View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7145 | [Kali Linux] Kali Package Bug | major | unable to reproduce | 2021-04-17 20:35 | 2021-04-17 20:35 |
Reporter: | keops | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | JS/Blackhole!MSR / MAJOR BLACHOLE MALWARE COME WITH THIS VERSION | ||||
Description: |
A major critical exploit come with the latest package of Kali 2021.1 image download , WHICH is typically used to install other malware or unwanted software to infect PC without my sign or my knowledge As Windows Defender Antivirus detects the threat and remove it before installation of this version of KALI |
||||
Steps To Reproduce: | I am somehow hesitate to continue with this version but I'll deal with inside a virtual machine to see what's going on on a clean machine. | ||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7144 | [Kali Linux] General Bug | major | always | 2021-04-17 19:50 | 2021-04-17 19:50 |
Reporter: | berkkucukk | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Explore store | ||||
Description: | I cannot connect to the Discover store. It always gives a connection error. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot_20210417_224739.png (35,417 bytes) 2021-04-17 19:50 https://bugs.kali.org/file_download.php?file_id=2063&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7143 | [Kali Linux] General Bug | trivial | random | 2021-04-16 03:25 | 2021-04-17 15:03 |
Reporter: | maced0 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Terminal is not accepting accents and is buggy | ||||
Description: |
The terminal does not accept accents in pt-br words. an example to follow, as soon as I type the word number it returns so n <ffffffff> <ffffffff> mere is a bug occurring, can someone help me solve this? It occurs with all kinds of accents. And the course of the terminal goes behind the $ of the terminal, leaving it all buggy is replicating the command. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
image.png (3,912 bytes) 2021-04-16 03:25 https://bugs.kali.org/file_download.php?file_id=2060&type=bug image-2.png (3,005 bytes) 2021-04-16 03:25 https://bugs.kali.org/file_download.php?file_id=2061&type=bug image-3.png (77,724 bytes) 2021-04-16 03:25 https://bugs.kali.org/file_download.php?file_id=2062&type=bug |
||||
Notes | |
(0014469)
Michu 2021-04-17 15:03 |
apt install locales-all locales-pt or dpkg-reconfigure locales could do the trick because you may don't have portugal subtitles |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7137 | [Kali Linux] General Bug | feature | unable to reproduce | 2021-04-08 18:26 | 2021-04-14 17:37 |
Reporter: | MOHE | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | couldn't find WiFi That's around me. | ||||
Description: |
After i instal the New version kali 2021.1 When I'm trying to call my wi-fi. Go to the Wi-Fi icon and start looking for the Wi-Fi. The result is 0. Knowing that I have Realtek chips And when I get my phone to USB and share the internet with it, it's normal. I can access Google YouTube and I can download files But I want to connect to The Wi-Fi without connecting my computer to USB. Please, I want a solution. Thank you |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
IMG_20210409_153641.jpg (160,440 bytes) 2021-04-09 14:40 https://bugs.kali.org/file_download.php?file_id=2048&type=bug IMG_20210411_093035.jpg (1,051,258 bytes) 2021-04-11 08:33 https://bugs.kali.org/file_download.php?file_id=2051&type=bug IMG_20210411_094539.jpg (690,849 bytes) 2021-04-11 08:48 https://bugs.kali.org/file_download.php?file_id=2052&type=bug IMG_20210412_134231.jpg (1,072,514 bytes) 2021-04-12 12:43 https://bugs.kali.org/file_download.php?file_id=2053&type=bug IMG_20210412_134452.jpg (788,520 bytes) 2021-04-12 12:46 https://bugs.kali.org/file_download.php?file_id=2054&type=bug IMG_20210412_134554.jpg (901,371 bytes) 2021-04-12 12:46 https://bugs.kali.org/file_download.php?file_id=2055&type=bug IMG_20210412_140036.jpg (1,237,392 bytes) 2021-04-12 13:01 https://bugs.kali.org/file_download.php?file_id=2056&type=bug IMG_20210412_140010.jpg (622,973 bytes) 2021-04-12 13:01 https://bugs.kali.org/file_download.php?file_id=2057&type=bug |
||||
Notes | |
(0014442)
Michu 2021-04-09 14:08 |
maybe ssid broadcasting is off, do you have wifi connection in phone? also there is a possibility that you don't have drivers to use wifi let me know what you got |
(0014443)
MOHE 2021-04-09 14:40 |
No i have driver in my kali watch the photo I have the icon of WiFi but he can't detect Any WiFi Around me When II share the internet from my phone via USB I can browse the internet |
(0014446)
Michu 2021-04-10 16:21 |
could you dump info from iwconfig and check if your wireless card can go to monitor mode ifconfig wlan < here number of your wireless card iwconfig wlan same here and airodump-ng wlannumberofyourcarmon0 |
(0014449)
MOHE 2021-04-11 08:33 |
i don't have number of my wirless card Maybe I should reload my wi-fi driver ? |
(0014450)
MOHE 2021-04-11 08:48 |
I'm sorry, I wrote earlier iwconfig I made a mistake. I don't understand " airodump-ng wlannumberofyourcarmon0" |
(0014453)
Michu 2021-04-12 12:22 |
airodump-ng wlannumberofyourcarmon0 is something like airodump-ng wlan0mon0 and i wrote airodump-ng wlannumberofyourcarmon0 because i don't know what number of wireless card is yours so that's example |
(0014454)
Michu 2021-04-12 12:25 |
so your interface is wlan0 i see that now so try iwconfig wlan0 and airodump-ng wlan0mon0 and dump output will see what we will get maybe its driver messing with you :) |
(0014456)
MOHE 2021-04-12 12:43 |
I've been looking a lot in the last days for a solution to my problem, so I found out there was a problem with my chip Realtek RTL8821CE 802.11ac PCIe Adapter. kali linux can't recognize this chip. And when I'm trying to install the pilot, I have a lot of error messages. https://www.linux.org/threads/help-install-kali-wifi-driver-for-realtek-rtl8821ce-802-11ac-pcie-adapter.32938/ |
(0014457)
MOHE 2021-04-12 12:46 |
when I instal the driver the wlan0 show |
(0014458)
MOHE 2021-04-12 13:01 |
When I restart my laptop it show me |
(0014463)
Michu 2021-04-13 19:19 |
told you that driver is messing with you :) on first 2 pics you see effects after driver installation but on other 2 driver maybe gone away dump info from /var/lib/dkms etc. from the line that is starting !Consult there is everything what we need figure whats next in my opinion there is 2 options 1 wait for kernel update because looks like he is responsible for error and its mention on picture 1 after link to linux.org 2 more risky but could do effect compile kernel by yourself dump that infos and will see what next ok.Cheers |
(0014465)
MOHE 2021-04-14 12:07 |
Thank u i update the kernel and it working now thank u ☺️✌️�� |
(0014466)
Michu 2021-04-14 17:31 |
that's great and no problem everybody helps each other thats purpose of tis forum and thanks i could help cheers |
(0014467)
MOHE 2021-04-14 17:37 |
Yah thank u Michi !! |
(0014468)
MOHE 2021-04-14 17:37 |
Michu my bad � |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7141 | [Kali Linux] General Bug | major | always | 2021-04-12 14:23 | 2021-04-14 02:41 |
Reporter: | Gourav Sharma | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Bluetooth is not working | ||||
Description: | Bluetooth is in active status but it does not show any devices present it remain in off condition | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014462)
ved 2021-04-13 02:24 |
type this in terminal : sudo /etc/init.d/bluetooth start |
(0014464)
Michu 2021-04-13 19:21 |
or service bluetooth status and start |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7142 | [Kali Linux] General Bug | minor | have not tried | 2021-04-13 14:37 | 2021-04-13 14:37 |
Reporter: | suhasjain | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | not able return back from kali undercover mode | ||||
Description: | i am now in undercover mode,when i hit undercover mode icon it doesn't return back.It will just show desktop settings restored | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6956 | [Kali Linux] Queued Tool Addition | minor | N/A | 2020-12-30 03:48 | 2021-04-12 21:51 |
Reporter: | devGregA | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | OWASP DefectDojo | ||||
Description: |
[Name] - The name of the tool OWASP DefectDojo [Version] - What version of the tool should be added? 1.11.0 [Homepage] - https://www.defectdojo.org/ https://github.com/DefectDojo/django-DefectDojo https://defectdojo.readthedocs.io/en/latest/ [Download] - Where to go to get the tool? https://github.com/DefectDojo/django-DefectDojo/releases/tag/1.11.0 or https://hub.docker.com/u/defectdojo - docker images are the easiest way to get the new releases. [Author] - Who made the tool? DefectDojo is maintained by a group: https://github.com/DefectDojo/django-DefectDojo#project-moderators, but I am the original author. [Licence] - How is the software distributed? What conditions does it come with? BSD 3-Clause https://github.com/DefectDojo/django-DefectDojo/blob/master/LICENSE.md [Description] - What is the tool about? What does it do? Combines scan results from multiple scanners to consolidate metrics, make reporting easier, and remove duplicates / false positive using heuristic algorithms. [Dependencies] - What is needed for the tool to work? If docker is an option, only the docker images. We typically recommend adding the start up to Systemctl [Similar tools] - What other tools are out there? Threadfix, CodeDX, Dradis. [Activity] - When did the project start? Is is still actively being deployed? Approximately 7 years ago. Yes, actively maintained and continuing to grow. We're a flagship project under OWASP. [How to install] - How do you compile it? No compiling is necessary with the docker images. Note, using source code to acquire (e.g. git clone/svn checkout) can't be used - Also downloading from the head. Please use a "tag" or "release" version. [How to use] - What are some basic commands/functions to demonstrate it? Example 1: Say you like using openVAS for scanning infrastructure and ZAP for applications. DefectDojo is an easy way to take the results from both and export one report without having to manually combine. Example 2: Say you really like Burp Suite for finding some vulnerabilities, but you also like Arachni for others. You can ship the results from both into DefectDojo. Dojo will attempt to remove duplicates/overlap by looking at the endpoint/location and finding details. [Packaged] - Is the tool already packaged for Debian? There is not, but we have a maintainer who is familiar with Debian packaging and happy to assist. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014053)
g0tmi1k 2021-01-08 13:26 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0014107)
devGregA 2021-01-11 22:08 |
Thanks for getting back to me @g0tmi1k. Will review the packaging process and discuss with the team. Back with you shortly. |
(0014117)
devGregA 2021-01-17 06:31 |
We've reviewed and will take a first run at the packaging. Expecting to be able to complete it this week. |
(0014461)
devGregA 2021-04-12 21:51 |
All, sorry for the delay. We have made bandwith and have started the effort. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7126 | [Kali Linux] Feature Requests | feature | unable to reproduce | 2021-03-31 14:49 | 2021-04-12 16:33 |
Reporter: | ved | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | titlebar buttons gone missing | ||||
Description: | titlebar buttons ...maximize....minimize .....close buttons gone from gnome on some of windows | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot from 2021-04-12 22-01-53.png (1,802,389 bytes) 2021-04-12 16:33 https://bugs.kali.org/file_download.php?file_id=2059&type=bug |
||||
Notes | |
(0014445)
ved 2021-04-10 16:02 |
hey guys ...... thanks for fixing title bar buttons.....you guys made my day....... |
(0014448)
ved 2021-04-11 01:59 |
hey guys.... before shutting down my kali linux in night .....you guys have added the buttons.....but when i boot my kali today in the morning .......the titlebar buttons again gone missing...... |
(0014460)
ved 2021-04-12 16:33 |
fix it soon guys .....i'm waiting for it for so many days......it looks bad on some of windows .....recently logged into KDE .....and got that KDE dirty looking buttons..... |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7131 | [Kali Linux] General Bug | tweak | always | 2021-04-05 18:46 | 2021-04-12 14:41 |
Reporter: | berkkucukk | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | kde plasma widget | ||||
Description: | Sensors section does not work in kde plasma system widgets. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot_20210405_214112.png (507,268 bytes) 2021-04-05 18:46 https://bugs.kali.org/file_download.php?file_id=2041&type=bug Screenshot_20210408_224313.png (31,646 bytes) 2021-04-08 19:44 https://bugs.kali.org/file_download.php?file_id=2046&type=bug Screenshot_20210412_173944.png (116,390 bytes) 2021-04-12 14:41 https://bugs.kali.org/file_download.php?file_id=2058&type=bug |
||||
Notes | |
(0014430)
steev 2021-04-05 18:54 |
Is lm-sensors installed and set up? |
(0014439)
berkkucukk 2021-04-08 19:44 |
Yes the latest version is installed. |
(0014440)
berkkucukk 2021-04-08 19:47 |
But I still can't choose the sensor. |
(0014444)
berkkucukk 2021-04-09 20:08 |
I formatted it before to fix this problem but it didn't work. |
(0014455)
Michu 2021-04-12 12:28 |
what's output of sensors |
(0014459)
berkkucukk 2021-04-12 14:41 |
Sensors are working fine. I cannot select sensors only when adding widgets. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6896 | [Kali Linux] General Bug | text | always | 2020-12-03 02:50 | 2021-04-12 09:10 |
Reporter: | wwywyeydy | Platform: | |||
Assigned To: | daniruiz | OS: | |||
Priority: | low | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.2 | ||
Target Version: | |||||
Summary: | Terminal | ||||
Description: |
When I install libreoffice, specials chars disappear in terminal. Can you help me? |
||||
Steps To Reproduce: | sudo apt install libreoffice | ||||
Additional Information: | |||||
Attached Files: |
report.png (287,357 bytes) 2020-12-03 02:50 https://bugs.kali.org/file_download.php?file_id=1953&type=bug |
||||
Notes | |
(0013950)
daniruiz 2020-12-08 08:59 |
That is weird. I've checked it and I can confirm this issue, so I'll continue investigating it. Thanks for reporting! |
(0013953)
daniruiz 2020-12-08 12:17 |
I've tested all the fonts that are installed as a dependency by libreoffice and the one that breaks the icons is fonts-noto-core. This issue is also present in konsole terminal so this might be a Qt issue. |
(0013971)
wwywyeydy 2020-12-13 19:56 |
Hello, it can be fixed? |
(0014036)
daniruiz 2021-01-05 13:52 |
I'm trying to find the issue but had no luck for now. This needs to be fixed |
(0014038)
mantisjr 2021-01-05 15:02 |
Please try these steps: 1. Download the tar.gz file from https://www.libreoffice.org/download/download/?type=deb-x86_64&version=7.0.4&lang=en-US 2. unpack it 3. open the folder "DEBS" in the terminal 4. type "sudo dpkg -i *.deb" I hope this will help |
(0014039)
rhertzog 2021-01-06 07:06 |
Maybe Qt ends up using/favoring the noto font but the font as installed lacks the special characters? What happens if you install "fonts-noto" which should pull all the other fonts-noto-*? Aren't we forcing the use of another font currently? Maybe our default font lacks the symbols and Qt tries to fallback to noto knowing that it should have all the symbols and in fact we have only a subset? |
(0014308)
mantisjr 2021-03-10 09:50 |
When I reinstalled Kali I had the same issue. I tested what would happen if I removed fonts-noto-core and: It helped! So after installing LibreOffice type "sudo apt remove fonts-noto-core" and close the terminal. When you open the Terminal now, everything will be fine. |
(0014452)
daniruiz 2021-04-12 09:10 |
Fixed for Kali 2021.2 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7138 | [Kali Linux] Kali Package Bug | minor | always | 2021-04-09 05:17 | 2021-04-12 09:09 |
Reporter: | rootjb0 | Platform: | |||
Assigned To: | daniruiz | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2021.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.2 | ||
Target Version: | |||||
Summary: | Qterminal not showing certain characters after full-upgrade | ||||
Description: |
Ever since Kali switched to Zsh in late 2020 (which was a great choice), every time I update the system after installing qterminal stops showing certain characters. Namely, the character between the user and the hostname for both the regular user and the root user. Is this a Kali bug, a Qterminal bug? Is there a way to fix this? I've tried reinstalling Qterminal and it does not solve the issue. |
||||
Steps To Reproduce: |
0. Install latest Kali ISO 1. 'sudo apt update && sudo apt full-upgrade' 2. Reboot or log out then back in. 3. Qterminal should now have stopped showing the star in a circle character in the terminal. |
||||
Additional Information: | |||||
Attached Files: |
b4after.jpeg (15,570 bytes) 2021-04-09 05:17 https://bugs.kali.org/file_download.php?file_id=2047&type=bug |
||||
Notes | |
(0014441)
daniruiz 2021-04-09 07:33 |
Hello. This is an issue with qterminal and noto fonts. Try removing them with `sudo apt remove fonts-noto-core` Related issue: https://bugs.kali.org/view.php?id=6896 |
(0014451)
daniruiz 2021-04-12 09:09 |
Fixed for Kali 2021.2 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7140 | [Kali Linux] General Bug | major | always | 2021-04-11 15:41 | 2021-04-11 15:41 |
Reporter: | berkkucukk | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | External Monitor | ||||
Description: |
I cannot transmit images to the external display connected via HDMI. The laptop has Intel and Nvidia graphics card. Graphics card in hybrid mode in my bios settings. I tried every way but couldn't solve this problem. If Nvidia bumblebee is installed it would be resolved but I cannot install it because I got an error during installation. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7139 | [Kali Linux] Kali Package Bug | minor | always | 2021-04-11 03:19 | 2021-04-11 03:19 |
Reporter: | punisher2k7 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Nethunter Can`t install Chroot | ||||
Description: | https://forums.kali.org/showthread.php?50333-Chroot-is-not-getting-installed&p=98443#post98443 | ||||
Steps To Reproduce: | run app - download chroot - try to install chroot | ||||
Additional Information: | |||||
Attached Files: |
nethunt.jpg (470,374 bytes) 2021-04-11 03:19 https://bugs.kali.org/file_download.php?file_id=2049&type=bug nethunt2.jpg (994,566 bytes) 2021-04-11 03:19 https://bugs.kali.org/file_download.php?file_id=2050&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7136 | [Kali Linux] Feature Requests | minor | always | 2021-04-07 19:13 | 2021-04-10 16:22 |
Reporter: | LeeRock | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Unable to start web browser from the command line when running as root. | ||||
Description: |
This has always been an option until recently. When running as root, there should be NO restrictions. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014447)
Michu 2021-04-10 16:22 |
maybe sandbox is blocking her what's the browser ? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7129 | [Kali Linux] Feature Requests | feature | unable to reproduce | 2021-04-04 04:54 | 2021-04-08 18:13 |
Reporter: | RME Systems | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | add realtek rtl8723de wifi driver | ||||
Description: | I would like if it is possible to add the wifi driver for realtek rtl8723de. Thank you | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014438)
MOHE 2021-04-08 18:13 |
I have the same problem when I instal kali 2021.1 i can't détecté eny WiFi wirless And i have Realtek chips |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7061 | [Kali Linux] General Bug | minor | always | 2021-02-23 22:36 | 2021-04-08 06:28 |
Reporter: | jaalinaam | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Logitech G602 stopped working after Kernel 5.10.11 | ||||
Description: |
I have a Logitech G602 gaming mouse with configurable buttons which have stopped working, there has already been a requesed raised for this in linux github and a patch will be implimented in next release. Requesting you to kindly support in Kaali as well https://github.com/libratbag/libratbag/issues/1124 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014245)
steev 2021-02-23 23:24 |
The patch in particular is https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=ef07c116d98772952807492bd32a61f5af172a94 ; it does have a fixes tag, so it should be backported to the 5.10 kernel, but it hasn't made its way there yet. |
(0014435)
jaalinaam 2021-04-07 20:37 |
Hi Steev, this issue has been fixed, requesting you to close this request. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7121 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2021-03-30 03:09 | 2021-04-08 06:27 |
Reporter: | Erika carpenter | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System | ||||
Description: |
Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System - [Name] - Quark-Engine - [Version] - 21.3.1 - [Homepage] - https://github.com/quark-engine/quark-engine - [Download] - https://github.com/quark-engine/quark-engine/releases - [Author] - JunWei Song(krnick) - [Licence] - GPL v3 - [Description] - Quark-Engine is a full-featured Android analysis framework written in Python for hunting threat intelligence inside the APK, DEX files. Since it is rule-based, you can use the ones built-in or customize as needed. With ideas decoded from criminal law, Quark-Engine has its unique angles for Android analysis. We developed a Dalvik bytecode loader that has tainted analysis inside but also defeats the obfuscation techniques used against reverse engineering. And surprisingly, the loader matches perfectly the design of our malware scoring system. Quark-Engine is very easy to use and also provides flexible output formats. There are three types of output reports: detail report, call graph, and summary report. With these reports in mind, you can get an overview of the high-risk behavior inside Android within seconds. Also, by integrating with other Android analysis tools such as Ghidra, APKLAB, Jadx, Quark-Engine can greatly improve the efficiency of reverse engineers. - [Dependencies] - python3, git, graphviz - [Similar tools] - MobSF - [How to install] - https://github.com/quark-engine/quark-engine#installation - [How to use] - https://quark-engine.readthedocs.io/en/latest/ Quark-Engine already presented at DEFCON 28 BTV, HITB Lockdown 002, and will release more features at BlackHat Asia 2021 Arsenal. Also, Quark-Engine is now integrated with many open-source tools, such as IntelOwl, BlackArch Linux, Pithus/Bazaar, and APKLAB. We have experiences (ghidraquark, APKLab) developing a feature that when users click on one of the activities, the corresponding smali source codes are highlighted for manual verification. This boosts up the speed for malware analysts. Reference: 1. Integrating with Ghidra: https://github.com/quark-engine/ghidraquark Quick demo for the quark usage with Ghidra https://www.youtube.com/watch?v=VXzfFB2S4bo&ab_channel=JunWeiSong 2. Android malware reports that using Quark-Engine to analyze: https://github.com/quark-engine/quark-reports 3. Quark-Engine Rules: https://github.com/quark-engine/quark-rules 4. BlackHat Asia 2021 Arsenal https://www.blackhat.com/asia-21/arsenal/schedule/index.html#quark-engine-storyteller-of-android-malware-22458 5. DEFCON 28 BTV https://www.youtube.com/watch?v=XK-yqHPnsvc&ab_channel=DEFCONConference 6. HITB Lockdown 002 https://conference.hitb.org/hitb-lockdown002/sessions/quark-engine-an-obfuscation-neglect-android-malware-scoring-system/ |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
螢幕快照 2021-04-07 下午11.26.38.png (35,707 bytes) 2021-04-08 03:14 https://bugs.kali.org/file_download.php?file_id=2043&type=bug 螢幕快照 2021-04-07 下午11.26.56.png (42,507 bytes) 2021-04-08 03:14 https://bugs.kali.org/file_download.php?file_id=2044&type=bug 螢幕快照 2021-04-08 上午11.07.45.png (207,062 bytes) 2021-04-08 03:14 https://bugs.kali.org/file_download.php?file_id=2045&type=bug |
||||
Notes | |
(0014404)
g0tmi1k 2021-03-26 13:32 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0014405)
krnick 2021-03-29 07:54 |
Thank you Kali Linux team for the acceptance of quark-engine, I'd love to work on the packaging. |
(0014437)
krnick 2021-04-08 03:14 |
Hello @g0tmi1k @kali-team, I have packaged the quark-engine to Debian package in the latest release version "v21.4.3". The .deb file could be download here: https://github.com/quark-engine/quark-engine/releases/tag/v21.4.3 Our Debian setting directory: https://github.com/quark-engine/quark-engine/tree/master/debian Note: I have checked the package list of both "androguard" and "python3-graphviz" via apt-cache search, but it still needs to manually download "androguard" and "python3-graphviz" even if I put them in debian/control. Many thanks! |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6791 | [Kali Linux] Kali Package Bug | minor | random | 2020-10-14 18:48 | 2021-04-08 00:33 |
Reporter: | wrathofgod | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.3 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kex crached | ||||
Description: |
Keev, After trying to deal in the installation and running of "proxychains" which lead me to other many other issues, and trying to fix them in order to get the "proxychains fixed", accidentally i messed up with "Kex" and "source.list" files. Now, everything we achieved together in order to get the GUI up a running, now is crashed. I tried to reinstall everything, but it didn't worked, as also, the "source.list" is directly related to the update and upgrade of linux. PLEASE HELP!! |
||||
Steps To Reproduce: |
In bach terminal, kex > error crashed |
||||
Additional Information: | |||||
Attached Files: |
UnableToKex.png (128,927 bytes) 2020-10-14 18:48 https://bugs.kali.org/file_download.php?file_id=1923&type=bug image.png (25,376 bytes) 2021-04-08 00:33 https://bugs.kali.org/file_download.php?file_id=2042&type=bug |
||||
Notes | |
(0014436)
maxhyt 2021-04-08 00:33 |
This is because TigerVNC thinks Win-Kex startup script ended too fast. Edit the script at: "/usr/lib/win-kex/xstartup". Remove the '&' after 'startxfce4' command at the bottom of the script. This makes the xfce session not running in the background and TigerVNC can continue normally |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7125 | [Kali Linux] Tool Upgrade | block | always | 2021-03-31 08:17 | 2021-04-07 16:58 |
Reporter: | tn4417 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | assigned | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | upgrade error | ||||
Description: |
└─# apt update -y && apt full-upgrade -y && apt autoremove -y && apt autoclean -y && apt-get clean all 100 ⨯ Hit:1 http://ftp.debian.org/debian stable InRelease Hit:2 http://kali.download/kali kali-rolling InRelease Hit:3 http://kali.download/kali kali-last-snapshot InRelease Hit:4 http://kali.download/kali kali-experimental InRelease Hit:5 http://kali.download/kali kali-dev InRelease Hit:6 http://dl.google.com/linux/chrome/deb stable InRelease Reading package lists... Done Building dependency tree... Done Reading state information... Done 61 packages can be upgraded. Run 'apt list --upgradable' to see them. Reading package lists... Done Building dependency tree... Done Reading state information... Done You might want to run 'apt --fix-broken install' to correct these. The following packages have unmet dependencies: libc6-dev : Depends: libc6 (= 2.31-10) but 2.31-9 is installed libc6-i386 : Depends: libc6 (= 2.31-10) but 2.31-9 is installed E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution). |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014424)
tn4417 2021-03-31 08:18 |
└─# apt update -y && apt full-upgrade -y && apt autoremove -y && apt autoclean -y && apt-get clean all 130 ⨯ Hit:1 http://kali.download/kali kali-rolling InRelease Hit:2 http://dl.google.com/linux/chrome/deb stable InRelease Hit:3 http://ftp.debian.org/debian stable InRelease Hit:4 http://kali.download/kali kali-last-snapshot InRelease Hit:5 http://kali.download/kali kali-experimental InRelease Hit:6 http://kali.download/kali kali-dev InRelease Reading package lists... Done Building dependency tree... Done Reading state information... Done 66 packages can be upgraded. Run 'apt list --upgradable' to see them. Reading package lists... Done Building dependency tree... Done Reading state information... Done Calculating upgrade... Done The following NEW packages will be installed: libmirisdr0 linux-headers-5.10.0-kali5-amd64 linux-headers-5.10.0-kali5-common linux-image-5.10.0-kali5-amd64 soapysdr0.7-module-mirisdr soapysdr0.7-module-rfspace The following packages will be upgraded: amass amass-common bind9-dnsutils bind9-host bind9-libs exploitdb firefox-esr geoclue-2.0 gir1.2-geoclue-2.0 gir1.2-javascriptcoregtk-4.0 gir1.2-webkit2-4.0 gnutls-bin google-chrome-stable kali-menu libc-bin libc-dev-bin libc-devtools libc-l10n libc6 libc6-dev libc6-i386 libcaca0 libcpupower1 libgeoclue-2-0 libglib2.0-0 libglib2.0-bin libglib2.0-data libglib2.0-dev libglib2.0-dev-bin libgnutls-dane0 libgnutls30 libjavascriptcoregtk-4.0-18 liblirc-client0 libpam-modules libpam-modules-bin libpam-runtime libpam0g libplymouth5 libqt5qml5 libqt5qmlmodels5 libqt5quick5 libsoapysdr0.7 libssl1.1 libwebkit2gtk-4.0-37 linux-compiler-gcc-10-x86 linux-headers-amd64 linux-image-amd64 linux-kbuild-5.10 linux-libc-dev locales locales-all maltego metasploit-framework openssl plymouth plymouth-label python3-lxml python3-netaddr soapysdr0.7-module-all sslscan sslyze tasksel tasksel-data texlive-latex-extra texlive-plain-generic xsser 66 upgraded, 6 newly installed, 0 to remove and 0 not upgraded. Need to get 404 MB/626 MB of archives. After this operation, 358 MB of additional disk space will be used. Get:1 http://kali.download/kali kali-rolling/non-free amd64 maltego all 4.2.16.13775-0kali1 [129 MB] Get:2 http://kali.download/kali kali-rolling/main amd64 kali-menu all 2021.2.0 [7,035 kB] Get:3 http://kali.download/kali kali-rolling/main amd64 libcaca0 amd64 0.99.beta19-2.2 [348 kB] Get:4 http://kali.download/kali kali-rolling/main amd64 libcpupower1 amd64 5.10.24-1kali1 [1,010 kB] Get:5 http://kali.download/kali kali-rolling/main amd64 liblirc-client0 amd64 0.10.1-6.3 [70.9 kB] Get:6 http://kali.download/kali kali-rolling/main amd64 libplymouth5 amd64 0.9.5-3 [108 kB] Get:7 http://kali.download/kali kali-rolling/main amd64 libqt5qml5 amd64 5.15.2+dfsg-5 [1,318 kB] Get:8 http://kali.download/kali kali-rolling/main amd64 libqt5qmlmodels5 amd64 5.15.2+dfsg-5 [193 kB] Get:9 http://kali.download/kali kali-rolling/main amd64 libqt5quick5 amd64 5.15.2+dfsg-5 [1,558 kB] Get:10 http://kali.download/kali kali-rolling/main amd64 libsoapysdr0.7 amd64 0.7.2-2 [104 kB] Get:11 http://kali.download/kali kali-rolling/main amd64 linux-compiler-gcc-10-x86 amd64 5.10.24-1kali1 [1,003 kB] Get:12 http://kali.download/kali kali-rolling/main amd64 linux-headers-5.10.0-kali5-common all 5.10.24-1kali1 [9,496 kB] Get:13 http://kali.download/kali kali-rolling/main amd64 linux-kbuild-5.10 amd64 5.10.24-1kali1 [1,244 kB] Get:14 http://kali.download/kali kali-rolling/main amd64 linux-headers-5.10.0-kali5-amd64 amd64 5.10.24-1kali1 [1,530 kB] Get:15 http://kali.download/kali kali-rolling/main amd64 linux-headers-amd64 amd64 5.10.24-1kali1 [1,148 B] Get:16 http://kali.download/kali kali-rolling/main amd64 linux-image-5.10.0-kali5-amd64 amd64 5.10.24-1kali1 [53.0 MB] Get:17 http://kali.download/kali kali-rolling/main amd64 linux-image-amd64 amd64 5.10.24-1kali1 [1,456 B] Get:18 http://kali.download/kali kali-dev/main amd64 locales-all amd64 2.31-10 [10.8 MB] Get:19 http://kali.download/kali kali-dev/main amd64 openssl amd64 1.1.1k-1 [850 kB] Get:20 http://kali.download/kali kali-rolling/main amd64 metasploit-framework amd64 6.0.37-0kali1 [129 MB] Get:21 http://kali.download/kali kali-rolling/main amd64 plymouth-label amd64 0.9.5-3 [18.2 kB] Get:22 http://kali.download/kali kali-rolling/main amd64 plymouth amd64 0.9.5-3 [138 kB] Get:23 http://kali.download/kali kali-dev/main amd64 python3-lxml amd64 4.6.3-1 [1,091 kB] Get:24 http://kali.download/kali kali-rolling/main amd64 python3-netaddr all 0.7.19-5 [253 kB] Get:25 http://kali.download/kali kali-rolling/main amd64 libmirisdr0 amd64 0.0.4.59ba37-5+b1 [10.5 kB] Get:26 http://kali.download/kali kali-rolling/main amd64 soapysdr0.7-module-mirisdr amd64 0.2.5-3+b2 [46.4 kB] Get:27 http://kali.download/kali kali-rolling/main amd64 soapysdr0.7-module-rfspace amd64 0.2.5-3+b2 [79.6 kB] Get:28 http://kali.download/kali kali-rolling/main amd64 soapysdr0.7-module-all amd64 0.7.2-2 [8,160 B] Get:29 http://kali.download/kali kali-rolling/main amd64 sslscan amd64 2.0.9-0kali1 [1,179 kB] Get:30 http://kali.download/kali kali-rolling/main amd64 sslyze all 4.1.0-0kali1 [400 kB] Get:31 http://kali.download/kali kali-rolling/main amd64 texlive-latex-extra all 2020.20210202-3 [13.7 MB] Get:32 http://kali.download/kali kali-rolling/main amd64 texlive-plain-generic all 2020.20210202-3 [27.0 MB] Get:33 http://kali.download/kali kali-rolling/main amd64 xsser all 1.8.4-0kali1 [11.5 MB] Fetched 366 MB in 2min 38s (2,317 kB/s) apt-listchanges: Reading changelogs... Extracting templates from packages: 100% Preconfiguring packages ... (Reading database ... 516498 files and directories currently installed.) Preparing to unpack .../0-libc6-i386_2.31-10_amd64.deb ... Unpacking libc6-i386 (2.31-10) over (2.31-9) ... Preparing to unpack .../1-libc-devtools_2.31-10_amd64.deb ... Unpacking libc-devtools (2.31-10) over (2.31-9) ... Preparing to unpack .../2-libc6-dev_2.31-10_amd64.deb ... Unpacking libc6-dev:amd64 (2.31-10) over (2.31-9) ... Preparing to unpack .../3-libc-dev-bin_2.31-10_amd64.deb ... Unpacking libc-dev-bin (2.31-10) over (2.31-9) ... Preparing to unpack .../4-linux-libc-dev_5.10.24-1kali1_amd64.deb ... Unpacking linux-libc-dev:amd64 (5.10.24-1kali1) over (5.10.19-1kali1) ... Preparing to unpack .../5-libc6_2.31-10_amd64.deb ... dpkg: error processing archive /tmp/apt-dpkg-install-WXjYUn/5-libc6_2.31-10_amd64.deb (--unpack): new libc6:amd64 package pre-installation script subprocess returned error exit status 10 Errors were encountered while processing: /tmp/apt-dpkg-install-WXjYUn/5-libc6_2.31-10_amd64.deb E: Sub-process /usr/bin/dpkg returned an error code (1) |
(0014434)
Michu 2021-04-07 16:58 |
apt gave you a potential solution E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution). after Try word copy and paste and see what will happen and if it won't work let me know |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7134 | [Kali Linux] General Bug | block | always | 2021-04-07 04:51 | 2021-04-07 16:02 |
Reporter: | gentoo9ball | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | high | OS Version: | |||
Status: | resolved | Product Version: | 2021.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | netboot image has not been rebuilt to kali6 | ||||
Description: |
PXE Booting Kali with linux/initrd.gz from here tries to use 5.10.0-kali5-amd64 http://archive.kali.org/kali/dists/kali-rolling/main/installer-amd64/current/images/netboot/debian-installer/amd64/ |
||||
Steps To Reproduce: |
PXE Kali with linux/initrd.gz from here http://archive.kali.org/kali/dists/kali-rolling/main/installer-amd64/current/images/netboot/debian-installer/amd64/ |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014432)
gentoo9ball 2021-04-07 12:59 |
FIXED, file dates updated from 3/26/21 to 4/2/21, I tested new files, they work great |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7133 | [Kali Linux] Kali Package Bug | major | always | 2021-04-06 08:02 | 2021-04-07 15:02 |
Reporter: | RoseDeSable | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | high | OS Version: | |||
Status: | assigned | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | gvm: cannot see reports | ||||
Description: |
Good Morning, the scan is running, but I can't see reports. I receive the error message "TypeError: Z is undefined", if I click on the report. But very strange is this message in gvmd.log: md manage:WARNING:2021-04-06 07h50.44 UTC:440352: run_report_format_script: No generate script found at /var/lib/gvm/gvmd/report_formats/generate. The strange: The directory doesn't exist. I see only directories like "/var/lib/gvm/data-objects/gvmd/20.08/report_formats", which are synchronized by greenbone-feed-sync --type GVMD_DATA. But also here, I doen't find the file "generate". Such a file are only found in the directory /usr/share/gvm/gvmd/report_formats/. ls /usr/share/gvm/gvmd/report_formats/5057e5cc-b825-11e4-9d0e-28d24461215b Anonymous_XML.xsl generate report_format.xml The structure is completely different from this in /var/lib. Is this a configuration or a migration problem ? Best Regards Rose |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6927 | [Kali Linux] Kali Package Bug | major | always | 2020-12-12 17:43 | 2021-04-06 10:20 |
Reporter: | cohst | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Routersploit is not working anymore | ||||
Description: |
Scanners and exploits cannot be loaded in Routersploit due to incompatibilities of Python3: ┌──(cohst@kali-linux)-[~] └─$ routersploit ______ _ _____ _ _ _ | ___ \ | | / ___| | | (_) | | |_/ /___ _ _| |_ ___ _ __\ `--. _ __ | | ___ _| |_ | // _ \| | | | __/ _ \ '__|`--. \ '_ \| |/ _ \| | __| | |\ \ (_) | |_| | || __/ | /\__/ / |_) | | (_) | | |_ \_| \_\___/ \__,_|\__\___|_| \____/| .__/|_|\___/|_|\__| | | Exploitation Framework for |_| by Threat9 Embedded Devices Codename : I Knew You Were Trouble Version : 3.4.0 Homepage : https://www.threat9.com - @threatnine Join Slack : https://www.threat9.com/slack Join Threat9 Beta Program - https://www.threat9.com Exploits: 130 Scanners: 4 Creds: 165 Generic: 4 Payloads: 32 Encoders: 4 rsf > show scanners scanners/autopwn scanners/misc/misc_scan scanners/routers/router_scan scanners/cameras/camera_scan rsf > use scanners/autopwn Traceback (most recent call last): File "/usr/bin/routersploit", line 26, in <module> routersploit() File "/usr/bin/routersploit", line 22, in routersploit rsf.start() File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 116, in start command_handler(args) File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 319, in command_use self.current_module = import_exploit(module_path)() File "/usr/lib/python3/dist-packages/routersploit/core/exploit/utils.py", line 107, in import_exploit module = importlib.import_module(path) File "/usr/lib/python3.9/importlib/__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "<frozen importlib._bootstrap>", line 1030, in _gcd_import File "<frozen importlib._bootstrap>", line 1007, in _find_and_load File "<frozen importlib._bootstrap>", line 986, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 680, in _load_unlocked File "<frozen importlib._bootstrap_external>", line 790, in exec_module File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed File "/usr/lib/python3/dist-packages/routersploit/modules/scanners/autopwn.py", line 6, in <module> class Exploit(Exploit): File "/usr/lib/python3/dist-packages/routersploit/core/exploit/exploit.py", line 45, in __new__ for key, value in iteritems(attrs): RuntimeError: dictionary keys changed during iteration ┌──(cohst@kali-linux)-[~] └─$ |
||||
Steps To Reproduce: | Start Routersploit and load an arbitrary module/scanner/exploit. | ||||
Additional Information: | Kali Release is 2020.4, Kernel 5.9.11-1kali1from (12.12.2020). | ||||
Attached Files: |
Routersploit.JPG (81,231 bytes) 2020-12-12 17:43 https://bugs.kali.org/file_download.php?file_id=1967&type=bug |
||||
Notes | |
(0014431)
sbrun 2021-04-06 10:20 |
fixed in version 3.4.0+git20210206-0kali1 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7132 | [Kali Linux] General Bug | major | always | 2021-04-06 02:14 | 2021-04-06 02:14 |
Reporter: | lentel | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | The battery is discharged with the laptop turned off (20% in 8 hours) approximately. | ||||
Description: |
Dear friends, I really don't know what to do, with Kali Linux 2021 the battery is consumed when the laptop is turned off. This has always happened to me with Kali. I don't know what the real solution is. This is why I come to you. I have Kali as Main O.S. Thank you very much in advance for your insights. Greetings. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7108 | [Kali Linux] Feature Requests | minor | N/A | 2021-03-20 10:30 | 2021-04-04 11:11 |
Reporter: | Ishan Patel | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | support for nvidia optimus and bumble bee configration | ||||
Description: | Please add support for nvidia optimus and bumble bee configration as most of the intel based high-end laptops use dual GPU , using kali as the primary and only operating system shuts off one of the gpu to work properly | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
ddddddddddddddd.PNG (48,405 bytes) 2021-03-22 11:32 https://bugs.kali.org/file_download.php?file_id=2038&type=bug |
||||
Notes | |
(0014380)
arnaudr 2021-03-22 06:25 |
Hello Ishan, did you enable bumblebee on your laptop? What steps did you follow? There's a doc regarding installing nvidia drivers in Kali: https://www.kali.org/docs/general-use/install-nvidia-drivers-on-kali-linux/, does that help? |
(0014383)
Ishan Patel 2021-03-22 11:31 |
@arnaudr hello, in this guide says that its not ment for optimus (notebook user with 2 graphics card) , and yes i have tried this but its not working in laptop, if its connected via hdmi both laptop and external monitor cant be used with nvidia optimus in kali , as it can be used in ubuntu based system , for using external monitor we need to create a xorg configration file which will disable the use of laptop screen. please find some resolve, i have tried everything that i try . Thank You |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7128 | [Kali Linux] General Bug | major | always | 2021-04-03 22:25 | 2021-04-03 22:25 |
Reporter: | mingdao | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | published shasums don't make weekly image | ||||
Description: | The weekly image currently at http://cdimage.kali.org/kali-images/kali-weekly/ is for 2021-W13, but the SHA1 and SHA256 sums downloadable from the same page are the previous week's (W12) ones. | ||||
Steps To Reproduce: |
workstation /home/mingdao/Downloads # sha256sum kali-linux-2021-W13-installer-amd64.iso 8f1ee7464bc87f0334f3abf333f46f663a9047b87a784a028783b8121f6f0d65 kali-linux-2021-W13-installer-amd64.iso workstation /home/mingdao/Downloads # grep 8f1ee7464bc87f0334f3abf333f46f663a9047b87a784a028783b8121f6f0d65 SHA256SUMS workstation /home/mingdao/Downloads # cat SHA256SUMS 2a02483585b73755698b1e9179ff2ecbc3c9728d80967538d0d8e536d1e92778 kali-linux-2021-W12-installer-amd64.iso 001b772fe7a3e53988c63b4db9beea51ebcaf56ed76ac380d5e35e09ff3ca9ee kali-linux-2021-W12-installer-arm64.iso 0b5c6553221cea5f8c2df83bb9f4eaa064f5365535ec1a0830e2f943f4a53244 kali-linux-2021-W12-installer-i386.iso 8a8c25888e3b235f7267f0be183d3e59d0c089c90bbf2948bdbeb4e36c84e735 kali-linux-2021-W12-installer-netinst-amd64.iso f0ced0a87633571ae979c5c2a427b0d5c91effc3cfef83464328eff644bbd10e kali-linux-2021-W12-installer-netinst-arm64.iso 3e1311a1d2756a4c2ffdbc6ae32435820d73ce48376a8ee92e190b1fd58b6e29 kali-linux-2021-W12-installer-netinst-i386.iso 0c3f4cfe03b916b6086045d21ccc731ccee3c48dfa144bc3c6d4e153367e3c56 kali-linux-2021-W12-live-amd64.iso 0a058e2d900b65865a36bab4dcd264f516816771961fdd0ea766559acf2beba2 kali-linux-2021-W12-live-arm64.iso 100898a40d0716102cc364afeab7591507fc2394d2881c6d99903165cf2f5e6f kali-linux-2021-W12-live-i386.iso |
||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7127 | [Kali Linux] Feature Requests | feature | N/A | 2021-04-02 10:42 | 2021-04-02 10:43 |
Reporter: | admn | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Add driver for VFS7500 Touch Fingerprint Sensor | ||||
Description: | There is no driver for this Fingerprint sensor | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7044 | [Kali Linux] Kali Package Bug | crash | always | 2021-02-09 09:55 | 2021-04-02 08:38 |
Reporter: | vgsgs | Platform: | |||
Assigned To: | rhertzog | OS: | |||
Priority: | immediate | OS Version: | |||
Status: | resolved | Product Version: | kali-dev | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | SESSION HIJACKING. | ||||
Description: |
VULNERABILITY NAME: SESSION HIJACKING. VULNERABILITY URL: https://bugs.kali.org/ DESCRIPTION: In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. |
||||
Steps To Reproduce: |
STEPS TO REPRODUCED: 1) Log in to your account 2) Copy your cookies 3) Logout 4) Clear browser cookies 5) Paste the cookies (copied in step 2) 6) Refresh the page 7) Now you will be logged into the account |
||||
Additional Information: |
The Patch: Cookies should expire after the logout and previous cookies should not be used for logging into the account, they should expire! IMPACT: The malicious attacker can enter the server and access its information without having to hack a registered account. In addition, he can also make modifications on the server to help him hack it in the future or to simplify a data-stealing operation. |
||||
Attached Files: |
bandicam 2021-02-09 14-59-05-295.mp4 (1,273,295 bytes) 2021-02-09 09:55 https://bugs.kali.org/file_download.php?file_id=2011&type=bug |
||||
Notes | |
(0014214)
vgsgs 2021-02-11 06:12 |
Hello Team, Any update? |
(0014215)
rhertzog 2021-02-11 08:36 |
"session hijacking" assumes that you have a way to intercept the cookie, and you have not shown any way to intercept said cookie over https. That said I reckon that it would be better if the session cookie was invalidated on logout. But this is a mantis instance so you should file that bug report against mantis, we are not the mantis developers: https://mantisbt.org/bugs/ |
(0014218)
vgsgs 2021-02-12 10:58 |
Hello Team, But this is valid impactful issue after logout then also we directly entered in account without help of login username and password it means this is valid impactful issue. Please check video and replay back. Regards, Vaibhav |
(0014220)
kali-bugreport 2021-02-14 12:21 |
IMHO the Kali team has already replied back above. Just report an issue to the Mantis team if you see any required action for this issue. |
(0014302)
kali-bugreport 2021-03-09 21:11 |
https://mantisbt.org/bugs/view.php?id=11296 https://mantisbt.org/bugs/view.php?id=27976 |
(0014303)
rhertzog 2021-03-09 21:26 |
Nice to see that this is going to be fixed upstream! @kali-bugreport was that you that submitted this upstream or @vgsgs ? |
(0014309)
kali-bugreport 2021-03-10 20:31 |
@rhertzog No, not me. I guess it was @vgsgs or any other reader of this issue here. |
(0014344)
kali-bugreport 2021-03-13 12:22 |
Looks like this is CVE-2009-20001: https://nvd.nist.gov/vuln/detail/CVE-2009-20001 |
(0014347)
vgsgs 2021-03-13 12:36 |
Hello Team, Any reward for this valid issue? |
(0014352)
vgsgs 2021-03-15 10:29 |
Hello Team, Any reward for this valid issue? Regards, Vaibhav |
(0014365)
vgsgs 2021-03-17 07:02 |
Hello @rhertzog and @kali-bugreport Can i eligible for reward for this vulnerability issue? Please reply back regarding my reward. |
(0014387)
g0tmi1k 2021-03-23 06:37 |
Bug bounty information can be found here ~ https://www.kali.org/contact/ |
(0014426)
vgsgs 2021-04-02 08:29 |
Sir, I check your bug bounty program is there so now your team resolved this issue then how to I process regarding reward? Can I eligible for a reward for this vulnerability issue? Please reply back regarding my reward. |
(0014427)
rhertzog 2021-04-02 08:38 |
@vgsgs The Kali team is not in charge of the bug bounty program, please stop requesting this on this ticket. The bug bounty program is described here: https://www.offensive-security.com/bug-bounty-program/ Follow the process there, thank you. |
(0014428)
rhertzog 2021-04-02 08:38 |
Will be fixed on bugs.kali.org the next time that we upgrade our mantis setup. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6936 | [Kali Linux] Kali Package Bug | minor | always | 2020-12-19 08:28 | 2021-04-01 14:38 |
Reporter: | RoseDeSable | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | kali-dev | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Mitmproxy doesn't start because of two absent python packets | ||||
Description: |
Good Morning, after the rolling upgrade from yesterday (Friday) starting mitmproxy first fails with the message "dkg_resources.DistributionNotFound: The 'hyperframe>=6.0' distribution was not found and is required by mitmproxy" After installing python3-hyperframe it again fails with this message "pkg_resources.DistributionNotFound: The 'h2>=4.0' distribution was not found and is required by mitmproxy" After installing python3-h2 together with python3-hpack mitmproxy starts without any problems Bye Rose |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014425)
sbrun 2021-04-01 14:38 |
fixed in version 5.3.0-2. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7116 | [Kali Linux] General Bug | major | always | 2021-03-24 18:19 | 2021-03-30 23:58 |
Reporter: | vom | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | NetworkManager/dhclient/*something* causing race condition on DHCP server, not releasing previous lease IPs | ||||
Description: |
I've been troubleshooting this for about a week. I believe I have finally distilled it down to what is happening. I will try my best to articulate that here... This is a Kali 2021.1 running on a Thinkpad x301. The machine has an Intel wifi (Intel Corporation PRO/Wireless 5100 AGN [Shiloh]). It is connected via wifi (no wired / eth0). Lately I have let the machine sit on my desk and run for an extended period. The other day my son complained his PC "didn't have internet". Troubleshooting this showed me that my DHCP server (ISC dhcpd on Linux) was pinging the address first, getting a response, and then moving on to a different IP. This next potential IP was also responding. Lather, rinse, repeat. I managed to catch it red handed, and all the ARP / MACs for these IPs came back to the Kali laptop. What's really interesting (and confusing and frustrating...) - is that only one IP at a time is visible on the machine via 'ip addr show'. Yet the machine responds to previous IPs it had had. I was thinking this was perhaps some kind of "promiscuous" issue where the machine was just responding to anything sent to it. However, I temporarily configured a static arp for an unused IP to point to the Kali laptop, and it did NOT respond. So it seems that these "phantom" IPs it's holding on to are only the ones it had on previous leases. This problem grows and grows over a period of days and weeks. Eventually it will exhaust my DHCP pool. Here is the current ARP entries on my firewall (MAC sanitized): 192.168.64.154 lladdr 00:22:fa:11:22:33 STALE 192.168.64.252 lladdr 00:22:fa:11:22:33 STALE Only 252 is assigned right now: root@x301:/home/vom# ip -f inet addr show dev wlan0 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 inet 192.168.64.252/24 brd 192.168.64.255 scope global dynamic noprefixroute wlan0 valid_lft 41371sec preferred_lft 41371sec 154 is not there. But 154 responds: root@ice:~# ping -c 3 192.168.64.154 PING 192.168.64.154 (192.168.64.154) 56(84) bytes of data. 64 bytes from 192.168.64.154: icmp_seq=1 ttl=64 time=5.02 ms 64 bytes from 192.168.64.154: icmp_seq=2 ttl=64 time=4.62 ms 64 bytes from 192.168.64.154: icmp_seq=3 ttl=64 time=3.32 ms --- 192.168.64.154 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2003ms rtt min/avg/max/mdev = 3.320/4.320/5.020/0.725 ms Here's what this looks like on the DHCP server when this kicks over: Mar 23 19:30:42 ice dhcpd[5419]: reuse_lease: lease age 3332 (secs) under 25% threshold, reply with unaltered, existing lease for 192.168.64.154 Mar 23 19:30:42 ice dhcpd[5419]: DHCPDISCOVER from 00:22:fa:11:22:33 (x301) via enp7s0.10 Mar 23 19:30:42 ice dhcpd[5419]: ICMP Echo reply while lease 192.168.64.154 valid. Mar 23 19:30:42 ice dhcpd[5419]: Abandoning IP address 192.168.64.154: pinged before offer Mar 23 19:30:42 ice dhcpd[5419]: Wrote 0 class decls to leases file. Mar 23 19:30:42 ice dhcpd[5419]: Wrote 0 deleted host decls to leases file. Mar 23 19:30:42 ice dhcpd[5419]: Wrote 0 new dynamic host decls to leases file. Mar 23 19:30:42 ice dhcpd[5419]: Wrote 79 leases to leases file. Mar 23 19:30:44 ice dhcpd[5419]: DHCPDISCOVER from 00:22:fa:11:22:33 via enp7s0.10 Mar 23 19:30:45 ice dhcpd[5419]: DHCPOFFER on 192.168.64.252 to 00:22:fa:11:22:33 (x301) via enp7s0.10 Mar 23 19:30:45 ice dhcpd[5419]: DHCPREQUEST for 192.168.64.252 (192.168.64.1) from 00:22:fa:11:22:33 (x301) via enp7s0.10 Mar 23 19:30:45 ice dhcpd[5419]: DHCPACK on 192.168.64.252 to 00:22:fa:11:22:33 (x301) via enp7s0.10 You can see that 154 was still pingable, so 252 was offered (and accepted). This will happen again soon and then 154 + 252 will be pingable and the client will consume a third address... Over about a 4 day period, this machine consumed 97 IPs. I spot checked these and the mac address / x301 was always the culprit: root@ice:/home/vom# zgrep offer /var/log/syslog*.gz | awk '{print $9}' | sort | uniq | wc -l 97 I'm going to put some other (possibly related) bug reports (different distros, upstream, etc) in the Additional section. |
||||
Steps To Reproduce: |
Connect laptop to wifi. Leave running (no sleep, on AC power) for days / weeks. See DHCP pool slowly get consumed as Kali machine "holds on" to old lease addresses. |
||||
Additional Information: |
This one reads almost exactly as what I am seeing (marked as Incomplete :( ) https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1793763 There's also this one (auto-closed :( ): https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/166 |
||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7010 | [Kali Linux] General Bug | major | have not tried | 2021-01-25 17:37 | 2021-03-30 16:43 |
Reporter: | Hillander-s | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Desktop bug | ||||
Description: |
Work area persists, windows also have problems. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Captura de tela_2021-01-25_11-27-33.png (376,012 bytes) 2021-01-25 17:37 https://bugs.kali.org/file_download.php?file_id=2005&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7077 | [Kali Linux] Kali Package Bug | major | have not tried | 2021-03-04 11:08 | 2021-03-30 13:26 |
Reporter: | RoseDeSable | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | gvmd doesn't start - version of lib is higher than the servers's | ||||
Description: |
Hi, in the logfile "/var/log/gvm/gvmd.log" I find, that the version of the server module "/usr/lib/libgvm-pg-server.so" is on version 12, but the lib's version is on 13. Here are the lib-modules: #ls -l libgvm* lrwxrwxrwx 1 root root 22 3. Feb 15:42 libgvm-pg-server.so -> libgvm-pg-server.so.20 lrwxrwxrwx 1 root root 27 3. Feb 15:42 libgvm-pg-server.so.20 -> libgvm-pg-server.so.20.08.1 -rw-r--r-- 1 root root 38896 3. Feb 15:42 libgvm-pg-server.so.20.08.1 Bye Rose |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014297)
sbrun 2021-03-09 11:27 |
Thanks for the report but I need more informations: - please the copy the error from the logfile "/var/log/gvm/gvmd.log" - please give us the version of gvmd - did you run gvm-check-setup? The versions 12 and 13 you mentioned make me think you have an issue with postgresql version: gvmd have been compiled with postgresql 13 and you have an older postgresql version using the default port 5432. gvm-check-setup will check this for you or you can run "pg_lsclusters" to see which version is on port 5432. |
(0014298)
RoseDeSable 2021-03-09 12:38 |
Hello, it seems to be a problem with postgresql. I'm running version 12 and 13 an two seperate ports: 12 main 5432 online postgres /var/lib/postgresql/12/main /var/log/postgresql/postgresql-12-main.log 13 main 5433 online postgres /var/lib/postgresql/13/main /var/log/postgresql/postgresql-13-main.log But chanching the port numbers for version 13 doesn't resolve my problem. |
(0014299)
sbrun 2021-03-09 13:44 |
it's not a problem, it's the "normal behaviour" of postgresql: when you upgrade postgresql, the default port 5432 remains on the cluster of the "old" postgresql version. The newest version cluster uses another port. It requires a user action to upgrade the clusters. How did you change the port numbers? To upgrade you need to use the pg_upgradecluster command. But before that you may need to remove the empty cluster of newest postgresql version. You can find some explanations here: https://praderas.org/en/upgrading-postgresql-13-debian-stretch See paragraph "Upgrading cluster" |
(0014307)
RoseDeSable 2021-03-10 09:04 |
Ok, first I successfully migrate the databasecluster from postgresql version 12 to 13. After starting gvmd I receive the message "main:CRITICAL:2021-03-10 08h25.40 utc:99013: gvmd: database is wrong version". Therfore I migrate the gvmd-database with "gvmd -migrate". Successfully. I tried to start gvmd without success, because ownly the owner of the database may run the aggregate function "group_concat". What's now ? |
(0014423)
RoseDeSable 2021-03-30 13:26 |
A nice day, I log into the database gvmd with "psql gvmd" unter the user postgres. The command "\df+ group_concat" shows me the definition of the function. Here I find out, that the owner of the function is "root". I change it to "_gvm" with "ALTER FUNCTION group_concat OWNER TO _gvm;" and the Greenbone Security Assistant is completely running. Bye Rose |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7122 | [Kali Linux] General Bug | major | always | 2021-03-30 03:09 | 2021-03-30 03:09 |
Reporter: | Erika carpenter | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Deauth does not work | ||||
Description: | When I use aireplay-ng and mdk4 deauthing it does not work. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7123 | [Kali Linux] General Bug | minor | always | 2021-03-30 03:09 | 2021-03-30 03:09 |
Reporter: | Erika carpenter | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | application.desktop files no longer function | ||||
Description: |
Evidently the Kali 2020.1 update had broken application.desktop functionality. When marked as executable the designated Icon does not appear. Double clicking opens the application.desktop file in the text editor. Through extensive fiddling the Icon and launch functionality appeared a few times. Click on the application.desktop Icon and it works but immediately the Icon and functionality are lost. |
||||
Steps To Reproduce: | Occurred with update. | ||||
Additional Information: | The exactly identical application.desktop files functioned under Kali 2020.4 and continue to function in Ubuntu 18.04.5 LTS. | ||||
Attached Files: | |||||
Notes | |
(0014406)
steev 2021-03-27 21:43 |
I have my own slack and alacritty desktop files (in my ~/.local/share/applications ) and they show up in the menus and I'm able to launch the applications just fine. If I run "xdg-open ~/.local/share/applications/slack.desktop it opens it in a text editor because, well it's considered a text file. This is also changed in newer Ubuntu. You could try something like "gio set application.desktop metadata::trusted true" - this may allow you to launch them again. (I do not know if this is gnome specific, or if it also works in xfce, just what i found when i searched for it being broken. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7124 | [Kali Linux] Kali Package Bug | crash | always | 2021-03-30 03:09 | 2021-03-30 03:09 |
Reporter: | Erika carpenter | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | SESSION HIJACKING. | ||||
Description: |
VULNERABILITY NAME: SESSION HIJACKING. VULNERABILITY URL: https://bugs.kali.org/ DESCRIPTION: In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. |
||||
Steps To Reproduce: |
STEPS TO REPRODUCED: 1) Log in to your account 2) Copy your cookies 3) Logout 4) Clear browser cookies 5) Paste the cookies (copied in step 2) 6) Refresh the page 7) Now you will be logged into the account |
||||
Additional Information: |
The Patch: Cookies should expire after the logout and previous cookies should not be used for logging into the account, they should expire! IMPACT: The malicious attacker can enter the server and access its information without having to hack a registered account. In addition, he can also make modifications on the server to help him hack it in the future or to simplify a data-stealing operation. |
||||
Attached Files: |
bandicam 2021-02-09 14-59-05-295.mp4 (1,273,295 bytes) 2021-02-09 09:55 https://bugs.kali.org/file_download.php?file_id=2040&type=bug |
||||
Notes | |
(0014407)
vgsgs 2021-02-11 06:12 |
Hello Team, Any update? |
(0014408)
rhertzog 2021-02-11 08:36 |
"session hijacking" assumes that you have a way to intercept the cookie, and you have not shown any way to intercept said cookie over https. That said I reckon that it would be better if the session cookie was invalidated on logout. But this is a mantis instance so you should file that bug report against mantis, we are not the mantis developers: https://mantisbt.org/bugs/ |
(0014409)
vgsgs 2021-02-12 10:58 |
Hello Team, But this is valid impactful issue after logout then also we directly entered in account without help of login username and password it means this is valid impactful issue. Please check video and replay back. Regards, Vaibhav |
(0014410)
kali-bugreport 2021-02-14 12:21 |
IMHO the Kali team has already replied back above. Just report an issue to the Mantis team if you see any required action for this issue. |
(0014411)
kali-bugreport 2021-03-09 21:11 |
https://mantisbt.org/bugs/view.php?id=11296 https://mantisbt.org/bugs/view.php?id=27976 |
(0014412)
rhertzog 2021-03-09 21:26 |
Nice to see that this is going to be fixed upstream! @kali-bugreport was that you that submitted this upstream or @vgsgs ? |
(0014413)
kali-bugreport 2021-03-10 20:31 |
@rhertzog No, not me. I guess it was @vgsgs or any other reader of this issue here. |
(0014418)
kali-bugreport 2021-03-13 12:22 |
Looks like this is CVE-2009-20001: https://nvd.nist.gov/vuln/detail/CVE-2009-20001 |
(0014419)
vgsgs 2021-03-13 12:36 |
Hello Team, Any reward for this valid issue? |
(0014420)
vgsgs 2021-03-15 10:29 |
Hello Team, Any reward for this valid issue? Regards, Vaibhav |
(0014422)
vgsgs 2021-03-17 07:02 |
Hello @rhertzog and @kali-bugreport Can i eligible for reward for this vulnerability issue? Please reply back regarding my reward. |
(0014414)
g0tmi1k 2021-03-23 06:37 |
Bug bounty information can be found here ~ https://www.kali.org/contact/ |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7082 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2021-03-09 03:47 | 2021-03-29 07:54 |
Reporter: | krnick | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System | ||||
Description: |
Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System - [Name] - Quark-Engine - [Version] - 21.3.1 - [Homepage] - https://github.com/quark-engine/quark-engine - [Download] - https://github.com/quark-engine/quark-engine/releases - [Author] - JunWei Song(krnick) - [Licence] - GPL v3 - [Description] - Quark-Engine is a full-featured Android analysis framework written in Python for hunting threat intelligence inside the APK, DEX files. Since it is rule-based, you can use the ones built-in or customize as needed. With ideas decoded from criminal law, Quark-Engine has its unique angles for Android analysis. We developed a Dalvik bytecode loader that has tainted analysis inside but also defeats the obfuscation techniques used against reverse engineering. And surprisingly, the loader matches perfectly the design of our malware scoring system. Quark-Engine is very easy to use and also provides flexible output formats. There are three types of output reports: detail report, call graph, and summary report. With these reports in mind, you can get an overview of the high-risk behavior inside Android within seconds. Also, by integrating with other Android analysis tools such as Ghidra, APKLAB, Jadx, Quark-Engine can greatly improve the efficiency of reverse engineers. - [Dependencies] - python3, git, graphviz - [Similar tools] - MobSF - [How to install] - https://github.com/quark-engine/quark-engine#installation - [How to use] - https://quark-engine.readthedocs.io/en/latest/ Quark-Engine already presented at DEFCON 28 BTV, HITB Lockdown 002, and will release more features at BlackHat Asia 2021 Arsenal. Also, Quark-Engine is now integrated with many open-source tools, such as IntelOwl, BlackArch Linux, Pithus/Bazaar, and APKLAB. We have experiences (ghidraquark, APKLab) developing a feature that when users click on one of the activities, the corresponding smali source codes are highlighted for manual verification. This boosts up the speed for malware analysts. Reference: 1. Integrating with Ghidra: https://github.com/quark-engine/ghidraquark Quick demo for the quark usage with Ghidra https://www.youtube.com/watch?v=VXzfFB2S4bo&ab_channel=JunWeiSong 2. Android malware reports that using Quark-Engine to analyze: https://github.com/quark-engine/quark-reports 3. Quark-Engine Rules: https://github.com/quark-engine/quark-rules 4. BlackHat Asia 2021 Arsenal https://www.blackhat.com/asia-21/arsenal/schedule/index.html#quark-engine-storyteller-of-android-malware-22458 5. DEFCON 28 BTV https://www.youtube.com/watch?v=XK-yqHPnsvc&ab_channel=DEFCONConference 6. HITB Lockdown 002 https://conference.hitb.org/hitb-lockdown002/sessions/quark-engine-an-obfuscation-neglect-android-malware-scoring-system/ |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014397)
g0tmi1k 2021-03-26 13:32 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0014403)
krnick 2021-03-29 07:54 |
Thank you Kali Linux team for the acceptance of quark-engine, I'd love to work on the packaging. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7120 | [Kali Linux] General Bug | major | always | 2021-03-28 05:59 | 2021-03-28 06:00 |
Reporter: | Leominus | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Deauth does not work | ||||
Description: | When I use aireplay-ng and mdk4 deauthing it does not work. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7119 | [Kali Linux] General Bug | minor | always | 2021-03-27 08:51 | 2021-03-27 21:43 |
Reporter: | ilektranik | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | application.desktop files no longer function | ||||
Description: |
Evidently the Kali 2020.1 update had broken application.desktop functionality. When marked as executable the designated Icon does not appear. Double clicking opens the application.desktop file in the text editor. Through extensive fiddling the Icon and launch functionality appeared a few times. Click on the application.desktop Icon and it works but immediately the Icon and functionality are lost. |
||||
Steps To Reproduce: | Occurred with update. | ||||
Additional Information: | The exactly identical application.desktop files functioned under Kali 2020.4 and continue to function in Ubuntu 18.04.5 LTS. | ||||
Attached Files: | |||||
Notes | |
(0014402)
steev 2021-03-27 21:43 |
I have my own slack and alacritty desktop files (in my ~/.local/share/applications ) and they show up in the menus and I'm able to launch the applications just fine. If I run "xdg-open ~/.local/share/applications/slack.desktop it opens it in a text editor because, well it's considered a text file. This is also changed in newer Ubuntu. You could try something like "gio set application.desktop metadata::trusted true" - this may allow you to launch them again. (I do not know if this is gnome specific, or if it also works in xfce, just what i found when i searched for it being broken. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7002 | [Kali Linux] Kali Package Bug | major | always | 2021-01-20 23:33 | 2021-03-26 20:22 |
Reporter: | LRitzdorf | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Hashcat segfault issue after package upgrade | ||||
Description: |
System: WSL2 on Windows 10 build 19042.746. After performing a `sudo apt update` and `sudo apt full-upgrade` operation, hashcat now encounters a segmentation fault for every command tested so far (with the exception of `hashcat -h`). The list of upgrade events from the relevant dpkg session is included in the "Additional Information" section below, and an example output set is included below. Whatever the error is, hashcat seems to encounter it early on. Additionally, according to the dpkg logs, hashcat itself was not upgraded immediately before the issue occurred, so the problem would seem to be in a dependency, rather than hashcat itself. Notably, `pocl-opencl-icd`, `libpocl2`, and `libpocl2-common` were among the upgraded packages. ``` ┌──(kali㉿Laptop-02)-[~] └─$ hashcat -b hashcat (v6.1.1) starting in benchmark mode... Benchmarking uses hand-optimized kernel code by default. You can use it in your cracking session by setting the -O option. Note: Using optimized kernel code limits the maximum supported password length. To disable the optimized kernel code in benchmark mode, use the -w option. zsh: segmentation fault hashcat -b ┌──(kali㉿Laptop-02)-[~] └─$ hashcat -I 139 ⨯ hashcat (v6.1.1) starting... zsh: segmentation fault hashcat -I ┌──(kali㉿Laptop-02)-[~] └─$ ``` (Note that the last command uses a capital letter i, not an L or number one. It should list available cracking devices.) This issue was additionally tested with an actual cracking command, which produced the same results as `hashcat -I`, above. |
||||
Steps To Reproduce: |
Install Kali in WSL2, as normal. Run `sudo apt update && sudo apt full-upgrade --autoremove` after approximately 1/19/2021. Attempt to start hashcat. |
||||
Additional Information: |
dpkg upgrade events from the relevant session (from `grep "upgrade" /var/log/dpkg.log`): 2021-01-19 19:00:41 upgrade findutils:amd64 4.7.0+git20201010-2 4.8.0-1 2021-01-19 19:00:41 upgrade init-system-helpers:all 1.59+kali1 1.60+kali1 2021-01-19 19:00:42 upgrade init:amd64 1.59+kali1 1.60+kali1 2021-01-19 19:00:42 upgrade libpython3-dev:amd64 3.9.0-4 3.9.1-1 2021-01-19 19:00:42 upgrade python3-dev:amd64 3.9.0-4 3.9.1-1 2021-01-19 19:00:42 upgrade python3-minimal:amd64 3.9.0-4 3.9.1-1 2021-01-19 19:00:42 upgrade python3:amd64 3.9.0-4 3.9.1-1 2021-01-19 19:00:42 upgrade python3-lib2to3:all 3.8.6-1 3.9.1-2 2021-01-19 19:00:42 upgrade python3-distutils:all 3.8.6-1 3.9.1-2 2021-01-19 19:00:43 upgrade libpython3-stdlib:amd64 3.9.0-4 3.9.1-1 2021-01-19 19:00:43 upgrade sensible-utils:all 0.0.12+nmu1 0.0.14 2021-01-19 19:00:43 upgrade build-essential:amd64 12.8 12.9 2021-01-19 19:00:43 upgrade busybox:amd64 1:1.30.1-6 1:1.30.1-6+b1 2021-01-19 19:00:43 upgrade firmware-linux:all 20201118-1 20201218-1 2021-01-19 19:00:43 upgrade firmware-amd-graphics:all 20201118-1 20201218-1 2021-01-19 19:00:43 upgrade firmware-linux-nonfree:all 20201118-1 20201218-1 2021-01-19 19:00:44 upgrade firmware-misc-nonfree:all 20201118-1 20201218-1 2021-01-19 19:00:44 upgrade firmware-atheros:all 20201118-1 20201218-1 2021-01-19 19:00:45 upgrade firmware-brcm80211:all 20201118-1 20201218-1 2021-01-19 19:00:45 upgrade firmware-intel-sound:all 20201118-1 20201218-1 2021-01-19 19:00:45 upgrade firmware-iwlwifi:all 20201118-1 20201218-1 2021-01-19 19:00:46 upgrade firmware-libertas:all 20201118-1 20201218-1 2021-01-19 19:00:47 upgrade firmware-realtek:all 20201118-1 20201218-1 2021-01-19 19:00:47 upgrade firmware-ti-connectivity:all 20201118-1 20201218-1 2021-01-19 19:00:47 upgrade gstreamer1.0-libav:amd64 1.18.2-1 1.18.3-1 2021-01-19 19:00:47 upgrade gstreamer1.0-plugins-ugly:amd64 1.18.2-1 1.18.3-1 2021-01-19 19:00:47 upgrade libbpf0:amd64 1:0.3-1 1:0.3-2 2021-01-19 19:00:47 upgrade libicu67:amd64 67.1-5 67.1-6 2021-01-19 19:00:48 upgrade libjs-sizzle:all 2.3.5+ds-1 2.3.5+ds-2 2021-01-19 19:00:48 upgrade libmaxminddb0:amd64 1.4.3-2 1.5.0-1 2021-01-19 19:00:48 upgrade libmongocrypt0:amd64 1.0.4-1+b1 1.1.0-1 2021-01-19 19:00:48 upgrade pocl-opencl-icd:amd64 1.5-6 1.6-3 2021-01-19 19:00:48 upgrade libpocl2:amd64 1.5-6 1.6-3 2021-01-19 19:00:49 upgrade libpocl2-common:all 1.5-6 1.6-3 2021-01-19 19:00:49 upgrade libsensors-config:all 1:3.6.0-2 1:3.6.0-3 2021-01-19 19:00:49 upgrade libsensors5:amd64 1:3.6.0-2 1:3.6.0-3 2021-01-19 19:00:49 upgrade libserd-0-0:amd64 0.30.6-1 0.30.8-1 2021-01-19 19:00:49 upgrade thunar:amd64 4.16.1-1 4.16.2-1 2021-01-19 19:00:50 upgrade thunar-data:all 4.16.1-1 4.16.2-1 2021-01-19 19:00:50 upgrade libthunarx-3-0:amd64 4.16.1-1 4.16.2-1 2021-01-19 19:00:50 upgrade libvdpau1:amd64 1.4-2 1.4-3 2021-01-19 19:00:50 upgrade libwww-perl:all 6.51-1 6.52-1 2021-01-19 19:00:50 upgrade lm-sensors:amd64 1:3.6.0-2 1:3.6.0-3 2021-01-19 19:00:50 upgrade metasploit-framework:amd64 6.0.25-0kali1 6.0.26-0kali1 2021-01-19 19:01:00 upgrade netsniff-ng:amd64 0.6.5-1+b2 0.6.8-2 2021-01-19 19:01:00 upgrade parole:amd64 1.0.5-1 4.16.0-1 2021-01-19 19:01:00 upgrade python3-pycurl:amd64 7.43.0.6-4+b2 7.43.0.6-5 2021-01-19 19:01:00 upgrade patator:all 0.9-2 0.9-3 2021-01-19 19:01:00 upgrade python3-bottle:all 0.12.15-2.1 0.12.19-1 2021-01-19 19:01:00 upgrade python3-pandas-lib:amd64 1.1.5+dfsg-1 1.1.5+dfsg-2 2021-01-19 19:01:00 upgrade python3-pandas:all 1.1.5+dfsg-1 1.1.5+dfsg-2 2021-01-19 19:01:01 upgrade python3-pexpect:all 4.6.0-4 4.8.0-1 2021-01-19 19:01:01 upgrade python3-tk:amd64 3.8.6-1 3.9.1-2 2021-01-19 19:01:01 upgrade python3-xdg:all 0.26-3 0.27-2 2021-01-19 19:01:01 upgrade ruby-test-unit:all 3.3.5-1 3.3.9-1 2021-01-19 19:01:01 upgrade snmpcheck:all 1.9-0kali1 1.9-0kali2 2021-01-19 19:01:01 upgrade spike:amd64 2.9-1kali6 2.9-1kali7 2021-01-19 19:01:01 upgrade udptunnel:amd64 1.1-5+b1 1.1-5+b2 2021-01-19 19:01:02 upgrade vdpau-driver-all:amd64 1.4-2 1.4-3 2021-01-19 19:01:02 upgrade xfce4-cpufreq-plugin:amd64 1.2.2-1 1.2.3-1 2021-01-19 19:01:02 upgrade xfonts-100dpi:all 1:1.0.4+nmu1 1:1.0.4+nmu1.1 2021-01-19 19:01:02 upgrade zsh:amd64 5.8-5 5.8-5+b1 |
||||
Attached Files: | |||||
Notes | |
(0014400)
LRitzdorf 2021-03-26 20:22 |
As of an update shortly before 3/26/2021, this issue has been resolved. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6998 | [Kali Linux] Kali Package Improvement | minor | always | 2021-01-16 20:30 | 2021-03-26 19:45 |
Reporter: | pujandixit | Platform: | |||
Assigned To: | steev | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | Unable to connect wifi when kali boot in respberry pi 400 | ||||
Description: |
HI Team, can you please help , when i have connect into resspberry pi 400, unable to connect into wifi, wifi adapter not showing |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
pi400-dmesg.txt (27,607 bytes) 2021-01-19 23:26 https://bugs.kali.org/file_download.php?file_id=2001&type=bug dmesg-brcmfmac.txt (3,703 bytes) 2021-01-20 04:37 https://bugs.kali.org/file_download.php?file_id=2002&type=bug |
||||
Notes | |
(0014116)
steev 2021-01-16 21:36 |
Can you show the output of the various commands? I don't have a pi400 here, so I can't attempt to reproduce anything. |
(0014119)
hoshi 2021-01-19 22:27 |
If it helps, there are numerous random forum posts and even articles mentioning this (e.g. https://www.zdnet.com/index.php/category/2381/index.php/article/hands-on-kali-linux-on-the-raspberry-pi-4/). ifconfig shows no wlan0 interface (just lo and eth0 which work fine). Likewise iwconfig shows just lo and eth0 (no wireless extensions.) kali@kali:~$ lsusb Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 004: ID 04d9:0007 Holtek Semiconductor, Inc. Raspberry Pi Internal Keyboard Bus 001 Device 003: ID 093a:2510 Pixart Imaging, Inc. Optical Mouse Bus 001 Device 002: ID 2109:3431 VIA Labs, Inc. Hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub kali@kali:~$ lspci 00:00.0 PCI bridge: Broadcom Inc. and subsidiaries Device 2711 (rev 20) 01:00.0 USB controller: VIA Technologies, Inc. VL805 USB 3.0 Host Controller (rev 01) Note that I'm of course referring to the built-in wireless card. If I use a USB wifi adapter the wlan0 interface quickly appears. Let me know if this helps or if you would like any additional information. |
(0014120)
steev 2021-01-19 22:28 (Last edited: 2021-01-19 22:28) |
Can you give me the output of dmesg? Need to see what the kernel sees. |
(0014121)
hoshi 2021-01-19 23:26 |
Pi 400 dmesg attached |
(0014122)
steev 2021-01-20 02:32 |
Okay, in the dmesg output, we see brcmfmac: brcmf_sdio_htclk: HT Avail timeout (1000000): clkctl 0x50 This means the firmware isn't loading correctly, so that's why there's no wifi device. Would you mind grabbing the 3 brcmfmac43455-sdio files from https://github.com/RPi-Distro/firmware-nonfree/tree/master/brcm - brcmfmac43455-sdio.bin brcmfmac43455-sdio.clm_blob brcmfmac43455-sdio.txt and put them in /lib/firmware/brcm and see if wifi comes up with those files? If this works, you will not have nexmon support, but you would have working wifi at least. |
(0014123)
hoshi 2021-01-20 04:37 |
Thanks for the response. Unfortunately that did not seem to resolve the issue for me. I tried copying the brcm files from the URL you indicated and I tried copying the versions of them from a working Raspberry Pi OS (which does have wifi working) and I still do not see the wlan0 interface. Relevant dmesg output: kali@kali:~$ dmesg -l err [ 1.425080] cgroup: cgroup2: unknown option "memory_recursiveprot" [ 3.969423] PKCS#7 signature not signed with a trusted key [ 4.017085] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43455-sdio for chip BCM4345/9 [ 5.217743] brcmfmac: brcmf_sdio_htclk: HT Avail timeout (1000000): clkctl 0x50 [ 6.229038] brcmfmac: brcmf_sdio_htclk: HT Avail timeout (1000000): clkctl 0x50 I'm not sure if that's enough info. so I did "modprobe brcmfmac debug=0x120000e" to get debug level output, which I am attaching. |
(0014124)
steev 2021-01-20 20:50 |
You're right, unfortunately I'm not sure what is causing the failure - can you try disabling bluetooth and rebooting? "systemctl disable bluetooth" - i don't think it will help, but i'd like to see if it does. Otherwise, I'm assuming since you have the pi400, you're using the power supply that came with it? |
(0014127)
hoshi 2021-01-20 21:54 |
Disabling bluetooth did not have an effect. I am using the provided power supply and I tried a different supply as well. |
(0014128)
hoshi 2021-01-21 03:58 |
I think the issue is that brcmfmac43455 isn't correct. In Kali it's definitely trying to load brcmfmac43455, but in Pi OS it's loads brcmfmac43456. This wasn't obvious to me at first because Pi OS has both versions (and two others), but dmesg in Pi OS confirmed it's loading brcmfmac43456. For what it's worth, I also have a Pi 4 and this does use brcmfmac43455, which I think explains why a Pi 4 running Kali will work with wlan0 but the Pi 400 does not. With that in mind, as a hack to test it, I looaded brcmfmac43456 in Kali but named in brcmfmac43455 -- yikes I know, but I can confirm that it does recognize wlan0 doing this (and I can scan and connect). What controls what firmware version it tries to load? |
(0014131)
steev 2021-01-21 15:59 |
That's in the kernel driver itself. I'll look into the kernel that the pi uses (are they still on 5.4?) - we may just need to backport the 43456 check in the driver to get it to load the correct firmware. And that was a great test to track down. I just looked in the nexmon repo on github, and they don't seem to have support for the 43456, which makes sense since the 400 just came out a bit ago and still hard to get. |
(0014132)
hoshi 2021-01-21 16:24 |
Yes, Pi OS is still on 5.4 (5.4.83-v7l+ on what I'm seeing on mine). Thanks! |
(0014133)
steev 2021-01-21 22:12 |
So yeah, it looks like the 43456 support was added with https://github.com/raspberrypi/linux/commit/e3062e05e1cfe378bb9b3fa0bef46711372bcf13 - I'll see if we can squeeze that in to 4.19 somehow or not... it *should* work, but will have to see. |
(0014265)
steev 2021-03-02 20:35 |
This is now fixed - note that we don't have nexmon support, as nexmon doesn't support this firmware yet, but wireless itself should work now. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7090 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2021-03-12 16:56 | 2021-03-26 13:30 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Ghidra - Software reverse engineering (SRE) framework | ||||
Description: |
[Name] - Ghidra [Version] - 9.1.x (9.2.x has a memory bug) [Homepage] - https://www.nsa.gov/ghidra [Download] - https://github.com/NationalSecurityAgency/ghidra/tags [Author] - National Security Agency [License] - Apache License 2.0 ~ https://github.com/NationalSecurityAgency/ghidra/blob/master/LICENSE [Description] - Ghidra is a software reverse engineering (SRE) framework Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python. In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014312)
g0tmi1k 2021-03-12 16:57 |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923851 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926714 |
(0014396)
g0tmi1k 2021-03-26 13:29 |
@kali-team, please could this be packaged up. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7098 | [Kali Linux] Queued Tool Addition | feature | N/A | 2021-03-13 12:23 | 2021-03-26 13:28 |
Reporter: | Jayy001 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Search-That-Hash - Searches Hash APIs to crack your hash quickly | ||||
Description: |
Github: https://github.com/HashPals/Search-That-Hash * Auto-Type Identification - Uses Name-That-Hash to get accurate results on the type of the hash. * Offline Mode - Will automatically run Hashcat if offline or cant find the plaintext in any of the Hash APIs. * Fast - We've made STH to be as fast as possible. Examples: https://github.com/HashPals/Search-That-Hash/raw/main/Pictures/thm_speedrun.gif https://github.com/HashPals/Search-That-Hash/raw/main/Pictures/hashcat.gif We also have our own serverless API with over 40 million hash / plaintexts TL;DR: * GPLv3 * Install via PyPi with `pip3 install search-that-hash`, usage is `sth`. * Pyproject.toml https://github.com/HashPals/Search-That-Hash/blob/main/pyproject.toml * Setup.py https://github.com/HashPals/Name-That-Hash/blob/main/packages/setup.py * Authors: Beesan, Jayy001 * Other similar tools: Hash-Buster (Outdated) * Compute resources: very minimal, only requires an active internet connection for online APIs - If your running hashcat, then whatever resources hashcat normally uses. * Maintained: Yes, I am an active open source maintainer so this tool shall remain maintained. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014345)
Jayy001 2021-03-13 12:24 (Last edited: 2021-03-15 15:14) |
(For some reason the serverless API part linked to another bug? Its meant to say ~ 40 mil hashes / plaintext) |
(0014346)
Jayy001 2021-03-13 12:25 |
~* Forty |
(0014349)
Jayy001 2021-03-13 14:02 |
You should also remove this tool - https://gitlab.com/kalilinux/packages/findmyhash (Very outdated, last updated 8 years ago) |
(0014395)
g0tmi1k 2021-03-26 13:28 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7117 | [Kali Linux] Kali Package Improvement | major | always | 2021-03-25 17:02 | 2021-03-25 17:39 |
Reporter: | FireFart | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | firmware-b43-installer requires third party download | ||||
Description: |
The package firmware-b43-installer starts a wget or curl command and tries to download some packages from third party sources. This is a big problem if the kali installation is behind a corporate proxy/firewall that only allows access to the kali repos. The package should bring this file in the installation package with it or fetch it as a sub package from the kali package mirrors instead. Setting up firmware-b43-installer (1:019-6) ... No chroot environment found. Starting normal installation No known supported Broadcom 802.11 chips found. No supported device found. But firmware is installed unconditionally Trying to install latest firmware 6.30.163.46 . --2021-03-25 17:52:04-- https://www.lwfinger.com/b43-firmware/broadcom-wl-6.30.163.46.tar.bz2 Resolving www.lwfinger.com (www.lwfinger.com)... 173.254.30.178 Connecting to www.lwfinger.com (www.lwfinger.com)|173.254.30.178|:443... failed: Connection timed out. Retrying. This currently breaks the whole update process |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014391)
steev 2021-03-25 17:39 |
Unfortunately we can't rehost the file due to the licensing, so there isn't much we can do here. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7115 | [Kali Linux] Feature Requests | crash | always | 2021-03-24 09:25 | 2021-03-25 12:01 |
Reporter: | Chihiro | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | I can't boot the Kali Linux into the VirtualBox | ||||
Description: |
Every time I try to boot the linux, I get stuck into the white dragon and never boots normal to let me log in. I have: 4096MB: Base Memory 128MB: Video Memory 4: CPUs I desabled HYPER V, turned on PAE/NX. Please help. |
||||
Steps To Reproduce: | I install the linux into my VirtualBox, then I start the PC and it just stucks me intro the dragon loading screen. | ||||
Additional Information: | |||||
Attached Files: |
problem.png (51,619 bytes) 2021-03-24 09:25 https://bugs.kali.org/file_download.php?file_id=2039&type=bug |
||||
Notes | |
(0014389)
manas 2021-03-25 12:01 |
you not follow the right instruction when you choose the system file. Try again and follow the right instruction. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6983 | [Kali Linux] Kali Websites & Docs | minor | have not tried | 2021-01-10 11:27 | 2021-03-22 11:17 |
Reporter: | kali-bugreport | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Permission problems in Kali bugtracker | ||||
Description: |
Haven't found any better fitting category so had chosen "Kali Websites & Docs". I have noticed that you seems to have some permission problems in this bug tracker for the standard "Reporter" account. For example reporters can "Clone" an issue like happen in e.g. 0006912 (clone of 0006903) or 0006960 / 0006962 (clone 0006907) plus many additional ones, i don't think that such "Reporters" should have the possibility to Clone existing issues. In addition e.g. "Reporters" can report an issue in the "Queued Tool Addition" category like seen in 0006981:0014079, this probably should be prevented by setting stricter permissions to that category. On the other hand there are too strict permissions and reporters can't even edit their own comments / issues and also can't close them on their own. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014093)
kali-bugreport 2021-01-10 14:04 |
TLDR; Suggestions for the permissions of the "Reporter" level: - Disallow "Clone" functionality - Disallow creating issues in the "Queued Tool Addition" category - Allow editing the own issues / comments - Allow closing the own issues |
(0014342)
kali-bugreport 2021-03-13 11:13 |
Aaaaaand, it happened again: #7096, #7095, #7094 which are all three wrongly done clones of 0007044 You should really really rework your permissions, at least for the "Reporter" level. |
(0014343)
kali-bugreport 2021-03-13 11:33 |
#7097 is also a clone of 0007068 done by the same user... |
(0014375)
kali-bugreport 2021-03-20 05:50 |
And another one: #0007103 |
(0014377)
kali-bugreport 2021-03-21 12:59 |
Why are you also allow reporters to change the severity to e.g. intermediate? If anyone can set their own priorities anyone thinks the own bugreport is the most important one. |
(0014382)
rhertzog 2021-03-22 11:17 (Last edited: 2021-03-22 11:17) |
I would gladly configure mantis to avoid those problems, in fact I already tried... but there's no option to control who can clone. If you can report a bug, then you can clone. You might want to open a feature request to the upstream project. I'm not sure if there's a setting to limit who can change the priority either. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7111 | [Kali Linux] General Bug | major | always | 2021-03-21 17:14 | 2021-03-21 17:14 |
Reporter: | JosephAshok | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | USB Wifi connection issue | ||||
Description: |
I am using Kali 2021.1 in my Odroid C2. I am using Tenda wifi card which uses Realtek 8192EU chipset. Kali shows the wireless access points, allows me to pick and update WPA key. But the connection does not get through and there is no error either. After trying different ways, i have changed to iwd. Now even NetworkManager is not working if i insert wifi card. After removal of wifi card and restarting NetworkManager it works. Please help me to use wifi. Error with NetworkManager with iwd (when wifi card is inserted) NetworkManager.service: main process exited, code=killed, status=11/SEGV |
||||
Steps To Reproduce: |
Can NetworkManager and WPA_supplicant work with Realtek RTL8192EU wifi driver ? How we can enable both iwd with NetworkManager. Is this a workable solution in Kali? Is segmentation failure known with NetworkManager? |
||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7102 | [Kali Linux] Kali Package Bug | major | always | 2021-03-17 00:30 | 2021-03-21 15:34 |
Reporter: | rubiks | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Fern-wifi-cracker | ||||
Description: | After inputting my password, fern wifi cracker doesn't open. I need solutions please | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014362)
steev 2021-03-17 03:51 |
I can't reproduce the issue here. What happens if you run "sudo fern-wifi-cracker" in the terminal? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7109 | [Kali Linux] Kali Package Bug | block | always | 2021-03-21 12:00 | 2021-03-21 14:50 |
Reporter: | tn4417 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | error when install package kali-tools-web | ||||
Description: | error when install package kali-tools-web | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot from 2021-03-21 18-08-27.png (161,952 bytes) 2021-03-21 12:00 https://bugs.kali.org/file_download.php?file_id=2035&type=bug Screencast 2021-03-21 18:59:22.mp4 (406,453 bytes) 2021-03-21 12:00 https://bugs.kali.org/file_download.php?file_id=2036&type=bug |
||||
Notes | |
(0014376)
kali-bugreport 2021-03-21 12:57 |
Without having a look at the screencast (you really shouldn't hide info within some videos and just post the errors in plaintext) i would say this is a dup of 0007101 |
(0014378)
tn4417 2021-03-21 14:50 |
i'm so sorry!! There is a mistake here. I want to report an error of not being able to open Terminal in the desktop interface. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7107 | [Kali Linux] General Bug | tweak | have not tried | 2021-03-19 04:17 | 2021-03-19 04:17 |
Reporter: | 0netwosix | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Unusual desktop behavior | ||||
Description: |
- Mouse click does not work on the desktop. (Left click and right click both) - No icons are visible on the desktop. Through "File Manager" desktop folders and files are accessible. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7106 | [Kali Linux] Kali Websites & Docs | minor | have not tried | 2021-03-18 14:17 | 2021-03-18 19:00 |
Reporter: | sbrun | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Update hamster-sidejack webpage on tools.kali.org | ||||
Description: |
to avoid conflict with hamster-time-tracker e had to change the command name from hamster to hamster-sidejack. This package needs to be updated: https://tools.kali.org/sniffingspoofing/hamster-sidejack |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014368)
tn4417 2021-03-18 14:52 |
# apt reinstall -y kali-tools-web 100 ⨯ Reading package lists... Done Building dependency tree... Done Reading state information... Done You might want to run 'apt --fix-broken install' to correct these. The following packages have unmet dependencies: kali-tools-sniffing-spoofing : Depends: hamster-sidejack but it is not going to be installed kali-tools-web : Depends: hamster-sidejack but it is not going to be installed E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution). |
(0014369)
steev 2021-03-18 19:00 |
The build hasn't reached kali-rolling yet. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7101 | [Kali Linux] Kali Package Bug | block | always | 2021-03-16 09:42 | 2021-03-18 14:24 |
Reporter: | tn4417 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | immediate | OS Version: | |||
Status: | resolved | Product Version: | 2021.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | hamster-sidejack and hamster-time-tracker conflict | ||||
Description: |
# apt-get install -y kali-tools-web Reading package lists... Done Building dependency tree... Done Reading state information... Done The following additional packages will be installed: apache-users dotdotpwn eyewitness ftester hamster-sidejack httprint httrack jboss-autopwn joomscan libalgorithm-c3-perl libb-hooks-endofscope-perl libb-hooks-op-check-perl libclass-c3-perl libclass-c3-xs-perl libclass-load-perl libclass-load-xs-perl libclass-method-modifiers-perl libclass-tiny-perl libclass-xsaccessor-perl libdata-optlist-perl libdevel-callchecker-perl libdevel-caller-perl libdevel-globaldestruction-perl libdevel-lexalias-perl libdevel-overloadinfo-perl libdevel-partialdump-perl libdevel-stacktrace-perl libdist-checkconflicts-perl libdynaloader-functions-perl libeval-closure-perl libfox-1.6-0 libfxscintilla20 libhttrack2 libimport-into-perl libio-all-lwp-perl libio-all-perl libmodule-implementation-perl libmodule-runtime-conflicts-perl libmodule-runtime-perl libmoo-perl libmoose-perl libmro-compat-perl libnamespace-clean-perl libnet-tftp-perl libpackage-deprecationmanager-perl libpackage-stash-perl libpackage-stash-xs-perl libpadwalker-perl libparallel-forkmanager-perl libparams-classify-perl libparams-util-perl libregexp-common-perl librole-tiny-perl libspiffy-perl libstrictures-perl libsub-exporter-perl libsub-exporter-progressive-perl libsub-identify-perl libsub-install-perl libsub-quote-perl libvariable-magic-perl owasp-mantra-ff padbuster paros plecost pry python3-easyprocess python3-fuzzywuzzy python3-geoip python3-levenshtein python3-pygeoip python3-pyvirtualdisplay racc ruby-childprocess ruby-coderay ruby-connection-pool ruby-fxruby ruby-jwt ruby-mechanize ruby-method-source ruby-net-http-persistent ruby-net-http-pipeline ruby-nfnetlink ruby-nfqueue ruby-ntlm ruby-selenium-webdriver ruby-webrobots sslsniff tlssled uniscan watobo webscarab xsser Suggested packages: webhttrack httrack-doc libdb-file-lock-perl libfile-readbackwards-perl libfreezethaw-perl libmldbm-perl libscalar-number-perl libbareword-filehandles-perl libindirect-perl libmultidimensional-perl firefoxdriver The following NEW packages will be installed: apache-users dotdotpwn eyewitness ftester hamster-sidejack httprint httrack jboss-autopwn joomscan kali-tools-web libalgorithm-c3-perl libb-hooks-endofscope-perl libb-hooks-op-check-perl libclass-c3-perl libclass-c3-xs-perl libclass-load-perl libclass-load-xs-perl libclass-method-modifiers-perl libclass-tiny-perl libclass-xsaccessor-perl libdata-optlist-perl libdevel-callchecker-perl libdevel-caller-perl libdevel-globaldestruction-perl libdevel-lexalias-perl libdevel-overloadinfo-perl libdevel-partialdump-perl libdevel-stacktrace-perl libdist-checkconflicts-perl libdynaloader-functions-perl libeval-closure-perl libfox-1.6-0 libfxscintilla20 libhttrack2 libimport-into-perl libio-all-lwp-perl libio-all-perl libmodule-implementation-perl libmodule-runtime-conflicts-perl libmodule-runtime-perl libmoo-perl libmoose-perl libmro-compat-perl libnamespace-clean-perl libnet-tftp-perl libpackage-deprecationmanager-perl libpackage-stash-perl libpackage-stash-xs-perl libpadwalker-perl libparallel-forkmanager-perl libparams-classify-perl libparams-util-perl libregexp-common-perl librole-tiny-perl libspiffy-perl libstrictures-perl libsub-exporter-perl libsub-exporter-progressive-perl libsub-identify-perl libsub-install-perl libsub-quote-perl libvariable-magic-perl owasp-mantra-ff padbuster paros plecost pry python3-easyprocess python3-fuzzywuzzy python3-geoip python3-levenshtein python3-pygeoip python3-pyvirtualdisplay racc ruby-childprocess ruby-coderay ruby-connection-pool ruby-fxruby ruby-jwt ruby-mechanize ruby-method-source ruby-net-http-persistent ruby-net-http-pipeline ruby-nfnetlink ruby-nfqueue ruby-ntlm ruby-selenium-webdriver ruby-webrobots sslsniff tlssled uniscan watobo webscarab xsser 0 upgraded, 94 newly installed, 0 to remove and 0 not upgraded. Need to get 86.9 MB of archives. After this operation, 220 MB of additional disk space will be used. Get:1 http://kali.download/kali kali-rolling/main amd64 libclass-method-modifiers-perl all 2.13-1 [19.2 kB] Get:2 http://kali.download/kali kali-rolling/main amd64 libb-hooks-op-check-perl amd64 0.22-1+b3 [11.3 kB] Get:3 http://kali.download/kali kali-rolling/main amd64 libdynaloader-functions-perl all 0.003-1.1 [12.7 kB] Get:4 http://kali.download/kali kali-rolling/main amd64 libdevel-callchecker-perl amd64 0.008-1+b2 [15.9 kB] Get:5 http://kali.download/kali kali-rolling/main amd64 libparams-classify-perl amd64 0.015-1+b3 [25.7 kB] Get:6 http://kali.download/kali kali-rolling/main amd64 libmodule-runtime-perl all 0.016-1 [19.4 kB] Get:7 http://kali.download/kali kali-rolling/main amd64 libimport-into-perl all 1.002005-1 [11.6 kB] Get:8 http://kali.download/kali kali-rolling/main amd64 librole-tiny-perl all 2.002004-1 [21.4 kB] Get:9 http://kali.download/kali kali-rolling/main amd64 libstrictures-perl all 2.000006-1 [18.6 kB] Get:10 http://kali.download/kali kali-rolling/main amd64 libsub-quote-perl all 2.006006-1 [21.0 kB] Get:11 http://kali.download/kali kali-rolling/main amd64 libmoo-perl all 2.004004-1 [59.9 kB] Get:12 http://kali.download/kali kali-rolling/main amd64 libparallel-forkmanager-perl all 2.02-1 [30.4 kB] Get:13 http://kali.download/kali kali-rolling/main amd64 libspiffy-perl all 0.46-1 [25.7 kB] Get:14 http://kali.download/kali kali-rolling/main amd64 libio-all-perl all 0.87-1 [66.7 kB] Get:15 http://kali.download/kali kali-rolling/main amd64 libio-all-lwp-perl all 0.14-2.1 [15.5 kB] Get:16 http://kali.download/kali kali-rolling/main amd64 apache-users amd64 2.1-1kali4 [3,452 B] Get:17 http://kali.download/kali kali-rolling/main amd64 libnet-tftp-perl all 0.1901-1.1 [14.0 kB] Get:18 http://kali.download/kali kali-rolling/main amd64 dotdotpwn amd64 3.0.2-0kali2 [35.8 kB] Get:19 http://kali.download/kali kali-rolling/main amd64 python3-levenshtein amd64 0.12.2-1 [39.1 kB] Get:20 http://kali.download/kali kali-rolling/main amd64 python3-fuzzywuzzy all 0.18.0-1 [20.6 kB] Get:21 http://kali.download/kali kali-rolling/main amd64 python3-easyprocess all 0.2.5-2 [11.6 kB] Get:22 http://kali.download/kali kali-rolling/main amd64 python3-pyvirtualdisplay all 0.2.1-3 [11.1 kB] Get:23 http://kali.download/kali kali-rolling/main amd64 eyewitness amd64 20210305.1-0kali1 [1,371 kB] Get:24 http://kali.download/kali kali-rolling/main amd64 ftester all 1.0-1kali2 [20.9 kB] Get:25 http://kali.download/kali kali-rolling/main amd64 hamster-sidejack amd64 2.0-1kali4 [45.1 kB] Get:26 http://kali.download/kali kali-rolling/main amd64 libhttrack2 amd64 3.49.2-1.1 [268 kB] Get:27 http://kali.download/kali kali-rolling/main amd64 httrack amd64 3.49.2-1.1 [39.7 kB] Get:28 http://kali.download/kali kali-rolling/main amd64 jboss-autopwn all 0.1-1kali1 [66.8 kB] Get:29 http://kali.download/kali kali-rolling/main amd64 libregexp-common-perl all 2017060201-1 [177 kB] Get:30 http://kali.download/kali kali-rolling/main amd64 joomscan all 0.0.7-0kali2 [64.3 kB] Get:31 http://kali.download/kali kali-rolling/non-free amd64 httprint amd64 0.301-0kali3 [556 kB] Get:32 http://kali.download/kali kali-rolling/non-free amd64 owasp-mantra-ff amd64 0.9-1kali2 [49.4 MB] Get:33 http://kali.download/kali kali-rolling/main amd64 padbuster all 0.3.3-1kali3 [12.3 kB] Get:34 http://kali.download/kali kali-rolling/main amd64 paros all 3.2.13-1kali3 [1,580 kB] Get:35 http://kali.download/kali kali-rolling/main amd64 plecost all 1.1.2-0kali1 [1,320 kB] Get:36 http://kali.download/kali kali-rolling/main amd64 sslsniff amd64 0.8-9 [124 kB] Get:37 http://kali.download/kali kali-rolling/main amd64 tlssled all 1.3-0kali2 [9,904 B] Get:38 http://kali.download/kali kali-rolling/main amd64 libparams-util-perl amd64 1.102-1+b1 [25.6 kB] Get:39 http://kali.download/kali kali-rolling/main amd64 libsub-install-perl all 0.928-1.1 [10.8 kB] Get:40 http://kali.download/kali kali-rolling/main amd64 libdata-optlist-perl all 0.110-1.1 [10.8 kB] Get:41 http://kali.download/kali kali-rolling/main amd64 libmodule-implementation-perl all 0.09-1.1 [12.4 kB] Get:42 http://kali.download/kali kali-rolling/main amd64 libpackage-stash-perl all 0.39-1 [21.9 kB] Get:43 http://kali.download/kali kali-rolling/main amd64 libclass-load-perl all 0.25-1 [16.1 kB] Get:44 http://kali.download/kali kali-rolling/main amd64 libclass-load-xs-perl amd64 0.10-1+b5 [14.6 kB] Get:45 http://kali.download/kali kali-rolling/main amd64 libsub-exporter-progressive-perl all 0.001013-1 [7,588 B] Get:46 http://kali.download/kali kali-rolling/main amd64 libdevel-globaldestruction-perl all 0.14-1.1 [8,312 B] Get:47 http://kali.download/kali kali-rolling/main amd64 libalgorithm-c3-perl all 0.11-1 [11.7 kB] Get:48 http://kali.download/kali kali-rolling/main amd64 libclass-c3-perl all 0.35-1 [22.9 kB] Get:49 http://kali.download/kali kali-rolling/main amd64 libmro-compat-perl all 0.13-1 [12.2 kB] Get:50 http://kali.download/kali kali-rolling/main amd64 libsub-identify-perl amd64 0.14-1+b3 [12.0 kB] Get:51 http://kali.download/kali kali-rolling/main amd64 libdevel-overloadinfo-perl all 0.005-1 [7,212 B] Get:52 http://kali.download/kali kali-rolling/main amd64 libdevel-stacktrace-perl all 2.0400-1 [28.6 kB] Get:53 http://kali.download/kali kali-rolling/main amd64 libsub-exporter-perl all 0.987-1 [47.2 kB] Get:54 http://kali.download/kali kali-rolling/main amd64 libeval-closure-perl all 0.14-1 [11.5 kB] Get:55 http://kali.download/kali kali-rolling/main amd64 libdist-checkconflicts-perl all 0.11-1.1 [10.2 kB] Get:56 http://kali.download/kali kali-rolling/main amd64 libmodule-runtime-conflicts-perl all 0.003-1.1 [7,156 B] Get:57 http://kali.download/kali kali-rolling/main amd64 libpackage-deprecationmanager-perl all 0.17-1.1 [16.6 kB] Get:58 http://kali.download/kali kali-rolling/main amd64 libpackage-stash-xs-perl amd64 0.29-1+b2 [20.2 kB] Get:59 http://kali.download/kali kali-rolling/main amd64 libmoose-perl amd64 2.2014-2 [802 kB] Get:60 http://kali.download/kali kali-rolling/main amd64 uniscan all 6.3-0kali2 [219 kB] Get:61 http://kali.download/kali kali-rolling/main amd64 ruby-coderay all 1.1.3-3 [77.5 kB] Get:62 http://kali.download/kali kali-rolling/main amd64 ruby-method-source all 1.0.0-2 [9,060 B] Get:63 http://kali.download/kali kali-rolling/main amd64 pry all 0.13.1-1 [141 kB] Get:64 http://kali.download/kali kali-rolling/main amd64 libfox-1.6-0 amd64 1.6.57-1 [877 kB] Get:65 http://kali.download/kali kali-rolling/main amd64 libfxscintilla20 amd64 2.28.0-0kali2 [765 kB] Get:66 http://kali.download/kali kali-rolling/main amd64 ruby-fxruby amd64 1.6.29-0kali7+b1 [1,602 kB] Get:67 http://kali.download/kali kali-rolling/main amd64 ruby-jwt all 2.2.2-1 [21.2 kB] Get:68 http://kali.download/kali kali-rolling/main amd64 ruby-connection-pool all 2.2.2-1 [9,080 B] Get:69 http://kali.download/kali kali-rolling/main amd64 ruby-net-http-persistent all 3.1.0-2 [21.0 kB] Get:70 http://kali.download/kali kali-rolling/main amd64 ruby-ntlm all 0.6.1-2 [17.3 kB] Get:71 http://kali.download/kali kali-rolling/main amd64 racc all 1.4.14-2 [83.4 kB] Get:72 http://kali.download/kali kali-rolling/main amd64 ruby-webrobots all 0.1.2-1 [10.9 kB] Get:73 http://kali.download/kali kali-rolling/main amd64 ruby-mechanize all 2.7.7-1 [81.7 kB] Get:74 http://kali.download/kali kali-rolling/main amd64 ruby-net-http-pipeline all 1.0.1-3 [7,052 B] Get:75 http://kali.download/kali kali-rolling/main amd64 ruby-childprocess all 4.0.0-1 [24.9 kB] Get:76 http://kali.download/kali kali-rolling/main amd64 ruby-selenium-webdriver all 3.142.7+dfsg-2 [742 kB] Get:77 http://kali.download/kali kali-rolling/main amd64 watobo amd64 1.0.1-0kali1 [689 kB] Get:78 http://kali.download/kali kali-rolling/main amd64 webscarab all 20120422-001828-1kali2 [13.0 MB] Get:79 http://kali.download/kali kali-rolling/main amd64 python3-geoip amd64 1.3.2-3+b3 [21.1 kB] Get:80 http://kali.download/kali kali-rolling/main amd64 xsser all 1.8.3+git20201228-0kali1 [11.5 MB] Get:81 http://kali.download/kali kali-rolling/main amd64 kali-tools-web amd64 2021.1.10 [13.4 kB] Get:82 http://kali.download/kali kali-rolling/main amd64 libvariable-magic-perl amd64 0.62-1+b3 [45.7 kB] Get:83 http://kali.download/kali kali-rolling/main amd64 libb-hooks-endofscope-perl all 0.24-1.1 [18.9 kB] Get:84 http://kali.download/kali kali-rolling/main amd64 libclass-c3-xs-perl amd64 0.15-1+b1 [17.3 kB] Get:85 http://kali.download/kali kali-rolling/main amd64 libclass-tiny-perl all 1.008-1 [18.8 kB] Get:86 http://kali.download/kali kali-rolling/main amd64 libclass-xsaccessor-perl amd64 1.19-3+b7 [38.1 kB] Get:87 http://kali.download/kali kali-rolling/main amd64 libpadwalker-perl amd64 2.5-1+b1 [20.3 kB] Get:88 http://kali.download/kali kali-rolling/main amd64 libdevel-caller-perl amd64 2.06-2+b3 [12.1 kB] Get:89 http://kali.download/kali kali-rolling/main amd64 libdevel-lexalias-perl amd64 0.05-2+b3 [9,064 B] Get:90 http://kali.download/kali kali-rolling/main amd64 libnamespace-clean-perl all 0.27-1 [17.3 kB] Get:91 http://kali.download/kali kali-rolling/main amd64 libdevel-partialdump-perl all 0.20-1 [15.3 kB] Get:92 http://kali.download/kali kali-rolling/main amd64 python3-pygeoip all 0.3.2-5 [18.0 kB] Get:93 http://kali.download/kali kali-rolling/main amd64 ruby-nfnetlink all 1.0.2-2 [4,532 B] Get:94 http://kali.download/kali kali-rolling/main amd64 ruby-nfqueue all 1.0.4-2 [6,372 B] Fetched 86.9 MB in 54s (1,619 kB/s) Extracting templates from packages: 100% Selecting previously unselected package libclass-method-modifiers-perl. (Reading database ... 466464 files and directories currently installed.) Preparing to unpack .../00-libclass-method-modifiers-perl_2.13-1_all.deb ... Unpacking libclass-method-modifiers-perl (2.13-1) ... Selecting previously unselected package libb-hooks-op-check-perl. Preparing to unpack .../01-libb-hooks-op-check-perl_0.22-1+b3_amd64.deb ... Unpacking libb-hooks-op-check-perl (0.22-1+b3) ... Selecting previously unselected package libdynaloader-functions-perl. Preparing to unpack .../02-libdynaloader-functions-perl_0.003-1.1_all.deb ... Unpacking libdynaloader-functions-perl (0.003-1.1) ... Selecting previously unselected package libdevel-callchecker-perl. Preparing to unpack .../03-libdevel-callchecker-perl_0.008-1+b2_amd64.deb ... Unpacking libdevel-callchecker-perl (0.008-1+b2) ... Selecting previously unselected package libparams-classify-perl. Preparing to unpack .../04-libparams-classify-perl_0.015-1+b3_amd64.deb ... Unpacking libparams-classify-perl (0.015-1+b3) ... Selecting previously unselected package libmodule-runtime-perl. Preparing to unpack .../05-libmodule-runtime-perl_0.016-1_all.deb ... Unpacking libmodule-runtime-perl (0.016-1) ... Selecting previously unselected package libimport-into-perl. Preparing to unpack .../06-libimport-into-perl_1.002005-1_all.deb ... Unpacking libimport-into-perl (1.002005-1) ... Selecting previously unselected package librole-tiny-perl. Preparing to unpack .../07-librole-tiny-perl_2.002004-1_all.deb ... Unpacking librole-tiny-perl (2.002004-1) ... Selecting previously unselected package libstrictures-perl. Preparing to unpack .../08-libstrictures-perl_2.000006-1_all.deb ... Unpacking libstrictures-perl (2.000006-1) ... Selecting previously unselected package libsub-quote-perl. Preparing to unpack .../09-libsub-quote-perl_2.006006-1_all.deb ... Unpacking libsub-quote-perl (2.006006-1) ... Selecting previously unselected package libmoo-perl. Preparing to unpack .../10-libmoo-perl_2.004004-1_all.deb ... Unpacking libmoo-perl (2.004004-1) ... Selecting previously unselected package libparallel-forkmanager-perl. Preparing to unpack .../11-libparallel-forkmanager-perl_2.02-1_all.deb ... Unpacking libparallel-forkmanager-perl (2.02-1) ... Selecting previously unselected package libspiffy-perl. Preparing to unpack .../12-libspiffy-perl_0.46-1_all.deb ... Unpacking libspiffy-perl (0.46-1) ... Selecting previously unselected package libio-all-perl. Preparing to unpack .../13-libio-all-perl_0.87-1_all.deb ... Unpacking libio-all-perl (0.87-1) ... Selecting previously unselected package libio-all-lwp-perl. Preparing to unpack .../14-libio-all-lwp-perl_0.14-2.1_all.deb ... Unpacking libio-all-lwp-perl (0.14-2.1) ... Selecting previously unselected package apache-users. Preparing to unpack .../15-apache-users_2.1-1kali4_amd64.deb ... Unpacking apache-users (2.1-1kali4) ... Selecting previously unselected package libnet-tftp-perl. Preparing to unpack .../16-libnet-tftp-perl_0.1901-1.1_all.deb ... Unpacking libnet-tftp-perl (0.1901-1.1) ... Selecting previously unselected package dotdotpwn. Preparing to unpack .../17-dotdotpwn_3.0.2-0kali2_amd64.deb ... Unpacking dotdotpwn (3.0.2-0kali2) ... Selecting previously unselected package python3-levenshtein. Preparing to unpack .../18-python3-levenshtein_0.12.2-1_amd64.deb ... Unpacking python3-levenshtein (0.12.2-1) ... Selecting previously unselected package python3-fuzzywuzzy. Preparing to unpack .../19-python3-fuzzywuzzy_0.18.0-1_all.deb ... Unpacking python3-fuzzywuzzy (0.18.0-1) ... Selecting previously unselected package python3-easyprocess. Preparing to unpack .../20-python3-easyprocess_0.2.5-2_all.deb ... Unpacking python3-easyprocess (0.2.5-2) ... Selecting previously unselected package python3-pyvirtualdisplay. Preparing to unpack .../21-python3-pyvirtualdisplay_0.2.1-3_all.deb ... Unpacking python3-pyvirtualdisplay (0.2.1-3) ... Selecting previously unselected package eyewitness. Preparing to unpack .../22-eyewitness_20210305.1-0kali1_amd64.deb ... Unpacking eyewitness (20210305.1-0kali1) ... Selecting previously unselected package ftester. Preparing to unpack .../23-ftester_1.0-1kali2_all.deb ... Unpacking ftester (1.0-1kali2) ... Preparing to unpack .../24-hamster-sidejack_2.0-1kali4_amd64.deb ... Unpacking hamster-sidejack (2.0-1kali4) ... dpkg: error processing archive /tmp/apt-dpkg-install-SIDCag/24-hamster-sidejack_2.0-1kali4_amd64.deb (--unpack): trying to overwrite '/usr/bin/hamster', which is also in package hamster-time-tracker 3.0.2-3 Selecting previously unselected package libhttrack2. Preparing to unpack .../25-libhttrack2_3.49.2-1.1_amd64.deb ... Unpacking libhttrack2 (3.49.2-1.1) ... Selecting previously unselected package httrack. Preparing to unpack .../26-httrack_3.49.2-1.1_amd64.deb ... Unpacking httrack (3.49.2-1.1) ... Selecting previously unselected package jboss-autopwn. Preparing to unpack .../27-jboss-autopwn_0.1-1kali1_all.deb ... Unpacking jboss-autopwn (0.1-1kali1) ... Selecting previously unselected package libregexp-common-perl. Preparing to unpack .../28-libregexp-common-perl_2017060201-1_all.deb ... Unpacking libregexp-common-perl (2017060201-1) ... Selecting previously unselected package joomscan. Preparing to unpack .../29-joomscan_0.0.7-0kali2_all.deb ... Unpacking joomscan (0.0.7-0kali2) ... Selecting previously unselected package httprint. Preparing to unpack .../30-httprint_0.301-0kali3_amd64.deb ... Unpacking httprint (0.301-0kali3) ... Selecting previously unselected package owasp-mantra-ff. Preparing to unpack .../31-owasp-mantra-ff_0.9-1kali2_amd64.deb ... Unpacking owasp-mantra-ff (0.9-1kali2) ... Selecting previously unselected package padbuster. Preparing to unpack .../32-padbuster_0.3.3-1kali3_all.deb ... Unpacking padbuster (0.3.3-1kali3) ... Selecting previously unselected package paros. Preparing to unpack .../33-paros_3.2.13-1kali3_all.deb ... Unpacking paros (3.2.13-1kali3) ... Selecting previously unselected package plecost. Preparing to unpack .../34-plecost_1.1.2-0kali1_all.deb ... Unpacking plecost (1.1.2-0kali1) ... Selecting previously unselected package sslsniff. Preparing to unpack .../35-sslsniff_0.8-9_amd64.deb ... Unpacking sslsniff (0.8-9) ... Selecting previously unselected package tlssled. Preparing to unpack .../36-tlssled_1.3-0kali2_all.deb ... Unpacking tlssled (1.3-0kali2) ... Selecting previously unselected package libparams-util-perl. Preparing to unpack .../37-libparams-util-perl_1.102-1+b1_amd64.deb ... Unpacking libparams-util-perl (1.102-1+b1) ... Selecting previously unselected package libsub-install-perl. Preparing to unpack .../38-libsub-install-perl_0.928-1.1_all.deb ... Unpacking libsub-install-perl (0.928-1.1) ... Selecting previously unselected package libdata-optlist-perl. Preparing to unpack .../39-libdata-optlist-perl_0.110-1.1_all.deb ... Unpacking libdata-optlist-perl (0.110-1.1) ... Selecting previously unselected package libmodule-implementation-perl. Preparing to unpack .../40-libmodule-implementation-perl_0.09-1.1_all.deb ... Unpacking libmodule-implementation-perl (0.09-1.1) ... Selecting previously unselected package libpackage-stash-perl. Preparing to unpack .../41-libpackage-stash-perl_0.39-1_all.deb ... Unpacking libpackage-stash-perl (0.39-1) ... Selecting previously unselected package libclass-load-perl. Preparing to unpack .../42-libclass-load-perl_0.25-1_all.deb ... Unpacking libclass-load-perl (0.25-1) ... Selecting previously unselected package libclass-load-xs-perl. Preparing to unpack .../43-libclass-load-xs-perl_0.10-1+b5_amd64.deb ... Unpacking libclass-load-xs-perl (0.10-1+b5) ... Selecting previously unselected package libsub-exporter-progressive-perl. Preparing to unpack .../44-libsub-exporter-progressive-perl_0.001013-1_all.deb ... Unpacking libsub-exporter-progressive-perl (0.001013-1) ... Selecting previously unselected package libdevel-globaldestruction-perl. Preparing to unpack .../45-libdevel-globaldestruction-perl_0.14-1.1_all.deb ... Unpacking libdevel-globaldestruction-perl (0.14-1.1) ... Selecting previously unselected package libalgorithm-c3-perl. Preparing to unpack .../46-libalgorithm-c3-perl_0.11-1_all.deb ... Unpacking libalgorithm-c3-perl (0.11-1) ... Selecting previously unselected package libclass-c3-perl. Preparing to unpack .../47-libclass-c3-perl_0.35-1_all.deb ... Unpacking libclass-c3-perl (0.35-1) ... Selecting previously unselected package libmro-compat-perl. Preparing to unpack .../48-libmro-compat-perl_0.13-1_all.deb ... Unpacking libmro-compat-perl (0.13-1) ... Selecting previously unselected package libsub-identify-perl. Preparing to unpack .../49-libsub-identify-perl_0.14-1+b3_amd64.deb ... Unpacking libsub-identify-perl (0.14-1+b3) ... Selecting previously unselected package libdevel-overloadinfo-perl. Preparing to unpack .../50-libdevel-overloadinfo-perl_0.005-1_all.deb ... Unpacking libdevel-overloadinfo-perl (0.005-1) ... Selecting previously unselected package libdevel-stacktrace-perl. Preparing to unpack .../51-libdevel-stacktrace-perl_2.0400-1_all.deb ... Unpacking libdevel-stacktrace-perl (2.0400-1) ... Selecting previously unselected package libsub-exporter-perl. Preparing to unpack .../52-libsub-exporter-perl_0.987-1_all.deb ... Unpacking libsub-exporter-perl (0.987-1) ... Selecting previously unselected package libeval-closure-perl. Preparing to unpack .../53-libeval-closure-perl_0.14-1_all.deb ... Unpacking libeval-closure-perl (0.14-1) ... Selecting previously unselected package libdist-checkconflicts-perl. Preparing to unpack .../54-libdist-checkconflicts-perl_0.11-1.1_all.deb ... Unpacking libdist-checkconflicts-perl (0.11-1.1) ... Selecting previously unselected package libmodule-runtime-conflicts-perl. Preparing to unpack .../55-libmodule-runtime-conflicts-perl_0.003-1.1_all.deb ... Unpacking libmodule-runtime-conflicts-perl (0.003-1.1) ... Selecting previously unselected package libpackage-deprecationmanager-perl. Preparing to unpack .../56-libpackage-deprecationmanager-perl_0.17-1.1_all.deb ... Unpacking libpackage-deprecationmanager-perl (0.17-1.1) ... Selecting previously unselected package libpackage-stash-xs-perl. Preparing to unpack .../57-libpackage-stash-xs-perl_0.29-1+b2_amd64.deb ... Unpacking libpackage-stash-xs-perl (0.29-1+b2) ... Selecting previously unselected package libmoose-perl. Preparing to unpack .../58-libmoose-perl_2.2014-2_amd64.deb ... Unpacking libmoose-perl (2.2014-2) ... Selecting previously unselected package uniscan. Preparing to unpack .../59-uniscan_6.3-0kali2_all.deb ... Unpacking uniscan (6.3-0kali2) ... Selecting previously unselected package ruby-coderay. Preparing to unpack .../60-ruby-coderay_1.1.3-3_all.deb ... Unpacking ruby-coderay (1.1.3-3) ... Selecting previously unselected package ruby-method-source. Preparing to unpack .../61-ruby-method-source_1.0.0-2_all.deb ... Unpacking ruby-method-source (1.0.0-2) ... Selecting previously unselected package pry. Preparing to unpack .../62-pry_0.13.1-1_all.deb ... Unpacking pry (0.13.1-1) ... Selecting previously unselected package libfox-1.6-0:amd64. Preparing to unpack .../63-libfox-1.6-0_1.6.57-1_amd64.deb ... Unpacking libfox-1.6-0:amd64 (1.6.57-1) ... Selecting previously unselected package libfxscintilla20. Preparing to unpack .../64-libfxscintilla20_2.28.0-0kali2_amd64.deb ... Unpacking libfxscintilla20 (2.28.0-0kali2) ... Selecting previously unselected package ruby-fxruby. Preparing to unpack .../65-ruby-fxruby_1.6.29-0kali7+b1_amd64.deb ... Unpacking ruby-fxruby (1.6.29-0kali7+b1) ... Selecting previously unselected package ruby-jwt. Preparing to unpack .../66-ruby-jwt_2.2.2-1_all.deb ... Unpacking ruby-jwt (2.2.2-1) ... Selecting previously unselected package ruby-connection-pool. Preparing to unpack .../67-ruby-connection-pool_2.2.2-1_all.deb ... Unpacking ruby-connection-pool (2.2.2-1) ... Selecting previously unselected package ruby-net-http-persistent. Preparing to unpack .../68-ruby-net-http-persistent_3.1.0-2_all.deb ... Unpacking ruby-net-http-persistent (3.1.0-2) ... Selecting previously unselected package ruby-ntlm. Preparing to unpack .../69-ruby-ntlm_0.6.1-2_all.deb ... Unpacking ruby-ntlm (0.6.1-2) ... Selecting previously unselected package racc. Preparing to unpack .../70-racc_1.4.14-2_all.deb ... Unpacking racc (1.4.14-2) ... Selecting previously unselected package ruby-webrobots. Preparing to unpack .../71-ruby-webrobots_0.1.2-1_all.deb ... Unpacking ruby-webrobots (0.1.2-1) ... Selecting previously unselected package ruby-mechanize. Preparing to unpack .../72-ruby-mechanize_2.7.7-1_all.deb ... Unpacking ruby-mechanize (2.7.7-1) ... Selecting previously unselected package ruby-net-http-pipeline. Preparing to unpack .../73-ruby-net-http-pipeline_1.0.1-3_all.deb ... Unpacking ruby-net-http-pipeline (1.0.1-3) ... Selecting previously unselected package ruby-childprocess. Preparing to unpack .../74-ruby-childprocess_4.0.0-1_all.deb ... Unpacking ruby-childprocess (4.0.0-1) ... Selecting previously unselected package ruby-selenium-webdriver. Preparing to unpack .../75-ruby-selenium-webdriver_3.142.7+dfsg-2_all.deb ... Unpacking ruby-selenium-webdriver (3.142.7+dfsg-2) ... Selecting previously unselected package watobo. Preparing to unpack .../76-watobo_1.0.1-0kali1_amd64.deb ... Unpacking watobo (1.0.1-0kali1) ... Selecting previously unselected package webscarab. Preparing to unpack .../77-webscarab_20120422-001828-1kali2_all.deb ... Unpacking webscarab (20120422-001828-1kali2) ... Selecting previously unselected package python3-geoip. Preparing to unpack .../78-python3-geoip_1.3.2-3+b3_amd64.deb ... Unpacking python3-geoip (1.3.2-3+b3) ... Selecting previously unselected package xsser. Preparing to unpack .../79-xsser_1.8.3+git20201228-0kali1_all.deb ... Unpacking xsser (1.8.3+git20201228-0kali1) ... Selecting previously unselected package kali-tools-web. Preparing to unpack .../80-kali-tools-web_2021.1.10_amd64.deb ... Unpacking kali-tools-web (2021.1.10) ... Selecting previously unselected package libvariable-magic-perl. Preparing to unpack .../81-libvariable-magic-perl_0.62-1+b3_amd64.deb ... Unpacking libvariable-magic-perl (0.62-1+b3) ... Selecting previously unselected package libb-hooks-endofscope-perl. Preparing to unpack .../82-libb-hooks-endofscope-perl_0.24-1.1_all.deb ... Unpacking libb-hooks-endofscope-perl (0.24-1.1) ... Selecting previously unselected package libclass-c3-xs-perl. Preparing to unpack .../83-libclass-c3-xs-perl_0.15-1+b1_amd64.deb ... Unpacking libclass-c3-xs-perl (0.15-1+b1) ... Selecting previously unselected package libclass-tiny-perl. Preparing to unpack .../84-libclass-tiny-perl_1.008-1_all.deb ... Unpacking libclass-tiny-perl (1.008-1) ... Selecting previously unselected package libclass-xsaccessor-perl. Preparing to unpack .../85-libclass-xsaccessor-perl_1.19-3+b7_amd64.deb ... Unpacking libclass-xsaccessor-perl (1.19-3+b7) ... Selecting previously unselected package libpadwalker-perl. Preparing to unpack .../86-libpadwalker-perl_2.5-1+b1_amd64.deb ... Unpacking libpadwalker-perl (2.5-1+b1) ... Selecting previously unselected package libdevel-caller-perl. Preparing to unpack .../87-libdevel-caller-perl_2.06-2+b3_amd64.deb ... Unpacking libdevel-caller-perl (2.06-2+b3) ... Selecting previously unselected package libdevel-lexalias-perl. Preparing to unpack .../88-libdevel-lexalias-perl_0.05-2+b3_amd64.deb ... Unpacking libdevel-lexalias-perl (0.05-2+b3) ... Selecting previously unselected package libnamespace-clean-perl. Preparing to unpack .../89-libnamespace-clean-perl_0.27-1_all.deb ... Unpacking libnamespace-clean-perl (0.27-1) ... Selecting previously unselected package libdevel-partialdump-perl. Preparing to unpack .../90-libdevel-partialdump-perl_0.20-1_all.deb ... Unpacking libdevel-partialdump-perl (0.20-1) ... Selecting previously unselected package python3-pygeoip. Preparing to unpack .../91-python3-pygeoip_0.3.2-5_all.deb ... Unpacking python3-pygeoip (0.3.2-5) ... Selecting previously unselected package ruby-nfnetlink. Preparing to unpack .../92-ruby-nfnetlink_1.0.2-2_all.deb ... Unpacking ruby-nfnetlink (1.0.2-2) ... Selecting previously unselected package ruby-nfqueue. Preparing to unpack .../93-ruby-nfqueue_1.0.4-2_all.deb ... Unpacking ruby-nfqueue (1.0.4-2) ... Errors were encountered while processing: /tmp/apt-dpkg-install-SIDCag/24-hamster-sidejack_2.0-1kali4_amd64.deb E: Sub-process /usr/bin/dpkg returned an error code (1) |
||||
Steps To Reproduce: | apt install -y kali-tools-web | ||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014357)
tn4417 2021-03-16 09:44 |
─# apt-get install -y kali-tools-web 100 ⨯ Reading package lists... Done Building dependency tree... Done Reading state information... Done kali-tools-web is already the newest version (2021.1.10). You might want to run 'apt --fix-broken install' to correct these. The following packages have unmet dependencies: kali-tools-web : Depends: hamster-sidejack but it is not going to be installed E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution). |
(0014360)
steev 2021-03-16 20:28 |
Unpacking hamster-sidejack (2.0-1kali4) ... dpkg: error processing archive /tmp/apt-dpkg-install-SIDCag/24-hamster-sidejack_2.0-1kali4_amd64.deb (--unpack): trying to overwrite '/usr/bin/hamster', which is also in package hamster-time-tracker 3.0.2-3 Looks like we have clashing binary names with the GNOME time tracker. You could remove hamster-time-tracker as a workaround, if you aren't using it. |
(0014361)
tn4417 2021-03-17 03:31 |
this problem was fixed.Thanks |
(0014363)
steev 2021-03-17 03:54 |
Do you mean the workaround worked, or do you mean that you're able to install hamster-sidejack while also having hamster-time-tracker installed? |
(0014364)
tn4417 2021-03-17 04:03 |
I follow your instructions. .I need to remove the hamster-time-tracker package first. I then reinstalled the package kali-tools-web |
(0014367)
sbrun 2021-03-18 14:24 |
to avoid conflict with the Debian package hamster-time-tracker, we renamed the command from hamster to hamster-sidejack in version kali/2.0-1kali5 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7093 | [Kali Linux] Tool Upgrade | minor | have not tried | 2021-03-12 19:00 | 2021-03-18 08:36 |
Reporter: | wiringmarigold | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | bat vers 0.18 avaialble | ||||
Description: |
can this be updated pls? also binary installed is named wrong, should be bat, not batcat. this causes issues with usage and scripting |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014318)
steev 2021-03-13 04:47 |
Unfortunately, another package already has (and has had) the binary name of "bat" so we can't install it with the same name, thus why it gets "batcat" |
(0014348)
wiringmarigold 2021-03-13 13:16 |
@steev will it still be updated? |
(0014366)
sbrun 2021-03-18 08:36 |
It's a Debian package. Someone has already opened a bug to request the update : https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983922 We can import the package in Kali as soon it's available in Debian. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7073 | [Kali Linux] General Bug | minor | always | 2021-03-02 09:27 | 2021-03-16 07:19 |
Reporter: | john285 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | USB adapter not work | ||||
Description: |
USB adapter not work Bus 006 Device 002: ID 0a5c:2101 Broadcom Corp. BCM2045 Bluetooth |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014264)
steev 2021-03-02 20:15 |
Can you give more information? After plugging it in and starting the bluetooth service, what is the output of "hcitool dev" ? Is there any information in dmesg? |
(0014353)
john285 2021-03-16 02:49 |
[ 0.326581] x86/mm: Memory block size: 128MB [ 0.327420] PM: Registering ACPI NVS region [mem 0x9ca89000-0x9cb59fff] (856064 bytes) [ 0.327420] PM: Registering ACPI NVS region [mem 0x9e4d2000-0x9e4d9fff] (32768 bytes) [ 0.327420] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns [ 0.327420] futex hash table entries: 1024 (order: 4, 65536 bytes, linear) [ 0.327420] pinctrl core: initialized pinctrl subsystem [ 0.327420] NET: Registered protocol family 16 [ 0.330079] audit: initializing netlink subsys (disabled) [ 0.330099] audit: type=2000 audit(1615436160.156:1): state=initialized audit_enabled=0 res=1 [ 0.330324] thermal_sys: Registered thermal governor 'fair_share' [ 0.330327] thermal_sys: Registered thermal governor 'bang_bang' [ 0.330329] thermal_sys: Registered thermal governor 'step_wise' [ 0.330331] thermal_sys: Registered thermal governor 'user_space' [ 0.330334] thermal_sys: Registered thermal governor 'power_allocator' [ 0.330366] cpuidle: using governor ladder [ 0.330380] cpuidle: using governor menu [ 0.330417] ACPI: bus type PCI registered [ 0.330417] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 0.330417] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) [ 0.330417] PCI: not using MMCONFIG [ 0.330417] PCI: Using configuration type 1 for base access [ 0.330417] PCI: Using configuration type 1 for extended access [ 0.330846] mtrr: your CPUs had inconsistent variable MTRR settings [ 0.330848] mtrr: probably your BIOS does not setup all CPUs. [ 0.330849] mtrr: corrected configuration. [ 0.334074] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 0.334074] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 0.878248] ACPI: Added _OSI(Module Device) [ 0.878252] ACPI: Added _OSI(Processor Device) [ 0.878255] ACPI: Added _OSI(3.0 _SCP Extensions) [ 0.878257] ACPI: Added _OSI(Processor Aggregator Device) [ 0.878261] ACPI: Added _OSI(Linux-Dell-Video) [ 0.878264] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 0.878267] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) [ 0.894820] ACPI: 6 ACPI AML tables successfully acquired and loaded [ 0.903848] ACPI: Interpreter enabled [ 0.903911] ACPI: (supports S0 S3 S4 S5) [ 0.903915] ACPI: Using IOAPIC for interrupt routing [ 0.904317] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) [ 0.904446] PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in ACPI motherboard resources [ 0.904482] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 0.905739] ACPI: Enabled 6 GPEs in block 00 to 1F [ 0.925077] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 0.925092] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] [ 0.925632] acpi PNP0A08:00: _OSC: platform does not support [SHPCHotplug LTR] [ 0.926153] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] [ 0.926974] PCI host bridge to bus 0000:00 [ 0.926981] pci_bus 0000:00: root bus resource [io 0x0000-0x03af window] [ 0.926985] pci_bus 0000:00: root bus resource [io 0x03e0-0x0cf7 window] [ 0.926989] pci_bus 0000:00: root bus resource [io 0x03b0-0x03df window] [ 0.926993] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 0.926997] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 0.927001] pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000dffff window] [ 0.927005] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xffffffff window] [ 0.927009] pci_bus 0000:00: root bus resource [bus 00-ff] [ 0.927036] pci 0000:00:00.0: [1022:1536] type 00 class 0x060000 [ 0.927316] pci 0000:00:01.0: [1002:9836] type 00 class 0x030000 [ 0.927337] pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xcfffffff 64bit pref] [ 0.927350] pci 0000:00:01.0: reg 0x18: [mem 0xd0000000-0xd07fffff 64bit pref] [ 0.927360] pci 0000:00:01.0: reg 0x20: [io 0xf000-0xf0ff] [ 0.927369] pci 0000:00:01.0: reg 0x24: [mem 0xfeb00000-0xfeb3ffff] [ 0.927380] pci 0000:00:01.0: reg 0x30: [mem 0xfeb40000-0xfeb5ffff pref] [ 0.927389] pci 0000:00:01.0: enabling Extended Tags [ 0.927449] pci 0000:00:01.0: supports D1 D2 [ 0.927453] pci 0000:00:01.0: PME# supported from D1 D2 D3hot [ 0.927700] pci 0000:00:01.1: [1002:9840] type 00 class 0x040300 [ 0.927720] pci 0000:00:01.1: reg 0x10: [mem 0xfeb64000-0xfeb67fff 64bit] [ 0.927758] pci 0000:00:01.1: enabling Extended Tags [ 0.927813] pci 0000:00:01.1: supports D1 D2 [ 0.927999] pci 0000:00:02.0: [1022:1538] type 00 class 0x060000 [ 0.928209] pci 0000:00:02.2: [1022:1439] type 01 class 0x060400 [ 0.928256] pci 0000:00:02.2: enabling Extended Tags [ 0.928322] pci 0000:00:02.2: PME# supported from D0 D3hot D3cold [ 0.928607] pci 0000:00:02.3: [1022:1439] type 01 class 0x060400 [ 0.928653] pci 0000:00:02.3: enabling Extended Tags [ 0.928718] pci 0000:00:02.3: PME# supported from D0 D3hot D3cold [ 0.929022] pci 0000:00:10.0: [1022:7814] type 00 class 0x0c0330 [ 0.929048] pci 0000:00:10.0: reg 0x10: [mem 0xfeb68000-0xfeb69fff 64bit] [ 0.929171] pci 0000:00:10.0: PME# supported from D0 D3hot D3cold [ 0.929431] pci 0000:00:11.0: [1022:7801] type 00 class 0x010601 [ 0.929450] pci 0000:00:11.0: reg 0x10: [io 0xf140-0xf147] [ 0.929460] pci 0000:00:11.0: reg 0x14: [io 0xf130-0xf133] [ 0.929471] pci 0000:00:11.0: reg 0x18: [io 0xf120-0xf127] [ 0.929481] pci 0000:00:11.0: reg 0x1c: [io 0xf110-0xf113] [ 0.929491] pci 0000:00:11.0: reg 0x20: [io 0xf100-0xf10f] [ 0.929502] pci 0000:00:11.0: reg 0x24: [mem 0xfeb6e000-0xfeb6e3ff] [ 0.929564] pci 0000:00:11.0: PME# supported from D3hot [ 0.929799] pci 0000:00:12.0: [1022:7807] type 00 class 0x0c0310 [ 0.929817] pci 0000:00:12.0: reg 0x10: [mem 0xfeb6d000-0xfeb6dfff] [ 0.930111] pci 0000:00:12.2: [1022:7808] type 00 class 0x0c0320 [ 0.930129] pci 0000:00:12.2: reg 0x10: [mem 0xfeb6c000-0xfeb6c0ff] [ 0.930214] pci 0000:00:12.2: supports D1 D2 [ 0.930218] pci 0000:00:12.2: PME# supported from D0 D1 D2 D3hot D3cold [ 0.930442] pci 0000:00:13.0: [1022:7807] type 00 class 0x0c0310 [ 0.930460] pci 0000:00:13.0: reg 0x10: [mem 0xfeb6b000-0xfeb6bfff] [ 0.930736] pci 0000:00:13.2: [1022:7808] type 00 class 0x0c0320 [ 0.930754] pci 0000:00:13.2: reg 0x10: [mem 0xfeb6a000-0xfeb6a0ff] [ 0.930839] pci 0000:00:13.2: supports D1 D2 [ 0.930843] pci 0000:00:13.2: PME# supported from D0 D1 D2 D3hot D3cold [ 0.931067] pci 0000:00:14.0: [1022:780b] type 00 class 0x0c0500 [ 0.931302] pci 0000:00:14.2: [1022:780d] type 00 class 0x040300 [ 0.931324] pci 0000:00:14.2: reg 0x10: [mem 0xfeb60000-0xfeb63fff 64bit] [ 0.931398] pci 0000:00:14.2: PME# supported from D0 D3hot D3cold [ 0.931612] pci 0000:00:14.3: [1022:780e] type 00 class 0x060100 [ 0.931895] pci 0000:00:18.0: [1022:1530] type 00 class 0x060000 [ 0.932095] pci 0000:00:18.1: [1022:1531] type 00 class 0x060000 [ 0.932277] pci 0000:00:18.2: [1022:1532] type 00 class 0x060000 [ 0.932460] pci 0000:00:18.3: [1022:1533] type 00 class 0x060000 [ 0.932653] pci 0000:00:18.4: [1022:1534] type 00 class 0x060000 [ 0.932835] pci 0000:00:18.5: [1022:1535] type 00 class 0x060000 [ 0.933123] pci 0000:01:00.0: [1283:8892] type 01 class 0x060401 [ 0.933274] pci 0000:01:00.0: supports D1 D2 [ 0.933278] pci 0000:01:00.0: PME# supported from D0 D1 D2 D3hot D3cold [ 0.933388] pci 0000:00:02.2: PCI bridge to [bus 01-02] [ 0.933445] pci_bus 0000:02: extended config space not accessible [ 0.933572] pci 0000:01:00.0: PCI bridge to [bus 02] (subtractive decode) [ 0.933730] pci 0000:03:00.0: [10ec:8168] type 00 class 0x020000 [ 0.933755] pci 0000:03:00.0: reg 0x10: [io 0xe000-0xe0ff] [ 0.933786] pci 0000:03:00.0: reg 0x18: [mem 0xfea00000-0xfea00fff 64bit] [ 0.933806] pci 0000:03:00.0: reg 0x20: [mem 0xd0800000-0xd0803fff 64bit pref] [ 0.933931] pci 0000:03:00.0: supports D1 D2 [ 0.933935] pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold [ 0.934192] pci 0000:00:02.3: PCI bridge to [bus 03] [ 0.934201] pci 0000:00:02.3: bridge window [io 0xe000-0xefff] [ 0.934206] pci 0000:00:02.3: bridge window [mem 0xfea00000-0xfeafffff] [ 0.934214] pci 0000:00:02.3: bridge window [mem 0xd0800000-0xd08fffff 64bit pref] [ 0.936101] ACPI: PCI Interrupt Link [LNKA] (IRQs 4 5 7 10 11 14 15) *0 [ 0.936308] ACPI: PCI Interrupt Link [LNKB] (IRQs 4 5 7 10 11 14 15) *0 [ 0.936523] ACPI: PCI Interrupt Link [LNKC] (IRQs 4 5 7 10 11 14 15) *0 [ 0.936736] ACPI: PCI Interrupt Link [LNKD] (IRQs 4 5 7 10 11 14 15) *0 [ 0.936919] ACPI: PCI Interrupt Link [LNKE] (IRQs 4 5 7 10 11 14 15) *0 [ 0.937067] ACPI: PCI Interrupt Link [LNKF] (IRQs 4 5 7 10 11 14 15) *0 [ 0.937216] ACPI: PCI Interrupt Link [LNKG] (IRQs 4 5 7 10 11 14 15) *0 [ 0.937363] ACPI: PCI Interrupt Link [LNKH] (IRQs 4 5 7 10 11 14 15) *0 [ 0.937967] iommu: Default domain type: Translated [ 0.938058] pci 0000:00:01.0: vgaarb: setting as boot VGA device [ 0.938058] pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 0.938058] pci 0000:00:01.0: vgaarb: bridge control possible [ 0.938058] vgaarb: loaded [ 0.938247] EDAC MC: Ver: 3.0.0 [ 0.938433] NetLabel: Initializing [ 0.938436] NetLabel: domain hash size = 128 [ 0.938438] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 0.938486] NetLabel: unlabeled traffic allowed by default [ 0.938489] PCI: Using ACPI for IRQ routing [ 0.947121] PCI: pci_cache_line_size set to 64 bytes [ 0.947197] e820: reserve RAM buffer [mem 0x0009e800-0x0009ffff] [ 0.947201] e820: reserve RAM buffer [mem 0x9ca16000-0x9fffffff] [ 0.947205] e820: reserve RAM buffer [mem 0x9ca89000-0x9fffffff] [ 0.947209] e820: reserve RAM buffer [mem 0x9e4d2000-0x9fffffff] [ 0.947213] e820: reserve RAM buffer [mem 0x9e645000-0x9fffffff] [ 0.947216] e820: reserve RAM buffer [mem 0x9ec60000-0x9fffffff] [ 0.947220] e820: reserve RAM buffer [mem 0x9f000000-0x9fffffff] [ 0.947306] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 [ 0.947316] hpet0: 3 comparators, 32-bit 14.318180 MHz counter [ 0.950085] clocksource: Switched to clocksource tsc-early [ 0.983863] VFS: Disk quotas dquot_6.6.0 [ 0.983909] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 0.984272] AppArmor: AppArmor Filesystem Enabled [ 0.984330] pnp: PnP ACPI init [ 0.984667] system 00:00: [mem 0xe0000000-0xefffffff] has been reserved [ 0.984686] system 00:00: Plug and Play ACPI device, IDs PNP0c01 (active) [ 0.984864] system 00:01: [mem 0xa0000000-0xbfffffff] has been reserved [ 0.984878] system 00:01: Plug and Play ACPI device, IDs PNP0c02 (active) [ 0.985448] system 00:02: [io 0x0220-0x0227] has been reserved [ 0.985454] system 00:02: [io 0x0228-0x022f] has been reserved [ 0.985459] system 00:02: [io 0x0a20-0x0a2f] has been reserved [ 0.985471] system 00:02: Plug and Play ACPI device, IDs PNP0c02 (active) [ 0.986248] pnp 00:03: [dma 0 disabled] [ 0.986371] pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active) [ 0.987019] pnp 00:04: [dma 0 disabled] [ 0.987134] pnp 00:04: Plug and Play ACPI device, IDs PNP0501 (active) [ 0.987986] pnp 00:05: [dma 0 disabled] [ 0.988313] pnp 00:05: Plug and Play ACPI device, IDs PNP0400 (active) [ 0.988425] system 00:06: Plug and Play ACPI device, IDs PNP0c02 (active) [ 0.988503] pnp 00:07: Plug and Play ACPI device, IDs PNP0b00 (active) [ 0.988661] system 00:08: [io 0x04d0-0x04d1] has been reserved [ 0.988675] system 00:08: Plug and Play ACPI device, IDs PNP0c02 (active) [ 0.989467] system 00:09: [io 0x04d0-0x04d1] has been reserved [ 0.989472] system 00:09: [io 0x040b] has been reserved [ 0.989476] system 00:09: [io 0x04d6] has been reserved [ 0.989481] system 00:09: [io 0x0c00-0x0c01] has been reserved [ 0.989485] system 00:09: [io 0x0c14] has been reserved [ 0.989490] system 00:09: [io 0x0c50-0x0c51] has been reserved [ 0.989494] system 00:09: [io 0x0c52] has been reserved [ 0.989498] system 00:09: [io 0x0c6c] has been reserved [ 0.989501] system 00:09: [io 0x0c6f] has been reserved [ 0.989506] system 00:09: [io 0x0cd0-0x0cd1] has been reserved [ 0.989510] system 00:09: [io 0x0cd2-0x0cd3] has been reserved [ 0.989514] system 00:09: [io 0x0cd4-0x0cd5] has been reserved [ 0.989518] system 00:09: [io 0x0cd6-0x0cd7] has been reserved [ 0.989522] system 00:09: [io 0x0cd8-0x0cdf] has been reserved [ 0.989526] system 00:09: [io 0x0800-0x089f] has been reserved [ 0.989530] system 00:09: [io 0x0b20-0x0b3f] has been reserved [ 0.989535] system 00:09: [io 0x0900-0x090f] has been reserved [ 0.989539] system 00:09: [io 0x0910-0x091f] has been reserved [ 0.989544] system 00:09: [io 0xfe00-0xfefe] has been reserved [ 0.989550] system 00:09: [mem 0xfec00000-0xfec00fff] could not be reserved [ 0.989556] system 00:09: [mem 0xfee00000-0xfee00fff] has been reserved [ 0.989561] system 00:09: [mem 0xfed80000-0xfed8ffff] has been reserved [ 0.989566] system 00:09: [mem 0xfed61000-0xfed70fff] has been reserved [ 0.989570] system 00:09: [mem 0xfec10000-0xfec10fff] has been reserved [ 0.989576] system 00:09: [mem 0xfed00000-0xfed00fff] could not be reserved [ 0.989581] system 00:09: [mem 0xff000000-0xffffffff] has been reserved [ 0.989594] system 00:09: Plug and Play ACPI device, IDs PNP0c02 (active) [ 0.990129] pnp: PnP ACPI: found 10 devices [ 0.999666] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 0.999850] NET: Registered protocol family 2 [ 1.000248] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) [ 1.000342] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 1.000602] TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) [ 1.000757] TCP: Hash tables configured (established 32768 bind 32768) [ 1.000863] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) [ 1.000910] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) [ 1.001112] NET: Registered protocol family 1 [ 1.001132] NET: Registered protocol family 44 [ 1.001176] pci 0000:01:00.0: PCI bridge to [bus 02] [ 1.001202] pci 0000:00:02.2: PCI bridge to [bus 01-02] [ 1.001215] pci 0000:00:02.3: PCI bridge to [bus 03] [ 1.001220] pci 0000:00:02.3: bridge window [io 0xe000-0xefff] [ 1.001227] pci 0000:00:02.3: bridge window [mem 0xfea00000-0xfeafffff] [ 1.001232] pci 0000:00:02.3: bridge window [mem 0xd0800000-0xd08fffff 64bit pref] [ 1.001244] pci_bus 0000:00: resource 4 [io 0x0000-0x03af window] [ 1.001247] pci_bus 0000:00: resource 5 [io 0x03e0-0x0cf7 window] [ 1.001251] pci_bus 0000:00: resource 6 [io 0x03b0-0x03df window] [ 1.001254] pci_bus 0000:00: resource 7 [io 0x0d00-0xffff window] [ 1.001258] pci_bus 0000:00: resource 8 [mem 0x000a0000-0x000bffff window] [ 1.001261] pci_bus 0000:00: resource 9 [mem 0x000c0000-0x000dffff window] [ 1.001265] pci_bus 0000:00: resource 10 [mem 0xc0000000-0xffffffff window] [ 1.001269] pci_bus 0000:03: resource 0 [io 0xe000-0xefff] [ 1.001272] pci_bus 0000:03: resource 1 [mem 0xfea00000-0xfeafffff] [ 1.001276] pci_bus 0000:03: resource 2 [mem 0xd0800000-0xd08fffff 64bit pref] [ 1.001402] pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 1.001479] pci 0000:00:01.1: D0 power state depends on 0000:00:01.0 [ 1.033759] pci 0000:00:12.0: quirk_usb_early_handoff+0x0/0x700 took 30983 usecs [ 1.053744] pci 0000:00:12.2: quirk_usb_early_handoff+0x0/0x700 took 19500 usecs [ 1.053748] pci 0000:00:12.2: PME# does not work under D3, disabling it [ 1.085743] pci 0000:00:13.0: quirk_usb_early_handoff+0x0/0x700 took 31229 usecs [ 1.105737] pci 0000:00:13.2: quirk_usb_early_handoff+0x0/0x700 took 19508 usecs [ 1.105740] pci 0000:00:13.2: PME# does not work under D3, disabling it [ 1.105804] PCI: CLS 64 bytes, default 64 [ 1.105946] Trying to unpack rootfs image as initramfs... [ 3.637213] Freeing initrd memory: 64668K [ 3.637317] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 3.637323] software IO TLB: mapped [mem 0x0000000098a16000-0x000000009ca16000] (64MB) [ 3.637438] amd_uncore: 4 amd_nb counters detected [ 3.637447] amd_uncore: 4 amd_l2 counters detected [ 3.637615] LVT offset 0 assigned for vector 0x400 [ 3.637693] perf: AMD IBS detected (0x000000ff) [ 3.638864] Initialise system trusted keyrings [ 3.638891] Key type blacklist registered [ 3.639037] workingset: timestamp_bits=36 max_order=20 bucket_order=0 [ 3.642963] zbud: loaded [ 3.643448] integrity: Platform Keyring initialized [ 3.643454] Key type asymmetric registered [ 3.643457] Asymmetric key parser 'x509' registered [ 3.643476] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) [ 3.643575] io scheduler mq-deadline registered [ 3.644226] pcieport 0000:00:02.2: PME: Signaling with IRQ 25 [ 3.644596] pcieport 0000:00:02.3: PME: Signaling with IRQ 27 [ 3.644830] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [ 3.646059] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 3.646240] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 3.647255] 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A [ 3.648808] Linux agpgart interface v0.103 [ 3.649281] AMD-Vi: AMD IOMMUv2 driver by Joerg Roedel <jroedel@suse.de> [ 3.649284] AMD-Vi: AMD IOMMUv2 functionality not available on this system [ 3.649887] i8042: PNP: No PS/2 controller found. [ 3.650066] mousedev: PS/2 mouse device common for all mice [ 3.650141] rtc_cmos 00:07: RTC can wake from S4 [ 3.650473] rtc_cmos 00:07: registered as rtc0 [ 3.650506] rtc_cmos 00:07: setting system clock to 2021-03-11T04:16:03 UTC (1615436163) [ 3.650556] rtc_cmos 00:07: alarms up to one month, y3k, 114 bytes nvram, hpet irqs [ 3.650664] ledtrig-cpu: registered to indicate activity on CPUs [ 3.651580] NET: Registered protocol family 10 [ 3.671887] Segment Routing with IPv6 [ 3.671948] mip6: Mobile IPv6 [ 3.671954] NET: Registered protocol family 17 [ 3.672053] mpls_gso: MPLS GSO support [ 3.672060] x86/pm: family 0x16 cpu detected, MSR saving is needed during suspending. [ 3.672531] microcode: microcode updated early to new patch_level=0x0700010f [ 3.672602] microcode: CPU0: patch_level=0x0700010f [ 3.672617] microcode: CPU1: patch_level=0x0700010f [ 3.672630] microcode: CPU2: patch_level=0x0700010f [ 3.672644] microcode: CPU3: patch_level=0x0700010f [ 3.672652] microcode: Microcode Update Driver: v2.2. [ 3.672662] IPI shorthand broadcast: enabled [ 3.672681] sched_clock: Marking stable (3668875993, 3581214)->(3677852789, -5395582) [ 3.672887] registered taskstats version 1 [ 3.672894] Loading compiled-in X.509 certificates [ 3.796612] Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' [ 3.796657] Loaded X.509 cert 'Debian Secure Boot Signer 2020: 00b55eb3b9' [ 3.796732] zswap: loaded using pool lzo/zbud [ 3.797021] Key type ._fscrypt registered [ 3.797024] Key type .fscrypt registered [ 3.797026] Key type fscrypt-provisioning registered [ 3.797126] AppArmor: AppArmor sha1 policy hashing enabled [ 3.801644] Freeing unused kernel image (initmem) memory: 2388K [ 3.822025] Write protecting the kernel read-only data: 22528k [ 3.823354] Freeing unused kernel image (text/rodata gap) memory: 2040K [ 3.823766] Freeing unused kernel image (rodata/data gap) memory: 676K [ 3.904138] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 3.904155] Run /init as init process [ 3.904158] with arguments: [ 3.904160] /init [ 3.904162] splash [ 3.904164] with environment: [ 3.904166] HOME=/ [ 3.904168] TERM=linux [ 3.904170] BOOT_IMAGE=/boot/vmlinuz-5.10.0-kali3-amd64 [ 4.269499] button: module verification failed: signature and/or required key missing - tainting kernel [ 4.270661] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 [ 4.271051] ACPI: Video Device [VGA] (multi-head: yes rom: no post: no) [ 4.271669] acpi device:01: registered as cooling_device4 [ 4.271806] input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input1 [ 4.289846] ACPI: Power Button [PWRB] [ 4.290116] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 [ 4.290275] ACPI: Power Button [PWRF] [ 4.295992] piix4_smbus 0000:00:14.0: SMBus Host Controller at 0xb00, revision 0 [ 4.296000] piix4_smbus 0000:00:14.0: Using register 0x02 for SMBus port selection [ 4.296165] piix4_smbus 0000:00:14.0: Auxiliary SMBus Host Controller at 0xb20 [ 4.315797] ACPI: bus type USB registered [ 4.315871] usbcore: registered new interface driver usbfs [ 4.315898] usbcore: registered new interface driver hub [ 4.315939] usbcore: registered new device driver usb [ 4.318530] cryptd: max_cpu_qlen set to 1000 [ 4.318929] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 4.319465] ehci-pci: EHCI PCI platform driver [ 4.319859] ehci-pci 0000:00:12.2: EHCI Host Controller [ 4.319883] ehci-pci 0000:00:12.2: new USB bus registered, assigned bus number 1 [ 4.319900] ehci-pci 0000:00:12.2: applying AMD SB700/SB800/Hudson-2/3 EHCI dummy qh workaround [ 4.319912] ehci-pci 0000:00:12.2: debug port 1 [ 4.320016] ehci-pci 0000:00:12.2: irq 17, io mem 0xfeb6c000 [ 4.322114] AVX version of gcm_enc/dec engaged. [ 4.322119] AES CTR mode by8 optimization enabled [ 4.323197] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 4.330558] SCSI subsystem initialized [ 4.334077] ehci-pci 0000:00:12.2: USB 2.0 started, EHCI 1.00 [ 4.334295] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10 [ 4.334301] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.334304] usb usb1: Product: EHCI Host Controller [ 4.334308] usb usb1: Manufacturer: Linux 5.10.0-kali3-amd64 ehci_hcd [ 4.334311] usb usb1: SerialNumber: 0000:00:12.2 [ 4.334650] hub 1-0:1.0: USB hub found [ 4.334678] hub 1-0:1.0: 4 ports detected [ 4.335415] ehci-pci 0000:00:13.2: EHCI Host Controller [ 4.335430] ehci-pci 0000:00:13.2: new USB bus registered, assigned bus number 2 [ 4.335441] ehci-pci 0000:00:13.2: applying AMD SB700/SB800/Hudson-2/3 EHCI dummy qh workaround [ 4.335452] ehci-pci 0000:00:13.2: debug port 1 [ 4.335525] ehci-pci 0000:00:13.2: irq 17, io mem 0xfeb6a000 [ 4.341581] libata version 3.00 loaded. [ 4.345467] ahci 0000:00:11.0: version 3.0 [ 4.346112] ahci 0000:00:11.0: AHCI 0001.0300 32 slots 2 ports 6 Gbps 0x3 impl SATA mode [ 4.346125] ahci 0000:00:11.0: flags: 64bit ncq sntf ilck pm led clo pmp pio slum part [ 4.347207] scsi host0: ahci [ 4.350832] ehci-pci 0000:00:13.2: USB 2.0 started, EHCI 1.00 [ 4.351170] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10 [ 4.351176] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.351180] usb usb2: Product: EHCI Host Controller [ 4.351183] usb usb2: Manufacturer: Linux 5.10.0-kali3-amd64 ehci_hcd [ 4.351186] usb usb2: SerialNumber: 0000:00:13.2 [ 4.351561] hub 2-0:1.0: USB hub found [ 4.351588] hub 2-0:1.0: 4 ports detected [ 4.352010] xhci_hcd 0000:00:10.0: xHCI Host Controller [ 4.352033] xhci_hcd 0000:00:10.0: new USB bus registered, assigned bus number 3 [ 4.352243] xhci_hcd 0000:00:10.0: hcc params 0x014040c3 hci version 0x100 quirks 0x0000000000000410 [ 4.352805] ohci-pci: OHCI PCI platform driver [ 4.353027] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10 [ 4.353032] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.353036] usb usb3: Product: xHCI Host Controller [ 4.353039] usb usb3: Manufacturer: Linux 5.10.0-kali3-amd64 xhci-hcd [ 4.353042] usb usb3: SerialNumber: 0000:00:10.0 [ 4.353078] ohci-pci 0000:00:12.0: OHCI PCI host controller [ 4.353493] hub 3-0:1.0: USB hub found [ 4.353524] hub 3-0:1.0: 2 ports detected [ 4.353848] ohci-pci 0000:00:12.0: new USB bus registered, assigned bus number 4 [ 4.353924] ohci-pci 0000:00:12.0: irq 18, io mem 0xfeb6d000 [ 4.353928] xhci_hcd 0000:00:10.0: xHCI Host Controller [ 4.353938] xhci_hcd 0000:00:10.0: new USB bus registered, assigned bus number 5 [ 4.353946] xhci_hcd 0000:00:10.0: Host supports USB 3.0 SuperSpeed [ 4.355671] usb usb5: We don't know the algorithms for LPM for this host, disabling LPM. [ 4.355788] usb usb5: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.10 [ 4.355792] usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.355795] usb usb5: Product: xHCI Host Controller [ 4.355798] usb usb5: Manufacturer: Linux 5.10.0-kali3-amd64 xhci-hcd [ 4.355801] usb usb5: SerialNumber: 0000:00:10.0 [ 4.356294] hub 5-0:1.0: USB hub found [ 4.356330] hub 5-0:1.0: 2 ports detected [ 4.356944] scsi host1: ahci [ 4.357133] ata1: SATA max UDMA/133 abar m1024@0xfeb6e000 port 0xfeb6e100 irq 30 [ 4.357139] ata2: SATA max UDMA/133 abar m1024@0xfeb6e000 port 0xfeb6e180 irq 30 [ 4.360981] libphy: r8169: probed [ 4.361437] r8169 0000:03:00.0 eth0: RTL8168g/8111g, e0:d5:5e:26:0a:02, XID 4c0, IRQ 29 [ 4.361442] r8169 0000:03:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] [ 4.384388] [drm] radeon kernel modesetting enabled. [ 4.384497] radeon 0000:00:01.0: vgaarb: deactivate vga console [ 4.385517] Console: switching to colour dummy device 80x25 [ 4.386237] [drm] initializing kernel modesetting (KABINI 0x1002:0x9836 0x1458:0xD000 0x00). [ 4.386278] [drm] doorbell mmio base: 0xD0000000 [ 4.386280] [drm] doorbell mmio size: 8388608 [ 4.386372] ATOM BIOS: AMD [ 4.386454] radeon 0000:00:01.0: VRAM: 512M 0x0000000000000000 - 0x000000001FFFFFFF (512M used) [ 4.386459] radeon 0000:00:01.0: GTT: 2048M 0x0000000020000000 - 0x000000009FFFFFFF [ 4.386467] [drm] Detected VRAM RAM=512M, BAR=256M [ 4.386469] [drm] RAM width 128bits DDR [ 4.386605] [TTM] Zone kernel: Available graphics memory: 1729122 KiB [ 4.386608] [TTM] Initializing pool allocator [ 4.386621] [TTM] Initializing DMA pool allocator [ 4.386666] [drm] radeon: 512M of VRAM memory ready [ 4.386669] [drm] radeon: 2048M of GTT memory ready. [ 4.386690] [drm] Loading kabini Microcode [ 4.386777] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_pfp.bin [ 4.386836] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_me.bin [ 4.386893] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_ce.bin [ 4.386968] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_mec.bin [ 4.387023] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_rlc.bin [ 4.387076] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/kabini_sdma.bin [ 4.387084] [drm] Internal thermal controller without fan control [ 4.388477] [drm] radeon: dpm initialized [ 4.388724] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/bonaire_uvd.bin [ 4.388734] [drm] Found UVD firmware Version: 1.64 Family ID: 9 [ 4.388908] radeon 0000:00:01.0: firmware: direct-loading firmware radeon/BONAIRE_vce.bin [ 4.391966] [drm] Found VCE firmware/feedback version 40.2.2 / 15! [ 4.392006] [drm] GART: num cpu pages 524288, num gpu pages 524288 [ 4.418177] usb usb4: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.10 [ 4.418186] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.418189] usb usb4: Product: OHCI PCI host controller [ 4.418193] usb usb4: Manufacturer: Linux 5.10.0-kali3-amd64 ohci_hcd [ 4.418196] usb usb4: SerialNumber: 0000:00:12.0 [ 4.418558] hub 4-0:1.0: USB hub found [ 4.418584] hub 4-0:1.0: 4 ports detected [ 4.419321] ohci-pci 0000:00:13.0: OHCI PCI host controller [ 4.419343] ohci-pci 0000:00:13.0: new USB bus registered, assigned bus number 6 [ 4.419398] ohci-pci 0000:00:13.0: irq 18, io mem 0xfeb6b000 [ 4.438555] [drm] PCIE GART of 2048M enabled (table at 0x000000000030E000). [ 4.438764] radeon 0000:00:01.0: WB enabled [ 4.438802] radeon 0000:00:01.0: fence driver on ring 0 use gpu addr 0x0000000020000c00 [ 4.438807] radeon 0000:00:01.0: fence driver on ring 1 use gpu addr 0x0000000020000c04 [ 4.438811] radeon 0000:00:01.0: fence driver on ring 2 use gpu addr 0x0000000020000c08 [ 4.438814] radeon 0000:00:01.0: fence driver on ring 3 use gpu addr 0x0000000020000c0c [ 4.438818] radeon 0000:00:01.0: fence driver on ring 4 use gpu addr 0x0000000020000c10 [ 4.439705] radeon 0000:00:01.0: fence driver on ring 5 use gpu addr 0x0000000000078d30 [ 4.440048] radeon 0000:00:01.0: fence driver on ring 6 use gpu addr 0x0000000020000c18 [ 4.440052] radeon 0000:00:01.0: fence driver on ring 7 use gpu addr 0x0000000020000c1c [ 4.440368] radeon 0000:00:01.0: radeon: using MSI. [ 4.440416] [drm] radeon: irq initialized. [ 4.445536] [drm] ring test on 0 succeeded in 2 usecs [ 4.445634] [drm] ring test on 1 succeeded in 3 usecs [ 4.445661] [drm] ring test on 2 succeeded in 3 usecs [ 4.445910] [drm] ring test on 3 succeeded in 4 usecs [ 4.445920] [drm] ring test on 4 succeeded in 4 usecs [ 4.482146] usb usb6: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.10 [ 4.482151] usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 4.482154] usb usb6: Product: OHCI PCI host controller [ 4.482158] usb usb6: Manufacturer: Linux 5.10.0-kali3-amd64 ohci_hcd [ 4.482161] usb usb6: SerialNumber: 0000:00:13.0 [ 4.482491] hub 6-0:1.0: USB hub found [ 4.482524] hub 6-0:1.0: 4 ports detected [ 4.491875] [drm] ring test on 5 succeeded in 1 usecs [ 4.511757] [drm] UVD initialized successfully. [ 4.621026] [drm] ring test on 6 succeeded in 16 usecs [ 4.621040] [drm] ring test on 7 succeeded in 3 usecs [ 4.621041] [drm] VCE initialized successfully. [ 4.622757] [drm] ib test on ring 0 succeeded in 0 usecs [ 4.622921] [drm] ib test on ring 1 succeeded in 0 usecs [ 4.623081] [drm] ib test on ring 2 succeeded in 0 usecs [ 4.623244] [drm] ib test on ring 3 succeeded in 0 usecs [ 4.623404] [drm] ib test on ring 4 succeeded in 0 usecs [ 4.650059] tsc: Refined TSC clocksource calibration: 1297.566 MHz [ 4.650069] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x12b422bd00e, max_idle_ns: 440795235945 ns [ 4.650104] clocksource: Switched to clocksource tsc [ 4.746033] usb 2-1: new high-speed USB device number 2 using ehci-pci [ 4.834044] ata1: SATA link up 3.0 Gbps (SStatus 123 SControl 300) [ 4.838046] ata2: SATA link up 3.0 Gbps (SStatus 123 SControl 300) [ 4.838399] ata2.00: ATA-8: TOSHIBA MK3276GSX, GS001C, max UDMA/100 [ 4.838404] ata2.00: 625142448 sectors, multi 16: LBA48 NCQ (depth 32), AA [ 4.838804] ata2.00: configured for UDMA/100 [ 4.840392] ata1.00: HPA detected: current 1953523055, native 1953525168 [ 4.840470] ata1.00: ATA-7: SAMSUNG HD103UJ, 1AA01113, max UDMA7 [ 4.840475] ata1.00: 1953523055 sectors, multi 16: LBA48 NCQ (depth 32), AA [ 4.846942] ata1.00: configured for UDMA/133 [ 4.847222] scsi 0:0:0:0: Direct-Access ATA SAMSUNG HD103UJ 1113 PQ: 0 ANSI: 5 [ 4.847929] scsi 1:0:0:0: Direct-Access ATA TOSHIBA MK3276GS 1C PQ: 0 ANSI: 5 [ 4.855748] sd 1:0:0:0: [sdb] 625142448 512-byte logical blocks: (320 GB/298 GiB) [ 4.855751] sd 0:0:0:0: [sda] 1953523055 512-byte logical blocks: (1.00 TB/932 GiB) [ 4.855789] sd 0:0:0:0: [sda] Write Protect is off [ 4.855794] sd 1:0:0:0: [sdb] Write Protect is off [ 4.855796] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 [ 4.855801] sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 [ 4.855857] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 4.855863] sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA [ 4.877960] sd 0:0:0:0: [sda] Attached SCSI disk [ 4.916719] usb 2-1: New USB device found, idVendor=148f, idProduct=7601, bcdDevice= 0.00 [ 4.916724] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4.916728] usb 2-1: Product: 802.11 n WLAN [ 4.916731] usb 2-1: Manufacturer: MediaTek [ 4.916734] usb 2-1: SerialNumber: 1.0 [ 4.972466] sdb: sdb1 sdb2 < sdb5 > [ 4.973481] sd 1:0:0:0: [sdb] Attached SCSI disk [ 5.010053] usb 4-3: new low-speed USB device number 2 using ohci-pci [ 5.162130] [drm] ib test on ring 5 succeeded [ 5.184383] [drm] ib test on ring 6 succeeded [ 5.185852] [drm] ib test on ring 7 succeeded [ 5.186809] [drm] Radeon Display Connectors [ 5.186812] [drm] Connector 0: [ 5.186814] [drm] HDMI-A-1 [ 5.186816] [drm] HPD1 [ 5.186820] [drm] DDC: 0x6530 0x6530 0x6534 0x6534 0x6538 0x6538 0x653c 0x653c [ 5.186822] [drm] Encoders: [ 5.186824] [drm] DFP1: INTERNAL_UNIPHY [ 5.186826] [drm] Connector 1: [ 5.186827] [drm] DVI-D-1 [ 5.186829] [drm] HPD2 [ 5.186832] [drm] DDC: 0x6540 0x6540 0x6544 0x6544 0x6548 0x6548 0x654c 0x654c [ 5.186833] [drm] Encoders: [ 5.186835] [drm] DFP2: INTERNAL_UNIPHY [ 5.186837] [drm] Connector 2: [ 5.186838] [drm] VGA-1 [ 5.186842] [drm] DDC: 0x65c0 0x65c0 0x65c4 0x65c4 0x65c8 0x65c8 0x65cc 0x65cc [ 5.186843] [drm] Encoders: [ 5.186845] [drm] CRT1: INTERNAL_KLDSCP_DAC1 [ 5.224067] usb 4-3: New USB device found, idVendor=1a2c, idProduct=4094, bcdDevice= 1.10 [ 5.224076] usb 4-3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [ 5.224080] usb 4-3: Product: USB Keyboard [ 5.224083] usb 4-3: Manufacturer: SEMICO [ 5.231562] hid: raw HID events driver (C) Jiri Kosina [ 5.243400] usbcore: registered new interface driver usbhid [ 5.243404] usbhid: USB HID core driver [ 5.246826] input: SEMICO USB Keyboard as /devices/pci0000:00/0000:00:12.0/usb4/4-3/4-3:1.0/0003:1A2C:4094.0001/input/input3 [ 5.306371] hid-generic 0003:1A2C:4094.0001: input,hidraw0: USB HID v1.10 Keyboard [SEMICO USB Keyboard] on usb-0000:00:12.0-3/input0 [ 5.306966] input: SEMICO USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:12.0/usb4/4-3/4-3:1.1/0003:1A2C:4094.0002/input/input4 [ 5.353260] [drm] fb mappable at 0xC0731000 [ 5.353265] [drm] vram apper at 0xC0000000 [ 5.353267] [drm] size 5767168 [ 5.353269] [drm] fb depth is 24 [ 5.353271] [drm] pitch is 5632 [ 5.353447] fbcon: radeondrmfb (fb0) is primary device [ 5.366154] input: SEMICO USB Keyboard System Control as /devices/pci0000:00/0000:00:12.0/usb4/4-3/4-3:1.1/0003:1A2C:4094.0002/input/input5 [ 5.366268] hid-generic 0003:1A2C:4094.0002: input,hidraw1: USB HID v1.10 Device [SEMICO USB Keyboard] on usb-0000:00:12.0-3/input1 [ 5.462114] Console: switching to colour frame buffer device 160x48 [ 5.469523] radeon 0000:00:01.0: [drm] fb0: radeondrmfb frame buffer device [ 5.490630] [drm] Initialized radeon 2.50.0 20080528 for 0000:00:01.0 on minor 0 [ 5.656424] [drm] amdgpu kernel modesetting enabled. [ 5.656634] amdgpu: Ignoring ACPI CRAT on non-APU system [ 5.656642] Virtual CRAT table created for CPU [ 5.656675] amdgpu: Topology: Add CPU node [ 5.682064] usb 4-4: new low-speed USB device number 3 using ohci-pci [ 5.876071] usb 4-4: New USB device found, idVendor=04f3, idProduct=0235, bcdDevice=24.58 [ 5.876080] usb 4-4: New USB device strings: Mfr=0, Product=2, SerialNumber=0 [ 5.876084] usb 4-4: Product: OM [ 5.883799] input: OM as /devices/pci0000:00/0000:00:12.0/usb4/4-4/4-4:1.0/0003:04F3:0235.0003/input/input6 [ 5.883993] hid-generic 0003:04F3:0235.0003: input,hidraw2: USB HID v1.11 Mouse [OM] on usb-0000:00:12.0-4/input0 [ 6.067045] random: fast init done [ 6.070874] PM: Image not found (code -22) [ 10.466968] random: crng init done [ 19.388949] EXT4-fs (sdb1): mounted filesystem with ordered data mode. Opts: (null) [ 19.865541] Not activating Mandatory Access Control as /sbin/tomoyo-init does not exist. [ 21.657980] systemd[1]: Inserted module 'autofs4' [ 21.965219] systemd[1]: systemd 247.3-1 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 +ZSTD +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 default-hierarchy=unified) [ 21.982138] systemd[1]: Detected architecture x86-64. [ 22.000918] systemd[1]: Set hostname to <dima-E3800N>. [ 22.310556] systemd-sysv-generator[286]: SysV service '/etc/init.d/gdomap' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.387572] systemd-sysv-generator[286]: SysV service '/etc/init.d/inetsim' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.387709] systemd-sysv-generator[286]: SysV service '/etc/init.d/inetutils-inetd' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.688816] systemd-sysv-generator[286]: SysV service '/etc/init.d/xl2tpd' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.689155] systemd-sysv-generator[286]: SysV service '/etc/init.d/ptunnel' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.730648] systemd-sysv-generator[286]: SysV service '/etc/init.d/thin' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.745664] systemd-sysv-generator[286]: SysV service '/etc/init.d/atftpd' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.777737] systemd-sysv-generator[286]: SysV service '/etc/init.d/rwhod' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.780642] systemd-sysv-generator[286]: SysV service '/etc/init.d/darkstat' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.780763] systemd-sysv-generator[286]: SysV service '/etc/init.d/stunnel4' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.782159] systemd-sysv-generator[286]: SysV service '/etc/init.d/dns2tcp' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 22.783096] systemd-sysv-generator[286]: SysV service '/etc/init.d/mysql' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. [ 24.112606] systemd[1]: /lib/systemd/system/plymouth-start.service:16: Unit configured to use KillMode=none. This is unsafe, as it disables systemd's process lifecycle management for the service. Please update your service to use a safer KillMode=, such as 'mixed' or 'control-group'. Support for KillMode=none is deprecated and will eventually be removed. [ 24.609330] systemd[1]: Queued start job for default target Graphical Interface. [ 24.612409] systemd[1]: Created slice system-getty.slice. [ 24.613362] systemd[1]: Created slice system-modprobe.slice. [ 24.614135] systemd[1]: Created slice User and Session Slice. [ 24.614433] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [ 24.614924] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [ 24.615121] systemd[1]: Reached target Slices. [ 24.615197] systemd[1]: Reached target TLS tunnels for network services - per-config-file target. [ 24.651432] systemd[1]: Listening on Syslog Socket. [ 24.651716] systemd[1]: Listening on fsck to fsckd communication Socket. [ 24.651876] systemd[1]: Listening on initctl Compatibility Named Pipe. [ 24.652302] systemd[1]: Listening on Journal Audit Socket. [ 24.652577] systemd[1]: Listening on Journal Socket (/dev/log). [ 24.652923] systemd[1]: Listening on Journal Socket. [ 24.653305] systemd[1]: Listening on udev Control Socket. [ 24.653598] systemd[1]: Listening on udev Kernel Socket. [ 24.655792] systemd[1]: Mounting Huge Pages File System... [ 24.658135] systemd[1]: Mounting POSIX Message Queue File System... [ 24.660444] systemd[1]: Mounting RPC Pipe File System... [ 24.662929] systemd[1]: Mounting Kernel Debug File System... [ 24.665413] systemd[1]: Mounting Kernel Trace File System... [ 24.665669] systemd[1]: Condition check resulted in Kernel Module supporting RPCSEC_GSS being skipped. [ 24.678644] systemd[1]: Starting Set the console keyboard layout... [ 24.681102] systemd[1]: Starting Create list of static device nodes for the current kernel... [ 24.683600] systemd[1]: Starting Load Kernel Module configfs... [ 24.686374] systemd[1]: Starting Load Kernel Module drm... [ 24.689006] systemd[1]: Starting Load Kernel Module fuse... [ 24.783563] fuse: init (API version 7.32) [ 24.817178] systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. [ 24.817320] systemd[1]: Condition check resulted in File System Check on Root Device being skipped. [ 24.821605] systemd[1]: Starting Journal Service... [ 24.825468] systemd[1]: Starting Load Kernel Modules... [ 24.828095] systemd[1]: Starting Remount Root and Kernel File Systems... [ 24.830595] systemd[1]: Starting Coldplug All udev Devices... [ 24.836426] systemd[1]: Mounted Huge Pages File System. [ 24.836819] systemd[1]: Mounted POSIX Message Queue File System. [ 24.837121] systemd[1]: Mounted Kernel Debug File System. [ 24.837436] systemd[1]: Mounted Kernel Trace File System. [ 24.838356] systemd[1]: Finished Create list of static device nodes for the current kernel. [ 24.839248] systemd[1]: modprobe@configfs.service: Succeeded. [ 24.839827] systemd[1]: Finished Load Kernel Module configfs. [ 24.840567] systemd[1]: modprobe@drm.service: Succeeded. [ 24.841103] systemd[1]: Finished Load Kernel Module drm. [ 24.841820] systemd[1]: modprobe@fuse.service: Succeeded. [ 24.842422] systemd[1]: Finished Load Kernel Module fuse. [ 24.845155] systemd[1]: Mounting FUSE Control File System... [ 24.847688] systemd[1]: Mounting Kernel Configuration File System... [ 24.852424] systemd[1]: Mounted FUSE Control File System. [ 24.857843] systemd[1]: Mounted Kernel Configuration File System. [ 24.909648] systemd[1]: Finished Load Kernel Modules. [ 24.912067] systemd[1]: Starting Apply Kernel Variables... [ 24.938725] EXT4-fs (sdb1): re-mounted. Opts: errors=remount-ro [ 24.942860] systemd[1]: Finished Remount Root and Kernel File Systems. [ 25.095556] systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped. [ 25.095763] systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. [ 25.098106] systemd[1]: Starting Load/Save Random Seed... [ 25.100520] systemd[1]: Starting Create System Users... [ 25.124237] RPC: Registered named UNIX socket transport module. [ 25.124242] RPC: Registered udp transport module. [ 25.124244] RPC: Registered tcp transport module. [ 25.124246] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 25.127479] systemd[1]: Mounted RPC Pipe File System. [ 25.231682] systemd[1]: Started Journal Service. [ 25.380418] systemd-journald[304]: Received client request to flush runtime journal. [ 25.980906] systemd-journald[304]: File /var/log/journal/bd90d72a57d74bd0833845c457b672b1/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 28.862196] acpi_cpufreq: overriding BIOS provided _PSD data [ 29.070917] sp5100_tco: SP5100/SB800 TCO WatchDog Timer Driver [ 29.071133] sp5100-tco sp5100-tco: Using 0xfed80b00 for watchdog MMIO address [ 29.071361] sp5100-tco sp5100-tco: initialized. heartbeat=60 sec (nowayout=0) [ 29.309033] sd 0:0:0:0: Attached scsi generic sg0 type 0 [ 29.309152] sd 1:0:0:0: Attached scsi generic sg1 type 0 [ 29.350803] input: PC Speaker as /devices/platform/pcspkr/input/input7 [ 29.391481] parport_pc 00:05: reported by Plug and Play ACPI [ 29.391584] parport0: PC-style at 0x378, irq 5 [PCSPP,TRISTATE] [ 29.867402] ppdev: user-space parallel port driver [ 30.022465] kvm: Nested Virtualization enabled [ 30.022477] SVM: kvm: Nested Paging enabled [ 30.252153] MCE: In-kernel MCE decoding enabled. [ 30.330283] EDAC amd64: F16h detected (node 0). [ 30.330359] EDAC amd64: Node 0: DRAM ECC disabled. [ 30.376009] EDAC amd64: F16h detected (node 0). [ 30.376082] EDAC amd64: Node 0: DRAM ECC disabled. [ 30.415499] EDAC amd64: F16h detected (node 0). [ 30.415571] EDAC amd64: Node 0: DRAM ECC disabled. [ 30.451462] EDAC amd64: F16h detected (node 0). [ 30.451536] EDAC amd64: Node 0: DRAM ECC disabled. [ 30.536862] cfg80211: Loading compiled-in X.509 certificates for regulatory database [ 30.538187] cfg80211: Loaded X.509 cert 'benh@debian.org: 577e021cb980e0e820821ba7b54b4961b8b4fadf' [ 30.539409] cfg80211: Loaded X.509 cert 'romain.perier@gmail.com: 3abbc6ec146e09d1b6016ab9d6cf71dd233f0328' [ 30.540596] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' [ 30.930127] platform regulatory.0: firmware: direct-loading firmware regulatory.db [ 31.230282] platform regulatory.0: firmware: direct-loading firmware regulatory.db.p7s [ 31.257104] snd_hda_intel 0000:00:01.1: Force to non-snoop mode [ 31.284419] input: HDA ATI HDMI HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.1/sound/card0/input8 [ 31.284925] snd_hda_intel 0000:00:01.1: device 1458:a002 is on the power_save denylist, forcing power_save to 0 [ 31.398061] usb 2-1: reset high-speed USB device number 2 using ehci-pci [ 31.484105] snd_hda_codec_realtek hdaudioC1D0: autoconfig for ALC887-VD: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line [ 31.484119] snd_hda_codec_realtek hdaudioC1D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) [ 31.484126] snd_hda_codec_realtek hdaudioC1D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) [ 31.484131] snd_hda_codec_realtek hdaudioC1D0: mono: mono_out=0x0 [ 31.484137] snd_hda_codec_realtek hdaudioC1D0: dig-out=0x11/0x0 [ 31.484141] snd_hda_codec_realtek hdaudioC1D0: inputs: [ 31.484148] snd_hda_codec_realtek hdaudioC1D0: Rear Mic=0x18 [ 31.484154] snd_hda_codec_realtek hdaudioC1D0: Front Mic=0x19 [ 31.484160] snd_hda_codec_realtek hdaudioC1D0: Line=0x1a [ 31.484165] snd_hda_codec_realtek hdaudioC1D0: CD=0x1c [ 31.516774] input: HDA Digital PCBeep as /devices/pci0000:00/0000:00:14.2/sound/card1/input9 [ 31.517045] input: HD-Audio Generic Rear Mic as /devices/pci0000:00/0000:00:14.2/sound/card1/input10 [ 31.517286] input: HD-Audio Generic Front Mic as /devices/pci0000:00/0000:00:14.2/sound/card1/input11 [ 31.517531] input: HD-Audio Generic Line as /devices/pci0000:00/0000:00:14.2/sound/card1/input12 [ 31.517765] input: HD-Audio Generic Line Out as /devices/pci0000:00/0000:00:14.2/sound/card1/input13 [ 31.518174] snd_hda_intel 0000:00:14.2: device 1458:a002 is on the power_save denylist, forcing power_save to 0 [ 31.568939] mt7601u 2-1:1.0: ASIC revision: 76010001 MAC revision: 76010500 [ 31.620682] mt7601u 2-1:1.0: EEPROM ver:0c fae:00 [ 31.861213] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht' [ 31.862589] usbcore: registered new interface driver mt7601u [ 32.146059] Adding 999420k swap on /dev/sdb5. Priority:-2 extents:1 across:999420k FS [ 41.398081] r8169 0000:03:00.0: firmware: direct-loading firmware rtl_nic/rtl8168g-2.fw [ 41.426075] Generic FE-GE Realtek PHY r8169-300:00: attached PHY driver [Generic FE-GE Realtek PHY] (mii_bus:phy_addr=r8169-300:00, irq=IGNORE) [ 41.626178] r8169 0000:03:00.0 eth0: Link is Down [ 44.458005] r8169 0000:03:00.0 eth0: Link is Up - 1Gbps/Full - flow control rx/tx [ 44.458060] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 1221.277297] r8169 0000:03:00.0 eth0: Link is Down [ 1224.319318] r8169 0000:03:00.0 eth0: Link is Up - 1Gbps/Full - flow control rx/tx [ 1227.847318] r8169 0000:03:00.0 eth0: Link is Down [ 1230.831694] r8169 0000:03:00.0 eth0: Link is Up - 1Gbps/Full - flow control rx/tx [ 5796.546115] perf: interrupt took too long (2516 > 2500), lowering kernel.perf_event_max_sample_rate to 79250 [ 9416.456952] perf: interrupt took too long (3146 > 3145), lowering kernel.perf_event_max_sample_rate to 63500 [50120.021361] device-mapper: uevent: version 1.0.3 [50120.021766] device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com [134712.284793] perf: interrupt took too long (3954 > 3932), lowering kernel.perf_event_max_sample_rate to 50500 [301728.062617] radeon 0000:00:01.0: IH ring buffer overflow (0x00000010, 0x00000000, 0x00000020) [426622.206565] usb 6-2: new full-speed USB device number 2 using ohci-pci [426622.410179] usb 6-2: New USB device found, idVendor=0a5c, idProduct=2101, bcdDevice= 1.12 [426622.410190] usb 6-2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [426622.410196] usb 6-2: Product: BCM2045A [426622.410201] usb 6-2: Manufacturer: Broadcom Corp [426622.410207] usb 6-2: SerialNumber: 00027212AB4F [426624.855033] alg: No test for fips(ansi_cprng) (fips_ansi_cprng) [426625.322603] Bluetooth: Core ver 2.22 [426625.322734] NET: Registered protocol family 31 [426625.322739] Bluetooth: HCI device and connection manager initialized [426625.322754] Bluetooth: HCI socket layer initialized [426625.322764] Bluetooth: L2CAP socket layer initialized [426625.322784] Bluetooth: SCO socket layer initialized [426625.390264] usbcore: registered new interface driver btusb |
(0014354)
john285 2021-03-16 06:43 |
hcitool dev Devices: |
(0014355)
john285 2021-03-16 07:17 |
/etc/init.d/bluetooth start Starting bluetooth (via systemctl): bluetooth.service. ┌──(root�dima-E3800N)-[/home/dima] └─# hcitool dev Devices: hci0 00:02:72:12:AB:4F |
(0014356)
john285 2021-03-16 07:19 |
/etc/init.d/bluetooth status -l ● bluetooth.service - Bluetooth service Loaded: loaded (/lib/systemd/system/bluetooth.service; disabled; vendor preset: disabled) Active: active (running) since Tue 2021-03-16 13:16:43 +06; 2min 22s ago Docs: man:bluetoothd(8) Main PID: 366724 (bluetoothd) Status: "Running" Tasks: 1 (limit: 3970) Memory: 3.5M CPU: 94ms CGroup: /system.slice/bluetooth.service └─366724 /usr/libexec/bluetooth/bluetoothd мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEMaxConnectionInterval” in group “Controller” мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEConnectionLatency” in group “Controller” мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEConnectionSupervisionTimeout” in gr…“Controller” мар 16 13:16:43 dima-E3800N bluetoothd[366724]: src/main.c:parse_controller_config() Key file does not have key “LEAutoconnecttimeout” in group “Controller” мар 16 13:16:43 dima-E3800N bluetoothd[366724]: Starting SDP server мар 16 13:16:44 dima-E3800N bluetoothd[366724]: Bluetooth management interface 1.18 initialized мар 16 13:16:44 dima-E3800N bluetoothd[366724]: profiles/sap/server.c:sap_server_register() Sap driver initialization failed. мар 16 13:16:44 dima-E3800N bluetoothd[366724]: sap-server: Operation not permitted (1) мар 16 13:16:45 dima-E3800N bluetoothd[366724]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSink/sbc мар 16 13:16:45 dima-E3800N bluetoothd[366724]: Endpoint registered: sender=:1.29 path=/MediaEndpoint/A2DPSource/sbc |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7099 | [Kali Linux] Feature Requests | tweak | always | 2021-03-15 10:40 | 2021-03-15 10:40 |
Reporter: | awesome.juanr155 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | none | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | SESSION HIJACKING. | ||||
Description: |
VULNERABILITY NAME: SESSION HIJACKING. VULNERABILITY URL: https://bugs.kali.org/ DESCRIPTION: In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. |
||||
Steps To Reproduce: |
STEPS TO REPRODUCED: 1) Log in to your account 2) Copy your cookies 3) Logout 4) Clear browser cookies 5) Paste the cookies (copied in step 2) 6) Refresh the page 7) Now you will be logged into the account |
||||
Additional Information: |
The Patch: Cookies should expire after the logout and previous cookies should not be used for logging into the account, they should expire! IMPACT: The malicious attacker can enter the server and access its information without having to hack a registered account. In addition, he can also make modifications on the server to help him hack it in the future or to simplify a data-stealing operation. |
||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7089 | [Kali Linux] Feature Requests | minor | have not tried | 2021-03-12 16:35 | 2021-03-13 11:10 |
Reporter: | lome | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | cd | ||||
Description: | Failed to execute terminal emulator | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014341)
kali-bugreport 2021-03-13 11:10 |
Do you think that this issue contains enough information? (Hint: It doesn't :-)) See e.g. https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/ what info is required / should be provided for the Kali team. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7081 | [Kali Linux] General Bug | major | always | 2021-03-07 16:45 | 2021-03-13 09:03 |
Reporter: | untruesyrup | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | cannot do new install with manual partitions | ||||
Description: |
trying a new install of 2021.1 and cant. install simply says "xfs filesystem creation failed" for every logical volume. tried multiple times with no success. verified i can write to the directory on host, and that i did not overallocate space with no change |
||||
Steps To Reproduce: |
- attempt to install - manually partition - observer error |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014317)
wiringmarigold 2021-03-12 20:06 |
same issue here |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7092 | [Kali Linux] New Tool Requests | minor | N/A | 2021-03-12 18:13 | 2021-03-12 18:13 |
Reporter: | etc5had0w | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | dbrute : dbrute is a powerful tool made with python3. It is mainly used for Sub-Directory Brute Forcing. | ||||
Description: |
Name : dbrute Version: 1.0 Homepage: https://github.com/etc5had0w/dbrute Download: https://github.com/etc5had0w/dbrute.git Author: Himanshu Shukla Packaged: No Licence: MIT Licence Description: dbrute supports custom extensions search, custom headers, time delays, Splitting wordlist into parts & Parallel Processing. The Unique Feature of dbrute is it can split any given wordlist into a specific number of parts and then use all those parts to launch parallel processes for each part. This will increase the efficiency of the attack by a high amount. Dependencies: python 3.7 Similar Tools: dirb, Gobuster, dirbuster, dirsearch Activity: Project Started on 12 March 2021 and is now completed. How to install: paste all these commands one by one to install the tool - git clone https://github.com/etc5had0w/dbrute.git cd dbrute/ ln -s ${PWD}/dbrute.py /usr/bin/dbrute How to use: Here is the full usage guide for dbrute : run these commands from your terminal to view the help page: $dbrute -h usage: dbrute [-h] -u URL -w WORDLIST [-x EXTENSIONS] [-s SPLIT] [-t TIMEDELAY] [-he [HEADERS ...]] optional arguments: -h, --help show this help message and exit -x EXTENSIONS, --extensions EXTENSIONS File Extensions to search for. -s SPLIT, --split SPLIT Split wordlist into parts & run parallel tasks for faster speed. -t TIMEDELAY, --timedelay TIMEDELAY Timedelay between each request. -he [HEADERS ...], --headers [HEADERS ...] Add Custom Headers to each request. Mandatory arguments: -u URL, --URL URL Target URL -w WORDLIST, --wordlist WORDLIST Wordlist to be used Example Usage Basic Usage With Wordlist and URL : dbrute -u 192.168.1.2 -w /path/to/wordlist.txt Using Extensions : dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -x php,txt,html,asp Using Split/ Parallel Processing Function : (the number of -s is the total number of parallel processes and split parts of the wordlist.) dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -s 6 Using Custom Headers : dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -he User-agent=Mozilla cookie=3495tu39thj3459thj9th Using Time Delay (in seconds) : dbrute -u 192.168.1.2 -w /path/to/wordlist.txt -t 1 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
5612 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2019-08-04 01:00 | 2021-03-12 17:03 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Visual Studio Code - simplicity of a code editor with what developers need for their core edit-build-debug cycle. | ||||
Description: |
- [Name] - VS Code (Visual Studio Code) - [Version] - 1.36 - [Homepage] - https://code.visualstudio.com - [Download] - https://github.com/microsoft/vscode/archive/1.36.0.tar.gz - [Author] - Microsoft - [Licence] - MIT ~ https://github.com/microsoft/vscode/blob/master/LICENSE.txt - [Description] - Visual Studio Code combines the simplicity of a code editor with what developers need for their core edit-build-debug cycle. It provides comprehensive code editing, navigation, and understanding support along with lightweight debugging, a rich extensibility model, and lightweight integration with existing tools. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0010812)
g0tmi1k 2019-08-04 01:00 |
Used in AWAE |
(0010865)
rhertzog 2019-08-14 19:42 |
Package has been requested on the Debian side too, but nobody picked it up until now. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898259 |
(0012659)
g0tmi1k 2020-04-20 08:55 |
There is also this ~ https://github.com/VSCodium/vscodium |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7087 | [Kali Linux] General Bug | major | have not tried | 2021-03-12 09:17 | 2021-03-12 09:18 |
Reporter: | jeril | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Boot Issue: [ 1.6557431] i801_smbus 0000:00:1f.3: Failed to enable SMBus PCI device (-16) | ||||
Description: |
Error appears at boot time when i choose my usual Kali linux option. I have Kli linux 2020.4 installed for dual boot with windows 10. It was all fine until now. Must have run some updates before. The error is: [ 1.6557431] i801_smbus 0000:00:1f.3: Failed to enable SMBus PCI device (-16) BusyBox v1.30.1 (Debian 1:1.30.1-6+b1) built-in shell (ash) Please help me, its urgent. I am new Linux |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7086 | [Kali Linux] Tool Upgrade | tweak | random | 2021-03-11 13:16 | 2021-03-11 13:26 |
Reporter: | Casper | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | immediate | OS Version: | |||
Status: | assigned | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Facing kernel panic | ||||
Description: | Kali Linux latest upgrades kernel version facing kernel panic and won't boot that partition won't b allowed ...to overcome I just booted old kernel version in mounted mem. | ||||
Steps To Reproduce: | 1- boot through other partition | ||||
Additional Information: | Could lead to crash memomy in ositself I guess | ||||
Attached Files: |
IMG_20210311_183052.jpg (1,849,908 bytes) 2021-03-11 13:16 https://bugs.kali.org/file_download.php?file_id=2022&type=bug IMG_20210311_182511~2.jpg (236,267 bytes) 2021-03-11 13:16 https://bugs.kali.org/file_download.php?file_id=2023&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7085 | [Kali Linux] Tool Upgrade | major | N/A | 2021-03-11 01:39 | 2021-03-11 13:17 |
Reporter: | D3V | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | high | OS Version: | |||
Status: | resolved | Product Version: | 2021.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | 'arjun' is using a beta version | ||||
Description: |
Looks like Arjun (https://github.com/s0md3v/Arjun/) is using a beta version. Please upgrade the package as the beta version contains breaking bugs, thanks. Also, it is now available on PyPi as 'arjun'. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014310)
steev 2021-03-11 02:04 |
Thanks for the heads up - keep in mind that 2.1.1 was just released an hour ago as of the time of my comment :) |
(0014311)
sbrun 2021-03-11 13:17 |
I have just uiploaded the new version 2.1.1-0kali1 in kali-dev. It will be soon in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7062 | [Kali Linux] Feature Requests | feature | always | 2021-02-24 05:56 | 2021-03-10 02:57 |
Reporter: | RME Systems | Platform: | |||
Assigned To: | arnaudr | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.2 | ||
Target Version: | |||||
Summary: | Request to have accessibility features added again | ||||
Description: | from version 2020.1 orca is no longer included after installing the system | ||||
Steps To Reproduce: |
first install the operating system with the option to use speech synthesizer. after installing restart the PC and that's when the screen reader no longer appears |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014246)
rhertzog 2021-02-24 09:44 |
Did you select GNOME or XFCE as your desktop during installation? What was the last version of Kali that was working for you? Somehow I fear that you are just experiencing sub-par accessibility due to the switch to XFCE compared to GNOME. |
(0014247)
RME Systems 2021-02-24 13:49 |
i selected gnome. the last version that works for me is 2019.3 |
(0014305)
arnaudr 2021-03-10 02:56 |
Thanks for the report. Indeed we forgot to install orca in Kali. I just added it to the various desktops that Kali provides: https://gitlab.com/kalilinux/packages/kali-meta/-/issues/10. This change will make it in the next version of the Kali iso. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7083 | [Kali Linux] General Bug | major | always | 2021-03-09 13:38 | 2021-03-09 13:38 |
Reporter: | linkaiqiang | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | 通过rpc,读取控制台信息,仅读取到下发命令信息,不能读取命令执行返回结果信息 | ||||
Description: |
通过rpc,读取控制台信息,仅读取到下发命令信息,不能读取命令执行返回结果信息。 console.write [u'0', 'ping 10.227.131.2 -w 6\r\n'] console.read [u'0'] [*] exec: ping 10.227.131.2 -w 6 |
||||
Steps To Reproduce: |
1、console.write [u'0', 'ping 10.227.131.2 -w 6\r\n'] 2、console.read [u'0'] (如下,ping结果没有返回控制台) [*] exec: ping 10.227.131.2 -w 6 |
||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6626 | [Kali Linux] Kali Package Bug | minor | always | 2020-08-06 10:14 | 2021-03-09 11:11 |
Reporter: | OS-74160 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.2 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | syntax warnings during post-install setup of powershell-empire (possible upstream issue) | ||||
Description: |
Installing powershell-empire from a clean slate via apt results in syntax warnings during the setup phase: Setting up powershell-empire (3.3.1-0kali1) ... [*] Certificate written to ../data/empire-chain.pem [*] Private key written to ../data/empire-priv.key /usr/share/powershell-empire/data/agent/agent.py:357: SyntaxWarning: "is not" with a literal. Did you mean "!="? if cmdargs is not None and cmdargs is not '' and cmdargs is not '/': # strip trailing slash for uniformity /usr/share/powershell-empire/data/agent/agent.py:357: SyntaxWarning: "is not" with a literal. Did you mean "!="? if cmdargs is not None and cmdargs is not '' and cmdargs is not '/': # strip trailing slash for uniformity /usr/share/powershell-empire/data/agent/agent.py:359: SyntaxWarning: "is not" with a literal. Did you mean "!="? if path[0] is not '/': # always scan relative to root for uniformity Processing triggers for kali-menu (2020.3.2) ... |
||||
Steps To Reproduce: |
1. Download a brand new Kali 2020.2a VMware image from the OffSec website 2. sudo apt -y install powershell-empire 3. Observe the installation complete and syntax warnings occur during "Setting up powershell-empire" phase |
||||
Additional Information: | Presumably, this could be fixed by modifying line 357 of /usr/share/powershell-empire/data/agent/agent.py as suggested in the warning, but I have not tested this. | ||||
Attached Files: | |||||
Notes | |
(0013211)
OS-74160 2020-08-06 10:17 |
Under additional information, I should have said, "Presumably, this could be fixed by modifying lines 357 and 359 of /usr/share/powershell-empire/data/agent/agent.py as suggested in the warning, but I have not tested this." |
(0014296)
sbrun 2021-03-09 11:11 |
it is now fixed in the gitlab repository of powershell-empire |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6771 | [Kali Linux] Kali Package Bug | minor | always | 2020-10-06 15:10 | 2021-03-09 10:46 |
Reporter: | IPv4v6 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.3 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Gobuster 3.0.1 does not support TLS 1.3 | ||||
Description: | Gobuster version 3.0.1 does not connect to TLS 1.3 only servers. | ||||
Steps To Reproduce: |
$ gobuster dir -u https://tls13.1d.pw -w /usr/share/wordlists/dirb/small.txt =============================================================== Gobuster v3.0.1 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_) =============================================================== [+] Url: https://tls13.1d.pw [+] Threads: 10 [+] Wordlist: /usr/share/wordlists/dirb/small.txt [+] Status codes: 200,204,301,302,307,401,403 [+] User Agent: gobuster/3.0.1 [+] Timeout: 10s =============================================================== 2020/10/06 17:08:17 Starting gobuster =============================================================== Error: error on running goubster: unable to connect to https://tls13.1d.pw/: Get https://tls13.1d.pw/: remote error: tls: protocol version not supported |
||||
Additional Information: |
Workaround: compile latest Gobuster version from source go get github.com/OJ/gobuster |
||||
Attached Files: |
image.png (63,212 bytes) 2020-10-08 00:19 https://bugs.kali.org/file_download.php?file_id=1919&type=bug |
||||
Notes | |
(0013543)
TheColonial 2020-10-08 00:19 |
I'm setting this right now even when running 3.1 built with golang 1.15. From what I can tell there are issues with 1.3 negotiation with certain servers. I'm still trying to get to the bottom of it. @IPv4v6 can you please share the local configuration that you have that builds binaries that works against tls13.1d.pw ? Thank you! |
(0013572)
TheColonial 2020-10-19 00:04 |
Hi all, We went through the rabbit hole of figuring out what was wrong, turns out that the server had an issue. For more information see here: https://github.com/golang/go/issues/41983 Thanks! OJ |
(0013629)
IPv4v6 2020-11-04 07:30 |
I also saw that error (tls: error decoding message) when testing with my self-compiled gobuster binary at the time the server was broken. To make it clear: the current gobuster Kali package binary has a problem. $ apt policy gobuster gobuster: Installed: 3.0.1-0kali1 Candidate: 3.0.1-0kali1 Version table: *** 3.0.1-0kali1 500 500 http://http.kali.org/kali kali-rolling/main amd64 Packages 100 /var/lib/dpkg/status $ ls -la /usr/bin/gobuster -rwxr-xr-x 1 root root 6742032 Jul 2 2019 /usr/bin/gobuster $ /usr/bin/gobuster dir -u https://tls13.1d.pw -w /usr/share/wordlists/dirb/small.txt =============================================================== Gobuster v3.0.1 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_) =============================================================== [+] Url: https://tls13.1d.pw [+] Threads: 10 [+] Wordlist: /usr/share/wordlists/dirb/small.txt [+] Status codes: 200,204,301,302,307,401,403 [+] User Agent: gobuster/3.0.1 [+] Timeout: 10s =============================================================== 2020/11/04 08:28:00 Starting gobuster =============================================================== Error: error on running goubster: unable to connect to https://tls13.1d.pw/: Get https://tls13.1d.pw/: remote error: tls: protocol version not supported |
(0014294)
sbrun 2021-03-09 10:46 |
fixed in new version 3.1.0-0kali1 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7070 | [Kali Linux] General Bug | trivial | always | 2021-02-27 13:09 | 2021-03-09 04:25 |
Reporter: | zellchristensen | Platform: | |||
Assigned To: | arnaudr | OS: | |||
Priority: | low | OS Version: | |||
Status: | resolved | Product Version: | 2021.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.2 | ||
Target Version: | |||||
Summary: | Default hostname changes from "kali" to "debian" after clicking "Go Back" | ||||
Description: | During graphical install, if a user enters an invalid hostname (i.e. "-" )under the network configuration section and clicks "Go Back" the default hostname is filled in with "debian" instead of the original initial "kali". | ||||
Steps To Reproduce: |
Proceed through graphical installation as normal. Enter a minus sign, "-", as the hostname. Next window says that it's invalid. Click "Go Back" button. Default hostname changed from "kali" to "debian". |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014291)
arnaudr 2021-03-09 03:40 |
Thanks for the report! I just pushed a fix: https://gitlab.com/kalilinux/packages/netcfg/-/commit/4a35b18c478403dafbdb65042e9a5cbb60954f50 |
(0014292)
arnaudr 2021-03-09 04:24 |
Note that I forwarded the issue to the Debian bug tracker: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984846 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6666 | [Kali Linux] Kali Package Bug | minor | always | 2020-08-20 14:07 | 2021-03-08 16:49 |
Reporter: | OS-74160 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | 2020.3 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | chrome-sandbox in burpsuite 2020.8 fails when installed via APT in Kali | ||||
Description: |
Burpsuite 2020.8, when installed from the downloaded 64-bit installer from here [https://portswigger.net/burp/releases/professional-community-2020-8?requestededition=community] sets the SUID bit on <Burp_Install_Path>/burpbrowser/84.0.4147.105/chrome-sandbox but the Kali APT package does not. Instead, the Kali apt package installs a large binary at /usr/bin/burpsuite and does not install the burpbrowser until first use for the kali user into ~/.BurpSuite/burpbrowser. When it does, it fails to set the SUID bit on ~/.BurpSuite/burpbrowser/84.0.4147.105/chrome-sandbox. As a result, an error message appears when you try to launch the embedded browser: "net.portswigger.devtools.client.aj: Refusing to start browser as your current configuration does not support running without sandbox." From PortSwigger support: "Root permissions are required to properly configure the embedded browser sandbox: sudo chown root:root /home/kali/<Burp_Installation_Folder>/burpbrowser/84.0.4147.105/chrome-sandbox && sudo chmod u+s /home/kali/<Burp_Installation_Folder>/burpbrowser/84.0.4147.105/chrome-sandbox It sounds like when you've used apt install you would need to carry out the manual steps post-install but you may not have seen the dialog that informs you of this. I hope this helps." |
||||
Steps To Reproduce: |
1. Start with a new, freshly downloaded Kali 2020.3 vmware image and spin it up 2. sudo apt install --only-upgrade burpsuite 3. Launch burpsuite 4. Click proxy, intercept, open browser 5. Observe the error message in the window: "net.portswigger.devtools.client.aj: Refusing to start browser as your current configuration does not support running without sandbox" |
||||
Additional Information: | |||||
Attached Files: |
burpsuite_2021-02-28_19-40.png (179,412 bytes) 2021-03-01 03:41 https://bugs.kali.org/file_download.php?file_id=2018&type=bug |
||||
Notes | |
(0014255)
OS-74160 2021-02-28 18:18 |
Hello, would someone please take a look at this and respond? I opened this up 6 months ago today and there has been no action or response. Additionally, there is a new issue that is extremely closely related to this one that has emerged in the very latest update to burpsuite 2021.2.1. I am willing to help with testing, or provide any additional data that may be needed. Thank you so much! |
(0014256)
steev 2021-02-28 23:33 |
There isn't a whole lot we can do here - we as a distro aren't supposed to touch files in the user's directory. Perhaps upstream could add a message about changing these permissions as a user? The included browser is also x86_64 only, which means the package is now broken on arm64. |
(0014257)
OS-74160 2021-03-01 03:41 |
Yes, I see what you're saying. I did some testing and discovered that essentially the Kali apt package is just putting the jar file into /usr/bin. Because if I download the jar "installer" from Portswigger, I get the same behavior. On first run, it installs the burpbrowser folder to ~/.BurpSuite/burpbrowser. So in this sense it's an upstream issue with their jar installer. However, there is also a platform installer for "Linux 64-bit". When the installer is run as root, it installs by default to /opt/BurpSuiteCommunity and the browser is installed (at installation time, not first-run) to /opt/BurpSuiteCommunity/burpbrowser, and the suid bit is properly set on chrome-sandbox. See attached screenshot. You mentioned that arm64 is a concern, and I realize it's important for kali packages to be platform independent, but perhaps the .sh installer could be used instead of the jar installer? I don't know if Portswigger has any intentions of supporting other architectures or if they provide source code to distributions? In any case, maybe they would agree to install the burpbrowser in a non-user location, such as /usr/share/burpsuite or /opt/burpsuite so distributions can follow best practices if they were asked. Then the permissions could be set correctly from the beginning. |
(0014267)
steev 2021-03-03 16:39 |
So, I just tested this (mostly because I'm an arm person) and I was able to move their chrome install out of the way, and symlink /usr/lib/chromium to their versioned directory, and create a symlink from chromium to chrome, and everything works as expected. The chromium-sandbox package installs the sandbox binary with the suid bit already. We've talked to them before about this, but there hasn't been much movement on the issue. |
(0014268)
OS-74160 2021-03-03 18:09 |
Thanks, @steev, that's good to know. Would it help if I asked them about this as a ticket so they know there is some more interest on it? Do you have a communication or ticket # I could reference? I'd really like to see this happen. |
(0014288)
c0d2f3f5 2021-03-08 13:05 |
OS-74160 you have old burp and kali. is issue on newest versions too? why use old image of kali to test anyway? |
(0014290)
OS-74160 2021-03-08 16:49 |
HI there, @c0d2f3f5. I can see the how you might be confused. When I first opened this issue, back in August 2020, this was the newest version of Kali and Burp available. I have actually kept up to data on everything, but the issue still persists. Today, in March 21 I am currently using Kali 2021.1 with Burp 2021.2.1-0kali1 and nothing has changed. I don't believe there is a way for me to update the issue with new version information besides adding more notes like this. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6828 | [Kali Linux] Queued Tool Addition | minor | always | 2020-11-09 02:59 | 2021-03-08 13:06 |
Reporter: | tjnull | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Dirsearch - a brute force directories and files in webservers. | ||||
Description: |
Dirsearch is a mature command-line tool designed to brute force directories and files in webservers. As a feature-rich tool, dirsearch allows the user to perform a complex web content discovering, with many vectors for the wordlist, high accuracy, impressive performance, advanced connection/request settings, modern brute-force techniques and nice output. |
||||
Steps To Reproduce: |
git clone https://github.com/maurosoria/dirsearch.git cd dirsearch python3 dirsearch.py -u <URL> -e <EXTENSIONS> |
||||
Additional Information: | https://github.com/maurosoria/dirsearch/releases | ||||
Attached Files: | |||||
Notes | |
(0014169)
g0tmi1k 2021-01-29 13:47 |
not sure what this has over so many other tools in this area? |
(0014281)
g0tmi1k 2021-03-05 13:31 |
@kali-team, please could this be packaged up. |
(0014289)
c0d2f3f5 2021-03-08 13:06 |
other tools do same, why not close like https://bugs.kali.org/view.php?id=7057 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7022 | [Kali Linux] Queued Tool Addition | minor | N/A | 2021-01-31 17:00 | 2021-03-06 20:34 |
Reporter: | DontPanicO | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | jwtXploiter, a tool to test security of JSON Web Tokens | ||||
Description: |
name: jwtXploiter version: 1.0 homepage: https://githbub.com/DontPanicO/jwtXploiter wiki: https://githbub.com/DontPanicO/jwtXploiter/wiki download: https://github.com/DontPanicO/jwtXploiter/releases/tag/v1.0 download: https://pypi.org/project/jwtxploiter/ author: DontPanicO licence: GPL-3.0 description: A command line interface to test security of JWTs against all known CVEs and more - Tamper with the token payload, change claims and subclaims values. - Exploit known vulnerable header claims (kid, jku, x5u) - Verify a token - Retrieve the public key of your target's ssl connection and try to use it in a key confusion attack with one option only - All JWAs supported (HS*, RS*, PS*, ES*) - Generates a JWK and insert it in the token header - And much, much more! dependencies: python3 (3.7 or newer) python dependencies: cryptography==3.2.1 activity: actively mantained installation: pip install, rpm package (provided by latest release on github) how to use: this tool cover a lot of use cases, and all are well explained in the wiki. Here i just provide some basic. - jwtxpl <token> -d # decode a token - jwtxpl <token> -a None -p <claim_name>:<new_value> # Try alg none and change a payload claim issuing new_value - jwtxpl <token> -a hs256 -p user:admin -k /path/to/key # Use JWA HS256, change payload, and sign token with a key - jwtxpl <token> -a hs256 -p user:admin --unverified # Try to reuse original signature - jwtxpl <token> -a hs256 --inject-kid sqli # Try an sqli payload against the kid header - jwtxpl <token> -a rs256 --jku-basic <yourURL> # Try to make the jku pointing to your jwks (automatically generated) - jwtxpl <token> -a es384 -V /path/to/key # Verify the signature using JWA ES384 and the key passed to -V packaged: The tool has not a .deb yet, but i'm working on it. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014192)
DontPanicO 2021-02-02 16:24 |
Debian package has been provided. It can be found on github , provided with the tool latest release. |
(0014272)
g0tmi1k 2021-03-05 13:14 |
Hello - thanks for the submission @DontPanicO, Wheres the debian package? |
(0014282)
g0tmi1k 2021-03-05 13:31 |
@kali-team, please could this be packaged up. |
(0014287)
DontPanicO 2021-03-06 20:34 |
@g0tmi1k here --> http://andreatedeschi.uno/jwtxploiter/jwtxploiter_1.2.1-1_all.deb |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7078 | [Kali Linux] Tool Upgrade | minor | have not tried | 2021-03-05 19:26 | 2021-03-05 19:26 |
Reporter: | tjhall72 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | confirmed | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | [Debian Package] Update autopsy to v4.8.0 | ||||
Description: |
Please update to the latest version of the autopsy package: https://github.com/sleuthkit/autopsy/releases |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014283)
saberzaid 2014-12-13 15:46 |
Sleuth Kit 4.0.2 already in the repo , only need now to update autopsy |
(0014284)
rhertzog 2015-09-03 12:54 |
This package should be updated on the Debian side: https://tracker.debian.org/pkg/autopsy But the current maintainer disappeared in the nature. It should probably be taken over by the forensics team. |
(0014285)
rhertzog 2018-08-24 17:02 |
There's bug report open on the Debian side: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669704 But the package is currently orphaned so this won't happen unless someone steps up to do the work. It would be a good idea to adopt this package in the pkg-security team if there are volunteers to help: http://wiki.debian.org/Teams/pkg-security The current version of autopsy is 4.8.0. https://github.com/sleuthkit/autopsy/releases |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7079 | [Kali Linux] Tool Upgrade | minor | always | 2021-03-05 19:26 | 2021-03-05 19:26 |
Reporter: | tjhall72 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | [Debian Package] Update Scalpel v2.0 (Currently v1.60) | ||||
Description: |
https://github.com/sleuthkit/scalpel/blob/master/Changelog |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014286)
g0tmi1k 2018-08-23 08:54 |
This comes from debian, not Kali ~ https://pkg.kali.org/pkg/scalpel |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7019 | [Kali Linux] Queued Tool Addition | feature | N/A | 2021-01-30 15:10 | 2021-03-05 13:30 |
Reporter: | beesan | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Name-That-Hash - a modern day hash-identifier | ||||
Description: |
Websites: https://github.com/HashPals/Name-That-Hash https://nth.skerritt.blog Modern day hash-identifier with new features such as: * Popularity, so NTLM will appear before Skype in the list. * Descriptions, so pentesters can make informed decisions about the type of hash. * Accessible CLI, so people with colour-blindness, screen-readers or those that can't read big blobs of text should be able to easily use it. https://github.com/HashPals/Name-That-Hash/wiki/Accessibility * JSON output, API, file input, etc. This uses the same database as HashID and Hash-Identifier, but modified & updated. TL;DR: * MIT * Install via PyPi with `pip3 install name-that-hash`, usage is `nth`. * Pyproject.toml https://github.com/HashPals/Name-That-Hash/blob/main/pyproject.toml * Setup.py https://github.com/HashPals/Name-That-Hash/blob/main/packages/setup.py * Authors: Beesan @bee_sec_san on Twitter * Other similar tools: HashID, Hash-identifier * Compute resources: The same as HashId or Hash-Identifier, very minimal. * Maintained: Yes, I am an active open source maintainer (github.com/bee-san) so this tool shall remain maintained. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014180)
beesan 2021-02-01 22:03 |
Since I’m not sure if I can edit my original post, The HashPal’s organisation has 3 members now who are committed to keeping the tool update, so even in the sad event that something happens to me the tool will be okay. Also, one of the core contributors to the original HashID approves of the fork and submitted a PR to update the license to GPL-3-0-or-later, as this project is based off of HashID (well, only the database of hashes) which uses that license. https://github.com/HashPals/Name-That-Hash/pull/14 |
(0014280)
g0tmi1k 2021-03-05 13:30 |
@kali-team, please could this be packaged up. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6871 | [Kali Linux] Queued Tool Addition | minor | N/A | 2020-11-23 10:13 | 2021-03-05 13:30 |
Reporter: | j_jito | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Sparrow-wifi: Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux | ||||
Description: |
[Name] - sparrow-wifi [Version] - N/A [Homepage] - https://github.com/ghostop14/sparrow-wifi [Download] - N/A [Author] - @ghostop14 [License] - GPL3 ~ https://github.com/ghostop14/sparrow-wifi/blob/master/LICENSE [Description] - Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux [Dependencies] - sudo apt install python3-pip gpsd gpsd-clients python3-tk python3-setuptools [Similar tools] - N/A [Activity] - Nov 2 2020 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014279)
g0tmi1k 2021-03-05 13:30 |
@kali-team, please could this be packaged up. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6832 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-11-11 06:52 | 2021-03-05 13:28 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | gsocket - Global Socket. Moving data from here to there. Securely, Fast and trough NAT/Firewalls | ||||
Description: |
Name] - gsocket [Version] - v1.4.22 [Homepage] - https://hackerschoice.github.io/ [Download] - https://github.com/hackerschoice/gsocket [Author] - The Hacker's Choice [License] - https://github.com/hackerschoice/gsocket/blob/master/LICENSE [Description] - Global Socket. Moving data from here to there. Securely, Fast and trough NAT/Firewalls |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014278)
g0tmi1k 2021-03-05 13:28 |
@kali-team, can this be packaged up please |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7074 | [Kali Linux] General Bug | block | always | 2021-03-02 11:50 | 2021-03-05 10:04 |
Reporter: | bluegene | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali 2021.1 apt upgrade causes Kernel panic - No working init found during boot | ||||
Description: |
Starting with fresh installation Kali 2021.1 on Dell Vostro 3400, after doing 'sudo apt upgrade' and reboot, Kali is not able to boot anymore. GRUB issue? |
||||
Steps To Reproduce: |
1. I had fresh Kali 2021.1 install and done 'sudo apt uprade' --> on next reboot result was "Kernel panic - No working init found during boot" This is list of packages upgraded with 'sudo apt upgrade': https://termbin.com/v7bn 2. Reproducible 2nd time: Tried also fresh re-install, and last step during Kali installation in install I have puled fresh updates from mirror -> same problem is reproducible. 3. Not reproducible if I don't upgrade: Finally done again new reinstall with same Kali version but this time I have skipped upgrades from mirror -> now Kali 2021.1 works fine and is able to boot fully. |
||||
Additional Information: | |||||
Attached Files: |
photo_2021-03-02_12-54-26.jpg (88,813 bytes) 2021-03-02 11:55 https://bugs.kali.org/file_download.php?file_id=2019&type=bug |
||||
Notes | |
(0014260)
bluegene 2021-03-02 11:55 |
Please find attached screenshot of boot error. Termbin is keeping links for 1 month (https://termbin.com/v7bn), so adding here for posterity: Listing... apparmor/kali-rolling 2.13.6-9 amd64 [upgradable from: 2.13.6-7] arp-scan/kali-rolling 1.9.7-2 amd64 [upgradable from: 1.9.7-1] bash/kali-rolling 5.1-2+b1 amd64 [upgradable from: 5.1-2] bind9-dnsutils/kali-rolling 1:9.16.12-1 amd64 [upgradable from: 1:9.16.11-2] bind9-host/kali-rolling 1:9.16.12-1 amd64 [upgradable from: 1:9.16.11-2] bind9-libs/kali-rolling 1:9.16.12-1 amd64 [upgradable from: 1:9.16.11-2] bsdextrautils/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] bsdutils/kali-rolling 1:2.36.1-7 amd64 [upgradable from: 1:2.36.1-6] burpsuite/kali-rolling 2021.2.1-0kali1 amd64 [upgradable from: 2020.12.1-0kali1] chromium-common/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1] chromium-driver/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1] chromium-sandbox/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1] chromium/kali-rolling 88.0.4324.182-1 amd64 [upgradable from: 88.0.4324.146-1] console-setup-linux/kali-rolling 1.201 all [upgradable from: 1.200] console-setup/kali-rolling 1.201 all [upgradable from: 1.200] default-mysql-server/kali-rolling 1.0.7 all [upgradable from: 1.0.6] dns-root-data/kali-rolling 2021011101 all [upgradable from: 2019052802] dnsrecon/kali-rolling 0.10.0-1 all [upgradable from: 0.9.1+git20200921-1] dosfstools/kali-rolling 4.2-1 amd64 [upgradable from: 4.1-2] eject/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] faraday/kali-rolling 3.14.1-0kali1 all [upgradable from: 3.14.0-0kali2] fdisk/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] fuse3/kali-rolling 3.10.2-1 amd64 [upgradable from: 3.10.1-3] gir1.2-javascriptcoregtk-4.0/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1] gir1.2-webkit2-4.0/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1] grub-common/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1] grub-efi-amd64-bin/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1] grub-efi-amd64/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1] grub2-common/kali-rolling 2.04-15kali1 amd64 [upgradable from: 2.04-12kali1] hwloc/kali-rolling 2.4.1~rc3+dfsg-1 amd64 [upgradable from: 2.4.1~rc2+dfsg-2] ipp-usb/kali-rolling 0.9.17-1 amd64 [upgradable from: 0.9.16-1] kali-defaults-desktop/kali-rolling 2021.2.0 all [upgradable from: 2021.1.3] kali-defaults/kali-rolling 2021.2.0 all [upgradable from: 2021.1.3] keyboard-configuration/kali-rolling 1.201 all [upgradable from: 1.200] ldap-utils/kali-rolling 2.4.57+dfsg-2 amd64 [upgradable from: 2.4.57+dfsg-1] libapache2-mod-php7.4/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1] libapparmor1/kali-rolling 2.13.6-9 amd64 [upgradable from: 2.13.6-7] libapt-pkg-perl/kali-rolling 0.1.39 amd64 [upgradable from: 0.1.36+b4] libarmadillo10/kali-rolling 1:10.1.2+dfsg-4 amd64 [upgradable from: 1:10.1.2+dfsg-3] libblkid1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] libblockdev-crypto2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libblockdev-fs2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libblockdev-loop2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libblockdev-part-err2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libblockdev-part2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libblockdev-swap2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libblockdev-utils2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libblockdev2/kali-rolling 2.25-1 amd64 [upgradable from: 2.24-2+b1] libcdparanoia0/kali-rolling 3.10.2+debian-13.1 amd64 [upgradable from: 3.10.2+debian-13+b1] libcups2/kali-rolling 2.3.3op2-3 amd64 [upgradable from: 2.3.3op2-2] libdv4/kali-rolling 1.0.0-13 amd64 [upgradable from: 1.0.0-12] libdw1/kali-rolling 0.183-1 amd64 [upgradable from: 0.182+20210205-1] libelf1/kali-rolling 0.183-1 amd64 [upgradable from: 0.182+20210205-1] libfdisk1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] libfuse3-3/kali-rolling 3.10.2-1 amd64 [upgradable from: 3.10.1-3] libgcrypt20/kali-rolling 1.8.7-3 amd64 [upgradable from: 1.8.7-2] libglib2.0-0/kali-rolling 2.66.7-1 amd64 [upgradable from: 2.66.6-1] libglib2.0-bin/kali-rolling 2.66.7-1 amd64 [upgradable from: 2.66.6-1] libglib2.0-data/kali-rolling 2.66.7-1 all [upgradable from: 2.66.6-1] libgraphene-1.0-0/kali-rolling 1.10.4+dfsg1-1 amd64 [upgradable from: 1.10.2-1] libhwloc-plugins/kali-rolling 2.4.1~rc3+dfsg-1 amd64 [upgradable from: 2.4.1~rc2+dfsg-2] libhwloc15/kali-rolling 2.4.1~rc3+dfsg-1 amd64 [upgradable from: 2.4.1~rc2+dfsg-2] libiec61883-0/kali-rolling 1.2.0-4 amd64 [upgradable from: 1.2.0-3] libio-html-perl/kali-rolling 1.004-2 all [upgradable from: 1.001-1.1] libjavascriptcoregtk-4.0-18/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1] libjson-c5/kali-rolling 0.15-2 amd64 [upgradable from: 0.15-1] libldap-2.4-2/kali-rolling 2.4.57+dfsg-2 amd64 [upgradable from: 2.4.57+dfsg-1] libldap-common/kali-rolling 2.4.57+dfsg-2 all [upgradable from: 2.4.57+dfsg-1] libmaxminddb0/kali-rolling 1.5.0-3 amd64 [upgradable from: 1.5.0-2] libmount1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] libnfsidmap2/kali-rolling 0.25-6 amd64 [upgradable from: 0.25-5.1] libnghttp2-14/kali-rolling 1.43.0-1 amd64 [upgradable from: 1.42.0-1] libnorm1/kali-rolling 1.5.9+dfsg-2 amd64 [upgradable from: 1.5.9+dfsg-1] libnss3/kali-rolling 2:3.61-1 amd64 [upgradable from: 2:3.60-1] libopenjp2-7/kali-rolling 2.4.0-3 amd64 [upgradable from: 2.4.0-1] libqmi-glib5/kali-rolling 1.26.10-0.1 amd64 [upgradable from: 1.26.8-0.2] libqmi-proxy/kali-rolling 1.26.10-0.1 amd64 [upgradable from: 1.26.8-0.2] libsasl2-2/kali-rolling 2.1.27+dfsg-2.1 amd64 [upgradable from: 2.1.27+dfsg-2] libsasl2-modules-db/kali-rolling 2.1.27+dfsg-2.1 amd64 [upgradable from: 2.1.27+dfsg-2] libsasl2-modules/kali-rolling 2.1.27+dfsg-2.1 amd64 [upgradable from: 2.1.27+dfsg-2] libselinux1/kali-rolling 3.1-3 amd64 [upgradable from: 3.1-2+b2] libsmartcols1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] libspatialite7/kali-rolling 5.0.1-2 amd64 [upgradable from: 5.0.0-1] libsvn1/kali-rolling 1.14.1-3 amd64 [upgradable from: 1.14.0-3+b2] libthunarx-3-0/kali-rolling 4.16.3-1 amd64 [upgradable from: 4.16.2-1] libuuid1/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] libwacom-bin/kali-rolling 1.8-2 amd64 [upgradable from: 1.7-1] libwacom-common/kali-rolling 1.8-2 all [upgradable from: 1.7-1] libwacom2/kali-rolling 1.8-2 amd64 [upgradable from: 1.7-1] libwebkit2gtk-4.0-37/kali-rolling 2.30.5-1 amd64 [upgradable from: 2.30.4-1] libwebsockets16/kali-rolling 4.0.20-2 amd64 [upgradable from: 4.0.20-1] libyara4/kali-rolling 4.0.5-1 amd64 [upgradable from: 4.0.4-1] libzstd1/kali-rolling 1.4.8+dfsg-2 amd64 [upgradable from: 1.4.8+dfsg-1] lightdm-gtk-greeter-settings/kali-rolling 1.2.2-4 all [upgradable from: 1.2.2-3] man-db/kali-rolling 2.9.4-1 amd64 [upgradable from: 2.9.3-2] metasploit-framework/kali-rolling 6.0.31-0kali1 amd64 [upgradable from: 6.0.30-0kali1] mount/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] mysql-common/kali-rolling 5.8+1.0.7 all [upgradable from: 5.8+1.0.6] nano/kali-rolling 5.4-2 amd64 [upgradable from: 5.4-1] ncrack/kali-rolling 0.7+debian-3 amd64 [upgradable from: 0.7+debian-2] network-manager-gnome/kali-rolling 1.20.0-2 amd64 [upgradable from: 1.20.0-1] openssh-client/kali-rolling 1:8.4p1-4 amd64 [upgradable from: 1:8.4p1-3] openssh-server/kali-rolling 1:8.4p1-4 amd64 [upgradable from: 1:8.4p1-3] openssh-sftp-server/kali-rolling 1:8.4p1-4 amd64 [upgradable from: 1:8.4p1-3] php7.4-cli/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1] php7.4-common/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1] php7.4-json/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1] php7.4-mysql/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1] php7.4-opcache/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1] php7.4-readline/kali-rolling 7.4.15-1 amd64 [upgradable from: 7.4.14-1] php7.4/kali-rolling 7.4.15-1 all [upgradable from: 7.4.14-1] plocate/kali-rolling 1.1.4-1 amd64 [upgradable from: 1.1.3-1] python3-aiosqlite/kali-rolling 0.16.1-1 all [upgradable from: 0.15.0-2] python3-cryptography/kali-rolling 3.3.2-1 amd64 [upgradable from: 3.3.1-1] python3-django/kali-rolling 2:2.2.19-1 all [upgradable from: 2:2.2.18-1] python3-kaitaistruct/kali-rolling 0.9-1 all [upgradable from: 0.8-3] python3-numexpr/kali-rolling 2.7.2-2 amd64 [upgradable from: 2.7.2-1] python3-numpy/kali-rolling 1:1.19.5-1 amd64 [upgradable from: 1:1.19.4-1+b1] python3-pkg-resources/kali-rolling 52.0.0-1 all [upgradable from: 51.3.3-1] python3-pyproj/kali-rolling 3.0.0-2 amd64 [upgradable from: 3.0.0-1+b1] python3-reportbug/kali-rolling 7.10.2 all [upgradable from: 7.9.0] python3-setuptools/kali-rolling 52.0.0-1 all [upgradable from: 51.3.3-1] python3-soupsieve/kali-rolling 2.2-1 all [upgradable from: 2.1-1] python3-twisted-bin/kali-rolling 20.3.0-4 amd64 [upgradable from: 20.3.0-3+b1] python3-twisted/kali-rolling 20.3.0-4 all [upgradable from: 20.3.0-3] python3-yara/kali-rolling 4.0.4-1 amd64 [upgradable from: 4.0.2-1+b2] reportbug/kali-rolling 7.10.2 all [upgradable from: 7.9.0] rfkill/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] ruby-activesupport/kali-rolling 2:6.0.3.5+dfsg-1 all [upgradable from: 2:6.0.3.4+dfsg-3] ruby-power-assert/kali-rolling 1.1.7-2 all [upgradable from: 1.1.7-1] screen/kali-rolling 4.8.0-5 amd64 [upgradable from: 4.8.0-3] sslscan/kali-rolling 2.0.8-0kali1 amd64 [upgradable from: 2.0.7-0kali1] sslyze/kali-rolling 4.0.4-0kali1 all [upgradable from: 4.0.2-0kali5] stunnel4/kali-rolling 3:5.56+dfsg-7 amd64 [upgradable from: 3:5.56+dfsg-6] subversion/kali-rolling 1.14.1-3 amd64 [upgradable from: 1.14.0-3+b2] thunar-data/kali-rolling 4.16.3-1 all [upgradable from: 4.16.2-1] thunar/kali-rolling 4.16.3-1 amd64 [upgradable from: 4.16.2-1] util-linux/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] uuid-runtime/kali-rolling 2.36.1-7 amd64 [upgradable from: 2.36.1-6] wpasupplicant/kali-rolling 2:2.9.0-20 amd64 [upgradable from: 2:2.9.0-17] wpscan/kali-rolling 3.8.15-0kali1 all [upgradable from: 3.8.14-0kali1] x11-common/kali-rolling 1:7.7+22 all [upgradable from: 1:7.7+21] xorg/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21] xserver-xorg-input-all/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21] xserver-xorg-video-all/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21] xserver-xorg/kali-rolling 1:7.7+22 amd64 [upgradable from: 1:7.7+21] |
(0014261)
bluegene 2021-03-02 15:26 |
Installation for Kali 2021.1 that was used is "Live" variant from official download source: https://www.kali.org/downloads/ Kali Linux 64-Bit (Live) 3.4G sha: 8e5af78e93424336f787d4dd0fdd89b429675d5ae67b1c1634ea1b53c5650677 |
(0014269)
arnaudr 2021-03-05 10:04 |
I just tried in a QEMU VM, with UEFI enabled, but I could not reproduce the issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7076 | [Kali Linux] General Bug | major | N/A | 2021-03-03 08:26 | 2021-03-03 16:40 |
Reporter: | subhacker65 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | kali linux 2021.1 does not boot into gui mode | ||||
Description: |
After booting into kali 2021.1 live using live iso burned by rufus on 16gb pendrive (procedure followed exactly correct) in uefi mode , it directly goes to terminal ( no display or no gui at all). No administer privileges were given so no sudo commands can be played and that s end of it you cannot do anything in non root accoung kali@kali zsh terminal . probably this is the end of it (literally nothing works). This is major bug also i have faced while full-upgrading system from 2020.4 to 2021.1 . I guess issue is with display managers like gdm3 xdm and wdm and when users tried to shift from 2020.4 to 2021.1 they were thrown into rescue mode/emergency mode like a hell . The root account is locked and sulogin(8) man page errors prevails |
||||
Steps To Reproduce: | |||||
Additional Information: |
I faced no issues with 2020.2 but literally 2021.1 has critical bugs in terms of display with regards to live ,installer and netinst iso . Please look into the issue as soon as possible if not it may pass down to 2021.2 too ( Some libpag0, gdm3 needs to be restarted while upgradation from 2020.4 to 2021.1 ) that is point it sucks away |
||||
Attached Files: |
WhatsApp Image 2021-03-03 at 22.08.35.jpeg (121,890 bytes) 2021-03-03 16:40 https://bugs.kali.org/file_download.php?file_id=2020&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6851 | [Kali Linux] Tool Upgrade | minor | N/A | 2020-11-20 08:23 | 2021-03-03 14:45 |
Reporter: | fl0 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Upgrade uhd to 4.0.0.0-2 | ||||
Description: |
Please upgrade uhd (libuhd-dev, libuhd4.0.0, python3-uhd, uhd-host) to version 4.0.0.0-2 . https://packages.debian.org/source/experimental/uhd uhd-images is already in version 4.0.0.0 . |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013939)
sbrun 2020-12-03 14:25 |
unfortunately the packages in Debian experimental don't build correctly on arm64 and armhf So the binary packages are missing for those architectures. I can't import the uhd package version 4.0.0.0 in kali-rolling. |
(0014266)
rhertzog 2021-03-03 14:45 |
And there are reverse dependencies using the various uhd libraries so we can't just blindly import this update. I'm afraid that we will have to wait until the transition happens in Debian and this will be after the release of Debian 11 bullseye. https://release.debian.org/transitions/html/auto-uhd.html |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7075 | [Kali Linux] Kali Package Bug | minor | always | 2021-03-02 16:07 | 2021-03-02 16:41 |
Reporter: | catmandx | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | command-not-found cannot open it's sqlite db file | ||||
Description: |
When using non-root accounts, the package command-not-found cannot open its db file (presumably to write something to it) The db file has permission of 644 with owner root/root: ┌──(kali㉿kali)-[/usr/share/wordlists] └─$ ls /usr/share/command-not-found/CommandNotFound/db/db.py -al -rw-r--r-- 1 root root 868 Jun 1 2020 /usr/share/command-not-found/CommandNotFound/db/db.py |
||||
Steps To Reproduce: |
1. Use a non-root account 2. type in gitleakss or some command that doesn't exist in your machine but does in the kali repo |
||||
Additional Information: |
Output: ┌──(kali㉿kali)-[/usr/share/wordlists] └─$ gitleakss 127 ⨯ Sorry, command-not-found has crashed! Please file a bug report at: http://www.debian.org/Bugs/Reporting Please include the following information with the report: command-not-found version: 0.3 Python version: 3.9.1 final 0 Distributor ID: Kali Description: Kali GNU/Linux Rolling Release: 2021.1 Codename: kali-rolling Exception information: unable to open database file Traceback (most recent call last): File "/usr/share/command-not-found/CommandNotFound/util.py", line 23, in crash_guard callback() File "/usr/lib/command-not-found", line 90, in main cnf = CommandNotFound.CommandNotFound(options.data_dir) File "/usr/share/command-not-found/CommandNotFound/CommandNotFound.py", line 79, in __init__ self.db = SqliteDatabase(dbpath) File "/usr/share/command-not-found/CommandNotFound/db/db.py", line 12, in __init__ self.con = sqlite3.connect(filename) sqlite3.OperationalError: unable to open database file ┌──(kali㉿kali)-[/usr/share/wordlists] └─$ ls /usr/share/command-not-found/CommandNotFound/db/db.py -al -rw-r--r-- 1 root root 868 Jun 1 2020 /usr/share/command-not-found/CommandNotFound/db/db.py [sudo] password for kali: ┌──(root�kali)-[/usr/share/wordlists] └─# gitleaks Command 'gitleaks' not found, but can be installed with: apt install gitleaks |
||||
Attached Files: | |||||
Notes | |
(0014262)
steev 2021-03-02 16:41 |
That file is simply the python file to access the actual database file(s) which are in /var/lib/command-not-found. Does c-n-f crash every time? Does running an apt update fix the issue? steev@kld:~/git/linux$ gitleakss Command 'gitleakss' not found, did you mean: command 'gitleaks' from deb gitleaks Try: sudo apt install <deb name> |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7005 | [Kali Linux] Kali Package Bug | major | always | 2021-01-22 05:18 | 2021-03-02 08:48 |
Reporter: | bl4krat | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | metagoofil does not do the metadata analysis stage - which is kind of the point of its existance | ||||
Description: |
Version 2.2 which gets installed by apt (and therefore, i suspect, the default version included with the distribution) ONLY downloads the files. It lacks the libraries and code to do the metadata parsing. Also, this version doesnt play nicely when it receives a status 429 (too many requests) from the server - it just throws and exception. |
||||
Steps To Reproduce: |
Try this: metagoofil -d https://sans.org -t doc,pdf,xls -l 200 -o sans_files -f sans_results.html This complains that sans_results.html is an unexpected parameter. the functionality to save the exfiltration result to this file does not exist in the script. So try this: metagoofil -d https://sans.org -t doc,pdf,xls -l 200 -o sans_files -f This time (on my vm) it will download the .docs and .pdf's, and then throw an exception when it gets a 429 from the server. It SHOULD deal with the 429 gracefully and back off the request rate a bit. Finally (having waited a long time for the server to get out of it's grumpy mood).... metagoofil -d https://sans.org -t xls -l 200 -o sans_files -f Now the .xls files are downloaded... and the program ends. No attempt is made to search the metadata - there is no code in the script to do this. |
||||
Additional Information: |
I have solved this on my VM by installing what appears to be an older version (still 2.2, but it's a python 2 script with all the necessary libraries and code) by doing: sudo rm -rf /usr/share/metagoofil sudo git clone https://github.com/WiReD-/metagoofil.git /usr/share/metagoofil and then editing /usr/bin/metagoofil so that it runs /usr/share/metagoofil/metagoofil.py with python2 (not 3). |
||||
Attached Files: | |||||
Notes | |
(0014135)
bl4krat 2021-01-22 05:29 |
I dont know who owns https://github.com/WiReD-/metagoofil.git, but it includes the GNU v2 public licence. |
(0014181)
sbrun 2021-02-02 09:20 |
Thanks for your report. Python 2 is EOL since one year. We removed the old Python2 tools or switched to Python 3 versions. For metagoofil we switched to an other upstream repo to have python 3 support. This version does not extract metadata (see https://github.com/opsdisk/metagoofil/blob/master/README.md) I will report the issue with status 429 to upstream. |
(0014182)
sbrun 2021-02-02 09:30 |
https://github.com/opsdisk/metagoofil/issues/21 |
(0014258)
sbrun 2021-03-02 08:47 |
version 2.2.+git20210226-0kali1fixes exception 429 issue |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7069 | [Kali Linux] General Bug | major | unable to reproduce | 2021-02-27 03:23 | 2021-02-27 03:32 |
Reporter: | 3liyyah | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Updating Kali from 2020.1 to 2020.4 does not display | ||||
Description: |
I have followed the documentation from https://www.kali.org/docs/general-use/updating-kali/ After performing the steps carefully, and using the correct sources, this is the output of lsb_release -a: No LSB modules are available. Distributor ID: Kali Description: Kali GNU/Linux Rolling Release: 2021.1 Codename: kali-rolling This is the output of 'cat /etc/os-release': PRETTY_NAME="Kali GNU/Linux Rolling" NAME="Kali GNU/Linux" ID=kali VERSION="2021.1" VERSION_ID="2021.1" VERSION_CODENAME="kali-rolling" ID_LIKE=debian ANSI_COLOR="1;31" HOME_URL="https://www.kali.org/" SUPPORT_URL="https://forums.kali.org/" BUG_REPORT_URL="https://bugs.kali.org/" In both cases and no matter what kind of upgrade, dist-upgrade, full upgrade I run, the display of the output never changes. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014254)
3liyyah 2021-02-27 03:32 |
I forgot to mention that I was using sudo in each case. Steps performed: updated sources with deb http://http.kali.org/kali kali-rolling main contrib non-free deb-src http://http.kali.org/kali kali-rolling main contrib non-free then sudo apt update sudo apt full-upgrade -y Everything completed successfully with no errors. Logged off, rebooted, and signed back in. Executed the commands in the description and no change. Also ran the following for the new shell after: kali@kali:~$ sudo apt update && sudo apt -y full-upgrade kali@kali:~$ kali@kali:~$ cp -i /etc/skel/.bashrc ~/ kali@kali:~$ kali@kali:~$ cp -i /etc/skel/.zshrc ~/ kali@kali:~$ kali@kali:~$ chsh -s /bin/zsh kali@kali:~$ kali@kali:~$ [ -f /var/run/reboot-required ] && sudo reboot -f Rebooted still no change. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7068 | [Kali Linux] General Bug | feature | always | 2021-02-26 09:25 | 2021-02-26 14:12 |
Reporter: | MRX | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali 2021.1 gives an error "comment_not_found". | ||||
Description: |
┌──(mrx㉿kali)-[~] └─$ try 127 ⨯ Sorry, command-not-found has crashed! Please file a bug report at: http://www.debian.org/Bugs/Reporting Please include the following information with the report: command-not-found version: 0.3 Python version: 3.9.1 final 0 Distributor ID: Kali Description: Kali GNU/Linux Rolling Release: 2021.1 Codename: kali-rolling Exception information: unable to open database file Traceback (most recent call last): File "/usr/share/command-not-found/CommandNotFound/util.py", line 23, in crash_guard callback() File "/usr/lib/command-not-found", line 90, in main cnf = CommandNotFound.CommandNotFound(options.data_dir) File "/usr/share/command-not-found/CommandNotFound/CommandNotFound.py", line 79, in __init__ self.db = SqliteDatabase(dbpath) File "/usr/share/command-not-found/CommandNotFound/db/db.py", line 12, in __init__ self.con = sqlite3.connect(filename) sqlite3.OperationalError: unable to open database file |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014252)
rhertzog 2021-02-26 14:12 |
Can you elaborate in what context you get that error? Is that a freshly installed system? a freshly upgraded system? a live system? Have you run "sudo apt update" once after the upgrade? Does "sudo update-command-not-found" fix the issue? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7067 | [Kali Linux] General Bug | feature | always | 2021-02-26 08:33 | 2021-02-26 08:33 |
Reporter: | jack_like | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2021.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | set LANG=en_US.UTF-8 , can't display Chinese normally | ||||
Description: | I update && upgrade my kali linux a few days ago .And after that it can't print Chinese normally and it's just so confusing. | ||||
Steps To Reproduce: |
1.upgrade to the newest version,LANG=en_US.UTF-8; 2.open terminal emulator and some other desktop application using Qt ( I guess qt settings is the key) 3.Chinese can't print normally. |
||||
Additional Information: | |||||
Attached Files: |
encoding-error.png (27,203 bytes) 2021-02-26 08:33 https://bugs.kali.org/file_download.php?file_id=2017&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7012 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2021-01-28 14:44 | 2021-02-25 13:47 |
Reporter: | subduing_flask | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.2 | ||
Target Version: | |||||
Summary: | Feroxbuster - A simple, fast, recursive content discovery tool written in Rust | ||||
Description: |
name: feroxbuster homepage/repo: https://github.com/epi052/feroxbuster description: A simple, fast, recursive content discovery tool written in Rust deps: only rust compiler for build, otherwise none been using this instead of gobuster for long time with no issue. benefit is only dir scanning and can do recursive searches. seems also faster and has shell comp can this plz be added to repos? |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014146)
g0tmi1k 2021-01-29 13:07 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0014171)
epi 2021-01-29 14:52 |
morning! Tool author here; a friend of mine let me know this was here. I'll see if I can get this working today. I took a look at the link from @g0tmi1k, it doesn't look like the normal debian build process. It seems as though it's mostly an install script and some of the debian build files? It doesn't appear that cargo/rustc is included in kali. I currently distribute musl-built static binaries via github actions. Are there any considerations/standards for packaging a rust project? |
(0014187)
sbrun 2021-02-02 10:05 |
@epi I have no experience in rust project packaging but I think this link can help you to start: https://salsa.debian.org/rust-team/debcargo-conf/blob/master/README.rst It's the documentation of the rust-team in Debian (there is some information that is only relevant for Debian like ITPs). |
(0014196)
epi 2021-02-03 21:46 |
@sbrun ill take a look at that; I haven't been successful yet without it, lol |
(0014238)
epi 2021-02-22 22:45 |
@sbrun I've got this all working. How do I handle the final remote repo? Following through the documentation, i have this in my debian/control ``` Homepage: https://github.com/epi052/feroxbuster Vcs-Browser: https://gitlab.com/kalilinux/packages/feroxbuster Vcs-Git: https://gitlab.com/kalilinux/packages/feroxbuster.git ``` Should I create a 'packaging' repo on gitlab instead, or do ya'll create one that i can push/PR to? |
(0014242)
sbrun 2021-02-23 09:34 (Last edited: 2021-02-23 09:34) |
@epi You don't need to create a 'packaging' repo on gitlab. You can create a branch on your github repo including the debian directory. I will create the repo on gitlab.com/kalilinux and will import your pacakging work. |
(0014244)
epi 2021-02-23 13:29 |
@sbrun i pushed the three branches and tags to https://github.com/epi052/feroxbuster. What's the normal way of handling those branches going forward? I assume I can merge kali/master, putting debian/ into my main branch. What about pristine-tar and upstream? |
(0014248)
sbrun 2021-02-24 14:22 |
@epi thanks for the packaging. I will import it into kali as soon as possible. You don't need to keep pristine-tar and upstream in your repo. They are required only in kali repo. They wil be updated by importing new upstream tarball. For the kali/master branch, you can do what you want: you can keep it or/and merge it into your main branch or/and remove it. |
(0014251)
sbrun 2021-02-25 13:47 |
new version 2.2.1-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7056 | [Kali Linux] General Bug | crash | always | 2021-02-19 16:23 | 2021-02-23 12:41 |
Reporter: | vanguard | Platform: | |||
Assigned To: | rhertzog | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali-live crashes during build - Message: Volume ID does not fit in 32 bit | ||||
Description: |
Dear maintainers, sorry to disturb you, but I believe, that something important might have changed, but I still can not find, what happened. As usual as do regularly I wanted to build a kali-live , and as I always do is to get the latest git configs using the command git pull origin master, then do the build with ./build.sh with my additional commands like "boot=live" keyboard=......." and so on. This is working well since years. But this time the build crashes with the message: "Volume ID does not fit in 32 bit" (see attached build.log). Please note, that both builds (I built for amd64 and for i386) are crashing with the identical message. I also noticed, that the git command updated some files, one was build.sh (don't know if this matters). So as I am not sure, if I myself did something wrong or if one of the new configs messed or one of the packages are causing this issue, I am looking for help here. It would be nice, if someone could give me a clue (if it was my mistake) or take a look at this issue. Thanks for any help and feel free for more information. Best regards Hans |
||||
Steps To Reproduce: |
First script: #!/bin/sh ### define path to the repository on your disk ### PATH= MOUNTPOINT=/mnt # DEVICE=/dev/sdb1 REPOPATH=kali-linux/var/cache/apt-cacher-ng/ ### download and install needed packages apt-get update apt-get install git cdebootstrap live-build live-config apt-cacher-ng console-data curl -y ### execute any commands to fit your personal environment loadkeys de ### prepare youre proxy and make sure, your local repo has ownership "apt-cacher-ng:apt-cacher-ng" cp acng.conf /etc/apt-cacher-ng/ chown -R apt-cacher-ng:apt-cacher-ng $MOUNTPOINT/$REPOPATH ### updating the git branch git pull origin master ### This is a test szenario, execite other scripts as needed ### This suggestion calls my very own script. # ./uit-build-i386.sh Then second script: #!/bin/sh ### Author Hans-J. Ullrich <hans.ullrich@loop.de> ### License: GPL ### Set some variables, not active yet. ### architecture: i386, amd64, arm ARCH=amd64 ### Distribution, you might not want to change it. DISTRO=kali-rolling ### Your preferred window-manager: lxde, kde, xfce, gnome VARIANT=lxde ### Environmet for your local proxy PROXY=http://localhost:3142/ ### language, keyboard, locales everything you might not need to change BOOTAPP="boot=live noconfig=sudo username=root hostname=kali ignore_uuid locales=de_DE.UTF-8 keyboard-layouts=de keyboard-variants=nodeadkeys" ### Clean your system, not really necessarey, as the latter "./build.sh" does ### this either. # lb clean ### VERY IMPORTANT: Make sure, apt-cacher is started, even, if you are sure, ### it is already running! /etc/init.d/apt-cacher-ng stop && sleep 3 && /etc/init.d/apt-cacher-ng start ### set your needed environment and preparations. export http_proxy=http://localhost:3142/ lb config ### This command starts the actual build. All commands are in one line. ### However, this script might be improved, to use variables for better ### configuration possibilities. ./build.sh --arch $ARCH --distribution $DISTRO --variant $VARIANT --verbose -- --apt-http-proxy $PROXY --bootappend-live "$BOOTAPP" ### these options can be used for further commands after build ### for example, if you want to burn a dvd, shutdown, whatever ### Examples for my personal needs below #/etc/init.d/apt-cacher-ng stop ### Suggestions for handling the built image. # cp /home/username/live-build-config/images/*.iso /home/user/ # wodim /path_to_your_live_build/live-build-config/images/your_image_name.iso ### Some opportunities at unattended build run, what to do after the build succeeded. # halt -p # reboot # shutdown -h now |
||||
Additional Information: | |||||
Attached Files: |
build.log (1,402,727 bytes) 2021-02-19 16:23 https://bugs.kali.org/file_download.php?file_id=2015&type=bug |
||||
Notes | |
(0014241)
rhertzog 2021-02-23 09:20 |
See https://salsa.debian.org/live-team/live-build/-/merge_requests/243 and thread starting at https://lists.debian.org/debian-live/2021/02/msg00018.html It's indeed a regression in i386. |
(0014243)
rhertzog 2021-02-23 12:41 |
I have pushed live-build 20210216kali1 with the fix, it should be soon available in kali-dev and a bit later in kali-rolling. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6905 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-12-06 05:21 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | chisel - A fast TCP/UDP tunnel over HTTP | ||||
Description: |
[Name] - chisel [Version] - 1.7.3 [Homepage] - https://github.com/jpillora/chisel [Download] - https://github.com/jpillora/chisel/tags [Author] - Jaime Pillora [License] - MIT ~ https://github.com/jpillora/chisel/blob/master/LICENSE [Description] - Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014058)
g0tmi1k 2021-01-08 13:34 |
@kali-team, please could this be packaged up. |
(0014142)
sbrun 2021-01-28 13:13 |
chisel version 1.7.4-0kali1 in kali-dev |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6750 | [Kali Linux] Queued Tool Addition | feature | N/A | 2020-09-26 22:24 | 2021-02-23 12:36 |
Reporter: | BFreakout | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | WordlistRaider - WordlistRaider is a Python tool for preparing existing wordlists. | ||||
Description: |
WordlistRaider is a Python tool for preparing existing wordlists. As an example we have a GB big wordlist and we only want passwords with a length of at least 8 characters. This optimizes word lists and saves unnecessary requests for brute force attacks. https://github.com/GregorBiswanger/WordlistRaider I would be happy if the tool can be installed and used via Kali. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013528)
g0tmi1k 2020-10-03 00:43 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0013954)
sbrun 2020-12-08 16:14 |
first version 1.0~git20200927-0kali1 of wordlistraider uploaded in kali-dev |
(0013955)
BFreakout 2020-12-08 16:18 |
pull request was merged |
(0013958)
sbrun 2020-12-09 07:27 |
Thanks for the merge. wordlistraider is now in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6513 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-06-22 16:35 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | Arjun - HTTP parameter discovery suite | ||||
Description: |
[Name] - Arjun [Homepage] - https://github.com/s0md3v/Arjun [Download] - https://github.com/s0md3v/Arjun/releases [Version] - 1.6 [Author] - Somdev Sangwan [License] - GNU General Public License v3.0 [Dependencies] - ? [Description] - HTTP parameter discovery suite |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013010)
g0tmi1k 2020-06-28 09:58 |
@kali-team, please could this be packaged up. |
(0013965)
sbrun 2020-12-11 08:32 |
package version 2.0~beta-0kali1 is in kali-dev |
(0013976)
sbrun 2020-12-14 13:35 |
version 2.0~beta-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6503 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-06-20 14:59 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | httprobe - Take a list of domains and probe for working HTTP and HTTPS servers | ||||
Description: |
[Name] - httprobe [Homepage] - https://github.com/tomnomnom/httprobe [Download] - https://github.com/tomnomnom/httprobe/releases [Version] - 0.1.2 [Author] - Tom Hudson [License] - MIT [Dependencies] - GoLang [Description] - Take a list of domains and probe for working HTTP and HTTPS servers |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013016)
g0tmi1k 2020-06-28 09:58 |
@kali-team, please could this be packaged up. |
(0013966)
sbrun 2020-12-11 08:33 |
package version 0.1.2+git20200411-0kali1 is in kali-dev |
(0013975)
sbrun 2020-12-14 13:35 |
version 0.1.2+git20200411-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6502 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-06-20 14:58 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | massdns - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration) | ||||
Description: |
[Name] - massdns [Homepage] - https://github.com/blechschmidt/massdns [Download] - https://github.com/blechschmidt/massdns/releases [Version] - 0.3 [Author] - B. Blechschmidt [License] - GNU General Public License v3.0 [Dependencies] - N/A [Description] - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration) MassDNS is a simple high-performance DNS stub resolver targeting those who seek to resolve a massive amount of domain names in the order of millions or even billions. Without special configuration, MassDNS is capable of resolving over 350,000 names per second using publicly available resolvers. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013017)
g0tmi1k 2020-06-28 09:58 |
@kali-team, please could this be packaged up. |
(0013974)
sbrun 2020-12-14 13:33 |
version 0.3-0kali2 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6501 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-06-20 14:56 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | DNSGen - Generates combination of domain names from the provided input. | ||||
Description: |
[Name] - DNSGen [Homepage] - https://github.com/ProjectAnte/dnsgen [Download] - https://github.com/ProjectAnte/dnsgen/releases [Version] - 1.0.4 [Author] - Project Ante [License] - MIT [Dependencies] - Click, tldextract [Description] - Generates combination of domain names from the provided input. This tool generates a combination of domain names from the provided input. Combinations are created based on wordlist. Custom words are extracted per execution. Refer to Techniques section to learn more. dnsgen is very similar to altdns. It does not contain DNS resolver. You should use massdns for DNS resolution. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013018)
g0tmi1k 2020-06-28 09:58 |
@kali-team, please could this be packaged up. |
(0013996)
sbrun 2020-12-23 16:11 |
version 1.0.4+git20200324-0kali1 is in kali-dev |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6500 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-06-20 14:54 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | altdns - Generates permutations, alterations and mutations of subdomains and then resolves them | ||||
Description: |
[Name] - altdns [Homepage] - https://github.com/infosec-au/altdns [Download] - N/A [Version] - N/A [Author] - Shubs [License] - Apache License 2.0 [Dependencies] - tldextract, argparse, termcolor, dnspython [Description] - Generates permutations, alterations and mutations of subdomains and then resolves them |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013019)
g0tmi1k 2020-06-28 09:58 |
@kali-team, please could this be packaged up. |
(0014075)
sbrun 2021-01-08 14:01 |
version 1.0.0+git20200123-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6498 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-06-20 14:50 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | getallurls (gau) - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | ||||
Description: |
[Name] - getallurls (gau) [Homepage] - https://github.com/lc/gau [Download] - https://github.com/lc/gau/releases [Version] - 1.0.2 [Author] - Corben Leo [License] - MIT [Dependencies] - GoLang [Description] - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013021)
g0tmi1k 2020-06-28 09:58 |
@kali-team, please could this be packaged up. |
(0013949)
sbrun 2020-12-08 08:45 |
version 1.0.7-0kali1 is now in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
4797 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2018-06-13 09:21 | 2021-02-23 12:36 |
Reporter: | rzepsky | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | DumpsterDiver - Tool to search secrets in various filetypes. | ||||
Description: |
I'd like to make a request to add the tool the DumpsterDiver (https://github.com/securing/DumpsterDiver) to Kali. Basically, the goal of this tool is to find key leaks in various filetypes. If you know the TruffleHog, then the DumpsterDiver is an enhanced version, because it can not only find key leaks in github repositories, but also in any readable filetype or in any archive. It also allows for defining multiple greps in advanced search module. I believe this tool is quite effective because it can be easily customized, so it would be nice to have it in Kali's arsenal. Here's the demo of the basic usage of it https://vimeo.com/272944858. If you need anything more from me, then please let me know. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0009242)
g0tmi1k 2018-06-13 10:17 |
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us): - [Name] - The name of the tool - [Version] - What version of the tool should be added? --- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag) - [Homepage] - Where can the tool be found online? Where to go to get more information? - [Download] - Where to go to get the tool? either a download page or a link to the latest version - [Author] - Who made the tool? - [Licence] - How is the software distributed? What conditions does it come with? - [Description] - What is the tool about? What does it do? - [Dependencies] - What is needed for the tool to work? - [Similar tools] - What other tools are out there? - [Activity] - When did the project start? Is is still actively being deployed? - [How to install] - How do you compile it? --- Note, using source code to acquire (e.g. git clone/svn checkout) can't be used - Also downloading from the head. Please use a "tag" or "release" version. - [How to use] - What are some basic commands/functions to demonstrate it? |
(0009244)
rzepsky 2018-06-13 15:23 |
Sure thing! Info is below. If anything more is needed just let me know ;) - [Name] - DumpsterDiver - [Version] - it doesn't uses versioning so far as it is quite little project and I'm working on it alone. However if versioning is important for you, then I can add it. - [Homepage] - https://github.com/securing/DumpsterDiver - [Download] - https://github.com/securing/DumpsterDiver - [Author] - Pawel Rzepa (https://twitter.com/Rzepsky) - [Licence] - it uses MIT license only requiring preservation of copyright and license notices. - [Description] - DumpsterDiver is a tool used to analyze big volumes of various file types in search of hardcoded secret keys (e.g. AWS Access Key, Azure Share Key or SSH keys) based on counting the entropy. Additionally, it allows creating a simple search rules with basic conditions (e.g. reports only csv file including at least 10 email addresses). So basically it opens any text file (e.g. .sql, .config etc), any archive (.zip, .tgz etc.) or git object (look into git logs if there is git repository) and analyze any word in search of finding a string with fixed (configurable) length and count its entropy. If the entropy is high then it is a potential key (e.g. AWS secret key). Additionally it allows for multiple greps in those analyzed. - [Dependencies] - Python 3 (tested on 3.6.5) and additional libraries: termcolor==1.1.0, PyYAML==3.12 - [Similar tools] - It works similar to TruffleHog (https://github.com/dxa4481/truffleHog) but the DumpsterDiver can do much more: analyze not only git logs, but any kind of text file and git objects too. What is more, the DumpsterDiver is customizable so you can define what legth of key you're searching (e.g. AWS secret key is always 40 byte long so there's no point to analyze longer strings). Thanks to this you can significantly limit false positives, what unfortunately you cannot do in TruffleHog. - [Activity] - The project has been released 2 weeks ago. It's quite small project, but if any new feature requests appear, then of course I will add them. - [How to install] - It doesn't require compiling as it is Python script. - [How to use] - The most basic usage is the following: > python3 DumpsterDiver.py -p ./path_to_folder_containing_files_to_analyze It can be really handy for pentesters and researchers so I believe it is worth adding it to Kali. Let me know what do you think about it |
(0009350)
rzepsky 2018-07-09 11:46 |
Just would like to notify you, I've added an option to search for hardcoded passwords, writing the output to the JSON file and some options to ease customization. I described how the tool and its feature works in the following article: https://medium.com/@rzepsky/hunting-for-secrets-with-the-dumpsterdiver-93d38a9cd4c1. |
(0011900)
g0tmi1k 2020-01-13 13:45 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0013932)
sbrun 2020-12-01 14:53 |
package version 0~git20200911-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
4575 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2018-03-01 20:05 | 2021-02-23 12:36 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | gitleaks - Searches full repo history for secrets and keys | ||||
Description: |
Name: gitleaks Version: v0.2.0 Homepage: https://github.com/zricethezav/gitleaks Download: https://github.com/zricethezav/gitleaks/archive/v0.2.0.tar.gz Author: Zachary Rice (zricethezav) Licence: GNU General Public License v3.0 (https://github.com/zricethezav/gitleaks/blob/master/LICENSE) Description: Searches full repo history for secrets and keys Dependencies: golang Similar tools: Nothing? Maybe gitDigger... Activity: 2018-01-27 - Current How to use: gitleaks {git url} |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0012075)
g0tmi1k 2020-02-10 14:01 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0014221)
sbrun 2021-02-16 14:00 |
version 7.2.2-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
4299 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2017-10-08 17:00 | 2021-02-23 12:36 |
Reporter: | soxrok2212 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | PSKracker - WPA/WPS toolkit for generating default keys/pins | ||||
Description: | PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C. This is useful for testing/auditing wireless networks and contains bleeding edge algorithms. More are to be supported in the future as they are discovered. Piping into password recovery tools is supported as well (hashcat, aircrack, pyrit, etc). | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0007489)
soxrok2212 2017-10-08 17:02 |
https://github.com/soxrok2212/PSKracker |
(0007492)
kimocoder 2017-10-08 19:21 |
This tool is very interesting. cloned it yesterday and it looks very promising. Thanks |
(0007494)
g0tmi1k 2017-10-09 10:42 |
Name: PSKracker Version: 0.2 Homepage: https://github.com/soxrok2212/PSKracker Download: https://github.com/soxrok2212/PSKracker/archive/0.2.tar.gz License: GNU v3.0 (https://github.com/soxrok2212/PSKracker/blob/master/LICENSE) Description: PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C. |
(0007501)
dookie 2017-10-09 17:00 |
This tool could be interesting but until it has better documentation, I would not recommend adding it to Kali. |
(0007503)
soxrok2212 2017-10-09 17:50 |
What type of documentation are you looking for? Anything specific? |
(0007504)
kimocoder 2017-10-09 18:11 |
Well, some more documentation would be great. Like: * Complete usage examples * Howto obtain 'serial number' etc |
(0007505)
dookie 2017-10-09 19:30 |
What does the program do? It claims to be an all-in-one toolkit but doesn't have any usage information. Does it manage the wireless interface? Does it handle packet injection? Why should someone use this tool over others, like aircrack-ng, wifite, pixiewps, etc? |
(0007527)
soxrok2212 2017-10-14 15:42 |
Well, per the description, "PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C". This tool does not manage wireless interfaces or do any sort of hardware managing/controlling. Reaver, bully, aircrack etc are all used primarily for a. gathering data b. testing some output from such gathered data This tool is designed to use the gathered data and produce some output to be used for testing the security of your network... i.e for select ATT models, pass in the encryption type and model number and the output will be all possible 2.1 billion keys (pipe into hashcat with the network capture and you will find the key). For Xfinity, pass in the Mac, security type, and model and you will get the XHS-XXXXXXXX key. The documentation would be HUGE if every detail were included in the repository itself. Feel free to ask any more questions! |
(0007546)
dookie 2017-10-19 14:50 |
We are not the audience for your tool, your potential users are. If they cannot figure out what it does and see examples of it working in the documentation, they will not use it, nor will it be packaged. |
(0009120)
soxrok2212 2018-05-07 01:51 |
I've added documentation to the Wiki. https://github.com/soxrok2212/PSKracker/wiki/Attack-Types-and-Supported-Models Please let me know if there is anything more I can do. |
(0012538)
g0tmi1k 2020-03-25 13:32 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0013933)
sbrun 2020-12-01 14:54 |
package version 0.2.1+git20201103-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
3941 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2017-03-30 18:23 | 2021-02-23 12:36 |
Reporter: | v1s1t0r | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | airgeddon - A multi-use bash script for Linux systems to audit wireless networks. | ||||
Description: |
-Name: airgeddon -Version: 6.11 -Homepage: https://github.com/v1s1t0r1sh3r3/airgeddon -Licence: GPLv3+ -Description: airgeddon is a very robust tool to audit wireless networks. Is 100% compatible with Kali and many other Linux distros including Kali on raspberry Pi. Already included in other pentesting Linux distros (like BlackArch or Wifislax). One year of hard developing. Serious project with translation to 7 languages and clean code checked with shellcheck tool (free of warnings). -Features: *Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing *DoS over wireless networks using different methods *Assisted Handshake file capturing *Cleaning and optimizing Handshake captured files *Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule based) *Evil Twin attacks (Rogue AP): Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS) Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap) Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip) Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF) Captive portal with "DNS blackhole" to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd) Optional MAC spoofing for all Evil Twin attacks *WPS features WPS scanning (wash). Self parameterization to avoid "bad fcs" problem Custom PIN association (bully and reaver) Pixie Dust attacks (bully and reaver) Bruteforce PIN attacks (bully and reaver) Parameterizable timeouts Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update Integration of the most common PIN generation algorithms *Compatibility with many Linux distributions (see Requirements section) *Easy targeting and selection in every section *Drag and drop files on console window for entering file paths *Dynamic screen resolution detection and windows auto-sizing for optimal viewing *Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired *Multilanguage support and autodetect OS language feature (see Supported Languages section) *Help hints in every zone/menu for easy use *Auto-update. Script checks for newer version if possible -On development now: Dockerfile WEP "all-in-one" attack <- yes, you read well... WEP :) it must be a swiss knife. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0006543)
v1s1t0r 2017-03-30 18:32 |
From all github's stuff, only 3 files needed to run: airgeddon.sh language_strings.sh known_pins.db |
(0008349)
g0tmi1k 2018-01-29 14:27 |
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us): - [Name] - The name of the tool - [Version] - What version of the tool should be added? --- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag) - [Homepage] - Where can the tool be found online? Where to go to get more information? - [Download] - Where to go to get the tool? - [Author] - Who made the tool? - [Licence] - How is the software distributed? What conditions does it come with? - [Description] - What is the tool about? What does it do? - [Dependencies] - What is needed for the tool to work? - [Similar tools] - What other tools are out there? - [How to install] - How do you compile it? - [How to use] - What are some basic commands/functions to demonstrate it? |
(0008551)
v1s1t0r 2018-01-29 19:41 |
I'll answer to all the requisites: - [Name] - airgeddon - [Version] - Last stable version right now is v7.23 which could be great to add but if we wait less than a month we can add v8.0 which will have full 5ghz support. We have git tags matching all the stable versions. - [Homepage] - https://github.com/v1s1t0r1sh3r3/airgeddon . And more info on wiki: https://github.com/v1s1t0r1sh3r3/airgeddon/wiki - [Download] - From github: https://github.com/v1s1t0r1sh3r3/airgeddon.git - [Author] - v1s1t0r and collaborators. - [Licence] - GPLv3+ - [Description] - This is a multi-use bash script for Linux systems to audit wireless networks. - [Dependencies] - It has 3 types of dependencies. Essential, optional and internal. All essential are included by default on Kali, so airgeddon can be run without any problem. Almost all optional and internal are included by default on Kali too and which are not included by default are easily installable by apt. More info here about the dependencies: https://github.com/v1s1t0r1sh3r3/airgeddon/wiki/Requirements - [Similar tools] - There are some tools for wireless hacking but there is no one as big and with the variety of attacks like airgeddon. In addition, airgeddon have some unique features like Evil Twin with BeEF integrated, pursuit mode attack, own WPS PIN db to search through and 5ghz full support which is incoming. - [How to install] - It's bash, no compilation needed. - [How to use] - Just run it and follow instructions and menues on screen. |
(0012204)
six2dez 2020-02-11 11:22 |
Hey, when are you going to include this tool in Kali? I saw that they have already created a repository in GitLab (https://gitlab.com/v1s1t0r1sh3r3/airgeddon) following your requirements. It's a "must" in a pentester toolbox... So... when? @g0tmi1k |
(0012547)
xpz3 2020-03-26 12:05 |
Hello, A lot more features have been added and the tool has evolved into a wifi pentest framework. I believe kali is not just for advanced users and newbie people like me could also benefit a lot using such scripts serving as a stepping stone into the pentest world. I have personally also tested this tool on Kali Nethunter too which works flawlessly. I think it'd be great if this tool get added to the Kali repo. @g0tmi1k |
(0012551)
g0tmi1k 2020-03-27 13:53 |
@author, thanks for the contribution! @kali-team, please review the package |
(0012556)
v1s1t0r 2020-03-28 08:31 |
Awesome news to be added at last to Kali repositories! The repo I created time ago on Gitlab passing all lintian checks is located at: https://gitlab.com/v1s1t0r1sh3r3/airgeddon Yesterday it was updated with the last version. Tell us if you need anything more from our side. You can locate us at IRC or at Discord (our airgeddon channel invitation link: https://discord.gg/sQ9dgt9). There, the main maintainer admin OscarAkaElvis can help you with any doubt. Regards. |
(0012771)
v1s1t0r 2020-05-12 10:56 |
Any update on this @kali-team ? thanks. |
(0012926)
spmugre 2020-06-15 22:27 |
I can't find it by apt on repos, not added yet? |
(0013985)
sbrun 2020-12-16 15:29 |
I have uploaded the package in kali-dev-only. It will be available soon in kali-rolling. @v1s1t0r thanks for the packaging on the gitlab repo. |
(0013986)
v1s1t0r 2020-12-16 16:06 |
I will keep it updated after every release if that is easier for you. Not sure if is needed or if you now take releases from main Github repo. |
(0013989)
v1s1t0r 2020-12-16 20:01 |
Hi, I changed my kali repos to point to dev in order to test airgeddon before reaching rolling and I detected one anomaly... it is installed and it works, but there is no direct access icon on the menus. I guess it should be at wireless section like reaver, aircrack-ng or any other wifi related tools. The .png icon is already available on imgs dir if you want to use it. Not sure if this could help you... on github (https://github.com/v1s1t0r1sh3r3/airgeddon) I have that done in a .deb file I usually prepare for kali users. It is on /binaries/kali directory. Inside, I have this already done in two places. One is at /usr/share/kali-menu/applications/kali-airgeddon.desktop and the other is at /usr/share/applications/kali-airgeddon.desktop , and both have this content: [Desktop Entry] Name=airgeddon Encoding=UTF-8 Exec=bash -c "airgeddon;${SHELL:-bash}" Icon=kali-airgeddon.png StartupNotify=false Terminal=true Type=Application Categories=06-wireless-attacks; X-Kali-Package=airgeddon Maybe we are in time to fix it before reaching rolling repos. Thanks! |
(0013990)
sbrun 2020-12-17 08:17 |
You don't need to update the gitlab repo. We will take the next releases from the main Github repo. Thanks! |
(0013997)
sbrun 2020-12-23 16:12 |
airgeddon is in kali-rolling and in the kali-menu (2021.1.2) |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7060 | [Kali Linux] Kali Package Bug | major | always | 2021-02-23 00:14 | 2021-02-23 08:56 |
Reporter: | shg8 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | libpcap-dev new version 1.10.0-2 doesn't have support for IEEE 802.11 (armhf) | ||||
Description: |
My program uses libpcap to capture wireless packets. When I tried to use libpcap-dev on armhf to capture IEEE 802.11 packets, there's an error message "That device doesn't support monitor mode," even though my network adapter supports monitor mode. The adapter works fine with aircrack-ng. **The last version of libpcap 1.9.1-4 also works perfectly fine.** The new version seems to be compiled without support for 802.11 packets. uname -r -- 4.19.118-Re4son-v7+ dpkg -s libc6 -- Version: 2.31-4 hardware: Raspberry Pi 3B+ |
||||
Steps To Reproduce: |
tcpdump -I wlan0mon -- That device doesn't support monitor mode. tcpdump -i wlan0mon (without 802.11 headers) -- works fine. wireless packets are captured without headers |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014239)
shg8 2021-02-23 00:28 |
libnl-3-dev is installed as well |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7058 | [Kali Linux] Tool Upgrade | minor | have not tried | 2021-02-21 18:52 | 2021-02-23 07:32 |
Reporter: | tractor90 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | burpsuite outdates | ||||
Description: | can it pls be updated? getting a prompt on every start | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014240)
sbrun 2021-02-23 07:32 |
new version 2021.2.1-0kali1 is now in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7055 | [Kali Linux] Kali Package Bug | major | always | 2021-02-18 21:48 | 2021-02-22 21:17 |
Reporter: | cmohre | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Linux does not install on fit-PC2 | ||||
Description: | The latest Kali Linux distributions do not install on fit-PC2 devices. The install cannot determine the hard disk, which is a Hitachi HTS545016B9A300 160GB drive, and there is no support found on the web. | ||||
Steps To Reproduce: | Simply run the Kali Linux installer from a USB stick. | ||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014232)
steev 2021-02-19 03:42 |
Can you choose the option for logs from the installer menu, and grab the dmesg output? In order to tell why it's not detecting, we're gonna need to see what the kernel is saying about SATA for that device. |
(0014237)
cmohre 2021-02-22 21:17 |
Sorry for the delay in responding - I was out of town for my daughter. I don't use Linux systems very often in my work (once every 6 projects) - I have turned on logging as early as I can - sending it to the web. The first time, I received two files - a hardware summary and a syslog. The second time, a couple more files including a partition manager - but the Installer hung here (the fit-PC2 was also very, very hot by this time - not sure if that changed the performance or not). Do you want me to upload the syslog (seems to be the only file with pertinent information)? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7059 | [Kali Linux] Kali Package Bug | minor | always | 2021-02-22 16:55 | 2021-02-22 16:55 |
Reporter: | quiverbonnet | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | flameshot two systray icons | ||||
Description: | starting flameshot puts two icons in systray. closing one closes both and all flameshot process | ||||
Steps To Reproduce: |
- apt-get install flameshot - start flameshot - view system tray |
||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7014 | [Kali Linux] Kali Package Bug | trivial | always | 2021-01-29 06:37 | 2021-02-21 18:20 |
Reporter: | steve4c1 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Trying to download | ||||
Description: | Trying to download repository from a PRIVATE IP address instead of a PUBLIC IP address. Since Private IP's are non-routeable, the system is not able to download the repository's. This should be the Public IP that it is trying to download from since Public IP's are what can be routeable over the web. | ||||
Steps To Reproduce: | sudo apt full-upgrade -y | ||||
Additional Information: | |||||
Attached Files: |
Screenshot_2021-01-28_14-28-37.png (208,045 bytes) 2021-01-29 06:37 https://bugs.kali.org/file_download.php?file_id=2006&type=bug |
||||
Notes | |
(0014145)
steve4c1 2021-01-29 06:44 |
Correction, I forgot the 192.99.200.0/24 is still technically a public IP address - but still, will not download |
(0014236)
steev 2021-02-21 18:20 |
Did you run apt update first? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6951 | [Kali Linux] Feature Requests | minor | N/A | 2020-12-26 07:58 | 2021-02-21 18:19 |
Reporter: | gurri | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Cant download ANYTHING | ||||
Description: |
as soon as i type sudo apt-get install volatility there is an error that it is unavailable. similar for all other packages |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014101)
daniruiz 2021-01-11 10:04 |
Did you run `sudo apt update` first. Is your OS clock in time? |
(0014235)
steev 2021-02-21 18:19 |
Also, volatility is no longer available (due to it being python 2, which is EOL) and volatility 3 is not packaged because the license is overly broad. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6108 | [Kali Linux] Kali Package Bug | minor | always | 2020-02-17 18:04 | 2021-02-21 17:52 |
Reporter: | OS-69474 | Platform: | |||
Assigned To: | rhertzog | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | 2020.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | nmap segfault due to lua-lpeg | ||||
Description: | Scanning a specific lab host using the vulners script will consistently lead to a crash. I made a post about it in the PWK forums. | ||||
Steps To Reproduce: | |||||
Additional Information: |
Log from dmesg: [14294.399735] nmap[13062]: segfault at 7ffe3cddeff8 ip 00007ff3ca9264c7 sp 00007ffe3cddf000 error 6 in liblua5.3-lpeg.so.2.0.0[7ff3ca920000+a000] [14294.399745] Code: 8d 50 f1 80 fa 01 77 0b b8 01 00 00 00 5b c3 0f 1f 40 00 48 8b 15 09 3b 20 00 0f b6 04 02 3c 01 74 21 3c 02 75 2d 48 8d 7b 08 <e8> 64 ba ff ff 85 c0 75 d5 48 63 43 04 48 8d 1c c3 eb ba 66 0f 1f I was able to resolve the problem for myself by building the lua-lpeg package with the following patch included: https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=942031;filename=lua-lpeg_1.0.0-2ubuntu1.debdiff;msg=5 |
||||
Attached Files: | |||||
Notes | |
(0012297)
rhertzog 2020-02-18 10:01 |
Thanks for the report. I pinged the Debian maintainer privately to try to get the fix into Debian, possibly by packaging the new upstream release 1.0.2. https://tracker.debian.org/pkg/lua-lpeg |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
2626 | [Kali Linux] Kali Package Bug | major | always | 2015-09-07 12:57 | 2021-02-21 17:52 |
Reporter: | rhertzog | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | kali-dev | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | bulk-extractor fails to build with the new libstdc++ of gcc-5 | ||||
Description: |
Extract from bulk-extractor_1.5.1-0kali2+b1-kali-dev-amd64-20150907-122749.967.log for the precise error: exif_entry.cpp: In function 'std::__cxx11::string get_possible_utf8(const sbuf_t&, size_t)': exif_entry.cpp:1185:14: error: 'const class sbuf_t' has no member named 'getUTF8WithQuoting' sbuf.getUTF8WithQuoting(0, count, s); ^ make[3]: *** [exif_entry.o] Error 1 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0003964)
rhertzog 2015-09-07 15:56 |
(Dropped link from the description as requested) A new upstream version has been imported (1.5.3+git20150907-0kali1) and it's building fine again. But it was probably not related to the gcc-5 move. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
3218 | [Kali Linux] Kali Package Bug | minor | have not tried | 2016-04-06 21:01 | 2021-02-21 17:52 |
Reporter: | bershama | Platform: | |||
Assigned To: | rhertzog | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2016.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Videos:This file cannot be played over the network. Try downloading it locally first. | ||||
Description: | Everything was working fine. After I updated & upgraded kali linux with -> "apt-get update" "apt-get upgrade" and i made reboot now videos give me this error! so anyway i cant open any video/music.I tried different files everything. I'm not using VMware. Kali linux is on PC. Videos is really important to me! | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot from 2016-04-06 23-00-08.png (31,272 bytes) 2016-04-06 21:01 https://bugs.kali.org/file_download.php?file_id=658&type=bug |
||||
Notes | |
(0005094)
rhertzog 2016-04-07 07:02 |
Do you have installed gstreamer1.0-plugins-bad and gstreamer1.0-plugins-ugly? Are you sure that this file does not require some unsupported codecs? |
(0005095)
sbrun 2016-04-07 07:21 |
This issue was also reported in Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819960 |
(0005096)
rhertzog 2016-04-07 09:14 |
So this problem is a mismatch of versions between gstreamer plugins and libgstreamer. This problem should be fixed soon. I updated the packages in kali-rolling and they should be fixed in debian testing soon as well. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6722 | [Kali Linux] General Bug | minor | always | 2020-09-15 21:27 | 2021-02-21 17:51 |
Reporter: | hubbardmeister@gmail.com | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.3 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | pci errors fill up syslog using Realtek usb device | ||||
Description: |
Hi, Informational - Since moving to this kernel , System log fills hardrive with pci errors in relation to the Realtek usb device. There is some clear error with the Driver. Prior to this upgrade from Kernel 4 to 5 this was not a problem. Linux [hostname] 5.6.0-kali2-amd64 0000001 SMP Debian 5.6.14-2kali1 (2020-06-10) x86_64 GNU/Linux lsb_release -a No LSB modules are available. Distributor ID: Kali Description: Kali GNU/Linux Rolling Release: 2020.2 Codename: kali-rolling lsusb => Bus 001 Device 002: ID 0bda:2838 Realtek Semiconductor Corp. RTL2838 DVB-T lspci => 2:00.0 Network controller: Realtek Semiconductor Co., Ltd. RTL8723BE PCIe Wireless Network Adapter Subsystem: Realtek Semiconductor Co., Ltd. Dell Wireless 1801 Flags: bus master, fast devsel, latency 0, IRQ 16, IOMMU group 8 I/O ports at d000 [size=256] Memory at df100000 (64-bit, non-prefetchable) [size=16K] Capabilities: <access denied> Kernel driver in use: rtl8723be Kernel modules: rtl8723be lsmod | grep rtl rtl8723be 106496 0 btcoexist 167936 1 rtl8723be rtl8723_common 28672 1 rtl8723be rtl_pci 32768 1 rtl8723be btrtl 24576 1 btusb rtlwifi 102400 4 rtl_pci,rtl8723be,btcoexist,rtl8723_common mac80211 892928 3 rtl_pci,rtl8723be,rtlwifi bluetooth 667648 5 btrtl,btintel,btbcm,btusb cfg80211 864256 2 rtlwifi,mac80211 Seems like similar bug as.... https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521173 |
||||
Steps To Reproduce: |
Run airodump-ng to the wan/usb interface. Log fills rapidly to TB's and system then effectively halts due to drive being full!! |
||||
Additional Information: |
Workaround - Disabled aer and msi in the kernel boot options for grub. **When AER is enabled, a PCI Express device will automatically send an error message to the PCIe root port above it when the device captures an error. The Root Port, upon receiving an error reporting message, internally processes and logs the error message in its PCI Express capability structure /etc/default/grub GRUB_DEFAULT=0 GRUB_TIMEOUT=5 GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian` GRUB_CMDLINE_LINUX_DEFAULT="quiet pci=noaer,nomsi" GRUB_CMDLINE_LINUX="" |
||||
Attached Files: | |||||
Notes | |
(0013429)
hubbardmeister@gmail.com 2020-09-15 22:18 |
Put wrong driver in there - This is the RTL2838 DVB-T ... usb 001 Device 002: ID 0bda:2838 Realtek Semiconductor Corp. RTL2838 DVB-T, looking to see if there is a latest version i can find to install. |
(0013442)
hubbardmeister@gmail.com 2020-09-16 16:38 |
The driver does not appear to have aer support, who owns this ?. https://www.kernel.org/doc/html/latest/PCI/pcieaer-howto.html from strace... 3809 ioctl(3, SIOCETHTOOL, 0x7ffdfc154670) = 0 3809 fstat(1, {st_mode=S_IFIFO|0600, st_size=0, ...}) = 0 3809 brk(NULL) = 0x559f646ab000 3809 brk(0x559f646cc000) = 0x559f646cc000 3809 write(1, "driver: rtl8723be\nversion: 5.6.0"..., 235 <unfinished ...> 3763 <... read resumed>"driver: rtl8723be\nversion: 5.6.0"..., 128) = 128 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6708 | [Kali Linux] Kali Package Bug | tweak | always | 2020-09-06 16:39 | 2021-02-21 17:51 |
Reporter: | 0x3qt | Platform: | |||
Assigned To: | daniruiz | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.3 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2020.4 | ||
Target Version: | |||||
Summary: | Impossible to resize font on QTerminal | ||||
Description: |
Hi Team, I just upgraded my distro to the latest released version, 2020.3, and by often using my laptop by connecting it to the TV screen, I needed to resize the display and font. No problem with the resolution, but it is impossible to change and resize the QTerminal font using the preferences section. I also tried a clean installation, but it still happens. I haven't solved it yet, but in the meantime I'm using ctrl+/ctrl- to deceive this issue. |
||||
Steps To Reproduce: | QTerminal > File > Preferences... > Font [Change] > Modify the font +/- > Ok > Apply | ||||
Additional Information: | |||||
Attached Files: |
out.ogv (1,589,888 bytes) 2020-09-06 16:39 https://bugs.kali.org/file_download.php?file_id=1890&type=bug |
||||
Notes | |
(0013405)
daniruiz 2020-09-08 19:13 |
Fixed with kali-themes 2020.4.1 You need to remove your local settings ~/.config/qterminal.org/qterminal.ini |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
5994 | [Kali Linux] Kali Package Bug | minor | sometimes | 2020-01-14 06:39 | 2021-02-21 17:51 |
Reporter: | techguy | Platform: | |||
Assigned To: | daniruiz | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2019.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | The VMSVGA Graphics Controller issue with Kali Linux | ||||
Description: | The VMSVGA Graphics Controller seems to have issues with Graphics in Kali Linux as the contents of Usual Application program windows including the Terminal windows won't appear until the mouse cursor is kept in the application icon on top Panel bar. The application window remains there but with no contents at all. | ||||
Steps To Reproduce: | Tried 3-4 times with VMSVGA Graphics Controller followed by selecting VBoxVGA that worked well. However, after once VBoxVGA corrected the issue, tried again with VMSVGA and this time it, so far, is working fine without reproducing the same issue. | ||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013110)
daniruiz 2020-07-22 10:48 |
This is an issue with 3D acceleration that was fixed on both xfce's window-manager and virtualbox |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6086 | [Kali Linux] Kali Websites & Docs | minor | always | 2020-02-08 15:28 | 2021-02-21 17:51 |
Reporter: | steevelex | Platform: | |||
Assigned To: | g0tmi1k | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Website link is pointing to locahost | ||||
Description: | The link to the "Porting NetHunter page" on the page "Modifying the Kernel" lead to "http://localhost:1414/docs/nethunter/porting-nethunter/" | ||||
Steps To Reproduce: |
1. Navigate to the link : https://www.kali.org/docs/nethunter/modifying-the-kernel/ 2. View the link "Porting NetHunter page " of the first paragraph of "Modifying the Kernel" : We will continue from the Porting NetHunter page and work on the Galaxy Note 3 kernel as an example. The idea stays the same though: replace the defconfig with one that is used by your kernel. >>> The link lead to "http://localhost:1414/docs/nethunter/porting-nethunter/" |
||||
Additional Information: | |||||
Attached Files: |
Screenshot from 2020-02-08 17-11-46.png (149,775 bytes) 2020-02-08 15:28 https://bugs.kali.org/file_download.php?file_id=1618&type=bug |
||||
Notes | |
(0012274)
g0tmi1k 2020-02-13 14:42 |
Thanks for the report. Should now be fixed ~ https://gitlab.com/kalilinux/documentation/kali-docs/-/commit/7e362a35e5cae0504baaeaa34ffe1d34ae39b14f |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
5889 | [Kali Linux] Kali Websites & Docs | minor | unable to reproduce | 2019-12-08 16:22 | 2021-02-21 17:50 |
Reporter: | akejjeka | Platform: | |||
Assigned To: | rhertzog | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2020.1 | ||
Target Version: | |||||
Summary: | unable to connect to kali's online service | ||||
Description: |
Hello FRANCE: yesterday and the day before yesterday impossible to connect to the online services of kali, I was obliged to go through the TOR service to connect to the service kali.org and the bugs.kali.org to file a return of the bug on the WIFI, but impossible to post the BUG through the TOR service (I understand for security reasons but it can be embarrassing) |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
bug-kali-1.png (219,643 bytes) 2019-12-08 16:22 https://bugs.kali.org/file_download.php?file_id=1509&type=bug bug-kali-2.png (223,752 bytes) 2019-12-08 16:22 https://bugs.kali.org/file_download.php?file_id=1510&type=bug bug-imposible.png (86,731 bytes) 2019-12-08 16:22 https://bugs.kali.org/file_download.php?file_id=1511&type=bug |
||||
Notes | |
(0011627)
rhertzog 2019-12-10 09:45 |
I'm not quite sure what your bug is about. The webapp firewall (sucuri) is sometimes to picky and doesn't like some stuff that we might be pasting in the form. One way to avoid problems is to provide the logs as attachment and/or link to some hosted service. The problem with the wifi device being renamed should be fixed with kali-defaults 2020.1.0. To disable the MAC-based naming, kali-defaults is now setting up this symlink: ln -sf /dev/null /etc/systemd/network/73-usb-net-by-mac.link This regression is related to a change in systemd 244-2 that replaced the former udev rule with this systemd configuration file. If your bug is about something else, feel free to reopen and clarify the issue. But we usually can't deal with hardware support issues. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
5083 | [Kali Linux] General Bug | minor | have not tried | 2018-11-07 18:09 | 2021-02-21 17:50 |
Reporter: | Deliormanl1 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2018.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Linux desktop files not showing | ||||
Description: |
Hello! I can not use the desktop. When I press the right mouse button, it shows 3 options (You can see from the picture). How can I fix it? |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot from 2018-11-07 18-59-40.png (1,913,307 bytes) 2018-11-07 18:09 https://bugs.kali.org/file_download.php?file_id=1239&type=bug |
||||
Notes | |
(0009933)
sbrun 2018-11-08 13:58 |
You need to install a new extension gnome-shell-extension-desktop-icons Please see issue 4983 for more information |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
5052 | [Kali Linux] Kali Websites & Docs | minor | have not tried | 2018-10-25 16:51 | 2021-02-21 17:50 |
Reporter: | bezawadaharikrishna | Platform: | |||
Assigned To: | g0tmi1k | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2018.2 | ||
Product Build: | Resolution: | duplicate | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Types is twice in documentation page | ||||
Description: |
Hi, While I am reading the document here https://www.kali.org/kali-linux-documentation found is twice at line 1 in Paragraph 3. Fix that ASAP. Best Wishes. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0009836)
g0tmi1k 2018-10-26 07:23 |
Fixed! Thank you |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
2395 | [Kali Linux] New Tool Requests | feature | N/A | 2015-07-07 05:19 | 2021-02-21 17:50 |
Reporter: | jobroche | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2017.3 | ||
Target Version: | |||||
Summary: | Add InSpy v2.0.2 - A LinkedIn enumeration tool | ||||
Description: |
This script enumerates employee names and titles from any organization using LinkedIn. It outputs all identified employees, titles and their respective emails (if the argument is provided) to assist with social engineering engagements or information gathering. This script is fast, lightweight and does not require any additional libraries to be downloaded within Kali. This would be my first contribution to the Kali Linux distribution and would love to have my script/tool implemented. Please see screenshot for sample output. Script: https://github.com/gojhonny/InSpy |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
inspy_output.png (505,430 bytes) 2015-07-07 05:19 https://bugs.kali.org/file_download.php?file_id=456&type=bug |
||||
Notes | |
(0006879)
rhertzog 2017-07-08 18:13 |
Waiting ack from g0tmi1k. |
(0006920)
g0tmi1k 2017-07-18 14:13 |
ACK. Name: InSpy Version: 2.0.2 Homepage: https://github.com/gojhonny/InSpy Download: https://github.com/gojhonny/InSpy/archive/2.0.2.tar.gz License: MIT ~ https://github.com/gojhonny/InSpy/blob/master/LICENSE Description: A LinkedIn enumeration tool There is nothing in Kali yet that supports what this does. Handy for Open Source Intelligence (OSINT) gathering. |
(0006942)
jobroche 2017-07-20 12:24 |
Script has been updated, latest download may be found at: https://github.com/gojhonny/InSpy/archive/2.0.3.tar.gz |
(0007199)
sbrun 2017-08-30 09:32 (Last edited: 2017-08-30 09:34) |
I just upload inspy version 2.0.3-0kali1 in kali-dev-only As logs are not handled correctly for Kali, I preferred to disable them. If there is a real need, I can reactivate them and try to patch the code for Kali. command: inspy -h |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
416 | [Kali Linux] New Tool Requests | feature | N/A | 2013-06-22 02:45 | 2021-02-21 17:49 |
Reporter: | altjx | Platform: | |||
Assigned To: | dookie | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 1.0.6 | ||
Target Version: | |||||
Summary: | iSMTP - SMTP spoofing, SMTP relay, and SMTP enumeration (all in one script) | ||||
Description: |
I would love to have this tool implemented and gain feedback from other people. While there are several tools out there that either do SMTP spoofing, SMTP relaying, OR SMTP enumeration testing, there is none out there for all three. Even for tools that conducts SMTP enumeration tests, they mostly only test either via SMTP RCPT TO or SMTP VRFY. Not both (or they don't give you the choice to choose between the two). With this script. You can perform SMTP spoofing, SMTP relaying, and SMTP enumeration (via RCPT TO and/or VRFY) all with one line. You can do all of the tests at once, or you can only conduct a specific combination (e.g., spoofing and relay, spoofing and enum, enum and relay, etc.). Please see screenshot. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
iSMTP.bmp (1,651,374 bytes) 2013-06-22 02:45 https://bugs.kali.org/file_download.php?file_id=57&type=bug |
||||
Notes | |
(0000588)
altjx 2013-06-22 02:48 |
Github link: https://github.com/altjx/ipwn/blob/master/iSMTP/iSMTP.py |
(0001116)
dookie 2013-12-02 22:03 |
Added in ismtp_1.6-1kali0. It will be in the repos soon. Note that the binary name in Kali is ismtp. Thanks for the suggestion. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
584 | [Kali Linux] Tool Upgrade | block | always | 2013-09-15 21:47 | 2021-02-21 17:49 |
Reporter: | jaimechiquita111 | Platform: | |||
Assigned To: | dookie | OS: | Kali | ||
Priority: | none | OS Version: | 1.0.4 | ||
Status: | resolved | Product Version: | 1.0.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 1.0.6 | ||
Target Version: | |||||
Summary: | SET menu outdated | ||||
Description: |
I've all the updates installed, do it dayli. After updated Social Engineering Toolkit, the command has changed from "set-toolkit" >> "setoolkit" |
||||
Steps To Reproduce: | Started from Kali Linux menu | ||||
Additional Information: | menu outdated | ||||
Attached Files: | |||||
Notes | |
(0001011)
dookie 2013-10-15 17:07 |
Fixed in kali-menu_1.361. It will be in the repos soon. Thanks for the report. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6397 | [Kali Linux] Feature Requests | minor | always | 2020-05-19 16:07 | 2021-02-21 17:48 |
Reporter: | 4rbee | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.2 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | No Mongo Client in Repo | ||||
Description: | There is no mongo client in the repo (that I have found) to connect to and assess Mongodb instances. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6491 | [Kali Linux] General Bug | minor | always | 2020-06-18 01:06 | 2021-02-21 17:48 |
Reporter: | carlosnewmusic | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.2 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Apt-build crashes the system when compiling | ||||
Description: | Apt-build crashes the system when compiling, filling all ram and swap memory, and leaving the system completely frozen, only responding to a REISUB | ||||
Steps To Reproduce: | apt-build update; apt-build upgrade | ||||
Additional Information: | when it freezes the system is building a qt5-base* related package | ||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6529 | [Kali Linux] Kali Package Bug | minor | always | 2020-06-28 08:53 | 2021-02-21 17:48 |
Reporter: | noobdanger | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.2 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | bug in kali linux | ||||
Description: |
in latest kali linux if we create a new user and then try to login with the same user its no logging in because automatically the user home directory is not being created kindly analyse this |
||||
Steps To Reproduce: |
1.create a new user 2.login with the same user 3.it wont log in because lack of home directory 4.Thats it |
||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6572 | [Kali Linux] Kali Package Bug | minor | always | 2020-07-13 20:42 | 2021-02-21 17:48 |
Reporter: | WolverineAS | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.2 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Hi Kali 2020.2 installer pakage contains some type of trojen. | ||||
Description: |
Hi Team, While downloading kali Linux from official website my antivirus is detecting some type of Trojan in package, so I can't download properly kindly check and resolve ASAP. Trojan Name - Trojan.Linux.GenericA.75142 Check and do some needful. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6719 | [Kali Linux] General Bug | minor | always | 2020-09-13 09:10 | 2021-02-21 17:48 |
Reporter: | Clef Astroville | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.3 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Root password is displaying incorrect password for vm workstation | ||||
Description: |
Getting incorrect password when I tried to login root with the default password on vm workstation And I haven't changed the password before |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6777 | [Kali Linux] General Bug | minor | always | 2020-10-09 01:11 | 2021-02-21 17:48 |
Reporter: | Noob_hackerx | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.3 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Desktop Releted operation | ||||
Description: | I recently have updated mt PC to kali2020.3 but after the update i am unable to see my desktop icons in root as well as other in other user so please fix it ASAP. | ||||
Steps To Reproduce: | continues happening whenever i login to my pc. | ||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6796 | [Kali Linux] General Bug | minor | always | 2020-10-21 16:37 | 2021-02-21 17:48 |
Reporter: | wrathofgod | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.3 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Tiger VNC viewer - unable to connect to socket: Connection refused (10061) | ||||
Description: |
Unable to connect to that server, every single time. |
||||
Steps To Reproduce: |
In bash kex >then error pops-up. |
||||
Additional Information: |
I already configured firewall ports 5900, 5901, 5800, 5802, 2 to be opened. And still wont give me access to. I already checked every single forum and videos... Strangely sometimes works, but, it says, unsecured login... why? |
||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6806 | [Kali Linux] General Bug | minor | always | 2020-10-27 17:37 | 2021-02-21 17:47 |
Reporter: | obaquero | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.3 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Block Screen more | ||||
Description: | Open screen and bottom Más, no open. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6879 | [Kali Linux] Kali Package Improvement | minor | always | 2020-11-24 06:33 | 2021-02-21 17:46 |
Reporter: | vasanthhunter | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | DOS | ||||
Description: |
Hi Team I would like to report a vulnerability on KALI OS. DESCRIPTION ============ VULNERABILITY NAME : DOS Kali linux is an very fast when compared to other OPERATING SYSTEM.But when i download a one text file which consists of many letters.When i open the text file my system crashes and text editor is not responding which is an denial of service |
||||
Steps To Reproduce: |
1.Download name.txt which i have attached in the mail address 2.Open the file it will load for long time and finally it will shown an not responding message |
||||
Additional Information: |
IMPACT ********* 1.Crash the KALI OS 2.Slowdone any one's account |
||||
Attached Files: |
name.txt (1,452,000 bytes) 2020-11-24 06:33 https://bugs.kali.org/file_download.php?file_id=1948&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6937 | [Kali Linux] Kali Package Bug | minor | have not tried | 2020-12-20 11:27 | 2021-02-21 17:46 |
Reporter: | ianf | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Found on antivirus scan, Windows 10 Pro 20H2 OS build 19042.685 | ||||
Description: |
Detected: Trojan:PHP/RevWebshell.YA!MTB Date: 20/12/20 22:07 Details: This program is dangerous and executes commands from an attacker. containerfile: D:\Downloads\kali-linux-2020.4-installer-amd64.iso file: D:\Downloads\kali-linux-2020.4-installer-amd64.iso->pool\main\b\beef-xss\beef-xss_0.5.0.0+git20191218-0kali2_all.deb->data.tar.xz->(xz)->./usr/share/beef-xss/modules/exploits/m0n0wall/php-reverse-shell.php |
||||
Steps To Reproduce: | |||||
Additional Information: | Is this a real threat, or Windows Defender enthusiasm? | ||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7015 | [Kali Linux] Kali Package Bug | minor | always | 2021-01-29 16:28 | 2021-02-21 17:45 |
Reporter: | Anonymous-Sam | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Bluetooth not starting | ||||
Description: | Bluetooth driver not working even after starting the bluetooth service. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7047 | [Kali Linux] General Bug | block | N/A | 2021-02-10 23:27 | 2021-02-21 17:45 |
Reporter: | TeamSpeakUser | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | TeamSpeak 3 | ||||
Description: |
When I use teamspeak 3 client I can connect to any server except hosteam servers AS 51290 AS Name HOSTEAM-AS, PL AS Prefixes 31.133.0.0/21 5.252.201.0/24 193.8.236.0/23 5.252.200.0/24 91.216.191.0/24 178.217.184.0/21 193.9.30.0/23 91.224.220.0/23 91.206.26.0/23 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7054 | [Kali Linux] General Bug | minor | always | 2021-02-18 12:37 | 2021-02-20 17:50 |
Reporter: | jaymori11 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Desktop | ||||
Description: | when i started kali linux it's desktop wasn't able to see. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014231)
kali-bugreport 2021-02-18 15:33 |
Do you think that this issue contains enough information? (Hint: It doesn't :-)) See e.g. https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/ what info is required / should be provided for the Kali team. |
(0014234)
Michu 2021-02-20 17:50 |
yeah it doesn't but you already found it out but could provide what you did before this problem started what you see now write if there's any debug messages everything that could make help more accurate what you give is TOO LOW ALMOST NOTHING SO PLEASE GIVE MORE DETAILS :) |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7052 | [Kali Linux] Kali Package Bug | block | always | 2021-02-17 03:11 | 2021-02-20 17:42 |
Reporter: | sirnerdman | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | When i start in virtual box, i get an error that wont launch it. | ||||
Description: |
On a fresh and old install of virtual box, I import Kali. when I hit start for the VM, i get the following error. I have gotten this to happen on a new and an old install of Virtual Box, and on two separate devices. Failed to open a session for the virtual machine Kali-Linux-2020.4-vbox-amd64. Implementation of the USB 2.0 controller not found! Because the USB 2.0 controller state is part of the saved VM state, the VM cannot be started. To fix this problem, either install the 'Oracle VM VirtualBox Extension Pack' or disable USB 2.0 support in the VM settings. Note! This error could also mean that an incompatible version of the 'Oracle VM VirtualBox Extension Pack' is installed (VERR_NOT_FOUND). Result Code: E_FAIL (0x80004005) Component: ConsoleWrap Interface: IConsole {872da645-4a9b-1727-bee2-5585105b9eed} |
||||
Steps To Reproduce: | Install Virtual box, import kali (double click OVS file), click start | ||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014233)
Michu 2021-02-20 17:42 |
did you tried to install extension pack to virtualbox or just upgrade it beacuse from error virtualbox says that he can't start vm because the usb 2.0 controller state is part of vm and if it's a part of it then virtualbox says that he can't start without extension pack or newest so try this if this won't help try vmware if vmware will not fit to you go to bootable usb and use it instead. that's how i can help and hope this will resolve your problem because when virtualbox is working then it's cool BUT when it gives errors then you have BIG problem sometimes more sometimes not and you can feel rage because of it so i recommend try to do what i wrote and see if it works. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6981 | [Kali Linux] Queued Tool Addition | feature | N/A | 2021-01-08 12:48 | 2021-02-17 16:04 |
Reporter: | 0x4E0x650x6F | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | dscan - Distributed Nmap, wrapper around Nmap to allow distributed network enumeration. | ||||
Description: |
Hi all, I noticed that dmap is been in the distro for a while, since the project haven not evolved much, I decided to create something similar with additional features. The tool's objective is similar, with additional features, it aggregates / splits address ranges, uses a configuration file where scan configuration can be adjusted, supports resume. I thought it would be a nice addition to the distribution. The tool repository, python pip, and documentation: https://pypi.org/project/dscan-4E656F/ https://github.com/0x4E0x650x6F/dscan https://dscan.readthedocs.io/en/0.1.1/ Suggestions and comments are welcome Best Regards Tiago Carvalho |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014079)
rhertzog 2021-01-09 09:45 |
Please don't file bugs in "Queued Tool Additions", you should use "New Tool Requests". And sometimes it's best to try to adopt an abandoned software instead of creating yet another fork. It makes it more likely to have it integrated as the continuation of the former tool... |
(0014105)
0x4E0x650x6F 2021-01-11 15:09 |
Sorry about the confusion. |
(0014147)
g0tmi1k 2021-01-29 13:07 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
(0014188)
0x4E0x650x6F 2021-02-02 10:34 |
Thanks alot. I will do my best to create a package. |
(0014228)
0x4E0x650x6F 2021-02-17 16:04 |
- [Name] - Dscan - [Version] - 0.1.3 - [Homepage] - https://github.com/0x4E0x650x6F/dscan - [Package] - https://gitlab.com/0x4E0x650x6F/dscan - [documentation] - https://dscan.readthedocs.io/en/latest/ - [pip package] - https://pypi.org/project/dscan-4E656F/ - [Author] - 0x4E0x650x6F - [License] - GPL-3 - [Description] - The tool's objective is similar, with additional features, it aggregates / splits address ranges, uses a configuration file where scan configuration can be adjusted, supports resume, and fail over when an agent goes down. - [Dependencies] - python3, python3-libnmap - [Similar tools] - some features can be found in dnmap, were the tool was inspired from. - [Activity] - There was a commit this month - [How to use] - dscan -h, generate ssl self sign cert: dscan --name <project-name> config -email mail@dscan.org -cn dscan -c pt -l earth -st nrw -o dscan -ou it -days 365 run server mode: dscan --name <project name> srv --config dscan.conf targets.txt run agent mode: dscan --name <agent-project-name> agent --config <path-to-agent.conf> -s <server-ip-address> -p <server-port> note: certificate and agent configs need to be copied to the server host. more details: in the readme where a link to a video demonstrating how it works. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
5415 | [Kali Linux] Tool Upgrade | minor | N/A | 2019-04-27 10:29 | 2021-02-17 15:20 |
Reporter: | Dober | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2019.1 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Please upgrade Bro (Zeek) | ||||
Description: |
Version in Kali: bro-2.5.5-1+b11 Actual version: bro-2.6.1 ( https://github.com/zeek/zeek/releases/tag/v2.6.1) New repo: https://github.com/zeek/zeek About renaming package: https://blog.zeek.org//2018/10/renaming-bro-project_11.html |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0011149)
Dober 2019-09-26 19:21 |
Zeek 3.0.0 released: https://github.com/zeek/zeek/releases/tag/v3.0.0 |
(0014227)
sbrun 2021-02-17 15:20 |
zeek version 3.2.3+ds2-2 is now in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7053 | [Kali Linux] Feature Requests | major | have not tried | 2021-02-17 12:23 | 2021-02-17 15:19 |
Reporter: | shady_hacker_ | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | ect/apt sources file no directory when accesing on terminal | ||||
Description: |
i cannot acces any files from file manager onto the terminal e.g ect/ usr/ it says file directory does not exist. i cannot install certain applications such as msfconsole, gitthub tools ect, it gives an error E: cannot locate file package, but becuase i cant open nano ect/apt/sources.list due to the original error im conceeding it just says file ect/apt does not exist. i have tried on the window right clicking on file manager on selecting open terminal so that the directories will only apply to the files saved on file manager. by doing this i am able to acces nano ect/apt/sources.list but it gives an error ''permission denied'' i have tried to do this on root too still doesn not work. my suggestion is to allow users to move files from file manager to desktop/ or other locations, i can not add repossitres either. becuase it keeps on saying ect/ directory does not exist, or permission denied cant write out. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014226)
d0rm0us3 2021-02-17 15:19 |
Do you mean /etc/apt doesn't exist? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7030 | [Kali Linux] New Tool Requests | minor | have not tried | 2021-02-02 23:36 | 2021-02-17 13:13 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | pacu - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments. | ||||
Description: |
[Name] - pacu [Version] - N/A [Homepage] - https://rhinosecuritylabs.com/aws/pacu-open-source-aws-exploitation-framework/ [Download] - https://github.com/RhinoSecurityLabs/pacu NO TAG [Author] - Rhino Security Labs [License] - BSD 3 [Description] - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments. Pacu is an open-source AWS exploitation framework, designed for offensive security testing against cloud environments. Created and maintained by Rhino Security Labs, Pacu allows penetration testers to exploit configuration flaws within an AWS account, using modules to easily expand its functionality. Current modules enable a range of attacks, including user privilege escalation, backdooring of IAM users, attacking vulnerable Lambda functions, and much more. [Dependencies] - Python ~ https://github.com/RhinoSecurityLabs/pacu/blob/master/requirements.txt |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014225)
sbrun 2021-02-17 13:13 |
pacu is not designed to be installed in a system wide manner. It requires to have write rights on many files and we can not easily patch this as relative paths are used in many files. https://github.com/RhinoSecurityLabs/pacu/issues/230 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7029 | [Kali Linux] New Tool Requests | minor | have not tried | 2021-02-02 23:34 | 2021-02-17 13:08 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | peirates - Kubernetes Penetration Testing tool | ||||
Description: |
[Name] - peirates [Version] - v1.0.30 [Homepage] - https://www.inguardians.com/peirates/ [Download] - https://github.com/inguardians/peirates/tags [Author] - InGuardians [License] - GNU General Public License v2.0 [Description] - Kubernetes Penetration Testing tool Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It automates known techniques to steal and collect service accounts, obtain further code execution, and gain control of the cluster. [Dependencies] - Go |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014224)
sbrun 2021-02-17 13:08 |
version 1.0.30-0kali2 is in kali-dev |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7028 | [Kali Linux] New Tool Requests | minor | have not tried | 2021-02-02 23:24 | 2021-02-17 10:13 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | CloudBrute - Awesome cloud enumerator | ||||
Description: |
[Name] - CloudBrute [Version] - v1.0.7 [Homepage] - https://github.com/0xsha/cloudbrute [Download] - https://github.com/0xsha/CloudBrute/tags [Author] - 0xsha [License] - MIT [Description] - Awesome cloud enumerator A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. [Dependencies] - Go |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014223)
sbrun 2021-02-17 10:13 |
version 1.0.7-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6975 | [Kali Linux] General Bug | minor | have not tried | 2021-01-04 11:04 | 2021-02-17 09:56 |
Reporter: | mantisjr | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Unable to start protonvpn | ||||
Description: |
After update from version 2020.3 to 4 I'm not able to start protonvpn from terminal any more. (see error message in screenshot) Thanks for your help! |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Bildschirmfoto von 2021-01-04 11-50-52.png (487,011 bytes) 2021-01-04 11:04 https://bugs.kali.org/file_download.php?file_id=1982&type=bug |
||||
Notes | |
(0014222)
mantisjr 2021-02-17 09:56 |
solved now |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7051 | [Kali Linux] General Bug | major | always | 2021-02-14 19:36 | 2021-02-14 19:36 |
Reporter: | El Messia | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Linux not found device | ||||
Description: |
Hello everyone, i'm trying to install Kali linux for five days in a row without succeeding. I ran the USB through boot to starting the installation and after loading there's this screen with " ethernet card hardware not found error. If you know the driver name that is required , select from the list" . I can't found that in the list and when i try to select any drive it returns to the same page and nothing happening. Help me please to fix this problem. I tried to install it without that card also but i can't log on my network and the system can't get eth0 and wlan0 in iwconfig command. Thank you who can help me, hope to fix this problem as soon as possible. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
WhatsApp Image 2021-02-14 at 20.18.50.jpeg (154,906 bytes) 2021-02-14 19:36 https://bugs.kali.org/file_download.php?file_id=2014&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7050 | [Kali Linux] Kali Package Bug | major | have not tried | 2021-02-13 19:43 | 2021-02-14 09:09 |
Reporter: | Hmctrypz | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Error ISO | ||||
Description: | Installing the iso file causes a major bug issues within the VM box. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014219)
kali-bugreport 2021-02-14 09:09 |
Do you think that this issue contains enough information? (Hint: It doesn't) See e.g. https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/ what info is required / should be provided for the Kali team. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7039 | [Kali Linux] General Bug | major | always | 2021-02-07 07:35 | 2021-02-12 01:55 |
Reporter: | James123 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Linux Freezing Problem | ||||
Description: | The screen becomes unresponsive 2-3 minutes after I started installing a large program on Kali Linux. | ||||
Steps To Reproduce: |
I think change the swappiness settings. sudo sysctl vm.swappiness=30 � I thought it might be 30, but I don't know exactly what. |
||||
Additional Information: | I think Kali Linux needs to be accelerated a little bit more. | ||||
Attached Files: | |||||
Notes | |
(0014207)
Michu 2021-02-09 18:33 |
what ram capacity do you have because in my opinion there is simple tip vm.swappiness=60 if you have 1GB ram vm.swappiness=40 if you have 2GB ram vm.swappiness=20 or 10 which i recommend more if you have 4GB ram or more some people thinks that this parameter needs to have value 0 because it will increase you performance but i recommend 10 because when you do something that is very stressful for hardware your pc might freeze even if you have a lot of ram also i recommend vfs_drop_cache=3 also you can start htop to monitor what program will take most of resources that's what i can help |
(0014217)
thegrounder 2021-02-12 01:55 |
[PROBLEM SOLVED FOR ME] 2020.4 VERSION it freezes for 5min, after many tries the problem is solved i installed GPU driver (i've GTX 660) ALL WORKS GOOD NOW ./Sorry for m english |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7049 | [Kali Linux] General Bug | crash | sometimes | 2021-02-11 11:50 | 2021-02-11 11:50 |
Reporter: | cybertej | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Task bar, Minimize, Maximize and close buttons disappeared - Virtual Box VM | ||||
Description: |
Hello Team, I have installed kali 2020.4 on the virtual box. If I power on the machine after background wallpaper load Taskbar, Maximize, Minimize and close buttons disappearing. It won't come back until power-off and on again but that too not sure. sometimes it is disappearing after a long period of working hours. Kindly help |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
image.png (299,779 bytes) 2021-02-11 11:50 https://bugs.kali.org/file_download.php?file_id=2013&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7048 | [Kali Linux] Kali Package Bug | minor | always | 2021-02-11 01:06 | 2021-02-11 01:06 |
Reporter: | xihh87 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Installing `kali-win-kex` on WSL2 fails | ||||
Description: |
The test for WSL2 on the package `kali-win-kex` fails as of 2021-02-10, even when using WSL2. Relevant details can be found on this report [1], suggested fix can be found on this merge request [2]. [1]: https://unix.stackexchange.com/questions/633735/installing-kali-win-kex-on-wsl2-fails/633736#633736 [2]: https://gitlab.com/kalilinux/packages/kali-win-kex/-/merge_requests/2 |
||||
Steps To Reproduce: |
On latest windows revision (19042.746), using official instalation instructions [3], installation will fail on kali-win-kex instalation. [3]: https://www.kali.org/docs/wsl/win-kex/ |
||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7031 | [Kali Linux] New Tool Requests | minor | have not tried | 2021-02-02 23:41 | 2021-02-10 13:40 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | WitnessMe - Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra | ||||
Description: |
[Name] - WitnessMe [Version] - N/A [Homepage] - https://github.com/byt3bl33d3r/WitnessMe [Download] - N/A [Author] - byt3bl33d3r [License] - GNU General Public License v3.0 [Description] - Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier. WitnessMe is primarily a Web Inventory tool inspired by Eyewitness, its also written to be extensible allowing you to create custom functionality that can take advantage of the headless browser it drives in the back-end. WitnessMe uses the Pyppeteer library to drive Headless Chromium. [Dependencies] - Python ~ https://github.com/byt3bl33d3r/WitnessMe/blob/master/requirements.txt |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014212)
sbrun 2021-02-10 13:40 |
version 1.5.0+git20201026-0kali1 is in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7043 | [Kali Linux] General Bug | minor | always | 2021-02-09 07:45 | 2021-02-10 08:10 |
Reporter: | 4rt | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | low | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | strike fuzzer not working | ||||
Description: | whenever the spike fuzzer is used via the command generic_send_tcp an "undefined symbol: " error is shown I have tried s_readline(); and s_string(""); in the .spk file, whatever the first command is, is the undefined symbol error shown. I have come across a few other people who have this issue as well so it's not an isolated incident. s_readline and s_string seem to be declared in /usr/share/spike/include/spike.h but I'm not sure where it is defined. I wanted to find an earlier version to try but was unsure where/how to find one, as the only one available in the repository is 2.9, probably the most recent build. | ||||
Steps To Reproduce: | generic_send_tcp ipaddress port script.spk skipvar skipstr; with s_readline(); or s_string(""); in the script.spk file included in the command | ||||
Additional Information: |
I have come across multiple other people who are having this issue so I don't believe I am an isolated incident Only one version, the bad one, is available in the official kali repository |
||||
Attached Files: | |||||
Notes | |
(0014205)
4rt 2021-02-09 07:51 |
Forgive/excuse me for sending a technical issue contact request on the official kali website before posting here, was really tired searching for solutions to the point I have brain fog and didn't think to post here before contact over official website request form. Found a couple other people reporting the same issue on a youtube tutorial, all within the last couple weeks so I assume this is an issue with the most recent release/repository release/update and also making me not an isolated incident. |
(0014206)
sbrun 2021-02-09 17:35 |
I just uploaded a new version 2.9-1kali8 with a fix for the issue. It will be available in a few hours on the Kali mirrors. Please test it and let us know if it works for you. |
(0014208)
4rt 2021-02-09 18:34 |
It has been fixed! Thank you! |
(0014211)
sbrun 2021-02-10 08:10 |
fixed in version version 2.9-1kali8 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7045 | [Kali Linux] General Bug | major | always | 2021-02-09 23:37 | 2021-02-10 01:01 |
Reporter: | zalupakonya | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | impossible to login in live system/// | ||||
Description: |
hi, i update just now from 2018build becouse i change PC. i already dont like new rules with "privacy" for nothing.. but main problem i get is impossible to login in live system/// i try 2020.2 upd on 2020.4 and get same.. and yes i do google and know that there is new kali/kali password. im not stupid. it dont work from box anymore, that annoyng. please upload 2018 iso with updated core to support new hardware, its be nice... |
||||
Steps To Reproduce: |
load to live system wait 10 min or click "lock" icon in right upper corner try to login with kali/kali. |
||||
Additional Information: |
it also same on 2020.2 it works normal in 2018. |
||||
Attached Files: | |||||
Notes | |
(0014209)
steev 2021-02-09 23:41 |
You may be running into a visual bug - when you go to log in, there is sometimes a space at the beginning of either the username or password entry box, though it's hard to see if that is the case. Could you check that the username and password do not have a space at the beginning? I cannot reproduce the issue here on any of the architectures we support with a live image. |
(0014210)
zalupakonya 2021-02-10 01:01 |
no, there were no spaces. I tried both "lock" and full logoff, and entered login and pass from zero.. but at that moment that I was shoot a video, i was able to successfully login. rebooted 4 times, and the bug didn’t appear anymore .. I don’t understand what it’s connected with .. I rebooted for 2020.2 4 times, only for today, and +5 more times before downloading the update. after updated to 2020.4 and rebooted for another twice, but the bug remained .. but now it's gone .. I don’t know how it works. maybe vram .. but in 2020.2 it was for sure, since repeated many times. I hope it doesn't come back again soon at the worst moment ... |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7037 | [Kali Linux] General Bug | major | always | 2021-02-07 06:51 | 2021-02-09 01:16 |
Reporter: | James123 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | "Airmon-ng" error in Kali linux 2020.4 release | ||||
Description: |
When I type airmon-ng start wlan0, the monitor seems to be in mode, so the internet goes. Then when I type iwconfig or ifconfig, the monitor is not in mode. When I type Airmon-ng stop wlan0mon, I get the following error: Requested device "wlan0mon" does not exist. Run / usr / sbin / airmon-ng without any arguments to see available interfaces. By the way, Kali was running smoothly in Linux 2020.3 version. |
||||
Steps To Reproduce: | I do not know. | ||||
Additional Information: | Thank you from now :) | ||||
Attached Files: | |||||
Notes | |
(0014204)
atdtphreaker 2021-02-09 01:16 |
I've this issue as well. Thank you_ |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7042 | [Kali Linux] General Bug | block | always | 2021-02-07 22:28 | 2021-02-08 16:47 |
Reporter: | vik001 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | NetworkManager.service - Network Manager is killed | ||||
Description: | after upgrade the system my networkmanager is not running i tried many ways to run it reinstall networkmanager via usb theatering but nothing works out my networking is enable but networkmanager is not responding | ||||
Steps To Reproduce: |
service Network manager start service NetworkManager status ● NetworkManager.service - Network Manager Loaded: loaded (/lib/systemd/system/NetworkManager.service; enabled; vendor preset: enabled) Active: failed (Result: signal) since Mon 2021-02-08 03:49:05 IST; 384ms ago Docs: man:NetworkManager(8) Process: 3470 ExecStart=/usr/sbin/NetworkManager --no-daemon (code=killed, signal=SEGV) Main PID: 3470 (code=killed, signal=SEGV) CPU: 254ms Feb 08 03:49:05 kali systemd[1]: NetworkManager.service: Scheduled restart job, restart counter is at 5. Feb 08 03:49:05 kali systemd[1]: Stopped Network Manager. Feb 08 03:49:05 kali systemd[1]: NetworkManager.service: Start request repeated too quickly. Feb 08 03:49:05 kali systemd[1]: NetworkManager.service: Failed with result 'signal'. Feb 08 03:49:05 kali systemd[1]: Failed to start Network Manager. |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014200)
steev 2021-02-08 06:40 |
What type of install and hardware is this? I can't reproduce the issue here, and I've tried on amd64, arm64 and armhf. $ apt policy network-manager network-manager: Installed: 1.28.0-2+b1 Candidate: 1.28.0-2+b1 |
(0014201)
vik001 2021-02-08 09:07 |
network-manager: Installed: 1.28.0-2+b1 Candidate: 1.28.0-2+b1 Version table: *** 1.28.0-2+b1 500 500 http://http.kali.org/kali kali-rolling/main amd64 Packages 500 http://ftp.de.debian.org/debian sid/main amd64 Packages 100 /var/lib/dpkg/status 1.6.2-3+deb9u2 500 500 http://deb.debian.org/debian oldstable/main amd64 Packages please give me the solution of this bug i can not start my network manager |
(0014202)
steev 2021-02-08 15:58 |
I don't have a solution because I can't reproduce the issue here. We need to know why it's segfaulting there. SIGSEGV is automatically sent by the kernel if a process does something with memory it shouldn't have done - can you check the output of "dmesg" to see if there is any output related to the segfaults? As a side note: you really shouldn't enable debian repositories, and it is possible that you somehow have incompatible dependencies installed now. |
(0014203)
vik001 2021-02-08 16:47 |
NetworkManager[814]: segfault at 7ffec13dbb10 ip 00007f74e7fdb507 sp 00007ffec13dbb10 error 6 in libc-2.31.so[7f74e7f30000+14b000] [ 44.553766] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04 [ 45.676293] NetworkManager[937]: segfault at 7fff8d34da20 ip 00007f5599f1d507 sp 00007fff8d34da20 error 6 in libc-2.31.so[7f5599e72000+14b000] [ 45.676302] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04 [ 47.527159] NetworkManager[943]: segfault at 7ffcd0e14900 ip 00007fb7f4e0b507 sp 00007ffcd0e14900 error 6 in libc-2.31.so[7fb7f4d60000+14b000] [ 47.527168] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04 [ 48.235339] NetworkManager[952]: segfault at 7ffdb59dcff0 ip 00007fbfce350507 sp 00007ffdb59dcff0 error 6 in libc-2.31.so[7fbfce2a5000+14b000] [ 48.235348] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04 [ 48.952750] NetworkManager[960]: segfault at 7ffc1d5e4a70 ip 00007ff439b8f507 sp 00007ffc1d5e4a70 error 6 in libc-2.31.so[7ff439ae4000+14b000] [ 48.952759] Code: 41 f6 ff e8 3b d1 03 00 b8 fe ff ff ff e9 66 fa ff ff 90 41 57 49 89 f7 41 56 41 55 41 54 55 53 48 81 ec e8 28 00 00 44 8b 37 <48> 89 14 24 89 4c 24 14 44 89 44 24 1c 4c 89 4c 24 28 64 48 8b 04 [ 49.694928] NetworkManager[965]: segfault at 7ffd0d119a00 ip 00007f6021d46507 sp 00007ffd0d119a00 error 6 in libc-2.31.so[7f6021c9b000+14b000] i dont know about this?? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7041 | [Kali Linux] Kali Package Bug | major | have not tried | 2021-02-07 17:25 | 2021-02-07 17:25 |
Reporter: | Whiteangel | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Lkm trojan and rootkit | ||||
Description: |
I downloaded kali from official website using torrent. Did scan by rkhunter got 3 rootkit and 3 warning And chkrootkit told lkm trojan. How to download without virus. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7038 | [Kali Linux] General Bug | major | always | 2021-02-07 07:12 | 2021-02-07 07:12 |
Reporter: | James123 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | low | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Linux Clock problem | ||||
Description: | When Kali Linux is connected to the internet, its clock is not set automatically. That's why your watch gives the wrong error. | ||||
Steps To Reproduce: |
My manual method is: Step 1 => I open the command line Step 2 => I'm writing "service ntp stop". Step 3 => Then I write "ntpd -gq". The final step => I'm writing "service ntp start". |
||||
Additional Information: | If there are more important problems with Kali Linux, you can fix them first. | ||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6917 | [Kali Linux] Queued Tool Addition | major | always | 2020-12-09 02:44 | 2021-02-06 18:03 |
Reporter: | tjnull | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | confirmed | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kali Linux Cloud Pentesting Metapackage | ||||
Description: |
As more corporations are moving there systems/networks in the cloud, pentesters will need to have a set of cloud tools to conduct assessments against a variety of cloud environments. Since Kali allows you to implement the OS in AWS, Azure, and in other places, they do not have the following cloud tools packaged. With that being said, I think the following tools should be packaged into Kali Linux to support the pentesters who assess these cloud environments for there clients. Here are the following tools: kubectl Witnessme [https://github.com/byt3bl33d3r/WitnessMe] postman [https://www.postman.com/downloads/] insomnia [https://support.insomnia.rest/article/90-installation#linux] pacu [https://github.com/RhinoSecurityLabs/pacu] peirates [https://github.com/inguardians/peirates] gitleaks [https://github.com/zricethezav/gitleaks] Cloudbrute [https://github.com/0xsha/cloudbrute] |
||||
Steps To Reproduce: |
Steps to install the tools (Some tools already have the packages in there that needed to be ported into the repo): Kubectl: sudo apt-get update && sudo apt-get install -y apt-transport-https gnupg2 curl curl -s https://packages.cloud.google.com/apt/doc/apt-key.gpg | sudo apt-key add - echo "deb https://apt.kubernetes.io/ kubernetes-xenial main" | sudo tee -a /etc/apt/sources.list.d/kubernetes.list sudo apt-get update sudo apt-get install -y kubectl Witnessme: python3 -m pip install --user pipx pipx install witnessme Postman: Already have a deb package made that can be downloaded and added Insomnia: Already have a deb package made that can be downloaded and added Pacu: git clone https://github.com/RhinoSecurityLabs/pacu cd pacu bash install.sh python3 pacu.py Peirates: golang will be needed for the installation https://github.com/inguardians/peirates/releases gitleaks: https://github.com/zricethezav/gitleaks/releases apt install golang GO111MODULE=on go get github.com/zricethezav/gitleaks/v7 cloudbrute: https://github.com/0xsha/cloudbrute/releases |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014057)
g0tmi1k 2021-01-08 13:33 |
This needs to be broken down to individual requests rather than a bulk request |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7036 | [Kali Linux] Kali Package Bug | tweak | always | 2021-02-05 15:54 | 2021-02-05 15:54 |
Reporter: | gvygytt | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | I cannot install and start the NetworkManager | ||||
Description: |
So, my Kali Linux 2020.4 is in Virtual Box and when I want to correct proxy, I cannot open menu of WiFi or NetworkManager. When I try install NetworkManager I see that file not founding. I think problem in that I have not WiFi adapter with monitoring function. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7035 | [Kali Linux] Kali Package Bug | major | have not tried | 2021-02-05 10:04 | 2021-02-05 10:05 |
Reporter: | abhimanyu | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | i cannot open zenmap | ||||
Description: |
Could not import the zenmapGUI.App module: 'No module named gtk'. I checked in these directories: /usr/bin /usr/share/offsec-awae-wheels/soupsieve-1.9.5-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/beautifulsoup4-4.9.1-py2-none-any.whl /usr/share/offsec-awae-wheels/certifi-2020.4.5.1-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/pycparser-2.20-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/colorama-0.4.3-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/urllib3-1.25.9-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/backports.functools_lru_cache-1.6.1-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/enum34-1.1.10-py2-none-any.whl /usr/share/offsec-awae-wheels/pyOpenSSL-19.1.0-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/ipaddress-1.0.23-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/chardet-3.0.4-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/PySocks-1.7.1-py27-none-any.whl /usr/share/offsec-awae-wheels/requests-2.23.0-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/ply-3.11-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/six-1.15.0-py2.py3-none-any.whl /usr/share/offsec-awae-wheels/idna-2.9-py2.py3-none-any.whl /usr/share/cffi-wheels/py-1.8.1-py2.py3-none-any.whl /usr/share/cffi-wheels/setuptools-44.1.0-py2.py3-none-any.whl /usr/lib/python2.7 /usr/lib/python2.7/plat-x86_64-linux-gnu /usr/lib/python2.7/lib-tk /usr/lib/python2.7/lib-old /usr/lib/python2.7/lib-dynload /usr/local/lib/python2.7/dist-packages /usr/lib/python2.7/dist-packages /usr/lib/python2.7/dist-packages /usr/lib/python2.7/dist-packages/gtk-2.0 /usr/lib/python2.6/site-packages If you installed Zenmap in another directory, you may have to add the modules directory to the PYTHONPATH environment variable. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7034 | [Kali Linux] Feature Requests | block | have not tried | 2021-02-05 03:44 | 2021-02-05 03:44 |
Reporter: | N357 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | error: Creating repo: linkat: Operation not permitted | ||||
Description: |
Hello, I'm N357 a newbie. I want to install tor browser when the process is blocked by this "error: Creating repo: linkat: Operation not permitted", # flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo error: Creating repo: linkat: Operation not permitted Thanks in advance. BTW I'm using kali nethunter rootless. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7033 | [Kali Linux] Kali Package Bug | minor | have not tried | 2021-02-05 00:35 | 2021-02-05 00:35 |
Reporter: | N357 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | ERROR: ld.so: object '/usr/lib/aarch64-linux-gnu/libgcc_s.so.1' from LD_PRELOAD cannot be preloaded (cannot open shared object f | ||||
Description: |
ERROR: ld.so: object '/usr/lib/aarch64-linux-gnu/libgcc_s.so.1' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. Good Day, Hello there, I'm pretty noob in this kali nethunter rootless but I'm using kali linux OS since I was 10. It was new to me to have a Linux on my sm-A600G/ds, Android 10 unrooted and and not running in custom Android OS. This ERROR is always popping up to my terminal but it works fine even though it was always popping up at the start of terminal and root. Everything is working well and all the tools are working properly. This is just like an eyesore to me. Please, I need help to fix this I don't really know how to fix it not even in my books can help. Thank you in Advance ;-). |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7027 | [Kali Linux] General Bug | major | always | 2021-02-02 13:37 | 2021-02-04 17:33 |
Reporter: | corporatejeece | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | No WIFI on Raspberry Pi 400 | ||||
Description: | Newest 2020.4 and 2020.3, tried both 32 and 64 bit versions for Raspberry Pi 400, WLAN on Raspberry Pi 400 does not work after boot. I did apt upgrade and dist upgrade using ethernet connection, no change. Ifconfig does not list a wireless adapter and cannot activate wlan0. hashes of downloaded images were correct | ||||
Steps To Reproduce: | install kali from scratch | ||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014199)
r3trop 2021-02-04 17:33 |
Same issue here.. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6922 | [Kali Linux] Kali Package Bug | major | always | 2020-12-10 10:41 | 2021-02-04 07:55 |
Reporter: | RoseDeSable | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Kerberos doesn't work for squid | ||||
Description: |
Hello, after the last distribution-upgrade this days my squid has problems to take a kerberos-service-ticket for the proxy in the lan. The Authentication Task is correctly started: ├─3079 (negotiate_kerberos_auth) -d -s HTTP/<lan.proxy>@realm In wireshark I see, that the receiving of the initialization ticket is ok. But the debug-log show me , that problems with the gssapi exist. 2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(522) peer_proxy_negotiate_auth: Creating credential cache for userid@realm 2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(539) peer_proxy_negotiate_auth: Import gss name 2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(546) peer_proxy_negotiate_auth: Initialize gss security context 2020/12/10 09:32:22.687 kid1| 11,5| peer_proxy_negotiate_auth.cc(177) check_gss_err: gss_init_sec_context()failed: Unspecified GSS failure. Minor code may provide more information. SPNEGO cannot find mechanisms to negotiate. The test-program negotiate_kerberos_auth_test correctly gives me a token for the proxy. Bye Rose |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014197)
RoseDeSable 2021-02-04 07:55 |
Because the problem also further exists in squid 4.13-1+b1, I opened an issue in the developers page https://bugs.squid-cache.org/show_bug.cgi?id=5103 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
5861 | [Kali Linux] Queued Tool Addition | minor | always | 2019-12-03 14:56 | 2021-02-03 14:16 |
Reporter: | XerainHouse | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Zenmap - GUI Nmap | ||||
Description: | Unable to download zenmap via apt from Kali repo. Zenmap is also missing from pkg.kali.org. | ||||
Steps To Reproduce: |
Created a fresh install of Kali Linux using the present Gnome and standard 64bit live version. After install I ran $apt update and $apt install zenmap only to receive a missing package error. Error message included that the package was mentioned but non-existent and had been replaced with ndiff. |
||||
Additional Information: |
Checked Kali Docs and https://pkg.kali.org/pkg/zenmap appears to be missing. Though it is still mentioned under the information gathering meta-package. I was able to go to the nmap site, download the zenmap rpm, and use alien to convert it to a deb file and install it via the software installer. Appears to function normally via this method. Alien can be downloaded via, $apt install alien. This has been tested with the 2019.4 releases and source list has been verified to use correct Kali rolling repo with an older release of Kali and pdfs from Kali Docs. |
||||
Attached Files: | |||||
Notes | |
(0011571)
XerainHouse 2019-12-04 14:03 |
Note: It seems that Zenmap may no longer be maintained somewhere farther up the line. This is from the Kali forum reported by Gamb1t in: https://forums.kali.org/showthread.php?45985-Can-t-seem-to-find-zenmap-other-tools&highlight=zenmap There does seem to be upwards of four years since an update in the Zenmap section of the Nmap github, minus a cleanup in some translation files. https://github.com/nmap/nmap I've been unable to find a reason, other than lack of updates on Zenmap, for it to be removed considering it only really functions as a GUI for Nmap. If Zenmap is no longer viable then this issue should be regarded as site maintenance for the purpose of updating https://tools.kali.org. If there is no issue regarding Zenmap be it compatibility, security, or usefulness then I would ask to be notified or have a tool request added so that it can be reintroduced as a tool in the Kali repo. |
(0011916)
rhertzog 2020-01-14 07:40 |
The real issue is that it's still using Python 2 and that nobody upstream is doing the work to port it to Python 3. Debian is removing any Python 2 code that has not been ported... so for now your custom package is still working as Python 2 is still available in Debian but once everything has been dropped, this will no longer be the case. Someone should take the time to port it and submit the patch to the upstream developers. See how it happened on the Debian side: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883161 |
(0011942)
XerainHouse 2020-01-18 10:17 |
I found the relevant bug report within Nmap's Github so the issue can be better tracked within the report: https://github.com/nmap/nmap/issues/1176 Hopefully we can get an updated version before python 2 is dropped from the Debian repository completely. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7017 | [Kali Linux] Kali Package Bug | major | always | 2021-01-30 09:54 | 2021-02-02 09:37 |
Reporter: | cohst | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | duplicate | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | wpscan does not start after upgrade | ||||
Description: |
After upgrade via apt-get dist-upgrade wpscan fails to start with the following message: ┌──(cohst@kali-linux)-[~] └─$ wpscan -h Traceback (most recent call last): 12: from /usr/bin/wpscan:23:in `<main>' 11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path' 10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize' 9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path' 8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies' 4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1400:in `block in activate_dependencies' /usr/lib/ruby/vendor_ruby/rubygems/dependency.rb:309:in `to_specs': Could not find 'nokogiri' (~> 1.10.9) - did find: [nokogiri-1.11.1] (Gem::MissingSpecVersionError) Checked in 'GEM_PATH=/home/cohst/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' , execute `gem env` for more information 12: from /usr/bin/wpscan:23:in `<main>' 11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path' 10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize' 9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path' 8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies' 4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1399:in `block in activate_dependencies' /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1402:in `rescue in block in activate_dependencies': Could not find 'nokogiri' (~> 1.10.9) among 157 total gem(s) (Gem::MissingSpecError) Checked in 'GEM_PATH=/home/cohst/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' at: /usr/share/rubygems-integration/all/specifications/cms_scanner-0.13.0.gemspec, execute `gem env` for more information ┌──(cohst@kali-linux)-[~] └─$ |
||||
Steps To Reproduce: | call wpscan -h | ||||
Additional Information: | |||||
Attached Files: |
kali wpscan error.JPG (178,171 bytes) 2021-01-30 09:54 https://bugs.kali.org/file_download.php?file_id=2007&type=bug |
||||
Notes | |
(0014178)
RiRa12621 2021-02-01 16:19 |
Looks like a duplicate of https://bugs.kali.org/view.php?id=7023 |
(0014184)
sbrun 2021-02-02 09:37 |
fixed with new ruby-cms-scanner version 0.13.1-0kali1 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7023 | [Kali Linux] Kali Package Bug | minor | always | 2021-01-31 21:12 | 2021-02-02 09:37 |
Reporter: | product_hardhat | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | ruby-cms-scanner applying kali patch that breaks wpscan | ||||
Description: |
installed wpscan via apt-get. immediately got the following when running Traceback (most recent call last): 12: from /usr/bin/wpscan:23:in `<main>' 11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path' 10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize' 9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path' 8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies' 4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1400:in `block in activate_dependencies' /usr/lib/ruby/vendor_ruby/rubygems/dependency.rb:309:in `to_specs': Could not find 'nokogiri' (~> 1.10.9) - did find: [nokogiri-1.11.1] (Gem::MissingSpecVersionError) Checked in 'GEM_PATH=/home/vmuser/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' , execute `gem env` for more information 12: from /usr/bin/wpscan:23:in `<main>' 11: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `activate_bin_path' 10: from /usr/lib/ruby/vendor_ruby/rubygems.rb:301:in `synchronize' 9: from /usr/lib/ruby/vendor_ruby/rubygems.rb:302:in `block in activate_bin_path' 8: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 7: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 6: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 5: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1406:in `block in activate_dependencies' 4: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1370:in `activate' 3: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `activate_dependencies' 2: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1388:in `each' 1: from /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1399:in `block in activate_dependencies' /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1402:in `rescue in block in activate_dependencies': Could not find 'nokogiri' (~> 1.10.9) among 80 total gem(s) (Gem::MissingSpecError) Checked in 'GEM_PATH=/home/vmuser/.local/share/gem/ruby/2.7.0:/var/lib/gems/2.7.0:/usr/local/lib/ruby/gems/2.7.0:/usr/lib/ruby/gems/2.7.0:/usr/lib/x86_64-linux-gnu/ruby/gems/2.7.0:/usr/share/rubygems-integration/2.7.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.7.0' at: /usr/share/rubygems-integration/all/specifications/cms_scanner-0.13.0.gemspec, execute `gem env` for more information missing thing is installed $ dpkg --get-selections | grep nokogiri ruby-nokogiri install |
||||
Steps To Reproduce: |
- install wpscan - run it against any wp install |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014173)
steev 2021-01-31 21:35 |
I can't reproduce this here - have you run apt-get update? sudo apt-get install wpscan Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ruby-mime ruby-mini-exiftool ruby-net-http-digest-auth ruby-spider Use 'sudo apt autoremove' to remove them. The following additional packages will be installed: ruby-cms-scanner ruby-nokogiri The following NEW packages will be installed: ruby-cms-scanner ruby-nokogiri wpscan 0 upgraded, 3 newly installed, 0 to remove and 0 not upgraded. Installing wpscan pulls in ruby-nokogiri |
(0014174)
steev 2021-01-31 21:51 (Last edited: 2021-02-01 00:01) |
Sorry - misread the error message - it seems wpscan doesn't like ruby-nokogiri 1.11.1. On a system that still has ruby-nokogiri 1.10.9+dfsg-1+b1 installed, wpscan runs fine. A workaround would be to download the 1.10 release from http://kali.download/kali/pool/main/r/ruby-nokogiri/ and install it - then you'd want to either apt-mark hold it, or re-install the older version until a fixed ruby-cms-scanner release happens. |
(0014175)
Erwan.lr 2021-02-01 11:23 |
WPScan dev here, since CMSScanner 0.12.2, Nokogiri 1.11 is fetched (https://github.com/wpscanteam/CMSScanner/blob/v0.12.2/cms_scanner.gemspec#L23), so this should not happen. I've downloaded the latest Kali (64bit), WPScan was at 3.8.10, updated it with `sudo apt-get update && sudo apt-get install wpscan` and then ran WPScan (v3.8.13) w/o any issue. |
(0014176)
steev 2021-02-01 14:08 |
Thanks for replying Erwan, but here, I'm seeing the same issue as the original poster on both x86_64 and arm64. steev@c630:~$ apt policy wpscan wpscan: Installed: 3.8.13-0kali1 Candidate: 3.8.13-0kali1 Version table: *** 3.8.13-0kali1 500 500 https://kali.download/kali kali-rolling/non-free arm64 Packages 500 https://kali.download/kali kali-dev/non-free arm64 Packages 100 /var/lib/dpkg/status steev@c630:~$ apt policy ruby-nokogiri ruby-nokogiri: Installed: 1.11.1+dfsg-1 Candidate: 1.11.1+dfsg-1 Version table: *** 1.11.1+dfsg-1 500 500 https://kali.download/kali kali-rolling/main arm64 Packages 500 https://kali.download/kali kali-dev/main arm64 Packages 100 /var/lib/dpkg/status steev@c630:~$ apt policy ruby-cms-scanner ruby-cms-scanner: Installed: 0.13.0-0kali1 Candidate: 0.13.0-0kali1 Version table: *** 0.13.0-0kali1 500 500 https://kali.download/kali kali-rolling/main arm64 Packages 500 https://kali.download/kali kali-dev/main arm64 Packages 100 /var/lib/dpkg/status |
(0014177)
Erwan.lr 2021-02-01 15:13 |
Looking at the `/usr/share/rubygems-integration/all/specifications/cms_scanner-0.13.0.gemspec`, some version constraints are wrong in there, e.g: `s.add_runtime_dependency(%q<nokogiri>.freeze, ["~> 1.10.9"])` `s.add_runtime_dependency(%q<yajl-ruby>.freeze, [">= 1.3.1"])` Even though the versions are correct at https://gitlab.com/kalilinux/packages/ruby-cms-scanner/-/blob/kali/master/cms_scanner.gemspec So it seems that you have something (like a patching script?) changing the versions before installing the gem. Actually, I just found it: https://gitlab.com/kalilinux/packages/ruby-cms-scanner/-/blob/kali/master/debian/patches/change-minimal-required-version.patch |
(0014179)
steev 2021-02-01 18:20 |
Thanks, assigned the bug to Sophie to get that patch updated :) |
(0014183)
sbrun 2021-02-02 09:36 |
fixed in version ruby-cms-scanner version 0.13.1-0kali1 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7025 | [Kali Linux] Kali Websites & Docs | minor | have not tried | 2021-02-02 09:24 | 2021-02-02 09:24 |
Reporter: | sbrun | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Update metagoofil information | ||||
Description: |
When switching to a version supporting Python 3, the script changed and the documentation is no longer up to date: see 7005 Please update https://tools.kali.org/information-gathering/metagoofil |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7021 | [Kali Linux] General Bug | minor | always | 2021-01-30 20:12 | 2021-01-30 20:12 |
Reporter: | wefosi9333 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | very bad loop login | ||||
Description: |
very very bad loop login after "changing cursor size to "LARGEST"" unfortunately almost cant fix this with solutions in the internet just like this "https://askubuntu.com/questions/1222305/login-loop-after-changing-cursor-size" and has this:"https://bugs.kali.org/view.php?id=6735" features 5.5.0-kali2-amd64 0000001 SMP Debian 5.5.17-1kali1 (2020-04-21) x86_64 GNU/Linux resolution 1920x1080 >>>PLEASE PLEASE I JUST ASK YOU SOLVE THIS FOR 2021.1 RELEASE<<< |
||||
Steps To Reproduce: | just in "settings > universal access > cursor size >>> click on "largest" | ||||
Additional Information: |
i solved this with this: METHOD1: (lose Desktop settings) 1) in login screen press ctrl+alt+f3 to access ssh 2)login with your user pass 3)rm /.config/dconf/user then you can login to your account normally، but all of your dektop settings and other customization gone .......................................... BEST TO DO>>> METHOD2:(without lose desktop settings) 1) in login screen press ctrl+alt+f3 to access ssh 2)login with your user pass 3)dconf reset /org/gnome/desktop/interface/cursor-size with do this you can login now but after that logged in you have to open "Tweaks" and "enable extension" |
||||
Attached Files: |
Screenshot from 2021-01-30 23-12-50.png (174,850 bytes) 2021-01-30 20:12 https://bugs.kali.org/file_download.php?file_id=2009&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6897 | [Kali Linux] General Bug | major | sometimes | 2020-12-03 07:33 | 2021-01-30 01:43 |
Reporter: | NewUserTim | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Problem with wifi on dual-boot. | ||||
Description: |
I am a new linux user, and I'm sure this issue has been noted here.(at least it should have been) but I can't find it if it is. I've been ALL over the internet trying to find a fix for this. Apparently a lot of people have this same issue. I have yet to find a solution. wireless card: Intel(R) Dual Band Wireless-AC 3165 problem: sometimes it reads the card and the wifi works, other times it does not. sometimes a reboot remedies the issue, sometimes it doesn't. Apparently from what I read this is a common problem with this type of card. If it reads the card and works fine for a day or two, then after a reboot it starts again. It might work for the first 3 minutes after startup, then goes down. It says its connected but isn't. after about 5 minutes it fails to show any connection at all. I get this error: failed to wake nic for hcmd Ive tried ip link set wlan0 down/up, and just about every other suggestion i could find. doesn't work. I get an input/output error. I've tried just about every thing I can find listed about this. Nothing has worked. I dual boot kali with windows 10. it's not a hardware problem, as it reads it sometimes and for a few minutes after i reboot. and the card works fine with windows. i installed the correct drivers and still the issue persists. Has anyone found a remedy for this or is this a true bug? |
||||
Steps To Reproduce: | Randomly happens. Not sure how to sure-fire reproduce it. | ||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014172)
NewUserTim 2021-01-30 01:43 |
I actually figured out what the problem was. for some reason, the wifi power management is turned on. When i Turned it off i had 0 issue. So I did the following. iwconfig wlan0 wlan0 IEEE 802.11 ESSID: Mode:Managed Frequency:5.26 GHz Bit Rate=6 Mb/s Tx-Power=20 dBm Retry short limit:7 RTS thr:off Fragment thr:off Power Management:on <------- Link Quality=56/70 Signal level=-54 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:3 Missed beacon:0 Create this file, if you did not have it before. sudo nano /etc/NetworkManager/conf.d/default-wifi-powersave-on.conf The content of the file: [connection] wifi.powersave = 2 # NM_SETTING_WIRELESS_POWERSAVE_DEFAULT (0): use the default value # NM_SETTING_WIRELESS_POWERSAVE_IGNORE (1): don't touch existing setting # NM_SETTING_WIRELESS_POWERSAVE_DISABLE (2): disable powersave # NM_SETTING_WIRELESS_POWERSAVE_ENABLE (3): enable powersave Then I restarted NetworkManager (sudo systemctl restart NetworkManager) Hope this helps someone else. I see people all over the place having my same problem. This worked for me. Not saying it will work for everyone. If there is a duplicate issue/fix I apologize. I have not seen it. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6987 | [Kali Linux] General Bug | major | always | 2021-01-11 06:16 | 2021-01-29 23:11 |
Reporter: | gcngov | Platform: | |||
Assigned To: | daniruiz | OS: | |||
Priority: | high | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2021.1 | ||
Target Version: | |||||
Summary: | WIndow key not functional | ||||
Description: | Previously window key used to list applications dropdown list, after update i am unable to add list application using window botton. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014102)
daniruiz 2021-01-11 10:28 |
The new xfce version from kali does not require xcape for the Win key binding, but inside your ~/.config directory you still maintain the previous version of the xfce-keybinding settings, which depends on xcape. You can either install xcape again (which was probably removed with `apt autoremove`), or remove the old setting file ~/.config/xfce4/xfconf/xfce-perchannel-xml/xfce4-keyboard-shortcuts.xml and reboot |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6829 | [Kali Linux] Feature Requests | feature | have not tried | 2020-11-09 07:40 | 2021-01-29 13:47 |
Reporter: | sahil2002 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Calamares installer | ||||
Description: | Please include Calamares installer, so that we can install Kali Linux from live user. | ||||
Steps To Reproduce: | |||||
Additional Information: | Some people have problem with installing Kali Linux from BIOS. Calamares installer will help those people to overcome this problem. | ||||
Attached Files: |
graphical_mode (67,751 bytes) 2020-11-09 07:40 https://bugs.kali.org/file_download.php?file_id=1937&type=bug text_mode (130,803 bytes) 2020-11-09 07:40 https://bugs.kali.org/file_download.php?file_id=1938&type=bug |
||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6834 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-11-11 23:55 | 2021-01-29 13:44 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | DNSProb - perform multiple dns queries | ||||
Description: |
[Name] - dnsprobe [Version] - v1.0.3 [Homepage] - https://github.com/projectdiscovery/dnsprobe [Download] - https://github.com/projectdiscovery/dnsprobe/tags [Author] - projectdiscovery.io [License] - MIT [Description] - DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. [Dependencies] - GoLang |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014167)
g0tmi1k 2021-01-29 13:43 |
Note - This project is discontinued. New updates and fixes will be pushed to dnsx. https://github.com/projectdiscovery/dnsx |
(0014168)
g0tmi1k 2021-01-29 13:44 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6835 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-11-11 23:58 | 2021-01-29 13:43 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | naabu - A fast port scanner written in go | ||||
Description: |
[Name] - naabu [Version] - 2.0.2 [Homepage] - https://github.com/projectdiscovery/naabu [Download] - https://github.com/projectdiscovery/naabu/tags [Author] - projectdiscovery.io [License] - MIT [Description] - A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests [Dependencies] - GoLang [Similar tools] - Nmap |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014166)
g0tmi1k 2021-01-29 13:43 |
@kali-team, please could this be packaged up. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6836 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-11-12 00:01 | 2021-01-29 13:43 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | nuclei - targeted scanning based on templates | ||||
Description: |
[Name] - nuclei [Version] - v2.1.1 [Homepage] - https://nuclei.projectdiscovery.io/ [Download] - https://github.com/projectdiscovery/nuclei [Author] - projectdiscovery.io [License] - MIT [Description] - Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. [Dependencies] - GoLang [Similar tools] - DirG, GoBuster |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014165)
g0tmi1k 2021-01-29 13:42 |
@kali-team, please could this be packaged up. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6861 | [Kali Linux] Queued Tool Addition | minor | N/A | 2020-11-22 21:44 | 2021-01-29 13:25 |
Reporter: | j_jito | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | kbd-audio: Tools for capturing and analysing keyboard input paired with microphone capture | ||||
Description: |
[Name] - kbd-audio [Version] - N/A [Homepage] - https://github.com/ggerganov/kbd-audio [Download] - N/A [Author] - Georgi Gerganov @ggerganov [License] - MIT ~ https://github.com/ggerganov/kbd-audio/blob/master/LICENSE [Description] - This is a collection of command-line and GUI tools for capturing and analyzing audio data. [Dependencies] - sudo apt install libsdl2-dev [Similar tools] - N/A [Activity] - Sept 17 2020 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014158)
g0tmi1k 2021-01-29 13:25 |
@kali-team, please could this be packaged up. @author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7011 | [Kali Linux] General Bug | major | always | 2021-01-27 00:30 | 2021-01-27 10:19 |
Reporter: | X0RW3LL | Platform: | |||
Assigned To: | rhertzog | OS: | |||
Priority: | urgent | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit) | ||||
Description: |
As per the vulnerability disclosure: https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit "affects all legacy versions from 1.8.2 to 1.8.31p2 and all stable versions from 1.9.0 to 1.9.5p1 in their default configuration" The current sudo package shipped with the latest Kali package upgrades is 1.9.5p1-1, which is the bullseye vulnerable version: https://security-tracker.debian.org/tracker/CVE-2021-3156 The issue was fixed in sid, sudo version 1.9.5p1-1.1 |
||||
Steps To Reproduce: |
To test if a system is vulnerable or not, login to the system as a non-root user. Run command “sudoedit -s /” If the system is vulnerable, it will respond with an error that starts with “sudoedit:” If the system is patched, it will respond with an error that starts with “usage:” |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014141)
rhertzog 2021-01-27 10:19 |
Fixed version 1.9.5p1-1.1 is in kali-rolling. Version 1.9.5p2-1 will come in a few days after the usual delay due to migration from unstable to testing then to kali-dev and to kali-rolling. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7008 | [Kali Linux] Kali Package Bug | major | always | 2021-01-24 22:15 | 2021-01-26 08:09 |
Reporter: | croacna | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | broken meta package kali-tools-forensics | ||||
Description: |
sudo apt install kali-tools-forensics 100 ⨯ Reading package lists... Done Building dependency tree Reading state information... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: kali-tools-forensics : Depends: plaso but it is not installable Depends: python3-dfvfs but it is not installable Depends: radare2-cutter but it is not going to be installed Depends: rekall-core but it is not installable E: Unable to correct problems, you have held broken packages. ----- using original apt sources |
||||
Steps To Reproduce: |
sudo apt install kali-tools-forensics |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014140)
sbrun 2021-01-26 08:09 |
Thanks for the report. It's now fixed in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7003 | [Kali Linux] General Bug | major | always | 2021-01-21 05:10 | 2021-01-25 19:47 |
Reporter: | Harshad_07 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Desktop Freeze | ||||
Description: | whenever I start kali as a root user, the desktop freezes and no icons only the taskbar is usable can't see the title bar in any of the applications opened. Tried updating and full-upgrade but still, nothing changed | ||||
Steps To Reproduce: | just logging as root makes it happen | ||||
Additional Information: | |||||
Attached Files: |
Screenshot 2021-01-18 215653.jpg (106,948 bytes) 2021-01-21 05:10 https://bugs.kali.org/file_download.php?file_id=2003&type=bug |
||||
Notes | |
(0014136)
Harshad_07 2021-01-22 08:19 |
clearing the saved sessions solved the issue |
(0014139)
Hillander-s 2021-01-25 17:42 |
harshad_07 unfortunately in mine it did not work. I cleaned up saved sections, but it didn't solve the problem. Which command to use? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7009 | [Kali Linux] Kali Package Bug | major | always | 2021-01-25 17:33 | 2021-01-25 17:42 |
Reporter: | felixmarks | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | The Broadcom BCM20702A0 bluetooth driver is missing | ||||
Description: |
In directory: /lib/modules/5.9.0-kali5-amd64/kernel/drivers/bluetooth ... these two files exist: bfusb.ko btusb_old btusb.ko is missing |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7006 | [Kali Linux] Kali Package Bug | minor | always | 2021-01-22 15:26 | 2021-01-22 15:46 |
Reporter: | OS-74160 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | assigned | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | powershell-empire versions 3.6.2 and 3.6.3 require sudo on Kali | ||||
Description: |
Good day. I raised this issue on gitlab about a month ago after raising it with the upstream BC-Security powershell-empire project, who said it was a Kali package maintainer decision. I received no response on gitlab so I'm raising it here in case this is the right place. Since upgrading from 3.6.0-0 to 3.6.2-0, powershell-empire requires sudo. This is a less secure setup than previous. I would prefer to run as an unprivileged user when not using a privileged port, as was possible before. This change/decision is actually a security downgrade. It should be possible to run powershell-empire without sudo, and it shouldn't have to be enforced by not allowing the unprivileged user to do so. Thank you. |
||||
Steps To Reproduce: |
apt upgrade from powershell-empire 3.6.0-0kali1 to 3.6.2-0kali1 run powershell-empire as unprivileged user, as worked before observe the new message and program exit: Please run powershell-empire with sudo: 'sudo powershell-empire' |
||||
Additional Information: |
References: https://github.com/BC-SECURITY/Empire/issues/416 https://gitlab.com/kalilinux/packages/powershell-empire/-/issues/5 |
||||
Attached Files: | |||||
Notes | |
(0014137)
sbrun 2021-01-22 15:46 |
Thanks for the report. I should have answered the Gitlab issue before. We (Kali team) first packaged powershell-empire to use it with or without sudo. But there were issues with this packaging that can't be fixed easily if we run without sudo. That's why now sudo is required. I need to work with upstream to find a solution to run without sudo if they think it's important. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6385 | [Kali Linux] General Bug | minor | always | 2020-05-15 18:21 | 2021-01-21 23:18 |
Reporter: | FarbodLinux | Platform: | |||
Assigned To: | steev | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.2 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | 2020.4 | ||
Target Version: | |||||
Summary: | No USB Keyboard/Mouse on Rasberry Pi 4 | ||||
Description: | Hi there, No USB Keyboard/Mouse on Rasberry Pi 4 after Linux 2020.2 ARM image boot up (I used the website image not the torrent link, I tried it several times on different devices)! Thanks | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0012784)
steev 2020-05-15 18:28 |
Do they come back if you unplug the keyboard/mouse and plug them back in? |
(0012785)
FarbodLinux 2020-05-15 18:41 |
Hi Steev, No! I tried different keyboards and mice, reimage my memory card several times, re-download the image several times, I also tested the old version on the same memory card, which it worked. Hope these help! |
(0012787)
steev 2020-05-15 19:26 |
Which image(s) are you using? |
(0012789)
FarbodLinux 2020-05-15 19:42 |
I am using : 2020.2 ARM image (kali-linux-2020.2-rpi3-nexmon.img) |
(0012791)
steev 2020-05-15 20:16 |
Can you ssh in to the pi (ssh kali@kali) and then run sudo apt update && sudo apt install xserver-xorg-input-libinput && sudo reboot - does that fix the issue for you? |
(0012795)
FarbodLinux 2020-05-15 22:09 |
Hi, Yes it solve the problem, can you please also tell me what was the issue, Steev? |
(0012796)
FarbodLinux 2020-05-15 22:30 |
Is there any new fixed 2020.2 release soon or we should use the driver script for every Rasberry Pi 4 we install this version? |
(0012797)
steev 2020-05-15 23:48 |
The Xorg input driver (what you installed with apt-get install xserver-xorg-input-libinput) was accidentally removed due to some changes last minute. The change was committed to git, no I don't know when it will make it to the website, but yes, I plan to have an updated image sometime within the next week. So yes, you'll need to make the change on any other images you write currently, or you can clone the build scripts and run a build yourself to generate one with the fix. |
(0012798)
FarbodLinux 2020-05-16 00:03 |
Thank you so much for your fast and effective support! Be safe! |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6993 | [Kali Linux] New Tool Requests | minor | have not tried | 2021-01-13 11:00 | 2021-01-21 15:43 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Starkiller - Frontend for PowerShell Empire | ||||
Description: |
[Name] - Starkiller [Version] - 1.5.1 [Homepage] - https://www.bc-security.org/post/an-introduction-to-starkiller [Download] - https://github.com/BC-SECURITY/Starkiller/tags [Author] - BC-SECURITY [License] - MIT ~ https://github.com/BC-SECURITY/Starkiller/blob/master/LICENSE [Description] - Starkiller is a Frontend for Powershell Empire. It is an Electron application written in VueJS. [Dependencies] - Node.js 10+ & Yarn |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014130)
sbrun 2021-01-21 15:43 |
version 1.6.0-kali-0kali3 is now in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6403 | [Kali Linux] Kali Package Bug | minor | always | 2020-05-21 09:33 | 2021-01-20 21:14 |
Reporter: | DrSpy | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.2 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Meterpreter session is closing exactly after 30 Seconds. | ||||
Description: |
Hi, While exploiting using PHP, my sessions are expiring exactly after 30 seconds. I'm using php payload to exploit command injection vulnerability. I even made changes in php.ini to make the session go longer than 30 seconds by changing max_execution_time but still it doesn't work. I'm getting this error "Meterpreter session is not valid and will be closed." Please help me resolve this issue. Setup Details: Kali Linux: 5.6.0-kali1-amd64 (last updated on 2020-05-12) Metasploit: 5.0.89-dev Victim Machine: owaspbwa 2.6.32-25-generic-pae Virtulization Product: VMWare Workstation 15 Output: A=Attacker V=Victim msf5 exploit(multi/handler) > run [] Started reverse TCP handler on 192.168.X.A:4444 [] Sending stage (38288 bytes) to 192.168.X.V [*] Meterpreter session 1 opened (192.168.X.A:4444 -> 192.168.X.V:45365) at 2020-05-21 00:39:01 -0400 [-] Meterpreter session 1 is not valid and will be closed [*] 192.168.X.V - Meterpreter session 1 closed. |
||||
Steps To Reproduce: | |||||
Additional Information: | I have been trying to find the solution for this since last 3 days. Please help me resolve this on priority. | ||||
Attached Files: | |||||
Notes | |
(0012818)
usama 2020-05-22 10:45 |
You've already opened a ticket here https://github.com/rapid7/metasploit-framework/issues/13495. |
(0012819)
DrSpy 2020-05-22 11:56 |
Yes I know but I haven't got the resolution for my issue... not here and certainly not there... If you know then please help me resolve this. |
(0014126)
kali-bugreport 2021-01-20 21:14 |
It should be quite obvious that the Kali team can't give support for Metasploit so i wouldn't expect a solution here. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6989 | [Kali Linux] Kali Package Bug | crash | have not tried | 2021-01-12 11:15 | 2021-01-20 21:09 |
Reporter: | kakulanex | Platform: | |||
Assigned To: | OS: | ||||
Priority: | immediate | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | VMWARE NOT LUNCHING | ||||
Description: |
This is urgent, am not be able to run vmware on my latest kali 2020.4. I tried all i know but everything seems to fail. This is the error am getting, /usr/bin/vmware: line 105: 2056 Segmentation fault "$BINDIR"/vmware-modconfig --appname="VMware Workstation" --icon="vmware-workstation" Please help. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014125)
kali-bugreport 2021-01-20 21:09 |
Shouldn't this be reported to VMWare instead? |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
7001 | [Kali Linux] Kali Package Bug | crash | always | 2021-01-20 20:21 | 2021-01-20 20:21 |
Reporter: | barry | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | waagent (Azure agent) fails to run | ||||
Description: |
Hi, I've noticed that the Azure waagent no longer runs on Kali (2020.4 / rolling; retried with latest dist-upgrade today)... See error output below. The package name is 'waagent'. Thanks |
||||
Steps To Reproduce: | waagent -h | ||||
Additional Information: |
$ waagent -h Traceback (most recent call last): File "/usr/sbin/waagent", line 33, in <module> sys.exit(load_entry_point('WALinuxAgent==2.2.47', 'console_scripts', 'waagent')()) File "/usr/sbin/waagent", line 25, in importlib_load_entry_point return next(matches).load() File "/usr/lib/python3.9/importlib/metadata.py", line 77, in load module = import_module(match.group('module')) File "/usr/lib/python3.9/importlib/__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "<frozen importlib._bootstrap>", line 1030, in _gcd_import File "<frozen importlib._bootstrap>", line 1007, in _find_and_load File "<frozen importlib._bootstrap>", line 986, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 680, in _load_unlocked File "<frozen importlib._bootstrap_external>", line 790, in exec_module File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed File "/usr/lib/python3/dist-packages/azurelinuxagent/agent.py", line 34, in <module> import azurelinuxagent.common.event as event File "/usr/lib/python3/dist-packages/azurelinuxagent/common/event.py", line 632, in <module> __event_logger__ = EventLogger() File "/usr/lib/python3/dist-packages/azurelinuxagent/common/event.py", line 304, in __init__ osutil = get_osutil() File "/usr/lib/python3/dist-packages/azurelinuxagent/common/osutil/factory.py", line 50, in get_osutil return _get_osutil(distro_name, distro_code_name, distro_version, distro_full_name) File "/usr/lib/python3/dist-packages/azurelinuxagent/common/osutil/factory.py", line 79, in _get_osutil return DebianOSBaseUtil() NameError: name 'DebianOSBaseUtil' is not defined |
||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6999 | [Kali Linux] Kali Package Bug | minor | always | 2021-01-18 06:31 | 2021-01-18 22:47 |
Reporter: | bakrtech | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | kali zsh not working properly | ||||
Description: |
I have the latest kali linux but when i switch to zsh from bash it shows kali% not according to latest update |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014118)
steev 2021-01-18 22:47 |
This sounds like you have a .zshrc in place already - if you mv it out of the way, and re-run zsh from bash, it should prompt you This is the Z Shell configuration function for new users, zsh-newuser-install. You are seeing this message because you have no zsh startup files (the files .zshenv, .zprofile, .zshrc, .zlogin in the directory ~). This function can help you with a few settings that should make your use of the shell easier. You can: (q) Quit and do nothing. The function will be run again next time. (0) Exit, creating the file ~/.zshrc containing just a comment. That will prevent this function being run again. (1) Continue to the main menu. (2) Populate your ~/.zshrc with the configuration recommended by the system administrator and exit (you will need to edit the file by hand, if so desired). --- Type one of the keys in parentheses --- At this point, press 2, and you should get the kali default zsh. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6997 | [Kali Linux] Kali Package Bug | major | always | 2021-01-16 17:45 | 2021-01-16 18:06 |
Reporter: | grizzwa | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Major xhci_hcd bug on Ryzen Desktops | ||||
Description: |
there's a major bug in the xhci driver discussed here: https://bugzilla.kernel.org/show_bug.cgi?id=202541 nearly everyone working on a Ryzen system gets this anoying bug which makes nearly impossible to start monitor mode on wifi cards. simply every usb device isn't working as expected |
||||
Steps To Reproduce: |
1. having a ryzen system 2. boot 3. run sudo dmesg --level=err,warn | grep 'WARN Set TR' 4. if stdout gives one or more to stdout you affected of it : "xhci_hcd 0000:02:00.0: WARN Set TR Deq Ptr cmd failed due to incorrect slot or ep state." |
||||
Additional Information: | |||||
Attached Files: |
dmesg_output.png (27,231 bytes) 2021-01-16 17:45 https://bugs.kali.org/file_download.php?file_id=1997&type=bug dmesg_output.txt (43,918 bytes) 2021-01-16 17:45 https://bugs.kali.org/file_download.php?file_id=1998&type=bug dmesg_output_full.txt (130,250 bytes) 2021-01-16 18:06 https://bugs.kali.org/file_download.php?file_id=1999&type=bug |
||||
Notes | |
(0014114)
grizzwa 2021-01-16 17:49 |
seems like its fixed with Kernel 5.10-rc3. 5.10-rc3 has many many usb bugfixes not yet tested! |
(0014115)
grizzwa 2021-01-16 18:06 |
additional the whole dmesg output |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6994 | [Kali Linux] Kali Websites & Docs | text | always | 2021-01-15 20:27 | 2021-01-15 20:27 |
Reporter: | Magas | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | peepdf is listed but not included in Kali Linux | ||||
Description: | The pdf analyzing tool peepdf is listed here https://tools.kali.org/forensics/peepdf respectivly here https://tools.kali.org/tools-listing . But it is not included in Kali Linux 2020.4. | ||||
Steps To Reproduce: | Boot Kali Linux. Start terminal and type "peepdf -h" | ||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6847 | [Kali Linux] Tool Upgrade | minor | always | 2020-11-18 17:58 | 2021-01-15 07:39 |
Reporter: | tjnull | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Joplin Package on Kali is not using the latest version. | ||||
Description: |
The current package of Joplin needs to be updated as it contains a cross site scripting bug and it is missing a variety of fixes/features to improve the tool. https://www.exploit-db.com/exploits/49024 Latest Version: https://github.com/laurent22/joplin/releases (1.4.10) |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
image.png (91,408 bytes) 2020-11-18 17:58 https://bugs.kali.org/file_download.php?file_id=1945&type=bug image-2.png (33,467 bytes) 2020-11-18 17:58 https://bugs.kali.org/file_download.php?file_id=1946&type=bug |
||||
Notes | |
(0013690)
rhertzog 2020-11-19 08:17 |
Our issue currently is that the build system relies on yarn and yarnpkg is currently broken: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972952 And it can't be fixed because it's no longer buildable in Debian either: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960120 As Kali packagers, we really don't like this node ecosystem which is really brittle and next to impossible to package in a clean way and requires lots of efforts to keep it working... i'm wondering if we should not replace the Kali package with a kaboxer container instead. |
(0013967)
initinfosec 2020-12-11 18:02 |
@rhertzog - @TJ_Null was filling me in about this issue - would it be possible to touch base on this issue? I don't have a solution yet, but trying to replicate it on my end, and wanted to compare notes. If so, what medium would be best to do this? Forum DM? Thanks. |
(0013968)
rhertzog 2020-12-12 15:09 |
@initinfosec Email? buxy@kali.org Though the main issue is outside of my control so I don't really know what you expect from me. We're trying to package joplin out of the appimage binary release instead of building from source. Not clean but I don't really have a better solution. |
(0014113)
sbrun 2021-01-15 07:39 |
version 1.6.7-0kali3 is now in kali-rolling |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6915 | [Kali Linux] General Bug | minor | have not tried | 2020-12-08 13:50 | 2021-01-13 09:14 |
Reporter: | orenc78 | Platform: | |||
Assigned To: | sbrun | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | |||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Fresh Kali and gvm install, getting fatal error on gvm-start | ||||
Description: |
gvm-start 2 ⨯ awk: fatal: cannot open file `/etc/default/greenbone-security-assistant’ for reading (No such file or directory) Any ideas? |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014082)
fearx135 2021-01-10 00:14 |
I have the same error in kali 2020.4 (for raspberry). The gvm-setup is having a bug in the gvm-start, this is the workaround solution : after you install your gvm (openvas), execute the following commands: #gvm-setup #gvm-check-setup (follow its instructions and execute their recomended commands, until it says "It seems like your GVM 20.8.0 installation is OK.") then open your browser in: https://127.0.0.1:9392 Note: every time you restart kali, you'll have to execute gvm-setup and gvm-check-setup =================== NOTE: DON'T use the gvm-start until kali fix it, i tried the following, and only started the openvas webserver: The error is because the gvm-start command (/usr/bin/gvm-start) tries to find the GSA_PORT parameter in the /etc/default/greenbone-security-assistant, but that file is does not exist. Since, that file is used to set openvas variables. if you create a file and add the variables, the gvm-start command works fine (but does not start gvm): cd /etc/default/ sudo touch greenbone-security-assistant sudo nano greenbone-security-assistant add the following line: (or the port for the gvm webservice) GSA_PORT=9392 save and close the file, now execute gvm-start Another method: #nano /usr/bin/gvm-start change the PORT parameter for your web port: #PORT=$(awk [function that sucury detects as exploit] /etc/default/greenbone-security-assistant) #PORT=9392 ======================== As I said, this only start the web application but no the openvas server, so use the gvm-check-setup until they fix it. |
(0014112)
sbrun 2021-01-13 09:14 |
gvm-start script is now fixed in gvm version 20.8.0.2 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6991 | [Kali Linux] General Bug | crash | always | 2021-01-13 00:43 | 2021-01-13 00:43 |
Reporter: | ddyer | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | immediately after install, apt update causes a meltdow to a non-bootable state | ||||
Description: |
Note, this is an x32 machine, and among other things, the installation process failed to detect and configure the battery and audio hardware. Immediately after installation, I opened a shell and ran "sudo apt update" it found a lot of things to update. After about 30 minutes of updating, the machine crashed, into a non-bootable (except in "revovery mode" state) In the crashed state, the screen was flashing infinite repetitions of the message "Baytrail Audio Port: ASoC: no backend DAIs enabled for Baytrail Audio Port" In recovery mode, I can't look around because "the root account is locked", but on a previous iteration of this dance, it looked like installing a new kernel was in progress. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6990 | [Kali Linux] General Bug | major | always | 2021-01-12 21:36 | 2021-01-12 21:36 |
Reporter: | ddyer | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | net installer issues | ||||
Description: |
the net installer is only able to connect to open networks. Connecting to a wpa network always fails. once connected to an open network, dhcp always fails, and the network has to be configured manually. once manually configured, the "local mirror" phase, there are no valid mirrors. After trying 10 or so I gave up and continued without. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
There are no notes attached to this issue. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6986 | [Kali Linux] Kali Package Bug | minor | always | 2021-01-11 05:15 | 2021-01-12 00:54 |
Reporter: | ddyer | Platform: | |||
Assigned To: | steev | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.4 | ||
Product Build: | Resolution: | not fixable | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | missing network driver | ||||
Description: |
My hack "because I can" was to install Kali on an ancient x32 Inspiron laptop. It all went well, except that the network driver was not found, although it was correctly named. BTW, no amount of futzing around with the named driver on "removable media" as suggested by the complaint from the installer will work. Thanks for including the correct driver name, but the details of how to package it for the installation process are competely missing. After installing with no internet, I found the drivers, copied them to /lib/fimware/bfms/ and now all is well with the network. It would be super cool if the drivers were included in a future package. Now for the payload: the necessary files are -rw-r--r-- 1 root root 400864 Sep 23 01:11 brcmfmac43340-sdio.bin -rw-r--r-- 1 root root 1620 Jul 5 2020 brcmfmac43340-sdio.txt which can be acquired at https://github.com/wkennington/linux-firmware/blob/master/brcm/brcmfmac43340-sdio.bin https://gist.github.com/spacemeowx2/3fb19762b128875d1cbf59f99e7554b5 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
brcmfmac43340-sdio.bin (400,864 bytes) 2021-01-11 05:15 https://bugs.kali.org/file_download.php?file_id=1991&type=bug brcmfmac43340-sdio.txt (1,620 bytes) 2021-01-11 05:15 https://bugs.kali.org/file_download.php?file_id=1992&type=bug |
||||
Notes | |
(0014096)
ddyer 2021-01-11 07:51 |
oops, that Insignia laptop, not Inspiron |
(0014106)
steev 2021-01-11 18:34 |
Unfortunately, there isn't a whole lot we can do here. The broadcom firmware isn't available in the mainline tree, and trying to keep track of every possible branch out there, where someone might have committed a copy of the blob from their system, isn't something we can really do. Not to mention the redistribution issue as we, as a Linux distribution, do need to follow licenses. We're sorry for the inconvenience, but it is out of our hands. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6914 | [Kali Linux] General Bug | major | sometimes | 2020-12-06 20:12 | 2021-01-12 00:52 |
Reporter: | 131Curious131 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Problem with wifi on dual-boot. | ||||
Description: |
I am a new linux user, and I'm sure this issue has been noted here.(at least it should have been) but I can't find it if it is. I've been ALL over the internet trying to find a fix for this. Apparently a lot of people have this same issue. I have yet to find a solution. wireless card: Intel(R) Dual Band Wireless-AC 3165 problem: sometimes it reads the card and the wifi works, other times it does not. sometimes a reboot remedies the issue, sometimes it doesn't. Apparently from what I read this is a common problem with this type of card. If it reads the card and works fine for a day or two, then after a reboot it starts again. It might work for the first 3 minutes after startup, then goes down. It says its connected but isn't. after about 5 minutes it fails to show any connection at all. I get this error: failed to wake nic for hcmd Ive tried ip link set wlan0 down/up, and just about every other suggestion i could find. doesn't work. I get an input/output error. I've tried just about every thing I can find listed about this. Nothing has worked. I dual boot kali with windows 10. it's not a hardware problem, as it reads it sometimes and for a few minutes after i reboot. and the card works fine with windows. i installed the correct drivers and still the issue persists. Has anyone found a remedy for this or is this a true bug? |
||||
Steps To Reproduce: | Randomly happens. Not sure how to sure-fire reproduce it. | ||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014089)
kali-bugreport 2021-01-10 11:29 |
Duplicate of 0006897 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6967 | [Kali Linux] General Bug | crash | always | 2020-12-31 15:15 | 2021-01-12 00:51 |
Reporter: | fifty | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Full upgrade needs KDE ENVIRONMENT DESKTOP removal. | ||||
Description: | Hi. I faced problem of deleting environment after full-upgrade of kali distro. But now i understood that at time of full-upgrade it wants kali kde removal.I am including picture for your understanding.Please fix these.Or give a proper solution. | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot_20201231_194429.png (189,428 bytes) 2020-12-31 13:47 https://bugs.kali.org/file_download.php?file_id=1980&type=bug |
||||
Notes | |
(0014090)
kali-bugreport 2021-01-10 11:30 |
Duplicate of 0006963 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6820 | [Kali Linux] Kali Package Bug | minor | always | 2020-11-04 13:32 | 2021-01-11 10:41 |
Reporter: | skulldealer | Platform: | |||
Assigned To: | daniruiz | OS: | |||
Priority: | normal | OS Version: | |||
Status: | resolved | Product Version: | 2020.3 | ||
Product Build: | Resolution: | fixed | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | important package missing in repo source (name-tilix) | ||||
Description: |
important and popular terminal multiplexer called tilix is missing. please fix it. output- root@ISP:/# apt update && apt-cache search tilix && apt install tilix -y && apt-get install tilix -y && cat /etc/apt/sources.list Hit:1 https://kali.download/kali kali-rolling InRelease Hit:2 http://ppa.launchpad.net/apt-fast/stable/ubuntu bionic InRelease Hit:3 http://deb.i2p2.no unstable InRelease Reading package lists... Done Building dependency tree Reading state information... Done All packages are up to date. Reading package lists... Done Building dependency tree Reading state information... Done E: Unable to locate package tilix root@ISP:/# |
||||
Steps To Reproduce: |
try this command- apt update && apt-cache search tilix && apt install tilix -y && apt-get install tilix -y && cat /etc/apt/sources.list ideally it should install tilix. used mirrorscript v2 to find best server |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013632)
skulldealer 2020-11-04 13:39 |
or is it that i am missing on a important source? |
(0013633)
dQw4w9WgXcQ 2020-11-04 15:30 |
Have you tried this Execute the command: mousepad /etc/apt/sources.list Remove everything within that sources.list file Duckduckgo for "Kali Linux Repository" (https://docs.kali.org/general-use/kali-linux-sources-list-repositories) Scroll down and look for "The kali-rolling repository" Copy everything within that kali-rolling and paste on sources.list file Save the sources.list file Execute the command: apt-get update Now install your package(e.g:apt-get install tilix) Or perhaps try wget https://github.com/gnunn1/tilix/releases/download/1.9.3/tilix.zip sudo unzip tilix.zip -d / sudo glib-compile-schemas /usr/share/glib-2.0/schemas/ Because you might have to install it manually because Kali are normally a few versions behind on most tool repositories so. |
(0013634)
skulldealer 2020-11-04 16:10 |
Tried renewing sources many times. Same issue. Usually Tilix can get easily installed on kali linux. I installed kali newly again on vm using week 45 installer iso file. I had this problem so I recreated my sources.list many times. Same issue. Yeah I was able to install tillix by normal manual method but it was unnecessary. Are you able to install Tilix? |
(0013636)
steev 2020-11-04 16:49 |
Unfortunately, it was removed from Debian testing (which Kali is built on) - https://tracker.debian.org/news/1180947/tilix-removed-from-testing/ which also caused it to be removed from Kali. |
(0013637)
rhertzog 2020-11-04 17:06 |
@dQw4w9WgXcQ I appreciate that you are trying to help but please refrain from doing broad assertions when you are not sure. > Because you might have to install it manually because Kali are normally a few versions behind on most tool repositories so. This is just plain wrong. It's quite the opposite, Kali is based on Debian testing which gets the lastest updates when the package is well maintained in Debian. In the case of tilix, the package has been dropped from testing due to a bug that has not been handled by its maintainers: https://bugs.debian.org/968816 See https://tracker.debian.org/pkg/tilix for more information about the package in Debian. So you should really get in contact with the Debian maintainer and/or offer your help to get the package fixed in Debian and then it will come back to Kali. |
(0013639)
rhertzog 2020-11-04 17:12 |
I sent a short mail to the Debian maintainers to make them aware of the package removal, hopefully that will trigger some action. |
(0013640)
dQw4w9WgXcQ 2020-11-04 17:23 |
I apologise because English is not first language and sometimes I might have misunderstanding at some things.w Sorry if I offended or upset you any way. |
(0013641)
skulldealer 2020-11-04 18:08 |
Ok I got it. For now I have manually installed Tilix by the instructions provided in their GitHub page and the same are also provided above in this thread. I hope after Tilix is brought back to debian everything stays fine and nothing breaks because I have manually installed Tilix |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6907 | [Kali Linux] General Bug | crash | always | 2020-12-06 12:48 | 2021-01-11 09:54 |
Reporter: | klbt001 | Platform: | |||
Assigned To: | OS: | ||||
Priority: | urgent | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | System Run Away while working with GVM 20.8 | ||||
Description: |
System run away while working with GVM 20.8 which consumes all RAM and fills up complete swap space. In this situation complete system is inaccessible. Only hard reset would bring system out of this state. |
||||
Steps To Reproduce: |
In my case I have a scan with about 2500 results in a single report. Then user should go to report page for this specific scan and switch to the results tab. Then he must reload the page/tab several times by adding filter directives. Reloading (i.e. adding a new filter directive) should be done while results page is still loading. |
||||
Additional Information: |
Bug 0006763 is still there, but with GVM 20 and PostgrSQL 13. It seems, that old database searches are still running (the page is still loading) and new searches are added to them. After a while all system ressources are consumed from old, no longer needed searches. I think we need an additional function which interrupts old, no longer needed searches when the specific user is starting a new search by changing filter directives. Or, if interruption of old, no longer needed searches isn't possible, the user must not be able to do anythin new within UI until current action, i.e. the search, is finished. |
||||
Attached Files: | |||||
Notes | |
(0013956)
klbt001 2020-12-08 23:20 |
I was able to get a result of top short before the run-away: -------- %Cpu(s): 0.5 us, 16.5 sy, 0.0 ni, 0.0 id, 82.7 wa, 0.0 hi, 0.3 si, 0.0 st MiB Mem : 15892.4 total, 284.7 free, 15421.1 used, 186.6 buff/cache MiB Swap: 32752.0 total, 23268.5 free, 9483.5 used. 139.7 avail Mem PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 96 root 20 0 0 0 0 D 43.7 0.0 0:43.47 kswapd0 191972 _gvm 20 0 11.6g 5.2g 1392 S 39.8 33.6 0:31.21 gsad 192086 root 20 0 0 0 0 D 8.7 0.0 0:03.28 kworker/u16:7+kcryptd/254:1 192094 root 20 0 0 0 0 D 8.7 0.0 0:02.62 kworker/u16:16+kcryptd/254:1 160877 root 20 0 0 0 0 D 7.8 0.0 0:07.62 kworker/u16:6+kcryptd/254:1 161454 root 20 0 0 0 0 D 7.8 0.0 0:07.04 kworker/u16:1+kcryptd/254:1 162805 root 20 0 0 0 0 I 7.8 0.0 0:06.62 kworker/u16:8-kcryptd/254:0 164000 root 20 0 0 0 0 D 7.8 0.0 0:04.95 kworker/u16:11+kcryptd/254:1 176231 root 20 0 0 0 0 D 7.8 0.0 0:04.39 kworker/u16:4+kcryptd/254:1 191982 root 20 0 0 0 0 D 7.8 0.0 0:02.52 kworker/u16:3+kcryptd/254:1 192040 root 20 0 0 0 0 D 7.8 0.0 0:04.43 kworker/u16:5+kcryptd/254:1 192116 root 20 0 7220 3552 2668 R 4.9 0.0 0:00.53 top 192089 root 20 0 0 0 0 I 2.9 0.0 0:01.76 kworker/u16:12-kcryptd/254:0 587 root 20 0 0 0 0 D 1.9 0.0 0:02.15 dmcrypt_write/2 11 root 20 0 0 0 0 I 1.0 0.0 3:31.27 rcu_sched 2348 user 20 0 879808 33460 5268 S 1.0 0.2 18:13.93 Xorg 2640 user 20 0 413852 10740 6320 S 1.0 0.1 34:01.93 vino-server 15487 root 20 0 0 0 0 I 1.0 0.0 0:10.07 kworker/3:2-mm_percpu_wq 159047 root 20 0 270088 79364 1252 S 1.0 0.5 1:50.18 nessusd 192059 _gvm 20 0 231420 27096 1684 D 1.0 0.2 0:00.09 gvmd 192088 root 20 0 0 0 0 I 1.0 0.0 0:02.34 kworker/u16:10-kcryptd/254:0 1 root 20 0 171424 4972 2452 S 0.0 0.0 0:21.87 systemd 2 root 20 0 0 0 0 S 0.0 0.0 0:00.06 kthreadd 3 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_gp 4 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_par_gp 6 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0:0H-kblockd 9 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 mm_percpu_wq 10 root 20 0 0 0 0 S 0.0 0.0 0:00.34 ksoftirqd/0 12 root rt 0 0 0 0 S 0.0 0.0 0:00.75 migration/0 13 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/0 14 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/1 15 root rt 0 0 0 0 S 0.0 0.0 0:00.87 migration/1 16 root 20 0 0 0 0 S 0.0 0.0 0:00.26 ksoftirqd/1 18 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/1:0H-events_highpri 19 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/2 20 root rt 0 0 0 0 S 0.0 0.0 0:00.85 migration/2 -------- It's a matter of some seconds. Now we see that gsad is consuming the memory and filling up swap space. Does we have some kind of memory leak? |
(0013957)
klbt001 2020-12-08 23:32 |
The result of top of note #0013956 was taken after login to GSA and complete load of default dashboard. |
(0014034)
sbrun 2021-01-05 10:03 |
You can test this tip: https://bugs.kali.org/view.php?id=6763#c13981 |
(0014037)
klbt001 2021-01-05 14:57 |
@sbrun, I'm the reporter of ticket 0006763. Ticket 0006763 is about high CPU load because of PostgreSQL processes running. This ticket 0006907 is about extreme RAM/swap consumption. While swapping the CPU load is also extreme because of swapping, but the main cause is the extreme RAM consumption of gsad. The system where I see the problem has 16 GB RAM and gsad is consuming all swap up to 32 GB so that gsad consumes in total 48 GB memory while it's normal operation. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6935 | [Kali Linux] Kali Package Bug | minor | have not tried | 2020-12-18 18:08 | 2021-01-11 09:50 |
Reporter: | Rk.Chan | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | kali-dev | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | upadte packges error | ||||
Description: |
when i try to update it says component not found on repository and i have checked the source list and it is empty sometimes it ignores certain packges |
||||
Steps To Reproduce: |
sudo apt-get update http://ftp.harukasan.org/kali kali-bleeding-edge InRelease Reading package lists... Done W: Skipping acquire of configured file 'apt/xyz' as repository 'http://http.kali.org/kali kali-bleeding-edge InRelease' doesn't have the component 'apt' (component misspelt in sources.list?) and it appears several time apt update Hit:1 http://ftp.harukasan.org/kali kali-bleeding-edge InRelease Reading package lists... Done Building dependency tree Reading state information... Done 2 packages can be upgraded. Run 'apt list --upgradable' to see them. W: Skipping acquire of configured file 'apt/binary-i386/Packages' as repository 'http://http.kali.org/kali kali-bleeding-edge InRelease' doesn't have the component 'apt' (component misspelt in sources.list?) Skipping acquire of configured file 'update/binary-i386/Packages' as repository 'http://http.kali.org/kali kali-bleeding-edge InRelease' doesn't have the component 'update' (component misspelt in sources.list?) |
||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014091)
kali-bugreport 2021-01-10 11:31 |
Duplicate of 0006934 |
(0014098)
daniruiz 2021-01-11 09:50 |
Edit /etc/apt/source.list and correct the repository to "deb http://http.kali.org/kali kali-bleeding-edge contrib non-free main" |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6355 | [Kali Linux] Kali Package Bug | minor | sometimes | 2020-05-04 20:49 | 2021-01-11 03:21 |
Reporter: | Deepak | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | 2020.1 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | No Icons | ||||
Description: |
Suddenly Desktop not working, all the icons Dissapeared After re-installing kali linux problem was solved. But after three days of reinstallation..it happens again. |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0013118)
X0RW3LL 2020-07-23 09:47 |
Could you provide some more details? What display manager are you using? (Gnome, XFCE, KDE, MATE) When you say the "desktop is not working, all the icons disappeared", do you mean that the ENTIRE session is unresponsive? Or you just don't see icons like Computer and Trash on your actual desktop, but you can still open up any other application? Also, your reported version 2020.1, is that the correct version you're on? Or did you download the latest one? Please give me more information, and possibly some screenshots for someone to be able to figure out what's going on. |
(0014095)
Dwek__ 2021-01-11 03:21 |
This is similar to this issue. https://bugs.kali.org/view.php?id=6941 I only started having issues with 2020.4 |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6984 | [Kali Linux] Kali Websites & Docs | minor | have not tried | 2021-01-10 11:51 | 2021-01-10 14:05 |
Reporter: | kali-bugreport | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | new | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Description template for new bug reports / new tool requests | ||||
Description: |
While browsing the bugtracker here i have noticed: - a high amount of low quality bug reports - repeated "to speed up the process please use that template" responses by the Kali team for new tool requests Since version 2.13.0 Mantis seems to provide the possibility to configure / defined default descriptions for each category, maybe this could help to get bug reports with a higher quality: https://support.mantishub.com/hc/en-us/articles/360002897994-Setting-default-values-for-issue-details |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014092)
kali-bugreport 2021-01-10 13:42 |
With "low quality" bug reports i mean a few things: - misplaced questions / help requests which should go into the forums (e.g. 0006985) - issues with long / continues text and including sentences like "i like to ..." where useful info from the issue first needs to be extracted with a lot of effort - generally lack of information on the issue The template could e.g. do a few things: - Asking a few mandatory info in a structured way (e.g. problematic package, short steps like 1., 2., 3. to reproduce, ...) - Short description that questions / help requests should go into the forums - Link to https://www.kali.org/docs/community/submitting-issues-kali-bug-tracker/ - Have the content of e.g. 0004572:0009020 |
(0014094)
kali-bugreport 2021-01-10 14:05 |
Another issue which might be prevented is posting bug reports in e.g. the "New Tool Requests" category by adding a short comment on the purpose of the categories. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6941 | [Kali Linux] General Bug | major | always | 2020-12-23 07:16 | 2021-01-10 06:47 |
Reporter: | Suhas | Platform: | |||
Assigned To: | OS: | ||||
Priority: | high | OS Version: | |||
Status: | new | Product Version: | 2020.4 | ||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | unable to view the desktop icons | ||||
Description: | after install kali linux 2020.4 in my system desktop icons are not visible | ||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: |
Screenshot_2020-12-23_02_15_00.png (441,234 bytes) 2020-12-23 07:16 https://bugs.kali.org/file_download.php?file_id=1969&type=bug |
||||
Notes | |
(0014084)
Dwek__ 2021-01-10 06:47 |
I am getting the same issue. I am also having issues with applications, if executed from the CLI, dropping the menu bar and not allowing foreground/background window switching. This has only occurred after a full-upgrade to 2020.4 I initially thought it may be an NVIDIA video driver issue, but I have reloaded the drivers and kernel hooks, but this has not resolved the issue. I am able to right-click on the background and get a terminal screen up. Any help would be great. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6891 | [Kali Linux] Queued Tool Addition | minor | have not tried | 2020-12-01 10:54 | 2021-01-09 14:40 |
Reporter: | g0tmi1k | Platform: | |||
Assigned To: | OS: | ||||
Priority: | normal | OS Version: | |||
Status: | acknowledged | Product Version: | |||
Product Build: | Resolution: | open | |||
Projection: | none | ||||
ETA: | none | Fixed in Version: | |||
Target Version: | |||||
Summary: | Smuggler - An HTTP Request Smuggling / Desync testing tool | ||||
Description: |
[Name] - Smuggler [Version] - N/A [Homepage] - https://github.com/defparam/smuggler [Download] - N/A [Author] - Evan [License] - https://github.com/defparam/smuggler/blob/master/LICENSE [Description] - An HTTP Request Smuggling / Desync testing tool written in Python 3 [Dependencies] - Python 3 |
||||
Steps To Reproduce: | |||||
Additional Information: | |||||
Attached Files: | |||||
Notes | |
(0014063)
g0tmi1k 2021-01-08 13:41 |
@kali-team, please could this be packaged up. |
View Issue Details | |||||
ID: | Category: | Severity: | Reproducibility: | Date Submitted: | Last Update: |
6888 | [Kali Linux] Queued Tool Addition | minor | N/ |