Kali Linux 2017.2 official Release
Today, Kali Linux developer team official release Kali Linux 2017.2.
Image source: kali
Many tools and packages have been updated
The release includes updates to both the base platform packages that came with Debian Testing and directly to the tools of Kali Linux itself. In general, the number of updated and new packages exceeds 1,500.
New tools added
- hurl is a small but useful hexadecimal and URL encoder/decoder
- phishery – allows you to implement phishing URLs of basic authentication with SSL support in Word documents .docx
- ssh-audit – auditor of SSH servers, which checks encryption types, banners, compression and other
- apt2 is a set of tools for automated penetration testing that runs its own scans or imports results from various scanners and performs actions against found targets
- bloodhound – uses graph theory to identify hidden links and paths of attack in an Active Directory environment.
- crackmapexec – a follow-up tool for automating the evaluation of large Active Directory networks
- dbeaver is a powerful graphical database management interface that supports the most popular databases, including MySQL, PostgreSQL, Oracle, SQLite and many others.
- brutespray – automatically scans the credentials on the found services
In addition to new packages, this release also includes numerous packet updates, including jd-gui, dnsenum , edb-debugger, wpscan , watobo, burpsuite and many others.
When viewing help on commands, you can see examples that will not work when running in Kali Linux. This is not due to the fact that the program does not work, but because of the peculiarities of the launch site, the way of installation.
Examples of starting SMBmap from the documentation:
$ python smbmap.py -u jsmith -p password1 -d workgroup -H 192.168.0.1
$ python smbmap.py -u jsmith -p ‘aad3b435b51404eeaad3b435b51404ee:da76f2c4c96028b7a6111aef4a50a94d’ -H 172.16.0.20
$ python smbmap.py -u ‘apadmin’ -p ‘asdf1234!’ -d ACME -h 10.1.3.30 -x ‘net group “Domain Admins” /domain’
The lines begin with “python smbmap.py”, because the author meant that you cloned the program files to your disk, moved to the program directory and started it there.
In Kali Linux, where symbolic links are made to the program files, it would be correct to run this way:
$ smbmap -u jsmith -p password1 -d workgroup -H 192.168.0.1
$ smbmap -u jsmith -p ‘aad3b435b51404eeaad3b435b51404ee:da76f2c4c96028b7a6111aef4a50a94d’ -H 172.16.0.20
$ smbmap -u ‘apadmin’ -p ‘asdf1234!’ -d ACME -h 10.1.3.30 -x ‘net group “Domain Admins” /domain’
How to upgrade to Kali Linux 2017.2
Open terminal, run command