Kali Linux 2024.3, the most recent iteration of Offensive Security’s highly regarded Debian-based distribution designed for ethical hacking and penetration testing, has been released.
This new release is a major update that includes 11 new hacking tools and focuses on behind-the-scenes updates and optimizations.
According to the Kali Linux team, there have been a few “messy migrations, with multiple stacks, all interrelating (transition have been like buses, all coming at once!)”.
Following the completion of the t64 transition, there were immediately several further transitions, including GCC 14, glibc 2.40, and Python 3.12.
Most importantly, this latest Python release removed some long-deprecated APIs, which caused a number of packages to break.
In Kali 2024.4, the default version going forward will be Python 3.12. Users will notice a significant change in Python 3.12: they will no longer be able to install Python packages using pip.
The eleven newly added tools to the network repositories are as follows:
The team has released Kali NetHunter Pro images for devices with a Qualcomm Snapdragon SDM845 SoC (System on a Chip), these include:
┌──(kali㉿kali)-[~]
└─$ echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list
[...]
┌──(kali㉿kali)-[~]
└─$ sudo apt update && sudo apt -y full-upgrade
[...]
┌──(kali㉿kali)-[~]
└─$ cp -vrbi /etc/skel/. ~/
[...]
┌──(kali㉿kali)-[~]
└─$ [ -f /var/run/reboot-required ] && sudo reboot -f
┌──(kali㉿kali)-[~]
└─$ grep VERSION /etc/os-release
VERSION="2024.3"
VERSION_ID="2024.3"
VERSION_CODENAME="kali-rolling"
┌──(kali㉿kali)-[~]
└─$ uname -v
#1 SMP PREEMPT_DYNAMIC Kali 6.8.11-1kali2 (2024-05-30)
┌──(kali㉿kali)-[~]
└─$ uname -r
6.8.11-amd64
With improved compatibility for a variety of devices and the addition of 11 new hacking tools, Kali Linux 2024.3 marks a significant advancement for the platform.
These cutting-edge developments enhance compatibility and broaden the toolkit available to security experts.
Best DNS Management Tools play a crucial role in efficiently managing domain names and their…
Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…
Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…
SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…
In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…
The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…