Thursday, March 28, 2024

Offensive Security released Win-KeX Version 2.0 that Brings Kali Desktop Experience in Windows

Win-Kex was first introduced with Kali Linux 2020.3, it provides a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). Version 2.0 was released with several new features and fix for the issues with the previous versions.

Win-KeX Version 2.0

To install and use Win-KeX it is required to have WSL v2 on x64 and it is not compatible with WSL v1, or arm64 and it requires Windows 10 version 2004 or higher.

The following are the new features with Win-KeX v2.0;

  • Win-KeX SL (Seamless Edition) – bye bye borders
  • Sound support
  • Multi-session support
  • KeX sessions can be run as root
  • Able to launch “kex” from anywhere – no more cd-ing into the Kali filesystem required
  • Shared clipboard – cut and paste content between Kali and Windows apps

Prerequisites

  • Running Windows 10 version 2004 or higher
  • Using Windows Terminal

To install Win-KeX in a kali WSL installation

sudo apt upgrade && sudo apt install -y kali-win-kex

With the new version Win-KeX it supports for two modes;

Window Mode

Win-KeX Window mode is the classic Win-KeX look and feels with one dedicated window for the Kali Linux desktop. Window mode helps to keep the Windows and Kali environments visually apart.

To launch Win-KeX in Window mode with sound support, type:

kex --win -s

Seamless Mode

Win-KeX SL mode provides seamless integration of Kali Linux into the Windows desktop with the Windows Start menu at the bottom and the Kali panel at the top of the screen.

All applications are launched in their windows sharing the same desktop as Windows applications.

Seamless mode removes the visual segregation between linux and window apps and offers a great platform to run a penetration test in Kali Linux and copy the results straight into a Windows app for the final report.

To launch Win-KeX in seamless mode with sound support, type:

kex --sl --s

You are also recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools. Also, Learn The Complete Kali Tools in Kali Linux Operating System.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles