The Kali Linux development team, one of the best-known and most widely used information security distributions, has released the first version of 2018. The new Kali Linux 2018.1 version incorporates a large number of important changes, including the solution of all the bugs found since the last version in November 2017.
This new version incorporates all the updates of the software incorporated in it; therefore, it’s the latest in terms of software versions of the distribution. A large number of bugs that were present in the latest Kali Linux 2017 have also been fixed. This new version Kali Linux 2018.1 does not include the patches for Meltdown and Specter, however, they have reported that as soon as they have a stable version, they will update.
This new version Kali Linux 2018.1 incorporates a Linux kernel 4.14, including all the new features incorporated in that version, although there are two features of this new version that stand out.
The first built-in feature is compatibility with AMD Secure Memory Encryption. This feature is found only in the latest processors of the manufacturer AMD, and allows the automatic encryption and decryption of the DRAM. “This change is very important, because with this feature it means that the systems will no longer be vulnerable to physical attacks where a user can extract the readable memory with all the information” said an expert in information security of the International Institute of Cyber Security.
The second feature allows for increased memory limits. Nowadays the Linux kernel is already prepared so that the following processors allow the paging of 5 levels, being able to support up to 4PB of physical memory and 128PB of virtual memory.
The development team has also updated important software such as zaproxy, pixiewps, burpsuite, reaver and more.
According to an information security researcher, in this new version Kali Linux 2018.1 have added specific virtual machines for execution with Hyper-V, are define as “generation 2”, is that it is now based on UEFI, and also allow the expansion of the hard disk
Working as a cyber security solutions architect, Alisa focuses on bug bounty and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.