<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kali Linux in the Enterprise in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8804#M57</link>
    <description>&lt;P&gt;I doubt about "should".&lt;/P&gt;&lt;P&gt;IMHO it is question of risk models, what used it your company.&lt;/P&gt;&lt;P&gt;For me Kali is useful pack of UNTRASTED tools (penetration testing etc).&lt;/P&gt;&lt;P&gt;Ergo- using only in dirty areas (untrusted).&lt;/P&gt;&lt;P&gt;Useful in external penetration/vulnerability testing.&lt;/P&gt;&lt;P&gt;Can be used in some external audit scenarios.&lt;/P&gt;&lt;P&gt;Results export as text/xml files and using in trusted systems.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Mar 2018 06:42:02 GMT</pubDate>
    <dc:creator>Da</dc:creator>
    <dc:date>2018-03-27T06:42:02Z</dc:date>
    <item>
      <title>Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8745#M47</link>
      <description>&lt;P&gt;Anyone have any thoughts about how Kali Linux should be deployed in an Enterprise environment?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's a rough draft I came up with. Am I missing anything? The OS will be installed on a laptop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Permanent install on HD&lt;OL&gt;&lt;LI&gt;Advantage: Work is saved between boots&lt;/LI&gt;&lt;LI&gt;Disadvantage: Entire reinstall is required for fresh copy&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Live boot from USB&lt;OL&gt;&lt;LI&gt;Advantage: Fresh install on each boot. Nothing is saved to HD. USB can be easily locked away or destroyed.&lt;/LI&gt;&lt;LI&gt;Disadvantage: Work is not saved between boots&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;VM on Windows server&lt;OL&gt;&lt;LI&gt;Advantage: Can be destroyed between client assessments&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Disadvantage: Wireless testing not possible without external antenna. Windows is (arguably) less secure than Linux. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Access control&lt;OL&gt;&lt;LI&gt;MFA&lt;/LI&gt;&lt;LI&gt;PAM&lt;/LI&gt;&lt;LI&gt;IPTABLES&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Physical &amp;nbsp;segmentation&lt;OL&gt;&lt;LI&gt;&amp;lt;how/where will the laptop be secured?&amp;gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Logical segmentation&lt;OL&gt;&lt;LI&gt;No access to internet except for upgrades&lt;/LI&gt;&lt;LI&gt;Static IP&lt;/LI&gt;&lt;LI&gt;Do not join to the company domain&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Security&lt;OL&gt;&lt;LI&gt;Full Disk Encryption&lt;/LI&gt;&lt;LI&gt;System files verification checks&lt;/LI&gt;&lt;LI&gt;Disable all external network services unless needed (disabled by default). Disable when no longer needed. &amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;User qualifications&lt;OL&gt;&lt;LI&gt;&amp;lt;certifications?&amp;gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Availability&lt;OL&gt;&lt;LI&gt;Only connected to the network when in use&lt;OL&gt;&lt;LI&gt;Advantage: Not available to be used for nefarious purposes&lt;/LI&gt;&lt;LI&gt;Disadvantage: Remote staff shut out if on-site staff unavailable&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Connected to the network at all times&lt;OL&gt;&lt;LI&gt;Advantage: Available for staff to use whenever needed&lt;/LI&gt;&lt;LI&gt;Disadvantage: Available to be used for nefarious purposes&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Logging&lt;OL&gt;&lt;LI&gt;Log all user activities and processes to Splunk&lt;/LI&gt;&lt;LI&gt;Alert on all user activity. Throttle for estimated duration of work if authorized.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 14:39:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8745#M47</guid>
      <dc:creator>dgillette</dc:creator>
      <dc:date>2018-03-26T14:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8749#M48</link>
      <description>&lt;P&gt;&amp;gt; Anyone have any thoughts about how Kali Linux&lt;BR /&gt;&amp;gt; should be deployed in an Enterprise&lt;BR /&gt;&amp;gt; environment?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why are you installing Kali in an enterprise?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; 1. Permanent install on HD&lt;BR /&gt;&amp;gt; Disadvantage&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're testing with Kali and if you install in a VM rather than bare metal, keep in mind you'll have 2 NICs exposing yourself to your IDS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; Live boot from USB&lt;BR /&gt;&amp;gt; VM on Windows server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I grouped these two things together because they are the same thing. You're deploying from a "template" so that you're not leaving a footprint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only thing I would say is your org allows USB drives?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; Availability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You haven't articulated your requirements yet. Without knowing your requirements, it's difficult to provide suggestions.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:00:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8749#M48</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-03-26T15:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8751#M49</link>
      <description>&lt;P&gt;David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You got some really good information laid out.&amp;nbsp; I’m a little confused about what you’re doing with the document though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this a decision support paper for deploying Kali Linux or is this supposed to be a standard operating procedure document?&amp;nbsp; Or is it something else entirely?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, there are many additional considerations you may want to make based upon what organization/data the enterprise systems are supporting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a quick note:&amp;nbsp; Using a LIVE copy of any kind of pen-test or repair tool is a bad idea.&amp;nbsp; A marble may fall out of your pocket without notice – but it’s hard not to notice a cannon ball missing.&amp;nbsp; They’re easy to smuggle, forget and leave connected, drop, etc.&amp;nbsp; It gets even worse if you have a LIVE USB with a non-volatile storage area for your test results.&amp;nbsp; It’s best to have a dedicated computer for this kind of work that you can lock away in a cabinet or safe accessible by the security staff only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:02:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8751#M49</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-03-26T15:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8754#M50</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Why are you installing Kali in an enterprise?&lt;STRONG&gt; For Security auditing and pen testing.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you're testing with Kali and if you install in a VM rather than bare metal, keep in mind you'll have 2 NICs exposing yourself to your IDS. &lt;STRONG&gt;Thanks. This is the type of feedback I'm seeking.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only thing I would say is your org allows USB drives? &lt;STRONG&gt;No, we don't. Would only be allowable on the laptop.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You haven't articulated your requirements yet. Without knowing your requirements, it's difficult to provide suggestions. &lt;STRONG&gt;This just means should the laptop be connected to the network at all times or not. I work remotely so I would have to get one of my colleagues&amp;nbsp;to connect the laptop if I wanted to use Kali.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:10:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8754#M50</guid>
      <dc:creator>dgillette</dc:creator>
      <dc:date>2018-03-26T15:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8757#M51</link>
      <description>&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm making a presentation to my customer about deploying Kali in their environment. They are understandably concerned about the security implications and want to know all the facts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the feedback about not using a live copy. Makes total sense.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:16:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8757#M51</guid>
      <dc:creator>dgillette</dc:creator>
      <dc:date>2018-03-26T15:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8760#M52</link>
      <description>&lt;P&gt;I would recommend a permanent install on a HD but if you opt to use VM, then I'd recommend Oracle Virtual Box. &amp;nbsp; &amp;nbsp; If doing an install to HD, I'd recommend that you use separate partitions for /usr, /var, and /logs and /boot. this way these partitions are limited and these partitions do not spoil or fill up your harddrive. &amp;nbsp; Also, when needing to do restores using these separate partitions will make your life a lot easier. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And make your install default to runlevel 5. &amp;nbsp;Also, make sure you use UTC time variants. &amp;nbsp;This will make sure that applications work correctly, are time synchronized and that there is no confusion about the time stamps on your logs. &amp;nbsp;For example, for Chicago CST time, chose six time zones behind UTC. &amp;nbsp; &amp;nbsp;Use the TZ variant to set the time zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Important consideration, LInux uses 5 file formats and I'd recommend considering using ext4 for the format. Reiser is probably overly complicated (one of the file formats). &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:27:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8760#M52</guid>
      <dc:creator>brianwaala</dc:creator>
      <dc:date>2018-03-26T15:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8763#M53</link>
      <description>&lt;P&gt;Personally I don't use any number of tools on the backtrack CD/kit itself however, am proficient with a number of FOSS tools contained therein, i.e. NMAP, Burp Suite, etc. I would be reticent installing a host of uncommon tools on my network supervised or not. Kismet, NetCat, SCat et. al. hold little to no value on my particular network at this time as better controls have already been installed.&amp;nbsp; A better practice would be to use VM Workstation on a separate laptop only used for such a purpose. Nothing like finding your network compromised while lo and behold! A full version of questionable FOSS tools for the taking. These just create more work for my NBADs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just because it exists doesn't mean its a good idea to install. Will admit you can't beat free and its good from a baseline of understanding but there are tools so much better than what your going to find within that compilation and so much of that CD is going to be of little value unless your going to spend months of time configuring and testing with it. Your time is likely (I hope) better spent learning your network and defending properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kali is fine for many basic penetration tests but hardly a useful auditing tool. That's why SIEM was invented.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 15:34:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8763#M53</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2018-03-26T15:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8773#M54</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;For Security auditing and pen testing.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For security auditing and pen testing isn't a reason to install Kali in the enterprise.&amp;nbsp; Putting something like kali in the enterprise is just increasing your attack surface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why not just have Kali on a laptop and plug it in when needed?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;This just means should the laptop be connected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; to the network at all times or not&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well, that certainly depends on frequency of use.&amp;nbsp; Regarding my previous comment, and what we do here locally, is NOT keeping Kali on the network at all times.&amp;nbsp; We test about once a month and for a week.&amp;nbsp; Our Kali laptops are only connected when needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;I work remotely so I would have to get one of my colleagues&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; to connect the laptop if I wanted to use Kali.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You don't have a secure route when working remotely?&amp;nbsp; That may be something you want to look into when pitching this to your stakeholders.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 16:54:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8773#M54</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-03-26T16:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8776#M55</link>
      <description>&lt;P&gt;You don't have a secure route when working remotely?&amp;nbsp; That may be something you want to look into when pitching this to your stakeholders. &lt;STRONG&gt;I use a VPN of course. What I'm saying is if the laptop isn't connected to the network at all times I'd need to ring one of my colleagues up to have them connect the laptop to the network if I needed to use it. It seems like the consensus so far though is to not leave the laptop connected to the network at all times. I am not totally convinced of that at this point. If the right precautions are taken as I have outlined the risk is low as I see it. The biggest risk I see is an authorized user doing something stupid. That's&amp;nbsp;hard to mitigate. But this is why I'm throwing the question out there. I could be missing something here.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 17:43:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8776#M55</guid>
      <dc:creator>dgillette</dc:creator>
      <dc:date>2018-03-26T17:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8784#M56</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;What I'm saying is if the laptop isn't connected&lt;/P&gt;&lt;P&gt;&amp;gt; to the network at all times I'd need to ring one of&lt;/P&gt;&lt;P&gt;&amp;gt; my colleagues up to have them connect the&lt;/P&gt;&lt;P&gt;&amp;gt; laptop to the network if I needed to use it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That seems really odd to me.&amp;nbsp; If you have a VPN from a remote location to the mothership, I'm not grasping this dependency upon a hard wired connection.&amp;nbsp; Oh well, I won't bog the conversation down with that anymore.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;I am not totally convinced of that at this point. If the right&lt;/P&gt;&lt;P&gt;&amp;gt; precautions are taken as I have outlined the risk is low as I see it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah, I think folks are saying 2 things.&amp;nbsp; 1. Having the Kali tools on the network 24/7 increases exposure.&amp;nbsp; 2.&amp;nbsp; Relying on personnel controls is not a recommended practice.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But of course, your mileage may vary and risk appetite is determined ultimately&amp;nbsp;by the system owner. but just keep in mind, *nix doesn't protect one from themselves.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; The biggest risk I see is an authorized user doing something&lt;/P&gt;&lt;P&gt;&amp;gt; stupid. That's&amp;nbsp;hard to mitigate. But this is why I'm throwing&lt;/P&gt;&lt;P&gt;&amp;gt; the question out there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fair enough... but perhaps taking a look at some network isolation is worth it for when that 24/7 connected laptop is idle.&amp;nbsp; Can you terminal into your layer 2 device to bring a vlan up for testing or down for storage example?&amp;nbsp; Then you're never calling your colleagues to connect&amp;nbsp;the cable... just accessing the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One final thought jumped in my head when I mentioned "network".&amp;nbsp; My colleagues&amp;nbsp;and I find the Network Manager Debian ships to be painful.&amp;nbsp; In all of our Kali instances, the first&amp;nbsp;thing we've done is uninstall and purge network-manager.&amp;nbsp; We then add our NICs to /etc/network/interfaces and /run/network/ifstate.&amp;nbsp; When running Kali, we manipulate&amp;nbsp;addresses as needed from the command line and bring up NICs with ifup or ifdown.&amp;nbsp; It takes less than 2 seconds to configure the box and don't run into any of the profile contention problems one can see when using the GUI to manage the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2018 20:24:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8784#M56</guid>
      <dc:creator>mgoblue93</dc:creator>
      <dc:date>2018-03-26T20:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8804#M57</link>
      <description>&lt;P&gt;I doubt about "should".&lt;/P&gt;&lt;P&gt;IMHO it is question of risk models, what used it your company.&lt;/P&gt;&lt;P&gt;For me Kali is useful pack of UNTRASTED tools (penetration testing etc).&lt;/P&gt;&lt;P&gt;Ergo- using only in dirty areas (untrusted).&lt;/P&gt;&lt;P&gt;Useful in external penetration/vulnerability testing.&lt;/P&gt;&lt;P&gt;Can be used in some external audit scenarios.&lt;/P&gt;&lt;P&gt;Results export as text/xml files and using in trusted systems.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 06:42:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8804#M57</guid>
      <dc:creator>Da</dc:creator>
      <dc:date>2018-03-27T06:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8806#M58</link>
      <description>&lt;P&gt;David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read some of the back and forth with other folks in the discussion and I have a few suggestions and comments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SUGGESTION: You're connected through a VPN.&amp;nbsp; Can your design incorporate running Kali from your location across the VPN (other than say running NMAP from different physical locations on the network)?&amp;nbsp; That alleviates having the test system permanently deployed on-site, and making the client responsible for connecting and securing it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;COMMENT(S):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is nothing "wrong" with using Kali.&amp;nbsp; It's an "easy button" of sorts, and comes with a significant amount of professionally published literature on its responsible use, and is the basis of the OSCP qualification.&amp;nbsp; I would be more likely to run Kali and spend time customizing it as a single source for penetration testing on it's own firewall burb, VLAN, etc. than purpose building 30 different systems and then turning around and having to audit 30 separate systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The tools that Kali provides academically increases the attack surface, much in the same way that professionals have been chanting about how longer passwords academically increase the security of login credentials.&amp;nbsp; For someone to use your Kali deployment, you've technically already lost the enterprise before the attacker even finds your deployment.&amp;nbsp; If the person is on the outside, then they would have had to breach nearly every control out there (firewall, VPN, access control, etc.) and move laterally through several systems and networks to reach your Kali deployment - and likely could have just as easily installed the tools themselves.&amp;nbsp; If the person is on the inside with access to Kali, well...&amp;nbsp; Cue Chopin's&amp;nbsp;Funeral March.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2018 07:59:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/8806#M58</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-03-27T07:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Kali Linux in the Enterprise</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/13345#M398</link>
      <description>&lt;P&gt;Also something to keep in mind, if someone has physical access to the box changing the root password is not hard without signing in. A previous CISO left his KALI machine here with no password given to me. Within 30 seconds I had reset the root password to something of my choosing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So don't count on authorized users being the only ones to be able to access this box.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Aug 2018 20:27:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Kali-Linux-in-the-Enterprise/m-p/13345#M398</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-08-07T20:27:38Z</dc:date>
    </item>
  </channel>
</rss>

