Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.4 Security Research Distribution

Ua hōʻike ʻia ka hoʻokuʻu ʻana o ka pahu hāʻawi Kali Linux 2022.4, i hoʻokumu ʻia ma ke kumu o Debian a i hoʻolālā ʻia no ka hoʻāʻo ʻana i nā ʻōnaehana no nā nāwaliwali, ka loiloi, ka nānā ʻana i nā ʻike koena a me ka ʻike ʻana i nā hopena o ka hoʻouka kaua. Hoʻokaʻawale ʻia nā hoʻomohala kumu āpau i hana ʻia i loko o ka hāʻawi ʻana ma lalo o ka laikini GPL a loaʻa iā ia ma o kahi waihona Git lehulehu. Nui nā koho no nā kiʻi iso i hoʻomākaukau ʻia no ka hoʻoiho ʻana, 448 MB, 2.7 GB a me 3.8 GB ka nui. Loaʻa nā hale kūkulu no i386, x86_64, ARM architectures (armhf a me armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid). Hāʻawi ʻia ka pākaukau Xfce ma ke ʻano maʻamau, akā kākoʻo ʻia ʻo KDE, GNOME, MATE, LXDE, a me Enlightenment e17.

Loaʻa ʻo Kali i kekahi o nā hōʻiliʻili piha loa o nā mea hana no ka poʻe loea palekana kamepiula, mai ka hoʻāʻo ʻana i ka noi pūnaewele a me ka hoʻāʻo ʻana i ke komo ʻana i ka pūnaewele RFID. Aia i loko o ka pahu kahi hōʻiliʻili o nā hana a ʻoi aku ma mua o 300 mau mea palekana kūikawā e like me Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, p0f. Eia kekahi, ʻo ka puʻupuʻu puʻupuʻu me nā mea hana no ka wikiwiki ʻana i ka ʻōlelo huna (Multihash CUDA Brute Forcer) a me nā kī WPA (Pyrit) ma o ka hoʻohana ʻana i nā ʻenehana CUDA a me AMD Stream, e ʻae ai i ka hoʻohana ʻana i nā GPU mai nā kāleka wikiō NVIDIA a me AMD e hana i nā hana helu.

I ka hoʻokuʻu hou:

  • Ua hana ʻia nā kiʻi kaʻawale no QEMU i mea e maʻalahi ai ka hoʻohana ʻana iā Kali me Proxmox Virtual Environment, virt-manager a i ʻole libvirt. Hoʻohui i ke kākoʻo no libvirt i ka palapala kūkulu kali-vagrant.
  • Ua hoʻomākaukau ʻia kahi kūkulu hou no nā polokalamu kelepona ʻo Kali NetHunter Pro, i hoʻolālā ʻia ma ke ʻano he kiʻi ʻōnaehana no Pine64 PinePhone a me PinePhone Pro smartphones, a ʻo ia ka mana o Kali Linux 2 me kahi pūpū Phosh maʻamau.
  • Ua hoʻohui ʻo NetHunter, kahi kaiapuni kelepona Android me kahi hōʻiliʻili o nā mea hana hoʻāʻo nāwaliwali, ua hoʻohui i ke kākoʻo no nā chipsets Bluetooth i hoʻokomo ʻia. Ua hoʻohui ʻia ʻo OnePlus 12t, Pixel 6a 4g a me Realme 5 Pro smartphones i ka papa inoa o nā polokalamu Android 5 i kākoʻo ʻia.
  • Nā mana hou o GNOME 43 a me KDE Plasma 5.26 kaiapuni kiʻi.
    Ua hoʻokuʻu ʻia ʻo Kali Linux 2022.4 Security Research Distribution
  • Hoʻohui ʻia nā pono hana hou:
    • bloodhound.py - Hoʻopaʻa Python no BloodHound.
    • ʻO certipy kahi mea pono no ka nānā ʻana i nā lawelawe palapala palapala Active Directory.
    • ʻO hak5-wifi-coconut kahi mea hoʻohana-wahi hoʻohana no nā USB Wi-Fi adapters a me Hak5 Wi-Fi Coconut.
    • ldapdomaindump - E ʻohi i ka ʻike mai Active Directory ma o LDAP.
    • peass-ng - nā pono no ka ʻimi ʻana iā Linux, Windows a me macOS no nā nāwaliwali e alakaʻi i ka piʻi ʻana o ka pono.
    • ʻO rizin-cutter kahi kahua ʻenekinia hoʻohuli e pili ana i ka rizin.

    Source: opennet.ru

Pākuʻi i ka manaʻo hoʻopuka