The forum already has a similar article, but I decided to bring the topic to a separate one due to the availability of an alternative image and option for installing the system.

A single board computer is convenient because it can be used as a separate independent platform for learning penetration testing with Kali Linux. Why choose Raspberry Pi? Good community support. We will see this later, when we proceed to install Kali on the device. It is natural to use Kali not necessarily, there are many other operating systems that are designed for use on Raspberry Pi single-board cards.

The B + model has a new wireless module that supports 5 GHz WiFi. For this module, developers from Germany (Secure Mobile Networking Lab), who are engaged in a project widely known in narrow circles
If you use Raspberry Pi 3 B + to audit the security of wireless networks, you will need one or two external adapters. I would recommend using Alfa 036 NHA , Alfa 036 ACH or Alfa 036 NH .

We proceed directly to the installation. Installation instructions I made for Windows.

1. First you need to install some software package
Etcher https://www.balena.io/etcher/
Win32DiskImager https://sourceforge.net/projects/win32diskimager/
Putty https://www.putty.org/
VNC Viewer https://www.realvnc.com/en/connect/download/viewer/
2. Now back to what I said earlier about community support.

Thanks to the core from
(builds based on it worked with the Raspberry Pi 3 Model B + even before the official release was available on Offensive Security). Improved network hardware specifications and performance can be used with penetration testing tools offered by Kali Linux. This core also includes:
N
  • exmon support
  • fix bluetooth issues
  • native support optimization of module compilation
  • support for connecting via SSH via USB (using a USB / Ethernet adapter)
  • It has support for working with tft displays and a script that allows you to configure automatic login
  • Integrated driver support for translating the TL-WN722N v2 adapter into monitor mode (RTL8188EU chipset).
  • integrated driver support for the Alfa 036 ACH adapter (monitor, injection, etc.).
  • A full list of tweaks, as well as detailed instructions (setting up displays, etc. can be found on the Re4son website. There is a forum and quite detailed instructions.


The site also has a special build with a small set of programs and a pre-installed core from Re4son.
Download the iso file https://www.offensive-security.com/k...ux-arm-images/

3. Insert the SD card into the reader and then into the PC connector. Run Etcher, specify the path to the image, select SDHC and press the record button. After recording, insert the SD card into the raspberry.
4. The following items are optional, depending on whether you have an HDMI cable and an HDMI-enabled monitor / TV.

5. In case there is an HDMI cable and a monitor / TV with HDMI support, then we turn on and configure our monitor / TV, hook up an Ethernet cable (going to the router) , HDMI and finally connect the power. If HDMI does not take off, then cut off the power and try again.

Now that the system is loaded and connected to the network, we need a wired keyboard and mouse. To work through the monitor, the mouse will be needed in any case, the keyboard can be abandoned in favor of the virtual one, but wired is necessary for the initial setup. If there is no keyboard and / or mouse, then go to the following points, that is, connect via SSH. If they are, then log in with the login root and the password toor.

6. In case there is no monitor with HDMI and / or a wired keyboard with a mouse, then we will connect via SSH. To do this, you need to connect the Ethernet cable from the router to the raspberry and connect power to it.

We will need to know the IP address, it can be done in different ways, one of them is to install the program on the PC . It is worth remembering that your network can be closed from a similar firewall scan, and then you will need to temporarily disable protection in the router. Also, this program sometimes does not clear the scan cache, use another way to find out the ip of the raspberry, if there is a suspicion that you can get the correct ip for SSH connection.

When we see our kali-pi, then we memorize its ip and go to Putty, where we register ip (the connection via SSH and port 22 are selected by default). During the connection, a window will appear asking you to confirm the connection, click "Yes". The username is root, the password is toor.
7. Having authorized with the help of point 5 or 6, it will be necessary to expand our image to the whole disk space.
Code:
sudo fdisk /dev/mmcblk0
Device Boot Start End Sectors Size Id Type
/dev/mmcblk0p1 1 125000 125000 61M c W95 FAT32 (LBA)
/dev/mmcblk0p2 125001 15523839 15398839 7.4G 83 Linux
Pay attention to the value of 125001, you can have it different.

Code:
Partition number (1,2, default 2): 2
Select (default p): p
Partition number (2-4, default 2): 2
First sector (125001-31116287, default 126976): 125001
Last sector, +sectors or +size{K,M,G,T,P} (125001-31116287, default 31116287):
Do you want to remove the signature? [Y]es/[N]o: N
Reboot the system.
Code:
sudo resize2fs /dev/mmcblk0p2
8. Change the account password to your:
Code:
passwd
Delete the built-in account pi:
Code:
deluser --remove-all-files pi
9. Change the default ssh keys:
Code:
cd /etc/ssh/
dpkg-reconfigure openssh-server
update-rc.d -f ssh remove
update-rc.d -f ssh defaults
service ssh restart
update-rc.d -f ssh enable 2 3 4 5
10. Install the vnc-server:
Code:
apt purge tightvncserver -y && wget https://www.realvnc.com/download/file/vnc.files/VNC-Server-6.3.1-Linux-ARM.deb && sudo dpkg -i VNC-Server-6.3.1-Linux-ARM.deb && rm VNC-Server*
Run vncserver:
Code:
vncserver :1 -geometry 1920x1080 -depth 24 -dpi 96
Now connect to it using the VNC Viever installed on the PC:
11. Install the newest kernel :
Code:
cd /usr/local/src && wget -O re4son-kernel_current.tar.xz https://re4son-kernel.com/download/re4son-kernel-current/&& tar -xJf re4son-kernel_current.tar.xz && rm -rf re4son-kernel_current.tar.xz && cd re4son-kernel_4.14.50-20180721 && ./install.sh
All the questions are answered "Y"

Now we put a new kernel 4.14 to replace 4.9. I want to note that the apt-get dist-upgrade command should not be performed, since This is a custom kernel, which updates need to be taken from the site.

12. Set the time and date:
Code:
dpkg-reconfigure tzdata
13. Add vnc sever to the autoload (via the xfce autoload settings): Go

to Applications => Sessions and Startup => look for the autoload menu and add our program:
14. Configure autorun xfce, support for tft screens and wireless modules:
Code:
/usr/local/src/re4son-kernel_4.14.50-20180721/re4son-pi-tft-setup -a root
All offers are answered with "y".

As a result, we will get autorun vnc after downloading raspberries, I recommend adding a wifi password to the raspberries to connect to it without a cable.

15. Install the virtual keyboard xvkbd and leafpad.
Code:
apt-get install xvkbd  leafpad ?y
I also advise you to put a virtual keyboard into autoload in order to connect only the mouse to the monitor.

16. Check Bluetooth operation:
Code:
bluetoothctl
agent-on
default-agent
scan on
Use to connect
Code:
pair XX:XX:XX:XX:XX:XX
17. To put the embedded adapter into monitor mode, use the command:
Code:
iw phy phy0 interface add mon0 type monitor
18. At the very beginning of the instruction was the installed Win32DiskImager program, it will be needed to create a backup. It will take up as much space as it is on the flash drive for the system (in my case it is 32 GB).
Insert the reader with micro SD into the PC slot, run the program, specify the path to save the backup and click "Read".