View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7145 [Kali Linux] Kali Package Bug major unable to reproduce 2021-04-17 20:35 2021-04-17 20:35
Reporter: keops Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: JS/Blackhole!MSR / MAJOR BLACHOLE MALWARE COME WITH THIS VERSION
Description: A major critical exploit come with the latest package of Kali 2021.1 image download , WHICH is typically used to install other malware or unwanted software to infect PC without my sign or my knowledge
As Windows Defender Antivirus detects the threat and remove it before installation of this version of KALI
Steps To Reproduce: I am somehow hesitate to continue with this version but I'll deal with inside a virtual machine to see what's going on on a clean machine.
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7144 [Kali Linux] General Bug major always 2021-04-17 19:50 2021-04-17 19:50
Reporter: berkkucukk Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Explore store
Description: I cannot connect to the Discover store. It always gives a connection error.
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot_20210417_224739.png (35,417 bytes) 2021-04-17 19:50
https://bugs.kali.org/file_download.php?file_id=2063&type=bug
png
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7143 [Kali Linux] General Bug trivial random 2021-04-16 03:25 2021-04-17 15:03
Reporter: maced0 Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Terminal is not accepting accents and is buggy
Description: The terminal does not accept accents in pt-br words. an example to follow, as soon as I type the word number it returns so n <ffffffff> <ffffffff> mere is a bug occurring, can someone help me solve this? It occurs with all kinds of accents. And the course of the terminal goes behind the $ of the terminal, leaving it all buggy is replicating the command.

Steps To Reproduce:
Additional Information:
Attached Files: image.png (3,912 bytes) 2021-04-16 03:25
https://bugs.kali.org/file_download.php?file_id=2060&type=bug
png

image-2.png (3,005 bytes) 2021-04-16 03:25
https://bugs.kali.org/file_download.php?file_id=2061&type=bug
png

image-3.png (77,724 bytes) 2021-04-16 03:25
https://bugs.kali.org/file_download.php?file_id=2062&type=bug
png
Notes
(0014469)
Michu   
2021-04-17 15:03   
apt install locales-all locales-pt or dpkg-reconfigure locales could do the trick because you may don't have portugal subtitles

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7137 [Kali Linux] General Bug feature unable to reproduce 2021-04-08 18:26 2021-04-14 17:37
Reporter: MOHE Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: couldn't find WiFi That's around me.
Description: After i instal the New version kali 2021.1
When I'm trying to call my wi-fi.
Go to the Wi-Fi icon and start looking for the Wi-Fi.
The result is 0.
Knowing that I have Realtek chips
And when I get my phone to USB and share the internet with it, it's normal.
I can access Google YouTube and I can download files
But I want to connect to The Wi-Fi without connecting my computer to USB.
Please, I want a solution.
Thank you
Steps To Reproduce:
Additional Information:
Attached Files: IMG_20210409_153641.jpg (160,440 bytes) 2021-04-09 14:40
https://bugs.kali.org/file_download.php?file_id=2048&type=bug
jpg

IMG_20210411_093035.jpg (1,051,258 bytes) 2021-04-11 08:33
https://bugs.kali.org/file_download.php?file_id=2051&type=bug
IMG_20210411_094539.jpg (690,849 bytes) 2021-04-11 08:48
https://bugs.kali.org/file_download.php?file_id=2052&type=bug
IMG_20210412_134231.jpg (1,072,514 bytes) 2021-04-12 12:43
https://bugs.kali.org/file_download.php?file_id=2053&type=bug
IMG_20210412_134452.jpg (788,520 bytes) 2021-04-12 12:46
https://bugs.kali.org/file_download.php?file_id=2054&type=bug
IMG_20210412_134554.jpg (901,371 bytes) 2021-04-12 12:46
https://bugs.kali.org/file_download.php?file_id=2055&type=bug
IMG_20210412_140036.jpg (1,237,392 bytes) 2021-04-12 13:01
https://bugs.kali.org/file_download.php?file_id=2056&type=bug
IMG_20210412_140010.jpg (622,973 bytes) 2021-04-12 13:01
https://bugs.kali.org/file_download.php?file_id=2057&type=bug
Notes
(0014442)
Michu   
2021-04-09 14:08   
maybe ssid broadcasting is off, do you have wifi connection in phone?
also there is a possibility that you don't have drivers to use wifi
let me know what you got
(0014443)
MOHE   
2021-04-09 14:40   
No i have driver in my kali watch the photo
I have the icon of WiFi but he can't detect Any WiFi Around me
When II share the internet from my phone via USB I can browse the internet
(0014446)
Michu   
2021-04-10 16:21   
could you dump info from iwconfig and check if your wireless card can go to monitor mode
ifconfig wlan < here number of your wireless card
iwconfig wlan same here and airodump-ng wlannumberofyourcarmon0
(0014449)
MOHE   
2021-04-11 08:33   
i don't have number of my wirless card
Maybe I should reload my wi-fi driver ?
(0014450)
MOHE   
2021-04-11 08:48   
I'm sorry, I wrote earlier iwconfig I made a mistake.
I don't understand " airodump-ng wlannumberofyourcarmon0"
(0014453)
Michu   
2021-04-12 12:22   
airodump-ng wlannumberofyourcarmon0 is something like airodump-ng wlan0mon0 and i wrote airodump-ng wlannumberofyourcarmon0 because i don't know what number of wireless card is yours so that's example
(0014454)
Michu   
2021-04-12 12:25   
so your interface is wlan0 i see that now so try iwconfig wlan0 and airodump-ng wlan0mon0 and dump output will see what we will get maybe its driver messing with you :)
(0014456)
MOHE   
2021-04-12 12:43   
I've been looking a lot in the last days for a solution to my problem, so I found out there was a problem with my chip Realtek RTL8821CE 802.11ac PCIe Adapter. kali linux can't recognize this chip.
And when I'm trying to install the pilot, I have a lot of error messages. https://www.linux.org/threads/help-install-kali-wifi-driver-for-realtek-rtl8821ce-802-11ac-pcie-adapter.32938/
(0014457)
MOHE   
2021-04-12 12:46   
when I instal the driver the wlan0 show
(0014458)
MOHE   
2021-04-12 13:01   
When I restart my laptop it show me
(0014463)
Michu   
2021-04-13 19:19   
told you that driver is messing with you :) on first 2 pics you see effects after driver installation but on other 2 driver maybe gone away dump info from /var/lib/dkms etc. from the line that is starting !Consult there is everything what we need figure whats next in my opinion there is 2 options
1 wait for kernel update because looks like he is responsible for error and its mention on picture 1 after link to linux.org
2 more risky but could do effect compile kernel by yourself
dump that infos and will see what next ok.Cheers
(0014465)
MOHE   
2021-04-14 12:07   
Thank u i update the kernel and it working now thank u ☺️✌️��
(0014466)
Michu   
2021-04-14 17:31   
that's great and no problem everybody helps each other thats purpose of tis forum and thanks i could help cheers
(0014467)
MOHE   
2021-04-14 17:37   
Yah thank u Michi !!
(0014468)
MOHE   
2021-04-14 17:37   
Michu my bad �

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7141 [Kali Linux] General Bug major always 2021-04-12 14:23 2021-04-14 02:41
Reporter: Gourav Sharma Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Bluetooth is not working
Description: Bluetooth is in active status but it does not show any devices present it remain in off condition
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014462)
ved   
2021-04-13 02:24   
type this in terminal :
sudo /etc/init.d/bluetooth start
(0014464)
Michu   
2021-04-13 19:21   
or service bluetooth status and start

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7142 [Kali Linux] General Bug minor have not tried 2021-04-13 14:37 2021-04-13 14:37
Reporter: suhasjain Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: not able return back from kali undercover mode
Description: i am now in undercover mode,when i hit undercover mode icon it doesn't return back.It will just show desktop settings restored
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6956 [Kali Linux] Queued Tool Addition minor N/A 2020-12-30 03:48 2021-04-12 21:51
Reporter: devGregA Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: OWASP DefectDojo
Description: [Name] - The name of the tool

OWASP DefectDojo

[Version] - What version of the tool should be added?

1.11.0

[Homepage] -

https://www.defectdojo.org/
https://github.com/DefectDojo/django-DefectDojo
https://defectdojo.readthedocs.io/en/latest/

[Download] - Where to go to get the tool?

https://github.com/DefectDojo/django-DefectDojo/releases/tag/1.11.0
or
https://hub.docker.com/u/defectdojo - docker images are the easiest way to get the new releases.

[Author] - Who made the tool?

DefectDojo is maintained by a group: https://github.com/DefectDojo/django-DefectDojo#project-moderators, but I am the original author.

[Licence] - How is the software distributed? What conditions does it come with?

BSD 3-Clause
https://github.com/DefectDojo/django-DefectDojo/blob/master/LICENSE.md

[Description] - What is the tool about? What does it do?

Combines scan results from multiple scanners to consolidate metrics, make reporting easier, and remove duplicates / false positive using heuristic algorithms.

[Dependencies] - What is needed for the tool to work?

If docker is an option, only the docker images. We typically recommend adding the start up to Systemctl

[Similar tools] - What other tools are out there?

Threadfix, CodeDX, Dradis.

[Activity] - When did the project start? Is is still actively being deployed?

Approximately 7 years ago. Yes, actively maintained and continuing to grow. We're a flagship project under OWASP.

[How to install] - How do you compile it?

No compiling is necessary with the docker images.

Note, using source code to acquire (e.g. git clone/svn checkout) can't be used - Also downloading from the head. Please use a "tag" or "release" version.

[How to use] - What are some basic commands/functions to demonstrate it?

Example 1: Say you like using openVAS for scanning infrastructure and ZAP for applications. DefectDojo is an easy way to take the results from both and export one report without having to manually combine.
Example 2: Say you really like Burp Suite for finding some vulnerabilities, but you also like Arachni for others. You can ship the results from both into DefectDojo. Dojo will attempt to remove duplicates/overlap by looking at the endpoint/location and finding details.

[Packaged] - Is the tool already packaged for Debian?

There is not, but we have a maintainer who is familiar with Debian packaging and happy to assist.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014053)
g0tmi1k   
2021-01-08 13:26   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0014107)
devGregA   
2021-01-11 22:08   
Thanks for getting back to me @g0tmi1k. Will review the packaging process and discuss with the team. Back with you shortly.
(0014117)
devGregA   
2021-01-17 06:31   
We've reviewed and will take a first run at the packaging. Expecting to be able to complete it this week.
(0014461)
devGregA   
2021-04-12 21:51   
All, sorry for the delay. We have made bandwith and have started the effort.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7126 [Kali Linux] Feature Requests feature unable to reproduce 2021-03-31 14:49 2021-04-12 16:33
Reporter: ved Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: titlebar buttons gone missing
Description: titlebar buttons ...maximize....minimize .....close buttons gone from gnome on some of windows
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot from 2021-04-12 22-01-53.png (1,802,389 bytes) 2021-04-12 16:33
https://bugs.kali.org/file_download.php?file_id=2059&type=bug
Notes
(0014445)
ved   
2021-04-10 16:02   
hey guys ......
thanks for fixing title bar buttons.....you guys made my day.......
(0014448)
ved   
2021-04-11 01:59   
hey guys....
before shutting down my kali linux in night .....you guys have added the buttons.....but when i boot my kali today in the morning .......the titlebar buttons again gone missing......
(0014460)
ved   
2021-04-12 16:33   
fix it soon guys .....i'm waiting for it for so many days......it looks bad on some of windows .....recently logged into KDE .....and got that KDE dirty looking buttons.....

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7131 [Kali Linux] General Bug tweak always 2021-04-05 18:46 2021-04-12 14:41
Reporter: berkkucukk Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kde plasma widget
Description: Sensors section does not work in kde plasma system widgets.
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot_20210405_214112.png (507,268 bytes) 2021-04-05 18:46
https://bugs.kali.org/file_download.php?file_id=2041&type=bug
Screenshot_20210408_224313.png (31,646 bytes) 2021-04-08 19:44
https://bugs.kali.org/file_download.php?file_id=2046&type=bug
png

Screenshot_20210412_173944.png (116,390 bytes) 2021-04-12 14:41
https://bugs.kali.org/file_download.php?file_id=2058&type=bug
png
Notes
(0014430)
steev   
2021-04-05 18:54   
Is lm-sensors installed and set up?
(0014439)
berkkucukk   
2021-04-08 19:44   
Yes the latest version is installed.
(0014440)
berkkucukk   
2021-04-08 19:47   
But I still can't choose the sensor.
(0014444)
berkkucukk   
2021-04-09 20:08   
I formatted it before to fix this problem but it didn't work.
(0014455)
Michu   
2021-04-12 12:28   
what's output of sensors
(0014459)
berkkucukk   
2021-04-12 14:41   
Sensors are working fine. I cannot select sensors only when adding widgets.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6896 [Kali Linux] General Bug text always 2020-12-03 02:50 2021-04-12 09:10
Reporter: wwywyeydy Platform:  
Assigned To: daniruiz OS:  
Priority: low OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Terminal
Description: When I install libreoffice, specials chars disappear in terminal.

Can you help me?
Steps To Reproduce: sudo apt install libreoffice
Additional Information:
Attached Files: report.png (287,357 bytes) 2020-12-03 02:50
https://bugs.kali.org/file_download.php?file_id=1953&type=bug
Notes
(0013950)
daniruiz   
2020-12-08 08:59   
That is weird. I've checked it and I can confirm this issue, so I'll continue investigating it.
Thanks for reporting!
(0013953)
daniruiz   
2020-12-08 12:17   
I've tested all the fonts that are installed as a dependency by libreoffice and the one that breaks the icons is fonts-noto-core. This issue is also present in konsole terminal so this might be a Qt issue.
(0013971)
wwywyeydy   
2020-12-13 19:56   
Hello, it can be fixed?
(0014036)
daniruiz   
2021-01-05 13:52   
I'm trying to find the issue but had no luck for now. This needs to be fixed
(0014038)
mantisjr   
2021-01-05 15:02   
Please try these steps:
1. Download the tar.gz file from https://www.libreoffice.org/download/download/?type=deb-x86_64&version=7.0.4&lang=en-US
2. unpack it
3. open the folder "DEBS" in the terminal
4. type "sudo dpkg -i *.deb"

I hope this will help
(0014039)
rhertzog   
2021-01-06 07:06   
Maybe Qt ends up using/favoring the noto font but the font as installed lacks the special characters? What happens if you install "fonts-noto" which should pull all the other fonts-noto-*?

Aren't we forcing the use of another font currently?

Maybe our default font lacks the symbols and Qt tries to fallback to noto knowing that it should have all the symbols and in fact we have only a subset?
(0014308)
mantisjr   
2021-03-10 09:50   
When I reinstalled Kali I had the same issue. I tested what would happen if I removed fonts-noto-core and: It helped!

So after installing LibreOffice type "sudo apt remove fonts-noto-core" and close the terminal. When you open the Terminal now, everything will be fine.
(0014452)
daniruiz   
2021-04-12 09:10   
Fixed for Kali 2021.2

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7138 [Kali Linux] Kali Package Bug minor always 2021-04-09 05:17 2021-04-12 09:09
Reporter: rootjb0 Platform:  
Assigned To: daniruiz OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Qterminal not showing certain characters after full-upgrade
Description: Ever since Kali switched to Zsh in late 2020 (which was a great choice), every time I update the system after installing qterminal stops showing certain characters. Namely, the character between the user and the hostname for both the regular user and the root user.

Is this a Kali bug, a Qterminal bug? Is there a way to fix this? I've tried reinstalling Qterminal and it does not solve the issue.
Steps To Reproduce: 0. Install latest Kali ISO

1. 'sudo apt update && sudo apt full-upgrade'

2. Reboot or log out then back in.

3. Qterminal should now have stopped showing the star in a circle character in the terminal.
Additional Information:
Attached Files: b4after.jpeg (15,570 bytes) 2021-04-09 05:17
https://bugs.kali.org/file_download.php?file_id=2047&type=bug
jpeg
Notes
(0014441)
daniruiz   
2021-04-09 07:33   
Hello. This is an issue with qterminal and noto fonts.
Try removing them with `sudo apt remove fonts-noto-core`

Related issue: https://bugs.kali.org/view.php?id=6896
(0014451)
daniruiz   
2021-04-12 09:09   
Fixed for Kali 2021.2

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7140 [Kali Linux] General Bug major always 2021-04-11 15:41 2021-04-11 15:41
Reporter: berkkucukk Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: External Monitor
Description: I cannot transmit images to the external display connected via HDMI. The laptop has Intel and Nvidia graphics card. Graphics card in hybrid mode in my bios settings. I tried every way but couldn't solve this problem.
If Nvidia bumblebee is installed it would be resolved but I cannot install it because I got an error during installation.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7139 [Kali Linux] Kali Package Bug minor always 2021-04-11 03:19 2021-04-11 03:19
Reporter: punisher2k7 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Nethunter Can`t install Chroot
Description: https://forums.kali.org/showthread.php?50333-Chroot-is-not-getting-installed&p=98443#post98443
Steps To Reproduce: run app - download chroot - try to install chroot
Additional Information:
Attached Files: nethunt.jpg (470,374 bytes) 2021-04-11 03:19
https://bugs.kali.org/file_download.php?file_id=2049&type=bug
nethunt2.jpg (994,566 bytes) 2021-04-11 03:19
https://bugs.kali.org/file_download.php?file_id=2050&type=bug
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7136 [Kali Linux] Feature Requests minor always 2021-04-07 19:13 2021-04-10 16:22
Reporter: LeeRock Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Unable to start web browser from the command line when running as root.
Description: This has always been an option until recently.
When running as root, there should be NO restrictions.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014447)
Michu   
2021-04-10 16:22   
maybe sandbox is blocking her what's the browser ?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7129 [Kali Linux] Feature Requests feature unable to reproduce 2021-04-04 04:54 2021-04-08 18:13
Reporter: RME Systems Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: add realtek rtl8723de wifi driver
Description: I would like if it is possible to add the wifi driver for realtek rtl8723de. Thank you
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014438)
MOHE   
2021-04-08 18:13   
I have the same problem when I instal kali 2021.1 i can't détecté eny WiFi wirless
And i have Realtek chips

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7061 [Kali Linux] General Bug minor always 2021-02-23 22:36 2021-04-08 06:28
Reporter: jaalinaam Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Logitech G602 stopped working after Kernel 5.10.11
Description: I have a Logitech G602 gaming mouse with configurable buttons which have stopped working, there has already been a requesed raised for this in linux github and a patch will be implimented in next release.
Requesting you to kindly support in Kaali as well

https://github.com/libratbag/libratbag/issues/1124
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014245)
steev   
2021-02-23 23:24   
The patch in particular is https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=ef07c116d98772952807492bd32a61f5af172a94 ; it does have a fixes tag, so it should be backported to the 5.10 kernel, but it hasn't made its way there yet.
(0014435)
jaalinaam   
2021-04-07 20:37   
Hi Steev,
this issue has been fixed, requesting you to close this request.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7121 [Kali Linux] Queued Tool Addition minor have not tried 2021-03-30 03:09 2021-04-08 06:27
Reporter: Erika carpenter Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System
Description: Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System

- [Name] - Quark-Engine
- [Version] - 21.3.1
- [Homepage] - https://github.com/quark-engine/quark-engine
- [Download] - https://github.com/quark-engine/quark-engine/releases
- [Author] - JunWei Song(krnick)
- [Licence] - GPL v3
- [Description] - Quark-Engine is a full-featured Android analysis framework written in Python for hunting threat intelligence inside the APK, DEX files. Since it is rule-based, you can use the ones built-in or customize as needed.

With ideas decoded from criminal law, Quark-Engine has its unique angles for Android analysis. We developed a Dalvik bytecode loader that has tainted analysis inside but also defeats the obfuscation techniques used against reverse engineering. And surprisingly, the loader matches perfectly the design of our malware scoring system.

Quark-Engine is very easy to use and also provides flexible output formats. There are three types of output reports: detail report, call graph, and summary report. With these reports in mind, you can get an overview of the high-risk behavior inside Android within seconds.

Also, by integrating with other Android analysis tools such as Ghidra, APKLAB, Jadx, Quark-Engine can greatly improve the efficiency of reverse engineers.

- [Dependencies] - python3, git, graphviz
- [Similar tools] - MobSF
- [How to install] - https://github.com/quark-engine/quark-engine#installation
- [How to use] - https://quark-engine.readthedocs.io/en/latest/

Quark-Engine already presented at DEFCON 28 BTV, HITB Lockdown 002, and will release more features at BlackHat Asia 2021 Arsenal. Also, Quark-Engine is now integrated with many open-source tools, such as IntelOwl, BlackArch Linux, Pithus/Bazaar, and APKLAB.

We have experiences (ghidraquark, APKLab) developing a feature that when users click on one of the activities, the corresponding smali source codes are highlighted for manual verification. This boosts up the speed for malware analysts.

Reference:

1. Integrating with Ghidra:
https://github.com/quark-engine/ghidraquark
Quick demo for the quark usage with Ghidra
https://www.youtube.com/watch?v=VXzfFB2S4bo&ab_channel=JunWeiSong

2. Android malware reports that using Quark-Engine to analyze:
https://github.com/quark-engine/quark-reports

3. Quark-Engine Rules:
https://github.com/quark-engine/quark-rules

4. BlackHat Asia 2021 Arsenal
https://www.blackhat.com/asia-21/arsenal/schedule/index.html#quark-engine-storyteller-of-android-malware-22458

5. DEFCON 28 BTV
https://www.youtube.com/watch?v=XK-yqHPnsvc&ab_channel=DEFCONConference

6. HITB Lockdown 002
https://conference.hitb.org/hitb-lockdown002/sessions/quark-engine-an-obfuscation-neglect-android-malware-scoring-system/
Steps To Reproduce:
Additional Information:
Attached Files: 螢幕快照 2021-04-07 下午11.26.38.png (35,707 bytes) 2021-04-08 03:14
https://bugs.kali.org/file_download.php?file_id=2043&type=bug
png

螢幕快照 2021-04-07 下午11.26.56.png (42,507 bytes) 2021-04-08 03:14
https://bugs.kali.org/file_download.php?file_id=2044&type=bug
png

螢幕快照 2021-04-08 上午11.07.45.png (207,062 bytes) 2021-04-08 03:14
https://bugs.kali.org/file_download.php?file_id=2045&type=bug
png
Notes
(0014404)
g0tmi1k   
2021-03-26 13:32   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0014405)
krnick   
2021-03-29 07:54   
Thank you Kali Linux team for the acceptance of quark-engine, I'd love to work on the packaging.
(0014437)
krnick   
2021-04-08 03:14   
Hello @g0tmi1k @kali-team,

I have packaged the quark-engine to Debian package in the latest release version "v21.4.3".

The .deb file could be download here:
https://github.com/quark-engine/quark-engine/releases/tag/v21.4.3

Our Debian setting directory:
https://github.com/quark-engine/quark-engine/tree/master/debian

Note:
I have checked the package list of both "androguard" and "python3-graphviz" via apt-cache search, but it still needs to manually download "androguard" and "python3-graphviz" even if I put them in debian/control.

Many thanks!

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6791 [Kali Linux] Kali Package Bug minor random 2020-10-14 18:48 2021-04-08 00:33
Reporter: wrathofgod Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kex crached
Description: Keev,
After trying to deal in the installation and running of "proxychains" which lead me to other many other issues, and trying to fix them in order to get the "proxychains fixed", accidentally i messed up with "Kex" and "source.list" files.

Now, everything we achieved together in order to get the GUI up a running, now is crashed.

I tried to reinstall everything, but it didn't worked, as also, the "source.list" is directly related to the update and upgrade of linux.

PLEASE HELP!!
Steps To Reproduce: In bach terminal,
kex
> error crashed
Additional Information:
Attached Files: UnableToKex.png (128,927 bytes) 2020-10-14 18:48
https://bugs.kali.org/file_download.php?file_id=1923&type=bug
png

image.png (25,376 bytes) 2021-04-08 00:33
https://bugs.kali.org/file_download.php?file_id=2042&type=bug
png
Notes
(0014436)
maxhyt   
2021-04-08 00:33   
This is because TigerVNC thinks Win-Kex startup script ended too fast.
Edit the script at: "/usr/lib/win-kex/xstartup". Remove the '&' after 'startxfce4' command at the bottom of the script. This makes the xfce session not running in the background and TigerVNC can continue normally

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7125 [Kali Linux] Tool Upgrade block always 2021-03-31 08:17 2021-04-07 16:58
Reporter: tn4417 Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: assigned Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: upgrade error
Description: └─# apt update -y && apt full-upgrade -y && apt autoremove -y && apt autoclean -y && apt-get clean all 100 ⨯
Hit:1 http://ftp.debian.org/debian stable InRelease
Hit:2 http://kali.download/kali kali-rolling InRelease
Hit:3 http://kali.download/kali kali-last-snapshot InRelease
Hit:4 http://kali.download/kali kali-experimental InRelease
Hit:5 http://kali.download/kali kali-dev InRelease
Hit:6 http://dl.google.com/linux/chrome/deb stable InRelease
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
61 packages can be upgraded. Run 'apt list --upgradable' to see them.
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
You might want to run 'apt --fix-broken install' to correct these.
The following packages have unmet dependencies:
 libc6-dev : Depends: libc6 (= 2.31-10) but 2.31-9 is installed
 libc6-i386 : Depends: libc6 (= 2.31-10) but 2.31-9 is installed
E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution).
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014424)
tn4417   
2021-03-31 08:18   
└─# apt update -y && apt full-upgrade -y && apt autoremove -y && apt autoclean -y && apt-get clean all 130 ⨯
Hit:1 http://kali.download/kali kali-rolling InRelease
Hit:2 http://dl.google.com/linux/chrome/deb stable InRelease
Hit:3 http://ftp.debian.org/debian stable InRelease
Hit:4 http://kali.download/kali kali-last-snapshot InRelease
Hit:5 http://kali.download/kali kali-experimental InRelease
Hit:6 http://kali.download/kali kali-dev InRelease
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
66 packages can be upgraded. Run 'apt list --upgradable' to see them.
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
The following NEW packages will be installed:
  libmirisdr0 linux-headers-5.10.0-kali5-amd64 linux-headers-5.10.0-kali5-common linux-image-5.10.0-kali5-amd64 soapysdr0.7-module-mirisdr
  soapysdr0.7-module-rfspace
The following packages will be upgraded:
  amass amass-common bind9-dnsutils bind9-host bind9-libs exploitdb firefox-esr geoclue-2.0 gir1.2-geoclue-2.0 gir1.2-javascriptcoregtk-4.0
  gir1.2-webkit2-4.0 gnutls-bin google-chrome-stable kali-menu libc-bin libc-dev-bin libc-devtools libc-l10n libc6 libc6-dev libc6-i386 libcaca0
  libcpupower1 libgeoclue-2-0 libglib2.0-0 libglib2.0-bin libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libgnutls-dane0 libgnutls30
  libjavascriptcoregtk-4.0-18 liblirc-client0 libpam-modules libpam-modules-bin libpam-runtime libpam0g libplymouth5 libqt5qml5 libqt5qmlmodels5
  libqt5quick5 libsoapysdr0.7 libssl1.1 libwebkit2gtk-4.0-37 linux-compiler-gcc-10-x86 linux-headers-amd64 linux-image-amd64 linux-kbuild-5.10
  linux-libc-dev locales locales-all maltego metasploit-framework openssl plymouth plymouth-label python3-lxml python3-netaddr
  soapysdr0.7-module-all sslscan sslyze tasksel tasksel-data texlive-latex-extra texlive-plain-generic xsser
66 upgraded, 6 newly installed, 0 to remove and 0 not upgraded.
Need to get 404 MB/626 MB of archives.
After this operation, 358 MB of additional disk space will be used.
Get:1 http://kali.download/kali kali-rolling/non-free amd64 maltego all 4.2.16.13775-0kali1 [129 MB]
Get:2 http://kali.download/kali kali-rolling/main amd64 kali-menu all 2021.2.0 [7,035 kB]
Get:3 http://kali.download/kali kali-rolling/main amd64 libcaca0 amd64 0.99.beta19-2.2 [348 kB]
Get:4 http://kali.download/kali kali-rolling/main amd64 libcpupower1 amd64 5.10.24-1kali1 [1,010 kB]
Get:5 http://kali.download/kali kali-rolling/main amd64 liblirc-client0 amd64 0.10.1-6.3 [70.9 kB]
Get:6 http://kali.download/kali kali-rolling/main amd64 libplymouth5 amd64 0.9.5-3 [108 kB]
Get:7 http://kali.download/kali kali-rolling/main amd64 libqt5qml5 amd64 5.15.2+dfsg-5 [1,318 kB]
Get:8 http://kali.download/kali kali-rolling/main amd64 libqt5qmlmodels5 amd64 5.15.2+dfsg-5 [193 kB]
Get:9 http://kali.download/kali kali-rolling/main amd64 libqt5quick5 amd64 5.15.2+dfsg-5 [1,558 kB]
Get:10 http://kali.download/kali kali-rolling/main amd64 libsoapysdr0.7 amd64 0.7.2-2 [104 kB]
Get:11 http://kali.download/kali kali-rolling/main amd64 linux-compiler-gcc-10-x86 amd64 5.10.24-1kali1 [1,003 kB]
Get:12 http://kali.download/kali kali-rolling/main amd64 linux-headers-5.10.0-kali5-common all 5.10.24-1kali1 [9,496 kB]
Get:13 http://kali.download/kali kali-rolling/main amd64 linux-kbuild-5.10 amd64 5.10.24-1kali1 [1,244 kB]
Get:14 http://kali.download/kali kali-rolling/main amd64 linux-headers-5.10.0-kali5-amd64 amd64 5.10.24-1kali1 [1,530 kB]
Get:15 http://kali.download/kali kali-rolling/main amd64 linux-headers-amd64 amd64 5.10.24-1kali1 [1,148 B]
Get:16 http://kali.download/kali kali-rolling/main amd64 linux-image-5.10.0-kali5-amd64 amd64 5.10.24-1kali1 [53.0 MB]
Get:17 http://kali.download/kali kali-rolling/main amd64 linux-image-amd64 amd64 5.10.24-1kali1 [1,456 B]
Get:18 http://kali.download/kali kali-dev/main amd64 locales-all amd64 2.31-10 [10.8 MB]
Get:19 http://kali.download/kali kali-dev/main amd64 openssl amd64 1.1.1k-1 [850 kB]
Get:20 http://kali.download/kali kali-rolling/main amd64 metasploit-framework amd64 6.0.37-0kali1 [129 MB]
Get:21 http://kali.download/kali kali-rolling/main amd64 plymouth-label amd64 0.9.5-3 [18.2 kB]
Get:22 http://kali.download/kali kali-rolling/main amd64 plymouth amd64 0.9.5-3 [138 kB]
Get:23 http://kali.download/kali kali-dev/main amd64 python3-lxml amd64 4.6.3-1 [1,091 kB]
Get:24 http://kali.download/kali kali-rolling/main amd64 python3-netaddr all 0.7.19-5 [253 kB]
Get:25 http://kali.download/kali kali-rolling/main amd64 libmirisdr0 amd64 0.0.4.59ba37-5+b1 [10.5 kB]
Get:26 http://kali.download/kali kali-rolling/main amd64 soapysdr0.7-module-mirisdr amd64 0.2.5-3+b2 [46.4 kB]
Get:27 http://kali.download/kali kali-rolling/main amd64 soapysdr0.7-module-rfspace amd64 0.2.5-3+b2 [79.6 kB]
Get:28 http://kali.download/kali kali-rolling/main amd64 soapysdr0.7-module-all amd64 0.7.2-2 [8,160 B]
Get:29 http://kali.download/kali kali-rolling/main amd64 sslscan amd64 2.0.9-0kali1 [1,179 kB]
Get:30 http://kali.download/kali kali-rolling/main amd64 sslyze all 4.1.0-0kali1 [400 kB]
Get:31 http://kali.download/kali kali-rolling/main amd64 texlive-latex-extra all 2020.20210202-3 [13.7 MB]
Get:32 http://kali.download/kali kali-rolling/main amd64 texlive-plain-generic all 2020.20210202-3 [27.0 MB]
Get:33 http://kali.download/kali kali-rolling/main amd64 xsser all 1.8.4-0kali1 [11.5 MB]
Fetched 366 MB in 2min 38s (2,317 kB/s)
apt-listchanges: Reading changelogs...
Extracting templates from packages: 100%
Preconfiguring packages ...
(Reading database ... 516498 files and directories currently installed.)
Preparing to unpack .../0-libc6-i386_2.31-10_amd64.deb ...
Unpacking libc6-i386 (2.31-10) over (2.31-9) ...
Preparing to unpack .../1-libc-devtools_2.31-10_amd64.deb ...
Unpacking libc-devtools (2.31-10) over (2.31-9) ...
Preparing to unpack .../2-libc6-dev_2.31-10_amd64.deb ...
Unpacking libc6-dev:amd64 (2.31-10) over (2.31-9) ...
Preparing to unpack .../3-libc-dev-bin_2.31-10_amd64.deb ...
Unpacking libc-dev-bin (2.31-10) over (2.31-9) ...
Preparing to unpack .../4-linux-libc-dev_5.10.24-1kali1_amd64.deb ...
Unpacking linux-libc-dev:amd64 (5.10.24-1kali1) over (5.10.19-1kali1) ...
Preparing to unpack .../5-libc6_2.31-10_amd64.deb ...
dpkg: error processing archive /tmp/apt-dpkg-install-WXjYUn/5-libc6_2.31-10_amd64.deb (--unpack):
 new libc6:amd64 package pre-installation script subprocess returned error exit status 10
Errors were encountered while processing:
 /tmp/apt-dpkg-install-WXjYUn/5-libc6_2.31-10_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
(0014434)
Michu   
2021-04-07 16:58   
apt gave you a potential solution E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution). after Try word copy and paste and see what will happen and if it won't work let me know

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7134 [Kali Linux] General Bug block always 2021-04-07 04:51 2021-04-07 16:02
Reporter: gentoo9ball Platform:  
Assigned To: sbrun OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: netboot image has not been rebuilt to kali6
Description: PXE Booting Kali with linux/initrd.gz from here tries to use 5.10.0-kali5-amd64

http://archive.kali.org/kali/dists/kali-rolling/main/installer-amd64/current/images/netboot/debian-installer/amd64/
Steps To Reproduce: PXE Kali with linux/initrd.gz from here
http://archive.kali.org/kali/dists/kali-rolling/main/installer-amd64/current/images/netboot/debian-installer/amd64/
Additional Information:
Attached Files:
Notes
(0014432)
gentoo9ball   
2021-04-07 12:59   
FIXED, file dates updated from 3/26/21 to 4/2/21, I tested new files, they work great

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7133 [Kali Linux] Kali Package Bug major always 2021-04-06 08:02 2021-04-07 15:02
Reporter: RoseDeSable Platform:  
Assigned To: sbrun OS:  
Priority: high OS Version:  
Status: assigned Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: gvm: cannot see reports
Description: Good Morning,
 the scan is running, but I can't see reports. I receive the error message "TypeError: Z is undefined", if I click on the report. But very strange is this message in gvmd.log:

md manage:WARNING:2021-04-06 07h50.44 UTC:440352: run_report_format_script: No generate script found at /var/lib/gvm/gvmd/report_formats/generate.

The strange: The directory doesn't exist. I see only directories like "/var/lib/gvm/data-objects/gvmd/20.08/report_formats", which are synchronized by greenbone-feed-sync --type GVMD_DATA. But also here, I doen't find the file "generate".

Such a file are only found in the directory /usr/share/gvm/gvmd/report_formats/.

ls /usr/share/gvm/gvmd/report_formats/5057e5cc-b825-11e4-9d0e-28d24461215b
Anonymous_XML.xsl generate report_format.xml

The structure is completely different from this in /var/lib.

Is this a configuration or a migration problem ?

Best Regards
Rose
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6927 [Kali Linux] Kali Package Bug major always 2020-12-12 17:43 2021-04-06 10:20
Reporter: cohst Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Routersploit is not working anymore
Description: Scanners and exploits cannot be loaded in Routersploit due to incompatibilities of Python3:
┌──(cohst@kali-linux)-[~]
└─$ routersploit
 ______ _ _____ _ _ _
 | ___ \ | | / ___| | | (_) |
 | |_/ /___ _ _| |_ ___ _ __\ `--. _ __ | | ___ _| |_
 | // _ \| | | | __/ _ \ '__|`--. \ '_ \| |/ _ \| | __|
 | |\ \ (_) | |_| | || __/ | /\__/ / |_) | | (_) | | |_
 \_| \_\___/ \__,_|\__\___|_| \____/| .__/|_|\___/|_|\__|
                                     | |
       Exploitation Framework for |_| by Threat9
            Embedded Devices

 Codename : I Knew You Were Trouble
 Version : 3.4.0
 Homepage : https://www.threat9.com - @threatnine
 Join Slack : https://www.threat9.com/slack

 Join Threat9 Beta Program - https://www.threat9.com

 Exploits: 130 Scanners: 4 Creds: 165 Generic: 4 Payloads: 32 Encoders: 4

rsf > show scanners
scanners/autopwn
scanners/misc/misc_scan
scanners/routers/router_scan
scanners/cameras/camera_scan
rsf > use scanners/autopwn
Traceback (most recent call last):
  File "/usr/bin/routersploit", line 26, in <module>
    routersploit()
  File "/usr/bin/routersploit", line 22, in routersploit
    rsf.start()
  File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 116, in start
    command_handler(args)
  File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 319, in command_use
    self.current_module = import_exploit(module_path)()
  File "/usr/lib/python3/dist-packages/routersploit/core/exploit/utils.py", line 107, in import_exploit
    module = importlib.import_module(path)
  File "/usr/lib/python3.9/importlib/__init__.py", line 127, in import_module
    return _bootstrap._gcd_import(name[level:], package, level)
  File "<frozen importlib._bootstrap>", line 1030, in _gcd_import
  File "<frozen importlib._bootstrap>", line 1007, in _find_and_load
  File "<frozen importlib._bootstrap>", line 986, in _find_and_load_unlocked
  File "<frozen importlib._bootstrap>", line 680, in _load_unlocked
  File "<frozen importlib._bootstrap_external>", line 790, in exec_module
  File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed
  File "/usr/lib/python3/dist-packages/routersploit/modules/scanners/autopwn.py", line 6, in <module>
    class Exploit(Exploit):
  File "/usr/lib/python3/dist-packages/routersploit/core/exploit/exploit.py", line 45, in __new__
    for key, value in iteritems(attrs):
RuntimeError: dictionary keys changed during iteration
                                                                                                        
┌──(cohst@kali-linux)-[~]
└─$
Steps To Reproduce: Start Routersploit and load an arbitrary module/scanner/exploit.
Additional Information: Kali Release is 2020.4, Kernel 5.9.11-1kali1from (12.12.2020).
Attached Files: Routersploit.JPG (81,231 bytes) 2020-12-12 17:43
https://bugs.kali.org/file_download.php?file_id=1967&type=bug
jpg
Notes
(0014431)
sbrun   
2021-04-06 10:20   
fixed in version 3.4.0+git20210206-0kali1

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7132 [Kali Linux] General Bug major always 2021-04-06 02:14 2021-04-06 02:14
Reporter: lentel Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: The battery is discharged with the laptop turned off (20% in 8 hours) approximately.
Description: Dear friends, I really don't know what to do, with Kali Linux 2021 the battery is consumed when the laptop is turned off. This has always happened to me with Kali. I don't know what the real solution is. This is why I come to you. I have Kali as Main O.S.
Thank you very much in advance for your insights.
Greetings.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7108 [Kali Linux] Feature Requests minor N/A 2021-03-20 10:30 2021-04-04 11:11
Reporter: Ishan Patel Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: support for nvidia optimus and bumble bee configration
Description: Please add support for nvidia optimus and bumble bee configration as most of the intel based high-end laptops use dual GPU , using kali as the primary and only operating system shuts off one of the gpu to work properly
Steps To Reproduce:
Additional Information:
Attached Files: ddddddddddddddd.PNG (48,405 bytes) 2021-03-22 11:32
https://bugs.kali.org/file_download.php?file_id=2038&type=bug
png
Notes
(0014380)
arnaudr   
2021-03-22 06:25   
Hello Ishan, did you enable bumblebee on your laptop? What steps did you follow? There's a doc regarding installing nvidia drivers in Kali: https://www.kali.org/docs/general-use/install-nvidia-drivers-on-kali-linux/, does that help?
(0014383)
Ishan Patel   
2021-03-22 11:31   
@arnaudr hello, in this guide says that its not ment for optimus (notebook user with 2 graphics card) , and yes i have tried this but its not working in laptop, if its connected via hdmi both laptop and external monitor cant be used with nvidia optimus in kali , as it can be used in ubuntu based system , for using external monitor we need to create a xorg configration file which will disable the use of laptop screen. please find some resolve, i have tried everything that i try .

Thank You

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7128 [Kali Linux] General Bug major always 2021-04-03 22:25 2021-04-03 22:25
Reporter: mingdao Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: published shasums don't make weekly image
Description: The weekly image currently at http://cdimage.kali.org/kali-images/kali-weekly/ is for 2021-W13, but the SHA1 and SHA256 sums downloadable from the same page are the previous week's (W12) ones.
Steps To Reproduce: workstation /home/mingdao/Downloads # sha256sum kali-linux-2021-W13-installer-amd64.iso
8f1ee7464bc87f0334f3abf333f46f663a9047b87a784a028783b8121f6f0d65 kali-linux-2021-W13-installer-amd64.iso
workstation /home/mingdao/Downloads # grep 8f1ee7464bc87f0334f3abf333f46f663a9047b87a784a028783b8121f6f0d65 SHA256SUMS
workstation /home/mingdao/Downloads # cat SHA256SUMS
2a02483585b73755698b1e9179ff2ecbc3c9728d80967538d0d8e536d1e92778 kali-linux-2021-W12-installer-amd64.iso
001b772fe7a3e53988c63b4db9beea51ebcaf56ed76ac380d5e35e09ff3ca9ee kali-linux-2021-W12-installer-arm64.iso
0b5c6553221cea5f8c2df83bb9f4eaa064f5365535ec1a0830e2f943f4a53244 kali-linux-2021-W12-installer-i386.iso
8a8c25888e3b235f7267f0be183d3e59d0c089c90bbf2948bdbeb4e36c84e735 kali-linux-2021-W12-installer-netinst-amd64.iso
f0ced0a87633571ae979c5c2a427b0d5c91effc3cfef83464328eff644bbd10e kali-linux-2021-W12-installer-netinst-arm64.iso
3e1311a1d2756a4c2ffdbc6ae32435820d73ce48376a8ee92e190b1fd58b6e29 kali-linux-2021-W12-installer-netinst-i386.iso
0c3f4cfe03b916b6086045d21ccc731ccee3c48dfa144bc3c6d4e153367e3c56 kali-linux-2021-W12-live-amd64.iso
0a058e2d900b65865a36bab4dcd264f516816771961fdd0ea766559acf2beba2 kali-linux-2021-W12-live-arm64.iso
100898a40d0716102cc364afeab7591507fc2394d2881c6d99903165cf2f5e6f kali-linux-2021-W12-live-i386.iso
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7127 [Kali Linux] Feature Requests feature N/A 2021-04-02 10:42 2021-04-02 10:43
Reporter: admn Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Add driver for VFS7500 Touch Fingerprint Sensor
Description: There is no driver for this Fingerprint sensor
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7044 [Kali Linux] Kali Package Bug crash always 2021-02-09 09:55 2021-04-02 08:38
Reporter: vgsgs Platform:  
Assigned To: rhertzog OS:  
Priority: immediate OS Version:  
Status: resolved Product Version: kali-dev  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SESSION HIJACKING.
Description: VULNERABILITY NAME: SESSION HIJACKING.

VULNERABILITY URL: https://bugs.kali.org/

DESCRIPTION:
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.


Steps To Reproduce:
STEPS TO REPRODUCED:
1) Log in to your account
2) Copy your cookies
3) Logout
4) Clear browser cookies
5) Paste the cookies (copied in step 2)
6) Refresh the page
7) Now you will be logged into the account
Additional Information: The Patch:
Cookies should expire after the logout and previous cookies should not be used for logging into the account, they should expire!

IMPACT:

The malicious attacker can enter the server and access its information without having to hack a registered account. In addition, he can also make modifications on the server to help him hack it in the future or to simplify a data-stealing operation.
Attached Files: bandicam 2021-02-09 14-59-05-295.mp4 (1,273,295 bytes) 2021-02-09 09:55
https://bugs.kali.org/file_download.php?file_id=2011&type=bug
Notes
(0014214)
vgsgs   
2021-02-11 06:12   
Hello Team,
Any update?
(0014215)
rhertzog   
2021-02-11 08:36   
"session hijacking" assumes that you have a way to intercept the cookie, and you have not shown any way to intercept said cookie over https.

That said I reckon that it would be better if the session cookie was invalidated on logout. But this is a mantis instance so you should file that bug report against mantis, we are not the mantis developers:
https://mantisbt.org/bugs/
(0014218)
vgsgs   
2021-02-12 10:58   
Hello Team,

But this is valid impactful issue after logout then also we directly entered in account without help of login username and password it means this is valid impactful issue.
Please check video and replay back.

Regards,
Vaibhav
(0014220)
kali-bugreport   
2021-02-14 12:21   
IMHO the Kali team has already replied back above. Just report an issue to the Mantis team if you see any required action for this issue.
(0014302)
kali-bugreport   
2021-03-09 21:11   
https://mantisbt.org/bugs/view.php?id=11296

https://mantisbt.org/bugs/view.php?id=27976
(0014303)
rhertzog   
2021-03-09 21:26   
Nice to see that this is going to be fixed upstream!

@kali-bugreport was that you that submitted this upstream or @vgsgs ?
(0014309)
kali-bugreport   
2021-03-10 20:31   
@rhertzog No, not me. I guess it was @vgsgs or any other reader of this issue here.
(0014344)
kali-bugreport   
2021-03-13 12:22   
Looks like this is CVE-2009-20001:

https://nvd.nist.gov/vuln/detail/CVE-2009-20001
(0014347)
vgsgs   
2021-03-13 12:36   
Hello Team,

Any reward for this valid issue?
(0014352)
vgsgs   
2021-03-15 10:29   
Hello Team,

Any reward for this valid issue?

Regards,
Vaibhav
(0014365)
vgsgs   
2021-03-17 07:02   
Hello @rhertzog and @kali-bugreport
Can i eligible for reward for this vulnerability issue?

Please reply back regarding my reward.
(0014387)
g0tmi1k   
2021-03-23 06:37   
Bug bounty information can be found here ~ https://www.kali.org/contact/
(0014426)
vgsgs   
2021-04-02 08:29   
Sir,
I check your bug bounty program is there so now your team resolved this issue then how to I process regarding reward?
Can I eligible for a reward for this vulnerability issue?

Please reply back regarding my reward.
(0014427)
rhertzog   
2021-04-02 08:38   
@vgsgs The Kali team is not in charge of the bug bounty program, please stop requesting this on this ticket. The bug bounty program is described here: https://www.offensive-security.com/bug-bounty-program/

Follow the process there, thank you.
(0014428)
rhertzog   
2021-04-02 08:38   
Will be fixed on bugs.kali.org the next time that we upgrade our mantis setup.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6936 [Kali Linux] Kali Package Bug minor always 2020-12-19 08:28 2021-04-01 14:38
Reporter: RoseDeSable Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: kali-dev  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Mitmproxy doesn't start because of two absent python packets
Description: Good Morning,
 after the rolling upgrade from yesterday (Friday) starting mitmproxy first fails with the message

"dkg_resources.DistributionNotFound: The 'hyperframe>=6.0' distribution was not found and is required by mitmproxy"

After installing python3-hyperframe it again fails with this message

"pkg_resources.DistributionNotFound: The 'h2>=4.0' distribution was not found and is required by mitmproxy"

After installing python3-h2 together with python3-hpack mitmproxy starts without any problems

Bye
Rose
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014425)
sbrun   
2021-04-01 14:38   
fixed in version 5.3.0-2.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7116 [Kali Linux] General Bug major always 2021-03-24 18:19 2021-03-30 23:58
Reporter: vom Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: NetworkManager/dhclient/*something* causing race condition on DHCP server, not releasing previous lease IPs
Description: I've been troubleshooting this for about a week. I believe I have finally distilled it down to what is happening. I will try my best to articulate that here...

This is a Kali 2021.1 running on a Thinkpad x301. The machine has an Intel wifi (Intel Corporation PRO/Wireless 5100 AGN [Shiloh]). It is connected via wifi (no wired / eth0).

Lately I have let the machine sit on my desk and run for an extended period. The other day my son complained his PC "didn't have internet". Troubleshooting this showed me that my DHCP server (ISC dhcpd on Linux) was pinging the address first, getting a response, and then moving on to a different IP. This next potential IP was also responding. Lather, rinse, repeat. I managed to catch it red handed, and all the ARP / MACs for these IPs came back to the Kali laptop.

What's really interesting (and confusing and frustrating...) - is that only one IP at a time is visible on the machine via 'ip addr show'. Yet the machine responds to previous IPs it had had.

I was thinking this was perhaps some kind of "promiscuous" issue where the machine was just responding to anything sent to it. However, I temporarily configured a static arp for an unused IP to point to the Kali laptop, and it did NOT respond. So it seems that these "phantom" IPs it's holding on to are only the ones it had on previous leases.

This problem grows and grows over a period of days and weeks. Eventually it will exhaust my DHCP pool.

Here is the current ARP entries on my firewall (MAC sanitized):

192.168.64.154 lladdr 00:22:fa:11:22:33 STALE
192.168.64.252 lladdr 00:22:fa:11:22:33 STALE

Only 252 is assigned right now:

root@x301:/home/vom# ip -f inet addr show dev wlan0
3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    inet 192.168.64.252/24 brd 192.168.64.255 scope global dynamic noprefixroute wlan0
       valid_lft 41371sec preferred_lft 41371sec

154 is not there. But 154 responds:

root@ice:~# ping -c 3 192.168.64.154
PING 192.168.64.154 (192.168.64.154) 56(84) bytes of data.
64 bytes from 192.168.64.154: icmp_seq=1 ttl=64 time=5.02 ms
64 bytes from 192.168.64.154: icmp_seq=2 ttl=64 time=4.62 ms
64 bytes from 192.168.64.154: icmp_seq=3 ttl=64 time=3.32 ms

--- 192.168.64.154 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 3.320/4.320/5.020/0.725 ms

Here's what this looks like on the DHCP server when this kicks over:

Mar 23 19:30:42 ice dhcpd[5419]: reuse_lease: lease age 3332 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.64.154
Mar 23 19:30:42 ice dhcpd[5419]: DHCPDISCOVER from 00:22:fa:11:22:33 (x301) via enp7s0.10
Mar 23 19:30:42 ice dhcpd[5419]: ICMP Echo reply while lease 192.168.64.154 valid.
Mar 23 19:30:42 ice dhcpd[5419]: Abandoning IP address 192.168.64.154: pinged before offer
Mar 23 19:30:42 ice dhcpd[5419]: Wrote 0 class decls to leases file.
Mar 23 19:30:42 ice dhcpd[5419]: Wrote 0 deleted host decls to leases file.
Mar 23 19:30:42 ice dhcpd[5419]: Wrote 0 new dynamic host decls to leases file.
Mar 23 19:30:42 ice dhcpd[5419]: Wrote 79 leases to leases file.
Mar 23 19:30:44 ice dhcpd[5419]: DHCPDISCOVER from 00:22:fa:11:22:33 via enp7s0.10
Mar 23 19:30:45 ice dhcpd[5419]: DHCPOFFER on 192.168.64.252 to 00:22:fa:11:22:33 (x301) via enp7s0.10
Mar 23 19:30:45 ice dhcpd[5419]: DHCPREQUEST for 192.168.64.252 (192.168.64.1) from 00:22:fa:11:22:33 (x301) via enp7s0.10
Mar 23 19:30:45 ice dhcpd[5419]: DHCPACK on 192.168.64.252 to 00:22:fa:11:22:33 (x301) via enp7s0.10

You can see that 154 was still pingable, so 252 was offered (and accepted). This will happen again soon and then 154 + 252 will be pingable and the client will consume a third address...

Over about a 4 day period, this machine consumed 97 IPs. I spot checked these and the mac address / x301 was always the culprit:

root@ice:/home/vom# zgrep offer /var/log/syslog*.gz | awk '{print $9}' | sort | uniq | wc -l
97

I'm going to put some other (possibly related) bug reports (different distros, upstream, etc) in the Additional section.
Steps To Reproduce: Connect laptop to wifi.
Leave running (no sleep, on AC power) for days / weeks.
See DHCP pool slowly get consumed as Kali machine "holds on" to old lease addresses.
Additional Information: This one reads almost exactly as what I am seeing (marked as Incomplete :( )
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1793763

There's also this one (auto-closed :( ):
https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/166
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7010 [Kali Linux] General Bug major have not tried 2021-01-25 17:37 2021-03-30 16:43
Reporter: Hillander-s Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Desktop bug
Description: Work area persists, windows also have problems.

Steps To Reproduce:
Additional Information:
Attached Files: Captura de tela_2021-01-25_11-27-33.png (376,012 bytes) 2021-01-25 17:37
https://bugs.kali.org/file_download.php?file_id=2005&type=bug
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7077 [Kali Linux] Kali Package Bug major have not tried 2021-03-04 11:08 2021-03-30 13:26
Reporter: RoseDeSable Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: gvmd doesn't start - version of lib is higher than the servers's
Description: Hi,
 in the logfile "/var/log/gvm/gvmd.log" I find, that the version of the server module "/usr/lib/libgvm-pg-server.so" is on version 12, but the lib's version is on 13. Here are the lib-modules:

#ls -l libgvm*
lrwxrwxrwx 1 root root 22 3. Feb 15:42 libgvm-pg-server.so -> libgvm-pg-server.so.20
lrwxrwxrwx 1 root root 27 3. Feb 15:42 libgvm-pg-server.so.20 -> libgvm-pg-server.so.20.08.1
-rw-r--r-- 1 root root 38896 3. Feb 15:42 libgvm-pg-server.so.20.08.1

Bye
Rose
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014297)
sbrun   
2021-03-09 11:27   
Thanks for the report but I need more informations:
- please the copy the error from the logfile "/var/log/gvm/gvmd.log"
- please give us the version of gvmd
- did you run gvm-check-setup?

The versions 12 and 13 you mentioned make me think you have an issue with postgresql version:
gvmd have been compiled with postgresql 13 and you have an older postgresql version using the default port 5432.
gvm-check-setup will check this for you or you can run "pg_lsclusters" to see which version is on port 5432.
(0014298)
RoseDeSable   
2021-03-09 12:38   
Hello,
 it seems to be a problem with postgresql. I'm running version 12 and 13 an two seperate ports:

12 main 5432 online postgres /var/lib/postgresql/12/main /var/log/postgresql/postgresql-12-main.log
13 main 5433 online postgres /var/lib/postgresql/13/main /var/log/postgresql/postgresql-13-main.log

But chanching the port numbers for version 13 doesn't resolve my problem.
(0014299)
sbrun   
2021-03-09 13:44   
it's not a problem, it's the "normal behaviour" of postgresql:
when you upgrade postgresql, the default port 5432 remains on the cluster of the "old" postgresql version. The newest version cluster uses another port.

It requires a user action to upgrade the clusters.
How did you change the port numbers?
To upgrade you need to use the pg_upgradecluster command.
But before that you may need to remove the empty cluster of newest postgresql version.
You can find some explanations here:
https://praderas.org/en/upgrading-postgresql-13-debian-stretch
See paragraph "Upgrading cluster"
(0014307)
RoseDeSable   
2021-03-10 09:04   
Ok,
 first I successfully migrate the databasecluster from postgresql version 12 to 13. After starting gvmd I receive the message "main:CRITICAL:2021-03-10 08h25.40 utc:99013: gvmd: database is wrong version". Therfore I migrate the gvmd-database with "gvmd -migrate". Successfully. I tried to start gvmd without success, because ownly the owner of the database may run the aggregate function "group_concat". What's now ?
(0014423)
RoseDeSable   
2021-03-30 13:26   
A nice day,
 I log into the database gvmd with "psql gvmd" unter the user postgres. The command "\df+ group_concat" shows me the definition of the function. Here I find out, that the owner of the function is "root". I change it to "_gvm" with "ALTER FUNCTION group_concat OWNER TO _gvm;" and the Greenbone Security Assistant is completely running.

Bye
Rose

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7122 [Kali Linux] General Bug major always 2021-03-30 03:09 2021-03-30 03:09
Reporter: Erika carpenter Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Deauth does not work
Description: When I use aireplay-ng and mdk4 deauthing it does not work.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7123 [Kali Linux] General Bug minor always 2021-03-30 03:09 2021-03-30 03:09
Reporter: Erika carpenter Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: application.desktop files no longer function
Description: Evidently the Kali 2020.1 update had broken application.desktop functionality.

When marked as executable the designated Icon does not appear.
Double clicking opens the application.desktop file in the text editor.

Through extensive fiddling the Icon and launch functionality appeared a few times. Click on the application.desktop
Icon and it works but immediately the Icon and functionality are lost.
Steps To Reproduce: Occurred with update.
Additional Information: The exactly identical application.desktop files functioned under Kali 2020.4 and continue to function in Ubuntu 18.04.5 LTS.
Attached Files:
Notes
(0014406)
steev   
2021-03-27 21:43   
I have my own slack and alacritty desktop files (in my ~/.local/share/applications ) and they show up in the menus and I'm able to launch the applications just fine. If I run "xdg-open ~/.local/share/applications/slack.desktop it opens it in a text editor because, well it's considered a text file. This is also changed in newer Ubuntu. You could try something like "gio set application.desktop metadata::trusted true" - this may allow you to launch them again. (I do not know if this is gnome specific, or if it also works in xfce, just what i found when i searched for it being broken.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7124 [Kali Linux] Kali Package Bug crash always 2021-03-30 03:09 2021-03-30 03:09
Reporter: Erika carpenter Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SESSION HIJACKING.
Description: VULNERABILITY NAME: SESSION HIJACKING.

VULNERABILITY URL: https://bugs.kali.org/

DESCRIPTION:
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.


Steps To Reproduce:
STEPS TO REPRODUCED:
1) Log in to your account
2) Copy your cookies
3) Logout
4) Clear browser cookies
5) Paste the cookies (copied in step 2)
6) Refresh the page
7) Now you will be logged into the account
Additional Information: The Patch:
Cookies should expire after the logout and previous cookies should not be used for logging into the account, they should expire!

IMPACT:

The malicious attacker can enter the server and access its information without having to hack a registered account. In addition, he can also make modifications on the server to help him hack it in the future or to simplify a data-stealing operation.
Attached Files: bandicam 2021-02-09 14-59-05-295.mp4 (1,273,295 bytes) 2021-02-09 09:55
https://bugs.kali.org/file_download.php?file_id=2040&type=bug
Notes
(0014407)
vgsgs   
2021-02-11 06:12   
Hello Team,
Any update?
(0014408)
rhertzog   
2021-02-11 08:36   
"session hijacking" assumes that you have a way to intercept the cookie, and you have not shown any way to intercept said cookie over https.

That said I reckon that it would be better if the session cookie was invalidated on logout. But this is a mantis instance so you should file that bug report against mantis, we are not the mantis developers:
https://mantisbt.org/bugs/
(0014409)
vgsgs   
2021-02-12 10:58   
Hello Team,

But this is valid impactful issue after logout then also we directly entered in account without help of login username and password it means this is valid impactful issue.
Please check video and replay back.

Regards,
Vaibhav
(0014410)
kali-bugreport   
2021-02-14 12:21   
IMHO the Kali team has already replied back above. Just report an issue to the Mantis team if you see any required action for this issue.
(0014411)
kali-bugreport   
2021-03-09 21:11   
https://mantisbt.org/bugs/view.php?id=11296

https://mantisbt.org/bugs/view.php?id=27976
(0014412)
rhertzog   
2021-03-09 21:26   
Nice to see that this is going to be fixed upstream!

@kali-bugreport was that you that submitted this upstream or @vgsgs ?
(0014413)
kali-bugreport   
2021-03-10 20:31   
@rhertzog No, not me. I guess it was @vgsgs or any other reader of this issue here.
(0014418)
kali-bugreport   
2021-03-13 12:22   
Looks like this is CVE-2009-20001:

https://nvd.nist.gov/vuln/detail/CVE-2009-20001
(0014419)
vgsgs   
2021-03-13 12:36   
Hello Team,

Any reward for this valid issue?
(0014420)
vgsgs   
2021-03-15 10:29   
Hello Team,

Any reward for this valid issue?

Regards,
Vaibhav
(0014422)
vgsgs   
2021-03-17 07:02   
Hello @rhertzog and @kali-bugreport
Can i eligible for reward for this vulnerability issue?

Please reply back regarding my reward.
(0014414)
g0tmi1k   
2021-03-23 06:37   
Bug bounty information can be found here ~ https://www.kali.org/contact/

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7082 [Kali Linux] Queued Tool Addition minor have not tried 2021-03-09 03:47 2021-03-29 07:54
Reporter: krnick Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System
Description: Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System

- [Name] - Quark-Engine
- [Version] - 21.3.1
- [Homepage] - https://github.com/quark-engine/quark-engine
- [Download] - https://github.com/quark-engine/quark-engine/releases
- [Author] - JunWei Song(krnick)
- [Licence] - GPL v3
- [Description] - Quark-Engine is a full-featured Android analysis framework written in Python for hunting threat intelligence inside the APK, DEX files. Since it is rule-based, you can use the ones built-in or customize as needed.

With ideas decoded from criminal law, Quark-Engine has its unique angles for Android analysis. We developed a Dalvik bytecode loader that has tainted analysis inside but also defeats the obfuscation techniques used against reverse engineering. And surprisingly, the loader matches perfectly the design of our malware scoring system.

Quark-Engine is very easy to use and also provides flexible output formats. There are three types of output reports: detail report, call graph, and summary report. With these reports in mind, you can get an overview of the high-risk behavior inside Android within seconds.

Also, by integrating with other Android analysis tools such as Ghidra, APKLAB, Jadx, Quark-Engine can greatly improve the efficiency of reverse engineers.

- [Dependencies] - python3, git, graphviz
- [Similar tools] - MobSF
- [How to install] - https://github.com/quark-engine/quark-engine#installation
- [How to use] - https://quark-engine.readthedocs.io/en/latest/

Quark-Engine already presented at DEFCON 28 BTV, HITB Lockdown 002, and will release more features at BlackHat Asia 2021 Arsenal. Also, Quark-Engine is now integrated with many open-source tools, such as IntelOwl, BlackArch Linux, Pithus/Bazaar, and APKLAB.

We have experiences (ghidraquark, APKLab) developing a feature that when users click on one of the activities, the corresponding smali source codes are highlighted for manual verification. This boosts up the speed for malware analysts.

Reference:

1. Integrating with Ghidra:
https://github.com/quark-engine/ghidraquark
Quick demo for the quark usage with Ghidra
https://www.youtube.com/watch?v=VXzfFB2S4bo&ab_channel=JunWeiSong

2. Android malware reports that using Quark-Engine to analyze:
https://github.com/quark-engine/quark-reports

3. Quark-Engine Rules:
https://github.com/quark-engine/quark-rules

4. BlackHat Asia 2021 Arsenal
https://www.blackhat.com/asia-21/arsenal/schedule/index.html#quark-engine-storyteller-of-android-malware-22458

5. DEFCON 28 BTV
https://www.youtube.com/watch?v=XK-yqHPnsvc&ab_channel=DEFCONConference

6. HITB Lockdown 002
https://conference.hitb.org/hitb-lockdown002/sessions/quark-engine-an-obfuscation-neglect-android-malware-scoring-system/
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014397)
g0tmi1k   
2021-03-26 13:32   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0014403)
krnick   
2021-03-29 07:54   
Thank you Kali Linux team for the acceptance of quark-engine, I'd love to work on the packaging.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7120 [Kali Linux] General Bug major always 2021-03-28 05:59 2021-03-28 06:00
Reporter: Leominus Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Deauth does not work
Description: When I use aireplay-ng and mdk4 deauthing it does not work.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7119 [Kali Linux] General Bug minor always 2021-03-27 08:51 2021-03-27 21:43
Reporter: ilektranik Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: application.desktop files no longer function
Description: Evidently the Kali 2020.1 update had broken application.desktop functionality.

When marked as executable the designated Icon does not appear.
Double clicking opens the application.desktop file in the text editor.

Through extensive fiddling the Icon and launch functionality appeared a few times. Click on the application.desktop
Icon and it works but immediately the Icon and functionality are lost.
Steps To Reproduce: Occurred with update.
Additional Information: The exactly identical application.desktop files functioned under Kali 2020.4 and continue to function in Ubuntu 18.04.5 LTS.
Attached Files:
Notes
(0014402)
steev   
2021-03-27 21:43   
I have my own slack and alacritty desktop files (in my ~/.local/share/applications ) and they show up in the menus and I'm able to launch the applications just fine. If I run "xdg-open ~/.local/share/applications/slack.desktop it opens it in a text editor because, well it's considered a text file. This is also changed in newer Ubuntu. You could try something like "gio set application.desktop metadata::trusted true" - this may allow you to launch them again. (I do not know if this is gnome specific, or if it also works in xfce, just what i found when i searched for it being broken.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7002 [Kali Linux] Kali Package Bug major always 2021-01-20 23:33 2021-03-26 20:22
Reporter: LRitzdorf Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Hashcat segfault issue after package upgrade
Description: System: WSL2 on Windows 10 build 19042.746.

After performing a `sudo apt update` and `sudo apt full-upgrade` operation, hashcat now encounters a segmentation fault for every command tested so far (with the exception of `hashcat -h`). The list of upgrade events from the relevant dpkg session is included in the "Additional Information" section below, and an example output set is included below.

Whatever the error is, hashcat seems to encounter it early on. Additionally, according to the dpkg logs, hashcat itself was not upgraded immediately before the issue occurred, so the problem would seem to be in a dependency, rather than hashcat itself. Notably, `pocl-opencl-icd`, `libpocl2`, and `libpocl2-common` were among the upgraded packages.

```
┌──(kali㉿Laptop-02)-[~]
└─$ hashcat -b
hashcat (v6.1.1) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

zsh: segmentation fault hashcat -b

┌──(kali㉿Laptop-02)-[~]
└─$ hashcat -I 139 ⨯
hashcat (v6.1.1) starting...

zsh: segmentation fault hashcat -I

┌──(kali㉿Laptop-02)-[~]
└─$
```
(Note that the last command uses a capital letter i, not an L or number one. It should list available cracking devices.)
This issue was additionally tested with an actual cracking command, which produced the same results as `hashcat -I`, above.
Steps To Reproduce: Install Kali in WSL2, as normal.
Run `sudo apt update && sudo apt full-upgrade --autoremove` after approximately 1/19/2021.
Attempt to start hashcat.
Additional Information: dpkg upgrade events from the relevant session (from `grep "upgrade" /var/log/dpkg.log`):

2021-01-19 19:00:41 upgrade findutils:amd64 4.7.0+git20201010-2 4.8.0-1
2021-01-19 19:00:41 upgrade init-system-helpers:all 1.59+kali1 1.60+kali1
2021-01-19 19:00:42 upgrade init:amd64 1.59+kali1 1.60+kali1
2021-01-19 19:00:42 upgrade libpython3-dev:amd64 3.9.0-4 3.9.1-1
2021-01-19 19:00:42 upgrade python3-dev:amd64 3.9.0-4 3.9.1-1
2021-01-19 19:00:42 upgrade python3-minimal:amd64 3.9.0-4 3.9.1-1
2021-01-19 19:00:42 upgrade python3:amd64 3.9.0-4 3.9.1-1
2021-01-19 19:00:42 upgrade python3-lib2to3:all 3.8.6-1 3.9.1-2
2021-01-19 19:00:42 upgrade python3-distutils:all 3.8.6-1 3.9.1-2
2021-01-19 19:00:43 upgrade libpython3-stdlib:amd64 3.9.0-4 3.9.1-1
2021-01-19 19:00:43 upgrade sensible-utils:all 0.0.12+nmu1 0.0.14
2021-01-19 19:00:43 upgrade build-essential:amd64 12.8 12.9
2021-01-19 19:00:43 upgrade busybox:amd64 1:1.30.1-6 1:1.30.1-6+b1
2021-01-19 19:00:43 upgrade firmware-linux:all 20201118-1 20201218-1
2021-01-19 19:00:43 upgrade firmware-amd-graphics:all 20201118-1 20201218-1
2021-01-19 19:00:43 upgrade firmware-linux-nonfree:all 20201118-1 20201218-1
2021-01-19 19:00:44 upgrade firmware-misc-nonfree:all 20201118-1 20201218-1
2021-01-19 19:00:44 upgrade firmware-atheros:all 20201118-1 20201218-1
2021-01-19 19:00:45 upgrade firmware-brcm80211:all 20201118-1 20201218-1
2021-01-19 19:00:45 upgrade firmware-intel-sound:all 20201118-1 20201218-1
2021-01-19 19:00:45 upgrade firmware-iwlwifi:all 20201118-1 20201218-1
2021-01-19 19:00:46 upgrade firmware-libertas:all 20201118-1 20201218-1
2021-01-19 19:00:47 upgrade firmware-realtek:all 20201118-1 20201218-1
2021-01-19 19:00:47 upgrade firmware-ti-connectivity:all 20201118-1 20201218-1
2021-01-19 19:00:47 upgrade gstreamer1.0-libav:amd64 1.18.2-1 1.18.3-1
2021-01-19 19:00:47 upgrade gstreamer1.0-plugins-ugly:amd64 1.18.2-1 1.18.3-1
2021-01-19 19:00:47 upgrade libbpf0:amd64 1:0.3-1 1:0.3-2
2021-01-19 19:00:47 upgrade libicu67:amd64 67.1-5 67.1-6
2021-01-19 19:00:48 upgrade libjs-sizzle:all 2.3.5+ds-1 2.3.5+ds-2
2021-01-19 19:00:48 upgrade libmaxminddb0:amd64 1.4.3-2 1.5.0-1
2021-01-19 19:00:48 upgrade libmongocrypt0:amd64 1.0.4-1+b1 1.1.0-1
2021-01-19 19:00:48 upgrade pocl-opencl-icd:amd64 1.5-6 1.6-3
2021-01-19 19:00:48 upgrade libpocl2:amd64 1.5-6 1.6-3
2021-01-19 19:00:49 upgrade libpocl2-common:all 1.5-6 1.6-3
2021-01-19 19:00:49 upgrade libsensors-config:all 1:3.6.0-2 1:3.6.0-3
2021-01-19 19:00:49 upgrade libsensors5:amd64 1:3.6.0-2 1:3.6.0-3
2021-01-19 19:00:49 upgrade libserd-0-0:amd64 0.30.6-1 0.30.8-1
2021-01-19 19:00:49 upgrade thunar:amd64 4.16.1-1 4.16.2-1
2021-01-19 19:00:50 upgrade thunar-data:all 4.16.1-1 4.16.2-1
2021-01-19 19:00:50 upgrade libthunarx-3-0:amd64 4.16.1-1 4.16.2-1
2021-01-19 19:00:50 upgrade libvdpau1:amd64 1.4-2 1.4-3
2021-01-19 19:00:50 upgrade libwww-perl:all 6.51-1 6.52-1
2021-01-19 19:00:50 upgrade lm-sensors:amd64 1:3.6.0-2 1:3.6.0-3
2021-01-19 19:00:50 upgrade metasploit-framework:amd64 6.0.25-0kali1 6.0.26-0kali1
2021-01-19 19:01:00 upgrade netsniff-ng:amd64 0.6.5-1+b2 0.6.8-2
2021-01-19 19:01:00 upgrade parole:amd64 1.0.5-1 4.16.0-1
2021-01-19 19:01:00 upgrade python3-pycurl:amd64 7.43.0.6-4+b2 7.43.0.6-5
2021-01-19 19:01:00 upgrade patator:all 0.9-2 0.9-3
2021-01-19 19:01:00 upgrade python3-bottle:all 0.12.15-2.1 0.12.19-1
2021-01-19 19:01:00 upgrade python3-pandas-lib:amd64 1.1.5+dfsg-1 1.1.5+dfsg-2
2021-01-19 19:01:00 upgrade python3-pandas:all 1.1.5+dfsg-1 1.1.5+dfsg-2
2021-01-19 19:01:01 upgrade python3-pexpect:all 4.6.0-4 4.8.0-1
2021-01-19 19:01:01 upgrade python3-tk:amd64 3.8.6-1 3.9.1-2
2021-01-19 19:01:01 upgrade python3-xdg:all 0.26-3 0.27-2
2021-01-19 19:01:01 upgrade ruby-test-unit:all 3.3.5-1 3.3.9-1
2021-01-19 19:01:01 upgrade snmpcheck:all 1.9-0kali1 1.9-0kali2
2021-01-19 19:01:01 upgrade spike:amd64 2.9-1kali6 2.9-1kali7
2021-01-19 19:01:01 upgrade udptunnel:amd64 1.1-5+b1 1.1-5+b2
2021-01-19 19:01:02 upgrade vdpau-driver-all:amd64 1.4-2 1.4-3
2021-01-19 19:01:02 upgrade xfce4-cpufreq-plugin:amd64 1.2.2-1 1.2.3-1
2021-01-19 19:01:02 upgrade xfonts-100dpi:all 1:1.0.4+nmu1 1:1.0.4+nmu1.1
2021-01-19 19:01:02 upgrade zsh:amd64 5.8-5 5.8-5+b1
Attached Files:
Notes
(0014400)
LRitzdorf   
2021-03-26 20:22   
As of an update shortly before 3/26/2021, this issue has been resolved.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6998 [Kali Linux] Kali Package Improvement minor always 2021-01-16 20:30 2021-03-26 19:45
Reporter: pujandixit Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: Unable to connect wifi when kali boot in respberry pi 400
Description: HI Team,

can you please help , when i have connect into resspberry pi 400, unable to connect into wifi, wifi adapter not showing
Steps To Reproduce:
Additional Information:
Attached Files: pi400-dmesg.txt (27,607 bytes) 2021-01-19 23:26
https://bugs.kali.org/file_download.php?file_id=2001&type=bug
dmesg-brcmfmac.txt (3,703 bytes) 2021-01-20 04:37
https://bugs.kali.org/file_download.php?file_id=2002&type=bug
Notes
(0014116)
steev   
2021-01-16 21:36   
Can you show the output of the various commands? I don't have a pi400 here, so I can't attempt to reproduce anything.
(0014119)
hoshi   
2021-01-19 22:27   
If it helps, there are numerous random forum posts and even articles mentioning this (e.g. https://www.zdnet.com/index.php/category/2381/index.php/article/hands-on-kali-linux-on-the-raspberry-pi-4/).

ifconfig shows no wlan0 interface (just lo and eth0 which work fine).

Likewise iwconfig shows just lo and eth0 (no wireless extensions.)

kali@kali:~$ lsusb
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 004: ID 04d9:0007 Holtek Semiconductor, Inc. Raspberry Pi Internal Keyboard
Bus 001 Device 003: ID 093a:2510 Pixart Imaging, Inc. Optical Mouse
Bus 001 Device 002: ID 2109:3431 VIA Labs, Inc. Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

kali@kali:~$ lspci
00:00.0 PCI bridge: Broadcom Inc. and subsidiaries Device 2711 (rev 20)
01:00.0 USB controller: VIA Technologies, Inc. VL805 USB 3.0 Host Controller (rev 01)

Note that I'm of course referring to the built-in wireless card. If I use a USB wifi adapter the wlan0 interface quickly appears.

Let me know if this helps or if you would like any additional information.
(0014120)
steev   
2021-01-19 22:28   
(Last edited: 2021-01-19 22:28)
Can you give me the output of dmesg? Need to see what the kernel sees.

(0014121)
hoshi   
2021-01-19 23:26   
Pi 400 dmesg attached
(0014122)
steev   
2021-01-20 02:32   
Okay, in the dmesg output, we see

brcmfmac: brcmf_sdio_htclk: HT Avail timeout (1000000): clkctl 0x50

This means the firmware isn't loading correctly, so that's why there's no wifi device.

Would you mind grabbing the 3 brcmfmac43455-sdio files from https://github.com/RPi-Distro/firmware-nonfree/tree/master/brcm -

brcmfmac43455-sdio.bin
brcmfmac43455-sdio.clm_blob
brcmfmac43455-sdio.txt

and put them in /lib/firmware/brcm and see if wifi comes up with those files? If this works, you will not have nexmon support, but you would have working wifi at least.
(0014123)
hoshi   
2021-01-20 04:37   
Thanks for the response. Unfortunately that did not seem to resolve the issue for me.

I tried copying the brcm files from the URL you indicated and I tried copying the versions of them from a working Raspberry Pi OS (which does have wifi working) and I still do not see the wlan0 interface. Relevant dmesg output:

kali@kali:~$ dmesg -l err
[ 1.425080] cgroup: cgroup2: unknown option "memory_recursiveprot"
[ 3.969423] PKCS#7 signature not signed with a trusted key
[ 4.017085] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/9
[ 5.217743] brcmfmac: brcmf_sdio_htclk: HT Avail timeout (1000000): clkctl 0x50
[ 6.229038] brcmfmac: brcmf_sdio_htclk: HT Avail timeout (1000000): clkctl 0x50


I'm not sure if that's enough info. so I did "modprobe brcmfmac debug=0x120000e" to get debug level output, which I am attaching.
(0014124)
steev   
2021-01-20 20:50   
You're right, unfortunately I'm not sure what is causing the failure - can you try disabling bluetooth and rebooting? "systemctl disable bluetooth" - i don't think it will help, but i'd like to see if it does.

Otherwise, I'm assuming since you have the pi400, you're using the power supply that came with it?
(0014127)
hoshi   
2021-01-20 21:54   
Disabling bluetooth did not have an effect.

I am using the provided power supply and I tried a different supply as well.
(0014128)
hoshi   
2021-01-21 03:58   
I think the issue is that brcmfmac43455 isn't correct. In Kali it's definitely trying to load brcmfmac43455, but in Pi OS it's loads brcmfmac43456. This wasn't obvious to me at first because Pi OS has both versions (and two others), but dmesg in Pi OS confirmed it's loading brcmfmac43456.

For what it's worth, I also have a Pi 4 and this does use brcmfmac43455, which I think explains why a Pi 4 running Kali will work with wlan0 but the Pi 400 does not.

With that in mind, as a hack to test it, I looaded brcmfmac43456 in Kali but named in brcmfmac43455 -- yikes I know, but I can confirm that it does recognize wlan0 doing this (and I can scan and connect).

What controls what firmware version it tries to load?
(0014131)
steev   
2021-01-21 15:59   
That's in the kernel driver itself. I'll look into the kernel that the pi uses (are they still on 5.4?) - we may just need to backport the 43456 check in the driver to get it to load the correct firmware.

And that was a great test to track down. I just looked in the nexmon repo on github, and they don't seem to have support for the 43456, which makes sense since the 400 just came out a bit ago and still hard to get.
(0014132)
hoshi   
2021-01-21 16:24   
Yes, Pi OS is still on 5.4 (5.4.83-v7l+ on what I'm seeing on mine). Thanks!
(0014133)
steev   
2021-01-21 22:12   
So yeah, it looks like the 43456 support was added with https://github.com/raspberrypi/linux/commit/e3062e05e1cfe378bb9b3fa0bef46711372bcf13 - I'll see if we can squeeze that in to 4.19 somehow or not... it *should* work, but will have to see.
(0014265)
steev   
2021-03-02 20:35   
This is now fixed - note that we don't have nexmon support, as nexmon doesn't support this firmware yet, but wireless itself should work now.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7090 [Kali Linux] Queued Tool Addition minor have not tried 2021-03-12 16:56 2021-03-26 13:30
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Ghidra - Software reverse engineering (SRE) framework
Description: [Name] - Ghidra
[Version] - 9.1.x (9.2.x has a memory bug)
[Homepage] - https://www.nsa.gov/ghidra
[Download] - https://github.com/NationalSecurityAgency/ghidra/tags
[Author] - National Security Agency
[License] - Apache License 2.0 ~ https://github.com/NationalSecurityAgency/ghidra/blob/master/LICENSE
[Description] - Ghidra is a software reverse engineering (SRE) framework

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.

In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014312)
g0tmi1k   
2021-03-12 16:57   
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923851

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926714
(0014396)
g0tmi1k   
2021-03-26 13:29   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7098 [Kali Linux] Queued Tool Addition feature N/A 2021-03-13 12:23 2021-03-26 13:28
Reporter: Jayy001 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Search-That-Hash - Searches Hash APIs to crack your hash quickly
Description: Github:
https://github.com/HashPals/Search-That-Hash

* Auto-Type Identification - Uses Name-That-Hash to get accurate results on the type of the hash.
* Offline Mode - Will automatically run Hashcat if offline or cant find the plaintext in any of the Hash APIs.
* Fast - We've made STH to be as fast as possible.

Examples:
https://github.com/HashPals/Search-That-Hash/raw/main/Pictures/thm_speedrun.gif
https://github.com/HashPals/Search-That-Hash/raw/main/Pictures/hashcat.gif

We also have our own serverless API with over 40 million hash / plaintexts

TL;DR:
* GPLv3
* Install via PyPi with `pip3 install search-that-hash`, usage is `sth`.
* Pyproject.toml https://github.com/HashPals/Search-That-Hash/blob/main/pyproject.toml
* Setup.py https://github.com/HashPals/Name-That-Hash/blob/main/packages/setup.py
* Authors: Beesan, Jayy001
* Other similar tools: Hash-Buster (Outdated)
* Compute resources: very minimal, only requires an active internet connection for online APIs - If your running hashcat, then whatever resources hashcat normally uses.
* Maintained: Yes, I am an active open source maintainer so this tool shall remain maintained.

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014345)
Jayy001   
2021-03-13 12:24   
(Last edited: 2021-03-15 15:14)
(For some reason the serverless API part linked to another bug? Its meant to say ~ 40 mil hashes / plaintext)

(0014346)
Jayy001   
2021-03-13 12:25   
~* Forty
(0014349)
Jayy001   
2021-03-13 14:02   
You should also remove this tool - https://gitlab.com/kalilinux/packages/findmyhash (Very outdated, last updated 8 years ago)
(0014395)
g0tmi1k   
2021-03-26 13:28   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7117 [Kali Linux] Kali Package Improvement major always 2021-03-25 17:02 2021-03-25 17:39
Reporter: FireFart Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: firmware-b43-installer requires third party download
Description: The package firmware-b43-installer starts a wget or curl command and tries to download some packages from third party sources. This is a big problem if the kali installation is behind a corporate proxy/firewall that only allows access to the kali repos. The package should bring this file in the installation package with it or fetch it as a sub package from the kali package mirrors instead.

Setting up firmware-b43-installer (1:019-6) ...
No chroot environment found. Starting normal installation
No known supported Broadcom 802.11 chips found.
No supported device found.
But firmware is installed unconditionally
Trying to install latest firmware 6.30.163.46 .
--2021-03-25 17:52:04-- https://www.lwfinger.com/b43-firmware/broadcom-wl-6.30.163.46.tar.bz2
Resolving www.lwfinger.com (www.lwfinger.com)... 173.254.30.178
Connecting to www.lwfinger.com (www.lwfinger.com)|173.254.30.178|:443...
failed: Connection timed out.
Retrying.

This currently breaks the whole update process
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014391)
steev   
2021-03-25 17:39   
Unfortunately we can't rehost the file due to the licensing, so there isn't much we can do here.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7115 [Kali Linux] Feature Requests crash always 2021-03-24 09:25 2021-03-25 12:01
Reporter: Chihiro Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: I can't boot the Kali Linux into the VirtualBox
Description: Every time I try to boot the linux, I get stuck into the white dragon and never boots normal to let me log in.

I have:
4096MB: Base Memory
128MB: Video Memory
4: CPUs

I desabled HYPER V, turned on PAE/NX. Please help.
Steps To Reproduce: I install the linux into my VirtualBox, then I start the PC and it just stucks me intro the dragon loading screen.
Additional Information:
Attached Files: problem.png (51,619 bytes) 2021-03-24 09:25
https://bugs.kali.org/file_download.php?file_id=2039&type=bug
png
Notes
(0014389)
manas   
2021-03-25 12:01   
you not follow the right instruction when you choose the system file.
Try again and follow the right instruction.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6983 [Kali Linux] Kali Websites & Docs minor have not tried 2021-01-10 11:27 2021-03-22 11:17
Reporter: kali-bugreport Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Permission problems in Kali bugtracker
Description: Haven't found any better fitting category so had chosen "Kali Websites & Docs".

I have noticed that you seems to have some permission problems in this bug tracker for the standard "Reporter" account.

For example reporters can "Clone" an issue like happen in e.g. 0006912 (clone of 0006903) or 0006960 / 0006962 (clone 0006907) plus many additional ones, i don't think that such "Reporters" should have the possibility to Clone existing issues.

In addition e.g. "Reporters" can report an issue in the "Queued Tool Addition" category like seen in 0006981:0014079, this probably should be prevented by setting stricter permissions to that category.

On the other hand there are too strict permissions and reporters can't even edit their own comments / issues and also can't close them on their own.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014093)
kali-bugreport   
2021-01-10 14:04   
TLDR;

Suggestions for the permissions of the "Reporter" level:

- Disallow "Clone" functionality
- Disallow creating issues in the "Queued Tool Addition" category
- Allow editing the own issues / comments
- Allow closing the own issues
(0014342)
kali-bugreport   
2021-03-13 11:13   
Aaaaaand, it happened again: #7096, #7095, #7094 which are all three wrongly done clones of 0007044

You should really really rework your permissions, at least for the "Reporter" level.
(0014343)
kali-bugreport   
2021-03-13 11:33   
#7097 is also a clone of 0007068 done by the same user...
(0014375)
kali-bugreport   
2021-03-20 05:50   
And another one: #0007103
(0014377)
kali-bugreport   
2021-03-21 12:59   
Why are you also allow reporters to change the severity to e.g. intermediate? If anyone can set their own priorities anyone thinks the own bugreport is the most important one.
(0014382)
rhertzog   
2021-03-22 11:17   
(Last edited: 2021-03-22 11:17)
I would gladly configure mantis to avoid those problems, in fact I already tried... but there's no option to control who can clone. If you can report a bug, then you can clone.

You might want to open a feature request to the upstream project. I'm not sure if there's a setting to limit who can change the priority either.


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7111 [Kali Linux] General Bug major always 2021-03-21 17:14 2021-03-21 17:14
Reporter: JosephAshok Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: USB Wifi connection issue
Description: I am using Kali 2021.1 in my Odroid C2. I am using Tenda wifi card which uses Realtek 8192EU chipset.
Kali shows the wireless access points, allows me to pick and update WPA key. But the connection does not get through and there is no error either. After trying different ways, i have changed to iwd. Now even NetworkManager is not working if i insert wifi card. After removal of wifi card and restarting NetworkManager it works.
Please help me to use wifi.

Error with NetworkManager with iwd (when wifi card is inserted)
NetworkManager.service: main process exited, code=killed, status=11/SEGV
Steps To Reproduce: Can NetworkManager and WPA_supplicant work with Realtek RTL8192EU wifi driver ?
How we can enable both iwd with NetworkManager. Is this a workable solution in Kali?
Is segmentation failure known with NetworkManager?
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7102 [Kali Linux] Kali Package Bug major always 2021-03-17 00:30 2021-03-21 15:34
Reporter: rubiks Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Fern-wifi-cracker
Description: After inputting my password, fern wifi cracker doesn't open. I need solutions please
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014362)
steev   
2021-03-17 03:51   
I can't reproduce the issue here. What happens if you run "sudo fern-wifi-cracker" in the terminal?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7109 [Kali Linux] Kali Package Bug block always 2021-03-21 12:00 2021-03-21 14:50
Reporter: tn4417 Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: error when install package kali-tools-web
Description: error when install package kali-tools-web
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot from 2021-03-21 18-08-27.png (161,952 bytes) 2021-03-21 12:00
https://bugs.kali.org/file_download.php?file_id=2035&type=bug
png

Screencast 2021-03-21 18:59:22.mp4 (406,453 bytes) 2021-03-21 12:00
https://bugs.kali.org/file_download.php?file_id=2036&type=bug
Notes
(0014376)
kali-bugreport   
2021-03-21 12:57   
Without having a look at the screencast (you really shouldn't hide info within some videos and just post the errors in plaintext) i would say this is a dup of 0007101
(0014378)
tn4417   
2021-03-21 14:50   
i'm so sorry!!
There is a mistake here. I want to report an error of not being able to open Terminal in the desktop interface.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7107 [Kali Linux] General Bug tweak have not tried 2021-03-19 04:17 2021-03-19 04:17
Reporter: 0netwosix Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Unusual desktop behavior
Description: - Mouse click does not work on the desktop. (Left click and right click both)
- No icons are visible on the desktop.

Through "File Manager" desktop folders and files are accessible.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7106 [Kali Linux] Kali Websites & Docs minor have not tried 2021-03-18 14:17 2021-03-18 19:00
Reporter: sbrun Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Update hamster-sidejack webpage on tools.kali.org
Description: to avoid conflict with hamster-time-tracker e had to change the command name from hamster to hamster-sidejack.

This package needs to be updated:
https://tools.kali.org/sniffingspoofing/hamster-sidejack
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014368)
tn4417   
2021-03-18 14:52   
# apt reinstall -y kali-tools-web 100 ⨯
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
You might want to run 'apt --fix-broken install' to correct these.
The following packages have unmet dependencies:
 kali-tools-sniffing-spoofing : Depends: hamster-sidejack but it is not going to be installed
 kali-tools-web : Depends: hamster-sidejack but it is not going to be installed
E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution).
(0014369)
steev   
2021-03-18 19:00   
The build hasn't reached kali-rolling yet.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7101 [Kali Linux] Kali Package Bug block always 2021-03-16 09:42 2021-03-18 14:24
Reporter: tn4417 Platform:  
Assigned To: sbrun OS:  
Priority: immediate OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: hamster-sidejack and hamster-time-tracker conflict
Description: # apt-get install -y kali-tools-web
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following additional packages will be installed:
  apache-users dotdotpwn eyewitness ftester hamster-sidejack httprint httrack jboss-autopwn joomscan libalgorithm-c3-perl libb-hooks-endofscope-perl
  libb-hooks-op-check-perl libclass-c3-perl libclass-c3-xs-perl libclass-load-perl libclass-load-xs-perl libclass-method-modifiers-perl
  libclass-tiny-perl libclass-xsaccessor-perl libdata-optlist-perl libdevel-callchecker-perl libdevel-caller-perl libdevel-globaldestruction-perl
  libdevel-lexalias-perl libdevel-overloadinfo-perl libdevel-partialdump-perl libdevel-stacktrace-perl libdist-checkconflicts-perl
  libdynaloader-functions-perl libeval-closure-perl libfox-1.6-0 libfxscintilla20 libhttrack2 libimport-into-perl libio-all-lwp-perl libio-all-perl
  libmodule-implementation-perl libmodule-runtime-conflicts-perl libmodule-runtime-perl libmoo-perl libmoose-perl libmro-compat-perl
  libnamespace-clean-perl libnet-tftp-perl libpackage-deprecationmanager-perl libpackage-stash-perl libpackage-stash-xs-perl libpadwalker-perl
  libparallel-forkmanager-perl libparams-classify-perl libparams-util-perl libregexp-common-perl librole-tiny-perl libspiffy-perl libstrictures-perl
  libsub-exporter-perl libsub-exporter-progressive-perl libsub-identify-perl libsub-install-perl libsub-quote-perl libvariable-magic-perl
  owasp-mantra-ff padbuster paros plecost pry python3-easyprocess python3-fuzzywuzzy python3-geoip python3-levenshtein python3-pygeoip
  python3-pyvirtualdisplay racc ruby-childprocess ruby-coderay ruby-connection-pool ruby-fxruby ruby-jwt ruby-mechanize ruby-method-source
  ruby-net-http-persistent ruby-net-http-pipeline ruby-nfnetlink ruby-nfqueue ruby-ntlm ruby-selenium-webdriver ruby-webrobots sslsniff tlssled
  uniscan watobo webscarab xsser
Suggested packages:
  webhttrack httrack-doc libdb-file-lock-perl libfile-readbackwards-perl libfreezethaw-perl libmldbm-perl libscalar-number-perl
  libbareword-filehandles-perl libindirect-perl libmultidimensional-perl firefoxdriver
The following NEW packages will be installed:
  apache-users dotdotpwn eyewitness ftester hamster-sidejack httprint httrack jboss-autopwn joomscan kali-tools-web libalgorithm-c3-perl
  libb-hooks-endofscope-perl libb-hooks-op-check-perl libclass-c3-perl libclass-c3-xs-perl libclass-load-perl libclass-load-xs-perl
  libclass-method-modifiers-perl libclass-tiny-perl libclass-xsaccessor-perl libdata-optlist-perl libdevel-callchecker-perl libdevel-caller-perl
  libdevel-globaldestruction-perl libdevel-lexalias-perl libdevel-overloadinfo-perl libdevel-partialdump-perl libdevel-stacktrace-perl
  libdist-checkconflicts-perl libdynaloader-functions-perl libeval-closure-perl libfox-1.6-0 libfxscintilla20 libhttrack2 libimport-into-perl
  libio-all-lwp-perl libio-all-perl libmodule-implementation-perl libmodule-runtime-conflicts-perl libmodule-runtime-perl libmoo-perl libmoose-perl
  libmro-compat-perl libnamespace-clean-perl libnet-tftp-perl libpackage-deprecationmanager-perl libpackage-stash-perl libpackage-stash-xs-perl
  libpadwalker-perl libparallel-forkmanager-perl libparams-classify-perl libparams-util-perl libregexp-common-perl librole-tiny-perl libspiffy-perl
  libstrictures-perl libsub-exporter-perl libsub-exporter-progressive-perl libsub-identify-perl libsub-install-perl libsub-quote-perl
  libvariable-magic-perl owasp-mantra-ff padbuster paros plecost pry python3-easyprocess python3-fuzzywuzzy python3-geoip python3-levenshtein
  python3-pygeoip python3-pyvirtualdisplay racc ruby-childprocess ruby-coderay ruby-connection-pool ruby-fxruby ruby-jwt ruby-mechanize
  ruby-method-source ruby-net-http-persistent ruby-net-http-pipeline ruby-nfnetlink ruby-nfqueue ruby-ntlm ruby-selenium-webdriver ruby-webrobots
  sslsniff tlssled uniscan watobo webscarab xsser
0 upgraded, 94 newly installed, 0 to remove and 0 not upgraded.
Need to get 86.9 MB of archives.
After this operation, 220 MB of additional disk space will be used.
Get:1 http://kali.download/kali kali-rolling/main amd64 libclass-method-modifiers-perl all 2.13-1 [19.2 kB]
Get:2 http://kali.download/kali kali-rolling/main amd64 libb-hooks-op-check-perl amd64 0.22-1+b3 [11.3 kB]
Get:3 http://kali.download/kali kali-rolling/main amd64 libdynaloader-functions-perl all 0.003-1.1 [12.7 kB]
Get:4 http://kali.download/kali kali-rolling/main amd64 libdevel-callchecker-perl amd64 0.008-1+b2 [15.9 kB]
Get:5 http://kali.download/kali kali-rolling/main amd64 libparams-classify-perl amd64 0.015-1+b3 [25.7 kB]
Get:6 http://kali.download/kali kali-rolling/main amd64 libmodule-runtime-perl all 0.016-1 [19.4 kB]
Get:7 http://kali.download/kali kali-rolling/main amd64 libimport-into-perl all 1.002005-1 [11.6 kB]
Get:8 http://kali.download/kali kali-rolling/main amd64 librole-tiny-perl all 2.002004-1 [21.4 kB]
Get:9 http://kali.download/kali kali-rolling/main amd64 libstrictures-perl all 2.000006-1 [18.6 kB]
Get:10 http://kali.download/kali kali-rolling/main amd64 libsub-quote-perl all 2.006006-1 [21.0 kB]
Get:11 http://kali.download/kali kali-rolling/main amd64 libmoo-perl all 2.004004-1 [59.9 kB]
Get:12 http://kali.download/kali kali-rolling/main amd64 libparallel-forkmanager-perl all 2.02-1 [30.4 kB]
Get:13 http://kali.download/kali kali-rolling/main amd64 libspiffy-perl all 0.46-1 [25.7 kB]
Get:14 http://kali.download/kali kali-rolling/main amd64 libio-all-perl all 0.87-1 [66.7 kB]
Get:15 http://kali.download/kali kali-rolling/main amd64 libio-all-lwp-perl all 0.14-2.1 [15.5 kB]
Get:16 http://kali.download/kali kali-rolling/main amd64 apache-users amd64 2.1-1kali4 [3,452 B]
Get:17 http://kali.download/kali kali-rolling/main amd64 libnet-tftp-perl all 0.1901-1.1 [14.0 kB]
Get:18 http://kali.download/kali kali-rolling/main amd64 dotdotpwn amd64 3.0.2-0kali2 [35.8 kB]
Get:19 http://kali.download/kali kali-rolling/main amd64 python3-levenshtein amd64 0.12.2-1 [39.1 kB]
Get:20 http://kali.download/kali kali-rolling/main amd64 python3-fuzzywuzzy all 0.18.0-1 [20.6 kB]
Get:21 http://kali.download/kali kali-rolling/main amd64 python3-easyprocess all 0.2.5-2 [11.6 kB]
Get:22 http://kali.download/kali kali-rolling/main amd64 python3-pyvirtualdisplay all 0.2.1-3 [11.1 kB]
Get:23 http://kali.download/kali kali-rolling/main amd64 eyewitness amd64 20210305.1-0kali1 [1,371 kB]
Get:24 http://kali.download/kali kali-rolling/main amd64 ftester all 1.0-1kali2 [20.9 kB]
Get:25 http://kali.download/kali kali-rolling/main amd64 hamster-sidejack amd64 2.0-1kali4 [45.1 kB]
Get:26 http://kali.download/kali kali-rolling/main amd64 libhttrack2 amd64 3.49.2-1.1 [268 kB]
Get:27 http://kali.download/kali kali-rolling/main amd64 httrack amd64 3.49.2-1.1 [39.7 kB]
Get:28 http://kali.download/kali kali-rolling/main amd64 jboss-autopwn all 0.1-1kali1 [66.8 kB]
Get:29 http://kali.download/kali kali-rolling/main amd64 libregexp-common-perl all 2017060201-1 [177 kB]
Get:30 http://kali.download/kali kali-rolling/main amd64 joomscan all 0.0.7-0kali2 [64.3 kB]
Get:31 http://kali.download/kali kali-rolling/non-free amd64 httprint amd64 0.301-0kali3 [556 kB]
Get:32 http://kali.download/kali kali-rolling/non-free amd64 owasp-mantra-ff amd64 0.9-1kali2 [49.4 MB]
Get:33 http://kali.download/kali kali-rolling/main amd64 padbuster all 0.3.3-1kali3 [12.3 kB]
Get:34 http://kali.download/kali kali-rolling/main amd64 paros all 3.2.13-1kali3 [1,580 kB]
Get:35 http://kali.download/kali kali-rolling/main amd64 plecost all 1.1.2-0kali1 [1,320 kB]
Get:36 http://kali.download/kali kali-rolling/main amd64 sslsniff amd64 0.8-9 [124 kB]
Get:37 http://kali.download/kali kali-rolling/main amd64 tlssled all 1.3-0kali2 [9,904 B]
Get:38 http://kali.download/kali kali-rolling/main amd64 libparams-util-perl amd64 1.102-1+b1 [25.6 kB]
Get:39 http://kali.download/kali kali-rolling/main amd64 libsub-install-perl all 0.928-1.1 [10.8 kB]
Get:40 http://kali.download/kali kali-rolling/main amd64 libdata-optlist-perl all 0.110-1.1 [10.8 kB]
Get:41 http://kali.download/kali kali-rolling/main amd64 libmodule-implementation-perl all 0.09-1.1 [12.4 kB]
Get:42 http://kali.download/kali kali-rolling/main amd64 libpackage-stash-perl all 0.39-1 [21.9 kB]
Get:43 http://kali.download/kali kali-rolling/main amd64 libclass-load-perl all 0.25-1 [16.1 kB]
Get:44 http://kali.download/kali kali-rolling/main amd64 libclass-load-xs-perl amd64 0.10-1+b5 [14.6 kB]
Get:45 http://kali.download/kali kali-rolling/main amd64 libsub-exporter-progressive-perl all 0.001013-1 [7,588 B]
Get:46 http://kali.download/kali kali-rolling/main amd64 libdevel-globaldestruction-perl all 0.14-1.1 [8,312 B]
Get:47 http://kali.download/kali kali-rolling/main amd64 libalgorithm-c3-perl all 0.11-1 [11.7 kB]
Get:48 http://kali.download/kali kali-rolling/main amd64 libclass-c3-perl all 0.35-1 [22.9 kB]
Get:49 http://kali.download/kali kali-rolling/main amd64 libmro-compat-perl all 0.13-1 [12.2 kB]
Get:50 http://kali.download/kali kali-rolling/main amd64 libsub-identify-perl amd64 0.14-1+b3 [12.0 kB]
Get:51 http://kali.download/kali kali-rolling/main amd64 libdevel-overloadinfo-perl all 0.005-1 [7,212 B]
Get:52 http://kali.download/kali kali-rolling/main amd64 libdevel-stacktrace-perl all 2.0400-1 [28.6 kB]
Get:53 http://kali.download/kali kali-rolling/main amd64 libsub-exporter-perl all 0.987-1 [47.2 kB]
Get:54 http://kali.download/kali kali-rolling/main amd64 libeval-closure-perl all 0.14-1 [11.5 kB]
Get:55 http://kali.download/kali kali-rolling/main amd64 libdist-checkconflicts-perl all 0.11-1.1 [10.2 kB]
Get:56 http://kali.download/kali kali-rolling/main amd64 libmodule-runtime-conflicts-perl all 0.003-1.1 [7,156 B]
Get:57 http://kali.download/kali kali-rolling/main amd64 libpackage-deprecationmanager-perl all 0.17-1.1 [16.6 kB]
Get:58 http://kali.download/kali kali-rolling/main amd64 libpackage-stash-xs-perl amd64 0.29-1+b2 [20.2 kB]
Get:59 http://kali.download/kali kali-rolling/main amd64 libmoose-perl amd64 2.2014-2 [802 kB]
Get:60 http://kali.download/kali kali-rolling/main amd64 uniscan all 6.3-0kali2 [219 kB]
Get:61 http://kali.download/kali kali-rolling/main amd64 ruby-coderay all 1.1.3-3 [77.5 kB]
Get:62 http://kali.download/kali kali-rolling/main amd64 ruby-method-source all 1.0.0-2 [9,060 B]
Get:63 http://kali.download/kali kali-rolling/main amd64 pry all 0.13.1-1 [141 kB]
Get:64 http://kali.download/kali kali-rolling/main amd64 libfox-1.6-0 amd64 1.6.57-1 [877 kB]
Get:65 http://kali.download/kali kali-rolling/main amd64 libfxscintilla20 amd64 2.28.0-0kali2 [765 kB]
Get:66 http://kali.download/kali kali-rolling/main amd64 ruby-fxruby amd64 1.6.29-0kali7+b1 [1,602 kB]
Get:67 http://kali.download/kali kali-rolling/main amd64 ruby-jwt all 2.2.2-1 [21.2 kB]
Get:68 http://kali.download/kali kali-rolling/main amd64 ruby-connection-pool all 2.2.2-1 [9,080 B]
Get:69 http://kali.download/kali kali-rolling/main amd64 ruby-net-http-persistent all 3.1.0-2 [21.0 kB]
Get:70 http://kali.download/kali kali-rolling/main amd64 ruby-ntlm all 0.6.1-2 [17.3 kB]
Get:71 http://kali.download/kali kali-rolling/main amd64 racc all 1.4.14-2 [83.4 kB]
Get:72 http://kali.download/kali kali-rolling/main amd64 ruby-webrobots all 0.1.2-1 [10.9 kB]
Get:73 http://kali.download/kali kali-rolling/main amd64 ruby-mechanize all 2.7.7-1 [81.7 kB]
Get:74 http://kali.download/kali kali-rolling/main amd64 ruby-net-http-pipeline all 1.0.1-3 [7,052 B]
Get:75 http://kali.download/kali kali-rolling/main amd64 ruby-childprocess all 4.0.0-1 [24.9 kB]
Get:76 http://kali.download/kali kali-rolling/main amd64 ruby-selenium-webdriver all 3.142.7+dfsg-2 [742 kB]
Get:77 http://kali.download/kali kali-rolling/main amd64 watobo amd64 1.0.1-0kali1 [689 kB]
Get:78 http://kali.download/kali kali-rolling/main amd64 webscarab all 20120422-001828-1kali2 [13.0 MB]
Get:79 http://kali.download/kali kali-rolling/main amd64 python3-geoip amd64 1.3.2-3+b3 [21.1 kB]
Get:80 http://kali.download/kali kali-rolling/main amd64 xsser all 1.8.3+git20201228-0kali1 [11.5 MB]
Get:81 http://kali.download/kali kali-rolling/main amd64 kali-tools-web amd64 2021.1.10 [13.4 kB]
Get:82 http://kali.download/kali kali-rolling/main amd64 libvariable-magic-perl amd64 0.62-1+b3 [45.7 kB]
Get:83 http://kali.download/kali kali-rolling/main amd64 libb-hooks-endofscope-perl all 0.24-1.1 [18.9 kB]
Get:84 http://kali.download/kali kali-rolling/main amd64 libclass-c3-xs-perl amd64 0.15-1+b1 [17.3 kB]
Get:85 http://kali.download/kali kali-rolling/main amd64 libclass-tiny-perl all 1.008-1 [18.8 kB]
Get:86 http://kali.download/kali kali-rolling/main amd64 libclass-xsaccessor-perl amd64 1.19-3+b7 [38.1 kB]
Get:87 http://kali.download/kali kali-rolling/main amd64 libpadwalker-perl amd64 2.5-1+b1 [20.3 kB]
Get:88 http://kali.download/kali kali-rolling/main amd64 libdevel-caller-perl amd64 2.06-2+b3 [12.1 kB]
Get:89 http://kali.download/kali kali-rolling/main amd64 libdevel-lexalias-perl amd64 0.05-2+b3 [9,064 B]
Get:90 http://kali.download/kali kali-rolling/main amd64 libnamespace-clean-perl all 0.27-1 [17.3 kB]
Get:91 http://kali.download/kali kali-rolling/main amd64 libdevel-partialdump-perl all 0.20-1 [15.3 kB]
Get:92 http://kali.download/kali kali-rolling/main amd64 python3-pygeoip all 0.3.2-5 [18.0 kB]
Get:93 http://kali.download/kali kali-rolling/main amd64 ruby-nfnetlink all 1.0.2-2 [4,532 B]
Get:94 http://kali.download/kali kali-rolling/main amd64 ruby-nfqueue all 1.0.4-2 [6,372 B]
Fetched 86.9 MB in 54s (1,619 kB/s)
Extracting templates from packages: 100%
Selecting previously unselected package libclass-method-modifiers-perl.
(Reading database ... 466464 files and directories currently installed.)
Preparing to unpack .../00-libclass-method-modifiers-perl_2.13-1_all.deb ...
Unpacking libclass-method-modifiers-perl (2.13-1) ...
Selecting previously unselected package libb-hooks-op-check-perl.
Preparing to unpack .../01-libb-hooks-op-check-perl_0.22-1+b3_amd64.deb ...
Unpacking libb-hooks-op-check-perl (0.22-1+b3) ...
Selecting previously unselected package libdynaloader-functions-perl.
Preparing to unpack .../02-libdynaloader-functions-perl_0.003-1.1_all.deb ...
Unpacking libdynaloader-functions-perl (0.003-1.1) ...
Selecting previously unselected package libdevel-callchecker-perl.
Preparing to unpack .../03-libdevel-callchecker-perl_0.008-1+b2_amd64.deb ...
Unpacking libdevel-callchecker-perl (0.008-1+b2) ...
Selecting previously unselected package libparams-classify-perl.
Preparing to unpack .../04-libparams-classify-perl_0.015-1+b3_amd64.deb ...
Unpacking libparams-classify-perl (0.015-1+b3) ...
Selecting previously unselected package libmodule-runtime-perl.
Preparing to unpack .../05-libmodule-runtime-perl_0.016-1_all.deb ...
Unpacking libmodule-runtime-perl (0.016-1) ...
Selecting previously unselected package libimport-into-perl.
Preparing to unpack .../06-libimport-into-perl_1.002005-1_all.deb ...
Unpacking libimport-into-perl (1.002005-1) ...
Selecting previously unselected package librole-tiny-perl.
Preparing to unpack .../07-librole-tiny-perl_2.002004-1_all.deb ...
Unpacking librole-tiny-perl (2.002004-1) ...
Selecting previously unselected package libstrictures-perl.
Preparing to unpack .../08-libstrictures-perl_2.000006-1_all.deb ...
Unpacking libstrictures-perl (2.000006-1) ...
Selecting previously unselected package libsub-quote-perl.
Preparing to unpack .../09-libsub-quote-perl_2.006006-1_all.deb ...
Unpacking libsub-quote-perl (2.006006-1) ...
Selecting previously unselected package libmoo-perl.
Preparing to unpack .../10-libmoo-perl_2.004004-1_all.deb ...
Unpacking libmoo-perl (2.004004-1) ...
Selecting previously unselected package libparallel-forkmanager-perl.
Preparing to unpack .../11-libparallel-forkmanager-perl_2.02-1_all.deb ...
Unpacking libparallel-forkmanager-perl (2.02-1) ...
Selecting previously unselected package libspiffy-perl.
Preparing to unpack .../12-libspiffy-perl_0.46-1_all.deb ...
Unpacking libspiffy-perl (0.46-1) ...
Selecting previously unselected package libio-all-perl.
Preparing to unpack .../13-libio-all-perl_0.87-1_all.deb ...
Unpacking libio-all-perl (0.87-1) ...
Selecting previously unselected package libio-all-lwp-perl.
Preparing to unpack .../14-libio-all-lwp-perl_0.14-2.1_all.deb ...
Unpacking libio-all-lwp-perl (0.14-2.1) ...
Selecting previously unselected package apache-users.
Preparing to unpack .../15-apache-users_2.1-1kali4_amd64.deb ...
Unpacking apache-users (2.1-1kali4) ...
Selecting previously unselected package libnet-tftp-perl.
Preparing to unpack .../16-libnet-tftp-perl_0.1901-1.1_all.deb ...
Unpacking libnet-tftp-perl (0.1901-1.1) ...
Selecting previously unselected package dotdotpwn.
Preparing to unpack .../17-dotdotpwn_3.0.2-0kali2_amd64.deb ...
Unpacking dotdotpwn (3.0.2-0kali2) ...
Selecting previously unselected package python3-levenshtein.
Preparing to unpack .../18-python3-levenshtein_0.12.2-1_amd64.deb ...
Unpacking python3-levenshtein (0.12.2-1) ...
Selecting previously unselected package python3-fuzzywuzzy.
Preparing to unpack .../19-python3-fuzzywuzzy_0.18.0-1_all.deb ...
Unpacking python3-fuzzywuzzy (0.18.0-1) ...
Selecting previously unselected package python3-easyprocess.
Preparing to unpack .../20-python3-easyprocess_0.2.5-2_all.deb ...
Unpacking python3-easyprocess (0.2.5-2) ...
Selecting previously unselected package python3-pyvirtualdisplay.
Preparing to unpack .../21-python3-pyvirtualdisplay_0.2.1-3_all.deb ...
Unpacking python3-pyvirtualdisplay (0.2.1-3) ...
Selecting previously unselected package eyewitness.
Preparing to unpack .../22-eyewitness_20210305.1-0kali1_amd64.deb ...
Unpacking eyewitness (20210305.1-0kali1) ...
Selecting previously unselected package ftester.
Preparing to unpack .../23-ftester_1.0-1kali2_all.deb ...
Unpacking ftester (1.0-1kali2) ...
Preparing to unpack .../24-hamster-sidejack_2.0-1kali4_amd64.deb ...
Unpacking hamster-sidejack (2.0-1kali4) ...
dpkg: error processing archive /tmp/apt-dpkg-install-SIDCag/24-hamster-sidejack_2.0-1kali4_amd64.deb (--unpack):
 trying to overwrite '/usr/bin/hamster', which is also in package hamster-time-tracker 3.0.2-3
Selecting previously unselected package libhttrack2.
Preparing to unpack .../25-libhttrack2_3.49.2-1.1_amd64.deb ...
Unpacking libhttrack2 (3.49.2-1.1) ...
Selecting previously unselected package httrack.
Preparing to unpack .../26-httrack_3.49.2-1.1_amd64.deb ...
Unpacking httrack (3.49.2-1.1) ...
Selecting previously unselected package jboss-autopwn.
Preparing to unpack .../27-jboss-autopwn_0.1-1kali1_all.deb ...
Unpacking jboss-autopwn (0.1-1kali1) ...
Selecting previously unselected package libregexp-common-perl.
Preparing to unpack .../28-libregexp-common-perl_2017060201-1_all.deb ...
Unpacking libregexp-common-perl (2017060201-1) ...
Selecting previously unselected package joomscan.
Preparing to unpack .../29-joomscan_0.0.7-0kali2_all.deb ...
Unpacking joomscan (0.0.7-0kali2) ...
Selecting previously unselected package httprint.
Preparing to unpack .../30-httprint_0.301-0kali3_amd64.deb ...
Unpacking httprint (0.301-0kali3) ...
Selecting previously unselected package owasp-mantra-ff.
Preparing to unpack .../31-owasp-mantra-ff_0.9-1kali2_amd64.deb ...
Unpacking owasp-mantra-ff (0.9-1kali2) ...
Selecting previously unselected package padbuster.
Preparing to unpack .../32-padbuster_0.3.3-1kali3_all.deb ...
Unpacking padbuster (0.3.3-1kali3) ...
Selecting previously unselected package paros.
Preparing to unpack .../33-paros_3.2.13-1kali3_all.deb ...
Unpacking paros (3.2.13-1kali3) ...
Selecting previously unselected package plecost.
Preparing to unpack .../34-plecost_1.1.2-0kali1_all.deb ...
Unpacking plecost (1.1.2-0kali1) ...
Selecting previously unselected package sslsniff.
Preparing to unpack .../35-sslsniff_0.8-9_amd64.deb ...
Unpacking sslsniff (0.8-9) ...
Selecting previously unselected package tlssled.
Preparing to unpack .../36-tlssled_1.3-0kali2_all.deb ...
Unpacking tlssled (1.3-0kali2) ...
Selecting previously unselected package libparams-util-perl.
Preparing to unpack .../37-libparams-util-perl_1.102-1+b1_amd64.deb ...
Unpacking libparams-util-perl (1.102-1+b1) ...
Selecting previously unselected package libsub-install-perl.
Preparing to unpack .../38-libsub-install-perl_0.928-1.1_all.deb ...
Unpacking libsub-install-perl (0.928-1.1) ...
Selecting previously unselected package libdata-optlist-perl.
Preparing to unpack .../39-libdata-optlist-perl_0.110-1.1_all.deb ...
Unpacking libdata-optlist-perl (0.110-1.1) ...
Selecting previously unselected package libmodule-implementation-perl.
Preparing to unpack .../40-libmodule-implementation-perl_0.09-1.1_all.deb ...
Unpacking libmodule-implementation-perl (0.09-1.1) ...
Selecting previously unselected package libpackage-stash-perl.
Preparing to unpack .../41-libpackage-stash-perl_0.39-1_all.deb ...
Unpacking libpackage-stash-perl (0.39-1) ...
Selecting previously unselected package libclass-load-perl.
Preparing to unpack .../42-libclass-load-perl_0.25-1_all.deb ...
Unpacking libclass-load-perl (0.25-1) ...
Selecting previously unselected package libclass-load-xs-perl.
Preparing to unpack .../43-libclass-load-xs-perl_0.10-1+b5_amd64.deb ...
Unpacking libclass-load-xs-perl (0.10-1+b5) ...
Selecting previously unselected package libsub-exporter-progressive-perl.
Preparing to unpack .../44-libsub-exporter-progressive-perl_0.001013-1_all.deb ...
Unpacking libsub-exporter-progressive-perl (0.001013-1) ...
Selecting previously unselected package libdevel-globaldestruction-perl.
Preparing to unpack .../45-libdevel-globaldestruction-perl_0.14-1.1_all.deb ...
Unpacking libdevel-globaldestruction-perl (0.14-1.1) ...
Selecting previously unselected package libalgorithm-c3-perl.
Preparing to unpack .../46-libalgorithm-c3-perl_0.11-1_all.deb ...
Unpacking libalgorithm-c3-perl (0.11-1) ...
Selecting previously unselected package libclass-c3-perl.
Preparing to unpack .../47-libclass-c3-perl_0.35-1_all.deb ...
Unpacking libclass-c3-perl (0.35-1) ...
Selecting previously unselected package libmro-compat-perl.
Preparing to unpack .../48-libmro-compat-perl_0.13-1_all.deb ...
Unpacking libmro-compat-perl (0.13-1) ...
Selecting previously unselected package libsub-identify-perl.
Preparing to unpack .../49-libsub-identify-perl_0.14-1+b3_amd64.deb ...
Unpacking libsub-identify-perl (0.14-1+b3) ...
Selecting previously unselected package libdevel-overloadinfo-perl.
Preparing to unpack .../50-libdevel-overloadinfo-perl_0.005-1_all.deb ...
Unpacking libdevel-overloadinfo-perl (0.005-1) ...
Selecting previously unselected package libdevel-stacktrace-perl.
Preparing to unpack .../51-libdevel-stacktrace-perl_2.0400-1_all.deb ...
Unpacking libdevel-stacktrace-perl (2.0400-1) ...
Selecting previously unselected package libsub-exporter-perl.
Preparing to unpack .../52-libsub-exporter-perl_0.987-1_all.deb ...
Unpacking libsub-exporter-perl (0.987-1) ...
Selecting previously unselected package libeval-closure-perl.
Preparing to unpack .../53-libeval-closure-perl_0.14-1_all.deb ...
Unpacking libeval-closure-perl (0.14-1) ...
Selecting previously unselected package libdist-checkconflicts-perl.
Preparing to unpack .../54-libdist-checkconflicts-perl_0.11-1.1_all.deb ...
Unpacking libdist-checkconflicts-perl (0.11-1.1) ...
Selecting previously unselected package libmodule-runtime-conflicts-perl.
Preparing to unpack .../55-libmodule-runtime-conflicts-perl_0.003-1.1_all.deb ...
Unpacking libmodule-runtime-conflicts-perl (0.003-1.1) ...
Selecting previously unselected package libpackage-deprecationmanager-perl.
Preparing to unpack .../56-libpackage-deprecationmanager-perl_0.17-1.1_all.deb ...
Unpacking libpackage-deprecationmanager-perl (0.17-1.1) ...
Selecting previously unselected package libpackage-stash-xs-perl.
Preparing to unpack .../57-libpackage-stash-xs-perl_0.29-1+b2_amd64.deb ...
Unpacking libpackage-stash-xs-perl (0.29-1+b2) ...
Selecting previously unselected package libmoose-perl.
Preparing to unpack .../58-libmoose-perl_2.2014-2_amd64.deb ...
Unpacking libmoose-perl (2.2014-2) ...
Selecting previously unselected package uniscan.
Preparing to unpack .../59-uniscan_6.3-0kali2_all.deb ...
Unpacking uniscan (6.3-0kali2) ...
Selecting previously unselected package ruby-coderay.
Preparing to unpack .../60-ruby-coderay_1.1.3-3_all.deb ...
Unpacking ruby-coderay (1.1.3-3) ...
Selecting previously unselected package ruby-method-source.
Preparing to unpack .../61-ruby-method-source_1.0.0-2_all.deb ...
Unpacking ruby-method-source (1.0.0-2) ...
Selecting previously unselected package pry.
Preparing to unpack .../62-pry_0.13.1-1_all.deb ...
Unpacking pry (0.13.1-1) ...
Selecting previously unselected package libfox-1.6-0:amd64.
Preparing to unpack .../63-libfox-1.6-0_1.6.57-1_amd64.deb ...
Unpacking libfox-1.6-0:amd64 (1.6.57-1) ...
Selecting previously unselected package libfxscintilla20.
Preparing to unpack .../64-libfxscintilla20_2.28.0-0kali2_amd64.deb ...
Unpacking libfxscintilla20 (2.28.0-0kali2) ...
Selecting previously unselected package ruby-fxruby.
Preparing to unpack .../65-ruby-fxruby_1.6.29-0kali7+b1_amd64.deb ...
Unpacking ruby-fxruby (1.6.29-0kali7+b1) ...
Selecting previously unselected package ruby-jwt.
Preparing to unpack .../66-ruby-jwt_2.2.2-1_all.deb ...
Unpacking ruby-jwt (2.2.2-1) ...
Selecting previously unselected package ruby-connection-pool.
Preparing to unpack .../67-ruby-connection-pool_2.2.2-1_all.deb ...
Unpacking ruby-connection-pool (2.2.2-1) ...
Selecting previously unselected package ruby-net-http-persistent.
Preparing to unpack .../68-ruby-net-http-persistent_3.1.0-2_all.deb ...
Unpacking ruby-net-http-persistent (3.1.0-2) ...
Selecting previously unselected package ruby-ntlm.
Preparing to unpack .../69-ruby-ntlm_0.6.1-2_all.deb ...
Unpacking ruby-ntlm (0.6.1-2) ...
Selecting previously unselected package racc.
Preparing to unpack .../70-racc_1.4.14-2_all.deb ...
Unpacking racc (1.4.14-2) ...
Selecting previously unselected package ruby-webrobots.
Preparing to unpack .../71-ruby-webrobots_0.1.2-1_all.deb ...
Unpacking ruby-webrobots (0.1.2-1) ...
Selecting previously unselected package ruby-mechanize.
Preparing to unpack .../72-ruby-mechanize_2.7.7-1_all.deb ...
Unpacking ruby-mechanize (2.7.7-1) ...
Selecting previously unselected package ruby-net-http-pipeline.
Preparing to unpack .../73-ruby-net-http-pipeline_1.0.1-3_all.deb ...
Unpacking ruby-net-http-pipeline (1.0.1-3) ...
Selecting previously unselected package ruby-childprocess.
Preparing to unpack .../74-ruby-childprocess_4.0.0-1_all.deb ...
Unpacking ruby-childprocess (4.0.0-1) ...
Selecting previously unselected package ruby-selenium-webdriver.
Preparing to unpack .../75-ruby-selenium-webdriver_3.142.7+dfsg-2_all.deb ...
Unpacking ruby-selenium-webdriver (3.142.7+dfsg-2) ...
Selecting previously unselected package watobo.
Preparing to unpack .../76-watobo_1.0.1-0kali1_amd64.deb ...
Unpacking watobo (1.0.1-0kali1) ...
Selecting previously unselected package webscarab.
Preparing to unpack .../77-webscarab_20120422-001828-1kali2_all.deb ...
Unpacking webscarab (20120422-001828-1kali2) ...
Selecting previously unselected package python3-geoip.
Preparing to unpack .../78-python3-geoip_1.3.2-3+b3_amd64.deb ...
Unpacking python3-geoip (1.3.2-3+b3) ...
Selecting previously unselected package xsser.
Preparing to unpack .../79-xsser_1.8.3+git20201228-0kali1_all.deb ...
Unpacking xsser (1.8.3+git20201228-0kali1) ...
Selecting previously unselected package kali-tools-web.
Preparing to unpack .../80-kali-tools-web_2021.1.10_amd64.deb ...
Unpacking kali-tools-web (2021.1.10) ...
Selecting previously unselected package libvariable-magic-perl.
Preparing to unpack .../81-libvariable-magic-perl_0.62-1+b3_amd64.deb ...
Unpacking libvariable-magic-perl (0.62-1+b3) ...
Selecting previously unselected package libb-hooks-endofscope-perl.
Preparing to unpack .../82-libb-hooks-endofscope-perl_0.24-1.1_all.deb ...
Unpacking libb-hooks-endofscope-perl (0.24-1.1) ...
Selecting previously unselected package libclass-c3-xs-perl.
Preparing to unpack .../83-libclass-c3-xs-perl_0.15-1+b1_amd64.deb ...
Unpacking libclass-c3-xs-perl (0.15-1+b1) ...
Selecting previously unselected package libclass-tiny-perl.
Preparing to unpack .../84-libclass-tiny-perl_1.008-1_all.deb ...
Unpacking libclass-tiny-perl (1.008-1) ...
Selecting previously unselected package libclass-xsaccessor-perl.
Preparing to unpack .../85-libclass-xsaccessor-perl_1.19-3+b7_amd64.deb ...
Unpacking libclass-xsaccessor-perl (1.19-3+b7) ...
Selecting previously unselected package libpadwalker-perl.
Preparing to unpack .../86-libpadwalker-perl_2.5-1+b1_amd64.deb ...
Unpacking libpadwalker-perl (2.5-1+b1) ...
Selecting previously unselected package libdevel-caller-perl.
Preparing to unpack .../87-libdevel-caller-perl_2.06-2+b3_amd64.deb ...
Unpacking libdevel-caller-perl (2.06-2+b3) ...
Selecting previously unselected package libdevel-lexalias-perl.
Preparing to unpack .../88-libdevel-lexalias-perl_0.05-2+b3_amd64.deb ...
Unpacking libdevel-lexalias-perl (0.05-2+b3) ...
Selecting previously unselected package libnamespace-clean-perl.
Preparing to unpack .../89-libnamespace-clean-perl_0.27-1_all.deb ...
Unpacking libnamespace-clean-perl (0.27-1) ...
Selecting previously unselected package libdevel-partialdump-perl.
Preparing to unpack .../90-libdevel-partialdump-perl_0.20-1_all.deb ...
Unpacking libdevel-partialdump-perl (0.20-1) ...
Selecting previously unselected package python3-pygeoip.
Preparing to unpack .../91-python3-pygeoip_0.3.2-5_all.deb ...
Unpacking python3-pygeoip (0.3.2-5) ...
Selecting previously unselected package ruby-nfnetlink.
Preparing to unpack .../92-ruby-nfnetlink_1.0.2-2_all.deb ...
Unpacking ruby-nfnetlink (1.0.2-2) ...
Selecting previously unselected package ruby-nfqueue.
Preparing to unpack .../93-ruby-nfqueue_1.0.4-2_all.deb ...
Unpacking ruby-nfqueue (1.0.4-2) ...
Errors were encountered while processing:
 /tmp/apt-dpkg-install-SIDCag/24-hamster-sidejack_2.0-1kali4_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
                                                                       
Steps To Reproduce: apt install -y kali-tools-web
Additional Information:
Attached Files:
Notes
(0014357)
tn4417   
2021-03-16 09:44   
─# apt-get install -y kali-tools-web 100 ⨯
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
kali-tools-web is already the newest version (2021.1.10).
You might want to run 'apt --fix-broken install' to correct these.
The following packages have unmet dependencies:
 kali-tools-web : Depends: hamster-sidejack but it is not going to be installed
E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution).
(0014360)
steev   
2021-03-16 20:28   
Unpacking hamster-sidejack (2.0-1kali4) ...
dpkg: error processing archive /tmp/apt-dpkg-install-SIDCag/24-hamster-sidejack_2.0-1kali4_amd64.deb (--unpack):
 trying to overwrite '/usr/bin/hamster', which is also in package hamster-time-tracker 3.0.2-3

Looks like we have clashing binary names with the GNOME time tracker.

You could remove hamster-time-tracker as a workaround, if you aren't using it.
(0014361)
tn4417   
2021-03-17 03:31   
this problem was fixed.Thanks
(0014363)
steev   
2021-03-17 03:54   
Do you mean the workaround worked, or do you mean that you're able to install hamster-sidejack while also having hamster-time-tracker installed?
(0014364)
tn4417   
2021-03-17 04:03   
I follow your instructions. .I need to remove the hamster-time-tracker package first. I then reinstalled the package kali-tools-web
(0014367)
sbrun   
2021-03-18 14:24   
to avoid conflict with the Debian package hamster-time-tracker, we renamed the command from hamster to hamster-sidejack in version kali/2.0-1kali5

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7093 [Kali Linux] Tool Upgrade minor have not tried 2021-03-12 19:00 2021-03-18 08:36
Reporter: wiringmarigold Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: bat vers 0.18 avaialble
Description: can this be updated pls?
also binary installed is named wrong, should be bat, not batcat. this causes issues with usage and scripting
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014318)
steev   
2021-03-13 04:47   
Unfortunately, another package already has (and has had) the binary name of "bat" so we can't install it with the same name, thus why it gets "batcat"
(0014348)
wiringmarigold   
2021-03-13 13:16   
@steev will it still be updated?
(0014366)
sbrun   
2021-03-18 08:36   
It's a Debian package.
Someone has already opened a bug to request the update :
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983922

We can import the package in Kali as soon it's available in Debian.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7073 [Kali Linux] General Bug minor always 2021-03-02 09:27 2021-03-16 07:19
Reporter: john285 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: USB adapter not work
Description: USB adapter not work

Bus 006 Device 002: ID 0a5c:2101 Broadcom Corp. BCM2045 Bluetooth
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014264)
steev   
2021-03-02 20:15   
Can you give more information? After plugging it in and starting the bluetooth service, what is the output of "hcitool dev" ? Is there any information in dmesg?
(0014353)
john285   
2021-03-16 02:49   
[ 0.326581] x86/mm: Memory block size: 128MB
[ 0.327420] PM: Registering ACPI NVS region [mem 0x9ca89000-0x9cb59fff] (856064 bytes)
[ 0.327420] PM: Registering ACPI NVS region [mem 0x9e4d2000-0x9e4d9fff] (32768 bytes)
[ 0.327420] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
[ 0.327420] futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
[ 0.327420] pinctrl core: initialized pinctrl subsystem
[ 0.327420] NET: Registered protocol family 16
[ 0.330079] audit: initializing netlink subsys (disabled)
[ 0.330099] audit: type=2000 audit(1615436160.156:1): state=initialized audit_enabled=0 res=1
[ 0.330324] thermal_sys: Registered thermal governor 'fair_share'
[ 0.330327] thermal_sys: Registered thermal governor 'bang_bang'
[ 0.330329] thermal_sys: Registered thermal governor 'step_wise'
[ 0.330331] thermal_sys: Registered thermal governor 'user_space'
[ 0.330334] thermal_sys: Registered thermal governor 'power_allocator'
[ 0.330366] cpuidle: using governor ladder
[ 0.330380] cpuidle: using governor menu
[ 0.330417] ACPI: bus type PCI registered
[ 0.330417] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
[ 0.330417] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
[ 0.330417] PCI: not using MMCONFIG
[ 0.330417] PCI: Using configuration type 1 for base access
[ 0.330417] PCI: Using configuration type 1 for extended access
[ 0.330846] mtrr: your CPUs had inconsistent variable MTRR settings
[ 0.330848] mtrr: probably your BIOS does not setup all CPUs.
[ 0.330849] mtrr: corrected configuration.
[ 0.334074] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
[ 0.334074] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
[ 0.878248] ACPI: Added _OSI(Module Device)
[ 0.878252] ACPI: Added _OSI(Processor Device)
[ 0.878255] ACPI: Added _OSI(3.0 _SCP Extensions)
[ 0.878257] ACPI: Added _OSI(Processor Aggregator Device)
[ 0.878261] ACPI: Added _OSI(Linux-Dell-Video)
[ 0.878264] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
[ 0.878267] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
[ 0.894820] ACPI: 6 ACPI AML tables successfully acquired and loaded
[ 0.903848] ACPI: Interpreter enabled
[ 0.903911] ACPI: (supports S0 S3 S4 S5)
[ 0.903915] ACPI: Using IOAPIC for interrupt routing
[ 0.904317] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
[ 0.904446] PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in ACPI motherboard resources
[ 0.904482] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
[ 0.905739] ACPI: Enabled 6 GPEs in block 00 to 1F
[ 0.925077] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
[ 0.925092] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
[ 0.925632] acpi PNP0A08:00: _OSC: platform does not support [SHPCHotplug LTR]
[ 0.926153] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability]
[ 0.926974] PCI host bridge to bus 0000:00
[ 0.926981] pci_bus 0000:00: root bus resource [io 0x0000-0x03af window]
[ 0.926985] pci_bus 0000:00: root bus resource [io 0x03e0-0x0cf7 window]
[ 0.926989] pci_bus 0000:00: root bus resource [io 0x03b0-0x03df window]
[ 0.926993] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window]
[ 0.926997] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
[ 0.927001] pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000dffff window]
[ 0.927005] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xffffffff window]
[ 0.927009] pci_bus 0000:00: root bus resource [bus 00-ff]
[ 0.927036] pci 0000:00:00.0: [1022:1536] type 00 class 0x060000
[ 0.927316] pci 0000:00:01.0: [1002:9836] type 00 class 0x030000
[ 0.927337] pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xcfffffff 64bit pref]
[ 0.927350] pci 0000:00:01.0: reg 0x18: [mem 0xd0000000-0xd07fffff 64bit pref]
[ 0.927360] pci 0000:00:01.0: reg 0x20: [io 0xf000-0xf0ff]
[ 0.927369] pci 0000:00:01.0: reg 0x24: [mem 0xfeb00000-0xfeb3ffff]
[ 0.927380] pci 0000:00:01.0: reg 0x30: [mem 0xfeb40000-0xfeb5ffff pref]
[ 0.927389] pci 0000:00:01.0: enabling Extended Tags
[ 0.927449] pci 0000:00:01.0: supports D1 D2
[ 0.927453] pci 0000:00:01.0: PME# supported from D1 D2 D3hot
[ 0.927700] pci 0000:00:01.1: [1002:9840] type 00 class 0x040300
[ 0.927720] pci 0000:00:01.1: reg 0x10: [mem 0xfeb64000-0xfeb67fff 64bit]
[ 0.927758] pci 0000:00:01.1: enabling Extended Tags
[ 0.927813] pci 0000:00:01.1: supports D1 D2
[ 0.927999] pci 0000:00:02.0: [1022:1538] type 00 class 0x060000
[ 0.928209] pci 0000:00:02.2: [1022:1439] type 01 class 0x060400
[ 0.928256] pci 0000:00:02.2: enabling Extended Tags
[ 0.928322] pci 0000:00:02.2: PME# supported from D0 D3hot D3cold
[ 0.928607] pci 0000:00:02.3: [1022:1439] type 01 class 0x060400
[ 0.928653] pci 0000:00:02.3: enabling Extended Tags
[ 0.928718] pci 0000:00:02.3: PME# supported from D0 D3hot D3cold
[ 0.929022] pci 0000:00:10.0: [1022:7814] type 00 class 0x0c0330
[ 0.929048] pci 0000:00:10.0: reg 0x10: [mem 0xfeb68000-0xfeb69fff 64bit]
[ 0.929171] pci 0000:00:10.0: PME# supported from D0 D3hot D3cold
[ 0.929431] pci 0000:00:11.0: [1022:7801] type 00 class 0x010601
[ 0.929450] pci 0000:00:11.0: reg 0x10: [io 0xf140-0xf147]
[ 0.929460] pci 0000:00:11.0: reg 0x14: [io 0xf130-0xf133]
[ 0.929471] pci 0000:00:11.0: reg 0x18: [io 0xf120-0xf127]
[ 0.929481] pci 0000:00:11.0: reg 0x1c: [io 0xf110-0xf113]
[ 0.929491] pci 0000:00:11.0: reg 0x20: [io 0xf100-0xf10f]
[ 0.929502] pci 0000:00:11.0: reg 0x24: [mem 0xfeb6e000-0xfeb6e3ff]
[ 0.929564] pci 0000:00:11.0: PME# supported from D3hot
[ 0.929799] pci 0000:00:12.0: [1022:7807] type 00 class 0x0c0310
[ 0.929817] pci 0000:00:12.0: reg 0x10: [mem 0xfeb6d000-0xfeb6dfff]
[ 0.930111] pci 0000:00:12.2: [1022:7808] type 00 class 0x0c0320
[ 0.930129] pci 0000:00:12.2: reg 0x10: [mem 0xfeb6c000-0xfeb6c0ff]
[ 0.930214] pci 0000:00:12.2: supports D1 D2
[ 0.930218] pci 0000:00:12.2: PME# supported from D0 D1 D2 D3hot D3cold
[ 0.930442] pci 0000:00:13.0: [1022:7807] type 00 class 0x0c0310
[ 0.930460] pci 0000:00:13.0: reg 0x10: [mem 0xfeb6b000-0xfeb6bfff]
[ 0.930736] pci 0000:00:13.2: [1022:7808] type 00 class 0x0c0320
[ 0.930754] pci 0000:00:13.2: reg 0x10: [mem 0xfeb6a000-0xfeb6a0ff]
[ 0.930839] pci 0000:00:13.2: supports D1 D2
[ 0.930843] pci 0000:00:13.2: PME# supported from D0 D1 D2 D3hot D3cold
[ 0.931067] pci 0000:00:14.0: [1022:780b] type 00 class 0x0c0500
[ 0.931302] pci 0000:00:14.2: [1022:780d] type 00 class 0x040300
[ 0.931324] pci 0000:00:14.2: reg 0x10: [mem 0xfeb60000-0xfeb63fff 64bit]
[ 0.931398] pci 0000:00:14.2: PME# supported from D0 D3hot D3cold
[ 0.931612] pci 0000:00:14.3: [1022:780e] type 00 class 0x060100
[ 0.931895] pci 0000:00:18.0: [1022:1530] type 00 class 0x060000
[ 0.932095] pci 0000:00:18.1: [1022:1531] type 00 class 0x060000
[ 0.932277] pci 0000:00:18.2: [1022:1532] type 00 class 0x060000
[ 0.932460] pci 0000:00:18.3: [1022:1533] type 00 class 0x060000
[ 0.932653] pci 0000:00:18.4: [1022:1534] type 00 class 0x060000
[ 0.932835] pci 0000:00:18.5: [1022:1535] type 00 class 0x060000
[ 0.933123] pci 0000:01:00.0: [1283:8892] type 01 class 0x060401
[ 0.933274] pci 0000:01:00.0: supports D1 D2
[ 0.933278] pci 0000:01:00.0: PME# supported from D0 D1 D2 D3hot D3cold
[ 0.933388] pci 0000:00:02.2: PCI bridge to [bus 01-02]
[ 0.933445] pci_bus 0000:02: extended config space not accessible
[ 0.933572] pci 0000:01:00.0: PCI bridge to [bus 02] (subtractive decode)
[ 0.933730] pci 0000:03:00.0: [10ec:8168] type 00 class 0x020000
[ 0.933755] pci 0000:03:00.0: reg 0x10: [io 0xe000-0xe0ff]
[ 0.933786] pci 0000:03:00.0: reg 0x18: [mem 0xfea00000-0xfea00fff 64bit]
[ 0.933806] pci 0000:03:00.0: reg 0x20: [mem 0xd0800000-0xd0803fff 64bit pref]
[ 0.933931] pci 0000:03:00.0: supports D1 D2
[ 0.933935] pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold
[ 0.934192] pci 0000:00:02.3: PCI bridge to [bus 03]
[ 0.934201] pci 0000:00:02.3: bridge window [io 0xe000-0xefff]
[ 0.934206] pci 0000:00:02.3: bridge window [mem 0xfea00000-0xfeafffff]
[ 0.934214] pci 0000:00:02.3: bridge window [mem 0xd0800000-0xd08fffff 64bit pref]
[ 0.936101] ACPI: PCI Interrupt Link [LNKA] (IRQs 4 5 7 10 11 14 15) *0
[ 0.936308] ACPI: PCI Interrupt Link [LNKB] (IRQs 4 5 7 10 11 14 15) *0
[ 0.936523] ACPI: PCI Interrupt Link [LNKC] (IRQs 4 5 7 10 11 14 15) *0
[ 0.936736] ACPI: PCI Interrupt Link [LNKD] (IRQs 4 5 7 10 11 14 15) *0
[ 0.936919] ACPI: PCI Interrupt Link [LNKE] (IRQs 4 5 7 10 11 14 15) *0
[ 0.937067] ACPI: PCI Interrupt Link [LNKF] (IRQs 4 5 7 10 11 14 15) *0
[ 0.937216] ACPI: PCI Interrupt Link [LNKG] (IRQs 4 5 7 10 11 14 15) *0
[ 0.937363] ACPI: PCI Interrupt Link [LNKH] (IRQs 4 5 7 10 11 14 15) *0
[ 0.937967] iommu: Default domain type: Translated
[ 0.938058] pci 0000:00:01.0: vgaarb: setting as boot VGA device
[ 0.938058] pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
[ 0.938058] pci 0000:00:01.0: vgaarb: bridge control possible
[ 0.938058] vgaarb: loaded
[ 0.938247] EDAC MC: Ver: 3.0.0
[ 0.938433] NetLabel: Initializing
[ 0.938436] NetLabel: domain hash size = 128
[ 0.938438] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
[ 0.938486] NetLabel: unlabeled traffic allowed by default
[ 0.938489] PCI: Using ACPI for IRQ routing
[ 0.947121] PCI: pci_cache_line_size set to 64 bytes
[ 0.947197] e820: reserve RAM buffer [mem 0x0009e800-0x0009ffff]
[ 0.947201] e820: reserve RAM buffer [mem 0x9ca16000-0x9fffffff]
[ 0.947205] e820: reserve RAM buffer [mem 0x9ca89000-0x9fffffff]
[ 0.947209] e820: reserve RAM buffer [mem 0x9e4d2000-0x9fffffff]
[ 0.947213] e820: reserve RAM buffer [mem 0x9e645000-0x9fffffff]
[ 0.947216] e820: reserve RAM buffer [mem 0x9ec60000-0x9fffffff]
[ 0.947220] e820: reserve RAM buffer [mem 0x9f000000-0x9fffffff]
[ 0.947306] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0
[ 0.947316] hpet0: 3 comparators, 32-bit 14.318180 MHz counter
[ 0.950085] clocksource: Switched to clocksource tsc-early
[ 0.983863] VFS: Disk quotas dquot_6.6.0
[ 0.983909] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
[ 0.984272] AppArmor: AppArmor Filesystem Enabled
[ 0.984330] pnp: PnP ACPI init
[ 0.984667] system 00:00: [mem 0xe0000000-0xefffffff] has been reserved
[ 0.984686] system 00:00: Plug and Play ACPI device, IDs PNP0c01 (active)
[ 0.984864] system 00:01: [mem 0xa0000000-0xbfffffff] has been reserved
[ 0.984878] system 00:01: Plug and Play ACPI device, IDs PNP0c02 (active)
[ 0.985448] system 00:02: [io 0x0220-0x0227] has been reserved
[ 0.985454] system 00:02: [io 0x0228-0x022f] has been reserved
[ 0.985459] system 00:02: [io 0x0a20-0x0a2f] has been reserved
[ 0.985471] system 00:02: Plug and Play ACPI device, IDs PNP0c02 (active)
[ 0.986248] pnp 00:03: [dma 0 disabled]
[ 0.986371] pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active)
[ 0.987019] pnp 00:04: [dma 0 disabled]
[ 0.987134] pnp 00:04: Plug and Play ACPI device, IDs PNP0501 (active)
[ 0.987986] pnp 00:05: [dma 0 disabled]
[ 0.988313] pnp 00:05: Plug and Play ACPI device, IDs PNP0400 (active)
[ 0.988425] system 00:06: Plug and Play ACPI device, IDs PNP0c02 (active)
[ 0.988503] pnp 00:07: Plug and Play ACPI device, IDs PNP0b00 (active)
[ 0.988661] system 00:08: [io 0x04d0-0x04d1] has been reserved
[ 0.988675] system 00:08: Plug and Play ACPI device, IDs PNP0c02 (active)
[ 0.989467] system 00:09: [io 0x04d0-0x04d1] has been reserved
[ 0.989472] system 00:09: [io 0x040b] has been reserved
[ 0.989476] system 00:09: [io 0x04d6] has been reserved
[ 0.989481] system 00:09: [io 0x0c00-0x0c01] has been reserved
[ 0.989485] system 00:09: [io 0x0c14] has been reserved
[ 0.989490] system 00:09: [io 0x0c50-0x0c51] has been reserved
[ 0.989494] system 00:09: [io 0x0c52] has been reserved
[ 0.989498] system 00:09: [io 0x0c6c] has been reserved
[ 0.989501] system 00:09: [io 0x0c6f] has been reserved
[ 0.989506] system 00:09: [io 0x0cd0-0x0cd1] has been reserved
[ 0.989510] system 00:09: [io 0x0cd2-0x0cd3] has been reserved
[ 0.989514] system 00:09: [io 0x0cd4-0x0cd5] has been reserved
[ 0.989518] system 00:09: [io 0x0cd6-0x0cd7] has been reserved
[ 0.989522] system 00:09: [io 0x0cd8-0x0cdf] has been reserved
[ 0.989526] system 00:09: [io 0x0800-0x089f] has been reserved
[ 0.989530] system 00:09: [io 0x0b20-0x0b3f] has been reserved
[ 0.989535] system 00:09: [io 0x0900-0x090f] has been reserved
[ 0.989539] system 00:09: [io 0x0910-0x091f] has been reserved
[ 0.989544] system 00:09: [io 0xfe00-0xfefe] has been reserved
[ 0.989550] system 00:09: [mem 0xfec00000-0xfec00fff] could not be reserved
[ 0.989556] system 00:09: [mem 0xfee00000-0xfee00fff] has been reserved
[ 0.989561] system 00:09: [mem 0xfed80000-0xfed8ffff] has been reserved
[ 0.989566] system 00:09: [mem 0xfed61000-0xfed70fff] has been reserved
[ 0.989570] system 00:09: [mem 0xfec10000-0xfec10fff] has been reserved
[ 0.989576] system 00:09: [mem 0xfed00000-0xfed00fff] could not be reserved
[ 0.989581] system 00:09: [mem 0xff000000-0xffffffff] has been reserved
[ 0.989594] system 00:09: Plug and Play ACPI device, IDs PNP0c02 (active)
[ 0.990129] pnp: PnP ACPI: found 10 devices
[ 0.999666] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
[ 0.999850] NET: Registered protocol family 2
[ 1.000248] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
[ 1.000342] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
[ 1.000602] TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
[ 1.000757] TCP: Hash tables configured (established 32768 bind 32768)
[ 1.000863] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
[ 1.000910] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
[ 1.001112] NET: Registered protocol family 1
[ 1.001132] NET: Registered protocol family 44
[ 1.001176] pci 0000:01:00.0: PCI bridge to [bus 02]
[ 1.001202] pci 0000:00:02.2: PCI bridge to [bus 01-02]
[ 1.001215] pci 0000:00:02.3: PCI bridge to [bus 03]
[ 1.001220] pci 0000:00:02.3: bridge window [io 0xe000-0xefff]
[ 1.001227] pci 0000:00:02.3: bridge window [mem 0xfea00000-0xfeafffff]
[ 1.001232] pci 0000:00:02.3: bridge window [mem 0xd0800000-0xd08fffff 64bit pref]
[ 1.001244] pci_bus 0000:00: resource 4 [io 0x0000-0x03af window]
[ 1.001247] pci_bus 0000:00: resource 5 [io 0x03e0-0x0cf7 window]
[ 1.001251] pci_bus 0000:00: resource 6 [io 0x03b0-0x03df window]
[ 1.001254] pci_bus 0000:00: resource 7 [io 0x0d00-0xffff window]
[ 1.001258] pci_bus 0000:00: resource 8 [mem 0x000a0000-0x000bffff window]
[ 1.001261] pci_bus 0000:00: resource 9 [mem 0x000c0000-0x000dffff window]
[ 1.001265] pci_bus 0000:00: resource 10 [mem 0xc0000000-0xffffffff window]
[ 1.001269] pci_bus 0000:03: resource 0 [io 0xe000-0xefff]
[ 1.001272] pci_bus 0000:03: resource 1 [mem 0xfea00000-0xfeafffff]
[ 1.001276] pci_bus 0000:03: resource 2 [mem 0xd0800000-0xd08fffff 64bit pref]
[ 1.001402] pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
[ 1.001479] pci 0000:00:01.1: D0 power state depends on 0000:00:01.0
[ 1.033759] pci 0000:00:12.0: quirk_usb_early_handoff+0x0/0x700 took 30983 usecs
[ 1.053744] pci 0000:00:12.2: quirk_usb_early_handoff+0x0/0x700 took 19500 usecs
[ 1.053748] pci 0000:00:12.2: PME# does not work under D3, disabling it
[ 1.085743] pci 0000:00:13.0: quirk_usb_early_handoff+0x0/0x700 took 31229 usecs
[ 1.105737] pci 0000:00:13.2: quirk_usb_early_handoff+0x0/0x700 took 19508 usecs
[ 1.105740] pci 0000:00:13.2: PME# does not work under D3, disabling it
[ 1.105804] PCI: CLS 64 bytes, default 64
[ 1.105946] Trying to unpack rootfs image as initramfs...
[ 3.637213] Freeing initrd memory: 64668K
[ 3.637317] PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
[ 3.637323] software IO TLB: mapped [mem 0x0000000098a16000-0x000000009ca16000] (64MB)
[ 3.637438] amd_uncore: 4 amd_nb counters detected
[ 3.637447] amd_uncore: 4 amd_l2 counters detected
[ 3.637615] LVT offset 0 assigned for vector 0x400
[ 3.637693] perf: AMD IBS detected (0x000000ff)
[ 3.638864] Initialise system trusted keyrings
[ 3.638891] Key type blacklist registered
[ 3.639037] workingset: timestamp_bits=36 max_order=20 bucket_order=0
[ 3.642963] zbud: loaded
[ 3.643448] integrity: Platform Keyring initialized
[ 3.643454] Key type asymmetric registered
[ 3.643457] Asymmetric key parser 'x509' registered
[ 3.643476] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
[ 3.643575] io scheduler mq-deadline registered
[ 3.644226] pcieport 0000:00:02.2: PME: Signaling with IRQ 25
[ 3.644596] pcieport 0000:00:02.3: PME: Signaling with IRQ 27
[ 3.644830] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
[ 3.646059] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
[ 3.646240] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
[ 3.647255] 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
[ 3.648808] Linux agpgart interface v0.103
[ 3.649281] AMD-Vi: AMD IOMMUv2 driver by Joerg Roedel <jroedel@suse.de>
[ 3.649284] AMD-Vi: AMD IOMMUv2 functionality not available on this system
[ 3.649887] i8042: PNP: No PS/2 controller found.
[ 3.650066] mousedev: PS/2 mouse device common for all mice
[ 3.650141] rtc_cmos 00:07: RTC can wake from S4
[ 3.650473] rtc_cmos 00:07: registered as rtc0
[ 3.650506] rtc_cmos 00:07: setting system clock to 2021-03-11T04:16:03 UTC (1615436163)
[ 3.650556] rtc_cmos 00:07: alarms up to one month, y3k, 114 bytes nvram, hpet irqs
[ 3.650664] ledtrig-cpu: registered to indicate activity on CPUs
[ 3.651580] NET: Registered protocol family 10
[ 3.671887] Segment Routing with IPv6
[ 3.671948] mip6: Mobile IPv6
[ 3.671954] NET: Registered protocol family 17
[ 3.672053] mpls_gso: MPLS GSO support
[ 3.672060] x86/pm: family 0x16 cpu detected, MSR saving is needed during suspending.
[ 3.672531] microcode: microcode updated early to new patch_level=0x0700010f
[ 3.672602] microcode: CPU0: patch_level=0x0700010f
[ 3.672617] microcode: CPU1: patch_level=0x0700010f
[ 3.672630] microcode: CPU2: patch_level=0x0700010f
[ 3.672644] microcode: CPU3: patch_level=0x0700010f
[ 3.672652] microcode: Microcode Update Driver: v2.2.
[ 3.672662] IPI shorthand broadcast: enabled
[ 3.672681] sched_clock: Marking stable (3668875993, 3581214)->(3677852789, -5395582)
[ 3.672887] registered taskstats version 1
[ 3.672894] Loading compiled-in X.509 certificates
[ 3.796612] Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1'
[ 3.796657] Loaded X.509 cert 'Debian Secure Boot Signer 2020: 00b55eb3b9'
[ 3.796732] zswap: loaded using pool lzo/zbud
[ 3.797021] Key type ._fscrypt registered
[ 3.797024] Key type .fscrypt registered
[ 3.797026] Key type fscrypt-provisioning registered
[ 3.797126] AppArmor: AppArmor sha1 policy hashing enabled
[ 3.801644] Freeing unused kernel image (initmem) memory: 2388K
[ 3.822025] Write protecting the kernel read-only data: 22528k
[ 3.823354] Freeing unused kernel image (text/rodata gap) memory: 2040K
[ 3.823766] Freeing unused kernel image (rodata/data gap) memory: 676K
[ 3.904138] x86/mm: Checked W+X mappings: passed, no W+X pages found.
[ 3.904155] Run /init as init process
[ 3.904158] with arguments:
[ 3.904160] /init
[ 3.904162] splash
[ 3.904164] with environment:
[ 3.904166] HOME=/
[ 3.904168] TERM=linux
[ 3.904170] BOOT_IMAGE=/boot/vmlinuz-5.10.0-kali3-amd64
[ 4.269499] button: module verification failed: signature and/or required key missing - tainting kernel
[ 4.270661] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0
[ 4.271051] ACPI: Video Device [VGA] (multi-head: yes rom: no post: no)
[ 4.271669] acpi device:01: registered as cooling_device4
[ 4.271806] input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input1
[ 4.289846] ACPI: Power Button [PWRB]
[ 4.290116] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
[ 4.290275] ACPI: Power Button [PWRF]
[ 4.295992] piix4_smbus 0000:00:14.0: SMBus Host Controller at 0xb00, revision 0
[ 4.296000] piix4_smbus 0000:00:14.0: Using register 0x02 for SMBus port selection
[ 4.296165] piix4_smbus 0000:00:14.0: Auxiliary SMBus Host Controller at 0xb20
[ 4.315797] ACPI: bus type USB registered
[ 4.315871] usbcore: registered new interface driver usbfs
[ 4.315898] usbcore: registered new interface driver hub
[ 4.315939] usbcore: registered new device driver usb
[ 4.318530] cryptd: max_cpu_qlen set to 1000
[ 4.318929] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
[ 4.319465] ehci-pci: EHCI PCI platform driver
[ 4.319859] ehci-pci 0000:00:12.2: EHCI Host Controller
[ 4.319883] ehci-pci 0000:00:12.2: new USB bus registered, assigned bus number 1
[ 4.319900] ehci-pci 0000:00:12.2: applying AMD SB700/SB800/Hudson-2/3 EHCI dummy qh workaround
[ 4.319912] ehci-pci 0000:00:12.2: debug port 1
[ 4.320016] ehci-pci 0000:00:12.2: irq 17, io mem 0xfeb6c000
[ 4.322114] AVX version of gcm_enc/dec engaged.
[ 4.322119] AES CTR mode by8 optimization enabled
[ 4.323197] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
[ 4.330558] SCSI subsystem initialized
[ 4.334077] ehci-pci 0000:00:12.2: USB 2.0 started, EHCI 1.00
[ 4.334295] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10
[ 4.334301] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[ 4.334304] usb usb1: Product: EHCI Host Controller
[ 4.334308] usb usb1: Manufacturer: Linux 5.10.0-kali3-amd64 ehci_hcd
[ 4.334311] usb usb1: SerialNumber: 0000:00:12.2
[ 4.334650] hub 1-0:1.0: USB hub found
[ 4.334678] hub 1-0:1.0: 4 ports detected
[ 4.335415] ehci-pci 0000:00:13.2: EHCI Host Controller
[ 4.335430] ehci-pci 0000:00:13.2: new USB bus registered, assigned bus number 2
[ 4.335441] ehci-pci 0000:00:13.2: applying AMD SB700/SB800/Hudson-2/3 EHCI dummy qh workaround
[ 4.335452] ehci-pci 0000:00:13.2: debug port 1
[ 4.335525] ehci-pci 0000:00:13.2: irq 17, io mem 0xfeb6a000
[ 4.341581] libata version 3.00 loaded.
[ 4.345467] ahci 0000:00:11.0: version 3.0
[ 4.346112] ahci 0000:00:11.0: AHCI 0001.0300 32 slots 2 ports 6 Gbps 0x3 impl SATA mode
[ 4.346125] ahci 0000:00:11.0: flags: 64bit ncq sntf ilck pm led clo pmp pio slum part
[ 4.347207] scsi host0: ahci
[ 4.350832] ehci-pci 0000:00:13.2: USB 2.0 started, EHCI 1.00
[ 4.351170] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10
[ 4.351176] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[ 4.351180] usb usb2: Product: EHCI Host Controller
[ 4.351183] usb usb2: Manufacturer: Linux 5.10.0-kali3-amd64 ehci_hcd
[ 4.351186] usb usb2: SerialNumber: 0000:00:13.2
[ 4.351561] hub 2-0:1.0: USB hub found
[ 4.351588] hub 2-0:1.0: 4 ports detected
[ 4.352010] xhci_hcd 0000:00:10.0: xHCI Host Controller
[ 4.352033] xhci_hcd 0000:00:10.0: new USB bus registered, assigned bus number 3
[ 4.352243] xhci_hcd 0000:00:10.0: hcc params 0x014040c3 hci version 0x100 quirks 0x0000000000000410
[ 4.352805] ohci-pci: OHCI PCI platform driver
[ 4.353027] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10
[ 4.353032] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[ 4.353036] usb usb3: Product: xHCI Host Controller
[ 4.353039] usb usb3: Manufacturer: Linux 5.10.0-kali3-amd64 xhci-hcd
[ 4.353042] usb usb3: SerialNumber: 0000:00:10.0
[ 4.353078] ohci-pci 0000:00:12.0: OHCI PCI host controller
[ 4.353493] hub 3-0:1.0: USB hub found
[ 4.353524] hub 3-0:1.0: 2 ports detected
[ 4.353848] ohci-pci 0000:00:12.0: new USB bus registered, assigned bus number 4
[ 4.353924] ohci-pci 0000:00:12.0: irq 18, io mem 0xfeb6d000
[ 4.353928] xhci_hcd 0000:00:10.0: xHCI Host Controller
[ 4.353938] xhci_hcd 0000:00:10.0: new USB bus registered, assigned bus number 5
[ 4.353946] xhci_hcd 0000:00:10.0: Host supports USB 3.0 SuperSpeed
[ 4.355671] usb usb5: We don't know the algorithms for LPM for this host, disabling LPM.
[ 4.355788] usb usb5: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.10
[ 4.355792] usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[ 4.355795] usb usb5: Product: xHCI Host Controller
[ 4.355798] usb usb5: Manufacturer: Linux 5.10.0-kali3-amd64 xhci-hcd
[ 4.355801] usb usb5: SerialNumber: 0000:00:10.0
[ 4.356294] hub 5-0:1.0: USB hub found
[ 4.356330] hub 5-0:1.0: 2 ports detected
[ 4.356944] scsi host1: ahci
[ 4.357133] ata1: SATA max UDMA/133 abar m1024@0xfeb6e000 port 0xfeb6e100 irq 30
[ 4.357139] ata2: SATA max UDMA/133 abar m1024@0xfeb6e000 port 0xfeb6e180 irq 30
[ 4.360981] libphy: r8169: probed
[ 4.361437] r8169 0000:03:00.0 eth0: RTL8168g/8111g, e0:d5:5e:26:0a:02, XID 4c0, IRQ 29
[ 4.361442] r8169 0000:03:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko]
[ 4.384388] [drm] radeon kernel modesetting enabled.
[ 4.384497] radeon 0000:00:01.0: vgaarb: deactivate vga console
[ 4.385517] Console: switching to colour dummy device 80x25
[ 4.386237] [drm] initializing kernel modesetting (KABINI 0x1002:0x9836 0x1458:0xD000 0x00).
[ 4.386278] [drm] doorbell mmio base: 0xD0000000
[ 4.386280] [drm] doorbell mmio size: 8388608
[ 4.386372] ATOM BIOS: AMD
[ 4.386454] radeon 0000:00:01.0: VRAM: 512M 0x0000000000000000 - 0x000000001FFFFFFF (512M used)
[ 4.386459] radeon 0000:00:01.0: GTT: 2048M 0x0000000020000000 - 0x000000009FFFFFFF
[ 4.386467] [drm] Detected VRAM RAM=512M, BAR=256M
[ 4.386469] [drm] RAM width 128bits DDR
[ 4.386605] [TTM] Zone kernel: Available graphics memory: 1729122 KiB
[ 4.386608] [TTM] Initializing pool allocator
[ 4.386621] [TTM] Initializing DMA pool allocator
[ 4.386666] [drm] radeon: 512M of VRAM memory ready
[ 4.386669] [drm] radeon: 2048M of GTT memory ready.
[ 4.386690] [drm] Loading kabini Microcode
[ 4.386777] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_pfp.bin
[ 4.386836] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_me.bin
[ 4.386893] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_ce.bin
[ 4.386968] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_mec.bin
[ 4.387023] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_rlc.bin
[ 4.387076] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_sdma.bin
[ 4.387084] [drm] Internal thermal controller without fan control
[ 4.388477] [drm] radeon: dpm initialized
[ 4.388724] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/bonaire_uvd.bin
[ 4.388734] [drm] Found UVD firmware Version: 1.64 Family ID: 9
[ 4.388908] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/BONAIRE_vce.bin
[ 4.391966] [drm] Found VCE firmware/feedback version 40.2.2 / 15!
[ 4.392006] [drm] GART: num cpu pages 524288, num gpu pages 524288
[ 4.418177] usb usb4: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.10
[ 4.418186] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[ 4.418189] usb usb4: Product: OHCI PCI host controller
[ 4.418193] usb usb4: Manufacturer: Linux 5.10.0-kali3-amd64 ohci_hcd
[ 4.418196] usb usb4: SerialNumber: 0000:00:12.0
[ 4.418558] hub 4-0:1.0: USB hub found
[ 4.418584] hub 4-0:1.0: 4 ports detected
[ 4.419321] ohci-pci 0000:00:13.0: OHCI PCI host controller
[ 4.419343] ohci-pci 0000:00:13.0: new USB bus registered, assigned bus number 6
[ 4.419398] ohci-pci 0000:00:13.0: irq 18, io mem 0xfeb6b000
[ 4.438555] [drm] PCIE GART of 2048M enabled (table at 0x000000000030E000).
[ 4.438764] radeon 0000:00:01.0: WB enabled
[ 4.438802] radeon 0000:00:01.0: fence driver on ring 0 use gpu addr 0x0000000020000c00
[ 4.438807] radeon 0000:00:01.0: fence driver on ring 1 use gpu addr 0x0000000020000c04
[ 4.438811] radeon 0000:00:01.0: fence driver on ring 2 use gpu addr 0x0000000020000c08
[ 4.438814] radeon 0000:00:01.0: fence driver on ring 3 use gpu addr 0x0000000020000c0c
[ 4.438818] radeon 0000:00:01.0: fence driver on ring 4 use gpu addr 0x0000000020000c10
[ 4.439705] radeon 0000:00:01.0: fence driver on ring 5 use gpu addr 0x0000000000078d30
[ 4.440048] radeon 0000:00:01.0: fence driver on ring 6 use gpu addr 0x0000000020000c18
[ 4.440052] radeon 0000:00:01.0: fence driver on ring 7 use gpu addr 0x0000000020000c1c
[ 4.440368] radeon 0000:00:01.0: radeon: using MSI.
[ 4.440416] [drm] radeon: irq initialized.
[ 4.445536] [drm] ring test on 0 succeeded in 2 usecs
[ 4.445634] [drm] ring test on 1 succeeded in 3 usecs
[ 4.445661] [drm] ring test on 2 succeeded in 3 usecs
[ 4.445910] [drm] ring test on 3 succeeded in 4 usecs
[ 4.445920] [drm] ring test on 4 succeeded in 4 usecs
[ 4.482146] usb usb6: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.10
[ 4.482151] usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1
[ 4.482154] usb usb6: Product: OHCI PCI host controller
[ 4.482158] usb usb6: Manufacturer: Linux 5.10.0-kali3-amd64 ohci_hcd
[ 4.482161] usb usb6: SerialNumber: 0000:00:13.0
[ 4.482491] hub 6-0:1.0: USB hub found
[ 4.482524] hub 6-0:1.0: 4 ports detected
[ 4.491875] [drm] ring test on 5 succeeded in 1 usecs
[ 4.511757] [drm] UVD initialized successfully.
[ 4.621026] [drm] ring test on 6 succeeded in 16 usecs
[ 4.621040] [drm] ring test on 7 succeeded in 3 usecs
[ 4.621041] [drm] VCE initialized successfully.
[ 4.622757] [drm] ib test on ring 0 succeeded in 0 usecs
[ 4.622921] [drm] ib test on ring 1 succeeded in 0 usecs
[ 4.623081] [drm] ib test on ring 2 succeeded in 0 usecs
[ 4.623244] [drm] ib test on ring 3 succeeded in 0 usecs
[ 4.623404] [drm] ib test on ring 4 succeeded in 0 usecs
[ 4.650059] tsc: Refined TSC clocksource calibration: 1297.566 MHz
[ 4.650069] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x12b422bd00e, max_idle_ns: 440795235945 ns
[ 4.650104] clocksource: Switched to clocksource tsc
[ 4.746033] usb 2-1: new high-speed USB device number 2 using ehci-pci
[ 4.834044] ata1: SATA link up 3.0 Gbps (SStatus 123 SControl 300)
[ 4.838046] ata2: SATA link up 3.0 Gbps (SStatus 123 SControl 300)
[ 4.838399] ata2.00: ATA-8: TOSHIBA MK3276GSX, GS001C, max UDMA/100
[ 4.838404] ata2.00: 625142448 sectors, multi 16: LBA48 NCQ (depth 32), AA
[ 4.838804] ata2.00: configured for UDMA/100
[ 4.840392] ata1.00: HPA detected: current 1953523055, native 1953525168
[ 4.840470] ata1.00: ATA-7: SAMSUNG HD103UJ, 1AA01113, max UDMA7
[ 4.840475] ata1.00: 1953523055 sectors, multi 16: LBA48 NCQ (depth 32), AA
[ 4.846942] ata1.00: configured for UDMA/133
[ 4.847222] scsi 0:0:0:0: Direct-Access ATA SAMSUNG HD103UJ 1113 PQ: 0 ANSI: 5
[ 4.847929] scsi 1:0:0:0: Direct-Access ATA TOSHIBA MK3276GS 1C PQ: 0 ANSI: 5
[ 4.855748] sd 1:0:0:0: [sdb] 625142448 512-byte logical blocks: (320 GB/298 GiB)
[ 4.855751] sd 0:0:0:0: [sda] 1953523055 512-byte logical blocks: (1.00 TB/932 GiB)
[ 4.855789] sd 0:0:0:0: [sda] Write Protect is off
[ 4.855794] sd 1:0:0:0: [sdb] Write Protect is off
[ 4.855796] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
[ 4.855801] sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00
[ 4.855857] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[ 4.855863] sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[ 4.877960] sd 0:0:0:0: [sda] Attached SCSI disk
[ 4.916719] usb 2-1: New USB device found, idVendor=148f, idProduct=7601, bcdDevice= 0.00
[ 4.916724] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 4.916728] usb 2-1: Product: 802.11 n WLAN
[ 4.916731] usb 2-1: Manufacturer: MediaTek
[ 4.916734] usb 2-1: SerialNumber: 1.0
[ 4.972466] sdb: sdb1 sdb2 < sdb5 >
[ 4.973481] sd 1:0:0:0: [sdb] Attached SCSI disk
[ 5.010053] usb 4-3: new low-speed USB device number 2 using ohci-pci
[ 5.162130] [drm] ib test on ring 5 succeeded
[ 5.184383] [drm] ib test on ring 6 succeeded
[ 5.185852] [drm] ib test on ring 7 succeeded
[ 5.186809] [drm] Radeon Display Connectors
[ 5.186812] [drm] Connector 0:
[ 5.186814] [drm] HDMI-A-1
[ 5.186816] [drm] HPD1
[ 5.186820] [drm] DDC: 0x6530 0x6530 0x6534 0x6534 0x6538 0x6538 0x653c 0x653c
[ 5.186822] [drm] Encoders:
[ 5.186824] [drm] DFP1: INTERNAL_UNIPHY
[ 5.186826] [drm] Connector 1:
[ 5.186827] [drm] DVI-D-1
[ 5.186829] [drm] HPD2
[ 5.186832] [drm] DDC: 0x6540 0x6540 0x6544 0x6544 0x6548 0x6548 0x654c 0x654c
[ 5.186833] [drm] Encoders:
[ 5.186835] [drm] DFP2: INTERNAL_UNIPHY
[ 5.186837] [drm] Connector 2:
[ 5.186838] [drm] VGA-1
[ 5.186842] [drm] DDC: 0x65c0 0x65c0 0x65c4 0x65c4 0x65c8 0x65c8 0x65cc 0x65cc
[ 5.186843] [drm] Encoders:
[ 5.186845] [drm] CRT1: INTERNAL_KLDSCP_DAC1
[ 5.224067] usb 4-3: New USB device found, idVendor=1a2c, idProduct=4094, bcdDevice= 1.10
[ 5.224076] usb 4-3: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 5.224080] usb 4-3: Product: USB Keyboard
[ 5.224083] usb 4-3: Manufacturer: SEMICO
[ 5.231562] hid: raw HID events driver (C) Jiri Kosina
[ 5.243400] usbcore: registered new interface driver usbhid
[ 5.243404] usbhid: USB HID core driver
[ 5.246826] input: SEMICO USB Keyboard as /devices/pci0000:00/0000:00:12.0/usb4/4-3/4-3:1.0/0003:1A2C:4094.0001/input/input3
[ 5.306371] hid-generic 0003:1A2C:4094.0001: input,hidraw0: USB HID v1.10 Keyboard [SEMICO USB Keyboard] on usb-0000:00:12.0-3/input0
[ 5.306966] input: SEMICO USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:12.0/usb4/4-3/4-3:1.1/0003:1A2C:4094.0002/input/input4
[ 5.353260] [drm] fb mappable at 0xC0731000
[ 5.353265] [drm] vram apper at 0xC0000000
[ 5.353267] [drm] size 5767168
[ 5.353269] [drm] fb depth is 24
[ 5.353271] [drm] pitch is 5632
[ 5.353447] fbcon: radeondrmfb (fb0) is primary device
[ 5.366154] input: SEMICO USB Keyboard System Control as /devices/pci0000:00/0000:00:12.0/usb4/4-3/4-3:1.1/0003:1A2C:4094.0002/input/input5
[ 5.366268] hid-generic 0003:1A2C:4094.0002: input,hidraw1: USB HID v1.10 Device [SEMICO USB Keyboard] on usb-0000:00:12.0-3/input1
[ 5.462114] Console: switching to colour frame buffer device 160x48
[ 5.469523] radeon 0000:00:01.0: [drm] fb0: radeondrmfb frame buffer device
[ 5.490630] [drm] Initialized radeon 2.50.0 20080528 for 0000:00:01.0 on minor 0
[ 5.656424] [drm] amdgpu kernel modesetting enabled.
[ 5.656634] amdgpu: Ignoring ACPI CRAT on non-APU system
[ 5.656642] Virtual CRAT table created for CPU
[ 5.656675] amdgpu: Topology: Add CPU node
[ 5.682064] usb 4-4: new low-speed USB device number 3 using ohci-pci
[ 5.876071] usb 4-4: New USB device found, idVendor=04f3, idProduct=0235, bcdDevice=24.58
[ 5.876080] usb 4-4: New USB device strings: Mfr=0, Product=2, SerialNumber=0
[ 5.876084] usb 4-4: Product: OM
[ 5.883799] input: OM as /devices/pci0000:00/0000:00:12.0/usb4/4-4/4-4:1.0/0003:04F3:0235.0003/input/input6
[ 5.883993] hid-generic 0003:04F3:0235.0003: input,hidraw2: USB HID v1.11 Mouse [OM] on usb-0000:00:12.0-4/input0
[ 6.067045] random: fast init done
[ 6.070874] PM: Image not found (code -22)
[ 10.466968] random: crng init done
[ 19.388949] EXT4-fs (sdb1): mounted filesystem with ordered data mode. Opts: (null)
[ 19.865541] Not activating Mandatory Access Control as /sbin/tomoyo-init does not exist.
[ 21.657980] systemd[1]: Inserted module 'autofs4'
[ 21.965219] systemd[1]: systemd 247.3-1 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +ZSTD +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=unified)
[ 21.982138] systemd[1]: Detected architecture x86-64.
[ 22.000918] systemd[1]: Set hostname to <dima-E3800N>.
[ 22.310556] systemd-sysv-generator[286]: SysV service '/etc/init.d/gdomap' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.387572] systemd-sysv-generator[286]: SysV service '/etc/init.d/inetsim' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.387709] systemd-sysv-generator[286]: SysV service '/etc/init.d/inetutils-inetd' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.688816] systemd-sysv-generator[286]: SysV service '/etc/init.d/xl2tpd' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.689155] systemd-sysv-generator[286]: SysV service '/etc/init.d/ptunnel' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.730648] systemd-sysv-generator[286]: SysV service '/etc/init.d/thin' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.745664] systemd-sysv-generator[286]: SysV service '/etc/init.d/atftpd' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.777737] systemd-sysv-generator[286]: SysV service '/etc/init.d/rwhod' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.780642] systemd-sysv-generator[286]: SysV service '/etc/init.d/darkstat' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.780763] systemd-sysv-generator[286]: SysV service '/etc/init.d/stunnel4' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.782159] systemd-sysv-generator[286]: SysV service '/etc/init.d/dns2tcp' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 22.783096] systemd-sysv-generator[286]: SysV service '/etc/init.d/mysql' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust.
[ 24.112606] systemd[1]: /lib/systemd/system/plymouth-start.service:16: Unit configured to use KillMode=none. This is unsafe, as it disables systemd's process lifecycle management for the service. Please update your service to use a safer KillMode=, such as 'mixed' or 'control-group'. Support for KillMode=none is deprecated and will eventually be removed.
[ 24.609330] systemd[1]: Queued start job for default target Graphical Interface.
[ 24.612409] systemd[1]: Created slice system-getty.slice.
[ 24.613362] systemd[1]: Created slice system-modprobe.slice.
[ 24.614135] systemd[1]: Created slice User and Session Slice.
[ 24.614433] systemd[1]: Started Forward Password Requests to Wall Directory Watch.
[ 24.614924] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point.
[ 24.615121] systemd[1]: Reached target Slices.
[ 24.615197] systemd[1]: Reached target TLS tunnels for network services - per-config-file target.
[ 24.651432] systemd[1]: Listening on Syslog Socket.
[ 24.651716] systemd[1]: Listening on fsck to fsckd communication Socket.
[ 24.651876] systemd[1]: Listening on initctl Compatibility Named Pipe.
[ 24.652302] systemd[1]: Listening on Journal Audit Socket.
[ 24.652577] systemd[1]: Listening on Journal Socket (/dev/log).
[ 24.652923] systemd[1]: Listening on Journal Socket.
[ 24.653305] systemd[1]: Listening on udev Control Socket.
[ 24.653598] systemd[1]: Listening on udev Kernel Socket.
[ 24.655792] systemd[1]: Mounting Huge Pages File System...
[ 24.658135] systemd[1]: Mounting POSIX Message Queue File System...
[ 24.660444] systemd[1]: Mounting RPC Pipe File System...
[ 24.662929] systemd[1]: Mounting Kernel Debug File System...
[ 24.665413] systemd[1]: Mounting Kernel Trace File System...
[ 24.665669] systemd[1]: Condition check resulted in Kernel Module supporting RPCSEC_GSS being skipped.
[ 24.678644] systemd[1]: Starting Set the console keyboard layout...
[ 24.681102] systemd[1]: Starting Create list of static device nodes for the current kernel...
[ 24.683600] systemd[1]: Starting Load Kernel Module configfs...
[ 24.686374] systemd[1]: Starting Load Kernel Module drm...
[ 24.689006] systemd[1]: Starting Load Kernel Module fuse...
[ 24.783563] fuse: init (API version 7.32)
[ 24.817178] systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped.
[ 24.817320] systemd[1]: Condition check resulted in File System Check on Root Device being skipped.
[ 24.821605] systemd[1]: Starting Journal Service...
[ 24.825468] systemd[1]: Starting Load Kernel Modules...
[ 24.828095] systemd[1]: Starting Remount Root and Kernel File Systems...
[ 24.830595] systemd[1]: Starting Coldplug All udev Devices...
[ 24.836426] systemd[1]: Mounted Huge Pages File System.
[ 24.836819] systemd[1]: Mounted POSIX Message Queue File System.
[ 24.837121] systemd[1]: Mounted Kernel Debug File System.
[ 24.837436] systemd[1]: Mounted Kernel Trace File System.
[ 24.838356] systemd[1]: Finished Create list of static device nodes for the current kernel.
[ 24.839248] systemd[1]: modprobe@configfs.service: Succeeded.
[ 24.839827] systemd[1]: Finished Load Kernel Module configfs.
[ 24.840567] systemd[1]: modprobe@drm.service: Succeeded.
[ 24.841103] systemd[1]: Finished Load Kernel Module drm.
[ 24.841820] systemd[1]: modprobe@fuse.service: Succeeded.
[ 24.842422] systemd[1]: Finished Load Kernel Module fuse.
[ 24.845155] systemd[1]: Mounting FUSE Control File System...
[ 24.847688] systemd[1]: Mounting Kernel Configuration File System...
[ 24.852424] systemd[1]: Mounted FUSE Control File System.
[ 24.857843] systemd[1]: Mounted Kernel Configuration File System.
[ 24.909648] systemd[1]: Finished Load Kernel Modules.
[ 24.912067] systemd[1]: Starting Apply Kernel Variables...
[ 24.938725] EXT4-fs (sdb1): re-mounted. Opts: errors=remount-ro
[ 24.942860] systemd[1]: Finished Remount Root and Kernel File Systems.
[ 25.095556] systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped.
[ 25.095763] systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped.
[ 25.098106] systemd[1]: Starting Load/Save Random Seed...
[ 25.100520] systemd[1]: Starting Create System Users...
[ 25.124237] RPC: Registered named UNIX socket transport module.
[ 25.124242] RPC: Registered udp transport module.
[ 25.124244] RPC: Registered tcp transport module.
[ 25.124246] RPC: Registered tcp NFSv4.1 backchannel transport module.
[ 25.127479] systemd[1]: Mounted RPC Pipe File System.
[ 25.231682] systemd[1]: Started Journal Service.
[ 25.380418] systemd-journald[304]: Received client request to flush runtime journal.
[ 25.980906] systemd-journald[304]: File /var/log/journal/bd90d72a57d74bd0833845c457b672b1/system.journal corrupted or uncleanly shut down, renaming and replacing.
[ 28.862196] acpi_cpufreq: overriding BIOS provided _PSD data
[ 29.070917] sp5100_tco: SP5100/SB800 TCO WatchDog Timer Driver
[ 29.071133] sp5100-tco sp5100-tco: Using 0xfed80b00 for watchdog MMIO address
[ 29.071361] sp5100-tco sp5100-tco: initialized. heartbeat=60 sec (nowayout=0)
[ 29.309033] sd 0:0:0:0: Attached scsi generic sg0 type 0
[ 29.309152] sd 1:0:0:0: Attached scsi generic sg1 type 0
[ 29.350803] input: PC Speaker as /devices/platform/pcspkr/input/input7
[ 29.391481] parport_pc 00:05: reported by Plug and Play ACPI
[ 29.391584] parport0: PC-style at 0x378, irq 5 [PCSPP,TRISTATE]
[ 29.867402] ppdev: user-space parallel port driver
[ 30.022465] kvm: Nested Virtualization enabled
[ 30.022477] SVM: kvm: Nested Paging enabled
[ 30.252153] MCE: In-kernel MCE decoding enabled.
[ 30.330283] EDAC amd64: F16h detected (node 0).
[ 30.330359] EDAC amd64: Node 0: DRAM ECC disabled.
[ 30.376009] EDAC amd64: F16h detected (node 0).
[ 30.376082] EDAC amd64: Node 0: DRAM ECC disabled.
[ 30.415499] EDAC amd64: F16h detected (node 0).
[ 30.415571] EDAC amd64: Node 0: DRAM ECC disabled.
[ 30.451462] EDAC amd64: F16h detected (node 0).
[ 30.451536] EDAC amd64: Node 0: DRAM ECC disabled.
[ 30.536862] cfg80211: Loading compiled-in X.509 certificates for regulatory database
[ 30.538187] cfg80211: Loaded X.509 cert 'benh@debian.org: 577e021cb980e0e820821ba7b54b4961b8b4fadf'
[ 30.539409] cfg80211: Loaded X.509 cert 'romain.perier@gmail.com: 3abbc6ec146e09d1b6016ab9d6cf71dd233f0328'
[ 30.540596] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[ 30.930127] platform regulatory.0: firmware: direct-loading firmware regulatory.db
[ 31.230282] platform regulatory.0: firmware: direct-loading firmware regulatory.db.p7s
[ 31.257104] snd_hda_intel 0000:00:01.1: Force to non-snoop mode
[ 31.284419] input: HDA ATI HDMI HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.1/sound/card0/input8
[ 31.284925] snd_hda_intel 0000:00:01.1: device 1458:a002 is on the power_save denylist, forcing power_save to 0
[ 31.398061] usb 2-1: reset high-speed USB device number 2 using ehci-pci
[ 31.484105] snd_hda_codec_realtek hdaudioC1D0: autoconfig for ALC887-VD: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line
[ 31.484119] snd_hda_codec_realtek hdaudioC1D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0)
[ 31.484126] snd_hda_codec_realtek hdaudioC1D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0)
[ 31.484131] snd_hda_codec_realtek hdaudioC1D0: mono: mono_out=0x0
[ 31.484137] snd_hda_codec_realtek hdaudioC1D0: dig-out=0x11/0x0
[ 31.484141] snd_hda_codec_realtek hdaudioC1D0: inputs:
[ 31.484148] snd_hda_codec_realtek hdaudioC1D0: Rear Mic=0x18
[ 31.484154] snd_hda_codec_realtek hdaudioC1D0: Front Mic=0x19
[ 31.484160] snd_hda_codec_realtek hdaudioC1D0: Line=0x1a
[ 31.484165] snd_hda_codec_realtek hdaudioC1D0: CD=0x1c
[ 31.516774] input: HDA Digital PCBeep as /devices/pci0000:00/0000:00:14.2/sound/card1/input9
[ 31.517045] input: HD-Audio Generic Rear Mic as /devices/pci0000:00/0000:00:14.2/sound/card1/input10
[ 31.517286] input: HD-Audio Generic Front Mic as /devices/pci0000:00/0000:00:14.2/sound/card1/input11
[ 31.517531] input: HD-Audio Generic Line as /devices/pci0000:00/0000:00:14.2/sound/card1/input12
[ 31.517765] input: HD-Audio Generic Line Out as /devices/pci0000:00/0000:00:14.2/sound/card1/input13
[ 31.518174] snd_hda_intel 0000:00:14.2: device 1458:a002 is on the power_save denylist, forcing power_save to 0
[ 31.568939] mt7601u 2-1:1.0: ASIC revision: 76010001 MAC revision: 76010500
[ 31.620682] mt7601u 2-1:1.0: EEPROM ver:0c fae:00
[ 31.861213] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[ 31.862589] usbcore: registered new interface driver mt7601u
[ 32.146059] Adding 999420k swap on /dev/sdb5. Priority:-2 extents:1 across:999420k FS
[ 41.398081] r8169 0000:03:00.0: firmware: direct-loading firmware rtl_nic/rtl8168g-2.fw
[ 41.426075] Generic FE-GE Realtek PHY r8169-300:00: attached PHY driver [Generic FE-GE Realtek PHY] (mii_bus:phy_addr=r8169-300:00, irq=IGNORE)
[ 41.626178] r8169 0000:03:00.0 eth0: Link is Down
[ 44.458005] r8169 0000:03:00.0 eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 44.458060] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 1221.277297] r8169 0000:03:00.0 eth0: Link is Down
[ 1224.319318] r8169 0000:03:00.0 eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 1227.847318] r8169 0000:03:00.0 eth0: Link is Down
[ 1230.831694] r8169 0000:03:00.0 eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 5796.546115] perf: interrupt took too long (2516 > 2500), lowering kernel.perf_event_max_sample_rate to 79250
[ 9416.456952] perf: interrupt took too long (3146 > 3145), lowering kernel.perf_event_max_sample_rate to 63500
[50120.021361] device-mapper: uevent: version 1.0.3
[50120.021766] device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com
[134712.284793] perf: interrupt took too long (3954 > 3932), lowering kernel.perf_event_max_sample_rate to 50500
[301728.062617] radeon 0000:00:01.0: IH ring buffer overflow (0x00000010, 0x00000000, 0x00000020)
[426622.206565] usb 6-2: new full-speed USB device number 2 using ohci-pci
[426622.410179] usb 6-2: New USB device found, idVendor=0a5c, idProduct=2101, bcdDevice= 1.12
[426622.410190] usb 6-2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[426622.410196] usb 6-2: Product: BCM2045A
[426622.410201] usb 6-2: Manufacturer: Broadcom Corp
[426622.410207] usb 6-2: SerialNumber: 00027212AB4F
[426624.855033] alg: No test for fips(ansi_cprng) (fips_ansi_cprng)
[426625.322603] Bluetooth: Core ver 2.22
[426625.322734] NET: Registered protocol family 31
[426625.322739] Bluetooth: HCI device and connection manager initialized
[426625.322754] Bluetooth: HCI socket layer initialized
[426625.322764] Bluetooth: L2CAP socket layer initialized
[426625.322784] Bluetooth: SCO socket layer initialized
[426625.390264] usbcore: registered new interface driver btusb
(0014354)
john285   
2021-03-16 06:43   
hcitool dev
Devices:
(0014355)
john285   
2021-03-16 07:17   
/etc/init.d/bluetooth start
Starting bluetooth (via systemctl): bluetooth.service.
                                                                        
┌──(root�dima-E3800N)-[/home/dima]
└─# hcitool dev
Devices:
        hci0 00:02:72:12:AB:4F
(0014356)
john285   
2021-03-16 07:19   
/etc/init.d/bluetooth status -l
● bluetooth.service - Bluetooth service
     Loaded: loaded (/lib/systemd/system/bluetooth.service; disabled; vendor preset: disabled)
     Active: active (running) since Tue 2021-03-16 13:16:43 +06; 2min 22s ago
       Docs: man:bluetoothd(8)
   Main PID: 366724 (bluetoothd)
     Status: "Running"
      Tasks: 1 (limit: 3970)
     Memory: 3.5M
        CPU: 94ms
     CGroup: /system.slice/bluetooth.service
             └─366724 /usr/libexec/bluetooth/bluetoothd

мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEMaxConnectionInterval” in group “Controller”
мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEConnectionLatency” in group “Controller”
мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEConnectionSupervisionTimeout” in gr…“Controller”
мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEAutoconnecttimeout” in group “Controller”
мар 16 13:16:43 dima-E3800N bluetoothd[366724]: Starting SDP server
мар 16 13:16:44 dima-E3800N bluetoothd[366724]: Bluetooth management interface 1.18 initialized
мар 16 13:16:44 dima-E3800N bluetoothd[366724]: profiles/sap/server.c:sap_server_register() Sap driver initialization failed.
мар 16 13:16:44 dima-E3800N bluetoothd[366724]: sap-server: Operation not permitted (1)
мар 16 13:16:45 dima-E3800N bluetoothd[366724]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/sbc
мар 16 13:16:45 dima-E3800N bluetoothd[366724]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/sbc

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7099 [Kali Linux] Feature Requests tweak always 2021-03-15 10:40 2021-03-15 10:40
Reporter: awesome.juanr155 Platform:  
Assigned To: OS:  
Priority: none OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SESSION HIJACKING.
Description: VULNERABILITY NAME: SESSION HIJACKING.

VULNERABILITY URL: https://bugs.kali.org/

DESCRIPTION:
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.


Steps To Reproduce:
STEPS TO REPRODUCED:
1) Log in to your account
2) Copy your cookies
3) Logout
4) Clear browser cookies
5) Paste the cookies (copied in step 2)
6) Refresh the page
7) Now you will be logged into the account
Additional Information: The Patch:
Cookies should expire after the logout and previous cookies should not be used for logging into the account, they should expire!

IMPACT:

The malicious attacker can enter the server and access its information without having to hack a registered account. In addition, he can also make modifications on the server to help him hack it in the future or to simplify a data-stealing operation.
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7089 [Kali Linux] Feature Requests minor have not tried 2021-03-12 16:35 2021-03-13 11:10
Reporter: lome Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: cd
Description: Failed to execute terminal emulator
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014341)
kali-bugreport   
2021-03-13 11:10   
Do you think that this issue contains enough information? (Hint: It doesn't :-))

See e.g. https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/ what info is required / should be provided for the Kali team.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7081 [Kali Linux] General Bug major always 2021-03-07 16:45 2021-03-13 09:03
Reporter: untruesyrup Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: cannot do new install with manual partitions
Description: trying a new install of 2021.1 and cant.
install simply says "xfs filesystem creation failed" for every logical volume. tried multiple times with no success.

verified i can write to the directory on host, and that i did not overallocate space with no change
Steps To Reproduce: - attempt to install
- manually partition
- observer error
Additional Information:
Attached Files:
Notes
(0014317)
wiringmarigold   
2021-03-12 20:06   
same issue here

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7092 [Kali Linux] New Tool Requests minor N/A 2021-03-12 18:13 2021-03-12 18:13
Reporter: etc5had0w Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: dbrute : dbrute is a powerful tool made with python3. It is mainly used for Sub-Directory Brute Forcing.
Description: Name : dbrute

Version: 1.0

Homepage: https://github.com/etc5had0w/dbrute

Download: https://github.com/etc5had0w/dbrute.git

Author: Himanshu Shukla

Packaged: No

Licence: MIT Licence

Description: dbrute supports custom extensions search, custom headers, time delays, Splitting wordlist into parts & Parallel Processing. The Unique Feature of dbrute is it can split any given wordlist into a specific number of parts and then use all those parts to launch parallel processes for each part. This will increase the efficiency of the attack by a high amount.

Dependencies: python 3.7

Similar Tools: dirb, Gobuster, dirbuster, dirsearch

Activity: Project Started on 12 March 2021 and is now completed.

How to install: paste all these commands one by one to install the tool -
git clone https://github.com/etc5had0w/dbrute.git
cd dbrute/
ln -s ${PWD}/dbrute.py /usr/bin/dbrute


How to use: Here is the full usage guide for dbrute :

run these commands from your terminal to view the help page:

$dbrute -h

usage: dbrute [-h] -u URL -w WORDLIST [-x EXTENSIONS] [-s SPLIT] [-t TIMEDELAY] [-he [HEADERS ...]]

optional arguments:
  -h, --help show this help message and exit
  -x EXTENSIONS, --extensions EXTENSIONS
                        File Extensions to search for.
  -s SPLIT, --split SPLIT
                        Split wordlist into parts & run parallel tasks for faster speed.
  -t TIMEDELAY, --timedelay TIMEDELAY
                        Timedelay between each request.
  -he [HEADERS ...], --headers [HEADERS ...]
                        Add Custom Headers to each request.

Mandatory arguments:
  -u URL, --URL URL Target URL
  -w WORDLIST, --wordlist WORDLIST
                        Wordlist to be used

Example Usage

Basic Usage With Wordlist and URL :
dbrute -u 192.168.1.2 -w /path/to/wordlist.txt

Using Extensions :
dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -x php,txt,html,asp

Using Split/ Parallel Processing Function :
(the number of -s is the total number of parallel processes and split parts of the wordlist.)
dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -s 6

Using Custom Headers :
dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -he User-agent=Mozilla cookie=3495tu39thj3459thj9th

Using Time Delay (in seconds) :
dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -t 1
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5612 [Kali Linux] Queued Tool Addition minor have not tried 2019-08-04 01:00 2021-03-12 17:03
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Visual Studio Code - simplicity of a code editor with what developers need for their core edit-build-debug cycle.
Description: - [Name] - VS Code (Visual Studio Code)
- [Version] - 1.36
- [Homepage] - https://code.visualstudio.com
- [Download] - https://github.com/microsoft/vscode/archive/1.36.0.tar.gz
- [Author] - Microsoft
- [Licence] - MIT ~ https://github.com/microsoft/vscode/blob/master/LICENSE.txt
- [Description] - Visual Studio Code combines the simplicity of a code editor with what developers need for their core edit-build-debug cycle. It provides comprehensive code editing, navigation, and understanding support along with lightweight debugging, a rich extensibility model, and lightweight integration with existing tools.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0010812)
g0tmi1k   
2019-08-04 01:00   
Used in AWAE
(0010865)
rhertzog   
2019-08-14 19:42   
Package has been requested on the Debian side too, but nobody picked it up until now.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898259
(0012659)
g0tmi1k   
2020-04-20 08:55   
There is also this ~ https://github.com/VSCodium/vscodium

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7087 [Kali Linux] General Bug major have not tried 2021-03-12 09:17 2021-03-12 09:18
Reporter: jeril Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Boot Issue: [ 1.6557431] i801_smbus 0000:00:1f.3: Failed to enable SMBus PCI device (-16)
Description: Error appears at boot time when i choose my usual Kali linux option. I have Kli linux 2020.4 installed for dual boot with windows 10. It was all fine until now. Must have run some updates before. The error is:

[ 1.6557431] i801_smbus 0000:00:1f.3: Failed to enable SMBus PCI device (-16)
BusyBox v1.30.1 (Debian 1:1.30.1-6+b1) built-in shell (ash)

Please help me, its urgent. I am new Linux
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7086 [Kali Linux] Tool Upgrade tweak random 2021-03-11 13:16 2021-03-11 13:26
Reporter: Casper Platform:  
Assigned To: sbrun OS:  
Priority: immediate OS Version:  
Status: assigned Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Facing kernel panic
Description: Kali Linux latest upgrades kernel version facing kernel panic and won't boot that partition won't b allowed ...to overcome I just booted old kernel version in mounted mem.
Steps To Reproduce: 1- boot through other partition
Additional Information: Could lead to crash memomy in ositself I guess
Attached Files: IMG_20210311_183052.jpg (1,849,908 bytes) 2021-03-11 13:16
https://bugs.kali.org/file_download.php?file_id=2022&type=bug
IMG_20210311_182511~2.jpg (236,267 bytes) 2021-03-11 13:16
https://bugs.kali.org/file_download.php?file_id=2023&type=bug
jpg
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7085 [Kali Linux] Tool Upgrade major N/A 2021-03-11 01:39 2021-03-11 13:17
Reporter: D3V Platform:  
Assigned To: sbrun OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: 'arjun' is using a beta version
Description: Looks like Arjun (https://github.com/s0md3v/Arjun/) is using a beta version. Please upgrade the package as the beta version contains breaking bugs, thanks.

Also, it is now available on PyPi as 'arjun'.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014310)
steev   
2021-03-11 02:04   
Thanks for the heads up - keep in mind that 2.1.1 was just released an hour ago as of the time of my comment :)
(0014311)
sbrun   
2021-03-11 13:17   
I have just uiploaded the new version 2.1.1-0kali1 in kali-dev.
It will be soon in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7062 [Kali Linux] Feature Requests feature always 2021-02-24 05:56 2021-03-10 02:57
Reporter: RME Systems Platform:  
Assigned To: arnaudr OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Request to have accessibility features added again
Description: from version 2020.1 orca is no longer included after installing the system
Steps To Reproduce: first install the operating system with the option to use speech synthesizer.
after installing restart the PC and that's when the screen reader no longer appears
Additional Information:
Attached Files:
Notes
(0014246)
rhertzog   
2021-02-24 09:44   
Did you select GNOME or XFCE as your desktop during installation?

What was the last version of Kali that was working for you?

Somehow I fear that you are just experiencing sub-par accessibility due to the switch to XFCE compared to GNOME.
(0014247)
RME Systems   
2021-02-24 13:49   
i selected gnome.

the last version that works for me is 2019.3
(0014305)
arnaudr   
2021-03-10 02:56   
Thanks for the report. Indeed we forgot to install orca in Kali. I just added it to the various desktops that Kali provides: https://gitlab.com/kalilinux/packages/kali-meta/-/issues/10. This change will make it in the next version of the Kali iso.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7083 [Kali Linux] General Bug major always 2021-03-09 13:38 2021-03-09 13:38
Reporter: linkaiqiang Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: 通过rpc,读取控制台信息,仅读取到下发命令信息,不能读取命令执行返回结果信息
Description: 通过rpc,读取控制台信息,仅读取到下发命令信息,不能读取命令执行返回结果信息。
console.write [u'0', 'ping 10.227.131.2 -w 6\r\n']

console.read [u'0']
[*] exec: ping 10.227.131.2 -w 6
Steps To Reproduce: 1、console.write [u'0', 'ping 10.227.131.2 -w 6\r\n']

2、console.read [u'0'] (如下,ping结果没有返回控制台)
[*] exec: ping 10.227.131.2 -w 6
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6626 [Kali Linux] Kali Package Bug minor always 2020-08-06 10:14 2021-03-09 11:11
Reporter: OS-74160 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: syntax warnings during post-install setup of powershell-empire (possible upstream issue)
Description: Installing powershell-empire from a clean slate via apt results in syntax warnings during the setup phase:
Setting up powershell-empire (3.3.1-0kali1) ...

 [*] Certificate written to ../data/empire-chain.pem
 [*] Private key written to ../data/empire-priv.key

/usr/share/powershell-empire/data/agent/agent.py:357: SyntaxWarning: "is not" with a literal. Did you mean "!="?
  if cmdargs is not None and cmdargs is not '' and cmdargs is not '/': # strip trailing slash for uniformity
/usr/share/powershell-empire/data/agent/agent.py:357: SyntaxWarning: "is not" with a literal. Did you mean "!="?
  if cmdargs is not None and cmdargs is not '' and cmdargs is not '/': # strip trailing slash for uniformity
/usr/share/powershell-empire/data/agent/agent.py:359: SyntaxWarning: "is not" with a literal. Did you mean "!="?
  if path[0] is not '/': # always scan relative to root for uniformity
Processing triggers for kali-menu (2020.3.2) ...
Steps To Reproduce: 1. Download a brand new Kali 2020.2a VMware image from the OffSec website
2. sudo apt -y install powershell-empire
3. Observe the installation complete and syntax warnings occur during "Setting up powershell-empire" phase
Additional Information: Presumably, this could be fixed by modifying line 357 of /usr/share/powershell-empire/data/agent/agent.py as suggested in the warning, but I have not tested this.
Attached Files:
Notes
(0013211)
OS-74160   
2020-08-06 10:17   
Under additional information, I should have said,

"Presumably, this could be fixed by modifying lines 357 and 359 of /usr/share/powershell-empire/data/agent/agent.py as suggested in the warning, but I have not tested this."
(0014296)
sbrun   
2021-03-09 11:11   
it is now fixed in the gitlab repository of powershell-empire

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6771 [Kali Linux] Kali Package Bug minor always 2020-10-06 15:10 2021-03-09 10:46
Reporter: IPv4v6 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Gobuster 3.0.1 does not support TLS 1.3
Description: Gobuster version 3.0.1 does not connect to TLS 1.3 only servers.
Steps To Reproduce: $ gobuster dir -u https://tls13.1d.pw -w /usr/share/wordlists/dirb/small.txt
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url: https://tls13.1d.pw
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/small.txt
[+] Status codes: 200,204,301,302,307,401,403
[+] User Agent: gobuster/3.0.1
[+] Timeout: 10s
===============================================================
2020/10/06 17:08:17 Starting gobuster
===============================================================
Error: error on running goubster: unable to connect to https://tls13.1d.pw/: Get https://tls13.1d.pw/: remote error: tls: protocol version not supported
Additional Information: Workaround: compile latest Gobuster version from source

go get github.com/OJ/gobuster
Attached Files: image.png (63,212 bytes) 2020-10-08 00:19
https://bugs.kali.org/file_download.php?file_id=1919&type=bug
png
Notes
(0013543)
TheColonial   
2020-10-08 00:19   
I'm setting this right now even when running 3.1 built with golang 1.15. From what I can tell there are issues with 1.3 negotiation with certain servers. I'm still trying to get to the bottom of it.

@IPv4v6 can you please share the local configuration that you have that builds binaries that works against tls13.1d.pw ?

Thank you!
(0013572)
TheColonial   
2020-10-19 00:04   
Hi all,

We went through the rabbit hole of figuring out what was wrong, turns out that the server had an issue. For more information see here:

https://github.com/golang/go/issues/41983

Thanks!
OJ
(0013629)
IPv4v6   
2020-11-04 07:30   
I also saw that error (tls: error decoding message) when testing with my self-compiled gobuster binary at the time the server was broken.

To make it clear: the current gobuster Kali package binary has a problem.

$ apt policy gobuster
gobuster:
  Installed: 3.0.1-0kali1
  Candidate: 3.0.1-0kali1
  Version table:
 *** 3.0.1-0kali1 500
        500 http://http.kali.org/kali kali-rolling/main amd64 Packages
        100 /var/lib/dpkg/status

$ ls -la /usr/bin/gobuster
-rwxr-xr-x 1 root root 6742032 Jul 2 2019 /usr/bin/gobuster

$ /usr/bin/gobuster dir -u https://tls13.1d.pw -w /usr/share/wordlists/dirb/small.txt
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url: https://tls13.1d.pw
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/small.txt
[+] Status codes: 200,204,301,302,307,401,403
[+] User Agent: gobuster/3.0.1
[+] Timeout: 10s
===============================================================
2020/11/04 08:28:00 Starting gobuster
===============================================================
Error: error on running goubster: unable to connect to https://tls13.1d.pw/: Get https://tls13.1d.pw/: remote error: tls: protocol version not supported
(0014294)
sbrun   
2021-03-09 10:46   
fixed in new version 3.1.0-0kali1

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7070 [Kali Linux] General Bug trivial always 2021-02-27 13:09 2021-03-09 04:25
Reporter: zellchristensen Platform:  
Assigned To: arnaudr OS:  
Priority: low OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Default hostname changes from "kali" to "debian" after clicking "Go Back"
Description: During graphical install, if a user enters an invalid hostname (i.e. "-" )under the network configuration section and clicks "Go Back" the default hostname is filled in with "debian" instead of the original initial "kali".
Steps To Reproduce: Proceed through graphical installation as normal.
Enter a minus sign, "-", as the hostname.
Next window says that it's invalid.
Click "Go Back" button.
Default hostname changed from "kali" to "debian".
Additional Information:
Attached Files:
Notes
(0014291)
arnaudr   
2021-03-09 03:40   
Thanks for the report! I just pushed a fix: https://gitlab.com/kalilinux/packages/netcfg/-/commit/4a35b18c478403dafbdb65042e9a5cbb60954f50
(0014292)
arnaudr   
2021-03-09 04:24   
Note that I forwarded the issue to the Debian bug tracker: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984846

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6666 [Kali Linux] Kali Package Bug minor always 2020-08-20 14:07 2021-03-08 16:49
Reporter: OS-74160 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: chrome-sandbox in burpsuite 2020.8 fails when installed via APT in Kali
Description: Burpsuite 2020.8, when installed from the downloaded 64-bit installer from here [https://portswigger.net/burp/releases/professional-community-2020-8?requestededition=community] sets the SUID bit on <Burp_Install_Path>/burpbrowser/84.0.4147.105/chrome-sandbox but the Kali APT package does not.

Instead, the Kali apt package installs a large binary at /usr/bin/burpsuite and does not install the burpbrowser until first use for the kali user into ~/.BurpSuite/burpbrowser. When it does, it fails to set the SUID bit on ~/.BurpSuite/burpbrowser/84.0.4147.105/chrome-sandbox.

As a result, an error message appears when you try to launch the embedded browser: "net.portswigger.devtools.client.aj: Refusing to start browser as your current configuration does not support running without sandbox."

From PortSwigger support:

"Root permissions are required to properly configure the embedded browser sandbox:

sudo chown root:root /home/kali/<Burp_Installation_Folder>/burpbrowser/84.0.4147.105/chrome-sandbox && sudo chmod u+s /home/kali/<Burp_Installation_Folder>/burpbrowser/84.0.4147.105/chrome-sandbox

It sounds like when you've used apt install you would need to carry out the manual steps post-install but you may not have seen the dialog that informs you of this. I hope this helps."
Steps To Reproduce: 1. Start with a new, freshly downloaded Kali 2020.3 vmware image and spin it up
2. sudo apt install --only-upgrade burpsuite
3. Launch burpsuite
4. Click proxy, intercept, open browser
5. Observe the error message in the window: "net.portswigger.devtools.client.aj: Refusing to start browser as your current configuration does not support running without sandbox"
Additional Information:
Attached Files: burpsuite_2021-02-28_19-40.png (179,412 bytes) 2021-03-01 03:41
https://bugs.kali.org/file_download.php?file_id=2018&type=bug
png
Notes
(0014255)
OS-74160   
2021-02-28 18:18   
Hello, would someone please take a look at this and respond? I opened this up 6 months ago today and there has been no action or response. Additionally, there is a new issue that is extremely closely related to this one that has emerged in the very latest update to burpsuite 2021.2.1.

I am willing to help with testing, or provide any additional data that may be needed.

Thank you so much!
(0014256)
steev   
2021-02-28 23:33   
There isn't a whole lot we can do here - we as a distro aren't supposed to touch files in the user's directory. Perhaps upstream could add a message about changing these permissions as a user?

The included browser is also x86_64 only, which means the package is now broken on arm64.
(0014257)
OS-74160   
2021-03-01 03:41   
Yes, I see what you're saying. I did some testing and discovered that essentially the Kali apt package is just putting the jar file into /usr/bin. Because if I download the jar "installer" from Portswigger, I get the same behavior. On first run, it installs the burpbrowser folder to ~/.BurpSuite/burpbrowser. So in this sense it's an upstream issue with their jar installer.

However, there is also a platform installer for "Linux 64-bit". When the installer is run as root, it installs by default to /opt/BurpSuiteCommunity and the browser is installed (at installation time, not first-run) to /opt/BurpSuiteCommunity/burpbrowser, and the suid bit is properly set on chrome-sandbox. See attached screenshot.

You mentioned that arm64 is a concern, and I realize it's important for kali packages to be platform independent, but perhaps the .sh installer could be used instead of the jar installer? I don't know if Portswigger has any intentions of supporting other architectures or if they provide source code to distributions?

In any case, maybe they would agree to install the burpbrowser in a non-user location, such as /usr/share/burpsuite or /opt/burpsuite so distributions can follow best practices if they were asked. Then the permissions could be set correctly from the beginning.
(0014267)
steev   
2021-03-03 16:39   
So, I just tested this (mostly because I'm an arm person) and I was able to move their chrome install out of the way, and symlink /usr/lib/chromium to their versioned directory, and create a symlink from chromium to chrome, and everything works as expected. The chromium-sandbox package installs the sandbox binary with the suid bit already.

We've talked to them before about this, but there hasn't been much movement on the issue.
(0014268)
OS-74160   
2021-03-03 18:09   
Thanks, @steev, that's good to know. Would it help if I asked them about this as a ticket so they know there is some more interest on it? Do you have a communication or ticket # I could reference? I'd really like to see this happen.
(0014288)
c0d2f3f5   
2021-03-08 13:05   
OS-74160 you have old burp and kali. is issue on newest versions too? why use old image of kali to test anyway?
(0014290)
OS-74160   
2021-03-08 16:49   
HI there, @c0d2f3f5. I can see the how you might be confused. When I first opened this issue, back in August 2020, this was the newest version of Kali and Burp available. I have actually kept up to data on everything, but the issue still persists. Today, in March 21 I am currently using Kali 2021.1 with Burp 2021.2.1-0kali1 and nothing has changed. I don't believe there is a way for me to update the issue with new version information besides adding more notes like this.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6828 [Kali Linux] Queued Tool Addition minor always 2020-11-09 02:59 2021-03-08 13:06
Reporter: tjnull Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Dirsearch - a brute force directories and files in webservers.
Description: Dirsearch is a mature command-line tool designed to brute force directories and files in webservers.

As a feature-rich tool, dirsearch allows the user to perform a complex web content discovering, with many vectors for the wordlist, high accuracy, impressive performance, advanced connection/request settings, modern brute-force techniques and nice output.
Steps To Reproduce: git clone https://github.com/maurosoria/dirsearch.git
cd dirsearch
python3 dirsearch.py -u <URL> -e <EXTENSIONS>
Additional Information: https://github.com/maurosoria/dirsearch/releases
Attached Files:
Notes
(0014169)
g0tmi1k   
2021-01-29 13:47   
not sure what this has over so many other tools in this area?
(0014281)
g0tmi1k   
2021-03-05 13:31   
@kali-team, please could this be packaged up.
(0014289)
c0d2f3f5   
2021-03-08 13:06   
other tools do same, why not close like

https://bugs.kali.org/view.php?id=7057

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7022 [Kali Linux] Queued Tool Addition minor N/A 2021-01-31 17:00 2021-03-06 20:34
Reporter: DontPanicO Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: jwtXploiter, a tool to test security of JSON Web Tokens
Description: name: jwtXploiter
version: 1.0
homepage: https://githbub.com/DontPanicO/jwtXploiter
wiki: https://githbub.com/DontPanicO/jwtXploiter/wiki
download: https://github.com/DontPanicO/jwtXploiter/releases/tag/v1.0
download: https://pypi.org/project/jwtxploiter/
author: DontPanicO
licence: GPL-3.0
description: A command line interface to test security of JWTs against all known CVEs and more

    - Tamper with the token payload, change claims and subclaims values.
    - Exploit known vulnerable header claims (kid, jku, x5u)
    - Verify a token
    - Retrieve the public key of your target's ssl connection and try to use it in a key confusion attack with one option only
    - All JWAs supported (HS*, RS*, PS*, ES*)
    - Generates a JWK and insert it in the token header
    - And much, much more!

dependencies: python3 (3.7 or newer)
python dependencies: cryptography==3.2.1
activity: actively mantained
installation: pip install, rpm package (provided by latest release on github)
how to use: this tool cover a lot of use cases, and all are well explained in the wiki. Here i just provide some basic.

    - jwtxpl <token> -d # decode a token
    - jwtxpl <token> -a None -p <claim_name>:<new_value> # Try alg none and change a payload claim issuing new_value
    - jwtxpl <token> -a hs256 -p user:admin -k /path/to/key # Use JWA HS256, change payload, and sign token with a key
    - jwtxpl <token> -a hs256 -p user:admin --unverified # Try to reuse original signature
    - jwtxpl <token> -a hs256 --inject-kid sqli # Try an sqli payload against the kid header
    - jwtxpl <token> -a rs256 --jku-basic <yourURL> # Try to make the jku pointing to your jwks (automatically generated)
    - jwtxpl <token> -a es384 -V /path/to/key # Verify the signature using JWA ES384 and the key passed to -V

packaged: The tool has not a .deb yet, but i'm working on it.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014192)
DontPanicO   
2021-02-02 16:24   
Debian package has been provided. It can be found on github , provided with the tool latest release.
(0014272)
g0tmi1k   
2021-03-05 13:14   
Hello - thanks for the submission @DontPanicO,
Wheres the debian package?
(0014282)
g0tmi1k   
2021-03-05 13:31   
@kali-team, please could this be packaged up.
(0014287)
DontPanicO   
2021-03-06 20:34   
@g0tmi1k here --> http://andreatedeschi.uno/jwtxploiter/jwtxploiter_1.2.1-1_all.deb

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7078 [Kali Linux] Tool Upgrade minor have not tried 2021-03-05 19:26 2021-03-05 19:26
Reporter: tjhall72 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: confirmed Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: [Debian Package] Update autopsy to v4.8.0
Description: Please update to the latest version of the autopsy package:
https://github.com/sleuthkit/autopsy/releases
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014283)
saberzaid   
2014-12-13 15:46   
Sleuth Kit 4.0.2 already in the repo , only need now to update autopsy
(0014284)
rhertzog   
2015-09-03 12:54   
This package should be updated on the Debian side: https://tracker.debian.org/pkg/autopsy

But the current maintainer disappeared in the nature. It should probably be taken over by the forensics team.
(0014285)
rhertzog   
2018-08-24 17:02   
There's bug report open on the Debian side:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669704

But the package is currently orphaned so this won't happen unless someone steps up to do the work. It would be a good idea to adopt this package in the pkg-security team if there are volunteers to help:
http://wiki.debian.org/Teams/pkg-security

The current version of autopsy is 4.8.0.

https://github.com/sleuthkit/autopsy/releases

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7079 [Kali Linux] Tool Upgrade minor always 2021-03-05 19:26 2021-03-05 19:26
Reporter: tjhall72 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: [Debian Package] Update Scalpel v2.0 (Currently v1.60)
Description: https://github.com/sleuthkit/scalpel/blob/master/Changelog



Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014286)
g0tmi1k   
2018-08-23 08:54   
This comes from debian, not Kali ~ https://pkg.kali.org/pkg/scalpel

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7019 [Kali Linux] Queued Tool Addition feature N/A 2021-01-30 15:10 2021-03-05 13:30
Reporter: beesan Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Name-That-Hash - a modern day hash-identifier
Description: Websites:
https://github.com/HashPals/Name-That-Hash
https://nth.skerritt.blog

Modern day hash-identifier with new features such as:
* Popularity, so NTLM will appear before Skype in the list.
* Descriptions, so pentesters can make informed decisions about the type of hash.
* Accessible CLI, so people with colour-blindness, screen-readers or those that can't read big blobs of text should be able to easily use it. https://github.com/HashPals/Name-That-Hash/wiki/Accessibility
* JSON output, API, file input, etc.

This uses the same database as HashID and Hash-Identifier, but modified & updated.

TL;DR:
* MIT
* Install via PyPi with `pip3 install name-that-hash`, usage is `nth`.
* Pyproject.toml https://github.com/HashPals/Name-That-Hash/blob/main/pyproject.toml
* Setup.py https://github.com/HashPals/Name-That-Hash/blob/main/packages/setup.py
* Authors: Beesan @bee_sec_san on Twitter
* Other similar tools: HashID, Hash-identifier
* Compute resources: The same as HashId or Hash-Identifier, very minimal.
* Maintained: Yes, I am an active open source maintainer (github.com/bee-san) so this tool shall remain maintained.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014180)
beesan   
2021-02-01 22:03   
Since I’m not sure if I can edit my original post, The HashPal’s organisation has 3 members now who are committed to keeping the tool update, so even in the sad event that something happens to me the tool will be okay.

Also, one of the core contributors to the original HashID approves of the fork and submitted a PR to update the license to GPL-3-0-or-later, as this project is based off of HashID (well, only the database of hashes) which uses that license.

https://github.com/HashPals/Name-That-Hash/pull/14
(0014280)
g0tmi1k   
2021-03-05 13:30   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6871 [Kali Linux] Queued Tool Addition minor N/A 2020-11-23 10:13 2021-03-05 13:30
Reporter: j_jito Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Sparrow-wifi: Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux
Description: [Name] - sparrow-wifi
[Version] - N/A
[Homepage] - https://github.com/ghostop14/sparrow-wifi
[Download] - N/A
[Author] - @ghostop14
[License] - GPL3 ~ https://github.com/ghostop14/sparrow-wifi/blob/master/LICENSE
[Description] - Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux
[Dependencies] - sudo apt install python3-pip gpsd gpsd-clients python3-tk python3-setuptools
[Similar tools] - N/A
[Activity] - Nov 2 2020
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014279)
g0tmi1k   
2021-03-05 13:30   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6832 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-11 06:52 2021-03-05 13:28
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: gsocket - Global Socket. Moving data from here to there. Securely, Fast and trough NAT/Firewalls
Description: Name] - gsocket
[Version] - v1.4.22
[Homepage] - https://hackerschoice.github.io/
[Download] - https://github.com/hackerschoice/gsocket
[Author] - The Hacker's Choice
[License] - https://github.com/hackerschoice/gsocket/blob/master/LICENSE
[Description] - Global Socket. Moving data from here to there. Securely, Fast and trough NAT/Firewalls

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014278)
g0tmi1k   
2021-03-05 13:28   
@kali-team, can this be packaged up please

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7074 [Kali Linux] General Bug block always 2021-03-02 11:50 2021-03-05 10:04
Reporter: bluegene Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali 2021.1 apt upgrade causes Kernel panic - No working init found during boot
Description: Starting with fresh installation Kali 2021.1 on Dell Vostro 3400, after doing 'sudo apt upgrade' and reboot, Kali is not able to boot anymore.

GRUB issue?

Steps To Reproduce: 1. I had fresh Kali 2021.1 install and done 'sudo apt uprade' --> on next reboot result was "Kernel panic - No working init found during boot"

This is list of packages upgraded with 'sudo apt upgrade':
https://termbin.com/v7bn

2. Reproducible 2nd time: Tried also fresh re-install, and last step during Kali installation in install I have puled fresh updates from mirror -> same problem is reproducible.

3. Not reproducible if I don't upgrade: Finally done again new reinstall with same Kali version but this time I have skipped upgrades from mirror -> now Kali 2021.1 works fine and is able to boot fully.
Additional Information:
Attached Files: photo_2021-03-02_12-54-26.jpg (88,813 bytes) 2021-03-02 11:55
https://bugs.kali.org/file_download.php?file_id=2019&type=bug
jpg
Notes
(0014260)
bluegene   
2021-03-02 11:55   
Please find attached screenshot of boot error.
Termbin is keeping links for 1 month (https://termbin.com/v7bn), so adding here for posterity:

Listing...
apparmor/kali-rolling 2.13.6-9 amd64 [upgradable from: 2.13.6-7]
arp-scan/kali-rolling 1.9.7-2 amd64 [upgradable from: 1.9.7-1]
bash/kali-rolling 5.1-2+b1 amd64 [upgradable from: 5.1-2]
bind9-dnsutils/kali-rolling 1:9.16.12-1 amd64 [upgradable from: 1:9.16.11-2]
bind9-host/kali-rolling 1:9.16.12-1 amd64 [upgradable from: 1:9.16.11-2]
bind9-libs/kali-rolling 1:9.16.12-1 amd64 [upgradable from: 1:9.16.11-2]
bsdextrautils/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
bsdutils/kali-rolling 1:2.36.1-7 amd64 [upgradable from: 1:2.36.1-6]
burpsuite/kali-rolling 2021.2.1-0kali1 amd64 [upgradable from: 2020.12.1-0kali1]
chromium-common/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1]
chromium-driver/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1]
chromium-sandbox/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1]
chromium/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1]
console-setup-linux/kali-rolling 1.201 all [upgradable from: 1.200]
console-setup/kali-rolling 1.201 all [upgradable from: 1.200]
default-mysql-server/kali-rolling 1.0.7 all [upgradable from: 1.0.6]
dns-root-data/kali-rolling 2021011101 all [upgradable from: 2019052802]
dnsrecon/kali-rolling 0.10.0-1 all [upgradable from: 0.9.1+git20200921-1]
dosfstools/kali-rolling 4.2-1 amd64 [upgradable from: 4.1-2]
eject/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
faraday/kali-rolling 3.14.1-0kali1 all [upgradable from: 3.14.0-0kali2]
fdisk/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
fuse3/kali-rolling 3.10.2-1 amd64 [upgradable from: 3.10.1-3]
gir1.2-javascriptcoregtk-4.0/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1]
gir1.2-webkit2-4.0/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1]
grub-common/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1]
grub-efi-amd64-bin/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1]
grub-efi-amd64/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1]
grub2-common/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1]
hwloc/kali-rolling 2.4.1~rc3+dfsg-1 amd64 [upgradable from: 2.4.1~rc2+dfsg-2]
ipp-usb/kali-rolling 0.9.17-1 amd64 [upgradable from: 0.9.16-1]
kali-defaults-desktop/kali-rolling 2021.2.0 all [upgradable from: 2021.1.3]
kali-defaults/kali-rolling 2021.2.0 all [upgradable from: 2021.1.3]
keyboard-configuration/kali-rolling 1.201 all [upgradable from: 1.200]
ldap-utils/kali-rolling 2.4.57+dfsg-2 amd64 [upgradable from: 2.4.57+dfsg-1]
libapache2-mod-php7.4/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1]
libapparmor1/kali-rolling 2.13.6-9 amd64 [upgradable from: 2.13.6-7]
libapt-pkg-perl/kali-rolling 0.1.39 amd64 [upgradable from: 0.1.36+b4]
libarmadillo10/kali-rolling 1:10.1.2+dfsg-4 amd64 [upgradable from: 1:10.1.2+dfsg-3]
libblkid1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
libblockdev-crypto2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libblockdev-fs2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libblockdev-loop2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libblockdev-part-err2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libblockdev-part2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libblockdev-swap2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libblockdev-utils2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libblockdev2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1]
libcdparanoia0/kali-rolling 3.10.2+debian-13.1 amd64 [upgradable from: 3.10.2+debian-13+b1]
libcups2/kali-rolling 2.3.3op2-3 amd64 [upgradable from: 2.3.3op2-2]
libdv4/kali-rolling 1.0.0-13 amd64 [upgradable from: 1.0.0-12]
libdw1/kali-rolling 0.183-1 amd64 [upgradable from: 0.182+20210205-1]
libelf1/kali-rolling 0.183-1 amd64 [upgradable from: 0.182+20210205-1]
libfdisk1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
libfuse3-3/kali-rolling 3.10.2-1 amd64 [upgradable from: 3.10.1-3]
libgcrypt20/kali-rolling 1.8.7-3 amd64 [upgradable from: 1.8.7-2]
libglib2.0-0/kali-rolling 2.66.7-1 amd64 [upgradable from: 2.66.6-1]
libglib2.0-bin/kali-rolling 2.66.7-1 amd64 [upgradable from: 2.66.6-1]
libglib2.0-data/kali-rolling 2.66.7-1 all [upgradable from: 2.66.6-1]
libgraphene-1.0-0/kali-rolling 1.10.4+dfsg1-1 amd64 [upgradable from: 1.10.2-1]
libhwloc-plugins/kali-rolling 2.4.1~rc3+dfsg-1 amd64 [upgradable from: 2.4.1~rc2+dfsg-2]
libhwloc15/kali-rolling 2.4.1~rc3+dfsg-1 amd64 [upgradable from: 2.4.1~rc2+dfsg-2]
libiec61883-0/kali-rolling 1.2.0-4 amd64 [upgradable from: 1.2.0-3]
libio-html-perl/kali-rolling 1.004-2 all [upgradable from: 1.001-1.1]
libjavascriptcoregtk-4.0-18/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1]
libjson-c5/kali-rolling 0.15-2 amd64 [upgradable from: 0.15-1]
libldap-2.4-2/kali-rolling 2.4.57+dfsg-2 amd64 [upgradable from: 2.4.57+dfsg-1]
libldap-common/kali-rolling 2.4.57+dfsg-2 all [upgradable from: 2.4.57+dfsg-1]
libmaxminddb0/kali-rolling 1.5.0-3 amd64 [upgradable from: 1.5.0-2]
libmount1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
libnfsidmap2/kali-rolling 0.25-6 amd64 [upgradable from: 0.25-5.1]
libnghttp2-14/kali-rolling 1.43.0-1 amd64 [upgradable from: 1.42.0-1]
libnorm1/kali-rolling 1.5.9+dfsg-2 amd64 [upgradable from: 1.5.9+dfsg-1]
libnss3/kali-rolling 2:3.61-1 amd64 [upgradable from: 2:3.60-1]
libopenjp2-7/kali-rolling 2.4.0-3 amd64 [upgradable from: 2.4.0-1]
libqmi-glib5/kali-rolling 1.26.10-0.1 amd64 [upgradable from: 1.26.8-0.2]
libqmi-proxy/kali-rolling 1.26.10-0.1 amd64 [upgradable from: 1.26.8-0.2]
libsasl2-2/kali-rolling 2.1.27+dfsg-2.1 amd64 [upgradable from: 2.1.27+dfsg-2]
libsasl2-modules-db/kali-rolling 2.1.27+dfsg-2.1 amd64 [upgradable from: 2.1.27+dfsg-2]
libsasl2-modules/kali-rolling 2.1.27+dfsg-2.1 amd64 [upgradable from: 2.1.27+dfsg-2]
libselinux1/kali-rolling 3.1-3 amd64 [upgradable from: 3.1-2+b2]
libsmartcols1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
libspatialite7/kali-rolling 5.0.1-2 amd64 [upgradable from: 5.0.0-1]
libsvn1/kali-rolling 1.14.1-3 amd64 [upgradable from: 1.14.0-3+b2]
libthunarx-3-0/kali-rolling 4.16.3-1 amd64 [upgradable from: 4.16.2-1]
libuuid1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
libwacom-bin/kali-rolling 1.8-2 amd64 [upgradable from: 1.7-1]
libwacom-common/kali-rolling 1.8-2 all [upgradable from: 1.7-1]
libwacom2/kali-rolling 1.8-2 amd64 [upgradable from: 1.7-1]
libwebkit2gtk-4.0-37/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1]
libwebsockets16/kali-rolling 4.0.20-2 amd64 [upgradable from: 4.0.20-1]
libyara4/kali-rolling 4.0.5-1 amd64 [upgradable from: 4.0.4-1]
libzstd1/kali-rolling 1.4.8+dfsg-2 amd64 [upgradable from: 1.4.8+dfsg-1]
lightdm-gtk-greeter-settings/kali-rolling 1.2.2-4 all [upgradable from: 1.2.2-3]
man-db/kali-rolling 2.9.4-1 amd64 [upgradable from: 2.9.3-2]
metasploit-framework/kali-rolling 6.0.31-0kali1 amd64 [upgradable from: 6.0.30-0kali1]
mount/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
mysql-common/kali-rolling 5.8+1.0.7 all [upgradable from: 5.8+1.0.6]
nano/kali-rolling 5.4-2 amd64 [upgradable from: 5.4-1]
ncrack/kali-rolling 0.7+debian-3 amd64 [upgradable from: 0.7+debian-2]
network-manager-gnome/kali-rolling 1.20.0-2 amd64 [upgradable from: 1.20.0-1]
openssh-client/kali-rolling 1:8.4p1-4 amd64 [upgradable from: 1:8.4p1-3]
openssh-server/kali-rolling 1:8.4p1-4 amd64 [upgradable from: 1:8.4p1-3]
openssh-sftp-server/kali-rolling 1:8.4p1-4 amd64 [upgradable from: 1:8.4p1-3]
php7.4-cli/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1]
php7.4-common/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1]
php7.4-json/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1]
php7.4-mysql/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1]
php7.4-opcache/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1]
php7.4-readline/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1]
php7.4/kali-rolling 7.4.15-1 all [upgradable from: 7.4.14-1]
plocate/kali-rolling 1.1.4-1 amd64 [upgradable from: 1.1.3-1]
python3-aiosqlite/kali-rolling 0.16.1-1 all [upgradable from: 0.15.0-2]
python3-cryptography/kali-rolling 3.3.2-1 amd64 [upgradable from: 3.3.1-1]
python3-django/kali-rolling 2:2.2.19-1 all [upgradable from: 2:2.2.18-1]
python3-kaitaistruct/kali-rolling 0.9-1 all [upgradable from: 0.8-3]
python3-numexpr/kali-rolling 2.7.2-2 amd64 [upgradable from: 2.7.2-1]
python3-numpy/kali-rolling 1:1.19.5-1 amd64 [upgradable from: 1:1.19.4-1+b1]
python3-pkg-resources/kali-rolling 52.0.0-1 all [upgradable from: 51.3.3-1]
python3-pyproj/kali-rolling 3.0.0-2 amd64 [upgradable from: 3.0.0-1+b1]
python3-reportbug/kali-rolling 7.10.2 all [upgradable from: 7.9.0]
python3-setuptools/kali-rolling 52.0.0-1 all [upgradable from: 51.3.3-1]
python3-soupsieve/kali-rolling 2.2-1 all [upgradable from: 2.1-1]
python3-twisted-bin/kali-rolling 20.3.0-4 amd64 [upgradable from: 20.3.0-3+b1]
python3-twisted/kali-rolling 20.3.0-4 all [upgradable from: 20.3.0-3]
python3-yara/kali-rolling 4.0.4-1 amd64 [upgradable from: 4.0.2-1+b2]
reportbug/kali-rolling 7.10.2 all [upgradable from: 7.9.0]
rfkill/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
ruby-activesupport/kali-rolling 2:6.0.3.5+dfsg-1 all [upgradable from: 2:6.0.3.4+dfsg-3]
ruby-power-assert/kali-rolling 1.1.7-2 all [upgradable from: 1.1.7-1]
screen/kali-rolling 4.8.0-5 amd64 [upgradable from: 4.8.0-3]
sslscan/kali-rolling 2.0.8-0kali1 amd64 [upgradable from: 2.0.7-0kali1]
sslyze/kali-rolling 4.0.4-0kali1 all [upgradable from: 4.0.2-0kali5]
stunnel4/kali-rolling 3:5.56+dfsg-7 amd64 [upgradable from: 3:5.56+dfsg-6]
subversion/kali-rolling 1.14.1-3 amd64 [upgradable from: 1.14.0-3+b2]
thunar-data/kali-rolling 4.16.3-1 all [upgradable from: 4.16.2-1]
thunar/kali-rolling 4.16.3-1 amd64 [upgradable from: 4.16.2-1]
util-linux/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
uuid-runtime/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6]
wpasupplicant/kali-rolling 2:2.9.0-20 amd64 [upgradable from: 2:2.9.0-17]
wpscan/kali-rolling 3.8.15-0kali1 all [upgradable from: 3.8.14-0kali1]
x11-common/kali-rolling 1:7.7+22 all [upgradable from: 1:7.7+21]
xorg/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21]
xserver-xorg-input-all/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21]
xserver-xorg-video-all/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21]
xserver-xorg/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21]
(0014261)
bluegene   
2021-03-02 15:26   
Installation for Kali 2021.1 that was used is "Live" variant from official download source:
https://www.kali.org/downloads/

Kali Linux 64-Bit (Live)
3.4G
sha: 8e5af78e93424336f787d4dd0fdd89b429675d5ae67b1c1634ea1b53c5650677
(0014269)
arnaudr   
2021-03-05 10:04   
I just tried in a QEMU VM, with UEFI enabled, but I could not reproduce the issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7076 [Kali Linux] General Bug major N/A 2021-03-03 08:26 2021-03-03 16:40
Reporter: subhacker65 Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kali linux 2021.1 does not boot into gui mode
Description: After booting into kali 2021.1 live using live iso burned by rufus on 16gb pendrive (procedure followed exactly correct) in uefi mode ,
it directly goes to terminal ( no display or no gui at all). No administer privileges were given so no sudo commands can be played and that s end of it you cannot do anything in non root accoung kali@kali zsh terminal . probably this is the end of it (literally nothing works).
This is major bug also i have faced while full-upgrading system from 2020.4 to 2021.1 . I guess issue is with display managers like gdm3 xdm and wdm and when users tried to shift from 2020.4 to 2021.1 they were thrown into rescue mode/emergency mode like a hell .
The root account is locked and sulogin(8) man page errors prevails
Steps To Reproduce:
Additional Information: I faced no issues with 2020.2 but literally 2021.1 has critical bugs in terms of display with regards to live ,installer and netinst iso .
Please look into the issue as soon as possible if not it may pass down to 2021.2 too
( Some libpag0, gdm3 needs to be restarted while upgradation from 2020.4 to 2021.1 ) that is point it sucks away
Attached Files: WhatsApp Image 2021-03-03 at 22.08.35.jpeg (121,890 bytes) 2021-03-03 16:40
https://bugs.kali.org/file_download.php?file_id=2020&type=bug
jpeg
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6851 [Kali Linux] Tool Upgrade minor N/A 2020-11-20 08:23 2021-03-03 14:45
Reporter: fl0 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Upgrade uhd to 4.0.0.0-2
Description: Please upgrade uhd (libuhd-dev, libuhd4.0.0, python3-uhd, uhd-host) to version 4.0.0.0-2 .

https://packages.debian.org/source/experimental/uhd

uhd-images is already in version 4.0.0.0 .
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013939)
sbrun   
2020-12-03 14:25   
unfortunately the packages in Debian experimental don't build correctly on arm64 and armhf
So the binary packages are missing for those architectures. I can't import the uhd package version 4.0.0.0 in kali-rolling.
(0014266)
rhertzog   
2021-03-03 14:45   
And there are reverse dependencies using the various uhd libraries so we can't just blindly import this update. I'm afraid that we will have to wait until the transition happens in Debian and this will be after the release of Debian 11 bullseye.

https://release.debian.org/transitions/html/auto-uhd.html

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7075 [Kali Linux] Kali Package Bug minor always 2021-03-02 16:07 2021-03-02 16:41
Reporter: catmandx Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: command-not-found cannot open it's sqlite db file
Description: When using non-root accounts, the package command-not-found cannot open its db file (presumably to write something to it)

The db file has permission of 644 with owner root/root:
┌──(kali㉿kali)-[/usr/share/wordlists]
└─$ ls /usr/share/command-not-found/CommandNotFound/db/db.py -al
-rw-r--r-- 1 root root 868 Jun 1 2020 /usr/share/command-not-found/CommandNotFound/db/db.py
Steps To Reproduce: 1. Use a non-root account
2. type in gitleakss or some command that doesn't exist in your machine but does in the kali repo
Additional Information: Output:
┌──(kali㉿kali)-[/usr/share/wordlists]
└─$ gitleakss 127 ⨯
Sorry, command-not-found has crashed! Please file a bug report at:
http://www.debian.org/Bugs/Reporting
Please include the following information with the report:

command-not-found version: 0.3
Python version: 3.9.1 final 0
Distributor ID: Kali
Description: Kali GNU/Linux Rolling
Release: 2021.1
Codename: kali-rolling
Exception information:

unable to open database file
Traceback (most recent call last):
  File "/usr/share/command-not-found/CommandNotFound/util.py", line 23, in crash_guard
    callback()
  File "/usr/lib/command-not-found", line 90, in main
    cnf = CommandNotFound.CommandNotFound(options.data_dir)
  File "/usr/share/command-not-found/CommandNotFound/CommandNotFound.py", line 79, in __init__
    self.db = SqliteDatabase(dbpath)
  File "/usr/share/command-not-found/CommandNotFound/db/db.py", line 12, in __init__
    self.con = sqlite3.connect(filename)
sqlite3.OperationalError: unable to open database file

┌──(kali㉿kali)-[/usr/share/wordlists]
└─$ ls /usr/share/command-not-found/CommandNotFound/db/db.py -al
-rw-r--r-- 1 root root 868 Jun 1 2020 /usr/share/command-not-found/CommandNotFound/db/db.py
                                                                                                                                                                                              
[sudo] password for kali:
┌──(root�kali)-[/usr/share/wordlists]
└─# gitleaks
Command 'gitleaks' not found, but can be installed with:
apt install gitleaks
Attached Files:
Notes
(0014262)
steev   
2021-03-02 16:41   
That file is simply the python file to access the actual database file(s) which are in /var/lib/command-not-found.

Does c-n-f crash every time? Does running an apt update fix the issue?

steev@kld:~/git/linux$ gitleakss
Command 'gitleakss' not found, did you mean:
  command 'gitleaks' from deb gitleaks
Try: sudo apt install <deb name>

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7005 [Kali Linux] Kali Package Bug major always 2021-01-22 05:18 2021-03-02 08:48
Reporter: bl4krat Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: metagoofil does not do the metadata analysis stage - which is kind of the point of its existance
Description:
Version 2.2 which gets installed by apt (and therefore, i suspect, the default version included with the distribution) ONLY downloads the files. It lacks the libraries and code to do the metadata parsing.

Also, this version doesnt play nicely when it receives a status 429 (too many requests) from the server - it just throws and exception.
Steps To Reproduce: Try this:

   metagoofil -d https://sans.org -t doc,pdf,xls -l 200 -o sans_files -f sans_results.html

This complains that sans_results.html is an unexpected parameter. the functionality to save the exfiltration result to this file does not exist in the script.

So try this:

   metagoofil -d https://sans.org -t doc,pdf,xls -l 200 -o sans_files -f

This time (on my vm) it will download the .docs and .pdf's, and then throw an exception when it gets a 429 from the server. It SHOULD deal with the 429 gracefully and back off the request rate a bit.

Finally (having waited a long time for the server to get out of it's grumpy mood)....

   metagoofil -d https://sans.org -t xls -l 200 -o sans_files -f

Now the .xls files are downloaded... and the program ends. No attempt is made to search the metadata - there is no code in the script to do this.

Additional Information: I have solved this on my VM by installing what appears to be an older version (still 2.2, but it's a python 2 script with all the necessary libraries and code) by doing:

sudo rm -rf /usr/share/metagoofil
sudo git clone https://github.com/WiReD-/metagoofil.git /usr/share/metagoofil

and then editing /usr/bin/metagoofil so that it runs /usr/share/metagoofil/metagoofil.py with python2 (not 3).
Attached Files:
Notes
(0014135)
bl4krat   
2021-01-22 05:29   
I dont know who owns https://github.com/WiReD-/metagoofil.git, but it includes the GNU v2 public licence.
(0014181)
sbrun   
2021-02-02 09:20   
Thanks for your report.
Python 2 is EOL since one year. We removed the old Python2 tools or switched to Python 3 versions.

For metagoofil we switched to an other upstream repo to have python 3 support.
This version does not extract metadata (see https://github.com/opsdisk/metagoofil/blob/master/README.md)

I will report the issue with status 429 to upstream.
(0014182)
sbrun   
2021-02-02 09:30   
https://github.com/opsdisk/metagoofil/issues/21
(0014258)
sbrun   
2021-03-02 08:47   
version 2.2.+git20210226-0kali1fixes exception 429 issue

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7069 [Kali Linux] General Bug major unable to reproduce 2021-02-27 03:23 2021-02-27 03:32
Reporter: 3liyyah Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Updating Kali from 2020.1 to 2020.4 does not display
Description: I have followed the documentation from https://www.kali.org/docs/general-use/updating-kali/

After performing the steps carefully, and using the correct sources, this is the output of lsb_release -a:

No LSB modules are available.
Distributor ID: Kali
Description: Kali GNU/Linux Rolling
Release: 2021.1
Codename: kali-rolling

This is the output of 'cat /etc/os-release':
PRETTY_NAME="Kali GNU/Linux Rolling"
NAME="Kali GNU/Linux"
ID=kali
VERSION="2021.1"
VERSION_ID="2021.1"
VERSION_CODENAME="kali-rolling"
ID_LIKE=debian
ANSI_COLOR="1;31"
HOME_URL="https://www.kali.org/"
SUPPORT_URL="https://forums.kali.org/"
BUG_REPORT_URL="https://bugs.kali.org/"


In both cases and no matter what kind of upgrade, dist-upgrade, full upgrade I run, the display of the output never changes.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014254)
3liyyah   
2021-02-27 03:32   
I forgot to mention that I was using sudo in each case.

Steps performed:
updated sources with
deb http://http.kali.org/kali kali-rolling main contrib non-free
deb-src http://http.kali.org/kali kali-rolling main contrib non-free

then
sudo apt update
sudo apt full-upgrade -y


Everything completed successfully with no errors. Logged off, rebooted, and signed back in.

Executed the commands in the description and no change.

Also ran the following for the new shell after:
kali@kali:~$ sudo apt update && sudo apt -y full-upgrade
kali@kali:~$
kali@kali:~$ cp -i /etc/skel/.bashrc ~/
kali@kali:~$
kali@kali:~$ cp -i /etc/skel/.zshrc ~/
kali@kali:~$
kali@kali:~$ chsh -s /bin/zsh
kali@kali:~$
kali@kali:~$ [ -f /var/run/reboot-required ] && sudo reboot -f


Rebooted still no change.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7068 [Kali Linux] General Bug feature always 2021-02-26 09:25 2021-02-26 14:12
Reporter: MRX Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali 2021.1 gives an error "comment_not_found".
Description: ┌──(mrx㉿kali)-[~]
└─$ try 127 ⨯
Sorry, command-not-found has crashed! Please file a bug report at:
http://www.debian.org/Bugs/Reporting
Please include the following information with the report:

command-not-found version: 0.3
Python version: 3.9.1 final 0
Distributor ID: Kali
Description: Kali GNU/Linux Rolling
Release: 2021.1
Codename: kali-rolling
Exception information:

unable to open database file
Traceback (most recent call last):
  File "/usr/share/command-not-found/CommandNotFound/util.py", line 23, in crash_guard
    callback()
  File "/usr/lib/command-not-found", line 90, in main
    cnf = CommandNotFound.CommandNotFound(options.data_dir)
  File "/usr/share/command-not-found/CommandNotFound/CommandNotFound.py", line 79, in __init__
    self.db = SqliteDatabase(dbpath)
  File "/usr/share/command-not-found/CommandNotFound/db/db.py", line 12, in __init__
    self.con = sqlite3.connect(filename)
sqlite3.OperationalError: unable to open database file
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014252)
rhertzog   
2021-02-26 14:12   
Can you elaborate in what context you get that error? Is that a freshly installed system? a freshly upgraded system? a live system?

Have you run "sudo apt update" once after the upgrade?

Does "sudo update-command-not-found" fix the issue?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7067 [Kali Linux] General Bug feature always 2021-02-26 08:33 2021-02-26 08:33
Reporter: jack_like Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: set LANG=en_US.UTF-8 , can't display Chinese normally
Description:   I update && upgrade my kali linux a few days ago .And after that it can't print Chinese normally and it's just so confusing.
Steps To Reproduce: 1.upgrade to the newest version,LANG=en_US.UTF-8;
2.open terminal emulator and some other desktop application using Qt ( I guess qt settings is the key)
3.Chinese can't print normally.
Additional Information:
Attached Files: encoding-error.png (27,203 bytes) 2021-02-26 08:33
https://bugs.kali.org/file_download.php?file_id=2017&type=bug
png
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7012 [Kali Linux] Queued Tool Addition minor have not tried 2021-01-28 14:44 2021-02-25 13:47
Reporter: subduing_flask Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Feroxbuster - A simple, fast, recursive content discovery tool written in Rust
Description: name: feroxbuster
homepage/repo: https://github.com/epi052/feroxbuster
description: A simple, fast, recursive content discovery tool written in Rust
deps: only rust compiler for build, otherwise none

been using this instead of gobuster for long time with no issue. benefit is only dir scanning and can do recursive searches. seems also faster and has shell comp

can this plz be added to repos?
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014146)
g0tmi1k   
2021-01-29 13:07   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0014171)
epi   
2021-01-29 14:52   
morning!

Tool author here; a friend of mine let me know this was here. I'll see if I can get this working today.

I took a look at the link from @g0tmi1k, it doesn't look like the normal debian build process. It seems as though it's mostly an install script and some of the debian build files?

It doesn't appear that cargo/rustc is included in kali. I currently distribute musl-built static binaries via github actions. Are there any considerations/standards for packaging a rust project?
(0014187)
sbrun   
2021-02-02 10:05   
@epi I have no experience in rust project packaging but I think this link can help you to start:
https://salsa.debian.org/rust-team/debcargo-conf/blob/master/README.rst

It's the documentation of the rust-team in Debian (there is some information that is only relevant for Debian like ITPs).
(0014196)
epi   
2021-02-03 21:46   
@sbrun ill take a look at that; I haven't been successful yet without it, lol
(0014238)
epi   
2021-02-22 22:45   
@sbrun I've got this all working. How do I handle the final remote repo? Following through the documentation, i have this in my debian/control

```
Homepage: https://github.com/epi052/feroxbuster
Vcs-Browser: https://gitlab.com/kalilinux/packages/feroxbuster
Vcs-Git: https://gitlab.com/kalilinux/packages/feroxbuster.git
```

Should I create a 'packaging' repo on gitlab instead, or do ya'll create one that i can push/PR to?
(0014242)
sbrun   
2021-02-23 09:34   
(Last edited: 2021-02-23 09:34)
@epi You don't need to create a 'packaging' repo on gitlab.
You can create a branch on your github repo including the debian directory.

I will create the repo on gitlab.com/kalilinux and will import your pacakging work.

(0014244)
epi   
2021-02-23 13:29   
@sbrun i pushed the three branches and tags to https://github.com/epi052/feroxbuster.

What's the normal way of handling those branches going forward? I assume I can merge kali/master, putting debian/ into my main branch. What about pristine-tar and upstream?
(0014248)
sbrun   
2021-02-24 14:22   
@epi thanks for the packaging. I will import it into kali as soon as possible.

You don't need to keep pristine-tar and upstream in your repo.
They are required only in kali repo. They wil be updated by importing new upstream tarball.

For the kali/master branch, you can do what you want: you can keep it or/and merge it into your main branch or/and remove it.
(0014251)
sbrun   
2021-02-25 13:47   
new version 2.2.1-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7056 [Kali Linux] General Bug crash always 2021-02-19 16:23 2021-02-23 12:41
Reporter: vanguard Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali-live crashes during build - Message: Volume ID does not fit in 32 bit
Description: Dear maintainers,

sorry to disturb you, but I believe, that something important might have changed, but I still can not find, what happened.

As usual as do regularly I wanted to build a kali-live , and as I always do is to get the latest git configs using the command

git pull origin master, then do the build with ./build.sh with my additional commands like "boot=live" keyboard=......." and so on.

This is working well since years.

But this time the build crashes with the message: "Volume ID does not fit in 32 bit" (see attached build.log).

Please note, that both builds (I built for amd64 and for i386) are crashing with the identical message. I also noticed, that the git command updated some files, one was build.sh (don't know if this matters).

So as I am not sure, if I myself did something wrong or if one of the new configs messed or one of the packages are causing this issue, I am looking for help here.

It would be nice, if someone could give me a clue (if it was my mistake) or take a look at this issue.

Thanks for any help and feel free for more information.

Best regards

Hans
Steps To Reproduce: First script:
#!/bin/sh

### define path to the repository on your disk
### PATH=
MOUNTPOINT=/mnt
# DEVICE=/dev/sdb1
REPOPATH=kali-linux/var/cache/apt-cacher-ng/

### download and install needed packages
apt-get update
apt-get install git cdebootstrap live-build live-config apt-cacher-ng console-data curl -y

### execute any commands to fit your personal environment
loadkeys de

### prepare youre proxy and make sure, your local repo has ownership "apt-cacher-ng:apt-cacher-ng"
cp acng.conf /etc/apt-cacher-ng/
chown -R apt-cacher-ng:apt-cacher-ng $MOUNTPOINT/$REPOPATH

### updating the git branch
git pull origin master

### This is a test szenario, execite other scripts as needed
### This suggestion calls my very own script.
# ./uit-build-i386.sh


Then second script:

#!/bin/sh
### Author Hans-J. Ullrich <hans.ullrich@loop.de>
### License: GPL

### Set some variables, not active yet.
### architecture: i386, amd64, arm
ARCH=amd64
### Distribution, you might not want to change it.
DISTRO=kali-rolling
### Your preferred window-manager: lxde, kde, xfce, gnome
VARIANT=lxde
### Environmet for your local proxy
PROXY=http://localhost:3142/
### language, keyboard, locales everything you might not need to change
BOOTAPP="boot=live noconfig=sudo username=root hostname=kali ignore_uuid locales=de_DE.UTF-8 keyboard-layouts=de keyboard-variants=nodeadkeys"

### Clean your system, not really necessarey, as the latter "./build.sh" does
### this either.
# lb clean

### VERY IMPORTANT: Make sure, apt-cacher is started, even, if you are sure,
### it is already running!
/etc/init.d/apt-cacher-ng stop && sleep 3 && /etc/init.d/apt-cacher-ng start

### set your needed environment and preparations.
export http_proxy=http://localhost:3142/
lb config

### This command starts the actual build. All commands are in one line.
### However, this script might be improved, to use variables for better
### configuration possibilities.
./build.sh --arch $ARCH --distribution $DISTRO --variant $VARIANT --verbose -- --apt-http-proxy $PROXY --bootappend-live "$BOOTAPP"

### these options can be used for further commands after build
### for example, if you want to burn a dvd, shutdown, whatever
### Examples for my personal needs below
#/etc/init.d/apt-cacher-ng stop

### Suggestions for handling the built image.
# cp /home/username/live-build-config/images/*.iso /home/user/
# wodim /path_to_your_live_build/live-build-config/images/your_image_name.iso

### Some opportunities at unattended build run, what to do after the build succeeded.
# halt -p
# reboot
# shutdown -h now
Additional Information:
Attached Files: build.log (1,402,727 bytes) 2021-02-19 16:23
https://bugs.kali.org/file_download.php?file_id=2015&type=bug
Notes
(0014241)
rhertzog   
2021-02-23 09:20   
See https://salsa.debian.org/live-team/live-build/-/merge_requests/243 and thread starting at https://lists.debian.org/debian-live/2021/02/msg00018.html

It's indeed a regression in i386.
(0014243)
rhertzog   
2021-02-23 12:41   
I have pushed live-build 20210216kali1 with the fix, it should be soon available in kali-dev and a bit later in kali-rolling.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6905 [Kali Linux] Queued Tool Addition minor have not tried 2020-12-06 05:21 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: chisel - A fast TCP/UDP tunnel over HTTP
Description: [Name] - chisel
[Version] - 1.7.3
[Homepage] - https://github.com/jpillora/chisel
[Download] - https://github.com/jpillora/chisel/tags
[Author] - Jaime Pillora
[License] - MIT ~ https://github.com/jpillora/chisel/blob/master/LICENSE
[Description] - Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014058)
g0tmi1k   
2021-01-08 13:34   
@kali-team, please could this be packaged up.
(0014142)
sbrun   
2021-01-28 13:13   
chisel version 1.7.4-0kali1 in kali-dev

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6750 [Kali Linux] Queued Tool Addition feature N/A 2020-09-26 22:24 2021-02-23 12:36
Reporter: BFreakout Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: WordlistRaider - WordlistRaider is a Python tool for preparing existing wordlists.
Description: WordlistRaider is a Python tool for preparing existing wordlists. As an example we have a GB big wordlist and we only want passwords with a length of at least 8 characters. This optimizes word lists and saves unnecessary requests for brute force attacks.

https://github.com/GregorBiswanger/WordlistRaider

I would be happy if the tool can be installed and used via Kali.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013528)
g0tmi1k   
2020-10-03 00:43   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0013954)
sbrun   
2020-12-08 16:14   
first version 1.0~git20200927-0kali1 of wordlistraider uploaded in kali-dev
(0013955)
BFreakout   
2020-12-08 16:18   
pull request was merged
(0013958)
sbrun   
2020-12-09 07:27   
Thanks for the merge.
wordlistraider is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6513 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-22 16:35 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: Arjun - HTTP parameter discovery suite
Description: [Name] - Arjun
[Homepage] - https://github.com/s0md3v/Arjun
[Download] - https://github.com/s0md3v/Arjun/releases
[Version] - 1.6
[Author] - Somdev Sangwan
[License] - GNU General Public License v3.0
[Dependencies] - ?
[Description] - HTTP parameter discovery suite
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013010)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0013965)
sbrun   
2020-12-11 08:32   
package version 2.0~beta-0kali1 is in kali-dev
(0013976)
sbrun   
2020-12-14 13:35   
version 2.0~beta-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6503 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-20 14:59 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: httprobe - Take a list of domains and probe for working HTTP and HTTPS servers
Description: [Name] - httprobe
[Homepage] - https://github.com/tomnomnom/httprobe
[Download] - https://github.com/tomnomnom/httprobe/releases
[Version] - 0.1.2
[Author] - Tom Hudson
[License] - MIT
[Dependencies] - GoLang
[Description] - Take a list of domains and probe for working HTTP and HTTPS servers
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013016)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0013966)
sbrun   
2020-12-11 08:33   
package version 0.1.2+git20200411-0kali1 is in kali-dev
(0013975)
sbrun   
2020-12-14 13:35   
version 0.1.2+git20200411-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6502 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-20 14:58 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: massdns - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
Description: [Name] - massdns
[Homepage] - https://github.com/blechschmidt/massdns
[Download] - https://github.com/blechschmidt/massdns/releases
[Version] - 0.3
[Author] - B. Blechschmidt
[License] - GNU General Public License v3.0
[Dependencies] - N/A
[Description] - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)

MassDNS is a simple high-performance DNS stub resolver targeting those who seek to resolve a massive amount of domain names in the order of millions or even billions. Without special configuration, MassDNS is capable of resolving over 350,000 names per second using publicly available resolvers.

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013017)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0013974)
sbrun   
2020-12-14 13:33   
version 0.3-0kali2 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6501 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-20 14:56 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: DNSGen - Generates combination of domain names from the provided input.
Description: [Name] - DNSGen
[Homepage] - https://github.com/ProjectAnte/dnsgen
[Download] - https://github.com/ProjectAnte/dnsgen/releases
[Version] - 1.0.4
[Author] - Project Ante
[License] - MIT
[Dependencies] - Click, tldextract
[Description] - Generates combination of domain names from the provided input.

This tool generates a combination of domain names from the provided input. Combinations are created based on wordlist. Custom words are extracted per execution. Refer to Techniques section to learn more.

dnsgen is very similar to altdns. It does not contain DNS resolver. You should use massdns for DNS resolution.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013018)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0013996)
sbrun   
2020-12-23 16:11   
version 1.0.4+git20200324-0kali1 is in kali-dev

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6500 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-20 14:54 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: altdns - Generates permutations, alterations and mutations of subdomains and then resolves them
Description: [Name] - altdns
[Homepage] - https://github.com/infosec-au/altdns
[Download] - N/A
[Version] - N/A
[Author] - Shubs
[License] - Apache License 2.0
[Dependencies] - tldextract, argparse, termcolor, dnspython
[Description] - Generates permutations, alterations and mutations of subdomains and then resolves them
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013019)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0014075)
sbrun   
2021-01-08 14:01   
version 1.0.0+git20200123-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6498 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-20 14:50 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: getallurls (gau) - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
Description: [Name] - getallurls (gau)
[Homepage] - https://github.com/lc/gau
[Download] - https://github.com/lc/gau/releases
[Version] - 1.0.2
[Author] - Corben Leo
[License] - MIT
[Dependencies] - GoLang
[Description] - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013021)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0013949)
sbrun   
2020-12-08 08:45   
version 1.0.7-0kali1 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4797 [Kali Linux] Queued Tool Addition minor have not tried 2018-06-13 09:21 2021-02-23 12:36
Reporter: rzepsky Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: DumpsterDiver - Tool to search secrets in various filetypes.
Description: I'd like to make a request to add the tool the DumpsterDiver (https://github.com/securing/DumpsterDiver) to Kali.

Basically, the goal of this tool is to find key leaks in various filetypes. If you know the TruffleHog, then the DumpsterDiver is an enhanced version, because it can not only find key leaks in github repositories, but also in any readable filetype or in any archive. It also allows for defining multiple greps in advanced search module. I believe this tool is quite effective because it can be easily customized, so it would be nice to have it in Kali's arsenal.

Here's the demo of the basic usage of it https://vimeo.com/272944858.

If you need anything more from me, then please let me know.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0009242)
g0tmi1k   
2018-06-13 10:17   
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

- [Name] - The name of the tool
- [Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
- [Homepage] - Where can the tool be found online? Where to go to get more information?
- [Download] - Where to go to get the tool? either a download page or a link to the latest version
- [Author] - Who made the tool?
- [Licence] - How is the software distributed? What conditions does it come with?
- [Description] - What is the tool about? What does it do?
- [Dependencies] - What is needed for the tool to work?
- [Similar tools] - What other tools are out there?
- [Activity] - When did the project start? Is is still actively being deployed?
- [How to install] - How do you compile it?
--- Note, using source code to acquire (e.g. git clone/svn checkout) can't be used - Also downloading from the head. Please use a "tag" or "release" version.
- [How to use] - What are some basic commands/functions to demonstrate it?
(0009244)
rzepsky   
2018-06-13 15:23   
Sure thing! Info is below. If anything more is needed just let me know ;)
- [Name] - DumpsterDiver
- [Version] - it doesn't uses versioning so far as it is quite little project and I'm working on it alone. However if versioning is important for you, then I can add it.
- [Homepage] - https://github.com/securing/DumpsterDiver
- [Download] - https://github.com/securing/DumpsterDiver
- [Author] - Pawel Rzepa (https://twitter.com/Rzepsky)
- [Licence] - it uses MIT license only requiring preservation of copyright and license notices.
- [Description] - DumpsterDiver is a tool used to analyze big volumes of various file types in search of hardcoded secret keys (e.g. AWS Access Key, Azure Share Key or SSH keys) based on counting the entropy. Additionally, it allows creating a simple search rules with basic conditions (e.g. reports only csv file including at least 10 email addresses).
So basically it opens any text file (e.g. .sql, .config etc), any archive (.zip, .tgz etc.) or git object (look into git logs if there is git repository) and analyze any word in search of finding a string with fixed (configurable) length and count its entropy. If the entropy is high then it is a potential key (e.g. AWS secret key). Additionally it allows for multiple greps in those analyzed.
- [Dependencies] - Python 3 (tested on 3.6.5) and additional libraries: termcolor==1.1.0, PyYAML==3.12
- [Similar tools] - It works similar to TruffleHog (https://github.com/dxa4481/truffleHog) but the DumpsterDiver can do much more: analyze not only git logs, but any kind of text file and git objects too. What is more, the DumpsterDiver is customizable so you can define what legth of key you're searching (e.g. AWS secret key is always 40 byte long so there's no point to analyze longer strings). Thanks to this you can significantly limit false positives, what unfortunately you cannot do in TruffleHog.
- [Activity] - The project has been released 2 weeks ago. It's quite small project, but if any new feature requests appear, then of course I will add them.
- [How to install] - It doesn't require compiling as it is Python script.
- [How to use] - The most basic usage is the following:
> python3 DumpsterDiver.py -p ./path_to_folder_containing_files_to_analyze

It can be really handy for pentesters and researchers so I believe it is worth adding it to Kali. Let me know what do you think about it
(0009350)
rzepsky   
2018-07-09 11:46   
Just would like to notify you, I've added an option to search for hardcoded passwords, writing the output to the JSON file and some options to ease customization. I described how the tool and its feature works in the following article: https://medium.com/@rzepsky/hunting-for-secrets-with-the-dumpsterdiver-93d38a9cd4c1.
(0011900)
g0tmi1k   
2020-01-13 13:45   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0013932)
sbrun   
2020-12-01 14:53   
package version 0~git20200911-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4575 [Kali Linux] Queued Tool Addition minor have not tried 2018-03-01 20:05 2021-02-23 12:36
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: gitleaks - Searches full repo history for secrets and keys
Description: Name: gitleaks
Version: v0.2.0
Homepage: https://github.com/zricethezav/gitleaks
Download: https://github.com/zricethezav/gitleaks/archive/v0.2.0.tar.gz
Author: Zachary Rice (zricethezav)
Licence: GNU General Public License v3.0 (https://github.com/zricethezav/gitleaks/blob/master/LICENSE)
Description: Searches full repo history for secrets and keys
Dependencies: golang
Similar tools: Nothing? Maybe gitDigger...
Activity: 2018-01-27 - Current
How to use: gitleaks {git url}
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0012075)
g0tmi1k   
2020-02-10 14:01   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0014221)
sbrun   
2021-02-16 14:00   
version 7.2.2-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4299 [Kali Linux] Queued Tool Addition minor have not tried 2017-10-08 17:00 2021-02-23 12:36
Reporter: soxrok2212 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: PSKracker - WPA/WPS toolkit for generating default keys/pins
Description: PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C. This is useful for testing/auditing wireless networks and contains bleeding edge algorithms. More are to be supported in the future as they are discovered. Piping into password recovery tools is supported as well (hashcat, aircrack, pyrit, etc).
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0007489)
soxrok2212   
2017-10-08 17:02   
https://github.com/soxrok2212/PSKracker
(0007492)
kimocoder   
2017-10-08 19:21   
This tool is very interesting. cloned it yesterday and it looks very promising. Thanks
(0007494)
g0tmi1k   
2017-10-09 10:42   
Name: PSKracker
Version: 0.2
Homepage: https://github.com/soxrok2212/PSKracker
Download: https://github.com/soxrok2212/PSKracker/archive/0.2.tar.gz
License: GNU v3.0 (https://github.com/soxrok2212/PSKracker/blob/master/LICENSE)
Description: PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C.
(0007501)
dookie   
2017-10-09 17:00   
This tool could be interesting but until it has better documentation, I would not recommend adding it to Kali.
(0007503)
soxrok2212   
2017-10-09 17:50   
What type of documentation are you looking for? Anything specific?
(0007504)
kimocoder   
2017-10-09 18:11   
Well, some more documentation would be great. Like:

* Complete usage examples
* Howto obtain 'serial number'

etc
(0007505)
dookie   
2017-10-09 19:30   
What does the program do? It claims to be an all-in-one toolkit but doesn't have any usage information. Does it manage the wireless interface? Does it handle packet injection?

Why should someone use this tool over others, like aircrack-ng, wifite, pixiewps, etc?
(0007527)
soxrok2212   
2017-10-14 15:42   
Well, per the description, "PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C". This tool does not manage wireless interfaces or do any sort of hardware managing/controlling.

Reaver, bully, aircrack etc are all used primarily for
a. gathering data
b. testing some output from such gathered data

This tool is designed to use the gathered data and produce some output to be used for testing the security of your network... i.e for select ATT models, pass in the encryption type and model number and the output will be all possible 2.1 billion keys (pipe into hashcat with the network capture and you will find the key). For Xfinity, pass in the Mac, security type, and model and you will get the XHS-XXXXXXXX key. The documentation would be HUGE if every detail were included in the repository itself. Feel free to ask any more questions!
(0007546)
dookie   
2017-10-19 14:50   
We are not the audience for your tool, your potential users are. If they cannot figure out what it does and see examples of it working in the documentation, they will not use it, nor will it be packaged.
(0009120)
soxrok2212   
2018-05-07 01:51   
I've added documentation to the Wiki.

https://github.com/soxrok2212/PSKracker/wiki/Attack-Types-and-Supported-Models

Please let me know if there is anything more I can do.
(0012538)
g0tmi1k   
2020-03-25 13:32   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0013933)
sbrun   
2020-12-01 14:54   
package version 0.2.1+git20201103-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
3941 [Kali Linux] Queued Tool Addition minor have not tried 2017-03-30 18:23 2021-02-23 12:36
Reporter: v1s1t0r Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: airgeddon - A multi-use bash script for Linux systems to audit wireless networks.
Description: -Name: airgeddon
-Version: 6.11
-Homepage: https://github.com/v1s1t0r1sh3r3/airgeddon
-Licence: GPLv3+

-Description:
airgeddon is a very robust tool to audit wireless networks. Is 100% compatible with Kali and many other Linux distros including Kali on raspberry Pi. Already included in other pentesting Linux distros (like BlackArch or Wifislax). One year of hard developing. Serious project with translation to 7 languages and clean code checked with shellcheck tool (free of warnings).

-Features:
*Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing
*DoS over wireless networks using different methods
*Assisted Handshake file capturing
*Cleaning and optimizing Handshake captured files
*Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule based)
*Evil Twin attacks (Rogue AP):
    Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS)
    Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap)
    Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip)
    Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF)
    Captive portal with "DNS blackhole" to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd)
    Optional MAC spoofing for all Evil Twin attacks
*WPS features
    WPS scanning (wash). Self parameterization to avoid "bad fcs" problem
    Custom PIN association (bully and reaver)
    Pixie Dust attacks (bully and reaver)
    Bruteforce PIN attacks (bully and reaver)
    Parameterizable timeouts
    Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update
    Integration of the most common PIN generation algorithms
*Compatibility with many Linux distributions (see Requirements section)
*Easy targeting and selection in every section
*Drag and drop files on console window for entering file paths
*Dynamic screen resolution detection and windows auto-sizing for optimal viewing
*Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired
*Multilanguage support and autodetect OS language feature (see Supported Languages section)
*Help hints in every zone/menu for easy use
*Auto-update. Script checks for newer version if possible

-On development now:
Dockerfile
WEP "all-in-one" attack <- yes, you read well... WEP :) it must be a swiss knife.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0006543)
v1s1t0r   
2017-03-30 18:32   
From all github's stuff, only 3 files needed to run:
airgeddon.sh
language_strings.sh
known_pins.db
(0008349)
g0tmi1k   
2018-01-29 14:27   
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

- [Name] - The name of the tool
- [Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
- [Homepage] - Where can the tool be found online? Where to go to get more information?
- [Download] - Where to go to get the tool?
- [Author] - Who made the tool?
- [Licence] - How is the software distributed? What conditions does it come with?
- [Description] - What is the tool about? What does it do?
- [Dependencies] - What is needed for the tool to work?
- [Similar tools] - What other tools are out there?
- [How to install] - How do you compile it?
- [How to use] - What are some basic commands/functions to demonstrate it?
(0008551)
v1s1t0r   
2018-01-29 19:41   
I'll answer to all the requisites:

- [Name] - airgeddon
- [Version] - Last stable version right now is v7.23 which could be great to add but if we wait less than a month we can add v8.0 which will have full 5ghz support. We have git tags matching all the stable versions.
- [Homepage] - https://github.com/v1s1t0r1sh3r3/airgeddon . And more info on wiki: https://github.com/v1s1t0r1sh3r3/airgeddon/wiki
- [Download] - From github: https://github.com/v1s1t0r1sh3r3/airgeddon.git
- [Author] - v1s1t0r and collaborators.
- [Licence] - GPLv3+
- [Description] - This is a multi-use bash script for Linux systems to audit wireless networks.
- [Dependencies] - It has 3 types of dependencies. Essential, optional and internal. All essential are included by default on Kali, so airgeddon can be run without any problem. Almost all optional and internal are included by default on Kali too and which are not included by default are easily installable by apt. More info here about the dependencies: https://github.com/v1s1t0r1sh3r3/airgeddon/wiki/Requirements
- [Similar tools] - There are some tools for wireless hacking but there is no one as big and with the variety of attacks like airgeddon. In addition, airgeddon have some unique features like Evil Twin with BeEF integrated, pursuit mode attack, own WPS PIN db to search through and 5ghz full support which is incoming.
- [How to install] - It's bash, no compilation needed.
- [How to use] - Just run it and follow instructions and menues on screen.
(0012204)
six2dez   
2020-02-11 11:22   
Hey,

when are you going to include this tool in Kali? I saw that they have already created a repository in GitLab (https://gitlab.com/v1s1t0r1sh3r3/airgeddon) following your requirements. It's a "must" in a pentester toolbox... So... when? @g0tmi1k
(0012547)
xpz3   
2020-03-26 12:05   
Hello,
A lot more features have been added and the tool has evolved into a wifi pentest framework. I believe kali is not just for advanced users and newbie people like me could also benefit a lot using such scripts serving as a stepping stone into the pentest world.
I have personally also tested this tool on Kali Nethunter too which works flawlessly. I think it'd be great if this tool get added to the Kali repo. @g0tmi1k
(0012551)
g0tmi1k   
2020-03-27 13:53   
@author, thanks for the contribution!
@kali-team, please review the package
(0012556)
v1s1t0r   
2020-03-28 08:31   
Awesome news to be added at last to Kali repositories!

The repo I created time ago on Gitlab passing all lintian checks is located at: https://gitlab.com/v1s1t0r1sh3r3/airgeddon
Yesterday it was updated with the last version.

Tell us if you need anything more from our side. You can locate us at IRC or at Discord (our airgeddon channel invitation link: https://discord.gg/sQ9dgt9). There, the main maintainer admin OscarAkaElvis can help you with any doubt. Regards.
(0012771)
v1s1t0r   
2020-05-12 10:56   
Any update on this @kali-team ? thanks.
(0012926)
spmugre   
2020-06-15 22:27   
I can't find it by apt on repos, not added yet?
(0013985)
sbrun   
2020-12-16 15:29   
I have uploaded the package in kali-dev-only.
It will be available soon in kali-rolling.

@v1s1t0r thanks for the packaging on the gitlab repo.
(0013986)
v1s1t0r   
2020-12-16 16:06   
I will keep it updated after every release if that is easier for you. Not sure if is needed or if you now take releases from main Github repo.
(0013989)
v1s1t0r   
2020-12-16 20:01   
Hi, I changed my kali repos to point to dev in order to test airgeddon before reaching rolling and I detected one anomaly... it is installed and it works, but there is no direct access icon on the menus. I guess it should be at wireless section like reaver, aircrack-ng or any other wifi related tools. The .png icon is already available on imgs dir if you want to use it.

Not sure if this could help you... on github (https://github.com/v1s1t0r1sh3r3/airgeddon) I have that done in a .deb file I usually prepare for kali users. It is on /binaries/kali directory. Inside, I have this already done in two places. One is at /usr/share/kali-menu/applications/kali-airgeddon.desktop and the other is at /usr/share/applications/kali-airgeddon.desktop , and both have this content:

[Desktop Entry]
Name=airgeddon
Encoding=UTF-8
Exec=bash -c "airgeddon;${SHELL:-bash}"
Icon=kali-airgeddon.png
StartupNotify=false
Terminal=true
Type=Application
Categories=06-wireless-attacks;
X-Kali-Package=airgeddon

Maybe we are in time to fix it before reaching rolling repos. Thanks!
(0013990)
sbrun   
2020-12-17 08:17   
You don't need to update the gitlab repo. We will take the next releases from the main Github repo. Thanks!
(0013997)
sbrun   
2020-12-23 16:12   
airgeddon is in kali-rolling and in the kali-menu (2021.1.2)

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7060 [Kali Linux] Kali Package Bug major always 2021-02-23 00:14 2021-02-23 08:56
Reporter: shg8 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: libpcap-dev new version 1.10.0-2 doesn't have support for IEEE 802.11 (armhf)
Description: My program uses libpcap to capture wireless packets. When I tried to use libpcap-dev on armhf to capture IEEE 802.11 packets, there's an error message "That device doesn't support monitor mode," even though my network adapter supports monitor mode. The adapter works fine with aircrack-ng. **The last version of libpcap 1.9.1-4 also works perfectly fine.** The new version seems to be compiled without support for 802.11 packets.

uname -r
 -- 4.19.118-Re4son-v7+

dpkg -s libc6
 -- Version: 2.31-4

hardware: Raspberry Pi 3B+
Steps To Reproduce: tcpdump -I wlan0mon
 -- That device doesn't support monitor mode.

tcpdump -i wlan0mon (without 802.11 headers)
 -- works fine. wireless packets are captured without headers
Additional Information:
Attached Files:
Notes
(0014239)
shg8   
2021-02-23 00:28   
libnl-3-dev is installed as well

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7058 [Kali Linux] Tool Upgrade minor have not tried 2021-02-21 18:52 2021-02-23 07:32
Reporter: tractor90 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: burpsuite outdates
Description: can it pls be updated? getting a prompt on every start
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014240)
sbrun   
2021-02-23 07:32   
new version 2021.2.1-0kali1 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7055 [Kali Linux] Kali Package Bug major always 2021-02-18 21:48 2021-02-22 21:17
Reporter: cmohre Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Linux does not install on fit-PC2
Description: The latest Kali Linux distributions do not install on fit-PC2 devices. The install cannot determine the hard disk, which is a Hitachi HTS545016B9A300 160GB drive, and there is no support found on the web.
Steps To Reproduce: Simply run the Kali Linux installer from a USB stick.
Additional Information:
Attached Files:
Notes
(0014232)
steev   
2021-02-19 03:42   
Can you choose the option for logs from the installer menu, and grab the dmesg output? In order to tell why it's not detecting, we're gonna need to see what the kernel is saying about SATA for that device.
(0014237)
cmohre   
2021-02-22 21:17   
Sorry for the delay in responding - I was out of town for my daughter. I don't use Linux systems very often in my work (once every 6 projects) - I have turned on logging as early as I can - sending it to the web. The first time, I received two files - a hardware summary and a syslog. The second time, a couple more files including a partition manager - but the Installer hung here (the fit-PC2 was also very, very hot by this time - not sure if that changed the performance or not). Do you want me to upload the syslog (seems to be the only file with pertinent information)?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7059 [Kali Linux] Kali Package Bug minor always 2021-02-22 16:55 2021-02-22 16:55
Reporter: quiverbonnet Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: flameshot two systray icons
Description: starting flameshot puts two icons in systray. closing one closes both and all flameshot process
Steps To Reproduce: - apt-get install flameshot
- start flameshot
- view system tray
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7014 [Kali Linux] Kali Package Bug trivial always 2021-01-29 06:37 2021-02-21 18:20
Reporter: steve4c1 Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Trying to download
Description: Trying to download repository from a PRIVATE IP address instead of a PUBLIC IP address. Since Private IP's are non-routeable, the system is not able to download the repository's. This should be the Public IP that it is trying to download from since Public IP's are what can be routeable over the web.
Steps To Reproduce: sudo apt full-upgrade -y
Additional Information:
Attached Files: Screenshot_2021-01-28_14-28-37.png (208,045 bytes) 2021-01-29 06:37
https://bugs.kali.org/file_download.php?file_id=2006&type=bug
png
Notes
(0014145)
steve4c1   
2021-01-29 06:44   
Correction, I forgot the 192.99.200.0/24 is still technically a public IP address - but still, will not download
(0014236)
steev   
2021-02-21 18:20   
Did you run apt update first?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6951 [Kali Linux] Feature Requests minor N/A 2020-12-26 07:58 2021-02-21 18:19
Reporter: gurri Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Cant download ANYTHING
Description:  as soon as i type sudo apt-get install volatility
there is an error that it is unavailable.
similar for all other packages
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014101)
daniruiz   
2021-01-11 10:04   
Did you run `sudo apt update` first.
Is your OS clock in time?
(0014235)
steev   
2021-02-21 18:19   
Also, volatility is no longer available (due to it being python 2, which is EOL) and volatility 3 is not packaged because the license is overly broad.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6108 [Kali Linux] Kali Package Bug minor always 2020-02-17 18:04 2021-02-21 17:52
Reporter: OS-69474 Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: nmap segfault due to lua-lpeg
Description: Scanning a specific lab host using the vulners script will consistently lead to a crash. I made a post about it in the PWK forums.
Steps To Reproduce:
Additional Information: Log from dmesg:

[14294.399735] nmap[13062]: segfault at 7ffe3cddeff8 ip 00007ff3ca9264c7 sp 00007ffe3cddf000 error 6 in liblua5.3-lpeg.so.2.0.0[7ff3ca920000+a000]
[14294.399745] Code: 8d 50 f1 80 fa 01 77 0b b8 01 00 00 00 5b c3 0f 1f 40 00 48 8b 15 09 3b 20 00 0f b6 04 02 3c 01 74 21 3c 02 75 2d 48 8d 7b 08 <e8> 64 ba ff ff 85 c0 75 d5 48 63 43 04 48 8d 1c c3 eb ba 66 0f 1f


I was able to resolve the problem for myself by building the lua-lpeg package with the following patch included: https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=942031;filename=lua-lpeg_1.0.0-2ubuntu1.debdiff;msg=5
Attached Files:
Notes
(0012297)
rhertzog   
2020-02-18 10:01   
Thanks for the report. I pinged the Debian maintainer privately to try to get the fix into Debian, possibly by packaging the new upstream release 1.0.2. https://tracker.debian.org/pkg/lua-lpeg

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
2626 [Kali Linux] Kali Package Bug major always 2015-09-07 12:57 2021-02-21 17:52
Reporter: rhertzog Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: kali-dev  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: bulk-extractor fails to build with the new libstdc++ of gcc-5
Description: Extract from bulk-extractor_1.5.1-0kali2+b1-kali-dev-amd64-20150907-122749.967.log for the precise error:

exif_entry.cpp: In function 'std::__cxx11::string get_possible_utf8(const sbuf_t&, size_t)':
exif_entry.cpp:1185:14: error: 'const class sbuf_t' has no member named 'getUTF8WithQuoting'
         sbuf.getUTF8WithQuoting(0, count, s);
              ^
make[3]: *** [exif_entry.o] Error 1
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0003964)
rhertzog   
2015-09-07 15:56   
(Dropped link from the description as requested)

A new upstream version has been imported (1.5.3+git20150907-0kali1) and it's building fine again. But it was probably not related to the gcc-5 move.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
3218 [Kali Linux] Kali Package Bug minor have not tried 2016-04-06 21:01 2021-02-21 17:52
Reporter: bershama Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2016.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Videos:This file cannot be played over the network. Try downloading it locally first.
Description: Everything was working fine. After I updated & upgraded kali linux with -> "apt-get update" "apt-get upgrade" and i made reboot now videos give me this error! so anyway i cant open any video/music.I tried different files everything. I'm not using VMware. Kali linux is on PC. Videos is really important to me!
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot from 2016-04-06 23-00-08.png (31,272 bytes) 2016-04-06 21:01
https://bugs.kali.org/file_download.php?file_id=658&type=bug
png
Notes
(0005094)
rhertzog   
2016-04-07 07:02   
Do you have installed gstreamer1.0-plugins-bad and gstreamer1.0-plugins-ugly?

Are you sure that this file does not require some unsupported codecs?
(0005095)
sbrun   
2016-04-07 07:21   
This issue was also reported in Debian:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819960
(0005096)
rhertzog   
2016-04-07 09:14   
So this problem is a mismatch of versions between gstreamer plugins and libgstreamer. This problem should be fixed soon. I updated the packages in kali-rolling and they should be fixed in debian testing soon as well.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6722 [Kali Linux] General Bug minor always 2020-09-15 21:27 2021-02-21 17:51
Reporter: hubbardmeister@gmail.com Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: pci errors fill up syslog using Realtek usb device
Description: Hi,
Informational -
Since moving to this kernel , System log fills hardrive with pci errors in relation to the Realtek usb device. There is some clear error with the Driver. Prior to this upgrade from Kernel 4 to 5 this was not a problem.

Linux [hostname] 5.6.0-kali2-amd64 0000001 SMP Debian 5.6.14-2kali1 (2020-06-10) x86_64 GNU/Linux
lsb_release -a
No LSB modules are available.
Distributor ID: Kali
Description: Kali GNU/Linux Rolling
Release: 2020.2
Codename: kali-rolling


lsusb =>
Bus 001 Device 002: ID 0bda:2838 Realtek Semiconductor Corp. RTL2838 DVB-T

lspci =>
2:00.0 Network controller: Realtek Semiconductor Co., Ltd. RTL8723BE PCIe Wireless Network Adapter
    Subsystem: Realtek Semiconductor Co., Ltd. Dell Wireless 1801
    Flags: bus master, fast devsel, latency 0, IRQ 16, IOMMU group 8
    I/O ports at d000 [size=256]
    Memory at df100000 (64-bit, non-prefetchable) [size=16K]
    Capabilities: <access denied>
    Kernel driver in use: rtl8723be
    Kernel modules: rtl8723be





lsmod | grep rtl
rtl8723be 106496 0
btcoexist 167936 1 rtl8723be
rtl8723_common 28672 1 rtl8723be
rtl_pci 32768 1 rtl8723be
btrtl 24576 1 btusb
rtlwifi 102400 4 rtl_pci,rtl8723be,btcoexist,rtl8723_common
mac80211 892928 3 rtl_pci,rtl8723be,rtlwifi
bluetooth 667648 5 btrtl,btintel,btbcm,btusb
cfg80211 864256 2 rtlwifi,mac80211

Seems like similar bug as....
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521173
Steps To Reproduce: Run airodump-ng to the wan/usb interface.
Log fills rapidly to TB's and system then effectively halts due to drive being full!!
Additional Information: Workaround - Disabled aer and msi in the kernel boot options for grub.

**When AER is enabled, a PCI Express device will automatically send an error message to the PCIe root port above it when the device captures an error. The Root Port, upon receiving an error reporting message, internally processes and logs the error message in its PCI Express capability structure

/etc/default/grub

GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT="quiet pci=noaer,nomsi"
GRUB_CMDLINE_LINUX=""

Attached Files:
Notes
(0013429)
hubbardmeister@gmail.com   
2020-09-15 22:18   
Put wrong driver in there - This is the RTL2838 DVB-T ...

usb 001 Device 002: ID 0bda:2838 Realtek Semiconductor Corp. RTL2838 DVB-T, looking to see if there is a latest version i can find to install.
(0013442)
hubbardmeister@gmail.com   
2020-09-16 16:38   
The driver does not appear to have aer support, who owns this ?.

https://www.kernel.org/doc/html/latest/PCI/pcieaer-howto.html

from strace...

3809 ioctl(3, SIOCETHTOOL, 0x7ffdfc154670) = 0
3809 fstat(1, {st_mode=S_IFIFO|0600, st_size=0, ...}) = 0
3809 brk(NULL) = 0x559f646ab000
3809 brk(0x559f646cc000) = 0x559f646cc000
3809 write(1, "driver: rtl8723be\nversion: 5.6.0"..., 235 <unfinished ...>
3763 <... read resumed>"driver: rtl8723be\nversion: 5.6.0"..., 128) = 128

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6708 [Kali Linux] Kali Package Bug tweak always 2020-09-06 16:39 2021-02-21 17:51
Reporter: 0x3qt Platform:  
Assigned To: daniruiz OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2020.4  
    Target Version:  
Summary: Impossible to resize font on QTerminal
Description: Hi Team,
I just upgraded my distro to the latest released version, 2020.3, and by often using my laptop by connecting it to the TV screen, I needed to resize the display and font. No problem with the resolution, but it is impossible to change and resize the QTerminal font using the preferences section. I also tried a clean installation, but it still happens.
I haven't solved it yet, but in the meantime I'm using ctrl+/ctrl- to deceive this issue.
Steps To Reproduce: QTerminal > File > Preferences... > Font [Change] > Modify the font +/- > Ok > Apply
Additional Information:
Attached Files: out.ogv (1,589,888 bytes) 2020-09-06 16:39
https://bugs.kali.org/file_download.php?file_id=1890&type=bug
Notes
(0013405)
daniruiz   
2020-09-08 19:13   
Fixed with kali-themes 2020.4.1

You need to remove your local settings ~/.config/qterminal.org/qterminal.ini

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5994 [Kali Linux] Kali Package Bug minor sometimes 2020-01-14 06:39 2021-02-21 17:51
Reporter: techguy Platform:  
Assigned To: daniruiz OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2019.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: The VMSVGA Graphics Controller issue with Kali Linux
Description: The VMSVGA Graphics Controller seems to have issues with Graphics in Kali Linux as the contents of Usual Application program windows including the Terminal windows won't appear until the mouse cursor is kept in the application icon on top Panel bar. The application window remains there but with no contents at all.
Steps To Reproduce: Tried 3-4 times with VMSVGA Graphics Controller followed by selecting VBoxVGA that worked well. However, after once VBoxVGA corrected the issue, tried again with VMSVGA and this time it, so far, is working fine without reproducing the same issue.
Additional Information:
Attached Files:
Notes
(0013110)
daniruiz   
2020-07-22 10:48   
This is an issue with 3D acceleration that was fixed on both xfce's window-manager and virtualbox

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6086 [Kali Linux] Kali Websites & Docs minor always 2020-02-08 15:28 2021-02-21 17:51
Reporter: steevelex Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Website link is pointing to locahost
Description: The link to the "Porting NetHunter page" on the page "Modifying the Kernel" lead to "http://localhost:1414/docs/nethunter/porting-nethunter/"
Steps To Reproduce: 1. Navigate to the link : https://www.kali.org/docs/nethunter/modifying-the-kernel/

2. View the link "Porting NetHunter page " of the first paragraph of "Modifying the Kernel" :

We will continue from the Porting NetHunter page and work on the Galaxy Note 3 kernel as an example. The idea stays the same though: replace the defconfig with one that is used by your kernel.

>>> The link lead to "http://localhost:1414/docs/nethunter/porting-nethunter/"
Additional Information:
Attached Files: Screenshot from 2020-02-08 17-11-46.png (149,775 bytes) 2020-02-08 15:28
https://bugs.kali.org/file_download.php?file_id=1618&type=bug
png
Notes
(0012274)
g0tmi1k   
2020-02-13 14:42   
Thanks for the report.

Should now be fixed ~ https://gitlab.com/kalilinux/documentation/kali-docs/-/commit/7e362a35e5cae0504baaeaa34ffe1d34ae39b14f

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5889 [Kali Linux] Kali Websites & Docs minor unable to reproduce 2019-12-08 16:22 2021-02-21 17:50
Reporter: akejjeka Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2020.1  
    Target Version:  
Summary: unable to connect to kali's online service
Description: Hello

FRANCE: yesterday and the day before yesterday impossible to connect to the online services of kali, I was obliged to go through the TOR service to connect to the service kali.org and the bugs.kali.org to file a return of the bug on the WIFI, but impossible to post the BUG through the TOR service (I understand for security reasons but it can be embarrassing)
Steps To Reproduce:
Additional Information:
Attached Files: bug-kali-1.png (219,643 bytes) 2019-12-08 16:22
https://bugs.kali.org/file_download.php?file_id=1509&type=bug
png

bug-kali-2.png (223,752 bytes) 2019-12-08 16:22
https://bugs.kali.org/file_download.php?file_id=1510&type=bug
png

bug-imposible.png (86,731 bytes) 2019-12-08 16:22
https://bugs.kali.org/file_download.php?file_id=1511&type=bug
png
Notes
(0011627)
rhertzog   
2019-12-10 09:45   
I'm not quite sure what your bug is about. The webapp firewall (sucuri) is sometimes to picky and doesn't like some stuff that we might be pasting in the form. One way to avoid problems is to provide the logs as attachment and/or link to some hosted service.

The problem with the wifi device being renamed should be fixed with kali-defaults 2020.1.0.

To disable the MAC-based naming, kali-defaults is now setting up this symlink:
ln -sf /dev/null /etc/systemd/network/73-usb-net-by-mac.link

This regression is related to a change in systemd 244-2 that replaced the former udev rule with this systemd configuration file.

If your bug is about something else, feel free to reopen and clarify the issue. But we usually can't deal with hardware support issues.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5083 [Kali Linux] General Bug minor have not tried 2018-11-07 18:09 2021-02-21 17:50
Reporter: Deliormanl1 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2018.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Linux desktop files not showing
Description: Hello!
I can not use the desktop. When I press the right mouse button, it shows 3 options (You can see from the picture). How can I fix it?
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot from 2018-11-07 18-59-40.png (1,913,307 bytes) 2018-11-07 18:09
https://bugs.kali.org/file_download.php?file_id=1239&type=bug
Notes
(0009933)
sbrun   
2018-11-08 13:58   
You need to install a new extension gnome-shell-extension-desktop-icons
Please see issue 4983 for more information

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5052 [Kali Linux] Kali Websites & Docs minor have not tried 2018-10-25 16:51 2021-02-21 17:50
Reporter: bezawadaharikrishna Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2018.2  
Product Build: Resolution: duplicate  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Types is twice in documentation page
Description: Hi,
While I am reading the document here https://www.kali.org/kali-linux-documentation found is twice at line 1 in Paragraph 3.

Fix that ASAP.

Best Wishes.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0009836)
g0tmi1k   
2018-10-26 07:23   
Fixed! Thank you

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
2395 [Kali Linux] New Tool Requests feature N/A 2015-07-07 05:19 2021-02-21 17:50
Reporter: jobroche Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2017.3  
    Target Version:  
Summary: Add InSpy v2.0.2 - A LinkedIn enumeration tool
Description: This script enumerates employee names and titles from any organization
using LinkedIn. It outputs all identified employees, titles and their respective emails (if the argument is provided) to assist with social engineering engagements or information gathering.

This script is fast, lightweight and does not require any additional libraries to be downloaded within Kali.

This would be my first contribution to the Kali Linux distribution and would love to have my script/tool implemented.

Please see screenshot for sample output.

Script: https://github.com/gojhonny/InSpy
Steps To Reproduce:
Additional Information:
Attached Files: inspy_output.png (505,430 bytes) 2015-07-07 05:19
https://bugs.kali.org/file_download.php?file_id=456&type=bug
Notes
(0006879)
rhertzog   
2017-07-08 18:13   
Waiting ack from g0tmi1k.
(0006920)
g0tmi1k   
2017-07-18 14:13   
ACK.

Name: InSpy
Version: 2.0.2
Homepage: https://github.com/gojhonny/InSpy
Download: https://github.com/gojhonny/InSpy/archive/2.0.2.tar.gz
License: MIT ~ https://github.com/gojhonny/InSpy/blob/master/LICENSE
Description: A LinkedIn enumeration tool

There is nothing in Kali yet that supports what this does.
Handy for Open Source Intelligence (OSINT) gathering.
(0006942)
jobroche   
2017-07-20 12:24   
Script has been updated, latest download may be found at: https://github.com/gojhonny/InSpy/archive/2.0.3.tar.gz
(0007199)
sbrun   
2017-08-30 09:32   
(Last edited: 2017-08-30 09:34)
I just upload inspy version 2.0.3-0kali1 in kali-dev-only

As logs are not handled correctly for Kali, I preferred to disable them. If there is a real need, I can reactivate them and try to patch the code for Kali.

command: inspy -h


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
416 [Kali Linux] New Tool Requests feature N/A 2013-06-22 02:45 2021-02-21 17:49
Reporter: altjx Platform:  
Assigned To: dookie OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 1.0.6  
    Target Version:  
Summary: iSMTP - SMTP spoofing, SMTP relay, and SMTP enumeration (all in one script)
Description: I would love to have this tool implemented and gain feedback from other people. While there are several tools out there that either do SMTP spoofing, SMTP relaying, OR SMTP enumeration testing, there is none out there for all three.

Even for tools that conducts SMTP enumeration tests, they mostly only test either via SMTP RCPT TO or SMTP VRFY. Not both (or they don't give you the choice to choose between the two).

With this script. You can perform SMTP spoofing, SMTP relaying, and SMTP enumeration (via RCPT TO and/or VRFY) all with one line. You can do all of the tests at once, or you can only conduct a specific combination (e.g., spoofing and relay, spoofing and enum, enum and relay, etc.).

Please see screenshot.
Steps To Reproduce:
Additional Information:
Attached Files: iSMTP.bmp (1,651,374 bytes) 2013-06-22 02:45
https://bugs.kali.org/file_download.php?file_id=57&type=bug
Notes
(0000588)
altjx   
2013-06-22 02:48   
Github link: https://github.com/altjx/ipwn/blob/master/iSMTP/iSMTP.py
(0001116)
dookie   
2013-12-02 22:03   
Added in ismtp_1.6-1kali0. It will be in the repos soon.
Note that the binary name in Kali is ismtp.

Thanks for the suggestion.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
584 [Kali Linux] Tool Upgrade block always 2013-09-15 21:47 2021-02-21 17:49
Reporter: jaimechiquita111 Platform:  
Assigned To: dookie OS: Kali  
Priority: none OS Version: 1.0.4  
Status: resolved Product Version: 1.0.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 1.0.6  
    Target Version:  
Summary: SET menu outdated
Description: I've all the updates installed, do it dayli.
After updated Social Engineering Toolkit, the command has changed from "set-toolkit" >> "setoolkit"
Steps To Reproduce: Started from Kali Linux menu
Additional Information: menu outdated
Attached Files:
Notes
(0001011)
dookie   
2013-10-15 17:07   
Fixed in kali-menu_1.361. It will be in the repos soon.

Thanks for the report.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6397 [Kali Linux] Feature Requests minor always 2020-05-19 16:07 2021-02-21 17:48
Reporter: 4rbee Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: No Mongo Client in Repo
Description: There is no mongo client in the repo (that I have found) to connect to and assess Mongodb instances.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6491 [Kali Linux] General Bug minor always 2020-06-18 01:06 2021-02-21 17:48
Reporter: carlosnewmusic Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Apt-build crashes the system when compiling
Description: Apt-build crashes the system when compiling, filling all ram and swap memory, and leaving the system completely frozen, only responding to a REISUB
Steps To Reproduce: apt-build update; apt-build upgrade
Additional Information: when it freezes the system is building a qt5-base* related package
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6529 [Kali Linux] Kali Package Bug minor always 2020-06-28 08:53 2021-02-21 17:48
Reporter: noobdanger Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: bug in kali linux
Description: in latest kali linux if we create a new user
and then try to login with the same user
its no logging in because automatically the user home directory is not being created

kindly analyse this
Steps To Reproduce: 1.create a new user
2.login with the same user
3.it wont log in because lack of home directory
4.Thats it
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6572 [Kali Linux] Kali Package Bug minor always 2020-07-13 20:42 2021-02-21 17:48
Reporter: WolverineAS Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Hi Kali 2020.2 installer pakage contains some type of trojen.
Description: Hi Team,
While downloading kali Linux from official website my antivirus is detecting some type of Trojan in package, so I can't download properly kindly check and resolve ASAP.

Trojan Name - Trojan.Linux.GenericA.75142

Check and do some needful.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6719 [Kali Linux] General Bug minor always 2020-09-13 09:10 2021-02-21 17:48
Reporter: Clef Astroville Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Root password is displaying incorrect password for vm workstation
Description: Getting incorrect password when I tried to login root with the default password on vm workstation
And I haven't changed the password before
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6777 [Kali Linux] General Bug minor always 2020-10-09 01:11 2021-02-21 17:48
Reporter: Noob_hackerx Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Desktop Releted operation
Description: I recently have updated mt PC to kali2020.3 but after the update i am unable to see my desktop icons in root as well as other in other user so please fix it ASAP.
Steps To Reproduce: continues happening whenever i login to my pc.
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6796 [Kali Linux] General Bug minor always 2020-10-21 16:37 2021-02-21 17:48
Reporter: wrathofgod Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Tiger VNC viewer - unable to connect to socket: Connection refused (10061)
Description: Unable to connect to that server, every single time.


Steps To Reproduce: In bash

kex
>then error pops-up.
Additional Information: I already configured firewall ports 5900, 5901, 5800, 5802, 2 to be opened.

And still wont give me access to. I already checked every single forum and videos...

Strangely sometimes works, but, it says, unsecured login... why?
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6806 [Kali Linux] General Bug minor always 2020-10-27 17:37 2021-02-21 17:47
Reporter: obaquero Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Block Screen more
Description: Open screen and bottom Más, no open.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6879 [Kali Linux] Kali Package Improvement minor always 2020-11-24 06:33 2021-02-21 17:46
Reporter: vasanthhunter Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: DOS
Description: Hi Team

I would like to report a vulnerability on KALI OS.

DESCRIPTION
============

VULNERABILITY NAME : DOS

Kali linux is an very fast when compared to other OPERATING SYSTEM.But when i download a one text file which consists of many letters.When i open the text file my system crashes and text editor is not responding which is an denial of service
Steps To Reproduce: 1.Download name.txt which i have attached in the mail address
2.Open the file it will load for long time and finally it will shown an not responding message
Additional Information: IMPACT
*********
1.Crash the KALI OS
2.Slowdone any one's account
Attached Files: name.txt (1,452,000 bytes) 2020-11-24 06:33
https://bugs.kali.org/file_download.php?file_id=1948&type=bug
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6937 [Kali Linux] Kali Package Bug minor have not tried 2020-12-20 11:27 2021-02-21 17:46
Reporter: ianf Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Found on antivirus scan, Windows 10 Pro 20H2 OS build 19042.685
Description: Detected: Trojan:PHP/RevWebshell.YA!MTB
Date: 20/12/20 22:07
Details: This program is dangerous and executes commands from an attacker.
containerfile: D:\Downloads\kali-linux-2020.4-installer-amd64.iso
file: D:\Downloads\kali-linux-2020.4-installer-amd64.iso->pool\main\b\beef-xss\beef-xss_0.5.0.0+git20191218-0kali2_all.deb->data.tar.xz->(xz)->./usr/share/beef-xss/modules/exploits/m0n0wall/php-reverse-shell.php

Steps To Reproduce:
Additional Information: Is this a real threat, or Windows Defender enthusiasm?
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7015 [Kali Linux] Kali Package Bug minor always 2021-01-29 16:28 2021-02-21 17:45
Reporter: Anonymous-Sam Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Bluetooth not starting
Description: Bluetooth driver not working even after starting the bluetooth service.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7047 [Kali Linux] General Bug block N/A 2021-02-10 23:27 2021-02-21 17:45
Reporter: TeamSpeakUser Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: TeamSpeak 3
Description: When I use teamspeak 3 client I can connect to any server except hosteam servers
AS 51290
AS Name HOSTEAM-AS, PL
AS Prefixes
31.133.0.0/21
5.252.201.0/24
193.8.236.0/23
5.252.200.0/24
91.216.191.0/24
178.217.184.0/21
193.9.30.0/23
91.224.220.0/23
91.206.26.0/23
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7054 [Kali Linux] General Bug minor always 2021-02-18 12:37 2021-02-20 17:50
Reporter: jaymori11 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Desktop
Description: when i started kali linux it's desktop wasn't able to see.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014231)
kali-bugreport   
2021-02-18 15:33   
Do you think that this issue contains enough information? (Hint: It doesn't :-))

See e.g. https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/ what info is required / should be provided for the Kali team.
(0014234)
Michu   
2021-02-20 17:50   
yeah it doesn't but you already found it out but could provide what you did before this problem started what you see now write if there's any debug messages everything that could make help more accurate what you give is TOO LOW ALMOST NOTHING SO PLEASE GIVE MORE DETAILS :)

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7052 [Kali Linux] Kali Package Bug block always 2021-02-17 03:11 2021-02-20 17:42
Reporter: sirnerdman Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: When i start in virtual box, i get an error that wont launch it.
Description: On a fresh and old install of virtual box, I import Kali. when I hit start for the VM, i get the following error. I have gotten this to happen on a new and an old install of Virtual Box, and on two separate devices.



Failed to open a session for the virtual machine Kali-Linux-2020.4-vbox-amd64.

Implementation of the USB 2.0 controller not found!

Because the USB 2.0 controller state is part of the saved VM state, the VM cannot be started. To fix this problem, either install the 'Oracle VM VirtualBox Extension Pack' or disable USB 2.0 support in the VM settings.

Note! This error could also mean that an incompatible version of the 'Oracle VM VirtualBox Extension Pack' is installed (VERR_NOT_FOUND).

Result Code: E_FAIL (0x80004005)
Component: ConsoleWrap
Interface: IConsole {872da645-4a9b-1727-bee2-5585105b9eed}

Steps To Reproduce: Install Virtual box, import kali (double click OVS file), click start
Additional Information:
Attached Files:
Notes
(0014233)
Michu   
2021-02-20 17:42   
did you tried to install extension pack to virtualbox or just upgrade it beacuse from error virtualbox says that he can't start vm because the usb 2.0 controller state is part of vm and if it's a part of it then virtualbox says that he can't start without extension pack or newest so try this if this won't help try vmware if vmware will not fit to you go to bootable usb and use it instead. that's how i can help and hope this will resolve your problem because when virtualbox is working then it's cool BUT when it gives errors then you have BIG problem sometimes more sometimes not and you can feel rage because of it so i recommend try to do what i wrote and see if it works.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6981 [Kali Linux] Queued Tool Addition feature N/A 2021-01-08 12:48 2021-02-17 16:04
Reporter: 0x4E0x650x6F Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: dscan - Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.
Description: Hi all,

I noticed that dmap is been in the distro for a while, since the project haven not evolved much, I decided to create something similar with additional features.

The tool's objective is similar, with additional features, it aggregates / splits address ranges, uses a configuration file where scan configuration can be adjusted, supports resume.
I thought it would be a nice addition to the distribution.

The tool repository, python pip, and documentation:

https://pypi.org/project/dscan-4E656F/
https://github.com/0x4E0x650x6F/dscan
https://dscan.readthedocs.io/en/0.1.1/

Suggestions and comments are welcome

Best Regards
Tiago Carvalho
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014079)
rhertzog   
2021-01-09 09:45   
Please don't file bugs in "Queued Tool Additions", you should use "New Tool Requests". And sometimes it's best to try to adopt an abandoned software instead of creating yet another fork. It makes it more likely to have it integrated as the continuation of the former tool...
(0014105)
0x4E0x650x6F   
2021-01-11 15:09   
Sorry about the confusion.
(0014147)
g0tmi1k   
2021-01-29 13:07   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0014188)
0x4E0x650x6F   
2021-02-02 10:34   
Thanks alot.
I will do my best to create a package.
(0014228)
0x4E0x650x6F   
2021-02-17 16:04   
- [Name] - Dscan
- [Version] - 0.1.3
- [Homepage] - https://github.com/0x4E0x650x6F/dscan
- [Package] - https://gitlab.com/0x4E0x650x6F/dscan
- [documentation] - https://dscan.readthedocs.io/en/latest/
- [pip package] - https://pypi.org/project/dscan-4E656F/
- [Author] - 0x4E0x650x6F
- [License] - GPL-3
- [Description] - The tool's objective is similar, with additional features, it aggregates / splits address ranges, uses a configuration file where scan configuration can be adjusted, supports resume, and fail over when an agent goes down.
- [Dependencies] - python3, python3-libnmap
- [Similar tools] - some features can be found in dnmap, were the tool was inspired from.
- [Activity] - There was a commit this month
- [How to use] - dscan -h,
   generate ssl self sign cert: dscan --name <project-name> config -email mail@dscan.org -cn dscan -c pt -l earth -st nrw -o dscan -ou it -days 365
   run server mode: dscan --name <project name> srv --config dscan.conf targets.txt
   run agent mode: dscan --name <agent-project-name> agent --config <path-to-agent.conf> -s <server-ip-address> -p <server-port>
   note: certificate and agent configs need to be copied to the server host.
more details: in the readme where a link to a video demonstrating how it works.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5415 [Kali Linux] Tool Upgrade minor N/A 2019-04-27 10:29 2021-02-17 15:20
Reporter: Dober Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2019.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Please upgrade Bro (Zeek)
Description: Version in Kali: bro-2.5.5-1+b11
Actual version: bro-2.6.1 ( https://github.com/zeek/zeek/releases/tag/v2.6.1)
New repo: https://github.com/zeek/zeek
About renaming package: https://blog.zeek.org//2018/10/renaming-bro-project_11.html
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0011149)
Dober   
2019-09-26 19:21   
Zeek 3.0.0 released: https://github.com/zeek/zeek/releases/tag/v3.0.0
(0014227)
sbrun   
2021-02-17 15:20   
zeek version 3.2.3+ds2-2 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7053 [Kali Linux] Feature Requests major have not tried 2021-02-17 12:23 2021-02-17 15:19
Reporter: shady_hacker_ Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: ect/apt sources file no directory when accesing on terminal
Description: i cannot acces any files from file manager onto the terminal e.g ect/ usr/ it says file directory does not exist. i cannot install certain applications such as msfconsole, gitthub tools ect, it gives an error E: cannot locate file package, but becuase i cant open nano ect/apt/sources.list due to the original error im conceeding it just says file ect/apt does not exist. i have tried on the window right clicking on
file manager on selecting open terminal so that the directories will only apply to the files saved on file manager. by doing this i am able to acces nano ect/apt/sources.list but it gives an error ''permission denied'' i have tried to do this on root too still doesn not work. my suggestion is to allow users to move files from file manager to desktop/ or other locations, i can not add repossitres either. becuase it keeps on saying ect/ directory does not exist, or permission denied cant write out.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014226)
d0rm0us3   
2021-02-17 15:19   
Do you mean /etc/apt doesn't exist?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7030 [Kali Linux] New Tool Requests minor have not tried 2021-02-02 23:36 2021-02-17 13:13
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: pacu - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Description: [Name] - pacu
[Version] - N/A
[Homepage] - https://rhinosecuritylabs.com/aws/pacu-open-source-aws-exploitation-framework/
[Download] - https://github.com/RhinoSecurityLabs/pacu NO TAG
[Author] - Rhino Security Labs
[License] - BSD 3
[Description] - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

Pacu is an open-source AWS exploitation framework, designed for offensive security testing against cloud environments. Created and maintained by Rhino Security Labs, Pacu allows penetration testers to exploit configuration flaws within an AWS account, using modules to easily expand its functionality. Current modules enable a range of attacks, including user privilege escalation, backdooring of IAM users, attacking vulnerable Lambda functions, and much more.
[Dependencies] - Python ~ https://github.com/RhinoSecurityLabs/pacu/blob/master/requirements.txt
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014225)
sbrun   
2021-02-17 13:13   
pacu is not designed to be installed in a system wide manner.
It requires to have write rights on many files and we can not easily patch this as relative paths are used in many files.

https://github.com/RhinoSecurityLabs/pacu/issues/230

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7029 [Kali Linux] New Tool Requests minor have not tried 2021-02-02 23:34 2021-02-17 13:08
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: peirates - Kubernetes Penetration Testing tool
Description: [Name] - peirates
[Version] - v1.0.30
[Homepage] - https://www.inguardians.com/peirates/
[Download] - https://github.com/inguardians/peirates/tags
[Author] - InGuardians
[License] - GNU General Public License v2.0
[Description] - Kubernetes Penetration Testing tool

Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It automates known techniques to steal and collect service accounts, obtain further code execution, and gain control of the cluster.
[Dependencies] - Go
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014224)
sbrun   
2021-02-17 13:08   
version 1.0.30-0kali2 is in kali-dev

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7028 [Kali Linux] New Tool Requests minor have not tried 2021-02-02 23:24 2021-02-17 10:13
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: CloudBrute - Awesome cloud enumerator
Description: [Name] - CloudBrute
[Version] - v1.0.7
[Homepage] - https://github.com/0xsha/cloudbrute
[Download] - https://github.com/0xsha/CloudBrute/tags
[Author] - 0xsha
[License] - MIT
[Description] - Awesome cloud enumerator

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike.
[Dependencies] - Go
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014223)
sbrun   
2021-02-17 10:13   
version 1.0.7-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6975 [Kali Linux] General Bug minor have not tried 2021-01-04 11:04 2021-02-17 09:56
Reporter: mantisjr Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Unable to start protonvpn
Description: After update from version 2020.3 to 4 I'm not able to start protonvpn from terminal any more. (see error message in screenshot)
Thanks for your help!
Steps To Reproduce:
Additional Information:
Attached Files: Bildschirmfoto von 2021-01-04 11-50-52.png (487,011 bytes) 2021-01-04 11:04
https://bugs.kali.org/file_download.php?file_id=1982&type=bug
Notes
(0014222)
mantisjr   
2021-02-17 09:56   
solved now

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7051 [Kali Linux] General Bug major always 2021-02-14 19:36 2021-02-14 19:36
Reporter: El Messia Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Linux not found device
Description: Hello everyone, i'm trying to install Kali linux for five days in a row without succeeding. I ran the USB through boot to starting the installation and after loading there's this screen with " ethernet card hardware not found error. If you know the driver name that is required , select from the list" . I can't found that in the list and when i try to select any drive it returns to the same page and nothing happening. Help me please to fix this problem. I tried to install it without that card also but i can't log on my network and the system can't get eth0 and wlan0 in iwconfig command.

Thank you who can help me, hope to fix this problem as soon as possible.
Steps To Reproduce:
Additional Information:
Attached Files: WhatsApp Image 2021-02-14 at 20.18.50.jpeg (154,906 bytes) 2021-02-14 19:36
https://bugs.kali.org/file_download.php?file_id=2014&type=bug
jpeg
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7050 [Kali Linux] Kali Package Bug major have not tried 2021-02-13 19:43 2021-02-14 09:09
Reporter: Hmctrypz Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Error ISO
Description: Installing the iso file causes a major bug issues within the VM box.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014219)
kali-bugreport   
2021-02-14 09:09   
Do you think that this issue contains enough information? (Hint: It doesn't)

See e.g. https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/ what info is required / should be provided for the Kali team.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7039 [Kali Linux] General Bug major always 2021-02-07 07:35 2021-02-12 01:55
Reporter: James123 Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Linux Freezing Problem
Description: The screen becomes unresponsive 2-3 minutes after I started installing a large program on Kali Linux.
Steps To Reproduce: I think change the swappiness settings.

sudo sysctl vm.swappiness=30 � I thought it might be 30, but I don't know exactly what.
Additional Information: I think Kali Linux needs to be accelerated a little bit more.
Attached Files:
Notes
(0014207)
Michu   
2021-02-09 18:33   
what ram capacity do you have because in my opinion there is simple tip
vm.swappiness=60 if you have 1GB ram
vm.swappiness=40 if you have 2GB ram
vm.swappiness=20 or 10 which i recommend more if you have 4GB ram or more
some people thinks that this parameter needs to have value 0 because it will increase you performance but i recommend 10 because when you do something that is very stressful for hardware your pc might freeze even if you have a lot of ram also i recommend vfs_drop_cache=3 also you can start htop to monitor what program will take most of resources that's what i can help
(0014217)
thegrounder   
2021-02-12 01:55   
[PROBLEM SOLVED FOR ME]

2020.4 VERSION

it freezes for 5min, after many tries the problem is solved

i installed GPU driver (i've GTX 660) ALL WORKS GOOD NOW

./Sorry for m english

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7049 [Kali Linux] General Bug crash sometimes 2021-02-11 11:50 2021-02-11 11:50
Reporter: cybertej Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Task bar, Minimize, Maximize and close buttons disappeared - Virtual Box VM
Description: Hello Team,

I have installed kali 2020.4 on the virtual box. If I power on the machine after background wallpaper load Taskbar, Maximize, Minimize and close buttons disappearing. It won't come back until power-off and on again but that too not sure. sometimes it is disappearing after a long period of working hours. Kindly help
Steps To Reproduce:
Additional Information:
Attached Files: image.png (299,779 bytes) 2021-02-11 11:50
https://bugs.kali.org/file_download.php?file_id=2013&type=bug
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7048 [Kali Linux] Kali Package Bug minor always 2021-02-11 01:06 2021-02-11 01:06
Reporter: xihh87 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Installing `kali-win-kex` on WSL2 fails
Description: The test for WSL2 on the package `kali-win-kex` fails as of 2021-02-10, even when using WSL2.

Relevant details can be found on this report [1],
suggested fix can be found on this merge request [2].

[1]: https://unix.stackexchange.com/questions/633735/installing-kali-win-kex-on-wsl2-fails/633736#633736
[2]: https://gitlab.com/kalilinux/packages/kali-win-kex/-/merge_requests/2
Steps To Reproduce: On latest windows revision (19042.746), using official instalation instructions [3], installation will fail on kali-win-kex instalation.

[3]: https://www.kali.org/docs/wsl/win-kex/
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7031 [Kali Linux] New Tool Requests minor have not tried 2021-02-02 23:41 2021-02-10 13:40
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: WitnessMe - Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra
Description: [Name] - WitnessMe
[Version] - N/A
[Homepage] - https://github.com/byt3bl33d3r/WitnessMe
[Download] - N/A
[Author] - byt3bl33d3r
[License] - GNU General Public License v3.0
[Description] - Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.

WitnessMe is primarily a Web Inventory tool inspired by Eyewitness, its also written to be extensible allowing you to create custom functionality that can take advantage of the headless browser it drives in the back-end.

WitnessMe uses the Pyppeteer library to drive Headless Chromium.
[Dependencies] - Python ~ https://github.com/byt3bl33d3r/WitnessMe/blob/master/requirements.txt
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014212)
sbrun   
2021-02-10 13:40   
version 1.5.0+git20201026-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7043 [Kali Linux] General Bug minor always 2021-02-09 07:45 2021-02-10 08:10
Reporter: 4rt Platform:  
Assigned To: sbrun OS:  
Priority: low OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: strike fuzzer not working
Description: whenever the spike fuzzer is used via the command generic_send_tcp an "undefined symbol: " error is shown I have tried s_readline(); and s_string(""); in the .spk file, whatever the first command is, is the undefined symbol error shown. I have come across a few other people who have this issue as well so it's not an isolated incident. s_readline and s_string seem to be declared in /usr/share/spike/include/spike.h but I'm not sure where it is defined. I wanted to find an earlier version to try but was unsure where/how to find one, as the only one available in the repository is 2.9, probably the most recent build.
Steps To Reproduce: generic_send_tcp ipaddress port script.spk skipvar skipstr; with s_readline(); or s_string(""); in the script.spk file included in the command
Additional Information: I have come across multiple other people who are having this issue so I don't believe I am an isolated incident
Only one version, the bad one, is available in the official kali repository
Attached Files:
Notes
(0014205)
4rt   
2021-02-09 07:51   
Forgive/excuse me for sending a technical issue contact request on the official kali website before posting here, was really tired searching for solutions to the point I have brain fog and didn't think to post here before contact over official website request form. Found a couple other people reporting the same issue on a youtube tutorial, all within the last couple weeks so I assume this is an issue with the most recent release/repository release/update and also making me not an isolated incident.
(0014206)
sbrun   
2021-02-09 17:35   
I just uploaded a new version 2.9-1kali8 with a fix for the issue.
It will be available in a few hours on the Kali mirrors.

Please test it and let us know if it works for you.
(0014208)
4rt   
2021-02-09 18:34   
It has been fixed! Thank you!
(0014211)
sbrun   
2021-02-10 08:10   
fixed in version version 2.9-1kali8

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7045 [Kali Linux] General Bug major always 2021-02-09 23:37 2021-02-10 01:01
Reporter: zalupakonya Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: impossible to login in live system///
Description: hi, i update just now from 2018build becouse i change PC.
i already dont like new rules with "privacy" for nothing..
but main problem i get is impossible to login in live system///
i try 2020.2 upd on 2020.4 and get same..

and yes i do google and know that there is new kali/kali password. im not stupid.
it dont work from box anymore, that annoyng.

please upload 2018 iso with updated core to support new hardware, its be nice...
Steps To Reproduce: load to live system
wait 10 min or click "lock" icon in right upper corner
try to login with kali/kali.
Additional Information: it also same on 2020.2
it works normal in 2018.
Attached Files:
Notes
(0014209)
steev   
2021-02-09 23:41   
You may be running into a visual bug - when you go to log in, there is sometimes a space at the beginning of either the username or password entry box, though it's hard to see if that is the case. Could you check that the username and password do not have a space at the beginning? I cannot reproduce the issue here on any of the architectures we support with a live image.
(0014210)
zalupakonya   
2021-02-10 01:01   
no, there were no spaces. I tried both "lock" and full logoff, and entered login and pass from zero..
but at that moment that I was shoot a video, i was able to successfully login.
rebooted 4 times, and the bug didn’t appear anymore .. I don’t understand what it’s connected with ..

I rebooted for 2020.2 4 times, only for today, and +5 more times before downloading the update. after updated to 2020.4 and rebooted for another twice, but the bug remained ..
but now it's gone .. I don’t know how it works. maybe vram ..

but in 2020.2 it was for sure, since repeated many times.
I hope it doesn't come back again soon at the worst moment ...

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7037 [Kali Linux] General Bug major always 2021-02-07 06:51 2021-02-09 01:16
Reporter: James123 Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: "Airmon-ng" error in Kali linux 2020.4 release
Description: When I type airmon-ng start wlan0, the monitor seems to be in mode, so the internet goes. Then when I type iwconfig or ifconfig, the monitor is not in mode. When I type Airmon-ng stop wlan0mon, I get the following error: Requested device "wlan0mon" does not exist.
Run / usr / sbin / airmon-ng without any arguments to see available interfaces. By the way, Kali was running smoothly in Linux 2020.3 version.
Steps To Reproduce: I do not know.
Additional Information: Thank you from now :)
Attached Files:
Notes
(0014204)
atdtphreaker   
2021-02-09 01:16   
I've this issue as well.


Thank you_

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7042 [Kali Linux] General Bug block always 2021-02-07 22:28 2021-02-08 16:47
Reporter: vik001 Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: NetworkManager.service - Network Manager is killed
Description: after upgrade the system my networkmanager is not running i tried many ways to run it reinstall networkmanager via usb theatering but nothing works out my networking is enable but networkmanager is not responding
Steps To Reproduce: service Network manager start
service NetworkManager status
● NetworkManager.service - Network Manager
     Loaded: loaded (/lib/systemd/system/NetworkManager.service; enabled; vendor preset: enabled)
     Active: failed (Result: signal) since Mon 2021-02-08 03:49:05 IST; 384ms ago
       Docs: man:NetworkManager(8)
    Process: 3470 ExecStart=/usr/sbin/NetworkManager --no-daemon (code=killed, signal=SEGV)
   Main PID: 3470 (code=killed, signal=SEGV)
        CPU: 254ms

Feb 08 03:49:05 kali systemd[1]: NetworkManager.service: Scheduled restart job, restart counter is at 5.
Feb 08 03:49:05 kali systemd[1]: Stopped Network Manager.
Feb 08 03:49:05 kali systemd[1]: NetworkManager.service: Start request repeated too quickly.
Feb 08 03:49:05 kali systemd[1]: NetworkManager.service: Failed with result 'signal'.
Feb 08 03:49:05 kali systemd[1]: Failed to start Network Manager.
Additional Information:
Attached Files:
Notes
(0014200)
steev   
2021-02-08 06:40   
What type of install and hardware is this?

I can't reproduce the issue here, and I've tried on amd64, arm64 and armhf.

$ apt policy network-manager
network-manager:
  Installed: 1.28.0-2+b1
  Candidate: 1.28.0-2+b1
(0014201)
vik001   
2021-02-08 09:07   
network-manager:
  Installed: 1.28.0-2+b1
  Candidate: 1.28.0-2+b1
  Version table:
 *** 1.28.0-2+b1 500
        500 http://http.kali.org/kali kali-rolling/main amd64 Packages
        500 http://ftp.de.debian.org/debian sid/main amd64 Packages
        100 /var/lib/dpkg/status
     1.6.2-3+deb9u2 500
        500 http://deb.debian.org/debian oldstable/main amd64 Packages


please give me the solution of this bug i can not start my network manager
(0014202)
steev   
2021-02-08 15:58   
I don't have a solution because I can't reproduce the issue here.

We need to know why it's segfaulting there. SIGSEGV is automatically sent by the kernel if a process does something with memory it shouldn't have done - can you check the output of "dmesg" to see if there is any output related to the segfaults?

As a side note: you really shouldn't enable debian repositories, and it is possible that you somehow have incompatible dependencies installed now.
(0014203)
vik001   
2021-02-08 16:47   
NetworkManager[814]: segfault at 7ffec13dbb10 ip 00007f74e7fdb507 sp 00007ffec13dbb10 error 6 in libc-2.31.so[7f74e7f30000+14b000]
[ 44.553766] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04
[ 45.676293] NetworkManager[937]: segfault at 7fff8d34da20 ip 00007f5599f1d507 sp 00007fff8d34da20 error 6 in libc-2.31.so[7f5599e72000+14b000]
[ 45.676302] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04
[ 47.527159] NetworkManager[943]: segfault at 7ffcd0e14900 ip 00007fb7f4e0b507 sp 00007ffcd0e14900 error 6 in libc-2.31.so[7fb7f4d60000+14b000]
[ 47.527168] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04
[ 48.235339] NetworkManager[952]: segfault at 7ffdb59dcff0 ip 00007fbfce350507 sp 00007ffdb59dcff0 error 6 in libc-2.31.so[7fbfce2a5000+14b000]
[ 48.235348] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04
[ 48.952750] NetworkManager[960]: segfault at 7ffc1d5e4a70 ip 00007ff439b8f507 sp 00007ffc1d5e4a70 error 6 in libc-2.31.so[7ff439ae4000+14b000]
[ 48.952759] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04
[ 49.694928] NetworkManager[965]: segfault at 7ffd0d119a00 ip 00007f6021d46507 sp 00007ffd0d119a00 error 6 in libc-2.31.so[7f6021c9b000+14b000]

i dont know about this??

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7041 [Kali Linux] Kali Package Bug major have not tried 2021-02-07 17:25 2021-02-07 17:25
Reporter: Whiteangel Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Lkm trojan and rootkit
Description: I downloaded kali from official website using torrent. Did scan by rkhunter got 3 rootkit and 3 warning
And chkrootkit told lkm trojan. How to download without virus.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7038 [Kali Linux] General Bug major always 2021-02-07 07:12 2021-02-07 07:12
Reporter: James123 Platform:  
Assigned To: OS:  
Priority: low OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Linux Clock problem
Description: When Kali Linux is connected to the internet, its clock is not set automatically. That's why your watch gives the wrong error.
Steps To Reproduce: My manual method is:
Step 1 => I open the command line
Step 2 => I'm writing "service ntp stop".
Step 3 => Then I write "ntpd -gq".
The final step => I'm writing "service ntp start".
Additional Information: If there are more important problems with Kali Linux, you can fix them first.
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6917 [Kali Linux] Queued Tool Addition major always 2020-12-09 02:44 2021-02-06 18:03
Reporter: tjnull Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: confirmed Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Linux Cloud Pentesting Metapackage
Description: As more corporations are moving there systems/networks in the cloud, pentesters will need to have a set of cloud tools to conduct assessments against a variety of cloud environments. Since Kali allows you to implement the OS in AWS, Azure, and in other places, they do not have the following cloud tools packaged. With that being said, I think the following tools should be packaged into Kali Linux to support the pentesters who assess these cloud environments for there clients.

Here are the following tools:
kubectl
Witnessme [https://github.com/byt3bl33d3r/WitnessMe]
postman [https://www.postman.com/downloads/]
insomnia [https://support.insomnia.rest/article/90-installation#linux]
pacu [https://github.com/RhinoSecurityLabs/pacu]
peirates [https://github.com/inguardians/peirates]
gitleaks [https://github.com/zricethezav/gitleaks]
Cloudbrute [https://github.com/0xsha/cloudbrute]


 
Steps To Reproduce: Steps to install the tools (Some tools already have the packages in there that needed to be ported into the repo):

Kubectl:

sudo apt-get update && sudo apt-get install -y apt-transport-https gnupg2 curl
curl -s https://packages.cloud.google.com/apt/doc/apt-key.gpg | sudo apt-key add -
echo "deb https://apt.kubernetes.io/ kubernetes-xenial main" | sudo tee -a /etc/apt/sources.list.d/kubernetes.list
sudo apt-get update
sudo apt-get install -y kubectl

Witnessme:

python3 -m pip install --user pipx
pipx install witnessme

Postman:

Already have a deb package made that can be downloaded and added

Insomnia:

Already have a deb package made that can be downloaded and added

Pacu:

  git clone https://github.com/RhinoSecurityLabs/pacu
  cd pacu
  bash install.sh
  python3 pacu.py

Peirates:
golang will be needed for the installation
https://github.com/inguardians/peirates/releases

gitleaks:
https://github.com/zricethezav/gitleaks/releases
apt install golang
GO111MODULE=on go get github.com/zricethezav/gitleaks/v7

cloudbrute:
https://github.com/0xsha/cloudbrute/releases












Additional Information:
Attached Files:
Notes
(0014057)
g0tmi1k   
2021-01-08 13:33   
This needs to be broken down to individual requests rather than a bulk request

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7036 [Kali Linux] Kali Package Bug tweak always 2021-02-05 15:54 2021-02-05 15:54
Reporter: gvygytt Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: I cannot install and start the NetworkManager
Description: So, my Kali Linux 2020.4 is in Virtual Box and when I want to correct proxy, I cannot open menu of WiFi or NetworkManager.
When I try install NetworkManager I see that file not founding. I think problem in that I have not WiFi adapter with monitoring function.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7035 [Kali Linux] Kali Package Bug major have not tried 2021-02-05 10:04 2021-02-05 10:05
Reporter: abhimanyu Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: i cannot open zenmap
Description: Could not import the zenmapGUI.App module: 'No module named gtk'.
I checked in these directories:
    /usr/bin
    /usr/share/offsec-awae-wheels/soupsieve-1.9.5-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/beautifulsoup4-4.9.1-py2-none-any.whl
    /usr/share/offsec-awae-wheels/certifi-2020.4.5.1-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/pycparser-2.20-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/colorama-0.4.3-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/urllib3-1.25.9-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/backports.functools_lru_cache-1.6.1-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/enum34-1.1.10-py2-none-any.whl
    /usr/share/offsec-awae-wheels/pyOpenSSL-19.1.0-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/ipaddress-1.0.23-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/chardet-3.0.4-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/PySocks-1.7.1-py27-none-any.whl
    /usr/share/offsec-awae-wheels/requests-2.23.0-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/ply-3.11-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/six-1.15.0-py2.py3-none-any.whl
    /usr/share/offsec-awae-wheels/idna-2.9-py2.py3-none-any.whl
    /usr/share/cffi-wheels/py-1.8.1-py2.py3-none-any.whl
    /usr/share/cffi-wheels/setuptools-44.1.0-py2.py3-none-any.whl
    /usr/lib/python2.7
    /usr/lib/python2.7/plat-x86_64-linux-gnu
    /usr/lib/python2.7/lib-tk
    /usr/lib/python2.7/lib-old
    /usr/lib/python2.7/lib-dynload
    /usr/local/lib/python2.7/dist-packages
    /usr/lib/python2.7/dist-packages
    /usr/lib/python2.7/dist-packages
    /usr/lib/python2.7/dist-packages/gtk-2.0
    /usr/lib/python2.6/site-packages
If you installed Zenmap in another directory, you may have to add the
modules directory to the PYTHONPATH environment variable.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7034 [Kali Linux] Feature Requests block have not tried 2021-02-05 03:44 2021-02-05 03:44
Reporter: N357 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: error: Creating repo: linkat: Operation not permitted
Description: Hello,

          I'm N357 a newbie. I want to install tor browser when the process is blocked by this "error: Creating repo: linkat: Operation not permitted",

# flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo

error: Creating repo: linkat: Operation not permitted

          Thanks in advance. BTW I'm using kali nethunter rootless.


Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7033 [Kali Linux] Kali Package Bug minor have not tried 2021-02-05 00:35 2021-02-05 00:35
Reporter: N357 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: ERROR: ld.so: object '/usr/lib/aarch64-linux-gnu/libgcc_s.so.1' from LD_PRELOAD cannot be preloaded (cannot open shared object f
Description: ERROR: ld.so: object '/usr/lib/aarch64-linux-gnu/libgcc_s.so.1' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
 
Good Day,

                       Hello there, I'm pretty noob in this kali nethunter rootless but I'm using kali linux OS since I was 10. It was new to me to have a Linux on my sm-A600G/ds, Android 10 unrooted and and not running in custom Android OS. This ERROR is always popping up to my terminal but it works fine even though it was always popping up at the start of terminal and root. Everything is working well and all the tools are working properly. This is just like an eyesore to me.

                        Please, I need help to fix this I don't really know how to fix it not even in my books can help. Thank you in Advance ;-).

      
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7027 [Kali Linux] General Bug major always 2021-02-02 13:37 2021-02-04 17:33
Reporter: corporatejeece Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: No WIFI on Raspberry Pi 400
Description: Newest 2020.4 and 2020.3, tried both 32 and 64 bit versions for Raspberry Pi 400, WLAN on Raspberry Pi 400 does not work after boot. I did apt upgrade and dist upgrade using ethernet connection, no change. Ifconfig does not list a wireless adapter and cannot activate wlan0. hashes of downloaded images were correct
Steps To Reproduce: install kali from scratch
Additional Information:
Attached Files:
Notes
(0014199)
r3trop   
2021-02-04 17:33   
Same issue here..

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6922 [Kali Linux] Kali Package Bug major always 2020-12-10 10:41 2021-02-04 07:55
Reporter: RoseDeSable Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kerberos doesn't work for squid
Description: Hello,
 after the last distribution-upgrade this days my squid has problems to take a kerberos-service-ticket for the proxy in the lan. The Authentication Task is correctly started:

 ├─3079 (negotiate_kerberos_auth) -d -s HTTP/<lan.proxy>@realm

In wireshark I see, that the receiving of the initialization ticket is ok. But the debug-log show me , that problems with the gssapi exist.

2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(522) peer_proxy_negotiate_auth: Creating credential cache for userid@realm
2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(539) peer_proxy_negotiate_auth: Import gss name
2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(546) peer_proxy_negotiate_auth: Initialize gss security context
2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(177) check_gss_err: gss_init_sec_context()failed: Unspecified GSS failure. Minor code may provide more information. SPNEGO cannot find mechanisms to negotiate.

The test-program negotiate_kerberos_auth_test correctly gives me a token for the proxy.

Bye
Rose

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014197)
RoseDeSable   
2021-02-04 07:55   
Because the problem also further exists in squid 4.13-1+b1, I opened an issue in the developers page https://bugs.squid-cache.org/show_bug.cgi?id=5103

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5861 [Kali Linux] Queued Tool Addition minor always 2019-12-03 14:56 2021-02-03 14:16
Reporter: XerainHouse Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Zenmap - GUI Nmap
Description: Unable to download zenmap via apt from Kali repo. Zenmap is also missing from pkg.kali.org.
Steps To Reproduce: Created a fresh install of Kali Linux using the present Gnome and standard 64bit live version. After install I ran $apt update and $apt install zenmap only to receive a missing package error. Error message included that the package was mentioned but non-existent and had been replaced with ndiff.
Additional Information: Checked Kali Docs and https://pkg.kali.org/pkg/zenmap appears to be missing. Though it is still mentioned under the information gathering meta-package.

I was able to go to the nmap site, download the zenmap rpm, and use alien to convert it to a deb file and install it via the software installer. Appears to function normally via this method. Alien can be downloaded via, $apt install alien.

This has been tested with the 2019.4 releases and source list has been verified to use correct Kali rolling repo with an older release of Kali and pdfs from Kali Docs.
Attached Files:
Notes
(0011571)
XerainHouse   
2019-12-04 14:03   
Note: It seems that Zenmap may no longer be maintained somewhere farther up the line. This is from the Kali forum reported by Gamb1t in:
https://forums.kali.org/showthread.php?45985-Can-t-seem-to-find-zenmap-other-tools&highlight=zenmap

There does seem to be upwards of four years since an update in the Zenmap section of the Nmap github, minus a cleanup in some translation files.
https://github.com/nmap/nmap

I've been unable to find a reason, other than lack of updates on Zenmap, for it to be removed considering it only really functions as a GUI for Nmap.
If Zenmap is no longer viable then this issue should be regarded as site maintenance for the purpose of updating https://tools.kali.org.
If there is no issue regarding Zenmap be it compatibility, security, or usefulness then I would ask to be notified or have a tool request added so that it can be reintroduced as a tool in the Kali repo.
(0011916)
rhertzog   
2020-01-14 07:40   
The real issue is that it's still using Python 2 and that nobody upstream is doing the work to port it to Python 3. Debian is removing any Python 2 code that has not been ported... so for now your custom package is still working as Python 2 is still available in Debian but once everything has been dropped, this will no longer be the case.

Someone should take the time to port it and submit the patch to the upstream developers. See how it happened on the Debian side: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883161
(0011942)
XerainHouse   
2020-01-18 10:17   
I found the relevant bug report within Nmap's Github so the issue can be better tracked within the report:
https://github.com/nmap/nmap/issues/1176

Hopefully we can get an updated version before python 2 is dropped from the Debian repository completely.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7017 [Kali Linux] Kali Package Bug major always 2021-01-30 09:54 2021-02-02 09:37
Reporter: cohst Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: duplicate  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: wpscan does not start after upgrade
Description: After upgrade via apt-get dist-upgrade wpscan fails to start with the following message:

┌──(cohst@kali-linux)-[~]
└─$ wpscan -h
Traceback (most recent call last):
        12: from /usr/bin/wpscan:23:in `<main>'
        11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path'
        10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize'
         9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path'
         8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
         7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
         6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
         5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies'
         4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
         3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
         2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
         1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1400:in `block in activate_dependencies'
/usr/lib/ruby/vendor_ruby/rubygems/dependency.rb:309:in `to_specs': Could not find 'nokogiri' (~> 1.10.9) - did find: [nokogiri-1.11.1] (Gem::MissingSpecVersionError)
Checked in 'GEM_PATH=/home/cohst/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' , execute `gem env` for more information
        12: from /usr/bin/wpscan:23:in `<main>'
        11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path'
        10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize'
         9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path'
         8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
         7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
         6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
         5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies'
         4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
         3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
         2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
         1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1399:in `block in activate_dependencies'
/usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1402:in `rescue in block in activate_dependencies': Could not find 'nokogiri' (~> 1.10.9) among 157 total gem(s) (Gem::MissingSpecError)
Checked in 'GEM_PATH=/home/cohst/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' at: /usr/share/rubygems-integration/all/specifications/cms_scanner-0.13.0.gemspec, execute `gem env` for more information
                                                                                                        
┌──(cohst@kali-linux)-[~]
└─$
Steps To Reproduce: call wpscan -h
Additional Information:
Attached Files: kali wpscan error.JPG (178,171 bytes) 2021-01-30 09:54
https://bugs.kali.org/file_download.php?file_id=2007&type=bug
jpg
Notes
(0014178)
RiRa12621   
2021-02-01 16:19   
Looks like a duplicate of https://bugs.kali.org/view.php?id=7023
(0014184)
sbrun   
2021-02-02 09:37   
fixed with new ruby-cms-scanner version 0.13.1-0kali1

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7023 [Kali Linux] Kali Package Bug minor always 2021-01-31 21:12 2021-02-02 09:37
Reporter: product_hardhat Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: ruby-cms-scanner applying kali patch that breaks wpscan
Description: installed wpscan via apt-get. immediately got the following when running

Traceback (most recent call last):
    12: from /usr/bin/wpscan:23:in `<main>'
    11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path'
    10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize'
     9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path'
     8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
     7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
     6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
     5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies'
     4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
     3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
     2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
     1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1400:in `block in activate_dependencies'
/usr/lib/ruby/vendor_ruby/rubygems/dependency.rb:309:in `to_specs': Could not find 'nokogiri' (~> 1.10.9) - did find: [nokogiri-1.11.1] (Gem::MissingSpecVersionError)
Checked in 'GEM_PATH=/home/vmuser/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' , execute `gem env` for more information
    12: from /usr/bin/wpscan:23:in `<main>'
    11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path'
    10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize'
     9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path'
     8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
     7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
     6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
     5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies'
     4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate'
     3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies'
     2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each'
     1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1399:in `block in activate_dependencies'
/usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1402:in `rescue in block in activate_dependencies': Could not find 'nokogiri' (~> 1.10.9) among 80 total gem(s) (Gem::MissingSpecError)
Checked in 'GEM_PATH=/home/vmuser/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' at: /usr/share/rubygems-integration/all/specifications/cms_scanner-0.13.0.gemspec, execute `gem env` for more information
                                                                                                                                               
missing thing is installed

$ dpkg --get-selections | grep nokogiri
ruby-nokogiri install
                                                         
Steps To Reproduce: - install wpscan
- run it against any wp install
Additional Information:
Attached Files:
Notes
(0014173)
steev   
2021-01-31 21:35   
I can't reproduce this here - have you run apt-get update?

sudo apt-get install wpscan
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
  ruby-mime ruby-mini-exiftool ruby-net-http-digest-auth ruby-spider
Use 'sudo apt autoremove' to remove them.
The following additional packages will be installed:
  ruby-cms-scanner ruby-nokogiri
The following NEW packages will be installed:
  ruby-cms-scanner ruby-nokogiri wpscan
0 upgraded, 3 newly installed, 0 to remove and 0 not upgraded.

Installing wpscan pulls in ruby-nokogiri
(0014174)
steev   
2021-01-31 21:51   
(Last edited: 2021-02-01 00:01)
Sorry - misread the error message - it seems wpscan doesn't like ruby-nokogiri 1.11.1. On a system that still has ruby-nokogiri 1.10.9+dfsg-1+b1 installed, wpscan runs fine. A workaround would be to download the 1.10 release from http://kali.download/kali/pool/main/r/ruby-nokogiri/ and install it - then you'd want to either apt-mark hold it, or re-install the older version until a fixed ruby-cms-scanner release happens.

(0014175)
Erwan.lr   
2021-02-01 11:23   
WPScan dev here, since CMSScanner 0.12.2, Nokogiri 1.11 is fetched (https://github.com/wpscanteam/CMSScanner/blob/v0.12.2/cms_scanner.gemspec#L23), so this should not happen.

I've downloaded the latest Kali (64bit), WPScan was at 3.8.10, updated it with `sudo apt-get update && sudo apt-get install wpscan` and then ran WPScan (v3.8.13) w/o any issue.
(0014176)
steev   
2021-02-01 14:08   
Thanks for replying Erwan, but here, I'm seeing the same issue as the original poster on both x86_64 and arm64.

steev@c630:~$ apt policy wpscan
wpscan:
  Installed: 3.8.13-0kali1
  Candidate: 3.8.13-0kali1
  Version table:
 *** 3.8.13-0kali1 500
        500 https://kali.download/kali kali-rolling/non-free arm64 Packages
        500 https://kali.download/kali kali-dev/non-free arm64 Packages
        100 /var/lib/dpkg/status
steev@c630:~$ apt policy ruby-nokogiri
ruby-nokogiri:
  Installed: 1.11.1+dfsg-1
  Candidate: 1.11.1+dfsg-1
  Version table:
 *** 1.11.1+dfsg-1 500
        500 https://kali.download/kali kali-rolling/main arm64 Packages
        500 https://kali.download/kali kali-dev/main arm64 Packages
        100 /var/lib/dpkg/status
steev@c630:~$ apt policy ruby-cms-scanner
ruby-cms-scanner:
  Installed: 0.13.0-0kali1
  Candidate: 0.13.0-0kali1
  Version table:
 *** 0.13.0-0kali1 500
        500 https://kali.download/kali kali-rolling/main arm64 Packages
        500 https://kali.download/kali kali-dev/main arm64 Packages
        100 /var/lib/dpkg/status
(0014177)
Erwan.lr   
2021-02-01 15:13   
Looking at the `/usr/share/rubygems-integration/all/specifications/cms_scanner-0.13.0.gemspec`, some version constraints are wrong in there, e.g:

`s.add_runtime_dependency(%q<nokogiri>.freeze, ["~> 1.10.9"])`
`s.add_runtime_dependency(%q<yajl-ruby>.freeze, [">= 1.3.1"])`

Even though the versions are correct at https://gitlab.com/kalilinux/packages/ruby-cms-scanner/-/blob/kali/master/cms_scanner.gemspec

So it seems that you have something (like a patching script?) changing the versions before installing the gem. Actually, I just found it: https://gitlab.com/kalilinux/packages/ruby-cms-scanner/-/blob/kali/master/debian/patches/change-minimal-required-version.patch
(0014179)
steev   
2021-02-01 18:20   
Thanks, assigned the bug to Sophie to get that patch updated :)
(0014183)
sbrun   
2021-02-02 09:36   
fixed in version ruby-cms-scanner version 0.13.1-0kali1

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7025 [Kali Linux] Kali Websites & Docs minor have not tried 2021-02-02 09:24 2021-02-02 09:24
Reporter: sbrun Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Update metagoofil information
Description: When switching to a version supporting Python 3, the script changed and the documentation is no longer up to date:
see 7005

Please update https://tools.kali.org/information-gathering/metagoofil
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7021 [Kali Linux] General Bug minor always 2021-01-30 20:12 2021-01-30 20:12
Reporter: wefosi9333 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: very bad loop login
Description: very very bad loop login after "changing cursor size to "LARGEST""
unfortunately almost cant fix this with solutions in the internet

just like this "https://askubuntu.com/questions/1222305/login-loop-after-changing-cursor-size"
and has this:"https://bugs.kali.org/view.php?id=6735" features

5.5.0-kali2-amd64 0000001 SMP Debian 5.5.17-1kali1 (2020-04-21) x86_64 GNU/Linux
resolution 1920x1080
>>>PLEASE PLEASE I JUST ASK YOU SOLVE THIS FOR 2021.1 RELEASE<<<
Steps To Reproduce: just in "settings > universal access > cursor size >>> click on "largest"
Additional Information: i solved this with this:
METHOD1: (lose Desktop settings)
1) in login screen press ctrl+alt+f3 to access ssh
2)login with your user pass
3)rm /.config/dconf/user
then you can login to your account normally، but all of your dektop settings and other customization gone
..........................................
BEST TO DO>>>
METHOD2:(without lose desktop settings)
1) in login screen press ctrl+alt+f3 to access ssh
2)login with your user pass
3)dconf reset /org/gnome/desktop/interface/cursor-size
with do this you can login now but after that logged in you have to open "Tweaks" and "enable extension"
Attached Files: Screenshot from 2021-01-30 23-12-50.png (174,850 bytes) 2021-01-30 20:12
https://bugs.kali.org/file_download.php?file_id=2009&type=bug
png
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6897 [Kali Linux] General Bug major sometimes 2020-12-03 07:33 2021-01-30 01:43
Reporter: NewUserTim Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Problem with wifi on dual-boot.
Description: I am a new linux user, and I'm sure this issue has been noted here.(at least it should have been) but I can't find it if it is. I've been ALL over the internet trying to find a fix for this. Apparently a lot of people have this same issue. I have yet to find a solution.

wireless card: Intel(R) Dual Band Wireless-AC 3165
problem: sometimes it reads the card and the wifi works, other times it does not. sometimes a reboot remedies the issue, sometimes it doesn't. Apparently from what I read this is a common problem with this type of card. If it reads the card and works fine for a day or two, then after a reboot it starts again. It might work for the first 3 minutes after startup, then goes down. It says its connected but isn't. after about 5 minutes it fails to show any connection at all.

I get this error: failed to wake nic for hcmd

Ive tried ip link set wlan0 down/up, and just about every other suggestion i could find. doesn't work. I get an input/output error.

I've tried just about every thing I can find listed about this. Nothing has worked.

 I dual boot kali with windows 10. it's not a hardware problem, as it reads it sometimes and for a few minutes after i reboot. and the card works fine with windows. i installed the correct drivers and still the issue persists. Has anyone found a remedy for this or is this a true bug?
Steps To Reproduce: Randomly happens. Not sure how to sure-fire reproduce it.
Additional Information:
Attached Files:
Notes
(0014172)
NewUserTim   
2021-01-30 01:43   
I actually figured out what the problem was. for some reason, the wifi power management is turned on. When i Turned it off i had 0 issue. So I did the following.


iwconfig wlan0

wlan0 IEEE 802.11 ESSID:
Mode:Managed Frequency:5.26 GHz
Bit Rate=6 Mb/s Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:on <-------
Link Quality=56/70 Signal level=-54 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:3 Missed beacon:0


Create this file, if you did not have it before.

sudo nano /etc/NetworkManager/conf.d/default-wifi-powersave-on.conf

The content of the file:

[connection]
wifi.powersave = 2
# NM_SETTING_WIRELESS_POWERSAVE_DEFAULT (0): use the default value
# NM_SETTING_WIRELESS_POWERSAVE_IGNORE (1): don't touch existing setting
# NM_SETTING_WIRELESS_POWERSAVE_DISABLE (2): disable powersave
# NM_SETTING_WIRELESS_POWERSAVE_ENABLE (3): enable powersave


Then I restarted NetworkManager (sudo systemctl restart NetworkManager)


Hope this helps someone else. I see people all over the place having my same problem. This worked for me. Not saying it will work for everyone.

If there is a duplicate issue/fix I apologize. I have not seen it.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6987 [Kali Linux] General Bug major always 2021-01-11 06:16 2021-01-29 23:11
Reporter: gcngov Platform:  
Assigned To: daniruiz OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.1  
    Target Version:  
Summary: WIndow key not functional
Description: Previously window key used to list applications dropdown list, after update i am unable to add list application using window botton.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014102)
daniruiz   
2021-01-11 10:28   
The new xfce version from kali does not require xcape for the Win key binding, but inside your ~/.config directory you still maintain the previous version of the xfce-keybinding settings, which depends on xcape.
You can either install xcape again (which was probably removed with `apt autoremove`), or remove the old setting file ~/.config/xfce4/xfconf/xfce-perchannel-xml/xfce4-keyboard-shortcuts.xml and reboot

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6829 [Kali Linux] Feature Requests feature have not tried 2020-11-09 07:40 2021-01-29 13:47
Reporter: sahil2002 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Calamares installer
Description: Please include Calamares installer, so that we can install Kali Linux from live user.
Steps To Reproduce:
Additional Information: Some people have problem with installing Kali Linux from BIOS. Calamares installer will help those people to overcome this problem.
Attached Files: graphical_mode (67,751 bytes) 2020-11-09 07:40
https://bugs.kali.org/file_download.php?file_id=1937&type=bug
text_mode (130,803 bytes) 2020-11-09 07:40
https://bugs.kali.org/file_download.php?file_id=1938&type=bug
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6834 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-11 23:55 2021-01-29 13:44
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: DNSProb - perform multiple dns queries
Description: [Name] - dnsprobe
[Version] - v1.0.3
[Homepage] - https://github.com/projectdiscovery/dnsprobe
[Download] - https://github.com/projectdiscovery/dnsprobe/tags
[Author] - projectdiscovery.io
[License] - MIT
[Description] - DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.
[Dependencies] - GoLang
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014167)
g0tmi1k   
2021-01-29 13:43   
Note - This project is discontinued. New updates and fixes will be pushed to dnsx.

https://github.com/projectdiscovery/dnsx
(0014168)
g0tmi1k   
2021-01-29 13:44   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6835 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-11 23:58 2021-01-29 13:43
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: naabu - A fast port scanner written in go
Description: [Name] - naabu
[Version] - 2.0.2
[Homepage] - https://github.com/projectdiscovery/naabu
[Download] - https://github.com/projectdiscovery/naabu/tags
[Author] - projectdiscovery.io
[License] - MIT
[Description] - A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
[Dependencies] - GoLang
[Similar tools] - Nmap
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014166)
g0tmi1k   
2021-01-29 13:43   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6836 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-12 00:01 2021-01-29 13:43
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: nuclei - targeted scanning based on templates
Description: [Name] - nuclei
[Version] - v2.1.1
[Homepage] - https://nuclei.projectdiscovery.io/
[Download] - https://github.com/projectdiscovery/nuclei
[Author] - projectdiscovery.io
[License] - MIT
[Description] - Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
[Dependencies] - GoLang
[Similar tools] - DirG, GoBuster
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014165)
g0tmi1k   
2021-01-29 13:42   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6861 [Kali Linux] Queued Tool Addition minor N/A 2020-11-22 21:44 2021-01-29 13:25
Reporter: j_jito Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kbd-audio: Tools for capturing and analysing keyboard input paired with microphone capture
Description: [Name] - kbd-audio
[Version] - N/A
[Homepage] - https://github.com/ggerganov/kbd-audio
[Download] - N/A
[Author] - Georgi Gerganov @ggerganov
[License] - MIT ~ https://github.com/ggerganov/kbd-audio/blob/master/LICENSE
[Description] - This is a collection of command-line and GUI tools for capturing and analyzing audio data.
[Dependencies] - sudo apt install libsdl2-dev
[Similar tools] - N/A
[Activity] - Sept 17 2020
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014158)
g0tmi1k   
2021-01-29 13:25   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7011 [Kali Linux] General Bug major always 2021-01-27 00:30 2021-01-27 10:19
Reporter: X0RW3LL Platform:  
Assigned To: rhertzog OS:  
Priority: urgent OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)
Description: As per the vulnerability disclosure: https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit

"affects all legacy versions from 1.8.2 to 1.8.31p2 and all stable versions from 1.9.0 to 1.9.5p1 in their default configuration"

The current sudo package shipped with the latest Kali package upgrades is 1.9.5p1-1, which is the bullseye vulnerable version: https://security-tracker.debian.org/tracker/CVE-2021-3156

The issue was fixed in sid, sudo version 1.9.5p1-1.1
Steps To Reproduce: To test if a system is vulnerable or not, login to the system as a non-root user.

Run command “sudoedit -s /”

If the system is vulnerable, it will respond with an error that starts with “sudoedit:”

If the system is patched, it will respond with an error that starts with “usage:”
Additional Information:
Attached Files:
Notes
(0014141)
rhertzog   
2021-01-27 10:19   
Fixed version 1.9.5p1-1.1 is in kali-rolling.

Version 1.9.5p2-1 will come in a few days after the usual delay due to migration from unstable to testing then to kali-dev and to kali-rolling.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7008 [Kali Linux] Kali Package Bug major always 2021-01-24 22:15 2021-01-26 08:09
Reporter: croacna Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: broken meta package kali-tools-forensics
Description: sudo apt install kali-tools-forensics 100 ⨯
Reading package lists... Done
Building dependency tree
Reading state information... Done
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
 kali-tools-forensics : Depends: plaso but it is not installable
                        Depends: python3-dfvfs but it is not installable
                        Depends: radare2-cutter but it is not going to be installed
                        Depends: rekall-core but it is not installable
E: Unable to correct problems, you have held broken packages.

-----
using original apt sources


Steps To Reproduce: sudo apt install kali-tools-forensics
Additional Information:
Attached Files:
Notes
(0014140)
sbrun   
2021-01-26 08:09   
Thanks for the report.
It's now fixed in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7003 [Kali Linux] General Bug major always 2021-01-21 05:10 2021-01-25 19:47
Reporter: Harshad_07 Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Desktop Freeze
Description: whenever I start kali as a root user, the desktop freezes and no icons only the taskbar is usable can't see the title bar in any of the applications opened. Tried updating and full-upgrade but still, nothing changed
Steps To Reproduce: just logging as root makes it happen
Additional Information:
Attached Files: Screenshot 2021-01-18 215653.jpg (106,948 bytes) 2021-01-21 05:10
https://bugs.kali.org/file_download.php?file_id=2003&type=bug
jpg
Notes
(0014136)
Harshad_07   
2021-01-22 08:19   
clearing the saved sessions solved the issue
(0014139)
Hillander-s   
2021-01-25 17:42   
harshad_07 unfortunately in mine it did not work. I cleaned up saved sections, but it didn't solve the problem. Which command to use?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7009 [Kali Linux] Kali Package Bug major always 2021-01-25 17:33 2021-01-25 17:42
Reporter: felixmarks Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: The Broadcom BCM20702A0 bluetooth driver is missing
Description: In directory:

/lib/modules/5.9.0-kali5-amd64/kernel/drivers/bluetooth

... these two files exist:

bfusb.ko
btusb_old

btusb.ko is missing
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7006 [Kali Linux] Kali Package Bug minor always 2021-01-22 15:26 2021-01-22 15:46
Reporter: OS-74160 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: powershell-empire versions 3.6.2 and 3.6.3 require sudo on Kali
Description: Good day. I raised this issue on gitlab about a month ago after raising it with the upstream BC-Security powershell-empire project, who said it was a Kali package maintainer decision. I received no response on gitlab so I'm raising it here in case this is the right place.

Since upgrading from 3.6.0-0 to 3.6.2-0, powershell-empire requires sudo. This is a less secure setup than previous. I would prefer to run as an unprivileged user when not using a privileged port, as was possible before. This change/decision is actually a security downgrade. It should be possible to run powershell-empire without sudo, and it shouldn't have to be enforced by not allowing the unprivileged user to do so.

Thank you.
Steps To Reproduce: apt upgrade from powershell-empire 3.6.0-0kali1 to 3.6.2-0kali1
run powershell-empire as unprivileged user, as worked before
observe the new message and program exit: Please run powershell-empire with sudo: 'sudo powershell-empire'
Additional Information: References:

https://github.com/BC-SECURITY/Empire/issues/416
https://gitlab.com/kalilinux/packages/powershell-empire/-/issues/5
Attached Files:
Notes
(0014137)
sbrun   
2021-01-22 15:46   
Thanks for the report. I should have answered the Gitlab issue before.

We (Kali team) first packaged powershell-empire to use it with or without sudo. But there were issues with this packaging that can't be fixed easily if we run without sudo.
That's why now sudo is required.
I need to work with upstream to find a solution to run without sudo if they think it's important.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6385 [Kali Linux] General Bug minor always 2020-05-15 18:21 2021-01-21 23:18
Reporter: FarbodLinux Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2020.4  
    Target Version:  
Summary: No USB Keyboard/Mouse on Rasberry Pi 4
Description: Hi there, No USB Keyboard/Mouse on Rasberry Pi 4 after Linux 2020.2 ARM image boot up (I used the website image not the torrent link, I tried it several times on different devices)! Thanks
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0012784)
steev   
2020-05-15 18:28   
Do they come back if you unplug the keyboard/mouse and plug them back in?
(0012785)
FarbodLinux   
2020-05-15 18:41   
Hi Steev, No! I tried different keyboards and mice, reimage my memory card several times, re-download the image several times, I also tested the old version on the same memory card, which it worked. Hope these help!
(0012787)
steev   
2020-05-15 19:26   
Which image(s) are you using?
(0012789)
FarbodLinux   
2020-05-15 19:42   
I am using : 2020.2 ARM image (kali-linux-2020.2-rpi3-nexmon.img)
(0012791)
steev   
2020-05-15 20:16   
Can you ssh in to the pi (ssh kali@kali) and then run sudo apt update && sudo apt install xserver-xorg-input-libinput && sudo reboot - does that fix the issue for you?
(0012795)
FarbodLinux   
2020-05-15 22:09   
Hi, Yes it solve the problem, can you please also tell me what was the issue, Steev?
(0012796)
FarbodLinux   
2020-05-15 22:30   
Is there any new fixed 2020.2 release soon or we should use the driver script for every Rasberry Pi 4 we install this version?
(0012797)
steev   
2020-05-15 23:48   
The Xorg input driver (what you installed with apt-get install xserver-xorg-input-libinput) was accidentally removed due to some changes last minute. The change was committed to git, no I don't know when it will make it to the website, but yes, I plan to have an updated image sometime within the next week. So yes, you'll need to make the change on any other images you write currently, or you can clone the build scripts and run a build yourself to generate one with the fix.
(0012798)
FarbodLinux   
2020-05-16 00:03   
Thank you so much for your fast and effective support! Be safe!

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6993 [Kali Linux] New Tool Requests minor have not tried 2021-01-13 11:00 2021-01-21 15:43
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Starkiller - Frontend for PowerShell Empire
Description: [Name] - Starkiller
[Version] - 1.5.1
[Homepage] - https://www.bc-security.org/post/an-introduction-to-starkiller
[Download] - https://github.com/BC-SECURITY/Starkiller/tags
[Author] - BC-SECURITY
[License] - MIT ~ https://github.com/BC-SECURITY/Starkiller/blob/master/LICENSE
[Description] - Starkiller is a Frontend for Powershell Empire. It is an Electron application written in VueJS.
[Dependencies] - Node.js 10+ & Yarn
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014130)
sbrun   
2021-01-21 15:43   
version 1.6.0-kali-0kali3 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6403 [Kali Linux] Kali Package Bug minor always 2020-05-21 09:33 2021-01-20 21:14
Reporter: DrSpy Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Meterpreter session is closing exactly after 30 Seconds.
Description: Hi,

While exploiting using PHP, my sessions are expiring exactly after 30 seconds.

I'm using php payload to exploit command injection vulnerability.

I even made changes in php.ini to make the session go longer than 30 seconds by changing max_execution_time but still it doesn't work.

I'm getting this error "Meterpreter session is not valid and will be closed."

Please help me resolve this issue.

Setup Details:

Kali Linux: 5.6.0-kali1-amd64 (last updated on 2020-05-12)
Metasploit: 5.0.89-dev
Victim Machine: owaspbwa 2.6.32-25-generic-pae
Virtulization Product: VMWare Workstation 15

Output:
A=Attacker
V=Victim

msf5 exploit(multi/handler) > run

[] Started reverse TCP handler on 192.168.X.A:4444
[] Sending stage (38288 bytes) to 192.168.X.V
[*] Meterpreter session 1 opened (192.168.X.A:4444 -> 192.168.X.V:45365) at 2020-05-21 00:39:01 -0400

[-] Meterpreter session 1 is not valid and will be closed
[*] 192.168.X.V - Meterpreter session 1 closed.
Steps To Reproduce:
Additional Information: I have been trying to find the solution for this since last 3 days. Please help me resolve this on priority.
Attached Files:
Notes
(0012818)
usama   
2020-05-22 10:45   
You've already opened a ticket here https://github.com/rapid7/metasploit-framework/issues/13495.
(0012819)
DrSpy   
2020-05-22 11:56   
Yes I know but I haven't got the resolution for my issue... not here and certainly not there... If you know then please help me resolve this.
(0014126)
kali-bugreport   
2021-01-20 21:14   
It should be quite obvious that the Kali team can't give support for Metasploit so i wouldn't expect a solution here.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6989 [Kali Linux] Kali Package Bug crash have not tried 2021-01-12 11:15 2021-01-20 21:09
Reporter: kakulanex Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: VMWARE NOT LUNCHING
Description: This is urgent, am not be able to run vmware on my latest kali 2020.4. I tried all i know but everything seems to fail. This is the error am getting,

/usr/bin/vmware: line 105: 2056 Segmentation fault "$BINDIR"/vmware-modconfig --appname="VMware Workstation" --icon="vmware-workstation"


Please help.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014125)
kali-bugreport   
2021-01-20 21:09   
Shouldn't this be reported to VMWare instead?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7001 [Kali Linux] Kali Package Bug crash always 2021-01-20 20:21 2021-01-20 20:21
Reporter: barry Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: waagent (Azure agent) fails to run
Description: Hi,
I've noticed that the Azure waagent no longer runs on Kali (2020.4 / rolling; retried with latest dist-upgrade today)... See error output below.
The package name is 'waagent'.
Thanks
Steps To Reproduce: waagent -h
Additional Information: $ waagent -h
Traceback (most recent call last):
  File "/usr/sbin/waagent", line 33, in <module>
    sys.exit(load_entry_point('WALinuxAgent==2.2.47', 'console_scripts', 'waagent')())
  File "/usr/sbin/waagent", line 25, in importlib_load_entry_point
    return next(matches).load()
  File "/usr/lib/python3.9/importlib/metadata.py", line 77, in load
    module = import_module(match.group('module'))
  File "/usr/lib/python3.9/importlib/__init__.py", line 127, in import_module
    return _bootstrap._gcd_import(name[level:], package, level)
  File "<frozen importlib._bootstrap>", line 1030, in _gcd_import
  File "<frozen importlib._bootstrap>", line 1007, in _find_and_load
  File "<frozen importlib._bootstrap>", line 986, in _find_and_load_unlocked
  File "<frozen importlib._bootstrap>", line 680, in _load_unlocked
  File "<frozen importlib._bootstrap_external>", line 790, in exec_module
  File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed
  File "/usr/lib/python3/dist-packages/azurelinuxagent/agent.py", line 34, in <module>
    import azurelinuxagent.common.event as event
  File "/usr/lib/python3/dist-packages/azurelinuxagent/common/event.py", line 632, in <module>
    __event_logger__ = EventLogger()
  File "/usr/lib/python3/dist-packages/azurelinuxagent/common/event.py", line 304, in __init__
    osutil = get_osutil()
  File "/usr/lib/python3/dist-packages/azurelinuxagent/common/osutil/factory.py", line 50, in get_osutil
    return _get_osutil(distro_name, distro_code_name, distro_version, distro_full_name)
  File "/usr/lib/python3/dist-packages/azurelinuxagent/common/osutil/factory.py", line 79, in _get_osutil
    return DebianOSBaseUtil()
NameError: name 'DebianOSBaseUtil' is not defined
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6999 [Kali Linux] Kali Package Bug minor always 2021-01-18 06:31 2021-01-18 22:47
Reporter: bakrtech Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kali zsh not working properly
Description: I have the latest kali linux but when i switch to zsh from bash it shows kali%
not according to latest update
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014118)
steev   
2021-01-18 22:47   
This sounds like you have a .zshrc in place already - if you mv it out of the way, and re-run zsh from bash, it should prompt you

This is the Z Shell configuration function for new users,
zsh-newuser-install.
You are seeing this message because you have no zsh startup files
(the files .zshenv, .zprofile, .zshrc, .zlogin in the directory
~). This function can help you with a few settings that should
make your use of the shell easier.

You can:

(q) Quit and do nothing. The function will be run again next time.

(0) Exit, creating the file ~/.zshrc containing just a comment.
     That will prevent this function being run again.

(1) Continue to the main menu.

(2) Populate your ~/.zshrc with the configuration recommended
     by the system administrator and exit (you will need to edit
     the file by hand, if so desired).

--- Type one of the keys in parentheses ---

At this point, press 2, and you should get the kali default zsh.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6997 [Kali Linux] Kali Package Bug major always 2021-01-16 17:45 2021-01-16 18:06
Reporter: grizzwa Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Major xhci_hcd bug on Ryzen Desktops
Description: there's a major bug in the xhci driver discussed here:

https://bugzilla.kernel.org/show_bug.cgi?id=202541

nearly everyone working on a Ryzen system gets this anoying bug which makes nearly impossible to start monitor mode on wifi cards.
simply every usb device isn't working as expected

Steps To Reproduce: 1. having a ryzen system
2. boot
3. run sudo dmesg --level=err,warn | grep 'WARN Set TR'
4. if stdout gives one or more to stdout you affected of it : "xhci_hcd 0000:02:00.0: WARN Set TR Deq Ptr cmd failed due to incorrect slot or ep state."
Additional Information:
Attached Files: dmesg_output.png (27,231 bytes) 2021-01-16 17:45
https://bugs.kali.org/file_download.php?file_id=1997&type=bug
png

dmesg_output.txt (43,918 bytes) 2021-01-16 17:45
https://bugs.kali.org/file_download.php?file_id=1998&type=bug
dmesg_output_full.txt (130,250 bytes) 2021-01-16 18:06
https://bugs.kali.org/file_download.php?file_id=1999&type=bug
Notes
(0014114)
grizzwa   
2021-01-16 17:49   
seems like its fixed with Kernel 5.10-rc3.
5.10-rc3 has many many usb bugfixes
not yet tested!
(0014115)
grizzwa   
2021-01-16 18:06   
additional the whole dmesg output

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6994 [Kali Linux] Kali Websites & Docs text always 2021-01-15 20:27 2021-01-15 20:27
Reporter: Magas Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: peepdf is listed but not included in Kali Linux
Description: The pdf analyzing tool peepdf is listed here https://tools.kali.org/forensics/peepdf respectivly here https://tools.kali.org/tools-listing . But it is not included in Kali Linux 2020.4.
Steps To Reproduce: Boot Kali Linux. Start terminal and type "peepdf -h"
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6847 [Kali Linux] Tool Upgrade minor always 2020-11-18 17:58 2021-01-15 07:39
Reporter: tjnull Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Joplin Package on Kali is not using the latest version.
Description: The current package of Joplin needs to be updated as it contains a cross site scripting bug and it is missing a variety of fixes/features to improve the tool.

https://www.exploit-db.com/exploits/49024

Latest Version: https://github.com/laurent22/joplin/releases (1.4.10)


Steps To Reproduce:
Additional Information:
Attached Files: image.png (91,408 bytes) 2020-11-18 17:58
https://bugs.kali.org/file_download.php?file_id=1945&type=bug
png

image-2.png (33,467 bytes) 2020-11-18 17:58
https://bugs.kali.org/file_download.php?file_id=1946&type=bug
png
Notes
(0013690)
rhertzog   
2020-11-19 08:17   
Our issue currently is that the build system relies on yarn and yarnpkg is currently broken:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972952

And it can't be fixed because it's no longer buildable in Debian either:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960120

As Kali packagers, we really don't like this node ecosystem which is really brittle and next to impossible to package in a clean way and requires lots of efforts to keep it working...

i'm wondering if we should not replace the Kali package with a kaboxer container instead.
(0013967)
initinfosec   
2020-12-11 18:02   
@rhertzog - @TJ_Null was filling me in about this issue - would it be possible to touch base on this issue? I don't have a solution yet, but trying to replicate it on my end, and wanted to compare notes.

If so, what medium would be best to do this? Forum DM? Thanks.
(0013968)
rhertzog   
2020-12-12 15:09   
@initinfosec Email? buxy@kali.org Though the main issue is outside of my control so I don't really know what you expect from me. We're trying to package joplin out of the appimage binary release instead of building from source. Not clean but I don't really have a better solution.
(0014113)
sbrun   
2021-01-15 07:39   
version 1.6.7-0kali3 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6915 [Kali Linux] General Bug minor have not tried 2020-12-08 13:50 2021-01-13 09:14
Reporter: orenc78 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Fresh Kali and gvm install, getting fatal error on gvm-start
Description: gvm-start 2 ⨯
awk: fatal: cannot open file `/etc/default/greenbone-security-assistant’ for reading (No such file or directory)

Any ideas?
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014082)
fearx135   
2021-01-10 00:14   
I have the same error in kali 2020.4 (for raspberry). The gvm-setup is having a bug in the gvm-start, this is the workaround solution :

after you install your gvm (openvas), execute the following commands:
#gvm-setup
#gvm-check-setup (follow its instructions and execute their recomended commands, until it says "It seems like your GVM 20.8.0 installation is OK.")

then open your browser in: https://127.0.0.1:9392

Note: every time you restart kali, you'll have to execute gvm-setup and gvm-check-setup

===================
NOTE: DON'T use the gvm-start until kali fix it, i tried the following, and only started the openvas webserver:

The error is because the gvm-start command (/usr/bin/gvm-start) tries to find the GSA_PORT parameter in the /etc/default/greenbone-security-assistant, but that file is does not exist. Since, that file is used to set openvas variables. if you create a file and add the variables, the gvm-start command works fine (but does not start gvm):

cd /etc/default/
sudo touch greenbone-security-assistant
sudo nano greenbone-security-assistant
add the following line: (or the port for the gvm webservice)
GSA_PORT=9392
save and close the file, now execute gvm-start

Another method:
#nano /usr/bin/gvm-start
change the PORT parameter for your web port:
#PORT=$(awk [function that sucury detects as exploit] /etc/default/greenbone-security-assistant)
#PORT=9392

========================

As I said, this only start the web application but no the openvas server, so use the gvm-check-setup until they fix it.
(0014112)
sbrun   
2021-01-13 09:14   
gvm-start script is now fixed in gvm version 20.8.0.2

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6991 [Kali Linux] General Bug crash always 2021-01-13 00:43 2021-01-13 00:43
Reporter: ddyer Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: immediately after install, apt update causes a meltdow to a non-bootable state
Description: Note, this is an x32 machine, and among other things, the installation
process failed to detect and configure the battery and audio hardware.

Immediately after installation, I opened a shell and ran "sudo apt update"
it found a lot of things to update. After about 30 minutes of updating, the
machine crashed, into a non-bootable (except in "revovery mode" state)

In the crashed state, the screen was flashing infinite repetitions of the message
"Baytrail Audio Port: ASoC: no backend DAIs enabled for Baytrail Audio Port"

In recovery mode, I can't look around because "the root account is locked",
but on a previous iteration of this dance, it looked like installing a new kernel
was in progress.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6990 [Kali Linux] General Bug major always 2021-01-12 21:36 2021-01-12 21:36
Reporter: ddyer Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: net installer issues
Description: the net installer is only able to connect to open networks. Connecting to a wpa network
always fails.

once connected to an open network, dhcp always fails, and the network has to be
configured manually.

once manually configured, the "local mirror" phase, there are no valid mirrors.
After trying 10 or so I gave up and continued without.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6986 [Kali Linux] Kali Package Bug minor always 2021-01-11 05:15 2021-01-12 00:54
Reporter: ddyer Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: not fixable  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: missing network driver
Description: My hack "because I can" was to install Kali on an ancient x32 Inspiron laptop.
It all went well, except that the network driver was not found, although it was
correctly named.

BTW, no amount of futzing around with the named driver on "removable media"
as suggested by the complaint from the installer will work. Thanks for including
the correct driver name, but the details of how to package it for the installation
process are competely missing.

After installing with no internet, I found the drivers, copied them to /lib/fimware/bfms/
and now all is well with the network. It would be super cool if the drivers were included
in a future package.

Now for the payload: the necessary files are
-rw-r--r-- 1 root root 400864 Sep 23 01:11 brcmfmac43340-sdio.bin
-rw-r--r-- 1 root root 1620 Jul 5 2020 brcmfmac43340-sdio.txt

which can be acquired at
https://github.com/wkennington/linux-firmware/blob/master/brcm/brcmfmac43340-sdio.bin
https://gist.github.com/spacemeowx2/3fb19762b128875d1cbf59f99e7554b5

Steps To Reproduce:
Additional Information:
Attached Files: brcmfmac43340-sdio.bin (400,864 bytes) 2021-01-11 05:15
https://bugs.kali.org/file_download.php?file_id=1991&type=bug
brcmfmac43340-sdio.txt (1,620 bytes) 2021-01-11 05:15
https://bugs.kali.org/file_download.php?file_id=1992&type=bug
Notes
(0014096)
ddyer   
2021-01-11 07:51   
oops, that Insignia laptop, not Inspiron
(0014106)
steev   
2021-01-11 18:34   
Unfortunately, there isn't a whole lot we can do here. The broadcom firmware isn't available in the mainline tree, and trying to keep track of every possible branch out there, where someone might have committed a copy of the blob from their system, isn't something we can really do. Not to mention the redistribution issue as we, as a Linux distribution, do need to follow licenses. We're sorry for the inconvenience, but it is out of our hands.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6914 [Kali Linux] General Bug major sometimes 2020-12-06 20:12 2021-01-12 00:52
Reporter: 131Curious131 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Problem with wifi on dual-boot.
Description: I am a new linux user, and I'm sure this issue has been noted here.(at least it should have been) but I can't find it if it is. I've been ALL over the internet trying to find a fix for this. Apparently a lot of people have this same issue. I have yet to find a solution.

wireless card: Intel(R) Dual Band Wireless-AC 3165
problem: sometimes it reads the card and the wifi works, other times it does not. sometimes a reboot remedies the issue, sometimes it doesn't. Apparently from what I read this is a common problem with this type of card. If it reads the card and works fine for a day or two, then after a reboot it starts again. It might work for the first 3 minutes after startup, then goes down. It says its connected but isn't. after about 5 minutes it fails to show any connection at all.

I get this error: failed to wake nic for hcmd

Ive tried ip link set wlan0 down/up, and just about every other suggestion i could find. doesn't work. I get an input/output error.

I've tried just about every thing I can find listed about this. Nothing has worked.

 I dual boot kali with windows 10. it's not a hardware problem, as it reads it sometimes and for a few minutes after i reboot. and the card works fine with windows. i installed the correct drivers and still the issue persists. Has anyone found a remedy for this or is this a true bug?
Steps To Reproduce: Randomly happens. Not sure how to sure-fire reproduce it.
Additional Information:
Attached Files:
Notes
(0014089)
kali-bugreport   
2021-01-10 11:29   
Duplicate of 0006897

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6967 [Kali Linux] General Bug crash always 2020-12-31 15:15 2021-01-12 00:51
Reporter: fifty Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Full upgrade needs KDE ENVIRONMENT DESKTOP removal.
Description: Hi. I faced problem of deleting environment after full-upgrade of kali distro. But now i understood that at time of full-upgrade it wants kali kde removal.I am including picture for your understanding.Please fix these.Or give a proper solution.
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot_20201231_194429.png (189,428 bytes) 2020-12-31 13:47
https://bugs.kali.org/file_download.php?file_id=1980&type=bug
png
Notes
(0014090)
kali-bugreport   
2021-01-10 11:30   
Duplicate of 0006963

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6820 [Kali Linux] Kali Package Bug minor always 2020-11-04 13:32 2021-01-11 10:41
Reporter: skulldealer Platform:  
Assigned To: daniruiz OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: important package missing in repo source (name-tilix)
Description: important and popular terminal multiplexer called tilix is missing.
please fix it.

output-
root@ISP:/# apt update && apt-cache search tilix && apt install tilix -y && apt-get install tilix -y && cat /etc/apt/sources.list
Hit:1 https://kali.download/kali kali-rolling InRelease
Hit:2 http://ppa.launchpad.net/apt-fast/stable/ubuntu bionic InRelease
Hit:3 http://deb.i2p2.no unstable InRelease
Reading package lists... Done
Building dependency tree
Reading state information... Done
All packages are up to date.
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package tilix
root@ISP:/#

Steps To Reproduce: try this command-


apt update && apt-cache search tilix && apt install tilix -y && apt-get install tilix -y && cat /etc/apt/sources.list


ideally it should install tilix.

used mirrorscript v2 to find best server
Additional Information:
Attached Files:
Notes
(0013632)
skulldealer   
2020-11-04 13:39   
or is it that i am missing on a important source?
(0013633)
dQw4w9WgXcQ   
2020-11-04 15:30   
Have you tried this

Execute the command: mousepad /etc/apt/sources.list
Remove everything within that sources.list file
Duckduckgo for "Kali Linux Repository" (https://docs.kali.org/general-use/kali-linux-sources-list-repositories)
Scroll down and look for "The kali-rolling repository"
Copy everything within that kali-rolling and paste on sources.list file
Save the sources.list file
Execute the command: apt-get update
Now install your package(e.g:apt-get install tilix)

Or perhaps try


wget https://github.com/gnunn1/tilix/releases/download/1.9.3/tilix.zip
sudo unzip tilix.zip -d /
sudo glib-compile-schemas /usr/share/glib-2.0/schemas/



Because you might have to install it manually because Kali are normally a few versions behind on most tool repositories so.
(0013634)
skulldealer   
2020-11-04 16:10   
Tried renewing sources many times. Same issue. Usually Tilix can get easily installed on kali linux. I installed kali newly again on vm using week 45 installer iso file. I had this problem so I recreated my sources.list many times. Same issue.


Yeah I was able to install tillix by normal manual method but it was unnecessary.

Are you able to install Tilix?
(0013636)
steev   
2020-11-04 16:49   
Unfortunately, it was removed from Debian testing (which Kali is built on) - https://tracker.debian.org/news/1180947/tilix-removed-from-testing/ which also caused it to be removed from Kali.
(0013637)
rhertzog   
2020-11-04 17:06   
@dQw4w9WgXcQ I appreciate that you are trying to help but please refrain from doing broad assertions when you are not sure.

> Because you might have to install it manually because Kali are normally a few versions behind on most tool repositories so.

This is just plain wrong. It's quite the opposite, Kali is based on Debian testing which gets the lastest updates when the package is well maintained in Debian. In the case of tilix, the package has been dropped from testing due to a bug that has not been handled by its maintainers: https://bugs.debian.org/968816
See https://tracker.debian.org/pkg/tilix for more information about the package in Debian.

So you should really get in contact with the Debian maintainer and/or offer your help to get the package fixed in Debian and then it will come back to Kali.
(0013639)
rhertzog   
2020-11-04 17:12   
I sent a short mail to the Debian maintainers to make them aware of the package removal, hopefully that will trigger some action.
(0013640)
dQw4w9WgXcQ   
2020-11-04 17:23   
I apologise because English is not first language and sometimes I might have misunderstanding at some things.w

Sorry if I offended or upset you any way.
(0013641)
skulldealer   
2020-11-04 18:08   
Ok I got it. For now I have manually installed Tilix by the instructions provided in their GitHub page and the same are also provided above in this thread. I hope after Tilix is brought back to debian everything stays fine and nothing breaks because I have manually installed Tilix

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6907 [Kali Linux] General Bug crash always 2020-12-06 12:48 2021-01-11 09:54
Reporter: klbt001 Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: System Run Away while working with GVM 20.8
Description: System run away while working with GVM 20.8 which consumes all RAM and fills up complete swap space. In this situation complete system is inaccessible.
Only hard reset would bring system out of this state.
Steps To Reproduce: In my case I have a scan with about 2500 results in a single report.
Then user should go to report page for this specific scan and switch to the results tab.
Then he must reload the page/tab several times by adding filter directives.
Reloading (i.e. adding a new filter directive) should be done while results page is still loading.
Additional Information: Bug 0006763 is still there, but with GVM 20 and PostgrSQL 13.

It seems, that old database searches are still running (the page is still loading) and new searches are added to them.
After a while all system ressources are consumed from old, no longer needed searches.

I think we need an additional function which interrupts old, no longer needed searches when the specific user is starting a new search by changing filter directives.
Or, if interruption of old, no longer needed searches isn't possible, the user must not be able to do anythin new within UI until current action, i.e. the search, is finished.
Attached Files:
Notes
(0013956)
klbt001   
2020-12-08 23:20   
I was able to get a result of top short before the run-away:

--------

%Cpu(s): 0.5 us, 16.5 sy, 0.0 ni, 0.0 id, 82.7 wa, 0.0 hi, 0.3 si, 0.0 st
MiB Mem : 15892.4 total, 284.7 free, 15421.1 used, 186.6 buff/cache
MiB Swap: 32752.0 total, 23268.5 free, 9483.5 used. 139.7 avail Mem

    PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
     96 root 20 0 0 0 0 D 43.7 0.0 0:43.47 kswapd0
 191972 _gvm 20 0 11.6g 5.2g 1392 S 39.8 33.6 0:31.21 gsad
 192086 root 20 0 0 0 0 D 8.7 0.0 0:03.28 kworker/u16:7+kcryptd/254:1
 192094 root 20 0 0 0 0 D 8.7 0.0 0:02.62 kworker/u16:16+kcryptd/254:1
 160877 root 20 0 0 0 0 D 7.8 0.0 0:07.62 kworker/u16:6+kcryptd/254:1
 161454 root 20 0 0 0 0 D 7.8 0.0 0:07.04 kworker/u16:1+kcryptd/254:1
 162805 root 20 0 0 0 0 I 7.8 0.0 0:06.62 kworker/u16:8-kcryptd/254:0
 164000 root 20 0 0 0 0 D 7.8 0.0 0:04.95 kworker/u16:11+kcryptd/254:1
 176231 root 20 0 0 0 0 D 7.8 0.0 0:04.39 kworker/u16:4+kcryptd/254:1
 191982 root 20 0 0 0 0 D 7.8 0.0 0:02.52 kworker/u16:3+kcryptd/254:1
 192040 root 20 0 0 0 0 D 7.8 0.0 0:04.43 kworker/u16:5+kcryptd/254:1
 192116 root 20 0 7220 3552 2668 R 4.9 0.0 0:00.53 top
 192089 root 20 0 0 0 0 I 2.9 0.0 0:01.76 kworker/u16:12-kcryptd/254:0
    587 root 20 0 0 0 0 D 1.9 0.0 0:02.15 dmcrypt_write/2
     11 root 20 0 0 0 0 I 1.0 0.0 3:31.27 rcu_sched
   2348 user 20 0 879808 33460 5268 S 1.0 0.2 18:13.93 Xorg
   2640 user 20 0 413852 10740 6320 S 1.0 0.1 34:01.93 vino-server
  15487 root 20 0 0 0 0 I 1.0 0.0 0:10.07 kworker/3:2-mm_percpu_wq
 159047 root 20 0 270088 79364 1252 S 1.0 0.5 1:50.18 nessusd
 192059 _gvm 20 0 231420 27096 1684 D 1.0 0.2 0:00.09 gvmd
 192088 root 20 0 0 0 0 I 1.0 0.0 0:02.34 kworker/u16:10-kcryptd/254:0
      1 root 20 0 171424 4972 2452 S 0.0 0.0 0:21.87 systemd
      2 root 20 0 0 0 0 S 0.0 0.0 0:00.06 kthreadd
      3 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_gp
      4 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_par_gp
      6 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0:0H-kblockd
      9 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 mm_percpu_wq
     10 root 20 0 0 0 0 S 0.0 0.0 0:00.34 ksoftirqd/0
     12 root rt 0 0 0 0 S 0.0 0.0 0:00.75 migration/0
     13 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/0
     14 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/1
     15 root rt 0 0 0 0 S 0.0 0.0 0:00.87 migration/1
     16 root 20 0 0 0 0 S 0.0 0.0 0:00.26 ksoftirqd/1
     18 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/1:0H-events_highpri
     19 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/2
     20 root rt 0 0 0 0 S 0.0 0.0 0:00.85 migration/2

--------

It's a matter of some seconds. Now we see that gsad is consuming the memory and filling up swap space. Does we have some kind of memory leak?
(0013957)
klbt001   
2020-12-08 23:32   
The result of top of note #0013956 was taken after login to GSA and complete load of default dashboard.
(0014034)
sbrun   
2021-01-05 10:03   
You can test this tip:
https://bugs.kali.org/view.php?id=6763#c13981
(0014037)
klbt001   
2021-01-05 14:57   
@sbrun, I'm the reporter of ticket 0006763. Ticket 0006763 is about high CPU load because of PostgreSQL processes running.

This ticket 0006907 is about extreme RAM/swap consumption. While swapping the CPU load is also extreme because of swapping, but the main cause is the extreme RAM consumption of gsad. The system where I see the problem has 16 GB RAM and gsad is consuming all swap up to 32 GB so that gsad consumes in total 48 GB memory while it's normal operation.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6935 [Kali Linux] Kali Package Bug minor have not tried 2020-12-18 18:08 2021-01-11 09:50
Reporter: Rk.Chan Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: upadte packges error
Description: when i try to update
it says component not found on repository
and i have checked the source list and it is empty
sometimes it ignores certain packges
Steps To Reproduce: sudo apt-get update
http://ftp.harukasan.org/kali kali-bleeding-edge InRelease
Reading package lists... Done
W: Skipping acquire of configured file 'apt/xyz' as repository 'http://http.kali.org/kali kali-bleeding-edge InRelease' doesn't have the component 'apt' (component misspelt in sources.list?) and it appears several time

apt update
Hit:1 http://ftp.harukasan.org/kali kali-bleeding-edge InRelease
Reading package lists... Done
Building dependency tree
Reading state information... Done
2 packages can be upgraded. Run 'apt list --upgradable' to see them.
W: Skipping acquire of configured file 'apt/binary-i386/Packages' as repository 'http://http.kali.org/kali kali-bleeding-edge InRelease' doesn't have the component 'apt' (component misspelt in sources.list?)

Skipping acquire of configured file 'update/binary-i386/Packages' as repository 'http://http.kali.org/kali kali-bleeding-edge InRelease' doesn't have the component 'update' (component misspelt in sources.list?)
Additional Information:
Attached Files:
Notes
(0014091)
kali-bugreport   
2021-01-10 11:31   
Duplicate of 0006934
(0014098)
daniruiz   
2021-01-11 09:50   
Edit /etc/apt/source.list and correct the repository to "deb http://http.kali.org/kali kali-bleeding-edge contrib non-free main"

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6355 [Kali Linux] Kali Package Bug minor sometimes 2020-05-04 20:49 2021-01-11 03:21
Reporter: Deepak Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2020.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: No Icons
Description: Suddenly Desktop not working, all the icons Dissapeared
After re-installing kali linux problem was solved. But after three days of reinstallation..it happens again.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013118)
X0RW3LL   
2020-07-23 09:47   
Could you provide some more details?

What display manager are you using? (Gnome, XFCE, KDE, MATE)
When you say the "desktop is not working, all the icons disappeared", do you mean that the ENTIRE session is unresponsive? Or you just don't see icons like Computer and Trash on your actual desktop, but you can still open up any other application?

Also, your reported version 2020.1, is that the correct version you're on? Or did you download the latest one?
Please give me more information, and possibly some screenshots for someone to be able to figure out what's going on.
(0014095)
Dwek__   
2021-01-11 03:21   
This is similar to this issue.
https://bugs.kali.org/view.php?id=6941

I only started having issues with 2020.4

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6984 [Kali Linux] Kali Websites & Docs minor have not tried 2021-01-10 11:51 2021-01-10 14:05
Reporter: kali-bugreport Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Description template for new bug reports / new tool requests
Description: While browsing the bugtracker here i have noticed:

- a high amount of low quality bug reports
- repeated "to speed up the process please use that template" responses by the Kali team for new tool requests

Since version 2.13.0 Mantis seems to provide the possibility to configure / defined default descriptions for each category, maybe this could help to get bug reports with a higher quality:

https://support.mantishub.com/hc/en-us/articles/360002897994-Setting-default-values-for-issue-details
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014092)
kali-bugreport   
2021-01-10 13:42   
With "low quality" bug reports i mean a few things:

- misplaced questions / help requests which should go into the forums (e.g. 0006985)
- issues with long / continues text and including sentences like "i like to ..." where useful info from the issue first needs to be extracted with a lot of effort
- generally lack of information on the issue

The template could e.g. do a few things:

- Asking a few mandatory info in a structured way (e.g. problematic package, short steps like 1., 2., 3. to reproduce, ...)
- Short description that questions / help requests should go into the forums
- Link to https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/
- Have the content of e.g. 0004572:0009020
(0014094)
kali-bugreport   
2021-01-10 14:05   
Another issue which might be prevented is posting bug reports in e.g. the "New Tool Requests" category by adding a short comment on the purpose of the categories.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6941 [Kali Linux] General Bug major always 2020-12-23 07:16 2021-01-10 06:47
Reporter: Suhas Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: unable to view the desktop icons
Description: after install kali linux 2020.4 in my system desktop icons are not visible
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot_2020-12-23_02_15_00.png (441,234 bytes) 2020-12-23 07:16
https://bugs.kali.org/file_download.php?file_id=1969&type=bug
Notes
(0014084)
Dwek__   
2021-01-10 06:47   
I am getting the same issue.
I am also having issues with applications, if executed from the CLI, dropping the menu bar and not allowing foreground/background window switching.

This has only occurred after a full-upgrade to 2020.4
I initially thought it may be an NVIDIA video driver issue, but I have reloaded the drivers and kernel hooks, but this has not resolved the issue.

I am able to right-click on the background and get a terminal screen up.

Any help would be great.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6891 [Kali Linux] Queued Tool Addition minor have not tried 2020-12-01 10:54 2021-01-09 14:40
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Smuggler - An HTTP Request Smuggling / Desync testing tool
Description: [Name] - Smuggler
[Version] - N/A
[Homepage] - https://github.com/defparam/smuggler
[Download] - N/A
[Author] - Evan
[License] - https://github.com/defparam/smuggler/blob/master/LICENSE
[Description] - An HTTP Request Smuggling / Desync testing tool written in Python 3
[Dependencies] - Python 3
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014063)
g0tmi1k   
2021-01-08 13:41   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6888 [Kali Linux] Queued Tool Addition minor N/