Skip to content
Related Articles

Related Articles

Creating an Encrypted Persistent Live Kali USB

View Discussion
Improve Article
Save Article
  • Difficulty Level : Basic
  • Last Updated : 21 Jul, 2022
View Discussion
Improve Article
Save Article

The term “Live USB Persistence” refers to the fact that the files and data that we create in USB as a result of our work there, they are stored on the USB drive rather than the Hard drive, and by using Encryption in the Live USB, the Stored Data will be encrypted. As of this, we don’t need to create any partitions on our hard drive in order to boot into Kali Linux, unlike in dual booting systems.

Advantages of Live USB Persistence:

  • It’s Portable.
  • Easy to test new tools and distros.
  • Saves your work on USB in an encrypted form.

Steps to Create a Kali Live Persistent USB:

Step 1: Navigate to the Kali download page in your Browser and Download Kali Linux live Installer as of your system architecture and needs. 

Kali Live System Download Page

 

Step 2: Now to Flash Kali Image in USB, we require a tool i.e., Rufus. Navigate to the link and download it.

Step 3: Insert your USB into the USB port and Open Rufus Software.

Step 4: Select your USB device in Rufus.

Drive Properties

 

Step 5: Select the Downloaded Kali Linux live Installer Image by Clicking on Select in Boot Selection.

 

Step 6: Now select the Persistent Partition Size as of your USB size.

 

Step 7: Then press the Start button. You will be informed that all data on the USB will be deleted; if you agree, click OK.

Note: Your USB will now be formatted and flashed with Kali Linux live. 

Step 8: Shut down your computer, then turn it back on, then go to the Boot Menu and choose Kali.

Step 9: When the Kali Boot menu loads, select Live system with USB Encrypted persistence. It will start Kali for the first time without requesting that you create a password or login system.

Selecting Mode for Kali live system

 

Step 10: When Kali loads the desktop, open the terminal with root permission.

Step 11: Check for your USB block for further process by lsblk command. In my case, it’s in the third block, i.e. /dev/sdc2.

Storage Blocks

 

Step 12: We’re going to use LUKs Encryption to encrypt the USB. Commands listed below.

  • cryptsetup –verbose –verify-passphrase luksFormat /dev/sdc2. 
  • cryptsetup luksOpen /dev/sdb3 kali_usb

whereas cryptsetup is used to conveniently set up dm-crypt managed device-mapper mappings; first flag –verbose print messages for current action; the other flag –verify-passphrase asks you to enter your password twice; luks is an extension of cryptsetup for disk encryption and the last argument is the USB Block. Keep in mind the password you choose.

Step 13: Now we need to create an ext4 file system, namely “persistence”.

mkfs.ext4 -L persistence /dev/mapper/kali_usb
e2label /dev/mapper/kali_usb persistence

Step 14: To mount our encrypted disc, we must first build a mount point, after which we will create a persistence.conf file and unmount the encrypted partition. See the commands below for the desired.

mkdir -p /mnt/kali_usb/
mount /dev/mapper/kali_usb /mnt/kali_usb
echo “/ union” > /mnt/kali_usb/persistence.conf
umount /dev/mapper/kali_usb

Step 15: The channel to our encrypted persistent partition needs to be shut off last now.

cryptsetup luksClose /dev/mapper/kali_usb

Step 16: Now our USB is ready to boot with Encrypted Persistence Storage. Shut down the computer, start it again and enter to boot menu, and select Kali.

Step 17: Now from the Kali Boot menu, select Live system with USB Encrypted persistence.

Step 18: Due to encryption, it will go slow. At the initial time, it will ask for the password that we created, Enter the password, and it will take you to the Desktop if the password is correct.

Disk Unlocking

 

My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!