With single-board computers (SBCs) such as the Raspberry Pi 2 (or B+, collectively referred to as "RPI", based on the Broadcom chips) and the USB Armory (based on the Freescale chips), you have to make decisions about how to proceed forward.
First of all, Kali on ARM supports LUKS with NUKE -- https://www.offensive-security.com/kali-linux/raspberry-pi-luks-disk-encryption/
However, Kali Linux does not have the massive repo support found in Arch flavors. See the enormous list of community-provided packages. In other words, it's easier to install Arch on ARM and then get your pen-test, netsec, and forensics tools from either:
- Images and/or Repo support in ArchAssault ARM
- Adding the BlackArch repo post-install
- A combination of these concepts, much like choosing among HomeBrew and MacPorts on OS X
Consistency is also important, however. With Kali Linux 2.0 releasing this week, many may decide to go forward with updating their bare metal, guest VMs, NetHunter on Android, RPIs, and/or live DVDs/USBs. For those using live distributions, one could always switch between many OSes using the Isostick or similar. Questions remain, however, about everyone switching to the new Kali paradigm or not.
More and more, I am looking to replace Kali with ArchAssault and/or BlackArch. The bare metal support is better for Chromebooks via Arch. While Arch runs on Android, it is not easy to install -- Kali NetHunter is clearly the superior choice. NetHunter is going to support some very-important security testing hardware, such as the Proxmark3, as well as packet injection on USB WiFi devices like the Alfa or the TL-WN722N out of the box. Arch distros will likely continue to do this on SBCs and Chromebooks. It's a mixed bag. Sometimes some Chromebooks or Android devices are supported by Kali ARM or NetHunter and others by Arch ARM.
I have not yet pulled the trigger on replacing Kali with these Arch-based distros. The writing is on the wall, though, especially for those who are active app developers in addition to security professionals. For example, I barely was able to compile NodeJS and MongoDB under Kali ARM for my USB Armory (taking hours of my time). I'm left questioning if this effort was worth the investment for a few simple features like NUKE support or easy Proxmark3 support.
Further trends:
- Intrusion prevention and detection with Croissants or Security Onion
- Penetration testing with the Xubuntu Attack VM -- from the
Cobalt Strike Armitage team
- Using the Penetration-Testing Framework (PTF) via any
Unix-based environment -- from the TrustedSec team
- HackPorts for OS X
- Huge slide deck about running a bunch of security-focused distros in
ESXi in VMware Fusion on a MacBook Pro