Today marks an important milestone for us with the first public release of our Kali Linux rolling distribution. Kali switched to a rolling release model back when we hit version 2.0 (codename "sana"), however the rolling release was only available via an upgrade from 2.0 to kali-rolling for a select brave group. After 5 months of testing our rolling distribution (and its supporting infrastructure), we're confident in its reliability - giving our users the best of all worlds - the stability of Debian, together with the latest versions of the many outstanding penetration testing tools created and shared by the information security community.
Kali Linux 2.0 has been out for a couple of months and the response has been great, with well over a million unique downloads of Kali 2.0 as a testament. Release day was somewhat hectic for us, as we did not anticipate the sheer volume of traffic … which we somehow always underestimate. In the first few days after the release of 2.0 we had ten times the download volume of 1.0 in a similar period, back in 2013.
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali Linux Dojo, which was a blast. With the help of a few good people, the Dojo rooms were set up ready for the masses - where many generated their very own Kali 2.0 ISOs for the first time. But the excitement doesn't end for us just yet. With the end of the cons, we now find ourselves smack in the middle of the most significant release of Kali since 2013. Today is the day that Kali 2.0 is officially released.
We've been awfully quiet lately, which usually means something is brewing below the surface. In the past few months we've been working feverishly on our next generation of Kali Linux and we're really happy with how it's looking so far. There's a lot of new features and interesting new aspects to this updated version, however we'll keep our mouths shut until we're done with the release. We won't leave you completely hanging though...here's a small teaser of things to come!
Last week we received an email from a fellow penetration tester, requesting official Kali Linux Docker images that he could use for his work. We bootstrapped a minimal Kali Linux 1.1.0a base and registered it under our Kali Linux Docker account. A few minutes later, said fellow pentester was up and running with Metasploit and the Top 10 Kali Linux tools on his Macbook Pro.
A short while ago, we packaged and pushed out a few important wireless penetration testing tool updates for reaver, aircrack-ng and pixiewps into Kali's repository. These new additions and updates are fairly significant, and may even change your wireless attack workflows. Pixiewps is a tool used for offline brute forcing of WPS pins....