Kali Linux 2020.1 arrives with some changes, among them the login

kali-2020.1

Recently Kali Linux 2020.1 new version was released, which is a distro designed for vulnerability testing systems, audit, residual data analysis and identify the consequences of malicious attacks. Kali includes one of the most comprehensive selection of tools for IT security professionals - from tools for testing web applications and wireless network penetration to programs for reading data from RFID ID chips.

The kit includes a collection of exploits and more than 300 specialized security verification utilities, like Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, p0f. In addition, the distribution kit includes tools to accelerate the selection of passwords (Multihash CUDA Brute Forcer) and WPA keys (Pyrit) by using CUDA and AMD Stream technologies, which allow you to use the GPU of NVIDIA and AMD video cards. to perform computer operations.

What's new in Kali Linux 2020.1?

With the release of this new version, by default the job is provided under a non-privileged user (since previously all operations were performed as root).

  • Besides that the system access credentials were changed, as previously instead of user: root
  • pass: toor

The following are now used:

  • user: kali
  • pass: kali

Also, regarding the different compilations of Kali with their own desks, now a single universal installation image is proposed with the ability to choose a desk that the user will choose according to their taste.

Of the options offered, we can find XFCE, Gnome, KDE, Matte, LXQT. In total, three universal images are now offered: a full installation, a live version, and a minimal image for installation over the network.

Of the other changes that stand out of this new version:

  • Changed the appearance of the graphical installer.
  • For Gnome, a new design theme is available, available in dark and light versions.
  • New icons have been added for included apps.
  • Kali Undercover mode has been optimized, simulating the Windows layout, so as not to arouse suspicion when working with Kali in public places.
  • The composition includes new utilities cloud-enum, emailharvester, phpggc, sherlock and splinter.
  • Removed utilities that require Python 2 to work.

At the same time, NetHunter 2020.1 release prepared, an environment for mobile devices based on the Android platform with a selection of tools to test systems for vulnerabilities.

With NetHunter, it is possible to verify the implementation of specific attacks for mobile devicess, for example, emulating the operation of USB devices (BadUSB and HID keyboard, emulating a USB network adapter that can be used for MITM attacks or a USB keyboard that performs character substitution).

As well as being able to create rogue access points (MANA Malicious Access Point) NetHunter installs on a standard Android platform environment in the form of a chroot image running a specially adapted version of Kali Linux.

A key upgrade at launch by NetHunter 2020.1 It is the preparation of the Rootless edition, which does not require root access on the device.

Download and get Kali Linux 2020.1

For those who are interested in being able to test or directly install the new version of the distro on their computers, they should know that they can download a full ISO image (2.7 GB) or a reduced image (2 GB) which already are available for download on the official website of the distribution.

Builds are available for x86, x86_64, ARM architectures (armhf and armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid). In addition to the basic compilation with Gnome and a reduced version, variants are offered with Xfce, KDE, MATE, LXDE and Enlightenment e17.

Finally yes You are already a Kali Linux user, you just have to go to your terminal and execute the following command that will be in charge of updating your system, so it is necessary to be connected to the network to be able to carry out this process.

apt update && apt full-upgrade


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Robert Diaz said

    This version was labyrinthine for me because it is not possible to choose the language and I prefer the previous aesthetic

  2.   Thomas said

    Totally false, does not start with kali / kali