Kali Linux 2021.4 Security Research Distribution Release

Saw the light distribution release Kali Linux 2021.4designed for testing systems for vulnerabilities, conducting audits, analyzing residual information and identifying the consequences of malicious attacks. All original developments created within the distribution kit are distributed under the GPL license and are available through the public Git repository… For loading prepared several options for iso-images, size 466 MB, 3.1 GB and 3.7 GB. Assemblies are available for i386, x86_64, ARM architectures (armhf and armel, Raspberry Pi, Banana Pi, ARM Chromebook, Odroid). The Xfce desktop is offered by default, but KDE, GNOME, MATE, LXDE and Enlightenment e17 are optionally supported.

Kali includes one of the most comprehensive collections of tools for computer security professionals, from tools for testing web applications and penetration of wireless networks to software for reading data from RFID chips. Includes a collection of exploits and over 300 specialized security scan utilities such as Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, p0f. In addition, the distribution includes tools to accelerate the selection of passwords (Multihash CUDA Brute Forcer) and WPA keys (Pyrit) through the use of CUDA and AMD Stream technologies, which allow using GPUs of NVIDIA and AMD video cards to perform computational operations.

In the new release:

  • The Samba client has been reconfigured to be compatible with any Samba servers, regardless of the protocol option selected on the server, making it easier to find vulnerable Samba servers on the network. The compatibility mode can be changed using the kali-tweaks utility.

  • In kali-tweaks, in the mirror settings, the ability to accelerate the delivery of updates using the CloudFlare content delivery network is provided.

  • The Kaboxer utilities have added support for changing skins and icon sets, including the ability to use a dark theme.

  • Added new utilities:
    • Dufflebag – search for confidential information in EBS-sections;
    • Maryam – open source OSINT framework;
    • Name-That-Hash – determination of the hash type;
    • Proxmark3 – Attacks on RFID tags using Proxmark3 devices;
    • Reverse Proxy Grapher – building a diagram of data flows through a reverse proxy;
    • S3Scanner – scans unprotected S3 environments and displays their contents;
    • Spray cat – Extraction of credentials from Windows systems and environments based on Active Directory;
    • truffleHog – analysis of confidential data in Git repositories;
    • Web of trust grapher (wotmate) – implementation of PGP pathfinder.
  • Updated versions of the Xfce, GNOME 41, and KDE Plasma 5.23 desktops, and unified windowing buttons across desktops.

  • In Xfce, the layout of the panel is optimized to conserve horizontal screen space. Added widgets to the panel for monitoring CPU load and displaying VPN parameters. A more compact mode is implemented in the task manager, in which only application icons are displayed. When browsing the contents of virtual desktops, only buttons are displayed instead of thumbnails.

  • Improved support for Apple systems based on the ARM M1 chip.
  • In the edition for ARM systems, the ext4 FS for the root partition is enabled by default (instead of ext3), support for the Raspberry Pi Zero 2 W board has been added, for Raspberry Pi boards the ability to boot from a USB drive has been added, for the Pinebook Pro laptop, the ability to overclock the processor to 2GHz is implemented.
  • Release prepared at the same time NetHunter 2021.4, an environment for mobile devices based on the Android platform with a selection of tools for testing systems for vulnerabilities. Using NetHunter, it is possible to check the implementation of attacks specific to mobile devices, for example, through emulation of the operation of USB devices (BadUSB and HID Keyboard – emulation of a USB network adapter that can be used for MITM attacks, or a USB keyboard that performs character substitution) and creating fake access points (MANA Evil Access Point). NetHunter is installed in the standard environment of the Android platform in the form of a chroot image, which runs a specially adapted version of Kali Linux. The new version adds the Social-Engineer Toolkit and the Spear Phishing Email Attack module.


About Lee Michaelis 142832 Articles
Before starting GamingDeputy, I used to spend my day modding games and searching for new wallpapers. A vivid writer and a blogger. I enjoy giving tech support to people in help (mostly my brother). Racing, MMO, RTS games are my favs.