Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.2 Security Research Distribution

Hōʻike ʻia ka hoʻokuʻu ʻana o ka pahu hāʻawi Kali Linux 2022.2, i hoʻolālā ʻia e hoʻāʻo i nā ʻōnaehana no nā nāwaliwali, e hana i kahi loiloi, e nānā i nā ʻike koena a ʻike i nā hopena o ka hoʻouka kaua. Hoʻokaʻawale ʻia nā hoʻomohala kumu āpau i hana ʻia i loko o ka hāʻawi ʻana ma lalo o ka laikini GPL a loaʻa iā ia ma o kahi waihona Git lehulehu. Ua hoʻomākaukau ʻia nā ʻano like ʻole o nā kiʻi iso no ka hoʻoiho ʻana, 471 MB, 2.8 GB, 3.5 GB a me 9.4 GB ka nui. Loaʻa nā hale kūkulu no i386, x86_64, ARM architectures (armhf a me armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid). Hāʻawi ʻia ka pākaukau Xfce ma ke ʻano maʻamau, akā kākoʻo ʻia ʻo KDE, GNOME, MATE, LXDE, a me Enlightenment e17.

Loaʻa ʻo Kali i kekahi o nā hōʻiliʻili piha loa o nā mea hana no ka poʻe loea palekana kamepiula, mai ka hoʻāʻo ʻana i ka noi pūnaewele a me ka hoʻāʻo ʻana i ke komo ʻana i ka pūnaewele RFID. Aia i loko o ka pahu kahi hōʻiliʻili o nā hana a ʻoi aku ma mua o 300 mau mea palekana kūikawā e like me Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, p0f. Eia kekahi, ʻo ka puʻupuʻu puʻupuʻu me nā mea hana no ka wikiwiki ʻana i ka ʻōlelo huna (Multihash CUDA Brute Forcer) a me nā kī WPA (Pyrit) ma o ka hoʻohana ʻana i nā ʻenehana CUDA a me AMD Stream, e ʻae ai i ka hoʻohana ʻana i nā GPU mai nā kāleka wikiō NVIDIA a me AMD e hana i nā hana helu.

I ka hoʻokuʻu hou:

  • Ua hoʻonui hou ʻia ka mea hoʻohana GNOME e hoʻokuʻu i ka 42. Ua hiki ke hoʻokuʻu hou ʻia o ka panel dash-to-dock. Hōʻano hou ʻia nā kumumanaʻo māmā a ʻeleʻele.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.2 Security Research Distribution
  • Ua hōʻano hou ʻia ka papa KDE Plasma i ka mana 5.24.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.2 Security Research Distribution
  • Hāʻawi ka Xfce Tweaks pono i ka hiki ke hiki i kahi papa maʻalahi hou no nā mea ARM, ʻaʻole like me ka panel Xfce maʻamau, kūpono i nā pale liʻiliʻi haʻahaʻa haʻahaʻa (no ka laʻana, 800x480).
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.2 Security Research Distribution
  • Ua hoʻohui ʻia nā kiʻi hou no nā polokalamu evil-winrm a me bloodhound, a ua hōʻano hou ʻia nā kiʻi no nmap, ffuf a me edb-debugger. Hāʻawi ʻo KDE a me GNOME i kā lākou mau kiʻi ponoʻī no nā noi GUI kūikawā.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.2 Security Research Distribution
  • Hoʻohana ʻia ke kope kope ʻakomi o nā faila hoʻonohonoho kumu mai ka papa kuhikuhi /etc/skel i ka papa kuhikuhi home, akā me ka hoʻololi ʻole ʻana i nā faila.
  • Ua hoʻonui ʻia nā mana e pili ana i ka hana ʻana i ka console. ʻO nā pūʻolo i hoʻokomo ʻia he python3-pip a me python3-virtualenv. Ua hoʻololi iki ʻia ka hōʻailona hōʻailona no zsh. Hoʻohui ʻia ka hoʻopau ʻana i nā koho no John The Ripper. Hoʻokomo ʻia ka hōʻike ʻana i nā ʻano faila i nā pūʻolo waiwai (nā papa inoa, windows-resources, powersploit).
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.2 Security Research Distribution
  • Hoʻohui ʻia nā mea hana no ka hana ʻana me nā kiʻi paʻi ma ka ʻōnaehana faila Btrfs. Hiki ke hana i nā kiʻi paʻi kiʻi, loiloi i nā ʻokoʻa ma waena o nā kiʻi paʻi kiʻi, e nānā i nā mea o nā kiʻi paʻi kiʻi, a hana maʻalahi i nā kiʻi paʻi.
  • Hoʻohui ʻia nā pono hana hou:
    • He polokalamu ʻo BruteShark no ka nānā ʻana i ka ʻoihana pūnaewele a me ka hōʻike ʻana i nā ʻikepili koʻikoʻi e like me nā ʻōlelo huna.
    • Evil-WinRM - WinRM shell.
    • ʻO Hakrawler kahi bot hulina no ka ʻike ʻana i nā helu komo a me nā kumuwaiwai.
    • ʻO Httpx kahi mea hana no HTTP.
    • LAPSDumper - mālama i nā ʻōlelo huna LAPS (Local Administrator Password Solution).
    • ʻO PhpSploit kahi hoʻolālā no ka hoʻonohonoho ʻana i nā logins mamao.
    • PEDump - hana i kahi waihona o nā faila hoʻokō Win32.
    • He honeypot ʻo SentryPeer no VoIP.
    • ʻO Sparrow-wifi kahi mea nānā Wi-Fi.
    • ʻO wifipumpkin3 kahi papa hana no ka hana ʻana i nā wahi komo dummy.
  • Ua hōʻano hou ʻia ka hana Win-Kex (Windows + Kali Desktop EXperience), i hoʻolālā ʻia e holo ma Windows ma kahi WSL2 (Windows Subsystem for Linux). Hāʻawi i ka hiki ke holo i nā noi GUI me nā kuleana kumu me ka hoʻohana ʻana i sudo.
  • Ma ka manawa like, ua hoʻomākaukau ʻia ka hoʻokuʻu ʻana o NetHunter 2022.2, kahi kaiapuni no nā polokalamu kelepona e pili ana i ka platform Android me kahi koho o nā mea hana no ka hoʻāʻo ʻana i nā ʻōnaehana no nā nāwaliwali. Ke hoʻohana nei iā NetHunter, hiki ke nānā i ka hoʻokō ʻana i nā hoʻouka ʻana i nā polokalamu kelepona, no ka laʻana, ma o ka hoʻohālikelike ʻana i ka hana o nā polokalamu USB (BadUSB a me HID Keyboard - emulation o kahi USB network adapter hiki ke hoʻohana ʻia no ka hoʻouka ʻana o MITM, a i ʻole ʻO ka keyboard USB e hana ana i ka hoʻololi ʻana i ke ʻano) a me ka hoʻokumu ʻana i nā wahi komo dummy (MANA Evil Access Point). Hoʻokomo ʻia ʻo NetHunter i ke kaiapuni maʻamau o ka platform Android ma ke ʻano o kahi kiʻi chroot, e holo ana i kahi mana kūikawā o Kali Linux. Hāʻawi ka mana hou i kahi pā WPS Attacks hou, e hiki ai iā ʻoe ke hoʻohana i ka palapala OneShot e hoʻokō i nā hoʻouka like ʻole ma WPS.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.2 Security Research Distribution

Source: opennet.ru

Pākuʻi i ka manaʻo hoʻopuka