Kali Linux 2020.4 released: New default shell, fresh tools, and more!
Offensive Security has released Kali Linux 2020.4, the latest version of its popular open source penetration testing platform. You can download it or upgrade to it.
Kali Linux 2020.4 changes
The changes in this version include:
ZSH is now Kali’s new default shell on desktop images and cloud, Bash remains the default shell for other platforms (ARM, containers, NetHunter, WSL) for the time being. Users can, of course, use that which they prefer, but be aware that, visually, Bash has been made to look more like ZSH.
Upon logging into a Kali terminal or console, users may be presented with a message from Kali developers that will point them to more information about that specific installation, in case they need it for troubleshooting. For example:
Kali Linux 2020.4 comes with a number of new tools:
- Metasploit Framework v6 (a tool for developing and executing exploits against remote target machines)
- CertGraph (a tool to crawl the graph of certificate Alternate Names)
- Apple bleee (a tool for getting info about nearby iPhones – device name, OS version, phone number, etc. – by sniffing Bluetooth traffic)
- dnscat2 (a tool for creating an encrypted C&C channel over DNS)
- FinalRecon (an automatic web reconnaissance tool)
- goDoH (a Command and Control framework that uses DNS-over-HTTPS)
- hostapd-mana (a rogue access point)
- Whatmask (a program that helps with network settings)
Kali NetHunter, the distro’s mobile pentesting platform, has a new settings menu for easier back up and restore of configuration files, and a module that ensures persistence of the Magisk Android rooting system.
Win-KeX 2.5, which provides a Kali Desktop Experience for Windows Subsystem for Linux, comes with a new Enhanced Session Mode for ARM devices and a few other tweaks.
Helping the developer community
Finally, Offensive Security is partnering with Marcello Salvati, the creator of the CrackMapExec, to deliver new updates exclusively to Kali Linux for a 30 day period (as the author has moved to a sponsorware model).
The goal of the partnership is to, according to Salvati, “help improve the status quo of the Open Source Infosec/Hacking tool developer community with the end goal of actually making it sustainable through a number of experiments.” The company is also looking for other authors to to sponsor with.
For more details, check out Offensive Security’s blog post.
If you’re wondering about the future of Kali Linux, read our interview with Jim O’Gorman, Chief Content and Strategy officer at Offensive Security and leader of the Kali team.