Kali Linux 2024.3, the most recent iteration of Offensive Security’s highly regarded Debian-based distribution designed for ethical hacking and penetration testing, has been released.
This new release is a major update that includes 11 new hacking tools and focuses on behind-the-scenes updates and optimizations.
According to the Kali Linux team, there have been a few “messy migrations, with multiple stacks, all interrelating (transition have been like buses, all coming at once!)”.
Following the completion of the t64 transition, there were immediately several further transitions, including GCC 14, glibc 2.40, and Python 3.12.
Most importantly, this latest Python release removed some long-deprecated APIs, which caused a number of packages to break.
In Kali 2024.4, the default version going forward will be Python 3.12. Users will notice a significant change in Python 3.12: they will no longer be able to install Python packages using pip.
The eleven newly added tools to the network repositories are as follows:
The team has released Kali NetHunter Pro images for devices with a Qualcomm Snapdragon SDM845 SoC (System on a Chip), these include:
┌──(kali㉿kali)-[~]
└─$ echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list
[...]
┌──(kali㉿kali)-[~]
└─$ sudo apt update && sudo apt -y full-upgrade
[...]
┌──(kali㉿kali)-[~]
└─$ cp -vrbi /etc/skel/. ~/
[...]
┌──(kali㉿kali)-[~]
└─$ [ -f /var/run/reboot-required ] && sudo reboot -f
┌──(kali㉿kali)-[~]
└─$ grep VERSION /etc/os-release
VERSION="2024.3"
VERSION_ID="2024.3"
VERSION_CODENAME="kali-rolling"
┌──(kali㉿kali)-[~]
└─$ uname -v
#1 SMP PREEMPT_DYNAMIC Kali 6.8.11-1kali2 (2024-05-30)
┌──(kali㉿kali)-[~]
└─$ uname -r
6.8.11-amd64
With improved compatibility for a variety of devices and the addition of 11 new hacking tools, Kali Linux 2024.3 marks a significant advancement for the platform.
These cutting-edge developments enhance compatibility and broaden the toolkit available to security experts.
Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has…
Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as a…
The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black Banshee,”…
The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing…
IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update…
Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by…