If we have enough time, we’ll also dabble with altering and patching Kali packages.

At the end of this session, we will also conduct a Q & A session where individuals can ask the Kali developers questions about the project. If you are new to Kali Linux and need a guided introduction, or you have specific questions for the Kali team, this is the workshop for you.

Workshop Goals – Get to know the developers, get warmed up and set-up, build some basic Kali Packages.

Presented by

Mati Aharoni

Workshop #2: Rolling Your Own - Generating Custom Kali Linux ISOs

August 7 1145-1245 - Technical Level: 2/5

One of the most powerful features of Kali Linux is the ability to create your own flavors of the distribution containing customized tools, desktop managers, and services. This workshop will show you how to create your own personalized Kali Linux ISO, customizing virtually every aspect using the live-build utility and making efficient use of the various meta-packages available in Kali.

Workshop Goals – Attendees should be able to understand and independently build complex Kali images, such as the Kali Linux ISO of Doom.

Presented by

Mati Aharoni

Workshop #3: Pre-seeding, Automating, and Managing Kali Installations

August 7 1415-1515 - Technical Level: 3/5

Kali Linux supports several interesting installation and deployment options, which will be explored in depth. In this workshop, we’ll show you how to deploy Kali over the network with PXE and iPXE technologies, pre-seed installations, deploy custom Kali setups, and then use the Salt management and configuration package to manage multiple installations of Kali throughout the enterprise.

Workshop Goals – Attendees should be able to install and automate Kali Linux instances to fit specific needs. Fluency in Network installs, preseeding and slipstreaming packages. If time permits, enterprise management of Kali with Salt.

Presented by

Mati Aharoni

Workshop #4: Penetration Testing From Your Pocket - Kali Linux on ARM and Android Devices

August 7 1530-1630 - Technical Level: 3/5

Kali Linux supports ARMEL and ARMHF architectures. This allows us to put Kali on a variety of interesting hardware platforms, as well as easily conduct chroot installs of Kali Linux on Android. In this workshop, we will show you how to install Kali Linux within a chroot environment on an Android device.

Workshop Goals – Attendees should be able to manually create custom Kali ARM images for use as chroot environments such as Android devices. Attendees should also be able to deploy these images on their Android cellphones, and be fluent with supportive Android applications such as Linux Deploy.

Presented by

Mati Aharoni

Workshop #5: The Ultimate Hardware Backdoor - Kali Linux Edition

August 7 1700-1800 - Technical Level: 3/5

This will be the concluding session, where we’ll use methods demonstrated throughout the day to show you how to create your very own “Raspberry Pi of Doom,” based off Kali Linux and a Raspberry Pi. The configuration involves creating an image file that contains a minimal Kali installation, which on boot, connects back to the penetration tester over a VPN connection and bridges the remote target network with the testers’. This image can then also be used on an Android device – proving to be perhaps the most potent hardware backdoor of them all. Workshop Goals – Attendees should be able to manually create custom native Kali ARM images for a Raspberry Pi, which have similar properties to the “ISO of Doom." This includes compiling a custom ARM kernel for the Raspberry Pi.

Presented by

Mati Aharoni

Bio: Mati Aharoni

Mati Aharoni is the founder and core developer of the Kali Linux project, as well as the CEO of Offensive Security. Over the past year, Mati has been developing a curriculum designed for users who wish to make the most out of the Kali Linux operating system. By bringing together several advanced features in the Kali OS and projecting them into useful and practical scenario based exercises, the Kali Linux workshop was born. The workshop is designed to be a fast-paced, crash course to the most advanced features in the distribution, giving attendees the ability and freedom to bend Kali Linux to fit their needs.