Distributive distribution for Kali Linux 2024.2 security was published

presented the release of the distribution Kali Linux 2024.2 based on the DEBIAN package base and designed to test systems for vulnerabilities, audit, analyzing residual information and identifying the consequences of attackers. All original developments created as part of the distribution are distributed under the GPL license and are available through the public GIT-Rooster . To download ​​prepared several options for ISO-images, a size of 495 MB and 4 GB. The assemblies are available for I386, X86_64, ARM (ARMHF and ARMEL, RASPBERRY PI, Banana Pi, ARM Chromebook, Odroid). By default, the XFCE desktop is offered, but KDE, GNOME, MATE, LXDE and Enlightenment E17.

are optionally supported.

Kali includes one of the most complete collections of tools for specialists in the field of computer security: from means for testing web applications and penetrating into wireless networks to programs for reading data from identification RFID chips. The kit includes a collection of exploites and about 400 specialized utilities for checking safety, such as Aircrack, Maltego, Saint, Kismet, Bluebugger, BTCRACK, BTSCANNER, NMAP, P0F. In addition, the distribution includes a means to accelerate passwords (Multihash Cuda Brute Forcer) and WPA keys (Pyrit) through the use of CUDA and AMD Stream technologies that allow the use of the NVIDIA and AMD GPU for computing operations.

In the new issue:

  • To solve Problems of 2038 Packs for 32-bit architectures ARMHF and ARMEL are transferred to the use of 64-bit type Time_t.
  • The user environment is updated to Gnome 46.

  • Updated the implementation of the “Kali Undercover” mode based on the XFCE, simulating Windows design, so as not to cause suspicion when working with Kali in public places. Improved XFCE operation on high-density pixels.

  • The composition includes 18 new utilities:
    • autorecon – a tool for determining available services in multi -wind mode.
  • coercer – checking the Windows server using 12 authentication methods.
  • dploot – an analogue of Sharpdpapi, written on Python.
  • getsploit – a utility for searching and loading exploites.
  • government – creating screenshots of sites using the Chrome engine.
  • horst
/Reports, release notes, official announcements.