I-Kali Linux 2022.2 Security Research Distribution Ikhishiwe

Ukukhishwa kwekhithi yokusabalalisa ye-Kali Linux 2022.2 yethulwe, yakhelwe amasistimu okuhlola ubungozi, ukwenza ukucwaninga, ukuhlaziya imininingwane eyinsalela kanye nokuhlonza imiphumela yokuhlaselwa ngabahlaseli. Konke ukuthuthukiswa kwangempela okudalwe ngaphakathi kwekhithi yokusabalalisa kusakazwa ngaphansi kwelayisensi ye-GPL futhi kutholakala endaweni yokugcina ye-Git yomphakathi. Izinguqulo ezimbalwa zezithombe ze-iso zilungiselelwe ukudawuniloda, osayizi 471 MB, 2.8 GB, 3.5 GB kanye no-9.4 GB. Izakhiwo ziyatholakala ku-i386, x86_64, izakhiwo ze-ARM (i-armhf ne-armel, i-Raspberry Pi, i-Banana Pi, i-ARM Chromebook, i-Odroid). Ideskithophu ye-Xfce inikezwa ngokuzenzakalelayo, kodwa i-KDE, i-GNOME, i-MATE, i-LXDE ne-Enlightenment e17 zisekelwa ngokuzithandela.

I-Kali ihlanganisa iqoqo eliphelele kakhulu lamathuluzi ochwepheshe bezokuphepha bekhompyutha, kusukela ekuhlolweni kohlelo lokusebenza lwewebhu nokuhlola ukungena kwenethiwekhi okungenantambo kuya kumfundi we-RFID. Ikhithi ihlanganisa iqoqo lokuxhaphaza kanye namathuluzi okuvikela akhethekile angaphezu kuka-300 njenge-Aircrack, i-Maltego, i-SAINT, i-Kismet, i-Bluebugger, i-Btcrack, i-Btscanner, i-Nmap, i-p0f. Ngaphezu kwalokho, ikhithi yokusabalalisa ihlanganisa amathuluzi okusheshisa ukuqagela iphasiwedi (Multihash CUDA Brute Forcer) kanye nokhiye be-WPA (Pyrit) ngokusebenzisa ubuchwepheshe be-CUDA kanye ne-AMD Stream, okuvumela ukusebenzisa ama-GPU asuka kumakhadi wevidiyo e-NVIDIA ne-AMD ukwenza imisebenzi yekhompyutha.

Ekukhishweni okusha:

  • Indawo yomsebenzisi we-GNOME ibuyekeziwe ukuze kukhishwe 42. Ukukhishwa okusha kwephaneli yedeshi-to-dokhi kunikwe amandla. Kubuyekezwe amatimu akhanyayo namnyama.
    I-Kali Linux 2022.2 Security Research Distribution Ikhishiwe
  • Ideskithophu ye-KDE Plasma ibuyekeziwe yaba yinguqulo engu-5.24.
    I-Kali Linux 2022.2 Security Research Distribution Ikhishiwe
  • Insiza ye-Xfce Tweaks inikeza amandla okunika amandla iphaneli entsha eyenziwe lula yamadivayisi e-ARM, okuthi, ngokungafani nephaneli ye-Xfce evamile, ilingane nezikrini ezincane zokulungiswa okuphansi (ngokwesibonelo, 800x480).
    I-Kali Linux 2022.2 Security Research Distribution Ikhishiwe
  • Izithonjana ezintsha zengezwe ezinhlelweni ze- evil-winrm kanye ne-bloodhound, futhi izithonjana ze-nmap, i-ffuf ne-edb-debugger zibuyekeziwe. I-KDE ne-GNOME zihlinzeka ngezithonjana zazo zezinhlelo zokusebenza ezikhethekile ze-GUI.
    I-Kali Linux 2022.2 Security Research Distribution Ikhishiwe
  • Kunikwe amandla ukukopishwa okuzenzakalelayo kwamafayela okumisa ayisisekelo ukusuka kuhla lwemibhalo /etc/skel kuya kumkhombandlela wasekhaya, kodwa ngaphandle kokufaka amafayela akhona.
  • Amakhono ahlobene nokusebenza kukhonsoli anwetshiwe. Amaphakheji afakiwe yi-python3-pip ne-python3-virtualenv. Ukugqamisa i-syntax ye-zsh kushintshiwe kancane. Kungezwe ukuqedela ngokuzenzakalela kwezinketho zika-John The Ripper. Ukugqamisa okusetshenzisiwe kwezinhlobo zamafayela kumaphakheji wensiza (uhlu lwamagama, windows-resources, powersploit).
    I-Kali Linux 2022.2 Security Research Distribution Ikhishiwe
  • Amathuluzi angeziwe okusebenza ngezifinyezo ohlelweni lwefayela le-Btrfs. Kungenzeka ukwenza izifinyezo ze-boot, uhlole umehluko phakathi kwezifinyezo, ubuke okuqukethwe kwezifinyezo futhi udale ngokuzenzakalelayo izifinyezo.
  • Kwengezwe izinsiza ezintsha:
    • I-BruteShark iwuhlelo lokuhlola ithrafikhi yenethiwekhi nokugqamisa idatha ebucayi njengamaphasiwedi.
    • I-Evil-WinRM - igobolondo le-WinRM.
    • I-Hakrawler iyi-bot yokusesha yokuhlonza izindawo zokungena nezisetshenziswa.
    • I-Httpx iyikhithi yamathuluzi ye-HTTP.
    • I-LAPSDumper - igcina amaphasiwedi e-LAPS (Isixazululo Sephasiwedi Yomlawuli Wendawo).
    • I-PhpSploit iwuhlaka lokuhlela ukungena ngemvume okukude.
    • I-PEDump - idala ukulahlwa kwamafayela asebenzisekayo we-Win32.
    • I-SentryPeer iyi-honeypot ye-VoIP.
    • I-Sparrow-wifi iyisihlaziyi se-Wi-Fi.
    • i-wifipumpkin3 iwuhlaka lokudala izindawo zokufinyelela eziyizidumi.
  • I-Win-Kex build (I-Windows + Kali Desktop EXperience) ibuyekeziwe, yakhelwe ukusebenza ku-Windows endaweni ye-WSL2 (Windows Subsystem for Linux). Kunikezwe amandla okusebenzisa izinhlelo zokusebenza ze-GUI ngamalungelo ezimpande usebenzisa i-sudo.
  • Ngesikhathi esifanayo, ukukhishwa kwe-NetHunter 2022.2, indawo yamadivayisi eselula esekelwe kunkundla ye-Android enokukhethwa kwamathuluzi okuhlola amasistimu okulimala, kulungisiwe. Usebenzisa i-NetHunter, kungenzeka ukuhlola ukuqaliswa kokuhlasela okuqondene namadivayisi eselula, ngokwesibonelo, ngokulingisa ukusebenza kwemishini ye-USB (i-BadUSB ne-HID Keyboard - ukulingisa i-adaptha yenethiwekhi ye-USB engasetshenziselwa ukuhlasela kwe-MITM, noma Ikhibhodi ye-USB eyenza uhlamvu esikhundleni) nokudala izindawo zokufinyelela eziyidumi (MANA Evil Access Point). I-NetHunter ifakwe endaweni evamile yesikhulumi se-Android ngendlela yesithombe se-chroot, esebenzisa inguqulo eguqulelwe ngokukhethekile ye-Kali Linux. Inguqulo entsha inikeza ithebhu entsha ye-WPS Attacks, ekuvumela ukuthi usebenzise umbhalo we-OneShot ukuze wenze ukuhlasela okuhlukahlukene ku-WPS.
    I-Kali Linux 2022.2 Security Research Distribution Ikhishiwe

Source: opennet.ru

Engeza amazwana