Kali Linux

Trace Labs Kali Linux Build Configuration

Trace Labs OSINT Distribution based on Kali Linux. It covers modifications to the default Kali repository, build steps using Docker or a Debian host, and includes a list of pre-installed applications tailored for OSINT investigations.

The following changes have been made to the default Kali git repo:

  • Creation of a folder for Tracelabs under the kali-config/variant-tracelabs/package-lists/kali-list.chroot path. The kali-list.chroot can be modified to add additional packages or remove pre-configured packages that are required as part of the build process.
  • Creation of the kali-config/common/hooks/normal/osint-packages.chroot file to include the installation steps for all the git repositories that have been included in the build, and do not already have a package. The osint-packages.chroot file can be modified to add additional git repositories or remove pre-configured git repositories that are required as part of the build process. Please add any pre-requisite packages to the kali-live/kali-config/variant-tracelabs/package-lists/kali-list.chroot file.
  • Creation of the following folders under the directory kali-config/common/includes.chroot/usr/share/
    • applications: linked to the menu for applications
    • backgrounds: default Tracelabs background
    • desktop-directories: desktop directories with tools
    • firefox-esr/distribution: default Firefox policy

Build Steps

Building The ISO File On Docker

You will need a host\vm with Docker-engine installed. Installation guide can be found. Once you have docker install, you just need to run:

docker build -t tlvm .
docker run --privileged -v $(pwd)/data:/data tlvm

Windows Powershell:

docker build -t tlvm .
docker run --privileged -v ${PWD}\data:/data tlvm

Windows CMD:

docker build -t tlvm .
docker run --privileged -v %cd%\data:/data tlvm

Once the docker container will finish running, you will be able to locate the ISO file inside a folder named “data” in the location you ran the commands. Now you can use the ISO file to install the tlosint vm.

Building The ISO File On Your Debian Host Or Debian VM

Setup

This build has only been tested on a pre-existing Kali environment, as recommended by Offensive Security.

git clone https://github.com/tracelabs/tlosint-live.git
cd tl-osint
sudo ./build_tracelabsiso_recipe.sh

If the build process is successful, a .iso file will be created in the /opt/live-build-config/images directory. The .iso file can be used for live boot or to install the Virtual Machine.

The .iso file can also be converted to a .ova file using the ovftool as outlined in the “Converting to an OVA“.

OVA Download

We have set up Version 1.0 of this build in an OVA for you to easily try out.

To get started, download the OVA file via the link below and run it in your choice of VM software (ie. VMware Workstation, Virtualbox etc.).

The default credentials to log in to the TL OSINT VM are osint:osint

Applications Included In The Build

Browsers

  • Firefox ESR
  • Tor Browser

Data Analysis

  • DumpsterDiver
  • Exifprobe
  • Exifscan
  • Stegosuite

Domains

  • Domainfy (OSRFramework)
  • Sublist3r

Downloaders

  • Browse Mirrored Websites
  • Metagoofil
  • Spiderpig
  • WebHTTrack Website Copier
  • Youtube-DL

Email

  • Buster
  • Checkfy (OSRFramework)
  • Infoga
  • Mailfy (OSRFramework)
  • theHarvester
  • h8mail

Frameworks

  • Little Brother
  • OSRFramework
  • sn0int
  • Spiderfoot
  • Maltego
  • OnionSearch

Phone Numbers

  • Phonefy (OSRFramework)
  • PhoneInfoga

Social Media

  • Instaloader
  • Twint
  • Searchfy (OSRFramework)
  • Tiktok Scraper
  • Twayback

Usernames

  • Alias Generator (OSRFramework)
  • Sherlock
  • Usufy (OSRFramework)

**Other tools

  • Photon
  • Sherlock
  • Shodan
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

11 hours ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

4 days ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

4 days ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

5 days ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 month ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 month ago