1Kali Linux 2.0 Moves to Rolling Releases, Gains More Security Tools
A new release of the widely used Linux security distribution gets a major upgrade that features rolling updates.
2Kali Linux 2.0 Sports a GNOME 3 Interface
Kali Linux 2.0 provides users with multiple options for a desktop environment, with GNOME 3 as the default choice.
3Kali Linux Is Now a Rolling Release
The development process behind Kali is now changing, with the Linux distribution moving to a rolling release mode of continuous updates.
4Multiple Types of Security Tools Are Included
What makes Kali Linux particularly powerful is its comprehensive list of integrated security tools that enable researchers and penetration testers to audit, analyze and test.
5Metasploit No Longer Packaged in Kali by Rapid7
Among the popular tools in Kali is the Metasploit penetration testing framework. Metapsloit, a freely available open-source project, also is backed by commercial tools from security vendor Rapid7. Prior to Kali Linux 2.0, Rapid7 maintained the Metasploit packages in Kali Linux.
6Armitage Throws a Hail Mary
Armitage is an attack management tool for Metasploit. Among its many features is a “Hail Mary” tool that will launch a flood of exploits against a target.
7Burp Suite Enables Web Application Testing
Kali Linux 2.0 includes the free edition of Burp Suite that provides researchers with an integrated platform of Web application security testing capabilities.
8BeEF Provides Browser Exploitation Tools
The Browser Exploitation Framework (BeEF) project, which is included in Kali Linux 2.0, is all about browser security.
9Maltego Helps Make Sense of Data
In a typical penetration testing exercise, a security researcher can find lots of information and data. Helping to make sense of that data is the Maltego open-source forensics and intelligence application.
10Kali Includes Multiple Password Attack Tools
For many applications, the password is quite literally the key to access and often the weakest link as well. To that end, Kali Linux includes multiple types of password attack tools to help penetration testers validate password security.
11Be Good When Using Social-Engineer Toolkit
The Social Engineer Toolkit (SET) is a platform to help security researchers test social engineering attacks, but only when done in a lawful manner. The terms of services specifically state that “the Social-Engineer Toolkit is designed purely for good and not evil.”
12Integrated Screen Recorder Is Included
Often security researchers will want to record their efforts to replay and demonstrate to others. That becomes a one-click exercise with the integrated screen recorder in Kali Linux 2.0.
AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...