PUBLICksoona / attackvector
ShellJavaScript
linux distro for anonymized penetration based on Kali and TAILS — Read more
README.md
AttackVector Linux is a new distribution for anonymized penetration and security.
It is based on Kali and TAILS, which are both based on Debian.
Source link: https://github.com/ksoona/attackvector
AttackVector Linux: the dragon has tails
AttackVector Linux is a new distribution for anonymized penetration and security.
It is based on Kali and TAILS, which are both based on Debian.
Design Philosophy
Yin and Yang
While Kali requires a modified kernel for network drivers to use injection and so forth,
TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor.
The intention of AttackVector Linux is to provide the capability to anonymize attacks
while warning the user when he or she takes actions that may compromize anonymity.
The two projects have different design philosophies that can directly conflict with one another.
In spite of this, the goal of AttackVector Linux is to integrate them complementarily into one OS.
TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor.
The intention of AttackVector Linux is to provide the capability to anonymize attacks
while warning the user when he or she takes actions that may compromize anonymity.
The two projects have different design philosophies that can directly conflict with one another.
In spite of this, the goal of AttackVector Linux is to integrate them complementarily into one OS.
Features
- The anonymity of TAILS
- The privacy of SRWare Iron
- The password recovery of hashkill
- The cryptography of DaKaRand
- The penetration tools of Kali
Build Instructions
[ distro / build / kali_coms.txt ]
- Install prerequisites in Kali:
apt-get install git live-build cdebootstrap kali-archive-keyring
cd /tmp
git clone git://git.kali.org/live-build-config.git
apt-get remove libdebian-installer4
apt-get install libdebian-installer4 - Copy down git repo [ distro / kali / config ]
git clone git://github.com/ksoona/attackvector.git
cp attackvector/distro/kali/config /tmp/live-build-config/config
cd /tmp/live-build-config - Live build:
lb clean --purge
dpkg --add-architecture amd64
lb config --architecture amd64 --mirror-binary http://http.kali.org/kali --mirror-binary-security http://security.kali.org/kali-security --apt-options "--force-yes --yes"
lb build
(Notice the similarity to Kali Live-Build.)
Download
MD5 (attackvector-linux-0.0.1alpha-64bit.iso) = 359e2147206a5275ec46a7c997d66f8c
mirror BitBucket
mirror BitBucket
social
Docs
- Live Build Manual
- TAILS git branches
- How to build TAILS
- How to customize TAILS
- Rebuilding a Kali Package
- Rebuilding the Kali Kernel
- Live Build a Custom Kali ISO
- How to customize Debian live
Project Status
It seems our best structural approach is customizing the Kali Live Build scripts.
Eventually this Kali derivative should meet the TAILS design specifications.
Eventually this Kali derivative should meet the TAILS design specifications.
Git
- Kali git repositories
- TAILS git repository
- GitLab.org for hosting repos cron pull'd from the above (see base-git-subtree.sh)
- GitLab-CI Continuous Intergration system uses Vagrant, just like TAILS build scripts
- Configure build system to generate & test ISOs
Tasks
- Help port TAILS to Wheezy
- Evaluate features of each distro & unify them into a single kernel
- Provide two layers of functionality: dedicated install and live distro
- Add warning messages for anonymity risks
- Full Disk Encryption (FDE) w/ LUKS
- Host on AttackVector.org
- Provide documentation
- HTTPS Everywhere
- Debian repositories
license
Text under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Code under GNU Public License. © Kenneth Soona 2013
Source link: https://github.com/ksoona/attackvector