Categories: KALIKali LinuxTop 10

Kali Linux 2019.4 Released – New Hacking Tools, Theme, Undercover Mode, and More!!

Kali Linux is an advanced penetration Linux distribution used for digital forensics and penetration testing purposes. The operating system has more than 600 penetration-testing programs.

It is built on the top of the Debian distribution, the first version of Kali Linux released in 2012, it can be installed computer’s hard disk, can be booted directly from a live CD or live USB and to be installed on a virtual machine.

Kali Linux 2019.4

The Offensive security team has done major changes with Kali Linux 2019.4, and they have addressed some long-time issues. Here are some notable updates and bugs fixes.

New Desktop Environment and GTK3 Theme

With the update, developers planned to address the performance issues, by removing overhead features that are not useful for a distribution like Kali and the fractured user experience, if you are using a high-end laptop or using a Raspberry Pi the user experience be the same. Another thing is the modern look than the traditional one.

So to address the issues they committed to a lightweight one that runs under all the levels of Kali installs and handles user requests without compromising user experience.

If you don’t like the new UI, you can still have the option to switch to the Gnome build.

Kali Undercover theme

The new Undercover theme which turns your Kali machine looks like a default Windows installation. This can be done by just typing kali-undercover in the terminal windows.

Then the magic happens, your Kali machine looks completely like a Windows installation which gives you more anonymity and you can switch back to the Kali theme whenever you like.

PowerShell

Another notable feature is the PowerShell repositories, with the new version you will get the ability to run the PowerShell scripts directly on Kali Linux.

BTRFS Snapshot

BTRFS is a much more useful inclusion, if you are running the Kali Linux directly on the computer there is not easy to make a snapshot of it for restoration if something went wrong.

With BTRFS now you will be getting a snapshot capability on a bare metal install while installing the Kali itself a separate btrfs partition and btrfs subvolumes outside of the installation volumes.

NetHunter

Introduction of NetHunter Kex, a full Kali Desktop on your Android phone, you can attach the Android device with Bluetooth keyboard and mouse.

If you are an existing user, you can run a quick update using the following command.

 root@kali:~# apt update && apt -y full-upgrade

After the update, you can verify the installation using the following command

root@kali:~# grep VERSION /etc/os-release

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

Also, Learn The Complete Kali Tools in Kali Linux Operating System. Kali Linux 2019.4 can be downloaded from here.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity and hacking news updates.

Also, Read

XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux

Kali Linux Team to Offer Free Access to Penetration Testing Course

DDOS a Website Anonymously by Using Kali Linux Tools

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

  • I can't use undercover Feature, why?
    I can't find it anywhere.
    I am using Berkeley Repos, is that anything to do with this?

    • "I can’t use undercover Feature, why?
      I can’t find it anywhere."
      There is literally a section in this post called "Kali Undercover theme." This heading consists of three sentences and a graphical demonstration of the feature.

      "I am using Berkeley Repos, is that anything to do with this?"
      Huh? Think about this a bit, would it make sense to limit default features to specific mirrors. The directions are simple and easy to follow, it is hard to get lost even if there is a small typo.

Recent Posts

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF) providers,…

1 hour ago

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for Linux…

2 hours ago

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey” claimed…

3 hours ago

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have been…

5 hours ago

Millions of WordPress Websites Vulnerable to Script Injection Due to Plugin Flaw

A critical security vulnerability in the Essential Addons for Elementor plugin, installed on over 2 million WordPress…

5 hours ago

New Undetectable Batch Script Uses PowerShell and Visual Basic to Install XWorm

A novel malware delivery framework employing advanced obfuscation techniques has evaded detection by security tools…

6 hours ago