AttackVector Linux is a new distribution for anonymized penetration and security.
It is based on Kali and TAILS, which are both based on Debian.
Yin and Yang
While Kali requires a modified kernel for network drivers to use injection and so forth,
TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor.
The intention of AttackVector Linux is to provide the capability to anonymize attacks
while warning the user when he or she takes actions that may compromize anonymity.
The two projects have different design philosophies that can directly conflict with one another.
In spite of this, the goal of AttackVector Linux is to integrate them complementarily into one OS.
[ distro / build / kali_coms.txt ]
Install prerequisites in Kali:
~~~~~~
apt-get install git live-build cdebootstrap kali-archive-keyring
cd /tmp
git clone git://git.kali.org/live-build-config.git
apt-get remove libdebian-installer4
apt-get install libdebian-installer4
~~~~~~
Copy down git repo [ distro / kali / config ]
~~~~~~
git clone git://git.code.sf.net/p/attackvector/code attackvector-code
cp attackvector-code/distro/kali/config /tmp/live-build-config/config
cd /tmp/live-build-config
~~~~~~
Live build:
~~~~~~
lb clean --purge
dpkg --add-architecture amd64
lb config --architecture amd64 --mirror-binary http://http.kali.org/kali --mirror-binary-security http://security.kali.org/kali-security --apt-options "--force-yes --yes"
lb build
~~~~~~
(Notice the similarity to Kali Live-Build.)
MD5 (attackvector-linux-0.0.1alpha-64bit.torrent) = 5efeee92d4e7bf391f4bb406eb00b53c
mirror BitBucket
MD5 (attackvector-linux-0.0.1alpha-64bit.iso) = 359e2147206a5275ec46a7c997d66f8c
It seems our best structural approach is customizing the Kali Live Build scripts.
Eventually this Kali derivative should meet the TAILS design specifications.
Text under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Code under GNU Public License. © Kenneth Soona 2013