Saturday, March 1, 2025
HomeKALIKali Linux 2017.2 Released With Powerful New Tools

Kali Linux 2017.2 Released With Powerful New Tools

Published on

SIEM as a Service

Follow Us on Google News

Kali Linux is a Penetration Testing Distribution based on Debian. Developed by Offensive Security. It is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment.

Kali Linux 2017.2

With the new release, they have added dozens of Powerfull tools and also updates for existing tools, if you are kali lover then it’s time to Upgrade by using following Commands.

apt update
apt dist-upgrade
reboot
 

At the time of writing, we have updates running, we will soon post tutorials, stay tuned for it.

Also read Operating system for Hackers

In the meantime, you can refer or Kali Linux Tutorials page which covers dozens of Kali Linux Tools. First Time users can download from here.

Some New Tools

  • hurl â€“ a beneficial little hexadecimal and URL encoder/decoder
  • phishery â€“ phishery lets you inject SSL-enabled basic auth phishing URLs into a .docx Word document
  • ssh-audit â€“ an SSH server auditor that checks for encryption types, banners, compression, and more
  • apt2 â€“ an Automated Penetration Testing Toolkit that runs its own scans or imports results from various scanners, and takes action on them
  • bloodhound â€“ uses graph theory to reveal the hidden or unintended relationships within Active Directory
  • crackmapexec â€“ a post-exploitation tool to help automate the assessment of large Active Directory networks
  • dbeaver â€“ powerful GUI database manager that supports the most popular databases, including MySQL, PostgreSQL, Oracle, SQLite, and much more
  • brutespray â€“ automatically attempts default credentials on discovered services

Important Tool Updates

You can see the complete tool updates here, few important tools here

  • jd-gui,
  • dnsenum,
  • edb-debugger,
  • wpscan,
  • watobo,
  • Burpsuite

More than that they are working towards enhancing the overall integration of bundles in Kali Linux. Like Kali Linux, there are some top Penetration Testing & Ethical Hacking Linux Distributions you can see them here.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Kali Linux 2024.2 Released With New Hacking Tools

The Kali Linux team has announced the release of Kali Linux 2024.2, the latest...

xz-utils Backdoor Affects Kali Linux Installations – How to Check for Infection

A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1,...

Kali Linux 2023.3 Released: What’s New!

Kali Linux 2023.3 is now available, and it includes a variety of new packages...