Skip to main content

Kali Linux 2022.1 Released with New Tools

 


Offensive safety has currently launched the new edition of Kali Linux, Kali Linux 2022.1 that brings some thrilling new features, and this version is the primary release of 2022.

on this new version, Offensive protection has absolutely revised the look and sense of Kali Linux 2022.1 that includes:-

  • New backgrounds for the laptop
  • New login and the begin display screen


And right here, the maximum surprising aspect that they have got announced is any more, this must be accomplished annually with a view to higher distinguish among the exceptional versions of Kali Linux.

Kali Linux 2022.1: What’s new?

besides all other features, on this version, the developers of Kali Linux have especially targeted at the visible department as compared to the sooner versions.




And beneath, we have stated all of the newly added functions in Kali Linux 2022.1 by way of the developers of Kali Linux:-

  • visible Refresh – up to date wallpapers and GRUB subject.
  • Shell set off modifications – visual upgrades to improve readability while copying code.
  • Refreshed Browser touchdown web page – Firefox and Chromium homepage has had a makeover to help you get right of entry to the whole thing Kali you need.
  • Kali the entirety image – An all-packages-in-one solution now available to down load.
  • Kali-Tweaks Meets SSH – connect to antique SSH servers the use of legacy SSH protocols and ciphers.
  • VMware i3 improvements – Host-guest functions nicely work now on i3.
  • Accessibility capabilities – Speech synthesis is back inside the Kali installer.
  • New equipment – diverse new gear brought, many from ProjectDiscovery!


New equipment in Kali Linux 2022.1

In total, there are six equipment which are introduced by means of the Offensive protection in Kali Linux 2022.1, and here they're mentioned beneath:-

  • dnsx – fast and multi-reason DNS toolkit permits walking a couple of DNS queries.
  • email2phonenumber – An OSINT device to gain a goal’s cellphone range just by way of having his email deal with.
  • naabu – a fast port scanner with a focus on reliability and simplicity.
  • nuclei – targeted scanning primarily based on templates.
  • PoshC2 – A proxy-aware C2 framework with post-exploitation and lateral movement.
  • proxify – Swiss military knife Proxy tool for HTTP/HTTPS site visitors capture, manipulation, and replay at the go.


Download Kali Linux 2022.1

in case you need to replace your Kali Linux or need to download the Kali Linux 2022.1, you just must comply with the stairs that we have noted under.

For upgrading your present version to the ultra-modern model, observe the command:-

echo “deb http://http.kali.org/kali kali-rolling essential non-free contrib” | sudo tee /and so forth/apt/resources.listing
sudo apt replace && sudo apt -y complete-upgrade
cp -rbi /and so on/skel/. ~
[ -f /var/run/reboot-required ] && sudo reboot -f

Comments

Popular posts from this blog

Alert for Weaponized TeamViewer Installer that delivers njRAT

Alert for Weaponized TeamViewer Installer that  delivers  njRAT   Hazard actors relying on legitimate, 9aaf3f374c58e8c9dcdd1ebf10256fa5 software Team Viewer for exploitation has been a totally commonplace situation. There have been numerous cases in which risk actors used 9aaf3f374c58e8c9dcdd1ebf10256fa5 software to deliver malware to the sufferers. In addition, a latest file from Cyble research & Intelligence Labs stated that the maximum popularly used remote computing device support software program, “Team Viewer” has been exploited by threat actors to deliver njRAT malware. Other software that become turning in njRAT malware include Wireshark, system Hacker, and so on., NJ RAT is a far flung get admission to Trojan that could perform keylogging, password stealing, facts exfiltration, gaining access to webcams, and microphones, downloading extra documents, and plenty of others. It changed into first determined in 2012 and was attacking companies in middle Japanese c...

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA.

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA. Cybercriminals are actively performing SIM swap attacks in diverse international locations to bypass 2 things Authentication and to compromise the numerous social media apps which include WhatsApp through porting a sufferer’s smartphone number to a brand new SIM card. This widespread assault brought on economic damages, stolen credentials, and seizes OTPs to bypass victims’ online money owed. There are various fraud facilities and thousands of operators are running round the arena to seamlessly port a cell phone wide variety to a new SIM with an excessive achievement ratio.   In this situation, countries like Brazil and Mozambique have an excessive fee of SIM swap fraud the use of various social engineering strategies, and phishing attacks. A hit tries of this assault allow fraudsters take manage of clients’ telephone numbers with a purpose to get hold of mobile money tran...

Former protection Engineer Arrested for Stealing $9 Million from Crypto alternate.

  Former protection Engineer arrested for stealing $9 Million from Crypto alternate. Shakeeb Ahmed, a former safety engineer, has been arrested for defrauding a decentralized crypto trade and stealing over $nine million. A digital currency trading, also known as a crypto currency alternate (DCE), is an enterprise that permits individuals to trade crypto currencies or digital currencies for different property, inclusive of conventional fiat money or other digital currencies. This marks the first crook case involving a smart agreement operated via a decentralized alternate. Vulnerability in Crypto exchange’s clever Contracts In July 2022, Ahmed took gain of vulnerability in clever contracts and inserted fake pricing facts, ensuing in fraudulent gains of about $9 million. He also utilized “flash loans” to defraud the crypto trade. Using his specialised capabilities as a senior protection engineer, he forcefully carried out the assault through reverse engineering smart contracts ...