ArchStrike – Turn your Arch Linux as Ethical hacking distribution
A while ago, I have written a guide about BlackArch Linux – a Linux distribution based on Arch Linux which is specially designed for security researchers and penetration testers. Today, let me introduce ArchStrike, an Arch Linux repository for security professionals and enthusiasts who use Arch Linux as their base OS. It is specially optimized for i686, x86_64, ARMv6, and ARMv7 architectures. Unlike other security oriented Linux distributions like BlackArch and Kali Linux, ArchStrike doesn’t come as a standalone Linux distribution. It is a repository that has plethora of security and penetration tools. Simply put, It is security a penetration testing and security layer on top of Arch Linux, and is carefully crafted for learning Ethical hacking. However, the developers are working on an ISO to be released soon.
ArchStrike is formerly known as ArchAssault, and then renamed to ArchStrike lately.
In this tutorial, let us see how to turn your Arch Linux into a security penetration system using ArchStrike.
Add ArchStrike repoisitory in Arch Linux
I assume you already have Arch Linux with Internet connection.
First, we need to add ArchStrike master repository.
To do so, edit /etc/pacman.conf file:
sudo nano /etc/pacman.conf
Add the following lines at the end:
[archstrike] Server = https://mirror.archstrike.org/$arch/$repo
Save and close the file.
Then, run the following commands one by one to initialize the pacman keyring and start dirmngr, then import and sign the key used to sign the archstrike-keyring package:
sudo pacman-key --init
sudo dirmngr < /dev/null
sudo pacman-key -r 7CBC0D51
sudo pacman-key --lsign-key 7CBC0D51
Finally, update repositories using command:
sudo pacman -Syy
To view the list of ArchStrike packages, run:
sudo pacman -Sl archstrike
Similarly, to view to the list of available ArchStrike groups, run the following command:
sudo pacman -Sg | grep archstrike
archstrike archstrike-scanners archstrike-misc archstrike-crackers archstrike-voip archstrike-forensics archstrike-wireless archstrike-recon archstrike-webapps archstrike-hardware archstrike-networking archstrike-defense archstrike-exploit archstrike-spoof archstrike-fingerprinting archstrike-crypto archstrike-backdoors archstrike-fuzzers archstrike-malware archstrike-honeypots archstrike-analysis archstrike-source-audit archstrike-database archstrike-bluetooth archstrike-autonomous archstrike-proxy archstrike-sniffers archstrike-tunnel archstrike-bruteforce archstrike-social-engineering archstrike-reverse archstrike-dns archstrike-debugging archstrike-decompile archstrike-intel archstrike-dos archstrike-ddos archstrike-enumeration archstrike-mitm archstrike-wordlists archstrike-exploits
That’s it. Now, start installing tools of your choice. As of writing this, there are over 1450+ tools are available in the ArchStrike repository. You can find all tools from this link.