Katana v2.0 Release

   Updated: 11/10/2010


Katana is a portable multi-boot security suite which brings together many of today's best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Abel, and many more.

Release Notes:

Katana v2.0 (y0j!mb0) is now out. Finally, after a three month hiatus from it's pre-release at Defcon 18, the full release is here. This version has a bunch of new stuff all around. One major addition to the project is Forge. This tool facilitates a simple point-and-click installation for adding even more distributions to Katana Bootable. This new version also adds the Computer Aided Investigative Environment (CAINE) for a live forensics environment and Kon-Boot for bypassing password. Much effort was placed on the installation of additional applications to the Katana Tool Kit. These new applications include Metasploit, NMAP, Cain & Abel, John the Ripper, Cygwin, and more.

Download here

Whats New:

- Introduction of Forge for installing additional distros


Forge is simple to use graphical front end to assist in the process of adding addition distributions to Katana; like Samurai, Pentoo, Knoppix, WeakNet, and BitDefender. This allows for users to build an even more powerful Katana. For more on Forge click here

- Katana Bootable

Backtrack Pen-Testing
the Ultimate Boot CD System Tools
Ultimate Boot CD for Windows Portable Windows (Not installed by default)
Ophcrack Live Password Cracking
Puppy Linux Minimalistic Linux
CAINE Forensics
Trinity Rescue Kit System Tools / Antivirus
Clonezilla System Backup
Kon-Boot System Password Bypass
Derik's Boot and Nuke Wipe Disk

- Katana Tool Kit (additions)

(Full list of Katana Tool Kit application available here.)

Application Description
Metasploit Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers and security professionals.
NMAP Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
John the Ripper John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus many more with contributed patches.
Cygwin Cygwin is a Linux-like environment for Windows. It consists of two parts:
- A DLL (cygwin1.dll) which acts as a Linux API emulation layer providing substantial Linux API functionality.
- A collection of tools which provide Linux look and feel.
Spoof-Me-Now Spoof-Me-Now is a handy, easy to use application designed to help you change, spoof your MAC Address.
Tor PortableTor allows you to connect into the Tor anonymous internet system from any computer with your flash or thumb drive. This allows you to browse the internet anonymously from public locations, such as internet hotspots, library, or school computers and public terminals.
StreamArmor StreamArmor is the sophisticated tool for discovering hidden alternate data streams (ADS) as well as clean them completely from the system. It's advanced auto analysis coupled with online threat verification mechanism makes it the best tool available in the market for eradicating the evil streams. StreamArmor comes with fast multi threaded ADS scanner which can recursively scan over entire system and quickly uncover all hidden streams.
Forensic Acquisition Utilities This is a collection of utilities and libraries By George M. Garner Jr. is intended for forensic or forensic-related investigative use in a modern Microsoft Windows environment. The components in this collection are intended to permit the investigator to sterilize media for forensic duplication, discover where logical volume information is located and to collect the evidence from a running computer system while at the same time ensuring data integrity (e.g. with a cryptographic checksums) and while minimizing distortive alterations to the subject system.

- Katana on DVD

An ISO of Katana can be generated using the make_iso.sh script for Linux and make_iso.bat for Windows. Once the ISO is generated, it can be burned to a DVD. (This can cause problems for some componants of Katana.)