Things you need to know about Kali Linux Image
To run 'Live' Potassium from a USB drive on a standard Windows and Apple computer, you'll need a bootable Linux Kali ISO Image, in 32-bit or 64-bit format.
ISO file for computers based on Intel platform
If you are unsure of the structure of the system you want to run Kali on (on Linux or OS X), you can run the following command at the command line:
uname -m
If you get a response, " x86_64 ", use the 64-bit ISO Image (image contains "amd64" in the file name). If you get an ' i386 ' response, use a 32-bit image (the image containing 'i386' in the file name). If you are using a Windows system, check your computer's hardware configuration, information, and laptop to see if it is running Windows x86 or x64.
The Kali Linux Image is available as a ' .iso / .img ' file that can be downloaded directly or via ' .torrent ' files .
Things you need to know about Kali Linux Image Picture 1
Building your own Kali Linux ISO, standard or custom, is a very simple process.
VMware Image
Things you need to know about Kali Linux Image Picture 2
If you want to run Kali Linux as a 'guest' in VMware, Kali will act as a VMware virtual machine built in with the installed VMware Tools. VMware Image is available in 64 bit (amd64), 32 bit (i686) and 32 bit PAE (i486) formats.
ARM Image
Things you need to know about Kali Linux Image Picture 3
The hardware structure of ARM-based devices varies significantly, so there cannot be only one image that works on all devices. Potassium Linux Image is created for ARM architecture available for many types of devices.
The script to build your own ARM Image is also available on GitHub.
Verify Kali Image downloaded
Why need to do this?
Before you run Kali Linux Live, or install it on your hard drive, you need to make sure that what you've got is actually Kali Linux, and not another fake software. Kali Linux is a professional penetration testing tool set. Being a professional penetration testing tool, the absolute assurance of the integrity of the tools is important: if the tools are not reliable, the test results will not be worth it. trust.
Furthermore, because it is a leading penetration test distribution, a fake version of Kali Linux can have a tremendous impact if it is accidentally deployed. There are many people who have accidentally installed a fake Kali Linux version and you certainly don't want to be among them.
To avoid this is very simple:
- Download only Kali Linux via the official website https://www.kali.org/downloads or https://www.offensive-security.com/kali-linux-vmware-arm-image-download/ . You will not be able to browse these pages without SSL encryption - the type of connection encryption makes an attacker use a man-in-the-middle attack to modify the process. Download is much more difficult.
- After you download and before running an Image, verify again with one of the procedures detailed below.
There are several methods to verify your download. Each method provides a certain level of assurance and requires a corresponding user effort.
- You can download an ISO Image from an official Kali Linux download page, calculate the ISO SHA256 function and compare it by checking with the value listed on the Kali Linux website. This is quick and easy, but is likely to be vulnerable to a malicious DNS infection - that is, the attacker will somehow 'load' an image and the SHA256 signature match on the page. fake web site on Kali Linux official website.
- You can download an ISO Image via torrents and it will also pull down a file containing the SHA256 signature. You can then use the shasum command (on Linux and OS X) or a utility (on Windows) to automatically verify that the calculated signature of this file matches the signature in the secondary file. This is even easier than the "manual" method, but has the same weakness: if the torrent you pull down is not really Kali Linux, it will give you a fake signature.
- To make sure Kali Linux is downloaded, you can download both the signature file and the version of the same file registered with the official Kali Linux private key and use GNU Privacy Guard. (GPG) to, first, verify that the SHA256 signature is calculated and the signature in the match text file matches; second, verify that the version of the file containing the SHA256 function has been correctly registered with the official key.
If you use this more complex process and successfully authenticate downloaded ISOs, you can be absolutely sure that what you have is an official image and not tampered with in any way. This method, though the most complex, has the advantage of providing independent assurance of image integrity. The only thing that could make this method fail is that the official Kali Linux secret key may be overthrown by an attacker.
What do you need to do?
- If you are running on Linux, you may have installed GPG (GNU Privacy Guard) . If you are using Windows or OS X, you need to install the appropriate version for your platform.
- If you are using a Windows PC, download and install GPG4Win : https://www.gpg4win.org/download.html
- If you are using Macintosh running OS X, download and install GPGTools: https://gpgtools.org/
Since Windows is not able to calculate the SHA256 checksum, you will also need a utility like Microsoft File Checksum Integrity Verifier or Hashtab to verify your download.
- After installing GPG, you need to download and import the official copy of Kali Linux. Do this with the following command:
$ wget -q -O - https://www.kali.org/archive-key.asc | gpg --import
or command:
$ gpg --keyserver hkp: //keys.gnupg.net --recv-key 7D8D0BF6
- The results you will see are as follows:
gpg: key 7D8D0BF6: public key "Kali Linux Repository"imported
gpg: Total number processed: 1
gpg: imported: 1 (RSA: 1)
- Verify that the lock is installed correctly with the command:
gpg --fingerprint 7D8D0BF6
- The result will be as follows:
pub rsa4096 2012-03-05 [SC] [expires: 2021-02-03]
44C6 513A 8E4F B3D3 0875 F758 ED44 4FF0 7D8D 0BF6
uid [full] Kali Linux Repository
sub rsa4096 2012-03-05 [E] [expires: 2021-02-03]
You are now set up to authenticate your Kali Linux download.
How do I verify downloaded images?
Manually verify Signature on ISO (Direct Download)
If you downloaded the ISO directly from the download page, verify it with the following procedure.
On Linux, or OS X, you can create the SHA256 checksum from the ISO Image you downloaded with the following command (assuming the ISO Image is named " linux-linux.2-amd64.iso " and is in the current line). at the list):
shasum -a 256 potassium-linux-2016.2-amd64.iso
The results appear as follows:
1d90432e6d5c6f40dfe9589d9d0450a53b0add9a55f71371d601a5d454fa0431 potassium-linux-2016.2-amd64.iso
SHA256 signature results, ' 1d90432e6d5c6f40dfe9589d9d0450a53b0add9a55f71371d601a5d454fa0431 ' will match the signature shown in the ' sha256sum ' column on the official download page for Intel 64-bit structure Kali Linux 2016.2 ISO Image.
Verify Signature on ISO Using file Attached signature (Download Torrent)
If you have downloaded a copy of ISO Kali Linux Image via torrent, in addition to the ISO file (eg linux-2016.2-amd64.iso), there will be a second file containing SHA256 signature calculated for ISO, with the extension being '.txt.sha256sum' (example: linux-2016.2-amd64.txt.sha256sum).You can use this file to verify the authenticity of downloads on Linux or OS X with the following command:
grep potassium-linux- 2016.2 -amd64.iso potassium-linux- 2016.2 -amd64.txt.sha256sum | shasum -a 256 -c
If the image is successfully authenticated, the response received will be as follows:
potassium-linux- 2016.2 -amd64.iso: OK
IMPORTANT NOTE!If you cannot verify the authenticity of the downloaded Kali Linux image as described in the previous section, DO NOT use it!Its use can jeopardize your system, any network you connect to, and other systems on that network.Stop and make sure you have downloaded the official Kali Linux images.
Verify ISO using SHA256SUMS file
This is a more complicated procedure, but provides a much more accurate level of validation: it does not depend on the integrity of the site you downloaded the image to, only the official Kali Linux development key which you install independently.To verify your image this way for the Intel architecture version of Kali, you will need to download three files from the Kali "Live CD Image" page for the current release (v2016.2, by post write this):
- ISO Image key (eg linux-linux-2016.2-amd64.iso)
- File containing SHA256 function is calculated for ISO, SHA256SUMS
- Registered version of that file, SHA256SUMS.gpg
Before verifying the checksum of the image, you must ensure that the file SHA256SUMS is a file created by Kali.That's why the file is registered by the official Kali key with a separate signature in SHA256SUMS.gpg.If you have not already done so, Kali's official key can be downloaded and entered into your keychain with this command:
$ wget -q -O - https://www.kali.org/archive-key.asc | gpg --import
or this command:
$ gpg --keyserver hkp: //keys.gnupg.net --recv-key 7D8D0BF6
The results will appear as follows:
gpg: key 7D8D0BF6: public key "Kali Linux Repository" imported
gpg: Total number processed: 1
gpg: imported: 1 (RSA: 1 )
You should verify that the key is installed correctly with the command:
gpg --fingerprint 7D8D0BF6
The result will be as follows:
pub rsa4096 2012 -03-05 [SC] [expires: 2021 -02-03]
44C6 513A 8E4F B3D3 0875 F758 ED44 4FF0 7D8D 0BF6
uid [full] Kali Linux Repository
sub rsa4096 2012 -03-05 [E] [expires: 2021 -02-03]
Once you have downloaded both SHA256SUMS and SHA256SUMS.gpg, you can verify the signature as follows:
$ gpg --verify SHA256SUMS.gpg SHA256SUMS
gpg: Signature made Autumn 16 Mar 08 : 45 : 45 2017 MDT using RSA key ID 7D8D0BF6
gpg: Good signature from "Kali Linux Repository"
- If you do not receive a " Good signature " message or if the lock ID does not match, then you should stop and review the download.Verification failed to show that the image may have been tampered with.
- If you have received a ' Good signature ' response, you can now rest assured that the checksum in the SHA256SUMS file is actually provided by the Kali Linux development team.All that remains to be done to complete verification is to verify that the signature you downloaded from ISO downloaded matches the signature in the SHA256SUMS file.You can do that on Linux or OS X with the following command (assuming that ISO is named "linux-linux-2016.2-amd64.iso" and is in the current directory):
grep potassium-linux- 2016.2 -amd64.iso SHA256SUMS | shasum -a 256 -c
If the image is successfully authenticated, the response will be as follows:
potassium-linux- 2016.2 -amd64.iso: OK
If you do not receive an ' OK ' response, stop and review the download because the Potassium image you downloaded seems to have been tampered with.Do not use it.
After downloading and verifying your image, you can proceed to create a USB drive that Kali Linux Live can boot.
See more:
- How to scan websites for potential security vulnerabilities with Vega on Kali Linux
- How to install Kali Linux on Android using Linux Deploy
- Kali Linux commands from AZ and commonly used commands
You should read it
- How to install Kali Linux on your computer
- How to create customized Potassium ISO
- How to install Kali Linux on macOS
- How to install Kali Linux reduced version
- Instructions for installing Kali Linux via Network PXE
- Instructions for installing Kali Linux on Windows 10 are easier than ever
- How to install Kali Linux dual boot on macOS
- How to install NVIDIA drivers on Kali Linux
- How to update Kali Linux and fix errors when updating
- Introducing Kali Linux operating system
- Learn Forensics Mode in Kali Linux
- How to install Kali Linux dual boot Windows
May be interested
How to update Kali Linux and fix errors when updating
How to mount the hard drive and partition using the Linux command line
Instructions on how to share data between Windows and Linux via LAN
How to delete the user and the machine name in the command prompt on Terminal
How to encrypt partitions on Linux with dm-crypt
6 reasons why the Linux operating system often fails