Kali Linux Metapackages | Kali Linux Blog

Kali Linux Metapackages | Kali Linux Blog

One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expanded the metapackage list to include far more options: kali-linux kali-linux-all kali-linux-forensic…

Read More
What's New in Kali Linux? | Kali Linux Blog

What’s New in Kali Linux? | Kali Linux Blog

Enter Kali Linux “So, what’s the difference between BackTrack and Kali?” you might be asking. Unfortunately for us, that’s not a simple question to answer. It’s a mix between “everything” and “not much”, depending on how you used BackTrack. From an end user perspective, the most obvious change would be the switch to Debian and…

Read More
Kali Linux in the DigitalOcean Cloud | Kali Linux Blog

Kali Linux in the DigitalOcean Cloud | Kali Linux Blog

DigitalOcean is a cloud provider similar to AWS, Microsoft Azure, Google Cloud Platform, and many others. They offer instances, called “droplets”, with different Linux distributions such as Debian, Ubuntu, FreeBSD, etc. Similar to AWS, DigitalOcean has datacenters around the world and sometimes multiple datacenters in each country. However, one feature in particular sets them apart…

Read More
Cracking in the Cloud with CUDA GPUs | Kali Linux Blog

Cracking in the Cloud with CUDA GPUs | Kali Linux Blog

Due to increasing popularity of cloud-based instances for password cracking, we decided to focus our efforts into streamlining Kali’s approach. We’ve noticed that Amazon’s AWS P2-Series and Microsoft’s Azure NC-Series are focused on Windows and Ubuntu. The corresponding blog posts and guides followed suit. Although these instances are limited by the NVIDIA Tesla K80’s hardware…

Read More
Kali on KRACK | Kali Linux Blog

Kali on KRACK | Kali Linux Blog

WPA2 Key Reinstallation AttaCK or KRACK attack Recently, Mathy Vanhoef of imec-DistriNet, KU Leuven, discovered a serious weakness in WPA2 known as the Key Reinstallation AttaCK (or KRACK) attack. Their overview, Key Reinstallation Attacks: Breaking WPA2 by forcing nonce reuse, and research paper (Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, co-authored by Frank Piessens)…

Read More