I wrote a detailed guide on setting up the Raspberry Pi with Kali Linux and securing it via Tailscale, which was used in this forensic investigation:
➡️ How to Install Kali Linux on a Raspberry Pi and Access It Securely (Tailscale Version)
Published on Medium by Amirhossein Shekooh
This project documents a full digital forensic analysis of a suspicious 2GB USB flash drive, conducted as part of a university module in Digital Forensics. Using a Raspberry Pi 4 configured with Kali Linux and remote-secured via Tailscale, I followed a professional-grade investigation workflow including evidence imaging, hashing, file carving, and advanced analysis of hidden malicious payloads (ZIP bombs).
- Kali Linux on Raspberry Pi 4 (custom SSH-only setup)
- FTK Imager (image creation + MD5 & SHA-1 verification)
- Foremost (file carving)
- Binwalk & Strings (advanced ZIP analysis)
- Tailscale (secure remote access)
- USB was imaged using FTK Imager v4.7.3 with a USB write blocker.
- MD5 & SHA-1 hashes were created and verified to ensure integrity.
MD5: 958eaee85ace515af653944635913209
SHA-1: a641ff2f1b66fa37b9605f8aa0cf6a033fd02e06
- Raspberry Pi 4 running Kali Linux configured with
USERas sole user. - Remote SSH access is locked to the examiner's device via Tailscale.
- Image file
usb-raw-img.dd.001analysed using Foremost. - Two ZIP files were carved: both later flagged as corrupted/malicious.

foremost -i usb-raw-img.dd.001 -o recovered_files-
Binwalk, Strings, and Zipinfo were used to examine ZIP files without extracting them.
-
Found patterns of repeated JPEGs and text files: indicators of ZIP bombs
-
All actions complied with GDPR, data integrity, and chain-of-custody protocols.
-
Confidential or suspicious data was not stored on personal machines.
-
Tailscale ensured an isolated forensic analysis environment.
-
ZIP bombs were embedded with repetitive, oversized, corrupted files.
-
Designed to crash systems or delay forensic work.
-
Proper isolation and safe tools mitigated risks successfully.
This project is licensed under the MIT License – see the LICENSE file for details.
Amirhossein Shekooh BSc Cybersecurity Feel free to explore the report or reach out for discussion or collaboration.




