Kali Linux is an advanced penetration Linux distribution used for digital forensics and penetration testing purposes. The operating system has more than 600 penetration-testing programs.
It is built on the top of the Debian distribution, the first version of Kali Linux released in 2012, it can be installed computer’s hard disk, can be booted directly from a live CD or live USB and to be installed on a virtual machine.
The Offensive security team has done major changes with Kali Linux 2019.4, and they have addressed some long-time issues. Here are some notable updates and bugs fixes.
With the update, developers planned to address the performance issues, by removing overhead features that are not useful for a distribution like Kali and the fractured user experience, if you are using a high-end laptop or using a Raspberry Pi the user experience be the same. Another thing is the modern look than the traditional one.
So to address the issues they committed to a lightweight one that runs under all the levels of Kali installs and handles user requests without compromising user experience.
If you don’t like the new UI, you can still have the option to switch to the Gnome build.
The new Undercover theme which turns your Kali machine looks like a default Windows installation. This can be done by just typing kali-undercover in the terminal windows.
Then the magic happens, your Kali machine looks completely like a Windows installation which gives you more anonymity and you can switch back to the Kali theme whenever you like.
Another notable feature is the PowerShell repositories, with the new version you will get the ability to run the PowerShell scripts directly on Kali Linux.
BTRFS is a much more useful inclusion, if you are running the Kali Linux directly on the computer there is not easy to make a snapshot of it for restoration if something went wrong.
With BTRFS now you will be getting a snapshot capability on a bare metal install while installing the Kali itself a separate btrfs partition and btrfs subvolumes outside of the installation volumes.
Introduction of NetHunter Kex, a full Kali Desktop on your Android phone, you can attach the Android device with Bluetooth keyboard and mouse.
If you are an existing user, you can run a quick update using the following command.
root@kali:~# apt update && apt -y full-upgrade
After the update, you can verify the installation using the following command
root@kali:~# grep VERSION /etc/os-release
Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.
Also, Learn The Complete Kali Tools in Kali Linux Operating System. Kali Linux 2019.4 can be downloaded from here.
You can follow us on Linkedin, Twitter, and Facebook for daily Cybersecurity and hacking news updates.
Also, Read
XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux
Kali Linux Team to Offer Free Access to Penetration Testing Course
INE Security, a leading global provider of cybersecurity training and certifications, today announced a new…
In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a colleague…
A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories…
A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with a…
In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages…
View Comments
I can't use undercover Feature, why?
I can't find it anywhere.
I am using Berkeley Repos, is that anything to do with this?
"I can’t use undercover Feature, why?
I can’t find it anywhere."
There is literally a section in this post called "Kali Undercover theme." This heading consists of three sentences and a graphical demonstration of the feature.
"I am using Berkeley Repos, is that anything to do with this?"
Huh? Think about this a bit, would it make sense to limit default features to specific mirrors. The directions are simple and easy to follow, it is hard to get lost even if there is a small typo.