Kali Linux is an advanced penetration Linux distribution used for digital forensics and penetration testing purposes. The operating system has more than 600 penetration-testing programs.
It is built on the top of the Debian distribution, the first version of Kali Linux released in 2012, it can be installed computer’s hard disk, can be booted directly from a live CD or live USB and to be installed on a virtual machine.
The Offensive security team has done major changes with Kali Linux 2019.4, and they have addressed some long-time issues. Here are some notable updates and bugs fixes.
With the update, developers planned to address the performance issues, by removing overhead features that are not useful for a distribution like Kali and the fractured user experience, if you are using a high-end laptop or using a Raspberry Pi the user experience be the same. Another thing is the modern look than the traditional one.
So to address the issues they committed to a lightweight one that runs under all the levels of Kali installs and handles user requests without compromising user experience.
If you don’t like the new UI, you can still have the option to switch to the Gnome build.
The new Undercover theme which turns your Kali machine looks like a default Windows installation. This can be done by just typing kali-undercover in the terminal windows.
Then the magic happens, your Kali machine looks completely like a Windows installation which gives you more anonymity and you can switch back to the Kali theme whenever you like.
Another notable feature is the PowerShell repositories, with the new version you will get the ability to run the PowerShell scripts directly on Kali Linux.
BTRFS is a much more useful inclusion, if you are running the Kali Linux directly on the computer there is not easy to make a snapshot of it for restoration if something went wrong.
With BTRFS now you will be getting a snapshot capability on a bare metal install while installing the Kali itself a separate btrfs partition and btrfs subvolumes outside of the installation volumes.
Introduction of NetHunter Kex, a full Kali Desktop on your Android phone, you can attach the Android device with Bluetooth keyboard and mouse.
If you are an existing user, you can run a quick update using the following command.
root@kali:~# apt update && apt -y full-upgrade
After the update, you can verify the installation using the following command
root@kali:~# grep VERSION /etc/os-release
Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.
Also, Learn The Complete Kali Tools in Kali Linux Operating System. Kali Linux 2019.4 can be downloaded from here.
You can follow us on Linkedin, Twitter, and Facebook for daily Cybersecurity and hacking news updates.
Also, Read
XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux
Kali Linux Team to Offer Free Access to Penetration Testing Course
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…
A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which…
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees…
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets…
View Comments
I can't use undercover Feature, why?
I can't find it anywhere.
I am using Berkeley Repos, is that anything to do with this?
"I can’t use undercover Feature, why?
I can’t find it anywhere."
There is literally a section in this post called "Kali Undercover theme." This heading consists of three sentences and a graphical demonstration of the feature.
"I am using Berkeley Repos, is that anything to do with this?"
Huh? Think about this a bit, would it make sense to limit default features to specific mirrors. The directions are simple and easy to follow, it is hard to get lost even if there is a small typo.