Tuesday, December 24, 2024
HomeKALIKali Linux 2019.4 Released - New Hacking Tools, Theme, Undercover Mode, and...

Kali Linux 2019.4 Released – New Hacking Tools, Theme, Undercover Mode, and More!!

Published on

SIEM as a Service

Kali Linux is an advanced penetration Linux distribution used for digital forensics and penetration testing purposes. The operating system has more than 600 penetration-testing programs.

It is built on the top of the Debian distribution, the first version of Kali Linux released in 2012, it can be installed computer’s hard disk, can be booted directly from a live CD or live USB and to be installed on a virtual machine.

Kali Linux 2019.4

The Offensive security team has done major changes with Kali Linux 2019.4, and they have addressed some long-time issues. Here are some notable updates and bugs fixes.

- Advertisement - SIEM as a Service

New Desktop Environment and GTK3 Theme

With the update, developers planned to address the performance issues, by removing overhead features that are not useful for a distribution like Kali and the fractured user experience, if you are using a high-end laptop or using a Raspberry Pi the user experience be the same. Another thing is the modern look than the traditional one.

So to address the issues they committed to a lightweight one that runs under all the levels of Kali installs and handles user requests without compromising user experience.

If you don’t like the new UI, you can still have the option to switch to the Gnome build.

Kali Undercover theme

The new Undercover theme which turns your Kali machine looks like a default Windows installation. This can be done by just typing kali-undercover in the terminal windows.

Kali Linux 2019.4

Then the magic happens, your Kali machine looks completely like a Windows installation which gives you more anonymity and you can switch back to the Kali theme whenever you like.

PowerShell

Another notable feature is the PowerShell repositories, with the new version you will get the ability to run the PowerShell scripts directly on Kali Linux.

BTRFS Snapshot

BTRFS is a much more useful inclusion, if you are running the Kali Linux directly on the computer there is not easy to make a snapshot of it for restoration if something went wrong.

With BTRFS now you will be getting a snapshot capability on a bare metal install while installing the Kali itself a separate btrfs partition and btrfs subvolumes outside of the installation volumes.

Kali Linux 2019.4

NetHunter

Introduction of NetHunter Kex, a full Kali Desktop on your Android phone, you can attach the Android device with Bluetooth keyboard and mouse.

Kali Linux 2019.4

If you are an existing user, you can run a quick update using the following command.

 root@kali:~# apt update && apt -y full-upgrade

After the update, you can verify the installation using the following command

root@kali:~# grep VERSION /etc/os-release

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

Also, Learn The Complete Kali Tools in Kali Linux Operating System. Kali Linux 2019.4 can be downloaded from here.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity and hacking news updates.

Also, Read

XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux

Kali Linux Team to Offer Free Access to Penetration Testing Course

DDOS a Website Anonymously by Using Kali Linux Tools

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing...

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store,...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Top 10 Best Proxy Server 2025 & Important Methods to Prevent Yourself From Hackers

Best Proxy Server has been used in enormous cases where some personal data or...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

10 Best Linux Distributions In 2024

The Linux Distros is generally acknowledged as the third of the holy triplet of...