Kali Linux 2020.1 Released With Some Changes, Including the Login Screen

The new version of Kali Linux 2020.1 was recently released, which is a distro designed for vulnerability testing systems, auditing, residual data analysis and identifying the consequences of malicious attacks. Kali includes one of the most complete selections of tools for computer security professionals: from tools to test web applications and wireless network penetration to programs to read RFID identification chip data.

The kit includes a collection of exploits and more than 300 specialized security verification utilities, such as Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, p0f. In addition, the distribution kit includes tools to speed up the selection of passwords (Multihash CUDA Brute Forcer) and WPA (Pyrit) keys through the use of CUDA and AMD Stream technologies, which allow you to use the GPU of NVIDIA and AMD video cards to perform computer operations.

What’s new in Kali Linux 2020.1?

With the release of this new version, by default, the work is provided under a user without privileges (since previously all operations were performed as root).

  • In addition to that the credentials of access to the system were changed, because previously instead of user: root
  • pass: toor

The following are now used:

    • user: kali
    • pass: kali

In addition, as for the different Kali compilations with their own desks, a single universal installation image is now proposed with the ability to choose a desk that the user will choose according to their taste.

Of the options offered, we can find XFCE, Gnome, KDE, Mate, LXQT. In total, three universal images are now offered: a complete installation, a live version and a minimum image for installation over the network.

Of the other changes that stand out from this new version:

  • The appearance of the graphic installer changed.
  • For Gnome, a new design theme is available, available in dark and light versions.
  • New icons were added for the included applications.
  • Kali Undercover mode has been optimized, simulating the design of Windows, so as not to arouse suspicion when working with Kali in public places.
  • The composition includes new cloud-enum, emailharvester, phpggc, sherlock and splinter utilities.
  • Removed utilities that require Python 2 to function.

At the same time, the launch of NetHunter 2020.1, an environment for mobile devices based on the Android platform with a selection of tools to test systems for vulnerabilities , was prepared .

With NetHunter, it is possible to verify the implementation of specific attacks for mobile devices , for example, by emulating the operation of USB devices (BadUSB and HID keyboard, emulating a USB network adapter that can be used for MITM attacks or a USB keyboard that performs character substitution).

As well as being able to create fake access points (MANA Malignant Access Point) NetHunter is installed in a standard Android platform environment in the form of a chroot image in which a specially adapted version of Kali Linux is run.

A key improvement in the launch of NetHunter 2020.1 is the preparation of the Rootless edition, which does not require root access on the device.

Download and get Kali Linux 2020.1

For those who are interested in being able to directly test or install the new version of the distro on their computers, they should know that they can download a complete ISO image (2.7 GB) or a reduced image (2 GB) which are already available for download on the official website of the distribution.

Compilations are available for the x86, x86_64, ARM (armhf and armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid) architectures. In addition to the basic compilation with Gnome and a reduced version, variants with Xfce, KDE, MATE, LXDE and Enlightenment e17 are offered.

Finally, if you are already a Kali Linux user, you just have to go to your terminal and execute the following command that will update your system, so it is necessary to be connected to the network to perform this process.

apt update && apt full-upgrade

Leave a Reply

Your email address will not be published. Required fields are marked *