Ukukhishwa kwekhithi yokusabalalisa yocwaningo lwezokuphepha i-Kali Linux 2021.3

Ukukhishwa kwekhithi yokusabalalisa ye-Kali Linux 2021.3 kukhishiwe, eyenzelwe amasistimu okuhlola ubungozi, ukwenza ukucwaninga, ukuhlaziya imininingwane eyinsalela kanye nokuhlonza imiphumela yokuhlaselwa ngabahlaseli. Konke ukuthuthukiswa kwasekuqaleni okudalwe njengengxenye yokusabalalisa kusatshalaliswa ngaphansi kwelayisense ye-GPL futhi kutholakala endaweni yokugcina ye-Git yomphakathi. Izinguqulo ezimbalwa zezithombe ze-iso sezilungiselelwe ukudawuniloda, osayizi 380 MB, 3.8 GB kanye no-4.6 GB. Izakhiwo ziyatholakala ku-x86, x86_64, izakhiwo ze-ARM (i-armhf ne-armel, i-Raspberry Pi, i-Banana Pi, i-ARM Chromebook, i-Odroid). Ideskithophu ye-Xfce inikezwa ngokuzenzakalelayo, kodwa i-KDE, i-GNOME, i-MATE, i-LXDE ne-Enlightenment e17 zisekelwa ngokuzithandela.

I-Kali ihlanganisa iqoqo eliphelele kakhulu lamathuluzi ochwepheshe bezokuphepha bekhompyutha, kusukela ekuhlolweni kohlelo lokusebenza lwewebhu nokuhlola ukungena kwenethiwekhi okungenantambo kuya kumfundi we-RFID. Ikhithi ihlanganisa iqoqo lokuxhaphaza kanye namathuluzi okuvikela akhethekile angaphezu kuka-300 njenge-Aircrack, i-Maltego, i-SAINT, i-Kismet, i-Bluebugger, i-Btcrack, i-Btscanner, i-Nmap, i-p0f. Ngaphezu kwalokho, ikhithi yokusabalalisa ihlanganisa amathuluzi okusheshisa ukuqagela iphasiwedi (Multihash CUDA Brute Forcer) kanye nokhiye be-WPA (Pyrit) ngokusebenzisa ubuchwepheshe be-CUDA kanye ne-AMD Stream, okuvumela ukusebenzisa ama-GPU asuka kumakhadi wevidiyo e-NVIDIA ne-AMD ukwenza imisebenzi yekhompyutha.

Ekukhishweni okusha:

  • Izilungiselelo ze-OpenSSL zishintshiwe ukuze kutholwe ukusebenzisana okuphezulu kakhulu okungakhona, okuhlanganisa ukubuyisela ukusekelwa kwezivumelwano zefa nama-algorithms ngokuzenzakalelayo, okuhlanganisa i-TLS 1.0 ne-TLS 1.1. Ukuze ukhubaze ama-algorithms aphelelwe yisikhathi, ungasebenzisa insiza ye-kali-tweaks (Ukuqina/Ukuphepha Okuqinile).
  • Ingxenye ye-Kali-Tools yethulwe kuwebhusayithi yephrojekthi ngokukhethwa kolwazi mayelana nezinsiza ezitholakalayo.
  • Umsebenzi weseshini ebukhoma ngaphansi kokulawulwa kwezinhlelo ze-virtualization i-VMware, i-VirtualBox, i-Hyper-V ne-QEMU+Spice uthuthukisiwe, isibonelo, amandla okusebenzisa ibhodi lokunamathisela elilodwa elinohlelo lomsingathi kanye nokusekelwa kwesixhumi esibonakalayo sokudonsa nokwehlisa kwengezwe. Izilungiselelo eziqondene nohlelo ngalunye lwe-virtualization zingashintshwa kusetshenziswa insiza ye-kali-tweaks (isigaba se-Virtualization).
  • Kwengezwe izinsiza ezintsha:
    • I-Berate_ap - idala izindawo zokufinyelela ezingenantambo ezingenantambo.
    • I-CALDERA ilingisa umsebenzi womhlaseli.
    • I-EAHammer - yenza ukuhlasela kumanethiwekhi e-Wi-Fi nge-WPA2-Enterprise.
    • I-HostHunter - ukuhlonza ababungazi abasebenzayo kunethiwekhi.
    • I-RouterKeygenPC - idala okhiye be-WPA/WEP Wi-Fi.
    • I-Subjack - ithwebula izizinda ezingaphansi.
    • I-WPA_Sycophant iwukusebenzisa iklayenti ekwenzeni ukuhlasela kwe-EAP Relay.
  • Ideskithophu ye-KDE ibuyekeziwe ukuze ikhulule i-5.21.
  • Ukusekelwa okuthuthukisiwe kwe-Raspberry Pi, i-Pinebook Pro namadivayisi ahlukahlukene e-ARM.
  • I-TicHunter Pro isilungisiwe - inguqulo ye-NetHunter ye-smartwatch ye-TicWatch Pro. I-NetHunter ihlinzeka ngendawo yamadivayisi eselula ngokususelwe kunkundla ye-Android ngamathuluzi akhethiwe okuhlola amasistimu okuba sengozini. Usebenzisa i-NetHunter, kungenzeka ukuhlola ukuqaliswa kokuhlasela okuqondene namadivayisi eselula, ngokwesibonelo, ngokulingisa ukusebenza kwemishini ye-USB (i-BadUSB ne-HID Keyboard - ukulingisa i-adaptha yenethiwekhi ye-USB engasetshenziselwa ukuhlasela kwe-MITM, noma Ikhibhodi ye-USB eyenza uhlamvu esikhundleni) nokudala izindawo zokufinyelela eziyidumi (MANA Evil Access Point). I-NetHunter ifakwe endaweni ejwayelekile yesikhulumi se-Android ngesimo sesithombe se-chroot, esisebenzisa inguqulo eguqulelwe ngokukhethekile ye-Kali Linux.

Source: opennet.ru

Engeza amazwana