The Kali Linux security distribution is making a strong start to the year with the release of its 2024.1 version. This major update brings a flurry of improvements, including four new security tools, a bold visual refresh, and desktop optimizations for a smoother user experience.
New tools to expand your arsenal
- blue-hydra : Detect Bluetooth devices within range and explore potential vulnerabilities.
- opentaxii : Harness the power of the TAXII server to collect and analyze critical security information.
- readpe : Manipulate Windows PE files with precision for in-depth investigations.
- Snort : Deploy a flexible network intrusion detection system to counter threats in real time.
A modern and refined look

Kali 2024.1 features a sleek new theme designed to enhance the user experience from the moment of login . The boot menu, login screen, and wallpapers have been redesigned to offer a more intuitive and engaging interface. Two new wallpapers, inspired by the Nord and Dracula color palettes , complete the distribution's modern aesthetic.
Offices optimized for better ergonomics
Xfce : Easily copy your VPN IP address to the clipboard for simplified management of your connections.
Gnome : The eog image viewer has been replaced by Loupe for a richer viewing experience. The Nautilus has been optimized for improved performance.
Updates and installation
To take advantage of Kali Linux 2024.1, existing users can upgrade using the following commands:
echo "deb http://http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list sudo apt update && sudo apt -y full-upgrade cp -vrbi /etc/skel/. ~/ [ -f /var/run/reboot-required ] && sudo reboot -f
For a new installation, download the ISO images from the official Kali website: https://www.kali.org/get-kali/ .
Conclusion
Kali Linux 2024.1 presents itself as a formidable weapon for IT security professionals and ethical hackers. By combining powerful new tools, a refined user interface, and optimized desktops, this version offers an unparalleled offensive security experience.
Source :



