Kali Linux 2020.3 Security Distribution Released
The release of Kali Linux 2020.3, a distribution designed for vulnerability testing, auditing, forensic analysis, and investigating the aftermath of cyberattacks, has been announced. All original developments created within the distribution are released under the GPL license and are available through a public Git repository. Several ISO image options are available for download, sized at 430 MB, 2.9 GB, and 3.7 GB. Builds are provided for x86, x86_64, and ARM architectures (armhf and armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid). By default, the Xfce desktop is offered, but KDE, GNOME, MATE, LXDE, and Enlightenment e17 are also supported as options.
Kali Linux includes one of the most comprehensive collections of tools for cybersecurity professionals: from web application testing and wireless network penetration to programs for reading data from RFID identification chips. The package includes a collection of exploits and over 300 specialized security testing utilities, such as Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, and p0f. Additionally, the distribution features tools for accelerating password (Multihash CUDA Brute Forcer) and WPA key (Pyrit) cracking by leveraging CUDA and AMD Stream technologies, allowing the use of NVIDIA and AMD GPUs for computational tasks.
What’s New in Kali Linux 2020.3
- Transition from Bash to ZSH: The move to ZSH has been announced. In this release, ZSH is included as an option, but starting with the next release, ZSH will launch by default when opening a terminal. (To switch to ZSH now, run
chsh -s /bin/zsh
.) The switch is due to ZSH’s advanced features. - Win-Kex Build: A new Win-Kex (Windows + Kali Desktop Experience) build is available for running Kali in Windows using WSL2 (Windows Subsystem for Linux).
- HiDPI Support: The
kali-hidpi-mode
command has been added to automate configuration for systems with high pixel density (HiDPI) screens. - Individual Icons: Each tool included in the base package now has its own icon.
- Faster Installation: The
dist-upgrade
process is no longer run during installation, speeding up the setup. Users can now update packages at their convenience. When installing without a network connection, a predefined list of network repositories is now provided in/etc/apt/sources.list
instead of leaving it empty. - Expanded ARM Support: Improvements have been made for ARM devices, including better support for Pinebook, Pinebook Pro, Raspberry Pi, and ODROID-C.
- GNOME Desktop Enhancements: When choosing the GNOME desktop, a new theme is used in the Nautilus file manager. The design of nested panels and headers has been improved (for example, the sidebar in settings now visually continues from the top panel).
NetHunter 2020.3 Release
At the same time, NetHunter 2020.3 has been released—a mobile environment for Android devices featuring a suite of tools for vulnerability testing. NetHunter enables testing of attacks specific to mobile devices, such as emulating USB devices (BadUSB and HID Keyboard—emulating a network USB adapter for MITM attacks or a USB keyboard for keystroke injection) and creating rogue access points (MANA Evil Access Point). NetHunter is installed in the standard Android environment as a chroot image running a specially adapted version of Kali Linux.
Changes in NetHunter 2020.3 include the addition of the new Bluetooth Arsenal utility set, which provides tools for discovering, testing, spoofing, and injecting packets specific to Bluetooth devices. Support for Nokia 3.1 and Nokia 6.1 devices has also been added.