Win-Kex was first introduced with Kali Linux 2020.3, it provides a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). Version 2.0 was released with several new features and fix for the issues with the previous versions.
To install and use Win-KeX it is required to have WSL v2 on x64 and it is not compatible with WSL v1, or arm64 and it requires Windows 10 version 2004 or higher.
The following are the new features with Win-KeX v2.0;
To install Win-KeX in a kali WSL installation
sudo apt upgrade && sudo apt install -y kali-win-kex
With the new version Win-KeX it supports for two modes;
Win-KeX Window mode is the classic Win-KeX look and feels with one dedicated window for the Kali Linux desktop. Window mode helps to keep the Windows and Kali environments visually apart.
To launch Win-KeX in Window mode with sound support, type:
kex --win -s
Win-KeX SL mode provides seamless integration of Kali Linux into the Windows desktop with the Windows Start menu at the bottom and the Kali panel at the top of the screen.
All applications are launched in their windows sharing the same desktop as Windows applications.
Seamless mode removes the visual segregation between linux and window apps and offers a great platform to run a penetration test in Kali Linux and copy the results straight into a Windows app for the final report.
To launch Win-KeX in seamless mode with sound support, type:
kex --sl --s
You are also recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools. Also, Learn The Complete Kali Tools in Kali Linux Operating System.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…
Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…
The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…
Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…
A security researcher discovered a vulnerability in Windows theme files in the previous year, which…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…