Thursday, February 27, 2025
HomeKali LinuxKali Linux 2020.1a Released - Download Updated Kali Image for Raspberry Pi

Kali Linux 2020.1a Released – Download Updated Kali Image for Raspberry Pi

Published on

SIEM as a Service

Follow Us on Google News

World’s leading Penetration distribution Kali Linux 2020.1a released with some of the major changes in the installer which makes the installation process easier for users.

Kali Linux also issued a new updated image for Raspberry Pi, both 32-bit & 64-bit for Raspberry Pi and the file corruption bug has been fixed that affected in an earlier version.

In the earlier versions of Kali 2020.1, Offensive security changed the base images without having multiple different ISOs for each DE, by introducing an “installer” image as well as a “live” image.

According to Kali Linux 2020.1a update, “The “installer” image is the new one, as this uses “debian-cd” on the back-end. We noticed a bug in a dependency chain, which caused an issue with x11. As a result, you may not have got a graphical interface after installing Kali. As a result, we pushed out a fix (2020.1a) to address this.”

With the Kali Linux 2020.1 traditional default non-root user” has been introduced, so there is no longer a superuser account and default user now is a standard.

With the Kali Linux 2020.1 default, the user has been switched to kali with the vagrant image as well. A Vagrant is a tool for building and managing virtual machine environments in a single workflow.

Now for the vagrant images, the update has been reverted, you can also use the KaliLinux on a PineBook Pro.

Also, Kali Linux 2020.1a is only for users who haven’t successfully installed the 2020.1, If you are already running 2020.1, you do not need to reinstall.

New version of Kali Linux 2020.1a can be downloaded from here.

You are also recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools. Also, Learn The Complete Kali Tools in Kali Linux Operating System.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing...

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Kali Linux 2024.3 Released With New Hacking Tools

Kali Linux 2024.3, the most recent iteration of Offensive Security's highly regarded Debian-based distribution...

Kali Linux 2024.2 Released With New Hacking Tools

The Kali Linux team has announced the release of Kali Linux 2024.2, the latest...

xz-utils Backdoor Affects Kali Linux Installations – How to Check for Infection

A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1,...