Ua hoʻokuʻu ʻia ʻo Kali Linux 2021.4 Security Research Distribution

Ua hoʻokuʻu ʻia ka hoʻokuʻu ʻana o ka pahu hoʻolaha Kali Linux 2021.4, i hoʻolālā ʻia no ka hoʻāʻo ʻana i nā ʻōnaehana no nā nāwaliwali, ke alakaʻi ʻana i nā loiloi, ka nānā ʻana i nā ʻike koena a me ka ʻike ʻana i nā hopena o ka hoʻouka ʻana e nā mea komo. Hāʻawi ʻia nā mea hoʻomohala kumu āpau i hana ʻia i loko o ka pahu hoʻolaha ma lalo o ka laikini GPL a loaʻa iā ia ma o ka waihona Git lehulehu. Ua hoʻomākaukau ʻia kekahi mau mana o nā kiʻi iso no ka hoʻoiho ʻana, nā nui 466 MB, 3.1 GB a me 3.7 GB. Loaʻa nā hale kūkulu no i386, x86_64, ARM architectures (armhf a me armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid). Hāʻawi ʻia ka pākaukau Xfce ma ka paʻamau, akā kākoʻo ʻia ʻo KDE, GNOME, MATE, LXDE a me Enlightenment e17.

Loaʻa ʻo Kali i kekahi o nā hōʻiliʻili piha loa o nā mea hana no ka poʻe loea palekana kamepiula, mai ka hoʻāʻo ʻana i ka noi pūnaewele a me ka hoʻāʻo ʻana i ke komo ʻana i ka pūnaewele RFID. Aia i loko o ka pahu kahi hōʻiliʻili o nā hana a ʻoi aku ma mua o 300 mau mea palekana kūikawā e like me Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, p0f. Eia kekahi, ʻo ka puʻupuʻu puʻupuʻu me nā mea hana no ka wikiwiki ʻana i ka ʻōlelo huna (Multihash CUDA Brute Forcer) a me nā kī WPA (Pyrit) ma o ka hoʻohana ʻana i nā ʻenehana CUDA a me AMD Stream, e ʻae ai i ka hoʻohana ʻana i nā GPU mai nā kāleka wikiō NVIDIA a me AMD e hana i nā hana helu.

I ka hoʻokuʻu hou:

  • Ua hoʻonohonoho hou ʻia ka mea kūʻai aku ʻo Samba e launa pū me kekahi kikowaena Samba, me ka nānā ʻole i ke koho protocol i koho ʻia ma ke kikowaena, e maʻalahi ka ʻike ʻana i nā kikowaena Samba palupalu ma ka pūnaewele. Hiki ke hoʻololi ʻia ke ʻano hoʻohālikelike me ka hoʻohana ʻana i ka pono kali-tweaks.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2021.4 Security Research Distribution
  • I nā kali-tweaks, i nā hoʻonohonoho aniani, hiki ke wikiwiki i ka hāʻawi ʻana i nā mea hou me ka hoʻohana ʻana i ka pūnaewele hāʻawi ʻike CloudFlare.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2021.4 Security Research Distribution
  • Ua hoʻohui ʻo Kaboxer utility i ke kākoʻo no ka hoʻololi ʻana i nā kumumanaʻo a me nā hoʻonohonoho ikona, me ka hiki ke hoʻohana i kahi kumumanaʻo pouli.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2021.4 Security Research Distribution
  • Hoʻohui ʻia nā pono hana hou:
    • Dufflebag - e ʻimi i ka ʻike huna ma nā ʻāpana EBS;
    • ʻO Maryam kahi papa hana OSINT wehe;
    • Name-That-Hash - wehewehe o ke ʻano hash;
    • ʻO Proxmark3 - hoʻouka i nā hōʻailona RFID e hoʻohana ana i nā polokalamu Proxmark3;
    • Reverse Proxy Grapher - ke kūkulu ʻana i kahi kiʻikuhi o nā kahe ʻikepili ma o kahi koho hope;
    • S3Scanner - nānā i nā kaiapuni S3 i pale ʻole ʻia a hōʻike i kā lākou ʻike;
    • Spraykatz - wehe i nā hōʻoiaʻiʻo mai nā ʻōnaehana Windows a me Active Directory-based environment;
    • truffleHog - ka nānā ʻana i ka ʻikepili huna ma nā waihona Git;
    • Web of trust grapher (wotmate) - hoʻokō i ka PGP pathfinder.
  • Ua hōʻano hou ʻia nā mana o ka Xfce, GNOME 41 a me KDE Plasma 5.23 desktops, a ua hoʻohui ʻia ka hoʻolālā ʻana o nā pihi mana o ka puka makani ma nā papa like ʻole.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2021.4 Security Research Distribution
  • Ma Xfce, hoʻolālā ʻia ka hoʻonohonoho ʻana o nā mea i loko o ka panel e mālama i kahi ākea ākea. Ua hoʻohui ʻia nā widget no ka nānā ʻana i ka ukana CPU a me ka hōʻike ʻana i nā ʻāpana VPN i ka papa. He ʻano paʻakikī ko ka luna hana e hōʻike ana i nā kiʻi noiʻi wale nō. Ke nānā nei i nā ʻike o nā papapihi virtual, hōʻike ʻia nā pihi ma kahi o nā thumbnails.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2021.4 Security Research Distribution
  • Hoʻonui i ke kākoʻo no nā ʻōnaehana Apple e pili ana i ka chip M1 ARM.
  • I ka paʻi no nā ʻōnaehana ARM, ma ke ʻano maʻamau, ua hoʻohana ʻia ka ext4 FS no ka ʻāpana aʻa (ma kahi o ext3), ua hoʻohui ʻia ke kākoʻo no ka papa Raspberry Pi Zero 2 W, ua hoʻohui ʻia ka hiki ke hoʻomaka mai kahi USB drive no Raspberry. Ua hoʻokō ʻia nā papa Pi, a me ka hiki ke overclock i ke kaʻina hana i 2GHz no ka pona Pinebook Pro.
  • Ma ka manawa like, ua hoʻomākaukau ʻia ka hoʻokuʻu ʻana o NetHunter 2021.4, kahi kaiapuni no nā polokalamu kelepona e pili ana i ka platform Android me kahi koho o nā mea hana no ka hoʻāʻo ʻana i nā ʻōnaehana no nā nāwaliwali. Ke hoʻohana nei iā NetHunter, hiki ke nānā i ka hoʻokō ʻana i nā hoʻouka ʻana i nā polokalamu kelepona, no ka laʻana, ma o ka hoʻohālikelike ʻana i ka hana o nā polokalamu USB (BadUSB a me HID Keyboard - emulation o kahi USB network adapter hiki ke hoʻohana ʻia no ka hoʻouka ʻana o MITM, a i ʻole ʻO ka keyboard USB e hana ana i ka hoʻololi ʻana i ke ʻano) a me ka hoʻokumu ʻana i nā wahi komo dummy (MANA Evil Access Point). Hoʻokomo ʻia ʻo NetHunter i ke kaiapuni maʻamau o ka platform Android ma ke ʻano o kahi kiʻi chroot, e holo ana i kahi mana kūikawā o Kali Linux. Hoʻohui ka mana hou i ka Social-Engineer Toolkit a me ka module Spear Phishing Email Attack.

Source: opennet.ru

Pākuʻi i ka manaʻo hoʻopuka