Kali Linux 2020.1 Security Distribution Released
The release of Kali Linux 2020.1, a distribution designed for security testing, auditing, forensic analysis, and investigating the aftermath of cyberattacks, has been announced. All original developments created within the distribution are released under the GPL license and are available through a public Git repository. Several ISO image options are available for download, sized at 285 MB, 2 GB, and 2.7 GB. Builds are provided for x86, x86_64, and ARM architectures (armhf and armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid). By default, the Xfce desktop is offered, but KDE, GNOME, MATE, LXDE, and Enlightenment e17 are also supported as options.
Kali Linux includes one of the most comprehensive collections of tools for cybersecurity professionals: from utilities for web application testing and wireless network penetration to programs for reading data from RFID identification chips. The package includes a collection of exploits and over 300 specialized security testing utilities, such as Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, and p0f. Additionally, the distribution features tools for accelerating password (Multihash CUDA Brute Forcer) and WPA key (Pyrit) cracking by leveraging CUDA and AMD Stream technologies, allowing the use of NVIDIA and AMD GPUs for computational tasks.
What’s New in This Release
- By default, the system now operates under an unprivileged user account (previously, all operations were performed as root). Instead of root/toor, the default account is now kali/kali.
- Instead of preparing separate builds for each desktop environment, a single universal installation image is now offered, allowing users to choose their preferred desktop (Xfce, GNOME, KDE, etc.) during setup. There are now three universal images available: a full installer, a Live build, and a minimal network installation image. The graphical installer design has also been updated.
- A new theme for GNOME is available, with both dark and light variants.
- New icons have been added for bundled applications.
- The “Kali Undercover” mode, which simulates a Windows-like appearance to avoid drawing attention when using Kali in public places, has been optimized.
- New utilities have been added: cloud-enum, emailharvester, phpggc, sherlock, and splinter.
- Utilities that require Python 2 have been removed.
NetHunter 2020.1 Release
At the same time, the release of NetHunter 2020.1 was announced. NetHunter is an environment for mobile devices based on the Android platform, featuring a suite of tools for vulnerability testing. With NetHunter, users can test attacks specific to mobile devices, such as emulating USB devices (BadUSB and HID Keyboard—emulating a network USB adapter for MITM attacks or a USB keyboard for keystroke injection) and creating rogue access points (MANA Evil Access Point).
NetHunter is installed in the standard Android environment as a chroot image, running a specially adapted version of Kali Linux. The key improvement in NetHunter 2020.1 is the introduction of a Rootless edition, which does not require root access on the device.