I-Kali Linux 2022.1 Security Research Distribution Ikhishiwe

Ukukhishwa kwekhithi yokusabalalisa ye-Kali Linux 2022.1 yethulwe, yakhelwe amasistimu okuhlola ubungozi, ukwenza ukucwaninga, ukuhlaziya imininingwane eyinsalela kanye nokuhlonza imiphumela yokuhlaselwa ngabahlaseli. Konke ukuthuthukiswa kwangempela okudalwe ngaphakathi kwekhithi yokusabalalisa kusakazwa ngaphansi kwelayisensi ye-GPL futhi kutholakala endaweni yokugcina ye-Git yomphakathi. Izinguqulo ezimbalwa zezithombe ze-iso zilungiselelwe ukudawuniloda, osayizi 471 MB, 2.8 GB, 3.5 GB kanye no-9.4 GB. Izakhiwo ziyatholakala ku-i386, x86_64, izakhiwo ze-ARM (i-armhf ne-armel, i-Raspberry Pi, i-Banana Pi, i-ARM Chromebook, i-Odroid). Ideskithophu ye-Xfce inikezwa ngokuzenzakalelayo, kodwa i-KDE, i-GNOME, i-MATE, i-LXDE ne-Enlightenment e17 zisekelwa ngokuzithandela.

I-Kali ihlanganisa iqoqo eliphelele kakhulu lamathuluzi ochwepheshe bezokuphepha bekhompyutha, kusukela ekuhlolweni kohlelo lokusebenza lwewebhu nokuhlola ukungena kwenethiwekhi okungenantambo kuya kumfundi we-RFID. Ikhithi ihlanganisa iqoqo lokuxhaphaza kanye namathuluzi okuvikela akhethekile angaphezu kuka-300 njenge-Aircrack, i-Maltego, i-SAINT, i-Kismet, i-Bluebugger, i-Btcrack, i-Btscanner, i-Nmap, i-p0f. Ngaphezu kwalokho, ikhithi yokusabalalisa ihlanganisa amathuluzi okusheshisa ukuqagela iphasiwedi (Multihash CUDA Brute Forcer) kanye nokhiye be-WPA (Pyrit) ngokusebenzisa ubuchwepheshe be-CUDA kanye ne-AMD Stream, okuvumela ukusebenzisa ama-GPU asuka kumakhadi wevidiyo e-NVIDIA ne-AMD ukwenza imisebenzi yekhompyutha.

Ekukhishweni okusha:

  • Idizayini yenqubo yokuqalisa, isikrini sokungena ngemvume nesifaki kubuyekeziwe.
    I-Kali Linux 2022.1 Security Research Distribution Ikhishiwe
  • Imenyu yokuqalisa isiklanywe kabusha. Izinketho zemenyu yokuqalisa zihlanganisiwe kumasistimu ane-UEFI ne-BIOS, kanye nezinketho zezithombe ze-iso (isifaki, bukhoma ne-netinstall).
    I-Kali Linux 2022.1 Security Research Distribution Ikhishiwe
  • Kuphakanyiswe amaphephadonga amasha edeskithophu anezimpawu zokusabalalisa.
    I-Kali Linux 2022.1 Security Research Distribution Ikhishiwe
  • I-zsh shell prompt yenziwe yaba ngeyesimanjemanje. Ngokuzenzakalelayo, okungeziwe kufihla ulwazi mayelana namakhodi okubuyisela kanye nenani lezinqubo zangemuva ezingase ziphazamise umsebenzi. Uma usebenzisa amalungelo ezimpande, isithonjana γ‰Ώ sisetshenziswa esikhundleni sika-πŸ’€.
    I-Kali Linux 2022.1 Security Research Distribution Ikhishiwe
  • Ikhasi eliboniswe ngokuzenzakalelayo esipheqululini lakhiwe kabusha, lapho izixhumanisi zemibhalo nezinsiza zengezwe, nomsebenzi wokusesha usuqalisiwe.
    I-Kali Linux 2022.1 Security Research Distribution Ikhishiwe
  • Kwengezwe ukwakheka okuphelele kwe-"kali-linux-everything", okufaka wonke amaphakheji atholakalayo (ngaphandle kwe-Kaboxer) okufakwa kuwo ngokwawo kumasistimu ngaphandle koxhumano lwenethiwekhi. Usayizi wokwakha ungu-9.4 GB futhi utholakala kuphela ukuze ulandwe nge-BitTorrent.
  • Insiza ye-kali-tweaks inikezela ngesigaba esisha esithi "Ukuqina", ongashintsha ngaso amapharamitha weklayenti le-SSH ukuze ukwandise ukuhambisana namasistimu amadala (buyisela ukusekelwa kwama-algorithms amadala nama-ciphers).
    I-Kali Linux 2022.1 Security Research Distribution Ikhishiwe
  • Ukusebenzisana okuthuthukisiwe nezinkundla ze-VMware zokubona lapho usebenzisa i-Kali kusivakashi usebenzisa ideskithophu esekelwe ku-i3 (kali-desktop-i3). Ezimweni ezinjalo, usekelo lwebhodi lokunamathisela nesixhumi esibonakalayo sokudonsa udedele kunikwe amandla ngokuzenzakalela.
  • I-synthesizer yenkulumo ibuyiselwe eqenjini elikhulu ukuze lihlele umsebenzi wabantu abayizimpumputhe.
  • Kwengezwe izinsiza ezintsha:
    • I-dnsx iyikhithi yamathuluzi ye-DNS ekuvumela ukuthi uthumele imibuzo kumaseva amaningi e-DNS ngesikhathi esisodwa.
    • I-imeyili2phonenumber iyinsiza ye-OSINT yokunquma inombolo yocingo nge-imeyili ngokuhlaziya ulwazi lomsebenzisi olutholakala emithonjeni evulekile.
    • I-naabu iyinsiza elula yokuskena imbobo.
    • I-nuclei iyisistimu yokuskena yenethiwekhi esekela izifanekiso.
    • I-PoshC2 iwuhlaka lokuhlela ukuphathwa kusuka kumaseva e-Command & Control (C2), esekela umsebenzi ngommeleli.
    • I-proxify ingummeleli we-HTTP/HTTPS okuvumela ukuthi ubambe futhi ulawule ithrafikhi.
  • Amaphakheji we-feroxbuster kanye ne-ghidra angeziwe emibuthanweni yokwakhiwa kwe-ARM. Izinkinga ngokusebenza kwe-Bluetooth kumabhodi we-Raspberry Pi sezixazululiwe.
  • Ngesikhathi esifanayo, ukukhishwa kwe-NetHunter 2022.1, indawo yamadivayisi eselula esekelwe kuplathifomu ye-Android enokukhethwa kwamathuluzi okuhlola amasistimu okuba sengozini, kulungisiwe. Usebenzisa i-NetHunter, kungenzeka ukuhlola ukuqaliswa kokuhlasela okuqondene namadivayisi eselula, ngokwesibonelo, ngokulingisa ukusebenza kwemishini ye-USB (i-BadUSB ne-HID Keyboard - ukulingisa i-adaptha yenethiwekhi ye-USB engasetshenziselwa ukuhlasela kwe-MITM, noma Ikhibhodi ye-USB eyenza uhlamvu esikhundleni) nokudala izindawo zokufinyelela eziyidumi (MANA Evil Access Point). I-NetHunter ifakwe endaweni ejwayelekile yesikhulumi se-Android ngesimo sesithombe se-chroot, esisebenzisa inguqulo eguqulelwe ngokukhethekile ye-Kali Linux.

Source: opennet.ru

Engeza amazwana