10. Advanced Usage
Kali Linux is a highly customizable penetration testing platform, allowing modifications at multiple levels.
1. Source Code Customization
All package sources are publicly available for retrieval, modification, and rebuilding.
Special attention is given to Linux Kernel customization, which involves retrieving sources, configuring the build, and compiling the kernel.
2. Custom Live ISO
The live-build tool allows customization of ISO images, including replacing default packages with custom Debian packages.
3. Persistent Live USB
A persistent USB setup retains files and system changes across reboots, making it portable and flexible.
These customization options make Kali a powerful tool for security professionals.
10.1. Modifying Kali Packages
Modifying Kali packages is typically done by contributors and developers to update versions, tweak configurations, or fix bugs. However, there are cases where users might need to modify a package to meet specific needs. Understanding how to do this can be highly valuable.
Why Modify a Package Instead of Running from Source?
Running a modified version directly from the source (via Git) works in some cases, especially when changes are confined to the user's home directory.
However, system-wide installations using
make install
can clutter the filesystem with unmanaged files, leading to dependency issues.Properly packaging modifications allows for easier sharing, deployment across multiple machines, and clean reversion if needed.
When Would You Need to Modify a Package?
Some real-world scenarios where modifying a package is useful:
Updating a package before official release: If a new version of Social-Engineer Toolkit (SET) is available but Kali developers are unavailable, you can update the package yourself.
Debugging issues: When troubleshooting MIFARE NFC card issues, rebuilding
libfreefare
with debug messages enabled helps gather actionable data for bug reports.Applying fixes from upstream repositories: If Pyrit fails with an error, and you find a fix in its GitHub repository, you can rebuild the package with the patch applied.
General Process for Modifying a Package
Regardless of the modification, the process remains the same:
Retrieve the source package.
Extract its contents.
Make the necessary changes.
Rebuild the package.
There are multiple tools available for each step, and while the most relevant ones are discussed, the exact approach may vary depending on the situation. If issues arise, troubleshooting through appropriate forums or documentation is recommended.
10.1.1. Getting the Sources
Rebuilding a Kali package begins with obtaining its source code. A source package consists of multiple files, with the most critical being the .dsc (Debian Source Control) file. This file lists other necessary components such as .tar.{gz,bz2,xz}
and sometimes .diff.gz
or .debian.tar.{gz,bz2,xz}
files.
Retrieving Source Packages from Kali Mirrors
Kali source packages are stored on publicly accessible mirrors.
The easiest way to download them is by using the command:
This requires adding a
deb-src
line to/etc/apt/sources.list
and updating the package index withapt update
.
For example, running:
retrieves the package and extracts its contents, creating a directory (libfreefare-0.4.0
) containing both the package source files and a debian/
folder with packaging metadata.
Downloading Specific Versions
If a required version is unavailable in the repositories, it can be downloaded manually using dget:
This fetches the .dsc
file and all referenced files, allowing manual extraction using:
If the signature check fails, extraction can be forced with the --allow-unauthenticated
or -u
option.
Retrieving Sources from Git
Some packages are maintained in Git repositories, either on Debian's infrastructure or Kali’s GitLab (
gitlab.com/kalilinux/packages
).To clone a Kali package repository:
Unlike
apt source
, Git repositories do not have patches applied automatically. Check thedebian/patches/
directory for applied modifications.
By obtaining sources through apt source
, dget
, or Git, users can modify and rebuild packages to suit their needs.
10.1.2. Installing Build Dependencies
Once the source package is obtained, the next step is installing its build dependencies. These dependencies are required to compile the package and are often necessary for testing partial builds while making modifications.
Identifying Build Dependencies
Each source package lists its required dependencies in the Build-Depends field of the
debian/control
file.The easiest way to install them is using:
This command reads the
Build-Depends
field and installs all necessary packages.
10.1.3. Making Changes
Modifying a Package
Before rebuilding a package, you should change the version number to differentiate it from the official versions. This is done using dch
(Debian Changelog) from the devscripts
package:
This opens the debian/changelog
file in an editor, where you document the changes.
Example:
To avoid manually entering your name/email each time, set:
Applying a Patch
If you need to patch a package, do the following:
Download and unpack the source:
Download and apply the patch:
If the package uses the
3.0 (quilt)
format, register the patch:You'll be prompted to name the patch, e.g.,
fix-bug.patch
, which gets stored indebian/patches/
.Verify:
For Git-based packaging, tools like git-buildpackage
(gbp pq
) or git-dpm
manage patches differently.
Tweaking Build Options
Modify debian/rules
to adjust build options. For example, enabling debug mode in libfreefare
:
If dh
is used, overrides may be needed for dh_auto_configure
or dh_auto_build
.
Packaging a New Upstream Version
To package a new version (e.g., updating SET
from 7.4.4
to 7.4.5
):
Download and extract the new source:
Copy over Debian packaging files:
Update the changelog:
At this point, you can build the updated package.
10.1.4. Starting the Build
Once all necessary changes have been applied to the source package, you can proceed with building the actual .deb
binary package.
1. Building the .deb
Package
.deb
PackageUse the dpkg-buildpackage
command to generate the .deb
files:
-us
: Skips signing the source package (.dsc
) file.-uc
: Skips signing the.changes
file.-b
: Performs a binary-only build (no source package is created).
This process will generate multiple .deb
files in the parent directory of the source package.
Example output:
2. Installing the Newly Built Package
After building the package, install it using apt install
(preferred over dpkg -i
because it handles dependencies better):
If apt
refuses due to missing dependencies, you can try:
or
Alternatively, you can install the package using dpkg -i
:
If dpkg -i
fails due to missing dependencies, resolve them with:
3. Using debuild
for a More Thorough Build
debuild
for a More Thorough BuildDebian developers often use debuild
, which wraps around dpkg-buildpackage
and performs additional checks:
This command:
Runs
dpkg-buildpackage
normally.Uses
lintian
to check the package for policy violations.Cleans the build environment to prevent local settings from affecting the build.
10.2. Recompiling the Linux Kernel
Kali Linux provides a fully featured kernel with the widest hardware support possible. However, some users may prefer to recompile the kernel to optimize performance, reduce memory usage, or apply custom patches.
Reasons for Recompiling the Kernel
Performance Optimization
The default kernel includes many drivers and features, which take up physical memory even if they are never used.
Removing unused modules can reduce memory consumption and improve system performance.
Security Hardening
Fewer features and drivers mean a smaller attack surface for potential vulnerabilities.
A minimal custom kernel reduces the risk of kernel exploits affecting your system.
Custom Features and Patches
Some kernel features or patches are not included in the standard Kali kernel (e.g., custom security modules, experimental features).
A custom kernel allows fine-tuned control over its behavior.
⚠️ Important Warning
Security Updates Responsibility:
When you compile your own kernel, you are responsible for keeping it up to date.
Kali cannot provide security updates for custom-compiled kernels.
Alternative:
If you want a secure and maintained system, it's best to use the official Kali kernel instead of a custom one.
10.2.1. Introduction and Prerequisites
Debian and Kali manage the kernel as a package rather than the traditional method of compiling and installing kernels manually. This approach keeps the kernel under the control of the packaging system, allowing for easy removal and deployment across multiple machines.
The associated package scripts handle interactions with the bootloader and the initrd generator automatically.
The upstream Linux sources include everything needed to build a Debian kernel package. However, additional packages must be installed to ensure a successful build.
The
build-essential
package provides the necessary compilation tools.The
libncurses5-dev
package is required for the kernel configuration step.The
fakeroot
package allows the creation of the Debian package without requiring administrative privileges.
To install these dependencies, use the following command:
10.2.2. Getting the Sources
The Linux kernel sources are available as a package and can be retrieved by installing the linux-source-version package. To list the latest kernel version packaged by Kali, use:
The source code in these packages differs slightly from the versions published by Linus Torvalds and the kernel developers. Debian and Kali apply various patches, including:
Backported fixes, features, and drivers from newer kernel versions.
New features not yet merged into the upstream Linux tree.
Debian or Kali-specific modifications.
The section focuses on Linux kernel 4.9, but the same process can be adapted for other versions.
To install the linux-source-4.9 package, run:
The installation also includes bc and libreadline7, with suggested packages like libncurses-dev and libqt4-dev.
After installation, check the source package location:
This lists files such as:
linux-config-4.9
linux-patch-4.9-rt.patch.xz
linux-source-4.9.tar.xz
(a compressed archive of the kernel sources)
The kernel sources should be extracted into a new directory (not directly under
/usr/src/
, as no special permissions are required). Instead, create and navigate to a directory like~/kernel/
:
10.2.3. Configuring the Kernel
Configuring the kernel is the next step, and the process depends on specific goals.
The kernel build relies on a kernel configuration file. Typically, it's best to stay as close as possible to Kali's default configuration, which is stored in the
/boot
directory.To copy the current configuration file:
Find the kernel version using:
Copy the configuration file to the kernel source directory:
Alternatively, default kernel configurations are available in
arch/arch/configs/*_defconfig
. Use:make x86_64_defconfig
for 64-bit PCsmake i386_defconfig
for 32-bit PCs
If no changes are needed, you can skip to compiling and building the package. However, if you want to modify or fully reconfigure the kernel, use one of the available configuration interfaces:
Text-mode interface:
Requires the libncurses5-dev package.
Provides a hierarchical menu to navigate kernel options.
Use arrow keys to move, Space to toggle options, and Enter to confirm selections.
Exit saves changes if confirmed.
Graphical interfaces:
make xconfig
(requires libqt4-dev) – Qt-based GUImake gconfig
(requires libglade2-dev and libgtk2.0-dev) – GTK+ GUI
Dealing with Outdated .config
Files
.config
FilesIf using a
.config
file from an older kernel version, it must be updated:make oldconfig
– Interactively prompts for new configuration options.make olddefconfig
– Automatically selects default answers for new options.make oldnoconfig
– Automatically selects "no" for all new options.
10.2.4. Compiling and Building the Package
Before rebuilding the kernel, it's important to clean up previous compilations:
make clean
removes compiled files but keeps configuration files.make distclean
removes even more generated files, including.config
. Backup.config
before using this command.
Once the kernel configuration is finalized, use
make deb-pkg
to generate Debian packages in.deb
format. This command creates up to five packages:linux-image-version
– Contains the kernel image and modules.linux-headers-version
– Provides header files for building external modules.linux-firmware-image-version
– Contains firmware files for certain drivers (may be missing when using Debian/Kali sources).linux-image-version-dbg
– Includes debugging symbols for the kernel and modules.linux-libc-dev
– Provides headers for user-space libraries like glibc.
The kernel version is defined using variables from the Makefile (
VERSION
,PATCHLEVEL
,SUBLEVEL
,EXTRAVERSION
), along withLOCALVERSION
andLOCALVERSION
environment variables. The package version follows the same version string but includes a revision number stored in.version
(unless overridden withKDEB_PKGVERSION
).Example command to build the kernel package:
After building, check for generated
.deb
files:Example output:
To install the compiled kernel, use
dpkg -i
:The
linux-image
package is mandatory.The
linux-headers
package is needed only if you need to build external modules (e.g., if you have*-dkms
packages installed).The other packages are optional unless explicitly required. To check for installed
*-dkms
packages, run:
10.3. Building Custom Kali Live ISO Images
Kali Linux provides extensive functionality and flexibility out of the box, allowing users to perform advanced tasks with the right knowledge and practice.
Customization is possible to tailor a Kali build with specific files or packages, scaling performance and features as needed. Custom builds can also automate certain functions.
Examples of custom Kali builds include:
Kali ISO of Doom – A highly customized live Kali ISO.
Kali Evil Wireless Access Point – A specialized Kali build for penetration testing wireless networks.
Rolling a custom Kali ISO image involves using live-build, a script suite that automates and customizes every aspect of ISO creation.
Live-build setup:
It relies on a structured directory as input for configuration.
The live-build-config Git repository stores configurations and helper scripts, serving as the foundation for building customized Kali images.
Important Note:
These commands must be executed on an up-to-date Kali Linux system.
Running them on a non-Kali system or an outdated Kali installation will likely result in failures.
10.3.1. Installing Pre-Requisites
The first step in creating a custom Kali ISO is to install the required packages and retrieve the Kali live-build configuration from Git.
Install the necessary packages:
Clone the live-build configuration repository:
Navigate to the cloned directory and list its contents:
Example output:
At this point, an updated but unmodified Kali live ISO can be created by running:
The process takes a long time since it downloads all necessary packages.
Once completed, the new ISO image will be available in the
images
directory.
10.3.2. Building Live Images with Different Desktop Environments
The
build.sh
script is a wrapper for live-build, responsible for setting up theconfig
directory that live-build requires.It applies different configurations based on the
--variant
option.The config directory is created by merging files from:
kali-config/common
(shared configuration).kali-config/variant-X
(whereX
is the specified variant).
If no
--variant
option is provided, the default variant is used.The
kali-config
directory includes configurations for different desktop environments:e17
– Enlightenmentgnome
– GNOMEi3wm
– i3 Window Managerkde
– KDElxde
– LXDEmate
– MATE Desktopxfce
– Xfce
To build a Kali live ISO with KDE, run:
Further customization:
The variant system enables predefined customizations.
Advanced modifications can be made by editing files in
kali-config
subdirectories.Reading the Debian Live System Manual provides deeper insights into custom image configurations.
The following sections will cover specific examples of customization.
10.3.3. Changing the Set of Installed Packages
Package Lists (
package-lists/*.list.chroot
)The default configuration uses
package-lists/kali.list.chroot
, which includes thekali-linux-default
metapackage.To customize your build, you can:
Comment out
kali-linux-default
and select a different metapackage.Manually specify individual packages instead of relying on a metapackage.
Use a mix—start with a metapackage and add additional packages.
Adding Custom Packages (
packages.chroot/
)Only packages available in the official Kali repository can be included in
package-lists/*.list.chroot
.If you have custom
.deb
files, place them in:Example: For a GNOME variant, store
.deb
files in:
Using Kali Metapackages for Custom Builds
Metapackages are empty packages that install multiple related tools via dependencies. This makes it easy to install predefined toolsets.
Core System Metapackages
kali-linux-core
Base system (included in all other metapackages).
kali-linux-headless
Command-line tools only (no GUI).
kali-linux-default
Standard Kali installation (CLI + GUI).
kali-linux-large
Includes extra tools beyond the default.
kali-linux-everything
All Kali tools (~50GB+).
Specialized Toolset Metapackages
kali-tools-top10
The 10 most popular penetration testing tools.
kali-tools-web
Web app penetration testing tools.
kali-tools-passwords
Password cracking tools.
kali-tools-wireless
WiFi, Bluetooth, RFID, and SDR security tools.
kali-tools-forensics
Digital forensics and incident response tools.
kali-tools-802-11
Wireless security assessment tools.
kali-tools-bluetooth
Bluetooth security tools.
kali-tools-crypto-stego
Cryptography & steganography tools.
kali-tools-crypto-fuzzing
Fuzzing attack tools.
kali-tools-gpu
Tools leveraging GPU acceleration.
kali-tools-hardware
Hardware hacking tools.
kali-tools-rfid
RFID security tools.
kali-tools-sdr
Software Defined Radio (SDR) tools.
kali-tools-voip
Voice-over-IP (VoIP) assessment tools.
kali-tools-windows-resources
Precompiled Windows binaries for pentesting.
Full List of Metapackages: 🔗 https://tools.kali.org/kali-metapackages
Debconf Preseeding (Automated Package Configuration)
Preseeding allows you to configure package settings automatically before installation.
Preseed files should be placed in:
This helps automate user input (e.g., setting passwords, enabling features, disabling prompts).
Example: Custom Kali ISO with Wireless Tools and Preseed Configuration
Clone the Kali live-build repository:
Modify the package list (
package-lists/kali.list.chroot
):Add custom
.deb
packages:Create a preseed configuration (
preseed/custom.cfg
):Build the custom ISO:
10.3.4. Using Hooks to Tweak the Contents of the Image
Live-build Hooks: These are scripts that execute at different stages of the build process.
Chroot Hooks:
Placed in
hooks/live/*.chroot
.Execute inside the chroot environment during the build process.
Chroot temporarily changes the root directory to an alternate filesystem tree.
Since applications in chroot cannot access files outside, chroot hooks are limited to modifying the chroot environment.
Kali Linux uses chroot hooks for various customizations (e.g.,
kali-config/common/hooks/live/kali-hacks.chroot
).
The Binary Hooks execute later in the build process. They run in the build environment rather than in a chrooted environment. These scripts:
Are located in
hooks/live/*.binary
.Execute at the end of the build process.
Modify the ISO image but not the live filesystem since it is already built.
In Kali Linux, binary hooks adjust the
isolinux
configuration.Example:
kali-config/common/hooks/live/persistence.binary
adds boot menu entries for persistence.
10.3.5. Adding Files in the ISO Image or in the Live Filesystem
Adding Files to the Live File System:
Files should be placed in
includes.chroot
at their intended locations.Example:
kali-config/common/includes.chroot/usr/lib/live/config/0031-kali-password
appears as/usr/lib/live/config/0031-kali-password
in the live file system.
Live-Boot Hooks:
Stored in
/lib/live/config/XXXX-name
.Executed by the
init
script of thelive-boot
package.Modify system behavior at runtime to suit a live environment.
Can be used to implement custom boot parameters.
Adding Files to the ISO Image:
Files should be placed in
includes.binary
at their intended locations.Example:
kali-config/common/includes.binary/isolinux/splash.png
replaces/isolinux/splash.png
in the ISO filesystem, changing the Isolinux bootloader background.
10.4.1. The Persistence Feature: Explanations
Persistence Feature Overview:
A live system is ephemeral—data and changes are lost after reboot.
Persistence allows saving data across reboots using the
persistence
boot parameter.
Enabling Persistence:
Kali live images include two default boot menu entries:
Live USB Persistence
Live USB Encrypted Persistence
How Persistence Works:
live-boot
scans all partitions for filesystems labeled persistence.The label can be changed using the
persistence-label=value
boot parameter.Persistence is configured using a persistence.conf file on the partition.
Each line in persistence.conf specifies a directory to be made persistent.
The special value "/ union" enables full persistence using a union mount, which stores only changes compared to the underlying filesystem.
The data of persisted directories is saved in the filesystem containing the persistence.conf file.
10.4.2. Setting Up Unencrypted Persistence on a USB Key
Prerequisites:
A Kali live USB prepared following the instructions.
A USB key large enough (at least 4GB for the ISO and persistent data).
The USB key is detected as
/dev/sdb
and contains two partitions (/dev/sdb1
and/dev/sdb2
).Caution: Re-partitioning the wrong drive can result in data loss.
Creating a New Partition for Persistence:
Determine the size of the ISO image:
Example output:
Size of image is 3518 MB
.Create a new partition after the live image:
Verify the partition:
The new partition (
/dev/sdb3
) should now be available.
Formatting and Configuring Persistence:
Format the new partition with an ext4 filesystem labeled
persistence
:Mount the partition and create the
persistence.conf
file:Example output:
Unmount the partition:
Booting with Persistence:
The USB key is now ready for use.
Boot using the "Live USB Persistence" menu entry.
10.4.3. Setting Up Encrypted Persistence on a USB Key
Encrypted Persistence Overview:
live-boot
supports persistence on encrypted partitions.Data is protected using a LUKS encrypted partition.
The initial steps (partition creation) are the same as non-encrypted persistence.
Instead of formatting with
ext4
, the partition is initialized as a LUKS container.A virtual partition is created by
cryptsetup
under/dev/mapper/
, which represents the decrypted content.
Steps to Set Up Encrypted Persistence:
Initialize the LUKS container:
Warning: This overwrites all data on
/dev/sdb3
.Enter and confirm the passphrase.
Open the encrypted partition:
Decrypted partition is now available as
/dev/mapper/kali_persistence
.
Format the decrypted partition with ext4:
Create and configure persistence.conf:
Close the encrypted container:
Booting with Encrypted Persistence:
Use the "Live USB Encrypted Persistence" boot menu entry.
You will be prompted for the passphrase to unlock the encrypted persistence.
10.4.4. Using Multiple Persistence Stores
Multiple Persistence Filesystems
Use-case: Different persistence setups for different needs.
Solution: Use multiple persistence filesystems with different labels and specify which one to use with
persistence-label=label
.
Example Scenario
A pen-tester needs:
An encrypted persistence partition for work data ("work")
An unencrypted persistence partition for demo materials ("demo")
A custom Kali live image is built with dedicated boot menu entries.
Customizing Boot Menu
Modify
kali-config/common/hooks/live/persistence-menu.binary
:This creates two boot menu entries:
Live USB with Demo Data (unencrypted)
Live USB with Work Data (encrypted)
Creating the Partitions
Step 1: Partition the USB drive (assume
/dev/sdb
and ISO size = 3000 MB)Step 2: Setup the unencrypted "demo" partition
Step 3: Setup the encrypted "work" partition
Final Result:
On boot, you can select "Live USB with Demo Data" for the unencrypted setup.
Select "Live USB with Work Data" for the encrypted persistence setup.
Adding a Nuke Password for Extra Safety
Purpose: Securely erase encrypted data in case of emergency.
How It Works: Enter a nuke password instead of the real one, and it will delete all encryption keys, making data irrecoverable.
Setup (after installing
cryptsetup-nuke-password
package):Important: Backup encryption keys before using the nuke feature.
More Info: Kali Linux Nuke Password Guide
10.5. Summary
Modifying Kali Packages (10.5.1)
Overview:
Modifying Kali packages is often done by Kali contributors, but you may need to build custom packages for specific use cases or deployment needs.
The process involves downloading source packages, making modifications, and rebuilding the package.
Steps for Modifying a Package:
Obtain Source Package:
Use
apt source source-package-name
ordget
(for direct.dsc
downloads) to get the package source.For Kali-specific packages, use Git:
Install Build Dependencies:
Run
sudo apt build-dep ./
to install the necessary dependencies.
Make Modifications:
Update the version with
dch --local version-identifier
.Apply patches using
patch
or modify quilt's patch series.Tweak build options in the
debian/rules
file.
Build the Package:
Run
dpkg-buildpackage -us -uc -b
from the source directory to build the package.Install it with
dpkg -i package-name_version_arch.deb
.
Recompiling the Kali Kernel (10.5.2)
Overview:
Recompiling the Kali kernel is an advanced task, often done to add custom features, non-standard drivers, or patches.
Kernel modifications can destabilize your system, and Kali won't ensure security updates for custom kernels.
Steps for Recompiling the Kernel:
Install Required Packages:
Download Kernel Source:
List available kernel versions with
apt-cache search ^linux-source
.Install the desired kernel source:
Extract the Source:
Extract the kernel source using
tar -xaf
.
Configure the Kernel:
For a standard configuration, copy Kali’s config file:
Use
make menuconfig
for configuration options.
Compile the Kernel:
Clean previous builds with
make clean
.Build the Debian packages with
make deb-pkg
.
Install the Kernel:
Install the kernel with
dpkg -i linux-image-version.deb
.
Building Custom Kali Live ISO Images (10.5.3)
Overview:
Kali Live ISOs are built using live-build, a set of scripts for customizing and automating the ISO creation process.
Customization can include adding/removing packages, adding files, or running scripts during boot or chroot setup.
Steps for Building a Custom ISO:
Install Required Tools:
Clone the Live-build Configuration:
Build the ISO:
To build the ISO:
For a specific variant (e.g., Xfce), use:
Customize the ISO:
Add/Remove Packages: Modify files in
package-lists/*.list.chroot
.Include Custom Packages: Place
.deb
files inpackages.chroot
.Add Files: Place files in
includes.chroot
to copy to the live filesystem.Add Scripts:
Run scripts during chroot setup with
hooks/live/*.chroot
.Run scripts at boot by placing them in
/usr/lib/live/config/XXXX-name
.
Encrypted and Unencrypted Persistence:
Use live-build to set up both encrypted and unencrypted persistence on a USB key.
Hacker's Mantra:
Every lock has a key. The trick is knowing where to find it. -- Gabriella Coleman
Last updated
Was this helpful?