Saturday, June 15, 2024

Kali Linux 2018.3 Released With lots of Hacking Tool Updates for Security Assessments

Kali Linux 2018.3 brings up to kernel version 4.17.0, with the kernel version 4.17.0 there are no major changes, but with 4.16.0 it has some major improvements such as Spectre and Meltdown fixes, improved power management, and better GPU support.

Kali Linux 2018.3

With the new release, it add’s a number of new tools to the repositories that includes.

Update 22/08/2018: Suddenly Kali Linux Taken Down the Source for some reason, We will update you once they reverse the same. We have linked cache URL above.

Update 27/08/2018: Finally Kali Linux released the source again.

idb– idb is a tool to simplify some common tasks for iOS app security assessments and research.

gdb-peda – Python Exploit Development Assistance for GDB that enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging

datasploit – An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.

kerberoast – Kerberoast is a series of tools for attacking MS Kerberos implementations. Below is a brief overview of what each tool does.

Also with Kali Linux 2018.3 number of tools in the repo has been updated that includes openvas, wifite, wpscan, aircrack-ng and burpsuite. You can see the complete tool updates here

How to update – Kali Linux 2018.3

The release contains dozens of Powerfull tools and also updates for existing tools. If you are kali lover then it’s time to Upgrade by using following Commands.

apt update
&& apt full-upgrade
apt dist-upgrade

Also, you can find the ISOs and Torrents on the Kali Linux download page. For virtual machine and ARM images, you can refer Offensive Security Download Page.

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools. if you are First Time Kali user you can download it from here.

Like Kali Linux, there are some top Penetration Testing & Ethical Hacking Linux Distributions you can see them here.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles