Kali Linux 2020.1 allows hackers to use NetHunter without rooting their phones.
As a kid when I heard of the term hacking, it immediately translated to me typing away at multiple screens and accessing everything I wanted to. And in doing so, guess which operating system appeared as the foremost choice, a no brainer? Kali Linux.
Perhaps, this can be attributed to a huge range of tools that come pre-installed with it. Regardless, it is an essential part of every ethical hacker’s toolkit and with its release of a new version today titled Kali Linux 2020.1, we have an array of new features and updates to be excited about.
Firstly, moving away from its default credentials of “root/tor” for the username & password, the new ones will be now set to “Kali/Kali.” Furthermore, upon installation, you will have the chance to assign administrative privileges to a non-root user.
Secondly, NetHunter which is its open-source Android pentesting software for certain phones such as Nexus will allow hackers to use the platform without rooting their phones, something that would result in a lot of less complexity.
Thirdly, we have a major change in the way Kali will be downloaded from now on. Done so typically through a Linux image that you could consider the equivalent of setup installation files, we now have 3 types of images available.
See: Download Kali Linux from Microsoft Store and use on Windows 10
1st: The first one is a live image that allows one to try Kali without installing the OS, more like something you would want to use for experimenting or to do a one-time task.
2nd: Secondly, we have an installer image which is the regular option of installing the complete OS.
3rd: then, there’s a network installer image which is also the smallest in its size and would require an internet connection to install the latest packages.
Additionally, before, there used to be different images for different desktop environments (DE) but this is no longer the case as well. Users can select one during installation instead of having to download DE specific ones such as Gnome.
Lastly, all tools based on Python 2 have been removed since its “End of Life” date was announced to be the 1st of January 2020. Moreover, certain new packages have been added which include cloud-enum, email harvester, phpggc, sherlock & splinter.
See: Hacking tools & ready-made phishing pages being sold on dark web for $2
These, of course, can be very useful for those who know how to make use of them. As an example, one of them – Sherlock – has its GitHub page explain itself as a tool that can be used to “Hunt down social media accounts by username across social networks.” Would Mr.Holmes be jealous of the 1890s? You decide.
Did you enjoy reading this article? Like our page on Facebook and follow us on Twitter.