Kali Linux

Trace Labs Kali Linux Build Configuration

Trace Labs OSINT Distribution based on Kali Linux. It covers modifications to the default Kali repository, build steps using Docker or a Debian host, and includes a list of pre-installed applications tailored for OSINT investigations.

The following changes have been made to the default Kali git repo:

  • Creation of a folder for Tracelabs under the kali-config/variant-tracelabs/package-lists/kali-list.chroot path. The kali-list.chroot can be modified to add additional packages or remove pre-configured packages that are required as part of the build process.
  • Creation of the kali-config/common/hooks/normal/osint-packages.chroot file to include the installation steps for all the git repositories that have been included in the build, and do not already have a package. The osint-packages.chroot file can be modified to add additional git repositories or remove pre-configured git repositories that are required as part of the build process. Please add any pre-requisite packages to the kali-live/kali-config/variant-tracelabs/package-lists/kali-list.chroot file.
  • Creation of the following folders under the directory kali-config/common/includes.chroot/usr/share/
    • applications: linked to the menu for applications
    • backgrounds: default Tracelabs background
    • desktop-directories: desktop directories with tools
    • firefox-esr/distribution: default Firefox policy

Build Steps

Building The ISO File On Docker

You will need a host\vm with Docker-engine installed. Installation guide can be found. Once you have docker install, you just need to run:

docker build -t tlvm .
docker run --privileged -v $(pwd)/data:/data tlvm

Windows Powershell:

docker build -t tlvm .
docker run --privileged -v ${PWD}\data:/data tlvm

Windows CMD:

docker build -t tlvm .
docker run --privileged -v %cd%\data:/data tlvm

Once the docker container will finish running, you will be able to locate the ISO file inside a folder named “data” in the location you ran the commands. Now you can use the ISO file to install the tlosint vm.

Building The ISO File On Your Debian Host Or Debian VM

Setup

This build has only been tested on a pre-existing Kali environment, as recommended by Offensive Security.

git clone https://github.com/tracelabs/tlosint-live.git
cd tl-osint
sudo ./build_tracelabsiso_recipe.sh

If the build process is successful, a .iso file will be created in the /opt/live-build-config/images directory. The .iso file can be used for live boot or to install the Virtual Machine.

The .iso file can also be converted to a .ova file using the ovftool as outlined in the “Converting to an OVA“.

OVA Download

We have set up Version 1.0 of this build in an OVA for you to easily try out.

To get started, download the OVA file via the link below and run it in your choice of VM software (ie. VMware Workstation, Virtualbox etc.).

The default credentials to log in to the TL OSINT VM are osint:osint

Applications Included In The Build

Browsers

  • Firefox ESR
  • Tor Browser

Data Analysis

  • DumpsterDiver
  • Exifprobe
  • Exifscan
  • Stegosuite

Domains

  • Domainfy (OSRFramework)
  • Sublist3r

Downloaders

  • Browse Mirrored Websites
  • Metagoofil
  • Spiderpig
  • WebHTTrack Website Copier
  • Youtube-DL

Email

  • Buster
  • Checkfy (OSRFramework)
  • Infoga
  • Mailfy (OSRFramework)
  • theHarvester
  • h8mail

Frameworks

  • Little Brother
  • OSRFramework
  • sn0int
  • Spiderfoot
  • Maltego
  • OnionSearch

Phone Numbers

  • Phonefy (OSRFramework)
  • PhoneInfoga

Social Media

  • Instaloader
  • Twint
  • Searchfy (OSRFramework)
  • Tiktok Scraper
  • Twayback

Usernames

  • Alias Generator (OSRFramework)
  • Sherlock
  • Usufy (OSRFramework)

**Other tools

  • Photon
  • Sherlock
  • Shodan
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

3 weeks ago