Saturday, December 28, 2024
HomeKALIKali Linux 2017.3 Released With Powerful New Tools

Kali Linux 2017.3 Released With Powerful New Tools

Published on

SIEM as a Service

Kali Linux is a Penetration Testing Distribution based on Debian. Developed by Offensive Security. It is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment.

Kali Linux 2017.3

With the New release they include all patches, fixes, updates, and improvements since from the last release, if you are kali lover then it’s time to Upgrade by using following Commands.

apt update
apt dist-upgrade
reboot

Must Read Complete Kali Tools tutorials from Information gathering to Forensics

- Advertisement - SIEM as a Service

Improvements in New release

With the new release, the kernel has been updated to 4.13.10 and many other new improvements.

  • CIFS now uses SMB 3.0 by default.
  • EXT4 directories can now contain 2 billion entries instead of the old 10 million limit.
  • TLS support is now built into the kernel itself.
Also with the new update, they have provided package updates for Reaver, PixieWPS, Burp Suite, Cuckoo, The Social Engineering Toolkit. You can check the complete Changelog here.

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools. if you are First Time Kali user you can download it from here.

Valuable New Tools

With Kali Linux 2017.2 around eight new tools added, now with Kali Linux 2017.3, they have added Four more tools to the distribution now.

Tools are primarily focused on open source information gathering and the tools are not available the in the default installation.After installation, we need to update the Distro with an apt update.

Also Read Mastering the Penetration Testing with Kali Linux – Free eBook Download

InSpy

InSpy is a small but useful utility that performs enumeration on LinkedIn and can find people based on job title, company, or email address.

root@kali:~# apt update && apt -y install inspy

CherryTree

A hierarchical note taking an application, featuring rich text and syntax highlighting, storing data in a single XML or SQLite file.

root@kali:~# apt update && apt -y install cherrytree

Sublist3r

Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.

root@kali:~# apt update && apt -y install sublist3r

OSRFramework

OSRFramework is a set of libraries to perform Open Source Intelligence tasks. They include references to a bunch of different applications related to username checking, DNS lookups, information leaks research, deep web search, regular expressions extraction, and many others.

root@kali:~# apt update && apt -y install osrframework

Massive Maltego Metamorphosis

With Kali Linux 2017.3 Maltego and Metamorphosis are now combined into one amalgamated application that still allows you to run Maltego Community Edition and Casefile, but now it also works for those of you with Maltego Classic or Maltego XL licenses.

Like Kali Linux, there are some top Penetration Testing & Ethical Hacking Linux Distributions you can see them here.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Top 10 Best Proxy Server 2025 & Important Methods to Prevent Yourself From Hackers

Best Proxy Server has been used in enormous cases where some personal data or...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

10 Best Linux Distributions In 2024

The Linux Distros is generally acknowledged as the third of the holy triplet of...