Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/2/2019
07:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Kali Linux Gets New Desktop Environment & Undercover Theme

Updates to pen-testing platform are designed to improve performance and user interface, says Offensive Security, maintainer of the open source project.

Offensive Security, maintainer of the Kali Linux penetration-testing platform, has released a new version of the widely used open source project.

Key improvements in Kali Linux 2019.4 include a brand-new default desktop environment, a unified user interface, and an undercover feature that allows security researchers to use the pen-testing tool in a public setting without tipping their hand.

With the new release, Offensive Security has moved Kali Linux from Gnome to Xfce, a lightweight, open source desktop environment for Linux, BSD, and other Unix-like operating systems. The move is designed to improve performance and the user experience for pen-testers, according to Offensive Security.

Xfce, for instance, runs on all levels of Kali installs from high-end laptops to lower-end ARM-based systems. It also supports a unified user interface (UI) regardless of where the user is running Kali, whereas with Gnome some of Kali's lower-end ARM builds had a very different UI than on other platforms. Importantly, Xfce supports all the functionality the average Kali Linux user requires with none of the additional overhead associated with the Gnome desktop environment, according to Offensive Security.

"Gnome has been overkill for many Kali users, and we wanted to move to a desktop environment that does only what's needed," says Jim O'Gorman, chief content and strategy officer at Offensive Security.

Most Kali Linux users typically just want a web browser and a window manager that allows them to run multiple terminal windows at once. "By moving to Xfce, we're providing a lightweight, to-the-point experience, and a unified UI regardless of where you're running Kali." The switch allows for Kali Linux to be more responsive and use less system resources, O'Gorman says.

The Kali undercover feature meanwhile is designed to give Kali Linux users a way to remain inconspicuous when doing security assessments in public, he notes. "The classic Kali dragon is so iconic it's often a dead giveaway for what you are doing, even for people that don't work in this space," O'Gorman notes. The undercover theme is designed to appear like a Windows desktop to the casual viewer. The theme is unlikely to hold up to a detailed examination but is perfectly adequate for fooling a casual observer, he says.

Kali Linux has been downloaded millions of times for each release. But Offensive Security does not have any exact numbers on how many organizations, pen-testers, and security researchers around the world might be using it currently, O'Gorman says. "We see Kali being used in the workplace, with 'live-build,' allowing for people to generate their own image of Kali, with their settings and programs preapplied," he notes.

Kali Linux penetration testing tools come in a variety of forms including those that can be used for information gathering, vulnerability analysis, wireless attacks, and vulnerability exploitation. Well-known and widely used Kali Linux tools include Nmap, Burp Suite, and the Metasploit Framework.

Offensive Security is currently going through every aspect of the Kali Linux project to see how it can be improved and what might need to be jettisoned. The analysis has already prompted changes in how Kali's Git repository is managed, how the software is mirrored and distributed, the way new releases are packaged, what tools get packaged with each Kali release, and other aspects.

"With the 2019.4 release in the rearview mirror, we will soon begin looking at our online services, such as support forums, bug tracker, real time chat, and so on," O'Gorman says.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "A Cause You Care About Needs Your Cybersecurity Help."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2007-6758
PUBLISHED: 2020-01-23
Server-side request forgery (SSRF) vulnerability in feed-proxy.php in extjs 5.0.0.
CVE-2010-3295
PUBLISHED: 2020-01-23
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-3691
PUBLISHED: 2020-01-23
A Symbolic Link (Symlink) Following vulnerability in the packaging of munge in SUSE SUSE Linux Enterprise Server 15; openSUSE Factory allowed local attackers to escalate privileges from user munge to root. This issue affects: SUSE SUSE Linux Enterprise Server 15 munge versions prior to 0.5.13-4.3.1....
CVE-2020-6843
PUBLISHED: 2020-01-23
Zoho ManageEngine ServiceDesk Plus 11.0 Build 11007 allows XSS.
CVE-2020-7931
PUBLISHED: 2020-01-23
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain...