Author Archives: Re4son

About Re4son

Ultima Ratio Regum


Kali Linux 2017.3 on the GPD Pocket

Unofficial Kali ISO Image available now for download
UPDATE: ISO 20171226-1  & Kernel 4.15.0-rc5-re4son+_8

Touch screen
Screen rotation
Proper display scaling & fan control
Built natively with debian lb and d-i

What is working:

  • Proper screen orientation for graphical debian-installer
  • Display properly rotated in terminal buffer, login screen & desktop
  • Scaling set to 0.60 ( 0.50 in gdm )
  • Touchscreen aligned to rotation
  • Multitouch
  • Wifi
  • Screen brightness
  • Cooling fan
  • Bluetooth
  • Sleep/wake
  • HDMI port
  • Charging at full speed
  • USB-C for data
  • Audio & Headphones

What needs some more work:

  • Encrypting the root partition is not supported yet. Coming in mid Jan.



  1. Download the latest ISO image from here:
  2. Write the image to a USB drive
  3. Insert the stick into your GPD pocket, turn on and press F7 until boot menu pops up
  4. Select boot from USB stick
  5. In the Kali menu, select “Kali Live” and boot into desktop
  6. In Kali, run GParted and unmount primary partition
  7. Run debian-installer-launcher
  8. Install
  9. Reboot
  10. Enjoy
  • The Pocket-Kali image comes with a limited set of tools to keep the size down (i.e. “top10” and “wireless” meta packages).
    Just install “kali-linux-full” to get the whole shebang.
  • Install the latest kernel as documented in the next chapter
  • Follow @Re4sonKernel on Twitter for notifications on updates

Kernel updates:

Version included in ISO: 4.15.0-rc4-re4son+_2

The Kernel is based on Hans’ source tree with all the latest patches to support the GPD Pocket.
You should update to this one:

Latest Stable Version: 4.15.0-rc5-re4son+_8

  • Improved hardware support, performance and stability
  • Workaround for touchscreen I2C errors after resume from suspend
  • Fix for ugly “pcspkr” message on boot
  • Fix for missing objtool during runtime compilations
  • kalified kernel config
  • includes installer

Latest Test Version: 4.15.0-rc7-re4son+_2

  • All of the above, plus
  • Latest kernel updates
  • KTPI patch
  • touchscreen workaround replaced by permanent fix
  • workaround for debian bug #862175
  1. Download and install new kernel via:
    # Either download the stable version:
    # (SHA256: 0e4720abcf7246489d63339773c08a3eeb3fb7a3097d878cdcf313f5e907fb72)
    wget -O re4son-pocket-kernel.tar.xz
    # Or download the test version:
    # (SHA256: 3d036b373b22e1a79e663090a0137c6e80320ac8bf32bbfa1696af826d60152a)
    wget -O re4son-pocket-kernel.tar.xz 
    tar xJf re4son-pocket-kernel.tar.xz
    cd 4.15.0-rc5*
  2. Remove old re4son kernel, e.g.:
    apt remove linux-image-4.15.0-rc4-re4son+ && apt remove linux-headers-4.15.0-rc4-re4son+

Fixes (Not required for ISO versions 20171226-1 and later):

Backlight Control:

Please copy and paste this into a terminal:

echo "pwm-lpss" >> /etc/initramfs-tools/modules
echo "pwm-lpss-platform" >> /etc/initramfs-tools/modules
echo "i915" >> /etc/initramfs-tools/modules
update-initramfs -u

That’ll fix it. The next image will include this.


Please copy and paste this into a terminal:

wget -O /etc/pulse/daemon.conf
mkdir -p /usr/share/alsa/ucm/chtrt5645
wget /usr/share/alsa/ucm/chtrt5645/HiFi.conf
wget /usr/share/alsa/ucm/chtrt5645/chtrt5645.conf
wget /etc/acpi/events/headphone-jack
wget /etc/acpi/


Feedback and help:

Please join the forums to provide feedback and support. Any help to improve the image is greatly appreciated.


Massive thanks:

Stockmind and friends for the audio and backlight fixes:

Hans de Goede for the kernel patches:



NEW: Damn Vulnerable Raspberry Pi runs on all Pi’s

The touch friendly “driving range” for IoT penetration testing with your Kali-Pi.

Sticky Finger's Kali-Pi
Sticky Fingers DV-Pi – pre-configured with vulnerabilities for penetration and privilege escalation.
All DV-Pi’s can be operated with a touch friendly interface or headless via ssh.
Ideal tool for practicing, competitions and live-hacking events.

Need a penetration testing platform? Check out Sticky Fingers Kali-Pi

Sticky Fingers Quick Start Guide:

Sticky Fingers DV-Pi images come with the following features out of the box:

  • 3GB image ready to go with all common TFT screens
  • Re4son Kali-Pi Kernel 4.4 with touch screen support
  • Supports Raspberry Pi 0/0W/1/2/3
  • “re4son-pi-tft-setup” tool to set up all common touch screens, enable auto-logon, etc.
  • “dv-pi” command line tool for headless operation
  • Each image comes with one vulnerability to get in and one vulnerability to get root
  • Each image has two proof.txt with a hash to proof successful compromise:
    • /proof.txt
    • /root/proof.txt
  • Just run “re4son-pi-tft-setup” tool for your particular screen and you are up and running.
  • Don’t forget to change the password for user “pi” (default: “raspberry”)

“Damn Vulnerable Pi” images:

Name Difficulty Host name Size Size and link
Sticky Finger’s DV-Pi 2 medium dv-pi2.local 2.5GB sticky-fingers-dv-pi2
Sticky Finger’s DV-Pi 3
easy (ish)
dv-pi3.local 2.5GB sticky-fingers-dv-pi3
More to come

Anyone interested in creating DV-Pi images can send an e-mail to re4son <at> and I’ll share my template image to add some interesting vulnerabilities.



  • Download a dv-pi image and image your microSD card (min 8GB)
  • Extend the file system if your card is > 8GB
  • Assemble your touch screen (only if you have one, it’s not required)
  • Boot up your Pi and ssh into it with user “pi” and password “raspberry”
  • Change password
  • Set up the screen with the re4son-pi-tft-setup tool:
    <span style="font-size: 8pt;">cd /usr/local/src/re4son_kali-pi-tft_kernel_4*
    sudo mount /dev/mmcblk0p1 /boot
    sudo ./re4son-pi-tft-setup -d    #(updates re4son-pi-tft-setup to the latest version)
    sudo ./re4son-pi-tft-setup -h    #(lists all options - pick your screen from the list)
    sudo ./re4son-pi-tft-setup -t <your screen> -u /root
    sudo reboot</span>
  • Sticky Fingers interface is designed for 3.5″ screens. You can adjust it for 2.8″ via:
    cd /home/pi/DV-Pi-Menu
    git checkout 2.8      #for 2.8" screen



Sticky Fingers Touch interface

Press “DV-Pi” to start the vulnerable applications (might take a few seconds):

Headless using dv-pi command line tool

Sticky Fingers DV-Pi can be operated in headless mode using the “dv-pi” tool:

dv-pi status    # Show status of vulnerable applications
dv-pi start     # Start vulnerable applications
dv-pi stop      # Stop vulnerable applications

pi@dv-pi: ~_010


Add dv-pi2 to /etc/hosts on the attacker’s machine

Find the IP address of the dv-pi and add the hostname of the image with the ip address in you /etc/hosts”, e.g.    dv-pi2.local

Burn the password for user “pi” and start hacking …

Easter egg

 Customer Database

Sticky Fingers DV-Pi contains a database for demonstration purposes, containing 10,000 fake e-mail addresses and credit card details to add an exciting climax to live hacking sessions.

For questions or comments please join the discussion in our forum:


Sticky Finger’s Kali-Pi

Check out Sticky Finger’s Kali-Pi if you are in need of a 1337 penetration testing platform.