Skip to main content

Meet Kali Linux 2.0, a distro built to hammer your security

Meet Kali Linux 2.0, a distro built to hammer your security

The newest version of Kali Linux is built so you can update its penetration testing tools with less hassle.

kali linux 2 desktop

The latest release of the immensely popular Linux distribution designed for penetration testing, Kali Linux 2.0 launched at DefCon 23 in Las Vegas last week.
Kali is the successor to BackTrack, and is a Debian-based Linux distribution that includes hundreds of penetration-testing tools pre-installed and ready to go. Just boot it from a USB drive or live DVD and you’ll have a penetration-testing—or “hacking”—environment with all the tools you might want just waiting for you to fire them up.

More frequent updates

The biggest change is the shift to a rolling release model. Now, you can simply install Kali Linux 2.0 on a computer and the latest versions of security tools will be provided to you as normal updates. There’s no need to wait for Kali Linux 2.1 to get the newest stuff. An eventual Kali Linux 2.1 would simply be a snapshot of the current software available, which 2.0 users would already have upgraded to.
The developers also tout a new upstream version-checking system, which will notify them when the various security tools included in Kali are upgraded. This means Kali’s tools will be upgraded more frequently.
Want to stay up to date on Linux, BSD, Chrome OS, and the rest of the World Beyond Windows? Bookmark the World Beyond Windows column page or follow our RSS feed.

A new desktop environment

Kali Linux 2.0 includes a variety of software upgrades. It’s now based on Debian 8 “Jessie”, and that brings the Linux 4.0 kernel along with improved hardware support and, importantly, better wireless driver coverage.
kali linux 2 menu
The main system image has moved to GNOME 3, which is the developer’s favorite desktop environment. But Kali also officially supports KDE, Xfce, MATE, Lxde, e17, and i3wm. The GNOME system means the main Kali system will now take up a bit more RAM—768MB minimum for a full GNOME 3 session. If this is too much for you, there’s now a “Light” version of Kali Linux you can download instead. This includes the lighter Xfce desktop environment and a smaller collection of useful security tools.
The Metasploit Community / Pro package is no longer included in Kali Linux 2.0, but must be downloaded separately from Rapid7.
Kali Linux also provides upgraded ARM images so you can run it on the Raspberry Piand various Chromebooks. Nethunter images for Android devices have been upgraded, and there are also official VirtualBox and VMware images you can download.
Kali Linux 2.0 wasn’t the only security-focused Linux distribution to release a new version timed with DefCon, either. Tails 1.5 just debuted with a variety of fixes, upgrading theanonymity-focused operating system favored by Edward Snowden.

Comments

Popular posts from this blog

fix idm integration on chrome

Chrome Browser Integration I do not see IDM extension in Chrome extensions list. How can I install it?  How to configure IDM extension for Chrome? Please note that all IDM extensions that can be found in Google Store are fake and should not be used. You need to install IDM extension manually from IDM installation folder. Read in step 2 how to do it . 1. Please update IDM to the latest version by using  "IDM Help->Check for updates..."  menu item 2.  I don't see  "IDM Integration module"  extension in the list of extensions in  Chrome . How can I install it? Press on  Chrome  menu ( arrow 1  on the image), select  "Settings"  menu item ( arrow 2  on the image) and then select  "Extensions"  tab ( arrow 3  on the image). After this open IDM installation folder ( "C:\Program Files (x86)\Internet Download Manager"  by default,  arrow 4  on the image) and drag and drop  "IDMGCExt.crx"  ( arrow 5  on the image) file int

sxhkd volume andbrightness config for dwm on void

xbps-install  sxhkd ------------ mkdir .config/sxhkd cd .config/sxhkd nano/vim sxhkdrc -------------------------------- XF86AudioRaiseVolume         amixer -c 1 -- sset Master 2db+ XF86AudioLowerVolume         amixer -c 1 -- sset Master 2db- XF86AudioMute         amixer -c 1 -- sset Master toggle alt + shift + Escape         pkill -USR1 -x sxhkd XF86MonBrightnessUp          xbacklight -inc 20 XF86MonBrightnessDown          xbacklight -dec 20 ------------------------------------------------------------- amixer -c card_no -- sset Interface volume run alsamixer to find card no and interface names xbps-install -S git git clone https://git.suckless.org/dwm xbps-install -S base-devel libX11-devel libXft-devel libXinerama-devel  vim config.mk # FREETYPEINC = ${X11INC}/freetype2 #comment for non-bsd make clean install   cp config.def.h config.h vim config.h xbps-install -S font-symbola #for emoji on statusbar support     void audio config xbps-i

Hidden Wiki

Welcome to The Hidden Wiki New hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!! Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it. The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with. Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you