|Initial release||13 March 2013 (6 years ago)|
|Latest release||2019.1a / 4 March 2019; 3 months ago|
|Update method||APT (several front-ends available)|
|Platforms||x86, x86-64, armel, armhf|
|Kernel type||Monolithic kernel (Linux)|
|Default user interface||GNOME 3|
|Official website||Official website|
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix. The third core developer, Raphaël Hertzog, joined them as a Debian expert.
Kali Linux has over 600 preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripperpassword cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAPweb application security scanners. Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.
It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix. The third core developer, Raphaël Hertzog, joined them as a Debian expert.
When you download an image, be sure to download the SHA256SUMS and SHA256SUMS.gpg files that are next to the downloaded image (i.e. In the same directory on the Kali Linux Download Server).Before verifying the checksums of the image, you must ensure that the SHA256SUMS file is the one generated by Kali.
Kali Linux is based on Debian Testing. Most packages Kali uses are imported from the Debian repositories.
The Kali Linux project began quietly in 2012, when Offensive Security decided that they wanted to replace their venerable BackTrack Linux project, which was manually maintained, with something that could become a genuine Debian derivative, complete with all of the required infrastructure and improved packaging techniques. The decision was made to build Kali on top of the Debian distribution because it is well known for its quality, stability, and wide selection of available software.
Feb 20, 2019. Download and run Kali Linux on your Primary operating system. Kali Linux ISO of doom, the perfect hardware backdoor. Kali Linux 32-64 bit Xfce Mate Cinnamon KDE LXDE E17 i3wm download ISO Torrent. If you downloaded your copy of the Kali Linux ISO image via the torrents, in addition to the ISO file (e.g. Kali-linux-2016.2-amd64.iso), there will be a second file containing the computed SHA256 signature for the ISO, with the extension “.txt.sha256sum” (e.g. Kali Linux has today release a new ISO for the most famous Hacking / Pentesting Distro Kali Linux 2018.4. You can download the ISO or Torrent for Kali Linux 2018.4.
The first release (version 1.0) happened one year later, in March 2013, and was based on Debian 7 “Wheezy”, Debian’s stable distribution at the time. In that first year of development, they packaged hundreds of pen-testing-related applications and built the infrastructure. Even though the number of applications is significant, the application list has been meticulously curated, dropping applications that no longer worked or that duplicated features already available in better programs.
During the two years following version 1.0, Kali released many incremental updates, expanding the range of available applications and improving hardware support, thanks to newer kernel releases. With some investment in continuous integration, they ensured that all important packages were kept in an installable state and that customized live images (a hallmark of the distribution) could always be created.
- Kali Linux requires a minimum of 3.8GB hard disk space for installation.
- A minimum of 512MB RAM for i386 and AMD64 architectures.
- A bootable CD-DVD drive or a USB stick.
Kali Linux is distributed in 32-bit and 64-bit images for use on hosts based on the x86instruction set and as an image for the ARM architecture for use on the Beagle Board computer and on Samsung's ARM Chromebook.
The developers of Kali Linux aim to make Kali Linux available for even more ARM devices.
Kali Linux is already available for BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1, and SS808.
With the arrival of Kali NetHunter, Kali Linux is also officially available on Android devices such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models.
Kali Linux is available on Windows 10, on top of Windows Subsystem for Linux (WSL). The official Kali distribution for Windows can be downloaded from the Microsoft Store.
Kali Linux Iso File
Kali Linux has a dedicated project set aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter.
It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member 'BinkyBear' and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.
BackTrack (Kali's predecessor) contained a mode known as forensic mode, which was carried over to Kali via live boot. This mode is very popular for many reasons, partly because many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. When booted in forensic mode, the system doesn't touch the internal hard drive or swap space and auto mounting is disabled. However, the developers recommend that users test these features extensively before using Kali for real world forensics.
Kali Linux includes security tools, such as:
- Cisco Global Exploiter, a hacking tool used to find and exploit vulnerabilities in Cisco Network systems
- Metasploit framework
- Social engineering tools.
- Reverse Engineering tools
These tools can be used for a number of purposes, most of which involve exploiting a victim network or application, performing network discovery, or scanning a target IP address. Many tools from the previous version (BackTrack) were eliminated to focus on the most popular penetration testing applications.
- ^'Official Kali Linux Releases'. Retrieved 2019-04-10.
- ^'Official Kali Linux Releases'. Retrieved 2019-04-16.
- ^'Kali Linux 1.0 review'. LinuxBSDos.com. 2013-03-14. Retrieved 2019-04-10.
- ^Simionato, Lorenzo (2007-04-24). 'Review: BackTrack 2 security live CD'. Linux.com. Retrieved 2019-04-10.
- ^Barr, Joe. 'Test your environment's security with BackTrack'. Linux.com. Retrieved 2019-04-10.
- ^'BackTrack 4 - Hacking galore'. Dedoimedo.com. 2009-05-15. Retrieved 2019-04-10.
- ^'BackTrack 5 R3 review'. LinuxBSDos.com. 2012-08-17. Retrieved 2019-04-10.
- ^Watson, J.A. (2014-05-28). 'Hands-on with Kali Linux 1.0.7'. ZDNet.com. Retrieved 2019-04-10.
- ^'Kali Linux 1.0.7 review'. LinuxBSDos.com. 2014-05-30. Retrieved 2019-04-10.
- ^'Kali Linux review'. Dedoimedo.com. 2014-12-15. Retrieved 2019-04-10.
- ^Watson, J.A. (2016-01-22). 'Hands-on with Kali Linux Rolling'. ZDNet.com. Retrieved 2019-04-10.
- ^Smith, Jesse (2016-04-25). 'Kali Linux 2016.1'. DistroWatch Weekly. No. 658. Retrieved 2019-04-10.
- ^ ab'Kali Linux Penetration Testing Tools'. tools.kali.org. Retrieved 2019-04-10.
- ^ ab'Kali Linux arrives as enterprise-ready version of BackTrack'. The H. 2013-03-13. Retrieved 2019-04-10.
- ^'Kali Linux Metapackages'. Offensive Security. Retrieved 2019-04-10.
- ^'The Birth of Kali Linux'. Offensive Security. 2012-12-12. Retrieved 2019-04-10.
- ^ abOrin, Andy (2014-12-03). 'Behind the App: The Story of Kali Linux'. Lifehacker. Retrieved 2019-04-10.
Mati Aharoni: One of our goals with Kali is to provide images of the operating system for all sorts of exotic hardware—mainly ARM based. This includes everything from Raspberry Pi's to tablets, to Android TV devices, with each piece of hardware having some unique property.
- ^'Kali's Relationship With Debian'. Kali Linux. 2013-03-11. Retrieved 2019-04-10.
- ^'A Bit of History'. kali.training. Retrieved 2019-04-10.
- ^'Kali Linux Hard Disk Install'. Kali Linux Official Documentation. Retrieved 2019-04-10.
- ^Pauli, Darren (2013-03-13). 'BackTrack successor Kali Linux launched'. SC Magazine. Retrieved 2019-04-10.
- ^'04. Kali Linux on ARM'. Retrieved 2019-04-10.
- ^muts (2018-03-05). 'Kali Linux in the Windows App Store'. Kali Linux. Retrieved 2019-04-10.
- ^ ab'Kali Linux NetHunter for Nexus and OnePlus'. Retrieved 2019-04-10.
- ^'Kali Linux Forensics Mode'. Retrieved 2019-04-10.
- Official website hacking
- Kali Linux at DistroWatch
Combining all the latest updates, patches, fixes, and improvements released in past few months, latest Kali Linux 2017.3 snapshot has been released. Before this release, Kali Linux 2017.2 was shipped in September.
Changes and new tools in Kali Linux 2017.3
The latest ISO is powered by the updated Linux kernel 4.13.10. As a result of this, some of the significant changes are:
- EXT4 directories can now contain 2 billion entries
- TLS support built into the kernel
- CIFS now uses SMB 3.0 by default
Before telling you about the new hacking tools included in 2017.3, let me tell you the existing packages that have been updated. These packages include Veil 3.0, Reaver v1.6.3, Social Engineering Toolkit v7.7.4, O-Saft 17.04.17, cuckoo 2.0.4, Burpsuite v1.7.27, Pixiewps v1.3, and Ethtool. Existing bugs in packages like Metasploit, Openvas 9, Setoolkit, Nmap, Hydra, etc., have been resolved as well.
The newly added Kali tools are:
- InSpy: Performs enumeration on LinkedIn and finds people on the basis of required criteria
- CherryTree: A often-requested note-taking tool
- Sublist3r: Enumerates subdomains across multiple sources at once. Thanks to integration with SubBrute, one can brute-force subdomains using a wordlist.
- OSRFramework: A collection of scripts to enumerate users, domains, etc.
- Massive Maltego Metamorphosis: A combination of Maltego and Casefile
Updating your Kali installation
In case you have Kali Linux already installed on your computer, you don’t need to download the new image and perform a clean installation. Just run these commands and make your move to an upgraded system:
Download Kali 2017.3 ISO and Torrent files
Just like all the previous releases, Kali Linux 2017.3’s 32-bit and 64-bit versions are available in the form of standard ISO images, VirtualBox and VMware images, ARM images, and cloud instances. You can download the HTTP downloads and torrent files on Kali downloads page.
Are you going to upgrade your existing Kali installation? Don’t forget to share your views and experiences with us.
Also Read: PINE64 PINEBOOK Review — Is This $89 Linux Laptop Worth it?