Trace Labs OSINT Distribution based on Kali Linux. It covers modifications to the default Kali repository, build steps using Docker or a Debian host, and includes a list of pre-installed applications tailored for OSINT investigations.
The following changes have been made to the default Kali git repo:
kali-config/variant-tracelabs/package-lists/kali-list.chroot
path. The kali-list.chroot
can be modified to add additional packages or remove pre-configured packages that are required as part of the build process.kali-config/common/hooks/normal/osint-packages.chroot
file to include the installation steps for all the git repositories that have been included in the build, and do not already have a package. The osint-packages.chroot
file can be modified to add additional git repositories or remove pre-configured git repositories that are required as part of the build process. Please add any pre-requisite packages to the kali-live/kali-config/variant-tracelabs/package-lists/kali-list.chroot
file.kali-config/common/includes.chroot/usr/share/
applications
: linked to the menu for applicationsbackgrounds
: default Tracelabs backgrounddesktop-directories
: desktop directories with toolsfirefox-esr/distribution
: default Firefox policyYou will need a host\vm with Docker-engine installed. Installation guide can be found. Once you have docker install, you just need to run:
docker build -t tlvm .
docker run --privileged -v $(pwd)/data:/data tlvm
Windows Powershell:
docker build -t tlvm .
docker run --privileged -v ${PWD}\data:/data tlvm
Windows CMD:
docker build -t tlvm .
docker run --privileged -v %cd%\data:/data tlvm
Once the docker container will finish running, you will be able to locate the ISO file inside a folder named “data” in the location you ran the commands. Now you can use the ISO file to install the tlosint vm.
This build has only been tested on a pre-existing Kali environment, as recommended by Offensive Security.
git clone https://github.com/tracelabs/tlosint-live.git
cd tl-osint
sudo ./build_tracelabsiso_recipe.sh
If the build process is successful, a .iso file will be created in the /opt/live-build-config/images
directory. The .iso file can be used for live boot or to install the Virtual Machine.
The .iso file can also be converted to a .ova file using the ovftool
as outlined in the “Converting to an OVA“.
We have set up Version 1.0 of this build in an OVA for you to easily try out.
To get started, download the OVA file via the link below and run it in your choice of VM software (ie. VMware Workstation, Virtualbox etc.).
The default credentials to log in to the TL OSINT VM are osint:osint
Browsers
Data Analysis
Domains
Downloaders
Frameworks
Phone Numbers
Social Media
Usernames
**Other tools
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…