This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi – by the end of this guide you will have a Kali Raspberry Pi hacking tool with lots of tools ready for use!

Install Kali on the Raspberry Pi

Following my usual steps when installing anything to usb or sdcards, I recommend etcher – Using etcher gives you a repeatable, cross platform method of writing iso images to flash storage

Download the Kali image for the Raspberry Pi you have (I’ have a couple, but for this tutorial, I’ll be installing on the Raspberry Pi 2 Model B+)

Once etcher is downloaded and installed, and you have your Kali image, Open up etcher, select the Kali image and your SDCard, and flash!

raspberry pi hack tool kali
Kali on the Raspberry Pi
Raspberry Pi hacking
Kali on the Raspberry Pi

Boot Kali on the Raspberry Pi

Insert the SDCard into the Pi, connect some power and watch as you boot Kali on the Raspberry Pi.

IMPORTANT! Please change your SSH host keys as soon as possible as all ARM images are pre-configured the same keys. You should also change the root password to something more secure, especially if this machine will be publicly accessible!

Changing the SSH host keys can be accomplished by doing the following:

Login with the default username and password (root and toor). open a terminal and issue the following commands

passwd
rm /etc/ssh/ssh_host_*
dpkg-reconfigure openssh-server
service ssh restart

There are a few things that you should do after these basic steps:

Configure wifi (if you are using wired ethernet then it should already be working)

Update the Operating system

apt-get update
apt-get upgrade
apt-get dist-upgrade
Kali on the Raspberry Pi
Kali on the Raspberry Pi

At this point, you have a fully working Kali install on Raspberry Pi, you can now do anything you would do on a regular Kali install (remember though, that the raspberry pi wont be as powerful or as fast as a high end machine)

If you enjoyed this tutorial, please check out my metasploit tutorials below

Sources: