Kali Linux with over 600 intrusion testing programs including nmap (port scanner), Wireshark (packet analyzer), John the Ripper (password), Aircrack-ng (wireless LAN penetration testing suite) preinstalled, Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer hard drive, can be booted from a live CD or live USB, or it can be run on a virtual machine. It is a platform powered by the Metasploit Project Framework, a tool for developing and implementing security exploits.
Mati Aharoni and Devon Kearns of Offensive Security developed their own pre-forensic distribution based on Ubuntu by rewriting BackTrack. They were joined by the third lead developer, Raphael Herzog, as a Debian expert.
Kali Linux is based on Debian Wheezy. Most of the packages that Kali uses come from Debian Reservoirs.
Kali Linux is developed in a safe place with a few people who are trusted and authorized to package, and every package is signed by the developer. Kali also has a custom injection-corrected core. This was added primarily because the developer team realized that they had to do a lot of wireless evaluations.
Other versions:Kali Light ISO 64-bit (2019.4) Kali Portable ISO 32-bit (2019.4) Kali LXDE 64-bit (2019.4)
Today we released the latest Kali Linux version, 2021.3 (Q3) and it's now ready to download or upgrade.
The summary of changes since June 2021.2 includes:OpenSSL - Comprehensive compatibility by default - Continue reading the contents of the new Kali -Tools site - Follow the steps for Kali -Docs Kali - Tools have been updated to get Better virtual device support in live photo session Copy, paste, drag and drop from your device to a virtual virtual machine New tools - From enemy simulators to sub-band control Wi-Fi Attacks Kali NetHunter Smartwatch - For the first time, for TicHunter Pro KDE 5.21 - Received Plasma desktop A version of
OpenSSL: A Wide Compatible Default Feature
From Kali Linux 2021.3 Forward, OpenSSL is now configured for broader compatibility to allow Cali to talk to as many services as possible. This means that older protocols (such as TLS 1.0 and TLS 1.1) and older passwords are enabled by default. This is done to increase Kali's ability to communicate with legacy systems and servers that still use these legacy protocols. This may increase your options over current attack levels (if your goal is to run these end-of-life (EoL) services, what else can be detected after you forget about them?). Although this configuration is not good for general operating systems, this setting makes sense for Kali because it enables the user to engage and talk with more potential targets.
This setting can be easily changed through the kali-tweaks command line tool. Go to Hardening and from there you can configure OpenSSL instead for Strong Security Mode, which uses today's modern standard for secure communication.
Virtual: Progress Everywhere
Kali Live has received a little love during this release cycle! We've worked hard to make the experience smoother for those playing live video in virtual environments. Basic features like copying, pasting, and dragging between host and guest should work out of the box. And it's really useful for everyone: VMware, VirtualBox, Hyper-V, and QEMU + Spice. Did we forget someone? Write us a word about Kali Bug Tracker! On the same line: It's very easy to configure Kali for advanced Hyper-V session mode. Open the kali-tweaks settings in the device, select Virtualization, and if Kali is running under Hyper-V, you will see the settings to enable advanced Hyper-V session mode. This is simply by pressing Enter!
If you are using this feature, be sure to visit kali.org/docs/virtualization/install-hyper-v-guest-enhanced-session-mode/. There are a few other things you should be aware of. Many thanks to Shin Bennett, who took the time to test this feature, provided very detailed feedback throughout, and even helped us with documentation. Well done Shane!Read more
Kali Linux comes with version 2021.3 and brings virtual improvements