Kali Linux 2024.4: A Powerful Upgrade for Penetration Testers

Kali Linux 2024.4
Kali Linux 2024.4

Kali Linux, a widely-used penetration testing and security auditing Linux distribution, has released its latest version, 2024.4. This new release brings a host of exciting features and improvements designed to empower security professionals.  

Key Features and Improvements:

  • Python 3.12 as Default: The new version defaults to Python 3.12, offering performance enhancements and modern language features.
  • Dropping i386 Support: To focus on modern hardware and security standards, Kali Linux 2024.4 no longer supports 32-bit (i386) architectures.  
  • Kali NetHunter Advancements: The mobile penetration testing platform, Kali NetHunter, receives significant updates, including new tools and improved performance.  
  • Updated Toolset: Kali Linux continues to maintain a comprehensive collection of security tools. This release includes updates to existing tools and the addition of new ones to address emerging threats and vulnerabilities.  
  • Enhanced User Experience: The user interface and workflow have been refined to provide a smoother and more efficient experience for penetration testers.

New Tools in Kali

As always, we have various new tools added (to the network repositories) – 14 this time! Summarizing what has been added:

  • bloodyad – Active Directory privilege escalation framework (Submitted by @Arszilla)
  • certi – Ask for certificates to ADCS and discover templates (Submitted by @Arszilla)
  • chainsaw – Rapidly search and hunt through Windows forensic artefacts (Submitted by @Arszilla)
  • findomain – Fastest and most complete solution for domain recognition (Submitted by @Arszilla)
  • hexwalk – Hex analyzer, editor and viewer
  • linkedin2username – Generate username lists for companies on LinkedIn
  • mssqlpwner – Interact and pwn MSSQL servers
  • openssh-ssh1 – Secure SHell (SSH) client for legacy SSH1 protocol
  • proximoth – Control frame attack vulnerability detection tool (Submitted by @TechnicalUserX)
  • python-pipx – Execute binaries from Python packages in isolated environments
  • sara – RouterOS Security Inspector (Submitted by @casterbyte)
  • web-cache-vulnerability-scanner – Go-based CLI tool for testing for web cache poisoning (Submitted by @Arszilla)
  • xsrfprobe – An advanced Cross Site Request Forgery (CSRF/XSRF) audit and exploitation toolkit.
  • zenmap – The Network Mapper (nmap) front end (zenmap-kbx is no longer needed!)

What’s New in Kali NetHunter:

  • Improved Performance: Optimized performance for smoother operation on supported devices.
  • New Tools: Addition of new tools to expand the capabilities of Kali NetHunter, including network analysis, wireless hacking, and reverse engineering.
  • Enhanced Stability: Bug fixes and stability improvements to ensure a reliable mobile penetration testing experience.

    Kernel/Device

    From a Kali NetNethunter kernel/device point of view: Now support 100 devices!

    • Added support to Realme X7 Max 5G (RMX3031) (Thanks @dek0der)
    • Added support to Xiaomi Mi 9 Lite / CC9 (pyxis)
    • Updated support for Nokia 6.1 & 6.1 Plus (drg)
    • Updated support for Realme C11 (RMX2185) (Thanks @Frostleaft07)
    • Updated support for Xiaomi Mi 9T (davinci)
    • Updated support for Xiaomi Mi A3 (xiaomi-laurel)
    • Updated support for Xiaomi Pocophone F1 (beryllium)
    • First Android 15 device support (Xiaomi Mi A3 (xiaomi-laurel))
    • Generating a lot more pre-created images
    • The “body of knowledge” file, devices.cfg, which indexes everything, has now been turned into YAML, devices.yml.

    Download Kali Linux 2024.4

    Kali Linux 2024.4 is a significant release that offers a wealth of new features and improvements for security professionals. By staying up-to-date with the latest tools and techniques, penetration testers can effectively identify and mitigate security risks.

    Previous Article

    Hackers Exploit Visual Studio Code for Malicious Remote Access

    Next Article
    Cyber Espionage Group

    Mask APT Resurfaces with Zero-Day Exploits and Malware

    Related Posts