View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7469 [Kali Linux] Kali Package Bug minor always 2021-12-03 19:15 2021-12-04 15:30
Reporter: necopinus Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Package kalipi-kernel 5.4.83-20211127 is Missing /boot/overlays/dwc2.dtbo
Description: The kalipi-kernel package version 5.4.83-20211127 is missing /boot/overlays/dwc2.dtbo; this breaks USB C gadget mode (necessary, for example, to connect the RPi to a device like an iPad using USB C using only a single USB C cable). This file was present in 5.4.83-20210516.
Steps To Reproduce: 1. Upgrade from 5.4.83-20210516 to 5.4.83-20211127
2. �
Additional Information: If the dwc2 overlay is present, it’s possible to use the RPi as a hacking accessory for an iPad using only a USB C cable (very useful!). For example, see this guide: https://gist.github.com/necopinus/9a961f001f031477216b1b68b336fe20

Without this overlay file, this setup is not possible.
Attached Files:
Notes
(0015479)
steev   
2021-12-03 20:06   
It might be better to file this as an issue on the repo for the kernel on re4son's GitHub - https://github.com/re4son/ - there are a few different moving parts that go in to making the kernel build work, and it could be that the dtbo went away, or it could be that it somehow gets dropped by the build script.
(0015480)
necopinus   
2021-12-03 20:26   
Okay. I've filed the bug here: https://github.com/Re4son/re4son-kernel-builder/issues/14

Not 100% sure if this is the right repo, but the actual kernel repo doesn't seem to have issues turned on, so this is my best guess.
(0015481)
steev   
2021-12-03 21:55   
For what it's worth, a dtbo can be built outside the kernel source as well as a workaround.

Just grab the dwc2-overlay.dts file from https://github.com/re4son/re4son-raspberrypi-linux/tree/rpi-5.4.83-re4son/arch/arm/boot/dts/overlays (make sure you get the actual file and not just the html of it!) and then simply run 'dtc -o dwc2.dtbo dwc2-overlay.dts' and then copy it in to the /boot/overlays directory.
(0015482)
re4son   
2021-12-03 22:16   
What a naughty overlay! Not sure where it went but let me put it back. Update is coming soon.
Thanks for letting us know.
(0015483)
re4son   
2021-12-03 23:30   
Should be fixed now:
https://github.com/Re4son/kalipi-firmware/compare/20211127kali...20211204kali

You will get the updates with your next "apt upgrade". Please let us know if everything is working correctly for you now.

On another note, we are really digging your write up. That's pretty awesome stuff.
Do you think your setup could also be done with the Pi 3 A+ and the Pi Zero 2 W? That would allow using the same cool concept on different hardware to suit the power supply of other host devices. I'm thinking about smaller iPads and iPhones, etc.

That looks like great material for a Kali blog (https://www.kali.org/blog/) - would you be up for that?
(0015486)
necopinus   
2021-12-04 15:30   
Fix confirmed. Thank you! (And thank you for the manual build trick!)

I do not know if it would be possible to get a Pi 3 A+ or a Pi Zero 2 W working in a similar fashion as the Pi 4 B, though after some cursory research it looks like it *should* be possible to do something similar using the g_ether module (setup might actually be simpler!). Unfortunately, I only have a Pi 4 B right now, and won’t be in a place to play with a different model until the end of January.

As far as contributing this knowledge to the Kali blog, I’d definitely be down for cleaning up the write-up for this. The only caveat is that I do want to eventually spin up my own website, so I don’t want to be in a situation where it’s not okay to republish the material there as well. This seems like a conversation we should take off this ticket, however.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7458 [Kali Linux] General Bug block always 2021-11-24 08:19 2021-12-04 11:38
Reporter: rme Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: boot without any video at all
Description: since my kali upgrade to kernel vmlinuz-5.14.0-kali2-amd64,
kali on my laptop has video issues: black screen or white-ish flickering screen.

not fixed in vmlinuz-5.14.0-kali4-amd64

kernel log:
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun
maybe related to this issue??
Steps To Reproduce: 100%
need to boot previous kernel in grub boot menu to get working system
(previous kernel : vmlinuz-5.10.0-kali9-amd64)
Additional Information: $ uname -a
Linux kali 5.10.0-kali9-amd64 0000001 SMP Debian 5.10.46-4kali1 (2021-08-09) x86_64 GNU/Linux
$ cat /etc/issue
Kali GNU/Linux Rolling \n \l
$ lspci | grep -i VGA
00:02.0 VGA compatible controller: Intel Corporation CometLake-U GT2 [UHD Graphics] (rev 02)


part of kernel log with i915:
Nov 23 19:50:47 kali kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit
Nov 23 19:50:47 kali kernel: nvme nvme0: 8/0/0 default/read/poll queues
Nov 23 19:50:47 kali kernel: nvme0n1: p1 p2 p3
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access
Nov 23 19:50:47 kali kernel: checking generic (a0000000 1fb0000) vs hw (df000000 1000000)
Nov 23 19:50:47 kali kernel: checking generic (a0000000 1fb0000) vs hw (a0000000 10000000)
Nov 23 19:50:47 kali kernel: fb0: switching to inteldrmfb from EFI VGA
Nov 23 19:50:47 kali kernel: Console: switching to colour dummy device 80x25
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: vgaarb: deactivate vga console
Nov 23 19:50:47 kali kernel: intel-lpss 0000:00:15.1: enabling device (0000 -> 0002)
Nov 23 19:50:47 kali kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: firmware: direct-loading firmware i915/kbl_dmc_ver1_04.bin
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin (v1.4)
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] [ENCODER:102:DDI B/PHY B] is disabled/in DSI mode with an ungated DDI clock, gate it
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] [ENCODER:118:DDI C/PHY C] is disabled/in DSI mode with an ungated DDI clock, gate it
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun
Nov 23 19:50:47 kali kernel: [drm] Initialized i915 1.6.0 20201103 for 0000:00:02.0 on minor 0
Nov 23 19:50:47 kali kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no)
Nov 23 19:50:47 kali kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input5
Nov 23 19:50:47 kali kernel: fbcon: i915 (fb0) is primary device
Nov 23 19:50:47 kali kernel: Console: switching to colour frame buffer device 240x67
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] fb0: i915 frame buffer device
Attached Files:
Notes
(0015447)
rme   
2021-11-24 08:34   
reproducibility update:
WAS: always
but noticed that when connecting external monitor to laptop, the issue is not occurring
(0015448)
rme   
2021-11-24 08:49   
Sorry, mistake in "Additional Information" : uname is from kernel version before the update that broke the system. (5.10)
Kernel log is from failing boot however.
(0015449)
rme   
2021-11-24 11:15   
found: https://forums.linuxmint.com/viewtopic.php?t=345433
so I tried also to delete 'quiet splash' in grub and replace it with 'i915.modeset=0'
this also "fixes" the video issue that I have.

summary:
so far 2 workarounds:
1) plug-in usb-C/DP external monitor
2) kernel parameter i915.modeset=0

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7471 [Kali Linux] General Bug block always 2021-12-04 11:37 2021-12-04 11:37
Reporter: Yash kc Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: boot without any video at all
Description: since my kali upgrade to kernel vmlinuz-5.14.0-kali2-amd64,
kali on my laptop has video issues: black screen or white-ish flickering screen.

not fixed in vmlinuz-5.14.0-kali4-amd64

kernel log:
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun
maybe related to this issue??
Steps To Reproduce: 100%
need to boot previous kernel in grub boot menu to get working system
(previous kernel : vmlinuz-5.10.0-kali9-amd64)
Additional Information: $ uname -a
Linux kali 5.10.0-kali9-amd64 0000001 SMP Debian 5.10.46-4kali1 (2021-08-09) x86_64 GNU/Linux
$ cat /etc/issue
Kali GNU/Linux Rolling \n \l
$ lspci | grep -i VGA
00:02.0 VGA compatible controller: Intel Corporation CometLake-U GT2 [UHD Graphics] (rev 02)


part of kernel log with i915:
Nov 23 19:50:47 kali kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit
Nov 23 19:50:47 kali kernel: nvme nvme0: 8/0/0 default/read/poll queues
Nov 23 19:50:47 kali kernel: nvme0n1: p1 p2 p3
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access
Nov 23 19:50:47 kali kernel: checking generic (a0000000 1fb0000) vs hw (df000000 1000000)
Nov 23 19:50:47 kali kernel: checking generic (a0000000 1fb0000) vs hw (a0000000 10000000)
Nov 23 19:50:47 kali kernel: fb0: switching to inteldrmfb from EFI VGA
Nov 23 19:50:47 kali kernel: Console: switching to colour dummy device 80x25
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: vgaarb: deactivate vga console
Nov 23 19:50:47 kali kernel: intel-lpss 0000:00:15.1: enabling device (0000 -> 0002)
Nov 23 19:50:47 kali kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: firmware: direct-loading firmware i915/kbl_dmc_ver1_04.bin
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin (v1.4)
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] [ENCODER:102:DDI B/PHY B] is disabled/in DSI mode with an ungated DDI clock, gate it
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] [ENCODER:118:DDI C/PHY C] is disabled/in DSI mode with an ungated DDI clock, gate it
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun
Nov 23 19:50:47 kali kernel: [drm] Initialized i915 1.6.0 20201103 for 0000:00:02.0 on minor 0
Nov 23 19:50:47 kali kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no)
Nov 23 19:50:47 kali kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input5
Nov 23 19:50:47 kali kernel: fbcon: i915 (fb0) is primary device
Nov 23 19:50:47 kali kernel: Console: switching to colour frame buffer device 240x67
Nov 23 19:50:47 kali kernel: i915 0000:00:02.0: [drm] fb0: i915 frame buffer device
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7466 [Kali Linux] General Bug minor always 2021-12-02 19:59 2021-12-04 01:44
Reporter: systemcrash86 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Resume from lock screen leaves my monitors blank and an extremely slow mouse cursor
Description: I have the latest version of Kali (as of 2nd December 2021) and everything is up-to-date. I also have an NVIDIA GPU if relevant.

Everything works exactly like it should except for when i lock the screen. The screen locks like it should but the problem arises after i have re-entered my login credentials as i am greeted with blank screens and only a mouse cursor that moves across my monitors very very very slowly.
Steps To Reproduce: Everytime i resume from locking the screen
Additional Information:
Attached Files:
Notes
(0015470)
arnaudr   
2021-12-03 02:30   
Hello! In this case you should investigate what's wrong. Open a terminal, type "top", press Enter, and check if there's any process eating all the CPU, for example. You can also try to run "journalctl -f" and see what comes out, if there's an endless flow of error messages, please post it here, in case we can help. Also, do you run Kali in a VM or baremetal? Thanks!
(0015484)
systemcrash86   
2021-12-04 01:44   
Thanks for getting back in touch. I run kali on bare metal.
I have attached the journalctl -f txt file so you can take a look.

I started journalctl -f and then i locked my computer and about 10 minutes later i unlocked it and stopped journalctl.
This time my computer did the same thing with the blank screen and the slow moving cursor but it only lasted for about 30 seconds ish then i got into my desktop. But that was only because i left it locked for about 10 minutes. If i lock it for hours then i takes considerably longer the get to the desktop after locking the screen

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7441 [Kali Linux] General Bug minor always 2021-11-06 17:43 2021-12-03 17:25
Reporter: Alexandros_Adamos Platform:  
Assigned To: Gamb1t OS:  
Priority: normal OS Version:  
Status: feedback Product Version: 2021.3  
Product Build: Resolution: reopened  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: keyboard layout (language changer)
Description: Upgrade to the last version.
Have at least two languages for your keyboard.
Try to change keyboard layout using ALT+SHIFT
Steps To Reproduce: Upgrade to the last version.
Have at least two languages for your keyboard.
Try to change keyboard layout using ALT+SHIFT
Additional Information:
Attached Files:
Notes
(0015428)
Gamb1t   
2021-11-11 01:25   
Thank you for your interest in Kali but this is not a bug report. It looks like that you need help and guidance to perform some task. We have community support forums on https://forums.kali.org/ or on IRC with the #kali-linux channel on irc.oftc.net), please post your questions there.

However, FWIW, the button combination you use needs to be set. Once you set it to 'ALT+SHIFT' you should have no issues. You can set it in the keyboard language settings.
(0015430)
Alexandros_Adamos   
2021-11-11 20:55   
Thanks for your explanation but I'm not a new computer user. I have worked with these systems for almost twenty years, so I know how to switch languages ​​using the keyboard.

Unfortunately, I have seen many times recently that the information entered is not checked correctly by the review team.

There is an issue. Let me give you an example. If you set up the English and the Arabic keyboard layout in the latest version of Kali, the switcher will not work correctly.

The text will be in English as soon as you type. By pressing the change language key, no change will occur. You have to do it twice to switch to the second language.

It is a problem because to change the keyboard layout, you need to press the keys once. Also, the language icon at the top of the screen has to be changed, but it is no change.

How can I send you the screen record of this issue?
(0015431)
Gamb1t   
2021-11-11 21:35   
I have just tried to reproduce this again and unfortunately am unable to have the issue that you have stated. You can use Vimeo to share what you are seeing.
(0015458)
Alexandros_Adamos   
2021-11-30 20:04   
It's on the Wayland. I was tasted on the Wayland. But on the Gnome Xorg, everything is fine. Are you on the Wayland or Xorg?
(0015463)
arnaudr   
2021-12-02 10:15   
Out of curiosity: did you switch to Wayland, or was it like that by default?

The background story is that Kali goes with Xorg by default. However for a few days or weeks, due to a misconfiguration Wayland became the default for GNOME desktop. It could be that you picked a Kali weekly image at this moment, or maybe an update of your kali-rolling install switched the default to Wayland. But we fixed that, so if you update you should be back to using Xorg. Then the problem might just go away?
(0015468)
Alexandros_Adamos   
2021-12-02 14:04   
I updated Kali. -5.14.0-kali2-amd64 0000001 SMP Debian 5.14.9-2kali1 (2021-10-04) x86_64 GNU/Linux-
There was a problem changing the keyboard language after the update.
I checked and found out that I am on GNOME Wayland by default. I changed the environment to Xorg and the problems were solved.
(0015469)
arnaudr   
2021-12-03 02:25   
Good to hear that! I'm closing this issue then. Thanks!
(0015473)
Alexandros_Adamos   
2021-12-03 17:25   
OK, Thank you but Please note that there is still the issue on the Wayland.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7456 [Kali Linux] General Bug minor always 2021-11-22 20:12 2021-12-03 13:19
Reporter: andy3145 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Error installing cryptsetup-initramfs
Description: When installing cryptsetup-initramfs following line occurs:
sudo apt install cryptsetup-initramfs
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following NEW packages will be installed:
  cryptsetup-initramfs
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 75.1 kB of archives.
After this operation, 147 kB of additional disk space will be used.
Get:1 http://xxx.xxx.xxx/mirror/kali.org/kali kali-rolling/main amd64 cryptsetup-initramfs all 2:2.4.1-1 [75.1 kB]
Fetched 75.1 kB in 1s (74.8 kB/s)
Preconfiguring packages ...
Selecting previously unselected package cryptsetup-initramfs.
(Reading database ... 348202 files and directories currently installed.)
Preparing to unpack .../cryptsetup-initramfs_2%3a2.4.1-1_all.deb ...
### This is what I consider the error
/var/lib/dpkg/tmp.ci/preinst: 1: cryptroot-unlock: not found
###
Unpacking cryptsetup-initramfs (2:2.4.1-1) ...
Setting up cryptsetup-initramfs (2:2.4.1-1) ...
update-initramfs: deferring update (trigger activated)
Processing triggers for initramfs-tools (0.140) ...
update-initramfs: Generating /boot/initrd.img-5.14.0-kali4-amd64

The problem occurs both on amd64 platforms as well as Kali on arm (RPi)
Steps To Reproduce: sudo apt install cryptsetup-initramfs
Additional Information:
Attached Files:
Notes
(0015471)
arnaudr   
2021-12-03 11:04   
The package "cryptsetup-initramfs" is now included in Kali, if ever you do a fresh install from a weekly image, or if you wait for 2021.4 to be released (soon). So there should be no need to install it, hence no more problem? Also to be honest I have no idea what this error is about, I didn't find anything in the Debian bug tracker...
(0015472)
arnaudr   
2021-12-03 13:19   
I just filed https://bugs.debian.org/1001063 to notify the Debian package maintainer.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7460 [Kali Linux] Kali Package Improvement major always 2021-11-29 05:05 2021-12-02 11:39
Reporter: heywoah Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali installation bugs with net-install and offline installer isos.
Description: Whenever I install Kali from the net-install iso. The retrieving file part takes very time. I know what you would suggest to have a good internet connection but I have a good network and I use ethernet. For example, if there is a 94 MB file then it takes 5 min alone to download that from the server. You can guess the rate at which it is downloading, so it takes 3-4 hours to install Kali on my laptop with a SSD and the installation media is put in USB3.0 slot. And I have to use the net-install iso as there is a separate problem with the offline installer. The offline installer does everything perfectly in half an hour but at "Finishing the Installation" it get stuck on "Running simple-cdd", and I have waited for half an hour on that step but nothing happens, the progress bar stays the same, so I have to abort the install and run it again with net-install iso. And I have tried to install from the offline install (fresh iso from kali.org) 3-4 times it does not solve itself.
Steps To Reproduce:
Additional Information:
Attached Files: VirtualBox_Kali Linux_02_12_2021_11_36_06.png (32,531 bytes) 2021-12-02 11:39
https://bugs.kali.org/file_download.php?file_id=2196&type=bug
png
Notes
(0015464)
arnaudr   
2021-12-02 10:57   
I'm not familiar with the net installer so I'll try to guess. During installation, is there a step where you can choose the mirror location? Did you try different location? Even better, is there a step where you can enter the URL of the mirror you want to use? In this case, try http://kali.download/kali , that should be fast.

Also, may I ask in which country or region of the world you are located? Thanks!
(0015465)
heywoah   
2021-12-02 11:17   
I live in India. And I have not tried the proxy option i just leave it blank. Shouldn't it use whichever is nearest ?
(0015466)
heywoah   
2021-12-02 11:34   
oh I have mistaken proxy for mirror... But it never asks for a mirror. It automatically does it I guess when it is configuring apt.
(0015467)
heywoah   
2021-12-02 11:39   
other than this no other URLs are asked in the net-installer

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7463 [Kali Linux] Feature Requests minor have not tried 2021-11-30 06:35 2021-11-30 23:14
Reporter: kzb Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Automation Script for Keyboard settings
Description: Hi,

please deliver a small config script with kali e.g. /bin/setlang $lang to make it easier to persist a custom language setting.

It's annoying to play half an hour with the undocumented part of Kali to get it working!

For example:

#!/bin/bash
isroot=$(id | grep "root");
if [ -z "$isroot" ]; then
      echo "You're not root..";
      exit;
fi

if [ -z "$1" ]; then
         echo "[usage]: $0 <lang>";
         exit;
fi
# persist for general mapping (doesn't really work!)
setxkbmap -layout "$1"
localectl --no-convert set-x11-keymap "$1"

#persist for login screen
echo '@reboot setxkbmap -layout "$1" \
@reboot localectl --no-convert set-x11-keymap "$1"' >> /etc/crontab

# fixes the defaults
echo "" > /etc/default/locale
echo "LANG=$1.UTF-8" >> /etc/default/locale
echo "LC_ALL=$1.UTF-8" >> /etc/default/locale

echo "Done with setting the lang to $1";

Steps To Reproduce: login mask should provide the right language settings (keyboard mapping) if not it needs to be adjusted..

like German nodeadkeys: z instead of y.. (etc)
Additional Information:
Attached Files:
Notes
(0015452)
kzb   
2021-11-30 06:35   
Script is untested !!! Written out of mind
(0015453)
re4son   
2021-11-30 07:11   
(Last edited: 2021-11-30 07:11)
Have you tried defining your keyboard layout in "/etc/lightdm/lightdm.conf"?
Adding the following in the "[Seat:*]" section will do the trick:

display-setup-script=setxkbmap de

(0015460)
kzb   
2021-11-30 23:13   
not tried, like in the other report.

it's basically the same code but after login or when the lightdm (greeter) starts?
Should work like @reboot

Thanks for the contribution, if you could set it with a sed script (overwriting the defaults inside the conf by using /bin/setlang), would be fine.


... /bin/setlang <code> would be easier than running 20 commands and adjusting 20 popups :D
(0015461)
kzb   
2021-11-30 23:14   
and it should be possible to make a dir inside the cronjobs dir.. no or only one line needs to be added to crontab... which makes things easier.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7462 [Kali Linux] General Bug major always 2021-11-30 06:21 2021-11-30 23:11
Reporter: kzb Platform:  
Assigned To: daniruiz OS:  
Priority: immediate OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Changing language only with a few "Hacks" possible
Description: Hi,

the default language is changeable only for loggedin users but in the login screen you need to use a lot more hacks (e.g. crontab with @reboot + setlang settings and /etc/locales stuff)
 
I am opening a feature request to automate that stuff with a little script (like /bin/setlang)

Also keyboard preference gets overwritten (login screen) with English - to be clear.. that sucks!
Steps To Reproduce: Change your lang (e.g. de_DE and keyboard German nodeadkeys) and logout.. try to login
... same when reboot

Wrong key mapping:
Z=Y and and Y=Z

Additional Information:
Attached Files: VirtualBox_Kali-btrfs_30_11_2021_18_20_32.png (1,244,540 bytes) 2021-11-30 07:21
https://bugs.kali.org/file_download.php?file_id=2194&type=bug
Notes
(0015454)
re4son   
2021-11-30 07:13   
Have you tried defining your keyboard layout in "/etc/lightdm/lightdm.conf"?
Adding the following in the "[Seat:*]" section will do the trick:

display-setup-script=setxkbmap de
(0015455)
re4son   
2021-11-30 07:21   
Alternatively, you can add the keyboard selector to your lightdm panel. That'll allow you to change the language on the fly
(0015459)
kzb   
2021-11-30 23:11   
idk, haven't tried it - someone would like to?

but still, it's easier to have a script. One Code for everything.... so you don't have to switch everything (just the default lang) :-)

Greetz

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7464 [Kali Linux] Kali Package Bug minor have not tried 2021-11-30 09:52 2021-11-30 10:45
Reporter: sbrun Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: kali-dev  
    Target Version:  
Summary: jsql-injection package has no helper-script
Description: the package jsql-injection version 0.82-0kali3 doesn't install the helper-script.

The debian/*.install and debian/*.lintian-overrides have been renamed from jsql-injection.* to jsql.*
But jsql is only a transitional package as documented in debian/control and it must be empty.
The files must be in the jsql-injection package.

The upload has been done on November 18. The broken package will be part of the next release 2021.4

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015457)
sbrun   
2021-11-30 10:45   
fixed in version 0.85-0kali1

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7435 [Kali Linux] Tool Upgrade Request minor N/A 2021-11-01 09:46 2021-11-26 19:26
Reporter: fl0 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: VirtualBox packages version 6.1.28
Description: virtualbox 6.1.28-dfsg-1 is out in Debian unstable.

This is strange, 5.1.28-dfsg-1 was imported instead of 6.1.28-dfsg-1:

[2021-10-14] virtualbox 5.1.28-dfsg-1 imported into kali-rolling (Kali Repository)
[2021-09-07] virtualbox 6.1.26-dfsg-4 imported into kali-rolling (Kali Repository)
[2021-07-09] virtualbox 6.1.22-dfsg-2 imported into kali-rolling (Kali Repository)
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015402)
sbrun   
2021-11-03 11:06   
Thanks for the report

FTR the import of 5.1.28-dfsg-1 has not been done in 2021 but in 2017 (issue of the "website").

I imported the latest version of virtualbox in kali-rolling. It will be available soon.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6835 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-11 23:58 2021-11-25 09:39
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: naabu - A fast port scanner written in go
Description: [Name] - naabu
[Version] - 2.0.2
[Homepage] - https://github.com/projectdiscovery/naabu
[Download] - https://github.com/projectdiscovery/naabu/tags
[Author] - projectdiscovery.io
[License] - MIT
[Description] - A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
[Dependencies] - GoLang
[Similar tools] - Nmap
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014166)
g0tmi1k   
2021-01-29 13:43   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7457 [Kali Linux] General Bug major have not tried 2021-11-23 09:25 2021-11-23 09:25
Reporter: cybw Platform:  
Assigned To: OS:  
Priority: immediate OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Macchanger-Anonsurf and WSL2
Description: Hi,
I have installed Kali Linux through wsl2 and it seems that Windows does not allow to use of Macchanger and Anonsurf.
Is this a bug when using Kali Linux through wsl2 in Windows 11 Pro?
If so I would really appreciate some help to preserve privacy while using Kali Linux.

Best Regards;
Steps To Reproduce: Go and try to change mac address using macchanger. Try to use Anonsurf. None of them works.
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7455 [Kali Linux] New Tool Requests minor N/A 2021-11-22 16:46 2021-11-22 16:46
Reporter: cracken Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Cracken - A Data Driven Approach for Password Cracking
Description: [Name] - Cracken

[Version] - v1.0.1 (git tag)

[Homepage] - https://github.com/shmuelamar/cracken/tree/v1.0.1

[Download] - https://github.com/shmuelamar/cracken/releases/tag/v1.0.0 OR crates.io https://crates.io/crates/cracken/1.0.1

[Author] - Shmuel Amar & Or Safran

[Licence] - MIT

[Description] -

Cracken is used for:

    * Generating Hybrid-Masks very VERY FAST superherozapdash (see performance section)
    * Building Smartlists - compact & representative list of subwords from given passwords files (using hugs HuggingFace's tokenizers)
    * Analyzing passwords for their Hybrid-Masks - building statistics for better password candidates (again very fast)

    Demo on asciinema - https://asciinema.org/a/W8tIemGMzAEuNBvHbii7rcIds


[Dependencies] - all dependencies for build defined on Cargo.toml. The final binary does not require anything else.

[Similar tools] - What other tools are out there? maskprocessor, crunch, princeprocessor

[Activity] - Project started around 2019, we actively developed it and released it as part of our DeepSec2021 talk - https://deepsec.net/speaker.html#PSLOT517

[How to install] -
full description here - https://github.com/shmuelamar/cracken#installation

Option 0000001 - install from crates.io (preferred)
$ cargo install cracken

Option #2 - install with cargo:
2. build from source

$ git clone https://github.com/shmuelamar/cracken
$ cd cracken
$ cargo build --release


[How to use]

run Cracken:

Example 0000001 - generate all words of length 8 starting with uppercase followed by 6 lowercase chars and then a digit:

$ cracken -o pwdz.lst '?u?l?l?l?l?l?l?d'

Example #2 - generate words from two wordlists with year suffix (1000-2999) <firstname><lastname><year>

$ cracken --wordlist firstnames.txt --wordlist lastnames.lst --charset '12' '?w1?w2?1?d?d?d'

Example #3 - create a Smartlist of size 50k from subwords extracted from rockyou.txt

$ cracken create -f rockyou.txt -m 50000 --smartlist smart.lst

Example 0000004 - estimate the entropy of hybrid mask of the password HelloWorld123! using a smartlist

$ cracken entropy -f smart.lst 'HelloWorld123!'

hybrid-min-split: ["hello", "world1", "2", "3", "!"]
hybrid-mask: ?w1?w1?d?d?s
hybrid-min-entropy: 42.73
--
charset-mask: ?l?l?l?l?l?l?l?l?l?l?d?d?d?s
charset-mask-entropy: 61.97

# Even more examples:

Example Usage:

  ## Generate Subcommand Examples:

  # all digits from 00000000 to 99999999
  cracken ?d?d?d?d?d?d?d?d

  # all digits from 0 to 99999999
  cracken -m 1 ?d?d?d?d?d?d?d?d

  # words with pwd prefix - pwd0000 to pwd9999
  cracken pwd?d?d?d?d

  # all passwords of length 8 starting with upper then 6 lowers then digit
  cracken ?u?l?l?l?l?l?l?d

  # same as above, write output to pwds.txt instead of stdout
  cracken -o pwds.txt ?u?l?l?l?l?l?l?d

  # custom charset - all hex values
  cracken -c 0123456789abcdef '?1?1?1?1'

  # 4 custom charsets - the order determines the id of the charset
  cracken -c 01 -c ab -c de -c ef '?1?2?3?4'

  # 4 lowercase chars with years 2000-2019 suffix
  cracken -c 01 '?l?l?l?l20?1?d'

  # starts with firstname from wordlist followed by 4 digits
  cracken -w firstnames.txt '?w1?d?d?d?d'

  # starts with firstname from wordlist with lastname from wordlist ending with symbol
  cracken -w firstnames.txt -w lastnames.txt -c '!@#$' '?w1?w2?1'

  # repeating wordlists multiple times and combining charsets
  cracken -w verbs.txt -w nouns.txt '?w1?w2?w1?w2?w2?d?d?d'


  ## Create Smartlists Subcommand Examples:

  # create smartlist from single file into smart.txt
  cracken create -f rockyou.txt --smartlist smart.txt

  # create smartlist from multiple files with multiple tokenization algorithms
  cracken create -t bpe -t unigram -t wordpiece -f rockyou.txt -f passwords.txt -f wikipedia.txt --smartlist smart.txt

  # create smartlist with minimum subword length of 3 and max numbers-only subwords of size 6
  cracken create -f rockyou.txt --min-word-len 3 --numbers-max-size 6 --smartlist smart.txt


  ## Entropy Subcommand Examples:

  # estimating entropy of a password
  cracken entropy --smartlist vocab.txt 'helloworld123!'

  # estimating entropy of a passwords file with a charset mask entropy (default is hybrid)
  cracken entropy --smartlist vocab.txt -t charset -p passwords.txt

  # estimating the entropy of a passwords file
  cracken entropy --smartlist vocab.txt -p passwords.txt


[Packaged] - Not yet, if thats of interest to Kali we'll package it :)
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7454 [Kali Linux] General Bug crash always 2021-11-22 07:32 2021-11-22 09:38
Reporter: Shuvajit Roy Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Uniscan new Bugs after solving the can't locate Crawler.pm
Description: I have tried hard but can't solve this problem.
At first it was showing that can't locate Crawler.pm but now
 it's showing me can't locate Moose.pm


perl uniscan.pl

Can't locate Moose.pm in @INC (you may need to install the Moose module) (@INC contains: /home/kali/Scanner-Uniscan/uniscan6.2 /etc/perl /usr/local/lib/x86_64-linux-gnu/perl/5.28.1 /usr/local/share/perl/5.28.1 /usr/lib/x86_64-linux-gnu/perl5/5.28 /usr/share/perl5 /usr/lib/x86_64-linux-gnu/perl/5.28 /usr/share/perl/5.28 /usr/local/lib/site_perl /usr/lib/x86_64-linux-gnu/perl-base) at /home/kali/Scanner-Uniscan/uniscan6.2/Uniscan/Crawler.pm line 4.
BEGIN failed--compilation aborted at /home/kali/Scanner-Uniscan/uniscan6.2/Uniscan/Crawler.pm line 4.
Compilation failed in require at uniscan.pl line 25.
BEGIN failed--compilation aborted at uniscan.pl line 25. <\b>

Please some one solve this issue
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015446)
Shuvajit Roy   
2021-11-22 09:38   
I have tried to add the same code used in the bug "Crawler.pm" can't locate

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7453 [Kali Linux] General Bug major always 2021-11-21 02:43 2021-11-22 00:04
Reporter: ynsandre Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: kali for banana pro stuck on booting
Description: stuck after loading all booting scripts
screencapture attached.
Steps To Reproduce:
Additional Information:
Attached Files: IMG_20211121_093920.jpg (933,687 bytes) 2021-11-21 02:43
https://bugs.kali.org/file_download.php?file_id=2191&type=bug
Notes
(0015443)
steev   
2021-11-22 00:01   
(Last edited: 2021-11-22 00:04)
This is already dealt with in the new build scripts so that we use the UUID and don't hardcode a device. I'm not sure why you're not finding the device, as there should only be 1 partition on the banana-pro image, however, if you'd like to fix this up for yourself and have another linux machine (or virtual machine you can plug the sdcard into)...

run

sudo blkid -s UUID -o value /dev/sda1 (or whatever the partition is when you plug the sdcard into your other machine/virtualmachine)

You can edit the /boot/extlinux/extlinux.conf file to change the root= line from "root=/dev/mmcblk0p1" to "root=UUID=$VALUEOFTHECOMMANDABOVE" (without the $)

You might want to also check the /etc/default/u-boot file and make sure it doesn't have it hardcoded there, so that it doesn't revert the change (and make the same change as above to it!)


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7451 [Kali Linux] New Tool Requests minor have not tried 2021-11-20 21:32 2021-11-20 21:32
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Khepri - Cross-platform agent and Post-exploiton tool
Description: [Name] - Khepri
[Version] - 1.0
[Homepage] - https://github.com/geemion/Khepri
[Download] - https://github.com/geemion/Khepri/tags
[Description] - Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7450 [Kali Linux] New Tool Requests minor have not tried 2021-11-20 21:12 2021-11-20 21:12
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: cudatext - Cross-platform code editor
Description: [Name] - cudatext
[Version] - 1.149.2
[Homepage] - https://cudatext.github.io/
[Download] - https://www.fosshub.com/CudaText.html
[Description] - Cross-platform code editor
CudaText is a cross-platform text editor, written in Object Pascal. It is open source project and can be used free of charge, even for business. It starts quite fast: ~0.3 sec with 0000018:0000030 plugins, on Linux on CPU Intel Core i3 3GHz. It is extensible by Python add-ons: plugins, linters, code tree parsers, external tools. Syntax parser is feature-rich, from EControl engine.

(Alt to sublime)
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7445 [Kali Linux] General Bug major always 2021-11-16 11:54 2021-11-20 18:19
Reporter: X0RW3LL Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: linux-image-5.14.0-kali4-amd64 breaks amdgpu
Description: The latest kernel upgrade broke something with the AMD drivers. System is too slow beginning from starting gdm3.
Firefox won't start, Chromium and Settings are too slow to load.

Relevant: https://gitlab.freedesktop.org/drm/amd/-/issues/1756
Steps To Reproduce: Pass "amd_iommu=on iommu=pt" into grub's kernel parameters. (needed to prevent a blank white screen artifact that blocks 50-100% of the display)
Upgrade to the latest kernel: linux-image-5.14.0-kali4-amd64:amd64 (5.14.16-1kali1, automatic)
Additional Information: $ sudo grep 'amdgpu: failed to write' kern.log
Nov 16 03:45:44 FX kernel: [ 34.442881] amdgpu 0000:05:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
Nov 16 03:46:04 FX kernel: [ 54.455116] amdgpu 0000:05:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
Nov 16 03:46:25 FX kernel: [ 74.707065] amdgpu 0000:05:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
Nov 16 03:46:45 FX kernel: [ 94.734884] amdgpu 0000:05:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
Nov 16 03:47:06 FX kernel: [ 115.570254] amdgpu 0000:05:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
Nov 16 03:47:26 FX kernel: [ 135.577939] amdgpu 0000:05:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
Nov 16 03:47:48 FX kernel: [ 157.969775] amdgpu 0000:05:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
Nov 16 03:48:08 FX kernel: [ 177.985661] amdgpu 0000:05:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
Nov 16 03:48:35 FX kernel: [ 204.325577] amdgpu 0000:05:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
Nov 16 03:48:55 FX kernel: [ 224.341478] amdgpu 0000:05:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706

# /var/log/apt/history.log
Start-Date: 2021-11-16 03:05:32
Commandline: apt dist-upgrade -y
Requested-By: x0rw3ll (1000)
Install: linux-headers-5.14.0-kali4-amd64:amd64 (5.14.16-1kali1, automatic), libsepol2:amd64 (3.3-1, automatic), linux-image-5.14.0-kali4-amd64:amd64 (5.14.16-1kali1, automatic), gcc-11-doc:amd64 (11.2.0-1, automatic), liburing2:amd64 (2.1-2, automatic), libsepol-dev:amd64 (3.3-1, automatic), linux-headers-5.14.0-kali4-common:amd64 (5.14.16-1kali1, automatic)
Upgrade: libsphinxbase3:amd64 (0.8+5prealpha+1-12, 0.8+5prealpha+1-13), libsphinxbase3:i386 (0.8+5prealpha+1-12, 0.8+5prealpha+1-13), linux-kbuild-5.14:amd64 (5.14.9-2kali1, 5.14.16-1kali1), libselinux1-dev:amd64 (3.1-3+b1, 3.3-1), libxnvctrl0:amd64 (470.57.02-2, 470.82.00-1), gcc-doc:amd64 (5:10.1.0-2, 5:11.2.0-1), kwayland-integration:amd64 (5.23.2-1, 5.23.3-1), libidn12:amd64 (1.38-3, 1.38-4), john:amd64 (1.9.0-Jumbo-1-0kali3, 1.9.0-Jumbo-1+git20211102-0kali1), packagekit-tools:amd64 (1.2.2-2, 1.2.4-1), malcontent:amd64 (0.10.1-1, 0.10.3-1), libpipewire-0.3-common:amd64 (0.3.39-4, 0.3.40-1), containerd:amd64 (1.5.7~ds1-1, 1.5.7~ds1-2), pipewire-pulse:amd64 (0.3.39-4, 0.3.40-1), libselinux1:amd64 (3.1-3+b1, 3.3-1), libselinux1:i386 (3.1-3+b1, 3.3-1), libsasl2-modules:amd64 (2.1.27+dfsg-2.2, 2.1.27+dfsg-2.3), libsasl2-modules:i386 (2.1.27+dfsg-2.2, 2.1.27+dfsg-2.3), libmalcontent-ui-0-0:amd64 (0.10.1-1, 0.10.3-1), libsasl2-2:amd64 (2.1.27+dfsg-2.2, 2.1.27+dfsg-2.3), libsasl2-2:i386 (2.1.27+dfsg-2.2, 2.1.27+dfsg-2.3), libmalcontent-0-0:amd64 (0.10.1-1, 0.10.3-1), libibverbs1:amd64 (36.0-1, 36.0-2), linux-compiler-gcc-10-x86:amd64 (5.14.9-2kali1, 5.14.16-1kali1), libjs-jquery-ui:amd64 (1.12.1+dfsg-8, 1.13.0+dfsg-1), gcc-doc-base:amd64 (10.1.0-2, 11.2.0-1), linux-headers-amd64:amd64 (5.14.9-2kali1, 5.14.16-1kali1), pipewire:amd64 (0.3.39-4, 0.3.40-1), libsasl2-modules-db:amd64 (2.1.27+dfsg-2.2, 2.1.27+dfsg-2.3), libsasl2-modules-db:i386 (2.1.27+dfsg-2.2, 2.1.27+dfsg-2.3), malcontent-gui:amd64 (0.10.1-1, 0.10.3-1), gir1.2-packagekitglib-1.0:amd64 (1.2.2-2, 1.2.4-1), libstemmer0d:amd64 (2.1.0-2, 2.2.0-1), publicsuffix:amd64 (20210108.1309-1, 20211109.1735-1), packagekit:amd64 (1.2.2-2, 1.2.4-1), libappstream-glib8:amd64 (0.7.18-1, 0.7.18-2), python3-rich:amd64 (9.11.0-1, 10.12.0-1), python3-portend:amd64 (2.7.1-2, 3.0.0-1), linux-image-amd64:amd64 (5.14.9-2kali1, 5.14.16-1kali1), libvte-2.91-common:amd64 (0.64.2-3, 0.66.1-1), libspa-0.2-bluetooth:amd64 (0.3.39-4, 0.3.40-1), python3-sniffio:amd64 (1.1.0-1, 1.2.0-1), plocate:amd64 (1.1.13-1, 1.1.13-1+b1), gstreamer1.0-pipewire:amd64 (0.3.39-4, 0.3.40-1), python3-asciitree:amd64 (0.3.3-2, 0.3.3-3), libpackagekit-glib2-18:amd64 (1.2.2-2, 1.2.4-1), python3-h11:amd64 (0.12.0-1, 0.12.0-2), pipewire-bin:amd64 (0.3.39-4, 0.3.40-1), libcrypt-dev:amd64 (1:4.4.25-2, 1:4.4.26-1), nvidia-settings:amd64 (470.57.02-2, 470.82.00-1), libcrypt1:amd64 (1:4.4.25-2, 1:4.4.26-1), libcrypt1:i386 (1:4.4.25-2, 1:4.4.26-1), john-data:amd64 (1.9.0-Jumbo-1-0kali3, 1.9.0-Jumbo-1+git20211102-0kali1), python3-ply:amd64 (3.11-4, 3.11-5), libsemanage-common:amd64 (3.1-2, 3.3-1), gir1.2-malcontent-0:amd64 (0.10.1-1, 0.10.3-1), ibverbs-providers:amd64 (36.0-1, 36.0-2), eyewitness:amd64 (20211025.1-0kali1, 20211110.1-0kali1), libspa-0.2-modules:amd64 (0.3.39-4, 0.3.40-1), libpipewire-0.3-modules:amd64 (0.3.39-4, 0.3.40-1), librdmacm1:amd64 (36.0-1, 36.0-2), gir1.2-vte-2.91:amd64 (0.64.2-3, 0.66.1-1), libvte-2.91-0:amd64 (0.64.2-3, 0.66.1-1), iproute2:amd64 (5.14.0-1, 5.15.0-1), python3-tempora:amd64 (4.1.1-2, 4.1.2-1), linux-libc-dev:amd64 (5.14.9-2kali1, 5.14.16-1kali1), libpipewire-0.3-0:amd64 (0.3.39-4, 0.3.40-1)
Remove: libsepol1-dev:amd64 (3.1-1)
End-Date: 2021-11-16 03:09:21

$ sudo inxi -G #grabbed from the older bootable image
Graphics: Device-1: NVIDIA TU116M [GeForce GTX 1660 Ti Mobile] driver: nvidia v: 470.82.00
                   Device-2: Advanced Micro Devices [AMD/ATI] Picasso driver: amdgpu v: kernel
                   Device-3: IMC Networks USB2.0 HD UVC WebCam type: USB driver: uvcvideo
                   Display: server: X.Org 1.20.11 driver: loaded: amdgpu,ati,nvidia unloaded: fbdev,modesetting,nouveau,vesa
                   resolution: 1920x1080~120Hz
                   OpenGL: renderer: AMD Radeon Vega 10 Graphics (RAVEN DRM 3.42.0 5.14.0-kali2-amd64 LLVM 12.0.1) v: 4.6 Mesa 21.2.5

$ neofetch --off #grabbed from the older bootable image
OS: Kali GNU/Linux Rolling x86_64
Host: TUF Gaming FX505DU_FX95DU 1.0
Kernel: 5.14.0-kali2-amd64
Uptime: 35 mins
Packages: 3998 (dpkg), 8 (snap)
Shell: bash 5.1.8
Resolution: 1920x1080
DE: GNOME 41.0
WM: Mutter
WM Theme: Kali-Dark
Theme: Flat-Remix-GTK-Blue-Dark [GTK2/3]
Icons: Flat-Remix-Blue-Dark [GTK2/3]
Terminal: tilix
CPU: AMD Ryzen 7 3750H with Radeon Vega Mobile Gfx (8) @ 2.300GHz
GPU: NVIDIA GeForce GTX 1660 Ti Mobile
GPU: AMD ATI 05:00.0 Picasso
Memory: 3222MiB / 15435MiB
Attached Files: kali-nethunter-app-master.tar.gz (860,539 bytes) 2021-11-20 18:19
https://bugs.kali.org/file_download.php?file_id=2190&type=bug
Notes
(0015432)
X0RW3LL   
2021-11-17 10:43   
Update: issue occurs when laptop is plugged in. Everything works fine if I'm booting up on battery.
(0015433)
VT   
2021-11-17 12:59   
I have the same issues on PC so I rolled back to previous version. Looks like a bug in 5.14.16 kernel
(0015441)
g0tmi1k   
2021-11-20 16:12   
Debian bug report https://lists.debian.org/debian-kernel/2021/11/msg00071.html ?
(0015442)
X0RW3LL   
2021-11-20 16:50   
Yep. Hopefully they push that out soon.
Thank you so much for the reply! Please feel free to close/change the status of the issue as you see fit.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7448 [Kali Linux] New Tool Requests minor N/A 2021-11-17 22:03 2021-11-19 22:35
Reporter: coroner Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: feedback Product Version:  
Product Build: Resolution: reopened  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: CryptoLyzer - Fast and flexible server cryptographic (TLS/SSL/SSH) settings analyzer library for Python with CLI
Description: [Name]
CryptoLyzer

[Version]
v0.7.2

[Homepage]
https://gitlab.com/coroner/cryptolyzer

[Download]
https://gitlab.com/coroner/cryptolyzer

[Author]
Szilárd Pfeiffer

[Licence]
Mozilla Public License Version 2.0 (MPL 2.0)

[Description]
Fast and flexible server cryptographic (TLS/SSL/SSH) settings analyzer library for Python with CLI

[Dependencies]
attrs>=19.1
certvalidator
cryptoparser>=0.7.1
enum34==1.1.6;python_version<"3.4"
py2-ipaddress;python_version<"3.4"
python-dateutil
requests
six
typing;python_version<"3.5"
urllib3

[Similar tools]
SSLyze, Testssl.sh

[Activity]

Project start: 2018
Actively maintained: yes

[How to install]
pip install cryptolyzer

[How to use]

cryptolyze tls ciphers www.example.com
cryptolyze ssh2 ciphers www.example.com
cryptolyze http headers www.example.com

[Packaged]
Yes
https://build.opensuse.org/package/show/home:pfeiffersz:cryptolyzer:0:7:2/cryptolyzer
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015438)
g0tmi1k   
2021-11-19 17:37   
Hello, thank you for the suggestion. However I don't think this is going to be for kali at this stage
(0015439)
coroner   
2021-11-19 22:35   
Would you be so kind to give some details? Have you experienced any issues? Do you miss features?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7434 [Kali Linux] Queued Tool Addition minor have not tried 2021-10-30 12:12 2021-11-19 17:37
Reporter: nex Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Mobile Verification Toolkit (MVT) forensics tool
Description: Mobile Verification Toolkit (MVT) is a collection of utilities designed to facilitate the consensual forensic acquisition of iOS and Android devices for the purpose of identifying any signs of compromise. This tool was central to the methodology used to discover cases of infections as part of the Pegasus Project (https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/), and development continues towards a general-purpose forensic toolkit for researchers and investigators working on targeted threats.

It is written in Python and developed at:
https://github.com/mvt-project/mvt
And is available on PyPi:
https://pypi.org/project/mvt/

I am the creator and main developer of mvt, and I would be happy to assist in the process of adding it to Kali. I believe this addition would be greatly beneficial to ours and Kali's users, particularly for those looking to leverage Kali as a forensic live distro when conducting acquisition and analysis of suspected devices.

Although it is not a hard dependency, it would be useful to add to the Kali toolbase also libimobiledevice (and libimobiledevice-utils), which is a necessary toolkit when working with iOS devices.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015397)
nex   
2021-10-30 12:23   
Apologies, I should have checked first for the required format:

[Name] - Mobile Verification Toolkit
[Version] - 1.2.14
[Homepage] - https://github.com/mvt-project/mvt
[Download] - https://pypi.org/project/mvt/#files
[Author] - Claudio Guarnieri
[Licence] - MVT - https://github.com/mvt-project/mvt/blob/main/LICENSE
[Description] - Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.
[Dependencies] - pip3 install .
[Similar tools] - N/A
[Activity] - Oct 30 2021
(0015437)
g0tmi1k   
2021-11-19 17:37   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7432 [Kali Linux] Queued Tool Addition minor have not tried 2021-10-29 13:49 2021-11-19 17:36
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: ScareCrow - Payload creation framework designed around EDR bypass.
Description: [Name] - ScareCrow
[Version] - 3.01
[Homepage] - https://github.com/optiv/ScareCrow
[Download] - https://github.com/optiv/ScareCrow/tags
[Author] - Optiv Security
[License] - MIT
[Description] - Payload creation framework designed around EDR bypass.

ScareCrow is a payload creation framework for side loading (not injecting) into a legitimate Windows process (bypassing Application Whitelisting controls). Once the DLL loader is loaded into memory, it utilizes a technique to flush an EDR’s hook out of the system DLLs running in the process's memory. This works because we know the EDR’s hooks are placed when a process is spawned. ScareCrow can target these DLLs and manipulate them in memory by using the API function VirtualProtect, which changes a section of a process’ memory permissions to a different value, specifically from Execute–Read to Read-Write-Execute.
[Dependencies] - GoLang
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015436)
g0tmi1k   
2021-11-19 17:36   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7420 [Kali Linux] General Bug block always 2021-10-22 06:24 2021-11-19 14:44
Reporter: araganix Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Detection of the trojan and keyloger in the package
Description: detection of the trojan and keyloger in the package

HackTool:Win32/PWDump.C -- pool\non-free\w\windows-binaries\windows-binaries_0.6.9_all.deb

Trojan:PowerShell/Vigorf.A --- pool\main\p\powershell-empire\powershell-empire_4.0.2-0kali1_all.deb->data.tar.xz->(xz)->./usr/share/powershell-empire/empire/server/powershell/Invoke-Obfuscation/Invoke-Obfuscation.ps1
Steps To Reproduce: detection of the trojan and keyloger in the package

HackTool:Win32/PWDump.C -- pool\non-free\w\windows-binaries\windows-binaries_0.6.9_all.deb

Trojan:PowerShell/Vigorf.A --- pool\main\p\powershell-empire\powershell-empire_4.0.2-0kali1_all.deb->data.tar.xz->(xz)->./usr/share/powershell-empire/empire/server/powershell/Invoke-Obfuscation/Invoke-Obfuscation.ps1
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7444 [Kali Linux] Kali Package Bug tweak unable to reproduce 2021-11-15 14:49 2021-11-19 08:08
Reporter: fbeltrao Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: faraday and empire powershell
Description: I cannot update faraday and empire powershell packages, screenshot below
Steps To Reproduce:
Additional Information:
Attached Files: error (4,621 bytes) 2021-11-15 14:49
https://bugs.kali.org/file_download.php?file_id=2187&type=bug
Notes
(0015435)
sbrun   
2021-11-19 08:08   
Thanks for the report.

It seems you have an old version of prompt_toolkit Python module installed in /usr/local/lib/python3.9/dist-packages/. It's something you installed manually. The Kali packages do not install anything in /usr/local.

You need to remove this. Then Python will import the correct version of prompt_toolkit (in /usr/lib/python3/dist-packages/)

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7447 [Kali Linux] General Bug major always 2021-11-17 13:12 2021-11-17 13:12
Reporter: VT Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Bug in kernel version linux-image-5.14.0-kali4-amd64
Description: My issue is similar to this one https://bugs.kali.org/view.php?id=7445 but occurs on desktop PC, new kernel update breaks amdgpu, I cannot operate with SMplayer or any web-browser it just freezes... and booting up a system takes a couple of minutes.
Steps To Reproduce: I tried to purge and reinstall the kernel but nothing helps, only reverting to previous kernel version resolves the problem.
Additional Information: here's the output from `dmesg`

`[ 7.176348] r8169 0000:03:00.0 eth0: Link is Down
[ 7.696779] loop20: detected capacity change from 0 to 8
[ 8.799010] r8169 0000:03:00.0 eth0: Link is Up - 100Mbps/Full - flow control rx/tx
[ 8.799030] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 9.137277] vboxdrv: loading out-of-tree module taints kernel.
[ 9.145641] vboxdrv: Found 8 processor cores
[ 9.164197] vboxdrv: TSC mode is Invariant, tentative frequency 3692813507 Hz
[ 9.164201] vboxdrv: Successfully loaded version 6.1.28_Debian r147628 (interface 0x00320000)
[ 9.171672] VBoxNetFlt: Successfully started.
[ 9.178432] VBoxNetAdp: Successfully started.
[ 9.280335] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation
[ 9.670326] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
[ 9.670328] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
[ 25.849227] loop20: detected capacity change from 0 to 126632
[ 28.313889] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 48.322440] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 68.490447] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 88.502445] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 170.518442] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 190.650037] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 201.170428] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 202.270420] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 211.270027] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 221.186354] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 222.310426] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 231.294638] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 241.510484] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 242.614431] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 261.526051] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 262.638044] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 282.806435] amdgpu 0000:08:00.0: amdgpu: failed to write reg 28b4 wait reg 28c6
[ 302.826439] amdgpu 0000:08:00.0: amdgpu: failed to write reg 1a6f4 wait reg 1a706
[ 302.827083] BUG: Bad page map in process mullvad-gu:cs0 pte:00000001 pmd:14bde0067
[ 302.827088] page:00000000277ac75e refcount:1 mapcount:-1 mapping:0000000000000000 index:0x0 pfn:0x0
[ 302.827094] flags: 0x7ffffc0001000(reserved|node=0|zone=0|lastcpupid=0x1fffff)
[ 302.827102] raw: 0007ffffc0001000 fffff87540000008 fffff87540000008 0000000000000000
[ 302.827105] raw: 0000000000000000 0000000000000000 00000001fffffffe 0000000000000000
[ 302.827107] page dumped because: bad pte
[ 302.827108] addr:000055aa31200000 vm_flags:08000875 anon_vma:0000000000000000 mapping:ffff893f76855e98 index:4e44
[ 302.827113] file:mullvad-gui fault:ext4_filemap_fault [ext4] mmap:ext4_file_mmap [ext4] readpage:ext4_readpage [ext4]
[ 302.827263] CPU: 4 PID: 2535 Comm: mullvad-gu:cs0 Tainted: G OE 5.14.0-kali4-amd64 0000001 Debian 5.14.16-1kali1
[ 302.827268] Hardware name: System manufacturer System Product Name/PRIME B450-PLUS, BIOS 1607 06/17/2019
[ 302.827271] Call Trace:
[ 302.827276] dump_stack_lvl+0x46/0x5a
[ 302.827285] print_bad_pte.cold+0x6b/0xc6
[ 302.827291] ? __mod_lruvec_page_state+0x7f/0xa0
[ 302.827299] unmap_page_range+0x749/0xc80
[ 302.827308] unmap_vmas+0x78/0xf0
[ 302.827314] exit_mmap+0x9c/0x1f0
[ 302.827320] mmput+0x56/0x130
[ 302.827325] do_exit+0x2fa/0xa90
[ 302.827330] do_group_exit+0x33/0xa0
[ 302.827336] get_signal+0x170/0x8d0
[ 302.827341] ? amdgpu_cs_find_mapping+0x110/0x110 [amdgpu]
[ 302.827634] arch_do_signal_or_restart+0xf0/0x7a0
[ 302.827641] ? ktime_get_mono_fast_ns+0x4e/0x90
[ 302.827646] exit_to_user_mode_prepare+0x119/0x180
[ 302.827651] syscall_exit_to_user_mode+0x23/0x40
[ 302.827656] do_syscall_64+0x48/0xc0
[ 302.827660] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 302.827666] RIP: 0033:0x7f7471f3f957
[ 302.827670] Code: Unable to access opcode bytes at RIP 0x7f7471f3f92d.
[ 302.827672] RSP: 002b:00007f7462b7d3c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 302.827677] RAX: 0000000000000000 RBX: 00007f7462b7d430 RCX: 00007f7471f3f957
[ 302.827679] RDX: 00007f7462b7d430 RSI: 00000000c0186444 RDI: 0000000000000017
[ 302.827681] RBP: 00000000c0186444 R08: 00007f7462b7d560 R09: 00007f7462b7d508
[ 302.827684] R10: 0000396e000ea300 R11: 0000000000000246 R12: 0000396e001c0000
[ 302.827686] R13: 0000000000000017 R14: 00000000fffffffd R15: 0000396e001ac090
[ 302.827690] Disabling lock debugging due to kernel taint
[ 302.832961] BUG: Bad rss-counter state mm:00000000635aa6d8 type:MM_FILEPAGES val:-1`
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7446 [Kali Linux] General Bug minor have not tried 2021-11-16 18:30 2021-11-16 18:30
Reporter: Kundan_Rajput Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: desktop is not showing icons and not ae to click on the desktop scren and also not showing the bakground image
Description: i have seen a common issue and this held 2 times with me . the desktop is not showing the background image and also not showing any icon there and als i am not able to click on desktop . this is hapning because i switch off my laptop and when i turn it onn then it was showing me that issue .
please help me and give me the solution of this .
thankyou
and a big thanks to your team because you are working very hard , and really we are very happy
Steps To Reproduce:
Additional Information: first time i have cleared this issue with the help of a youtube video ( the command to clear catches and reboot )
and after that my issue was not resolved.
but then i just go to settings > desktop > and change all the settings like icon size , font size , and removed all the shown icon like home trush etc and then enabled all the icons . and it is resolved ...
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7443 [Kali Linux] General Bug major always 2021-11-10 15:22 2021-11-11 07:20
Reporter: FATRICK Platform:  
Assigned To: Gamb1t OS:  
Priority: immediate OS Version:  
Status: acknowledged Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Pressing keyboard buttons
Description: Everytime I press any button on my keyboard, a window pops up about take my computer in to sleeping mode or shut it down or logout. I tried everthing I can, but this happens all the time. Linux is on my USB device, I tried reinstall multiple times.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015426)
Gamb1t   
2021-11-11 01:05   
Can you please provide some more information? Have you tried multiple versions, have you reinstalled your ISO that you are imaging, have you used a different USB device?
(0015429)
FATRICK   
2021-11-11 07:20   
I tried multiple versions: 2021.3, 2021.2, 2021.1, 2020.1
I reinstalled twice 2021.3 version.
I don't have more USB device.
I use a laptop. Maybe an external keyboard solve the would solve the issue, but I need my laptop keyboard.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7430 [Kali Linux] Feature Requests major have not tried 2021-10-28 17:22 2021-11-09 09:27
Reporter: tjnull Platform:  
Assigned To: sbrun OS:  
Priority: urgent OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Impacket 0.9.24
Description: Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself.

Packets can be constructed from scratch, as well as parsed from raw data, and the object oriented API makes it simple to work with deep hierarchies of protocols. The library provides a set of tools as examples of what can be done within the context of this library.
Steps To Reproduce:
Additional Information: The impacket scripts we pull come from the debian python team have been 5 months out of date: https://salsa.debian.org/python-team/packages/impacket

I am requesting that we pull the impacket scripts from the official release and push them into our package manager as they implement new updates or the scripts but also new scripts that are not part of the one debian implements.
Attached Files:
Notes
(0015419)
sbrun   
2021-11-08 10:45   
I have uploaded impacket in Debian unstable.
(0015422)
sbrun   
2021-11-09 09:27   
 impacket 0.9.24-1 imported into kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7347 [Kali Linux] New Tool Requests minor N/A 2021-09-28 09:03 2021-11-07 12:38
Reporter: backslash0 Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: deserter - a targeted DNS cache poisoner
Description: Name: deserter
Version: v1.0
Homepage: https://github.com/b4ckslash0/deserter
Download: https://github.com/b4ckslash0/deserter/releases/tag/v1.0
Author: backslash0
Licence: MIT
Description: deserter is a targeted DNS cache poisoner capable of DNS cache poisoning without brute forcing the target ID and source port.
Dependencies: The tool relies on PcapPlusPlus and argparse (both are statically linked into the final binary, so there shouldn't be any problems).
Similar tools: dnsspoof.py (https://github.com/DanMcInerney/dnsspoof)
Activity: Development began on 20.09.2021. Support for DNS over IPv6 is also coming.
How to install: https://github.com/b4ckslash0/deserter/releases/tag/v1.0 - instructions for manual compilation are also available on the GitHub page.

How to use:
-h --help shows help message and exits
-v --version prints version information and exits
-t --target IP Address of the machine whose cache to poison [required]
-i --interface Network Interface to use (takes an IP address or a name [required]
-b --bad-ip IP Address to inject into the cache. This shold be the address of the server you want to redirect the victim to [required]
--bad-ipv6 IPv6 Address to inject into the cache. This shold be the address of the server you want to redirect the victim to
--ttl The time-to-live of the poisoned DNS record (specified in seconds). Defaults to 300s or 5min. [default: 300]
-d --domains Specific domains to poison - enter them in a comma-separated list without spaces
-k --keep-alive Used to tell deserter that it should keep waiting for more probes even after a successful poisoning. [default: false]

Packaged: .deb package is available on https://github.com/b4ckslash0/deserter/releases/tag/v1.0
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015418)
backslash0   
2021-11-07 12:38   
The author name is now cr0mll. As such, I urge you to use the new release (it bears the same name, so the link doesn't need to be changed). You shouldn't have to make any changes to links or references, just download from the same release tag again.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7422 [Kali Linux] General Bug minor sometimes 2021-10-23 16:53 2021-11-06 15:48
Reporter: elrey Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Sometimes GPG signature from main kali CDN isn't properly signed
Description: Periodically when using the gpg signature from the main kali CDN (https://kali.download) it will fail the gpg check when verifying the signature.
Steps To Reproduce: curl -fsSL https://archive.kali.org/archive-key.asc | gpg --import

gpg --verify <( curl -fsSL https://cdimage.kali.org/current/SHA256SUMS.gpg ) <( curl -fsSL https://cdimage.kali.org/current/SHA256SUMS )
Additional Information: So, I build kali on a weekly basis, and before this weekend I didn't have any issues with the GPG signature on the main CDN (https://kali.download). For 3 consecutive times now though, I have had my builds fail because of: "gpg: BAD signature from "Kali Linux Repository <devel@kali.org>" [unknown]"

( NOTE: most of these links that I will post require you to login to CircleCI to get more detailed information )

If you go to my CircleCI pipeline for my project: https://app.circleci.com/pipelines/github/elreydetoda/packer-kali_linux you can see I had it fail for 4 times in a row ( all my trying to see if re-running the failed steps would work ).

Every time the pipeline failed it was the signature failing (you can see references to that below) :
https://app.circleci.com/pipelines/github/elreydetoda/packer-kali_linux/514/workflows/a077f696-1726-4108-9db2-3b63c08504ab/jobs/5574#step-104-85
( same file no CircleCI account required ( at the very bottom of the page )) https://circleci.com/api/v1.1/project/github/elreydetoda/packer-kali_linux/5574/output/104/0?file=true&allocation-id=617438f405f1ce6e408aec88-0-build%2F3B8433D

Started to do some local testing, and noticed that it wasn't consistent but just periodic. In this GitHub (GH) issue I have a recording of my terminal where it fails sometimes and it is using the main CDN: https://github.com/elreydetoda/packer-kali_linux/issues/125

When I swapped the CDN to use the Berkly CDN for the signature everything worked perfectly though... GH commit: https://github.com/elreydetoda/packer-kali_linux/commit/4744402085e614aca48b707cc411c62c47300615 ( this will grab both the sha256sums file & the sha256sums.gpg file ) & corresponding successful CI run (for the generate-packer-vars steps): https://app.circleci.com/pipelines/github/elreydetoda/packer-kali_linux/515/workflows/3dc61b4d-c292-4937-8a3a-a5d12fb7051c
Attached Files: Screenshot_20211023_125626.png (26,976 bytes) 2021-10-23 16:57
https://bugs.kali.org/file_download.php?file_id=2166&type=bug
png
Notes
(0015346)
elrey   
2021-10-23 17:04   
here is a screenshot of me
1) running what the "step to repeat" section resolves to (kali.download)
2) running the commands I mentioned in the "step to repeat" section
3) running the commands I mentioned in the "step to repeat" section, but changing it to the berkley CDN instead of main and the signature succeeding
(0015347)
elrey   
2021-10-23 17:04   
didn't upload the pic...sorry...
(0015348)
elrey   
2021-10-23 17:07   
ok..., posting on imgur since it doesn't seem to be uploading properly... https://imgur.com/a/uA8mN71
(0015355)
elrey   
2021-10-25 03:46   
also forgot to mention if you don't have Kali's key imported with gpg you can do this: curl -fsSL 'https://archive.kali.org/archive-key.asc' | gpg --import
(0015416)
elrey   
2021-11-06 15:46   
Looks like things have been fixed (don't know if anything was done or if the CDN was just acting wonky...).

Have a good weekend ��
(0015417)
elrey   
2021-11-06 15:48   
sorry, forgot to add a link for why I think it is: https://github.com/elreydetoda/packer-kali_linux/issues/125#issuecomment-962469642

also, I guess no emoji so emoticon/text :wave: :D

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7437 [Kali Linux] Kali Package Bug minor always 2021-11-03 12:56 2021-11-06 11:22
Reporter: vanguard Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: orphaned entry for firmware-raspberry blocks build of kali-live
Description: Dear maintainers,

I am running into an issue, when I want to build kali-live.
Investigation showed, that in the dependencies the entry for "firmware-raspberry" somewhere still exists, but as this package
is beeing replaced by "bluez-firmware" and now the package "firmware-raspberry" is no more available,
the build crashes due to the missing package.

It would be very nice, if you could have a look at it, maybe this can be easily fixed.

Thank you very much for your efforts.

Best regards

Hans

Steps To Reproduce:
Additional Information: Build.log
...
...
Purging configuration files for dctrl-tools (2.24-3) ...^M
Reading package lists...
Building dependency tree...
Reading state information...
[2021-11-03 14:46:41] lb chroot_install-packages install
P: Begin installing packages (install pass)...
Reading package lists...
Building dependency tree...
Reading state information...
Package firmware-raspberry is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source
However the following packages replace it:
  bluez-firmware

E: Package 'firmware-raspberry' has no installation candidate
E: An unexpected failure occurred, exiting...
P: Begin unmounting filesystems...
P: Saving caches...
Reading package lists...
Building dependency tree...
Reading state information...
...
Attached Files: uit-build-i386.sh (1,885 bytes) 2021-11-06 11:22
https://bugs.kali.org/file_download.php?file_id=2184&type=bug
uit-update-kali.sh (744 bytes) 2021-11-06 11:22
https://bugs.kali.org/file_download.php?file_id=2185&type=bug
Notes
(0015406)
arnaudr   
2021-11-04 02:51   
Hi vanguard!

It's a bit strange, this particular issue was fixed one or two weeks ago already. We didn't see this error message since then, and our daily builds succeed. I just tried to build a live image on my machine (amd64 host) and it succeeds. Are you sure that everything is up to date on your side? Can you post the complete logs (including the exact command that you run), maybe I'll understand better what can go wrong?
(0015415)
vanguard   
2021-11-06 11:22   
Hi arnaudr,

it looks like the error is now gone. Today I tried again, this is what I did.
But please let this bugreport open for a few days more, as I want to be surem if the bug is really gone.
I am building for i386 (using on my EEEPC) and for amd64 (which is also building environment), but as my computers are not very fast, this is lasting
for hours each.

Step-by-step:

Preparations:
1. I am building using the latest kali live I build myself.

2. I deleted the whole directory "live-build-config" to get rid of old configurations, then created a new one with the command from the
kali website "git clone https://gitlab.com/kalilinux/build-scripts/live-build-config.git"

3. THIS IS IMPORTANT(!): changed into live-build-config and in this directory doing the command "lb config". For the first time this is necessary. It is creating the whole build tree (and missimng directory and configs), so you are able to change configs also before the very first build, as needed. Off topic: Maybe this should be added in the documentation of the kali site!

4. I copied my own file list into ~/live-build-config/config/package-lists

5. Last I copied some additional packages, which are not available (like jnetmap, rlinux or eeepc-acpi-scripts) into ~/live-build-config/config/package-chroot/

The Build:
1. For easy build, and so that I do not always have to download every package again, I am using apt-cacher-ng and two self created shell scripts (see attachement). The first is called "uit-update.sh", which is setting my environment (I am mounting a SSD below /mnt), installs needed packages in the live system, automatically updating the git tree, copies the acng.conf to the right place and starts apt-cacher-ng again.

2. Next I start "uit-build.sh" with the correct variable set for i386 (in this example I am building for i386, but amd64 is tunning into the same issue), environment for apt-cacher-ng, bootappends and so on. Look into the attached script, it does everything explain.

This always worked, with the only problem, that the new created live system is always starting XFCE automatically, but should start LXDE, but this issue was opened in another bugreport.

Hope, this makes things a little clearer and also helps other people.

I do not know, if there are people in the worls, which are building kali-live with similar thoughts like me, I believe, most people are building stock live kali systems with no changes, in English, no packages added, no change of environments. Doing so, of course, is well tested with nightly builds.

Thank you very much for your help.

Best regards

Hans

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7433 [Kali Linux] Kali Package Bug major have not tried 2021-10-29 21:09 2021-11-05 06:43
Reporter: BLooDyRiZoW Platform:  
Assigned To: sbrun OS:  
Priority: urgent OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: GVM is not installed
Description: I am running the sudo gvm-setup command. The GVM cannot create a user because the required file does not exist.
Steps To Reproduce:
Additional Information:
Attached Files: 1.png (287,768 bytes) 2021-10-29 21:09
https://bugs.kali.org/file_download.php?file_id=2181&type=bug
image.png (232,475 bytes) 2021-10-30 08:33
https://bugs.kali.org/file_download.php?file_id=2182&type=bug
png
Notes
(0015396)
BLooDyRiZoW   
2021-10-30 08:33   
Gvmd logs.
(0015399)
AxelMahle   
2021-11-02 12:26   
I have the same issue. It happens with a new installation.
(0015400)
BLooDyRiZoW   
2021-11-03 09:26   
How did you solve the problem?
(0015401)
AxelMahle   
2021-11-03 09:33   
I cannot solve the problem.
It looks like a conflict with postgre 13 and 14.
(0015403)
jb   
2021-11-03 17:05   
After creating /run/gvm and chown it to _gvm, I can see

incompatible library "/usr/lib/libgvm-pg-server.so": version mismatch DETAIL: Server is version 14, library is version 13.

Unfortunately, I cannot post all details here
(0015404)
jb   
2021-11-03 17:07   
I get blocked by SUCURI web firewall when trying to post all information I found, but let's try to get more across.
The above information was from /var/log/gvm/gvmd.log. Checking the postgres versions, I see

┌──(root�kali)-[~]
└─# cat /usr/share/gvmd/postgresql-version
14.0

# pg_lsclusters Ver Cluster Port Status Owner Data directory Log file
13 main 5433 online postgres /var/lib/postgresql/13/main /var/log/postgresql/postgresql-13-main.log
14 main 5432 online postgres /var/lib/postgresql/14/main /var/log/postgresql/postgresql-14-main.log


During gvm-setup (now re-run), I see the same (not covered by the long download lists):
(gvmd:12710): md manage-WARNING **: 11:55:48.354: sql_exec_internal: PQexec failed: ERROR: incompatible library "/usr/lib/libgvm-pg-server.so": version mismatch
DETAIL: Server is version 14, library is version 13
(0015405)
jb   
2021-11-03 17:12   
dpkg --list output for (hopefully) relevant packages
ii gvm 21.4.2.0 all remote network security auditor - metapackage and useful scripts
ii gvmd 21.4.4-0kali1 amd64 Manager Module of Greenbone Vulnerability Manager
ii greenbone-security-assistant 21.4.3-0kali1 amd64 remote network security auditor - web interface
ii greenbone-security-assistant-common 21.4.3-0kali1 all architecture independent files for greenbone-security-a>
ii libgvm21:amd64 21.4.2-2 amd64 remote network security auditor - shared libraries
ii openvas-scanner 21.4.2-1 amd64 remote network security auditor - scanner
ii ospd-openvas 21.4.3-1 all OSP server implementation to allow GVM to remotely control an OpenVAS Scanner
(0015407)
sbrun   
2021-11-04 08:14   
Thanks for the report.
FTR the postrgresql packages come from Debian Testing and the packages required for gvmd did not migrate at the same time in Debian Testing so in Kali too.
(0015408)
sbrun   
2021-11-04 08:18   
I will update the gvmd package for postgresql version 14 to fix this
(0015409)
jb   
2021-11-04 09:33   
Great -- thanks!
(0015410)
sbrun   
2021-11-04 13:36   
I have updated the package. Please update your system.
The fixed versions are:
 - gvmd version 21.4.4-0kali2
 - postgresql-common version 231

You may need to upgrade the postgresql clusters to version 14 (see "/usr/share/doc/postgresql-common/README.Debian.gz", section "Default clusters and upgrading" for details)

Please let me know if you still have issues.
(0015411)
myoffset   
2021-11-04 13:50   
I have compile from source and dependencies in other path,
after compile, I replace the new libgvm-pg-server.so.21.4.4 in the place of original /usr/lib/libgvm-pg-server.so.21.4.4.
And now, it’s work!

Bye
(0015412)
jb   
2021-11-04 14:59   
Thanks a lot sbrun! I tried it and it just works (TM) now!
(0015413)
BLooDyRiZoW   
2021-11-04 18:28   
sbrun thanks! Problem solved!

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7440 [Kali Linux] Kali Package Improvement minor have not tried 2021-11-04 21:34 2021-11-05 04:29
Reporter: dirtnapp Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: New to this...packages errors
Description: Sorry but new to all things linux but Im pasting what bit listed

Processing triggers for initramfs-tools (0.140) ...
update-initramfs: Generating /boot/initrd.img-5.14.0-kali2-amd64
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_gpu_info.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/vangogh_gpu_info.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_ta.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_sos.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_ta.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_toc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_asd.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_ta.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_sos.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_rlc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_mec2.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_mec.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_rlc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_mec2.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_mec.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_me.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_pfp.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_ce.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_rlc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_mec2.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_mec.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_me.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_pfp.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_ce.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_sdma.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_sdma.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_sdma.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/sienna_cichlid_mes.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/navi10_mes.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_vcn.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_vcn.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_vcn.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_smc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_smc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_dmcub.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_dmcub.bin for module amdgpu
Processing triggers for update-glx (1.2.1) ...
Processing triggers for glx-alternative-nvidia (1.2.1) ...
Processing triggers for glx-alternative-mesa (1.2.1) ...
Processing triggers for libc-bin (2.32-4) ...
Processing triggers for initramfs-tools (0.140) ...
update-initramfs: Generating /boot/initrd.img-5.14.0-kali2-amd64
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_gpu_info.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/vangogh_gpu_info.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_ta.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_sos.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_ta.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_toc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_asd.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_ta.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_sos.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_rlc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_mec2.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_mec.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_rlc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_mec2.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_mec.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_me.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_pfp.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_ce.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_rlc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_mec2.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_mec.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_me.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_pfp.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_ce.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_sdma.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_sdma.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_sdma.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/sienna_cichlid_mes.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/navi10_mes.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_vcn.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_vcn.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_vcn.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_smc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_smc.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/yellow_carp_dmcub.bin for module amdgpu
W: Possible missing firmware /lib/firmware/amdgpu/beige_goby_dmcub.bin for module amdgpu
                                                                             
Steps To Reproduce: I did nothing as i know not what to do. just informing. I dont even know if it will effect my system normal running of Kali
Additional Information:
Attached Files:
Notes
(0015414)
steev   
2021-11-05 04:29   
This is not a bug, it is simply initramfs-tools warning that a module in the initramfs (in this case, amdgpu) does not have all of the firmware in it. You can typically ignore the messages, unless you have one of the GPUs that require some of those firmware.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7438 [Kali Linux] Feature Requests minor have not tried 2021-11-03 20:13 2021-11-04 02:13
Reporter: surAmzy Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: not installing applications
Description:

Not installing applications . Most of the times it is used to giving response that the command server not found.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7425 [Kali Linux] Feature Requests minor have not tried 2021-10-27 05:19 2021-11-03 20:13
Reporter: Assraful Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: not installing applications
Description:

Not installing applications . Most of the times it is used to giving response that the command server not found.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015360)
daniruiz   
2021-10-26 14:43   
Do you have internet connection and have you executed `sudo apt update` first?
(0015385)
g0tmi1k   
2021-10-28 11:46   
Please could you provide more feedback, such as the exact commands you are running as well as a complete output of the terminal.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7429 [Kali Linux] Kali Package Bug major sometimes 2021-10-28 12:17 2021-10-30 17:11
Reporter: Terraminator Platform:  
Assigned To: steev OS:  
Priority: high OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Error in Haveged.service on Raspberry Pi 4
Description: There are two lines in etc/systemd/system/multi-user.target.wants/haveged.service wich have to be commented!
Otherwise the rasperry will ran into emergency mode with error Failed to start entropy Daemon based on the haveged Algorithm.

These are the lines wich have to be commented:
# SystemCallFilter=@basic-io @file-system @io-event @network-io @signal
# SystemCallFilter=arch_prctl brk ioctl mprotect sysinfo

Further Information:
https://github.com/jirka-h/haveged/issues/63
Steps To Reproduce: Just install kali linux on a raspberry pi 4 and you will get into emergency mode after reboot.
Additional Information:
Attached Files:
Notes
(0015386)
steev   
2021-10-28 15:29   
That's very odd that you end up in emergency mode, haveged failing to start shouldn't be fatal to the boot. I have a pi4 with 8gb as well, let me see if I can reproduce the issue. I'll also comment on the github because this should be specific to the armhf edition of the raspberrypi, and not just raspberrypi because haveged works just fine on the arm64 edition.
(0015387)
steev   
2021-10-28 15:36   
Going back in my chat history, someone else had reported a similar issue, but it ended up being that their power supply wasn't up to snuff, and they were trying to power too many things at the same time off the usb bus of the rpi. Do you happen to have a similar situation?
(0015388)
steev   
2021-10-28 16:30   
I just tested here, grabbing a fresh sdcard, downloading 2021.3 armhf (32bit) for the pi, and booted it on my pi4. haveged was actually disabled on the first boot, so i enabled it and rebooted, and it still does not end up in recovery mode.

I'm re-reading the chat with the user (it was on the #kali-linux irc channel) - the issue for them ended up being that they had too many drives connected, and when they would disconnect them, because they were listed in /etc/fstab *without* the nofail option, the system would not boot because without the nofail option being set, it considers a mount point missing as a fatal error.
(0015389)
Terraminator   
2021-10-28 16:40   
My fstab file doesnt have the nofail option:
root@TERRAMINATOR:~# cat /etc/fstab
# <file system> <mount point> <type> <options> <dump> <pass>
proc /proc proc defaults 0 0
/dev/mmcblk0p1 /boot vfat defaults 0 2
/dev/mmcblk0p2 / ext4 defaults,noatime 0 1

It also isn't a power issue I allready checked this.
(0015390)
Terraminator   
2021-10-28 16:48   
Here is btw my hardware information:
root@TERRAMINATOR:~# lscpu
Architecture: armv7l
  Byte Order: Little Endian
CPU(s): 4
  On-line CPU(s) list: 0-3
Vendor ID: ARM
  Model name: Cortex-A72
    Model: 3
    Thread(s) per core: 1
    Core(s) per socket: 4
    Socket(s): 1
    Stepping: r0p3
    CPU max MHz: 1500.0000
    CPU min MHz: 600.0000
    BogoMIPS: 108.00
    Flags: half thumb fastmult vfp edsp neon vfpv3 tls vfpv4 idiva
                        idivt vfpd32 lpae evtstrm crc32
(0015391)
steev   
2021-10-28 16:52   
What modifications did you make? Did you actually convert your system to ext4? Is this a custom built image from the build scripts? Because the release images are ext3 not ext4, and you can't just say to use ext4, there need to be changes made
(0015392)
Terraminator   
2021-10-28 16:56   
I transfered this system from my old sd to a new it could be that this changed the filesystem
(0015393)
steev   
2021-10-29 16:52   
How old of an installation was it? We haven't used ext4 in a long time (though I do want to go back to it, and do plan to for 2021.4) but I really can't reproduce the issue that you had where it entered recovery mode. Working with upstream, both of the versions of the service file that failed for you work fine here, so I'm really trying to figure out what the difference is.
(0015394)
Terraminator   
2021-10-29 18:32   
This is my Version:
RETTY_NAME="Kali GNU/Linux Rolling"
NAME="Kali GNU/Linux"
ID=kali
VERSION="2021.3"
VERSION_ID="2021.3"
VERSION_CODENAME="kali-rolling"
ID_LIKE=debian
ANSI_COLOR="1;31"
HOME_URL="https://www.kali.org/"
SUPPORT_URL="https://forums.kali.org/"
BUG_REPORT_URL="https://bugs.kali.org/"
When I uncomment the two lines haveged crashs and I run into emergency mode this is all I can say
Thank you
(0015395)
steev   
2021-10-29 18:34   
Can you please provide the contents of your /boot/config.txt , /boot/cmdline.txt and /etc/fstab ?
(0015398)
Terraminator   
2021-10-30 17:11   
root@TERRAMINATOR:~# cat /boot/config.txt
# For more options and information see
# http://rpf.io/configtxt
# Some settings may impact device functionality. See link above for details

# uncomment if you get no picture on HDMI for a default "safe" mode
#hdmi_safe=1

# uncomment this if your display has a black border of unused pixels visible
# and your display can output without overscan
#disable_overscan=1

# uncomment the following to adjust overscan. Use positive numbers if console
# goes off screen, and negative if there is too much border
#overscan_left=16
#overscan_right=16
#overscan_top=16
#overscan_bottom=16

# uncomment to force a console size. By default it will be display's size minus
# overscan.
#framebuffer_width=1280
#framebuffer_height=720

# uncomment if hdmi display is not detected and composite is being output
#hdmi_force_hotplug=1

# uncomment to force a specific HDMI mode (this will force VGA)
#hdmi_group=1
#hdmi_mode=1

# uncomment to force a HDMI mode rather than DVI. This can make audio work in
# DMT (computer monitor) modes
#hdmi_drive=2

# uncomment to increase signal to HDMI, if you have interference, blanking, or
# no display
#config_hdmi_boost=4

# uncomment for composite PAL
#sdtv_mode=2

#uncomment to overclock the arm. 700 MHz is the default.
#arm_freq=800

# Uncomment some or all of these to enable the optional hardware interfaces
#dtparam=i2c_arm=on
#dtparam=i2s=on
#dtparam=spi=on

# Uncomment this to enable the lirc-rpi module
#dtoverlay=lirc-rpi

# Additional overlays and parameters are documented /boot/overlays/README

# Enable audio (loads snd_bcm2835)
dtparam=audio=on

#[pi4]
# Enable DRM VC4 V3D driver on top of the dispmanx display stack
#dtoverlay=vc4-fkms-v3d
#max_framebuffers=2

[all]
#dtoverlay=vc4-fkms-v3d

# If you would like to enable USB booting on your Pi, uncomment the following line.
# Boot from microsd card with it, then reboot.
# Don't forget to comment this back out after using, especially if you plan to use
# sdcard with multiple machines!
# NOTE: This ONLY works with the Raspberry Pi 3+
#program_usb_boot_mode=1
root@TERRAMINATOR:~# cat /boot/cmdline.txt
dwc_otg.fiq_fix_enable=2 console=ttyAMA0,115200 kgdboc=ttyAMA0,115200 console=tty1 root=/dev/mmcblk0p2 rootfstype=ext4 rootwait rootflags=noload net.ifnames=0
root@TERRAMINATOR:~# cat /etc/fstab
# <file system> <mount point> <type> <options> <dump> <pass>
proc /proc proc defaults 0 0
/dev/mmcblk0p1 /boot vfat defaults 0 2
/dev/mmcblk0p2 / ext4 defaults,noatime 0 1

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7431 [Kali Linux] General Bug crash always 2021-10-29 12:21 2021-10-29 12:21
Reporter: FSXpilot18 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Waking up from suspend with Linux Kernel 5.14 & Kali 2021.3
Description: I updated my ThinkPad that I run Kali Linux on to the new linux kernel 5.14.0-kali2-amd64, and I use the i3 window manager, and I have my suspend set to the Ctrl + Windows Key (My mod key) + Delete and what that runs is pm-suspend, then when the computer wakes up, it runs i3lock. Now, I tried to suspend the laptop normally, without the i3lock, and it does the same thing. The thing is the computer just goes to a black screen. When it comes up from the suspend, I get a little underscore line in the top left, then it goes to a black screen. This is after the suspend. I can't get it to go to a TTY terminal, so I just have to shut down the laptop by the power button.
Steps To Reproduce: Install 5.14.0-kali2-amd64
suspend system (However you suspend your system)
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7372 [Kali Linux] General Bug minor always 2021-10-04 22:08 2021-10-28 11:45
Reporter: jsavage Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: No one seeding torrents, http download very very slow.
Description: I am trying to download Kali but the http download is very very slow. I tried torrents, but there are 0 seeds - I've tried the torrent for virtualBox as well and both torrents hae been sitting for a week with 0kb transfered. I've tried using a different machine in case it was a problem with my computer, but still no seeds. I tried 2 other ISPs I have access to, but still no seeds.

Are torrents still supported as a method of DL?
Steps To Reproduce: Try to download via torrent.
Additional Information:
Attached Files:
Notes
(0015262)
arnaudr   
2021-10-05 04:03   
I had success downloading the vmware image via bittorent this week-end. It was fast.
(0015263)
arnaudr   
2021-10-05 04:34   
I just downloaded the virtual box image, ie. kali-linux-2021-3-vbox-amd64.ova, via bittorent. It took 30 minutes, that's fast. But there are only 2 peers.
(0015384)
g0tmi1k   
2021-10-28 11:45   
Can report all torrents are seeding right (x64 VMware has a ratio over 400, x64 Vbox is over 350)
On the allowed list of the tracker. All is green.

Tried downloading locally, without any issues.

Could it be an issue with your ISP?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7134 [Kali Linux] General Bug minor always 2021-04-07 04:51 2021-10-28 11:42
Reporter: gentoo9ball Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: netboot image has not been rebuilt to kali6
Description: PXE Booting Kali with linux/initrd.gz from here tries to use 5.10.0-kali5-amd64

http://archive.kali.org/kali/dists/kali-rolling/main/installer-amd64/current/images/netboot/debian-installer/amd64/
Steps To Reproduce: PXE Kali with linux/initrd.gz from here
http://archive.kali.org/kali/dists/kali-rolling/main/installer-amd64/current/images/netboot/debian-installer/amd64/
Additional Information:
Attached Files:
Notes
(0014432)
gentoo9ball   
2021-04-07 12:59   
FIXED, file dates updated from 3/26/21 to 4/2/21, I tested new files, they work great
(0015335)
gentoo9ball   
2021-10-21 14:51   
Same issue.... 5.10.0-kali9-amd64 does not match kernel version

Need to update netboot image
(0015338)
gentoo9ball   
2021-10-21 19:24   
FIXED

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7350 [Kali Linux] General Bug minor always 2021-09-30 11:42 2021-10-28 10:29
Reporter: vatsal gupta Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kali 2021.3 manually downloading taking 1 day minimum [ NOT INTERNET ISSUE , SAME PROBLEM WITH MANY PEOPLE ]
Description: I am trying to download kali 2021.3 manually but it is taking minimum 1 day to install

THAT IS NOT MY INTERNET ISSUE , SAME PROBLEM WITH MANY PEOPLE , before it I tried to download it on my different devices and same situation arises

I hope it will be resolved soon!

Thanks for your precious time!
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015249)
vatsal gupta   
2021-09-30 14:25   
Kali 2021.3 VMware 64 bit file in my case!!
(0015252)
arnaudr   
2021-09-30 16:50   
Did you try to download via bittorent instead? There's a torrent link for every image, eg. https://www.kali.org/get-kali/#kali-virtual-machines
(0015253)
vatsal gupta   
2021-09-30 16:58   
not yet!

Okay sir, let me check it also!

Thanks for response!
(0015254)
vatsal gupta   
2021-09-30 17:48   
Hey Sir

I Tried torrent file also but same problem arising! Don't know why

Only ISO is working fine!

Sir, I recently saw, this same issue repeating after 2018.

The problem is only in VMware file specially in kali VMware 64 bit installer, I'm a kali user from 2019 but never faced this type of issue, that's just not with me, I asked many people and with different devices, it was the first time!

Yeah, same problem with many people, so there may be some issue of it.

I request you to please have a look on this issue!

Thanks again for your Precious time!
(0015382)
g0tmi1k   
2021-10-28 10:16   
Please could you try again.
We had an issue with our CDN
(0015383)
vatsal gupta   
2021-10-28 10:29   
Yeah, thanks now it's working fine!

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7428 [Kali Linux] Kali Package Bug minor always 2021-10-27 05:19 2021-10-28 10:17
Reporter: Assraful Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali Linux Waagent is not working
Description: Hi Team,

I have provisioned Kali Linux VM for Testing in Azure Cloud. And run the necessary commands for VM setup and join the AD domain. After running commands, VM agent is not ready and not able to join the domain also.
I have tried to restart the vm to start the agent but still same issue persisting and provisioned multiple VM's in different subscription(PROD), different V.net also to identify the issue.


Thanks and Regards,
SuneethaKumari M
suneetha457@gmail.com
#9848798279



Steps To Reproduce:
Additional Information:
Attached Files: image.png (12,640 bytes) 2021-10-25 09:21
https://bugs.kali.org/file_download.php?file_id=2180&type=bug
png
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6505 [Kali Linux] General Bug minor random 2020-06-21 07:43 2021-10-28 10:15
Reporter: Alexandros_Adamos Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Crahsing and restarting on Gnome
Description: I use Gnome for many years. In this version on Kali and Gnome, when I lock my screen and after minutes past I want to log in again, Sometimes I see Gnome crashed and all my opened windows closed. Like restarting system While I just lock my system and I do not restart!
Steps To Reproduce: a) Lock up Systems
b) Try to log in
* This error sometimes occurs.
Additional Information:
Attached Files:
Notes
(0012968)
Alexandros_Adamos   
2020-06-21 08:01   
After this, all extensions will be disabled.
(0012970)
rhertzog   
2020-06-22 07:12   
It's usually a sign that some GNOME Shell extension crashed. Please have a look at the logs with journalctl and see if you can find the "stack trace" of the crash. Or just share the full logs in an attachment and indicate the approximate time of the crash when you logged back in.
(0012972)
Alexandros_Adamos   
2020-06-22 15:34   
Yes. Today I disabled all my extensions and I don't see this issue again.
Sure. I'll check the logs.
Thank you
(0012975)
Alexandros_Adamos   
2020-06-22 16:13   
Is it harmful?
Window manager warning: last_user_time (306747) is greater than comparison timestamp (306674).
Window manager warning: 0x200001 appears to be one of the offending windows with a timestamp of 306747.
(0012976)
Alexandros_Adamos   
2020-06-22 16:24   
Stack trace for context 0x5607e50e0440
(0012977)
Alexandros_Adamos   
2020-06-22 16:30   
value "275" of type 'guint' is invalid or out of range for property 'opacity' of type 'guint'
gnome-shell[48382]: Attempting to call back into JSAPI during the sweeping phase of GC. This is most likely caused by not destroying a Clutt...
gnome-shell[48382]: == Stack trace for context 0x558d21d92440 ==
gnome-shell[48382]: == Stack trace for context 0x558d21d92440 ==
gnome-shell[48382]: == Stack trace for context 0x558d21d92440 ==
gnome-shell[48382]: == Stack trace for context 0x558d21d92440 ==
gnome-shell[48382]: == Stack trace for context 0x558d21d92440 ==
(0014799)
steev   
2021-06-23 20:44   
Are you still seeing this issue in the latest release of Kali (2021.2) ?
(0014851)
Alexandros_Adamos   
2021-06-25 08:11   
No, It's so good. Thanks

But we have an issue with the login page. When Kali is in asleep mode, the screen is locked.
If you suddenly fire up (power on) Kali, sometimes the login page will be bypassed!
(0015328)
Alexandros_Adamos   
2021-10-20 11:20   
The new update is so bugly!!!
(0015380)
g0tmi1k   
2021-10-28 10:15   
What version of Kali are you using?
What version of GNOME are you using?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7421 [Kali Linux] Kali Package Bug minor always 2021-10-23 10:00 2021-10-28 09:58
Reporter: kyanha Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: hashcat crashes with "Illegal instruction" while initializing backend runtime
Description: (I don't know how to express that this seems to be something related to my machine, and I've dist-upgraded Kali to the latest rolling release.)

I'm in the middle of a CTF and I have accordingly marked this as urgent. It is definitely blocking my ability to make use of it, and a package compiled with a compiler that emits illegal instructions would also seem to be a blocking bug for an OS release. I apologize if I've mismarked it.

The summary says it all. I'm including the output from both the pure (unoptimized) and optimized hashcat kernels below.

-+-+- pure -+-+-
hashcat (v6.1.1) starting...

OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 9.0.1, SLEEF, DISTRO, POCL_DEBUG) - Platform 0000001 [The pocl project]
====================================================================================================================================
* Device 0000001: pthread-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1422/1486 MB (512 MB allocatable), 2MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash

ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Initializing backend runtime for device 0000001...Illegal instruction
-+-+- pure end -+-+-

-+-+- optimized -+-+-
hashcat (v6.1.1) starting...

OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 9.0.1, SLEEF, DISTRO, POCL_DEBUG) - Platform 0000001 [The pocl project]
====================================================================================================================================
* Device 0000001: pthread-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1422/1486 MB (512 MB allocatable), 2MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash

ATTENTION! Pure (unoptimized) backend kernels selected.
Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance.
If you want to switch to optimized backend kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Initializing backend runtime for device 0000001...Illegal instruction

-+-+- optimized end -+-+-
Steps To Reproduce:
Additional Information: Windows Device Manager reports the processor as "Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz" with 8 cores, 2 of which are dedicated to the Kali VM.

VirtualBox Version 6.1.26 r145957 (Qt5.6.2). (version 6.1.28 prevents me from running any virtual machines with an VBOX_NEM_INIT_ERROR; I'm running Hyper-V, and apparently 6.1.28 doesn't initialize it the same way.)

I've tried to collect core files; `ulimit -c unlimited` reports unlimited core file size, but the core that's created from this is 0 bytes in size. I'll keep trying, so as to figure out what instruction it's failing on.

Thanks for your help!
Attached Files:
Notes
(0015345)
kyanha   
2021-10-23 10:04   
Sorry, I appear not to have copied the correct optimized output.

-+-+- optimized -+-+-
hashcat (v6.1.1) starting...

OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 9.0.1, SLEEF, DISTRO, POCL_DEBUG) - Platform 0000001 [The pocl project]
====================================================================================================================================
* Device 0000001: pthread-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1422/1486 MB (512 MB allocatable), 2MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31

Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Applicable optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Initializing backend runtime for device 0000001...zsh: illegal hardware instruction hashcat -O hashfile ~/Desktop/work/Hob0Rules/wordlists/rockyou.txt

-+-+- optimized end -+-+-

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7419 [Kali Linux] Tool Upgrade Request minor always 2021-10-22 05:38 2021-10-28 09:58
Reporter: karnhuis Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: THC-Hydra version 9.1 is not working on Kali 2021-3.
Description: When using THC-Hydra version 9.1 no communication is established.
Using Wireshark you can see that there is no packets send from or to the machine using THC-Hydra rendering the tool unusable.
Steps To Reproduce: Just use the tool.

I set up DVWA on one virtual box and Kali 2021-3 on another.
Using THC-Hydra version 9.1 on the Kali box to brute force the DVWA box does not give any result. It just tells me it is polling.
Even using the correct name and password the result is the same. It keeps trying.
Using Wireshark you can see there is no traffic between these two boxes.

Upgrading to a higher version of THC-Hydra does give positive results.
Additional Information: Even on the GitHub page of THC-Hydra they mention that there is a bug in version 9.1:

Note: you need hydra 9.0 - or better 9,2+. hydra 9.1 has a bug in the module and does not work.
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7418 [Kali Linux] Kali Package Bug minor always 2021-10-21 06:02 2021-10-28 09:58
Reporter: tarek1922 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: The problem of Kali Linux not recognizing the Internet connection device
Description: Device Type: EchoLife WiMAX USB Modem Device
Driver name: Cela.C.M
When I click on "Setup"
Not recognized!
While in Windows 7 the device and driver work fine
Is there a way to identify the device driver without problems?
Steps To Reproduce: لا يوجد
Additional Information: لا يوجد
Attached Files: 02202.PNG (63,037 bytes) 2021-10-21 06:02
https://bugs.kali.org/file_download.php?file_id=2165&type=bug
png
Notes
(0015336)
steev   
2021-10-21 15:10   
You will likely need to look into using usb_modeswitch or sakis3g. Most devices like yours, initially show up as a usb storage/cdrom device in order to install the *windows* driver in Windows, but obviously, that doesn't work for Linux.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7405 [Kali Linux] General Bug minor always 2021-10-14 08:15 2021-10-28 09:58
Reporter: slt.42 Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: (Raspberry pi 4) kali-linux-2021.3-rpi4-nexmon-armhf.img.xz is build WITHOUT support for ip6gre
Description: Hello all,

I can not setup ip6gre tunnel, nor ip6gretap tunnel on an up-to-date kali linux 2021.3 system (raspberry pi4):

sudo ip link add name nsfw type ip6gre remote 2a01:fe42:f3e5:dd60:9ee3:1f3:31a:3657 local 2a01:fe42:f3e5:dd60:dea6:32ff:f11a:5fdd
Error: Unknown device type.

OR:

sudo ip link add name nsfw type ip6gretap remote 2a01:fe42:f3e5:dd60:9ee3:1f3:31a:3657 local 2a01:fe42:f3e5:dd60:dea6:32ff:f11a:5fdd
Error: Unknown device type.


Steps To Reproduce:
Additional Information: Operating System: Kali GNU/Linux Rolling
   Kernel: Linux 5.4.83-Re4son-v7l+
   Architecture: arm

$ lsmod | grep gre
ip_gre 28672 0
gre 16384 1 ip_gre
ip_tunnel 28672 1 ip_gre
ipv6 462848 37 ip_gre

$ sudo modprobe ip6_gre
modprobe: FATAL: Module ip6_gre not found in directory /lib/modules/5.4.83-Re4son-v7l+


---
The same commands (minus the IP addresses) work on a similar, but x86_64 architecture, kali linux system:
Operating System: Kali GNU/Linux Rolling
      Kernel: Linux 5.10.0-kali9-amd64
      Architecture: x86-64


$ lsmod | grep gre
ip_gre 32768 0
ip_tunnel 32768 2 ipip,ip_gre
ip6_gre 45056 0
ip6_tunnel 45056 1 ip6_gre
gre 16384 2 ip6_gre,ip_gre


Can you enable support for ip6_gre in the kernel for arm/p4 too please?

Many thanks!

Samuel
Attached Files:
Notes
(0015332)
steev   
2021-10-20 22:59   
I submitted a merge request here - https://github.com/Re4son/re4son-raspberrypi-linux/pull/4
(0015344)
slt.42   
2021-10-22 13:15   
Thank you steev :-)

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7345 [Kali Linux] General Bug minor always 2021-09-27 13:50 2021-10-28 09:58
Reporter: Jambul46 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: VNC KeX crash / kalifs full mismatched checksum
Description: When I install Kali nethunter and go to terminal to start VNC it starts normally but after like 4 seconds I crashes the whole device

PS

I installed the bad checksum version and also the minimal OK one
issue still preserves
Steps To Reproduce:
Additional Information: My Device: Xiaomi redmi note 8T
Kernel: Team420 ginkgo/Willow
ROM: Corvus 9 (Android 10)
Recovery: TWRP
Attached Files: Screenshot_20210927-153354_NetHunter.png (616,880 bytes) 2021-09-27 13:50
https://bugs.kali.org/file_download.php?file_id=2155&type=bug
Notes
(0015241)
Jambul46   
2021-09-27 13:51   
even tried different ROM's
(0015242)
Jambul46   
2021-09-27 20:13   
Update: The KeX error was eliminated (i forgot to turn off dm-verity)
(0015243)
Jambul46   
2021-09-27 20:16   
Another error: I can't access the SD card from terminal if i go to /external_sd it show's it's empty
(0015256)
re4son   
2021-09-30 23:07   
Sha mismatch should be fixed now. We had to kick some stubborn caches.
Let me look into the sd card issue.

Which image are you using?
(0015258)
Jambul46   
2021-10-01 16:57   
2021.3 nethunter generic on Corvus 9 ROM

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7169 [Kali Linux] Feature Requests minor always 2021-05-03 15:55 2021-10-28 09:58
Reporter: cajuun Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Sena UD100 bluetooth usb adapter not working
Description: The Sena UD100 bluetooth adapter is the reference adapter for sniffing bluetooth. It works out of the box with kali 2020.1 in a VMWare VM. In Kali 2021.1 it is not even recognized as a USB device (lsusb will not list it). it also does not show as a bluetooth device for sharing in VMWare Fusion (it does so when using the 2020.1 VM using the very samek VMWare Fusion installation).

Steps To Reproduce: Attach adapter. run lsusb.
Additional Information:
Attached Files: Log_2021-07-17_14-33-29.txt (10,756 bytes) 2021-07-17 06:49
https://bugs.kali.org/file_download.php?file_id=2121&type=bug
Notes
(0014917)
Gamb1t   
2021-07-11 21:46   
Does dmesg see it or say anything about it?
(0014934)
LaraLang   
2021-07-17 06:54   
Apologies to everyone. I attached a file to the wrong issue
(0015340)
Dober   
2021-10-22 00:29   
I am using the same adapter and cannot reproduce a similar issue with Kali 2021.1.
In last 2021.3 with 5.14.0-kali2-amd64 kernel UD100 working fine too.
(0015358)
I-Cat   
2021-10-26 12:58   
It's not working because your Bluetooth is already in use.
Virtual box and VMware use your Bluetooth driver to to make the
Program work. I suggest booting via usb drive but beware that if
You installed a bad program or bad driver it still won't work.

Signed of by -I-Cat : Developer.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7415 [Kali Linux] Kali Package Bug major always 2021-10-20 08:18 2021-10-27 09:05
Reporter: mzet Platform:  
Assigned To: sbrun OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: UDP scanning (-sU) is broken in Nmap version 7.91 and 7.90
Description: See the details here: https://blog.z-labs.eu/2021/10/08/broken-udp-scanning-in-nmap-7-91.html

Latest version of Nmap (7.92) released on August https://seclists.org/nmap-announce/2021/3 contains fix for this issue.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015378)
sbrun   
2021-10-27 09:05   
new version 7.92+dfsg1-0kali1 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7427 [Kali Linux] Kali Package Bug minor always 2021-10-27 05:19 2021-10-27 05:19
Reporter: Assraful Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kex --sl does not start seamless mode on Windows 10 WSL2
Description: Using latest kali linux on Windows 10 x64 Version 2004 Build 19041.508), followed steps to install kex as given here: https://www.kali.org/docs/wsl/win-kex/

running kex as soon as I login to WSL works pretty fine, it launches window mode GUI and work flawlessly.

Where as when I try the seamless mode, VcXsrv crashes showing fatal error message box. (attached screenshot for your reference).

Please help me resolve this.



Steps To Reproduce: 1. Install WSL and kali linux on Windows 10 (professional edition)
2. 2. Install Kex following steps given here: https://www.kali.org/docs/wsl/win-kex/
3. kex --sl

VcXsrv crashes with fatal error. (screenshot attached)
Additional Information: OS: Kali GNU/Linux Rolling on Windows 10 x86_64
Kernel: 4.19.104-microsoft-standard
Uptime: 23 mins
Packages: 1131 (dpkg)
Shell: bash 5.0.18
Terminal: /dev/pts/0
CPU: Intel i7-9750H (12) @ 2.592GHz
Memory: 93MiB / 6248MiB


winver: Windows 10 x64 Version 2004 Build 19041.508)
Attached Files: Screenshot 2020-10-02 153508.jpg (128,397 bytes) 2020-10-02 10:12
https://bugs.kali.org/file_download.php?file_id=2173&type=bug
jpg

win-kexsl.log (1,503 bytes) 2020-10-02 10:19
https://bugs.kali.org/file_download.php?file_id=2174&type=bug
Screenshot 2020-10-03 120138.jpg (37,326 bytes) 2020-10-03 06:33
https://bugs.kali.org/file_download.php?file_id=2175&type=bug
jpg

Screenshot 2021-10-24 035449.png (1,952,547 bytes) 2021-10-23 22:25
https://bugs.kali.org/file_download.php?file_id=2176&type=bug
Screenshot 2021-10-24 040008 (Medium).png (389,194 bytes) 2021-10-23 22:32
https://bugs.kali.org/file_download.php?file_id=2177&type=bug
Screenshot 2021-10-24 040315.png (36,668 bytes) 2021-10-23 22:33
https://bugs.kali.org/file_download.php?file_id=2178&type=bug
png

Screenshot 2021-10-24 140548.jpg (205,057 bytes) 2021-10-24 08:38
https://bugs.kali.org/file_download.php?file_id=2179&type=bug
jpg
Notes
(0015365)
pavangr   
2020-10-02 10:19   
The error log file when VcXsrv failed to lanuch.
(0015366)
steev   
2020-10-02 20:32   
There should be a fix for this coming - can you rm the win-kex.log file and do again? This seems to stem from running kex seamless as root, and root owning the log file, so when you try to run it as a normal user, it can't write to the log.
(0015367)
pavangr   
2020-10-03 06:33   
Tried removing the log files, this time it ran without any errors, however, nothing appeared on the desktop. No Xfce desktop bar for seamless usage. Even tried starting a program from console and received error "Error: no DISPLAY environment variable specified".

when is the fix arriving? any planned dates?
(0015368)
pavangr   
2020-10-03 06:34   
I must thank you for your swift reply though. Highly appreciated!
(0015369)
steev   
2021-06-24 19:09   
Can you reproduce this with the latest version of kex?
(0015370)
igt1400   
2021-10-23 20:06   
hello @pavangr did you resolve the issue?? please let me know if you did.
thank you
(0015371)
pavangr   
2021-10-23 22:00   
@igt1400 @steev let me re-check and report.
(0015372)
pavangr   
2021-10-23 22:25   
Yep!! that's working great!! wow!! Thanks guys!!
(0015373)
pavangr   
2021-10-23 22:32   
I open other native programs like file manager..etc and then open the Firefox browser. The browser don't come-up but other windows opened before freezes and eventually vcx server crashes.
(0015374)
pavangr   
2021-10-23 22:33   
vcxserver crash window..
(0015375)
pavangr   
2021-10-24 08:38   
I have 4K monitor and wondering why it is not taking my native resolution. it would be great if it identify the native resolutions.
(0015376)
steev   
2021-10-25 13:58   
Are you using an Nvidia GPU on that system? We've seen some issues running Firefox and Nvidia GPUs but we aren't sure where the issue is exactly.
(0015377)
pavangr   
2021-10-25 19:42   
you are right, I am using nvidia.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6767 [Kali Linux] Kali Package Bug minor always 2020-10-02 10:12 2021-10-25 19:42
Reporter: pavangr Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kex --sl does not start seamless mode on Windows 10 WSL2
Description: Using latest kali linux on Windows 10 x64 Version 2004 Build 19041.508), followed steps to install kex as given here: https://www.kali.org/docs/wsl/win-kex/

running kex as soon as I login to WSL works pretty fine, it launches window mode GUI and work flawlessly.

Where as when I try the seamless mode, VcXsrv crashes showing fatal error message box. (attached screenshot for your reference).

Please help me resolve this.



Steps To Reproduce: 1. Install WSL and kali linux on Windows 10 (professional edition)
2. 2. Install Kex following steps given here: https://www.kali.org/docs/wsl/win-kex/
3. kex --sl

VcXsrv crashes with fatal error. (screenshot attached)
Additional Information: OS: Kali GNU/Linux Rolling on Windows 10 x86_64
Kernel: 4.19.104-microsoft-standard
Uptime: 23 mins
Packages: 1131 (dpkg)
Shell: bash 5.0.18
Terminal: /dev/pts/0
CPU: Intel i7-9750H (12) @ 2.592GHz
Memory: 93MiB / 6248MiB


winver: Windows 10 x64 Version 2004 Build 19041.508)
Attached Files: Screenshot 2020-10-02 153508.jpg (128,397 bytes) 2020-10-02 10:12
https://bugs.kali.org/file_download.php?file_id=1915&type=bug
jpg

win-kexsl.log (1,503 bytes) 2020-10-02 10:19
https://bugs.kali.org/file_download.php?file_id=1916&type=bug
Screenshot 2020-10-03 120138.jpg (37,326 bytes) 2020-10-03 06:33
https://bugs.kali.org/file_download.php?file_id=1917&type=bug
jpg

Screenshot 2021-10-24 035449.png (1,952,547 bytes) 2021-10-23 22:25
https://bugs.kali.org/file_download.php?file_id=2167&type=bug
Screenshot 2021-10-24 040008 (Medium).png (389,194 bytes) 2021-10-23 22:32
https://bugs.kali.org/file_download.php?file_id=2168&type=bug
Screenshot 2021-10-24 040315.png (36,668 bytes) 2021-10-23 22:33
https://bugs.kali.org/file_download.php?file_id=2169&type=bug
png

Screenshot 2021-10-24 140548.jpg (205,057 bytes) 2021-10-24 08:38
https://bugs.kali.org/file_download.php?file_id=2170&type=bug
jpg
Notes
(0013521)
pavangr   
2020-10-02 10:19   
The error log file when VcXsrv failed to lanuch.
(0013526)
steev   
2020-10-02 20:32   
There should be a fix for this coming - can you rm the win-kex.log file and do again? This seems to stem from running kex seamless as root, and root owning the log file, so when you try to run it as a normal user, it can't write to the log.
(0013529)
pavangr   
2020-10-03 06:33   
Tried removing the log files, this time it ran without any errors, however, nothing appeared on the desktop. No Xfce desktop bar for seamless usage. Even tried starting a program from console and received error "Error: no DISPLAY environment variable specified".

when is the fix arriving? any planned dates?
(0013530)
pavangr   
2020-10-03 06:34   
I must thank you for your swift reply though. Highly appreciated!
(0014842)
steev   
2021-06-24 19:09   
Can you reproduce this with the latest version of kex?
(0015349)
igt1400   
2021-10-23 20:06   
hello @pavangr did you resolve the issue?? please let me know if you did.
thank you
(0015350)
pavangr   
2021-10-23 22:00   
@igt1400 @steev let me re-check and report.
(0015351)
pavangr   
2021-10-23 22:25   
Yep!! that's working great!! wow!! Thanks guys!!
(0015352)
pavangr   
2021-10-23 22:32   
I open other native programs like file manager..etc and then open the Firefox browser. The browser don't come-up but other windows opened before freezes and eventually vcx server crashes.
(0015353)
pavangr   
2021-10-23 22:33   
vcxserver crash window..
(0015354)
pavangr   
2021-10-24 08:38   
I have 4K monitor and wondering why it is not taking my native resolution. it would be great if it identify the native resolutions.
(0015356)
steev   
2021-10-25 13:58   
Are you using an Nvidia GPU on that system? We've seen some issues running Firefox and Nvidia GPUs but we aren't sure where the issue is exactly.
(0015357)
pavangr   
2021-10-25 19:42   
you are right, I am using nvidia.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6899 [Kali Linux] Queued Tool Addition minor have not tried 2020-12-03 11:37 2021-10-23 02:12
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: writehat - A pentest reporting tool written in Python. Free yourself from Microsoft Word.
Description: [Name] - writehat
[Version] - N/A
[Homepage] - https://github.com/blacklanternsecurity/writehat
[Download] - N/A
[Author] - Black Lantern Security
[License] - ? ~ https://github.com/blacklanternsecurity/writehat/blob/master/licenses.md
[Description] - A pentest reporting tool written in Python. Free yourself from Microsoft Word.

WriteHat is a reporting tool which removes Microsoft Word (and many hours of suffering) from the reporting process. Markdown --> HTML --> PDF. Created by penetration testers, for penetration testers - but can be used to generate any kind of report. Written in Django (Python 3).
[Dependencies] - Django ~ https://github.com/blacklanternsecurity/writehat/blob/master/requirements.txt
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014061)
g0tmi1k   
2021-01-08 13:38   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5967 [Kali Linux] Queued Tool Addition minor N/A 2020-01-01 10:29 2021-10-22 10:11
Reporter: j_jito Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Spraykatz - retrieve credentials on Windows machines and large Active Directory environments
Description: - [Name] - Spraykatz
- [Version] - https://github.com/aas-n/spraykatz/releases [0.9.7]
- [Homepage] - https://github.com/aas-n/spraykatz
- [Download] - https://github.com/aas-n/spraykatz/releases
- [Author] - Lyderic Lefebvre (@aas-n)
- [Licence] - MIT Licence
- [Description] - Spraykatz is a tool able to retrieve credentials on Windows machines and large Active Directory environments. It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as much as possible.
- [Dependencies] - pyCryptodomex pyasn1 pyOpenSSL pypykatz>=0.3.0 lxml impacket pywerview
- [Similar tools] - Mimikatz, Pywerview, Sysinternals
- [Activity] - Project last updated on 1st Jan. 2020
- [How to install] - git clone --recurse-submodules https://github.com/aas-n/spraykatz.git && cd spraykatz && pip3 install -r requirements.txt
- [How to use] - python3 spraykatz.py -u "Username" -p "Password" -t "Subnet"
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0011884)
g0tmi1k   
2020-01-13 13:22   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0015343)
sbrun   
2021-10-22 10:11   
version 0.9.9-0kali1 is now kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4578 [Kali Linux] Queued Tool Addition minor have not tried 2018-03-02 09:35 2021-10-22 10:11
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: wotmate - Web of trust grapher
Description: Name: wotmate
Version: v0.1
Homepage: https://github.com/mricon/wotmate
Download: https://github.com/mricon/wotmate/archive/v0.1.tar.gz
Author: Konstantin Ryabitsev
Licence: GNU General Public License v3.0 (https://github.com/mricon/wotmate/blob/master/COPYING)
Description: This is an attempt to reimplement the PGP pathfinder without needing anything other than your own keyring. It still requires that you first make a sqlite database (reimplementation of wotsap) before running the actual graphers, but on the upside it doesn't require that a key is in the "strong set" before you are able to graph paths to it.
Dependencies: python pydotplus (https://github.com/mricon/wotmate/blob/master/requirements.txt)
Similar tools: wotsap / https://www.lysator.liu.se/~jc/wotsap/index.html
Activity: 2018-02-20 - Current
How to use:
- ./graph-paths.py --fromkey torvalds jeyu
- ./graph-to-full.py jeyu
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0012074)
g0tmi1k   
2020-02-10 14:00   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0015342)
sbrun   
2021-10-22 10:11   
version 0.1+git20210512-0kali1 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7411 [Kali Linux] Tool Upgrade Request minor have not tried 2021-10-15 22:17 2021-10-22 10:09
Reporter: epi Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Upgrade feroxbuster to version 2.4.0
Description: Good evening!

Respectfully requesting an upgrade of feroxbuster to version 2.4.0.

https://github.com/epi052/feroxbuster/

Thanks in advance for your help!

epi
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015341)
sbrun   
2021-10-22 10:09   
new version 2.4.0-0kali1 is now kali-dev

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7407 [Kali Linux] General Bug crash always 2021-10-14 10:42 2021-10-22 00:14
Reporter: Fawkesthephoenix Platform:  
Assigned To: daniruiz OS:  
Priority: urgent OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Settings tries to load and crashes after upgrade
Description: When trying to load settings from the gnome interface, it tries loading up and stops.

Loading the control center from the terminal with
gnome-control-center brings the following error.

(gnome-control-center:3555): GLib-GIO-ERROR **: 06:21:29.734: Settings schema 'org.gnome.settings-daemon.plugins.power' does not contain a key named 'power-saver-profile-on-low-battery'
Trace/breakpoint trap

running gnome-control-center as root
Steps To Reproduce: run "gnome-control-center" as user after upgrade
Additional Information:
Attached Files: Screenshot from 2021-10-14 06-36-15.png (630,322 bytes) 2021-10-14 10:42
https://bugs.kali.org/file_download.php?file_id=2159&type=bug
Captura de tela de 2021-10-15 10-49-25.png (92,631 bytes) 2021-10-15 14:08
https://bugs.kali.org/file_download.php?file_id=2160&type=bug
png

Kali Linux-2021-10-18-15-38-52.png (300,726 bytes) 2021-10-18 19:39
https://bugs.kali.org/file_download.php?file_id=2164&type=bug
Notes
(0015290)
j_jito   
2021-10-14 13:06   
I have the same issue here, when I select Power panel, The control center crash immediately, and keep crashing when trying to open it again.

Although I found a temporary solution to open the control center: "gsettings reset org.gnome.ControlCenter last-panel"

This command will reset the last visited panel. But the problem remains, no one can open the power panel.
(0015292)
Bleach   
2021-10-14 15:49   
Same here and when i use gsettings reset org.gnome.ControlCenter last-panel it lets me bring up setting and use any of it but power settings it just crashes
(0015294)
danielm   
2021-10-15 09:46   
Have same issue with the Plasma here. Sometimes the control center crash immediately
(0015295)
mztb   
2021-10-15 14:08   
I have the same issue. If I try to enter on the battery menu, the Control Center crash, but after this, if I try to enter on Wireless settings, Internet settings and any other options, the same issue occurs, and this all since yesterday.
(0015299)
BleepBlorpBlerp   
2021-10-15 17:57   
Also seeing the same bug. A good explanation of the cause may be found here:

https://superuser.com/questions/1681596/why-is-gnome-control-center-trying-to-access-a-gsettings-key-that-doesnt-exist
(0015303)
j_jito   
2021-10-15 18:51   
Yeah that's right, gnome-settings-daemon is still 3.38.2-1, gnome-control-center and gsettings-desktop-schemas are both 41.0-1

The thing is, if you force the upgrade of gnome-settings-daemon to 41.0-2 with kali-dev or unstable repo, it will force the upgrade of gnome-shell and mutter to 41.0-1.

Something I never want to, Gnome 40/41 is too buggy. I will try to downgrade both gnome-control-center and gsettings-desktop-schemas to 3.38 in that case.
(0015304)
Bleach   
2021-10-15 19:45   
Even after reinstalling using live instead of offline does the same thing
(0015305)
j_jito   
2021-10-15 19:48   
I think you should log-out or kill X first before, it's not effective immediately.

With kali live, it's nearly impossible to do this, unless you have a persistent live partition
(0015309)
j_jito   
2021-10-17 16:26   
Ok, so I did it!!! the power panel can be opened normally with eithers operations:

Either you upgrade to gnome 40.4 with kali-dev repo: "apt install -t kali-dev mutter gdm3 gnome-shell gnome-control-center gsettings-desktop-schemas gnome-desktop3-data gnome-session"
OR
You downgrade to gnome 3.38.6 with kali-last-snapshot repo: "apt install --allow-downgrades {mutter,gdm3,gnome-shell,gnome-control-center,gsettings-desktop-schemas,gnome-desktop3-data,gnome-session}/kali-last-snapshot"

I made both tests, and it's WORKING!!!
(0015310)
blaqsense   
2021-10-17 20:33   
Same here for the last week. After upgrading kali 2021.3 I'm no longer able to access my settings. I've uninstalled and reinstalled but after upgrade nothing happens.
I finally reinstalled....set my power settings before updating but soon after, now I'm back to square one. Not able to access my settings panel.

Waiting for a patch in the next update until further notice.
(0015312)
BleepBlorpBlerp   
2021-10-17 22:39   
I was unable to get j_jito's upgrade/downgrade options to work. Not that this matters, though. I'm using Kali Rolling and want to be careful about upgrading by going to the kali-dev repository. On the other side of the coin, I'm not too keen on downgrading what I've got, either (other than the power panel, it seems to be working well).

Looks like I'm stuck waiting for a patch via normal channels!
(0015313)
Bleach   
2021-10-17 23:16   
I tried upgrading and down grading and it gave me errors because of updated packages being newer then ones being installed there where 2 of them i removed the first package and all i got was a curser i rebooted and it worked fine
(0015315)
blaqsense   
2021-10-18 19:39   
After updating this morning 10/18/21 I'm now able to access the settings panel without any issues.

Thank you
(0015316)
j_jito   
2021-10-18 20:33   
It should be working now, Kali team just pushed gnome-shell 40.5 to Kali-Rolling channel
(0015322)
daniruiz   
2021-10-19 09:14   
This is now fixed with the update for gnome 40
If it still gives you any issue feel free to reopen this bug report.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7339 [Kali Linux] General Bug major always 2021-09-22 19:33 2021-10-22 00:13
Reporter: 4wi7u4 Platform:  
Assigned To: rhertzog OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: Live USB Encrypted Persistence won't work.
Description: I've written the Kali 2021.3 image via dd and created the LUKS partition called 'persistence'. Created persistence.conf on it which contains '/ union'. Then I tried to boot up in 'Live USB Encrypted Persistence'. It just started the Live without asking LUKS password.
Steps To Reproduce: 1) Write the flash drive via dd
2) create a LUKS partition called 'persistence'
3) create persistence.conf which contains '/ union' on it
4) boot up using 'Live USB Encrypted Persistence'
Additional Information: I didn't tried creating encrypted persistence on this version. It definitely worked on 2021.2. So, I think it is a 2021.3 bug.
Attached Files:
Notes
(0015240)
HelpfulHermit   
2021-09-26 19:27   
I've experienced the same. I spent some time trying multiple combinations of SD Cards, Flash Drives, and writing software - being sure to follow the documentation (and trying my own thing).

As above 2021.2 consistently works fine, and encrypted persistence in 2021.3 just doesn't. Non-encrypted persistence in 2021.3 seems to work though.

I've also tested with "kali-linux-2021-W39-live-everything-amd64.iso" in case there's something updated/extra in there but encrypted persistence doesn't work in that either.
(0015300)
Gamb1t   
2021-10-15 18:43   
Another example https://bugs.kali.org/view.php?id=7373
(0015317)
MotherMucca   
2021-10-18 22:27   
I have the same problem. I discovered it’s because the cryptsetup-initramfs package isn’t included in the live image. I rebuilt the live image with that package and everything worked.
(0015319)
arnaudr   
2021-10-19 07:59   
I can confirm. I downloaded both the 2021.2 and 2021.3 live images, unpacked the initrd and looked at the content:

$ find initrd-2021.2 -name '*cryptsetup*'
initrd-2021.2/main/usr/lib/cryptsetup
initrd-2021.2/main/usr/lib/cryptsetup/askpass.cryptsetup
initrd-2021.2/main/usr/lib/cryptsetup-nuke-password
initrd-2021.2/main/usr/lib/x86_64-linux-gnu/libcryptsetup.so.12
initrd-2021.2/main/usr/lib/x86_64-linux-gnu/libcryptsetup.so.12.6.0
initrd-2021.2/main/usr/sbin/cryptsetup
initrd-2021.2/main/conf/conf.d/cryptsetup

$ find initrd-2021.3 -name '*cryptsetup*'
initrd-2021.3/main/usr/lib/cryptsetup
initrd-2021.3/main/usr/lib/cryptsetup/askpass.cryptsetup
initrd-2021.3/main/usr/lib/cryptsetup-nuke-password
initrd-2021.3/main/conf/conf.d/cryptsetup


Indeed, the cryptsetup binary is missing.
(0015334)
rhertzog   
2021-10-21 13:51   
Should be fixed in the 2021.3a release ISO that we released:
http://cdimage.kali.org/kali-2021.3/kali-linux-2021.3a-live-amd64.iso

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7388 [Kali Linux] General Bug major always 2021-10-12 00:15 2021-10-21 15:16
Reporter: NoQuarter Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: won't fix  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Failed to copy G:\ to C:\win32-loader\linux
Description: Once the download is complete. I go to the install file and run the setup file. Its starts and gives an error of Error/Failed to copy G:\ to C:\win32-loader\linux
Steps To Reproduce: run the setup file
Additional Information: help
Attached Files: Screenshot (1).png (93,433 bytes) 2021-10-12 00:15
https://bugs.kali.org/file_download.php?file_id=2157&type=bug
png
Notes
(0015298)
konFMI   
2021-10-15 15:10   
I think my comment in BUG:0007382 https://bugs.kali.org/view.php?id=7382#c15297 is valid for here as well. Try installing it with Rufus on a USB flash drive, then boot from that on whatever you are trying to install it on.
(0015337)
steev   
2021-10-21 15:16   
We do not actually support this mode of installation currently. It is present because we use the debian-installer, and it's left over from that. In the future we may support it, and if we do, it will be announced.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7352 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:44 2021-10-21 15:16
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: HIDviz: A tool for in-depth analysis of USB HID devices communication
Description: [Name] - HIDviz
[Version] - 0.1.5
[Homepage] - https://github.com/ondrejbudai/hidviz
[Download] - https://github.com/ondrejbudai/hidviz/releases
[Author] - Ondřej Budai @ondrejbudai
[License] - GPL3 ~ https://github.com/ondrejbudai/hidviz/blob/master/LICENSE
[Description] - Hidviz is a GUI application for in-depth analysis of USB HID class devices. The 2 main usecases of this application are reverse-engineering existing devices and developing new USB HID devices.
[Dependencies] - sudo apt install build-essential qtbase5-dev libprotobuf-dev protobuf-compiler libusb-1.0-0-dev
[Similar tools] - N/A
[Activity] - Jun 30 2020
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7353 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:45 2021-10-21 15:16
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: kbd-audio: Tools for capturing and analysing keyboard input paired with microphone capture
Description: [Name] - kbd-audio
[Version] - N/A
[Homepage] - https://github.com/ggerganov/kbd-audio
[Download] - https://github.com/ggerganov/kbd-audio/releases
[Author] - Georgi Gerganov @ggerganov
[License] - MIT ~ https://github.com/ggerganov/kbd-audio/blob/master/LICENSE
[Description] - This is a collection of command-line and GUI tools for capturing and analyzing audio data.
[Dependencies] - sudo apt install libsdl2-dev
[Similar tools] - N/A
[Activity] - May 16 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7354 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:46 2021-10-21 15:15
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: X11docker: Run GUI applications and desktops in docker.
Description: [Name] - X11docker
[Version] - 6.9.0
[Homepage] - https://github.com/mviereck/x11docker
[Download] - https://github.com/mviereck/x11docker/releases
[Author] - @mviereck
[License] - MIT ~ https://github.com/mviereck/x11docker/blob/master/LICENSE.txt
[Description] - x11docker allows to run graphical desktop applications (and entire desktops) in Docker Linux containers.
[Dependencies] - sudo apt install docker-ce xdotool xauth xinit xclip xhost xrandr xdpyinfo xpra
[Similar tools] - N/A
[Activity] - Oct 3 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7355 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:47 2021-10-21 15:15
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Manalyze: A static analyzer for PE executables
Description: [Name] - Manalyze
[Version] - N/A
[Homepage] - https://github.com/JusticeRage/Manalyze
[Download] - https://github.com/JusticeRage/Manalyze/releases
[Author] - Ivan Kwiatkowski @JusticeRage
[License] - GPL3 ~ https://github.com/JusticeRage/Manalyze/blob/master/LICENSE.txt
[Description] - It's a robust parser for PE files with a flexible plugin architecture which allows users to statically analyze files in-depth.
[Dependencies] - sudo apt install libboost-regex-dev libboost-program-options-dev libboost-system-dev libboost-filesystem-dev libssl-dev build-essential cmake git
[Similar tools] - N/A
[Activity] - Jul 27 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7356 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:48 2021-10-21 15:15
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: QCsuper: QCsuper is a tool communicating with Qualcomm-based phones and modems
Description: [Name] - QCsuper
[Version] - N/A
[Homepage] - https://github.com/P1sec/QCSuper
[Download] - https://github.com/P1sec/QCSuper/releases
[Author] - P1 Security
[License] - GPL3 ~ https://github.com/P1sec/QCSuper/blob/master/LICENSE
[Description] - QCsuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.
[Dependencies] - sudo apt install python3-pip wireshark
[Similar tools] - Scat
[Activity] - Jul 29 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7357 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:49 2021-10-21 15:15
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Scat: SCAT: Signaling Collection and Analysis Tool
Description: [Name] - Scat
[Version] - N/A
[Homepage] - https://github.com/fgsect/scat
[Download] - https://github.com/fgsect/scat/releases
[Author] - Security in Telecommunications
[License] - GPL2
[Description] - This application parses diagnostic messages of Qualcomm and Samsung baseband through USB, and generates a stream of GSMTAP packet containing cellular control plane messages.
[Dependencies] - sudo apt install python3-pip wireshark
[Similar tools] - QCsuper
[Activity] - Aug 19 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7358 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:49 2021-10-21 15:15
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Sparrow-wifi: Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux
Description: Name] - Sparrow-Wifi
[Version] - N/A
[Homepage] - https://github.com/ghostop14/sparrow-wifi
[Download] - https://github.com/ghostop14/sparrow-wifi/releases
[Author] - @ghostop14
[License] - GPL3 ~ https://github.com/ghostop14/sparrow-wifi/blob/master/LICENSE
[Description] - Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux
[Dependencies] - sudo apt install python3-pip gpsd gpsd-clients python3-tk python3-setuptools
[Similar tools] - N/A
[Activity] - May 21 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7359 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:50 2021-10-21 15:15
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SprayingToolkit: Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more eff
Description: [Name] - SprayingToolkit
[Version] - N/A
[Homepage] - https://github.com/byt3bl33d3r/SprayingToolkit
[Download] - https://github.com/byt3bl33d3r/SprayingToolkit/releases
[Author] - @byt3bl33d3r
[License] - GPL3 ~ https://github.com/byt3bl33d3r/SprayingToolkit/blob/master/LICENSE
[Description] - A set of Python scripts/utilities that tries to make password spraying attacks against Lync/S4B & OWA a lot quicker, less painful and more efficient.
[Dependencies] - sudo pip3 install -r requirements.txt
[Similar tools] - N/A
[Activity] - Oct 9 2020
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7360 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:51 2021-10-21 15:15
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SSHpry2.0: Spy & Control os SSH Connected client's TTY
Description: [Name] - SSHpry2.0
[Version] - N/A
[Homepage] - [Name] - SSHpry2.0
[Version] - N/A
[Homepage] - https://github.com/nopernik/SSHPry2.0
[Download] - https://github.com/nopernik/SSHPry2.0/releases
[Author] - Korznikov Alexander @nopernik
[License] - GPL3 ~ https://github.com/nopernik/SSHPry2.0/blob/master/LICENSE
[Description] - SSHPry v2 - Spy & Control os SSH Connected client's TTY
[Dependencies] - N/A
[Similar tools] - N/A
[Activity] - Sep 30 2017
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7361 [Kali Linux] New Tool Requests feature N/A 2021-10-04 16:52 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Fuzzowski: the Network Protocol Fuzzer that we will want to use.
Description: [Name] - Fuzzowski
[Version] - N/A
[Homepage] - https://github.com/nccgroup/fuzzowski
[Download] - https://github.com/nccgroup/fuzzowski/releases
[Author] - NCC Group Plc
[License] - GPL2 ~ https://github.com/nccgroup/fuzzowski/blob/master/LICENSE.txt
[Description] - The aim of this tool is to assist during the whole process of fuzzing a network protocol, allowing to define the communications, helping to identify the "suspects" of crashing a service, and much more
[Dependencies] - pip3 install -r requirements.txt
[Similar tools] - N/A
[Activity] - Sept 16 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7362 [Kali Linux] New Tool Requests feature N/A 2021-10-04 17:45 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: ScriptCommunicator: scriptable terminal supports serial port (RS232, USB to serial), UDP, TCP client/server, SPI, I2C and CAN
Description: [Name] - ScriptCommunicator
[Version] - 5.15
[Homepage] - https://sourceforge.net/projects/scriptcommunicator
[Download] - https://sourceforge.net/projects/scriptcommunicator/files/Linux_64Bit/
[Author] - @szieke
[License] - GPL3 ~ https://sourceforge.net/directory/os:linux/license:gplv3/
[Description] - ScriptCommunicator is a scriptable cross-platform data terminal which supports serial port (RS232, USB to serial), UDP, TCP client/server, SPI, I2C and CAN. All sent and received data can be shown in a console and can be logged in an html and a text log.
[Dependencies] - N/A
[Similar tools] - N/A
[Activity] - Aug 18 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7363 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:18 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Nemesis: network packet crafting and injection utility
Description: [Name] - Nemesis
[Version] - 1.8
[Homepage] - https://github.com/troglobit/nemesis
[Download] - https://github.com/troglobit/nemesis/releases
[Author] - Joachim Nilsson
[Licence] - BSD - https://github.com/troglobit/nemesis/blob/master/LICENSE
[Description] - A command-line network packet crafting and injection utility
[Dependencies] - libnet1-dev
[Similar tools] - scapy
[Activity] - Jul 20 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7364 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:18 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Radamsa: test case generator for robustness testing, a.k.a. a fuzzer
Description: [Name] - Radamsa
[Version] - 0.6
[Homepage] - https://gitlab.com/akihe/radamsa
[Download] - N/A
[Author] - Aki Helin
[Licence] - MIT - https://gitlab.com/akihe/radamsa/blob/develop/LICENCE
[Description] - Radamsa is a test case generator for robustness testing, a.k.a. a fuzzer
[Dependencies] - gcc, make, git, wget
[Similar tools] - N/A
[Activity] - Aug 4 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7365 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:18 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Sherloq: an open-source digital image forensic toolset
Description: [Name] - Sherloq
[Version] - 0.85a
[Homepage] - https://github.com/GuidoBartoli/sherloq
[Download] - https://github.com/GuidoBartoli/sherloq/releases
[Author] - Guido Bartoli
[Licence] - GPL3 - https://github.com/GuidoBartoli/sherloq/blob/master/LICENSE
[Description] - Sherloq is a personal research project about implementing a fully integrated environment for digital image forensics
[Dependencies] - pip3 install -r requirements.txt
[Similar tools] - N/A
[Activity] - Jun 14 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7367 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:19 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Nettacker: Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Description: [Name] - Nettacker
[Version] - 0.0.3.4
[Homepage] - https://github.com/OWASP/Nettacker
[Download] - https://github.com/OWASP/Nettacker/releases
[Author] - OWASP
[Licence] - Apache - https://github.com/OWASP/Nettacker/blob/master/LICENSE
[Description] - OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information
[Dependencies] - libcurl4-openssl-dev, libcurl4-gnutls-dev, librtmp-dev, libssl-dev, python3-dev, libpq-dev, libffi-dev, make, gcc, git
[Similar tools] - N/A
[Activity] - Oct 4 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7368 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:27 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Lucifer: a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltrat
Description: [Name] - Lucifer
[Version] - 0.6.6
[Homepage] - https://github.com/Skiller9090/Lucifer
[Download] - https://github.com/Skiller9090/Lucifer/releases
[Author] - AlexG Skiller9090
[Licence] - Creative Commons - https://github.com/Skiller9090/Lucifer/blob/master/LICENSE
[Description] - Lucifer A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
[Dependencies] - pip3 install -r requirements.txt
[Similar tools] - N/A
[Activity] - Apr 21 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7366 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:19 2021-10-21 15:14
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Social Mapper: a Social Media Enumeration & Correlation Tool
Description: [Name] - social_mapper
[Version] - 0.1.0
[Homepage] - https://github.com/Greenwolf/social_mapper
[Download] - https://github.com/Greenwolf/social_mapper/releases
[Author] - Jacob Greenwolf
[Licence] - GPL3 - https://github.com/Greenwolf/social_mapper/blob/master/LICENSE
[Description] - Social Mapper is an Open Source Intelligence Tool that uses facial recognition to correlate social media profiles across different sites on a large scale
[Dependencies] - geckodriver, build-essential, cmake, libgtk-3-dev, libboost-all-dev
[Similar tools] - N/A
[Activity] - Jul 12 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7369 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:28 2021-10-21 15:13
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: DonPAPI: Dumping DPAPI credz remotely
Description: [Name] - DonPAPI
[Version] - 1.0.0
[Homepage] - https://github.com/login-securite/DonPAPI
[Download] - https://github.com/login-securite/DonPAPI/releases
[Author] - Login Securite
[Licence] - N/A
[Description] - DonPAPI Dumping revelant information on compromised targets without AV detection
[Dependencies] - pip3 install -r requirements.txt
[Similar tools] - N/A
[Activity] - Oct 1 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7370 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:34 2021-10-21 15:13
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Crosslinked: LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Description: [Name] - CrossLinked
[Version] - 0.0.5
[Homepage] - https://github.com/m8r0wn/CrossLinked
[Download] - https://github.com/m8r0wn/CrossLinked/releases
[Author] - m8r0wn
[Licence] - GPL3 - https://github.com/m8r0wn/CrossLinked/blob/master/LICENSE
[Description] - CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization
[Dependencies] - pip3 install -r requirements.txt
[Similar tools] - N/A
[Activity] - Jul 28 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7371 [Kali Linux] New Tool Requests feature N/A 2021-10-04 18:35 2021-10-21 15:11
Reporter: j_jito Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: BlackMamba: C2/post-exploitation framework
Description: [Name] - BlackMamba
[Version] - 1.0.41
[Homepage] - https://github.com/loseys/BlackMamba
[Download] - https://github.com/loseys/BlackMamba/releases
[Author] - Gustavo loseys
[Licence] - MIT - https://github.com/loseys/BlackMamba/blob/main/LICENSE
[Description] - Black Mamba is a Command and Control (C2) that works with multiple connections at same time
[Dependencies] - pip3 install -r requirements.txt
[Similar tools] - Pupy
[Activity] - May 2 2021
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7416 [Kali Linux] New Tool Requests minor have not tried 2021-10-20 12:59 2021-10-21 15:11
Reporter: daniruiz Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: evil-winrm - The ultimate WinRM shell for hacking/pentesting
Description: - [Name] - evil-winrm
- [Version] - v3.3
- [Homepage] - https://github.com/Hackplayers/evil-winrm
- [Download] - https://github.com/Hackplayers/evil-winrm/releases
- [Author] - Luis Vacas (CyberVaca)
- [License] - GPLv3.0
- [Description] - The ultimate WinRM shell for hacking/pentesting
- [Dependencies] - ruby gems: winrm >=2.3.2, winrm-fs >=1.3.2, stringio >=0.0.2, logger >= 1.4.3, fileutils >= 0.7.2
- [Similar tools] - What other tools are out there?
- [Activity] - Started 2 years ago. Actively maintained
- [How to install] - sudo gem install evil-winrm
- [How to use] - evil-winrm -i IP -u USER [-s SCRIPTS_PATH] [-e EXES_PATH] [-P PORT] [-p PASS] [-H HASH] [-U URL] [-S] [-c PUBLIC_KEY_PATH ] [-k PRIVATE_KEY_PATH ] [-r REALM] [--spn SPN_PREFIX] [-l]
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7340 [Kali Linux] Feature Requests minor N/A 2021-09-23 11:11 2021-10-20 22:58
Reporter: kali_feature_submission Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: no change required  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: ARM VmWare Fusion
Description: Hi Kali Linux Devs,

VMWare has blessed us with the tech preview for ARM based Macs, allowing us to run ARM64 Guests.

There are a number of tweaks needed along with a new kernel (5.14) and release of open-vm-tools to get the full experience working properly.

https://communities.vmware.com/t5/Fusion-for-Apple-Silicon-Tech/Fusion-Tech-Preview-Testing-Guide/ta-p/2867908

Would it be possible to look at getting the updated vmware tools in the repos and possibly the new kernel looked into?

Thanks!

Also is it a possibility to have an ARM VmWare image vended?
Steps To Reproduce: n/a
Additional Information:
Attached Files:
Notes
(0015268)
kali_feature_submission   
2021-10-08 00:12   
this can be resolved 5.14 & the latest open-vm-tools have hit experimental - thanks!


kali@kali:~$ uname -r
5.14.0-kali2-arm64
kali@kali:~$ vmware-toolbox-cmd --version
11.3.0.29534 (build-18090558)
(0015331)
steev   
2021-10-20 22:58   
Thanks - actually there was one additional bug, we were only including open-vm-tools-desktop on amd64 and i386 but that should be fixed in the next weekly image as well as in 2021.4.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7378 [Kali Linux] Kali Package Bug minor always 2021-10-08 17:48 2021-10-20 22:48
Reporter: abrining Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: no change required  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Inundator not in kali apt packages
Description: The package "inundator" does not appear in the kali-rolling apt repository, even though it is listed on tools.kali.org. In order to install inundator, one must do so via inundator's repo.

http://inundator.sourceforge.net/
https://tools.kali.org/stress-testing/inundator
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015330)
steev   
2021-10-20 22:48   
The tools page was old, and it no longer shows up in the new tools page. That said, the package was removed due to age as it hasn't seen updates in 11 years.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7382 [Kali Linux] General Bug major have not tried 2021-10-10 13:41 2021-10-20 21:59
Reporter: glenconnell9 Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: won't fix  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Failed to copy F:\ to C:\win32-loader\
Description: Once the download is complete. I go to the install file and run the setup file. Its starts and gives an error of Error/Failed to copy F:\ to C:\win32-loader\
Steps To Reproduce: run the setup file
Additional Information: help
Attached Files:
Notes
(0015297)
konFMI   
2021-10-15 15:07   
Hi. Did what you said and reproduce it, only it was |Failed to copy E:\ to C:\win32-loader\|. But I think you shouldn't be installing it this way, or am I missing something? For what I did is install it on a USB flash drive with the help of Rufus.
(0015329)
steev   
2021-10-20 21:59   
We do not actually support this mode of installation currently. It is present because we use the debian-installer, and it's left over from that. In the future we may support it, and if we do, it will be announced.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7412 [Kali Linux] General Bug trivial always 2021-10-16 23:50 2021-10-19 09:14
Reporter: poisoner Platform:  
Assigned To: daniruiz OS:  
Priority: low OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Dash to Dock feature for kali side bar in gnome extensions appers to be blocked.
Description: The Dash to Dock feature version 69 for kali side bar is blocked, an attempt to find the reason has been made using the settings button resulting in an error modal giving the following error response,

The settings of extension dash-to-dock@micxgx.gmail.com had an error:
```
Error: Invalid parameter interfaces (element 0 was not a GType)
```

Stack trace:
```
_init/GObject.Object._classInit@resource:///org/gnome/gjs/modules/core/overrides/GObject.js:444:27
registerClass@resource:///org/gnome/gjs/modules/core/overrides/GObject.js:78:22
@/usr/share/gnome-shell/extensions/dash-to-dock@micxgx.gmail.com/prefs.js:180:24
_init@resource:///org/gnome/Shell/Extensions/js/extensionsService.js:204:33
OpenExtensionPrefsAsync/<@resource:///org/gnome/Shell/Extensions/js/extensionsService.js:122:28
asyncCallback@resource:///org/gnome/gjs/modules/core/overrides/Gio.js:115:22
run@resource:///org/gnome/Shell/Extensions/js/dbusService.js:177:20
main@resource:///org/gnome/Shell/Extensions/js/main.js:19:13
run@resource:///org/gnome/gjs/modules/script/package.js:206:19
start@resource:///org/gnome/gjs/modules/script/package.js:190:8
@/usr/share/gnome-shell/org.gnome.Shell.Extensions:1:17
```
please note that an upgrade may have been done to the gdm by the apt package manager resulting in this bug.
Steps To Reproduce: 1] Open extensions

2] Navigate to Dash to Dock option

The option parameter is disabled.
Additional Information:
Attached Files: Screenshot from 2021-10-17 01-50-02.png (93,351 bytes) 2021-10-16 23:50
https://bugs.kali.org/file_download.php?file_id=2161&type=bug
png

Kali Linux-2021-10-17-16-38-45.png (111,090 bytes) 2021-10-17 20:39
https://bugs.kali.org/file_download.php?file_id=2162&type=bug
png

Kali Linux-2021-10-18-15-34-31.png (526,285 bytes) 2021-10-18 19:34
https://bugs.kali.org/file_download.php?file_id=2163&type=bug
Notes
(0015311)
blaqsense   
2021-10-17 20:39   
Same here but not i'm not able to even view my extension pack. I saw an update that said extension and soon after my favorites are no longer visible.
(0015314)
blaqsense   
2021-10-18 19:34   
After updating/upgrading this morning 10/18/21 the patch works and I can now access my favorites and dock is no longer blocked...
Thank you,
(0015321)
daniruiz   
2021-10-19 09:08   
With the update of GNOME 40 this is now fixed.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7387 [Kali Linux] New Tool Requests minor N/A 2021-10-11 22:39 2021-10-16 13:28
Reporter: CYB3RMX Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Qu1cksc0pe -- All in One malware analysis tool.
Description: [Name] - Qu1cksc0pe
[Version] - 1.7.6
[Homepage] - https://github.com/CYB3RMX/Qu1cksc0pe
[Download] - https://github.com/CYB3RMX/Qu1cksc0pe
[Author] - CYB3RMX
[License] - Apache-2.0 License
[Description] - Qu1cksc0pe is for analyzing malwares or suspicious files statically also it has capable of analyzing android applications dynamically with frida. You can categorize each Windows APIs based on their possible malicious behaviour, you can get what DLL files used on target binaries, search for interesting strings such as domains crypto wallet addresses etc., running security tests both statically and dynamically against android applications and so on.
[Dependencies] - Python3 and some python modules (puremagic, androguard, frida, apkid, prettytable, tqdm, colorama, oletools, pefile, quark-engine, yara-python, pyaxmlparser, prompt_toolkit), strings tool, VirusTotal API key, readelf tool, JADX decompiler and Genymotion or physical phone for dynamic analysis
[Similar tools] - Don't know
[Activity] - This project started on 18 th october 2019 and it is still active
[How to install] - "sudo python3 qu1cksc0pe.py --install"
[How to use] - "python3 qu1cksc0pe.py --file suspicious_binary --analyze"
[Packaged] - Not for now
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7386 [Kali Linux] New Tool Requests minor have not tried 2021-10-11 22:08 2021-10-16 13:26
Reporter: g0tmi1k Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: httpx - a fast and multi-purpose HTTP toolkit allows to run multiple probers using retryablehttp library
Description: [Name] - httpx
[Version] - v1.1.3
[Homepage] - https://github.com/projectdiscovery/httpx
[Download] - https://github.com/projectdiscovery/httpx/tags
[Author] - projectdiscovery
[License] - MIT
[Description] - httpx is a fast and multi-purpose HTTP toolkit allows to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.

httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.
[Dependencies] - GoLang
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7385 [Kali Linux] New Tool Requests minor have not tried 2021-10-11 22:06 2021-10-16 13:25
Reporter: g0tmi1k Platform:  
Assigned To: g0tmi1k OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: proxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
Description: [Name] - proxify
[Version] - v0.0.4
[Homepage] - https://github.com/projectdiscovery/proxify
[Download] - https://github.com/projectdiscovery/proxify/tags
[Author] - projectdiscovery
[License] - MIT License
[Description] - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.

Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering and manipulation via DSL language, upstream HTTP/Socks5 proxy. Additionally a replay utility allows to import the dumped traffic (request/responses with correct domain name) into burp or any other proxy by simply setting the upstream proxy to proxify.
[Dependencies] - GoLang
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7390 [Kali Linux] General Bug block always 2021-10-13 08:13 2021-10-14 07:47
Reporter: Conternos1997UP Platform:  
Assigned To: daniruiz OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Error connecting to the repository
Description: http://http.kali.org/ repositories don't work, sudo apt update sudo apt install don't work.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015284)
Conternos1997UP   
2021-10-13 08:22   
it's working now.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7343 [Kali Linux] Kali Package Bug major always 2021-09-24 17:58 2021-10-12 13:06
Reporter: cohst Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: After Update to version 4.1.0 or 4.1.2 Powershell Empire does not start any more
Description: After apt-get update & apt-get dist-upgrade from today Powershell Empire does not start any more, after being upgraded to version 4.1.2:

┌──(cohst@kali-linux)-[~]
└─$ sudo powershell-empire server
[sudo] password for cohst:
[*] Loading default config
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1276, in _execute_context
    self.dialect.do_execute(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/default.py", line 609, in do_execute
    cursor.execute(statement, parameters)
sqlite3.OperationalError: no such column: agents.host_id

The above exception was the direct cause of the following exception:

Traceback (most recent call last):
  File "/usr/share/powershell-empire/empire.py", line 12, in <module>
    server.run(args)
  File "/usr/share/powershell-empire/empire/server/server.py", line 2356, in run
    main = empire.MainMenu(args=args)
  File "/usr/share/powershell-empire/empire/server/common/empire.py", line 91, in __init__
    self.agents = agents.Agents(self, args=args)
  File "/usr/share/powershell-empire/empire/server/common/agents.py", line 111, in __init__
    dbAgents = self.get_agents_db()
  File "/usr/share/powershell-empire/empire/server/common/agents.py", line 443, in get_agents_db
    results = Session().query(models.Agent).all()
  File "/usr/lib/python3/dist-packages/sqlalchemy/orm/query.py", line 3373, in all
    return list(self)
  File "/usr/lib/python3/dist-packages/sqlalchemy/orm/query.py", line 3535, in __iter__
    return self._execute_and_instances(context)
  File "/usr/lib/python3/dist-packages/sqlalchemy/orm/query.py", line 3560, in _execute_and_instances
    result = conn.execute(querycontext.statement, self._params)
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1011, in execute
    return meth(self, multiparams, params)
  File "/usr/lib/python3/dist-packages/sqlalchemy/sql/elements.py", line 298, in _execute_on_connection
    return connection._execute_clauseelement(self, multiparams, params)
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1124, in _execute_clauseelement
    ret = self._execute_context(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1316, in _execute_context
    self._handle_dbapi_exception(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1510, in _handle_dbapi_exception
    util.raise_(
  File "/usr/lib/python3/dist-packages/sqlalchemy/util/compat.py", line 182, in raise_
    raise exception
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1276, in _execute_context
    self.dialect.do_execute(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/default.py", line 609, in do_execute
    cursor.execute(statement, parameters)
sqlalchemy.exc.OperationalError: (sqlite3.OperationalError) no such column: agents.host_id
[SQL: SELECT agents.id AS agents_id, agents.name AS agents_name, agents.host_id AS agents_host_id, agents.listener AS agents_listener, agents.session_id AS agents_session_id, agents.language AS agents_language, agents.language_version AS agents_language_version, agents.delay AS agents_delay, agents.jitter AS agents_jitter, agents.external_ip AS agents_external_ip, agents.internal_ip AS agents_internal_ip, agents.username AS agents_username, agents.high_integrity AS agents_high_integrity, agents.process_name AS agents_process_name, agents.process_id AS agents_process_id, agents.hostname AS agents_hostname, agents.os_details AS agents_os_details, agents.session_key AS agents_session_key, agents.nonce AS agents_nonce, agents.checkin_time AS agents_checkin_time, agents.lastseen_time AS agents_lastseen_time, agents.parent AS agents_parent, agents.children AS agents_children, agents.servers AS agents_servers, agents.profile AS agents_profile, agents.functions AS agents_functions, agents.kill_date AS agents_kill_date, agents.working_hours AS agents_working_hours, agents.lost_limit AS agents_lost_limit, agents.notes AS agents_notes, agents.architecture AS agents_architecture, agents.killed AS agents_killed, hosts_1.id AS hosts_1_id, hosts_1.name AS hosts_1_name, hosts_1.internal_ip AS hosts_1_internal_ip
FROM agents LEFT OUTER JOIN hosts AS hosts_1 ON hosts_1.id = agents.host_id]
(Background on this error at: http://sqlalche.me/e/13/e3q8)
                                                                                                        
┌──(cohst@kali-linux)-[~]
└─$
Steps To Reproduce: Update via the normal repos
Additional Information:
Attached Files: error powershell-empire 2021.JPG (182,445 bytes) 2021-09-24 17:58
https://bugs.kali.org/file_download.php?file_id=2154&type=bug
jpg
Notes
(0015246)
arnaudr   
2021-09-30 07:54   
Works for me on an up-to-date Kali Rolling machine:

─$ sudo powershell-empire server                                                                                            
[*] Loading default config
[*] Setting up database.
[*] Adding default user.
[*] Adding database config.
[*] Generating random staging key
[*] Adding default bypasses.
[*] Adding default keyword obfuscation functions.
[*] Loading stagers from: /usr/share/powershell-empire/empire/server/stagers/
[*] Loading modules from: /usr/share/powershell-empire/empire/server/modules/
[*] Loading listeners from: /usr/share/powershell-empire/empire/server/listeners/
[*] Loading malleable profiles from: /usr/share/powershell-empire/empire/server/data/profiles
[*] Searching for plugins at /usr/share/powershell-empire/empire/server/plugins
[*] Plugin csharpserver found.
[*] Initializing plugin...
[*] Doing custom initialization...
[*] Loading Empire C# server plugin
[*] Registering plugin with menu...
[*] Empire starting up...
[*] Starting Empire RESTful API on 0.0.0.0:1337
[*] Starting Empire SocketIO on 0.0.0.0:5000
[*] Testing APIs
[+] Empire RESTful API successfully started
[+] Empire SocketIO successfully started
[*] Cleaning up test user
Server >


What are you versions of powershell-empire and sqlalchemy? Please run:

dpkg -l | grep -E '(python3-sqlalchemy |powershell-empire)' | awk '{print $1 " " $2 " " $3}'


This is what I have on my machine:

└─$ dpkg -l | grep -E '(python3-sqlalchemy |powershell-empire)' | awk '{print $1 " " $2 " " $3}'
ii powershell-empire 4.1.3-0kali1
ii python3-sqlalchemy 1.3.22+ds1-1
(0015255)
cohst   
2021-09-30 18:03   
I have completely the same versions of powershell-empire and sqlalchemy as you.... but I got the following:

┌──(cohst@kali-linux)-[~]
└─$ sudo powershell-empire server
[sudo] password for cohst:
[*] Loading default config
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1276, in _execute_context
    self.dialect.do_execute(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/default.py", line 609, in do_execute
    cursor.execute(statement, parameters)
sqlite3.OperationalError: no such column: agents.host_id

The above exception was the direct cause of the following exception:

Traceback (most recent call last):
  File "/usr/share/powershell-empire/empire.py", line 12, in <module>
    server.run(args)
  File "/usr/share/powershell-empire/empire/server/server.py", line 2356, in run
    main = empire.MainMenu(args=args)
  File "/usr/share/powershell-empire/empire/server/common/empire.py", line 91, in __init__
    self.agents = agents.Agents(self, args=args)
  File "/usr/share/powershell-empire/empire/server/common/agents.py", line 111, in __init__
    dbAgents = self.get_agents_db()
  File "/usr/share/powershell-empire/empire/server/common/agents.py", line 443, in get_agents_db
    results = Session().query(models.Agent).all()
  File "/usr/lib/python3/dist-packages/sqlalchemy/orm/query.py", line 3373, in all
    return list(self)
  File "/usr/lib/python3/dist-packages/sqlalchemy/orm/query.py", line 3535, in __iter__
    return self._execute_and_instances(context)
  File "/usr/lib/python3/dist-packages/sqlalchemy/orm/query.py", line 3560, in _execute_and_instances
    result = conn.execute(querycontext.statement, self._params)
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1011, in execute
    return meth(self, multiparams, params)
  File "/usr/lib/python3/dist-packages/sqlalchemy/sql/elements.py", line 298, in _execute_on_connection
    return connection._execute_clauseelement(self, multiparams, params)
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1124, in _execute_clauseelement
    ret = self._execute_context(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1316, in _execute_context
    self._handle_dbapi_exception(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1510, in _handle_dbapi_exception
    util.raise_(
  File "/usr/lib/python3/dist-packages/sqlalchemy/util/compat.py", line 182, in raise_
    raise exception
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/base.py", line 1276, in _execute_context
    self.dialect.do_execute(
  File "/usr/lib/python3/dist-packages/sqlalchemy/engine/default.py", line 609, in do_execute
    cursor.execute(statement, parameters)
sqlalchemy.exc.OperationalError: (sqlite3.OperationalError) no such column: agents.host_id
[SQL: SELECT agents.id AS agents_id, agents.name AS agents_name, agents.host_id AS agents_host_id, agents.listener AS agents_listener, agents.session_id AS agents_session_id, agents.language AS agents_language, agents.language_version AS agents_language_version, agents.delay AS agents_delay, agents.jitter AS agents_jitter, agents.external_ip AS agents_external_ip, agents.internal_ip AS agents_internal_ip, agents.username AS agents_username, agents.high_integrity AS agents_high_integrity, agents.process_name AS agents_process_name, agents.process_id AS agents_process_id, agents.hostname AS agents_hostname, agents.os_details AS agents_os_details, agents.session_key AS agents_session_key, agents.nonce AS agents_nonce, agents.checkin_time AS agents_checkin_time, agents.lastseen_time AS agents_lastseen_time, agents.parent AS agents_parent, agents.children AS agents_children, agents.servers AS agents_servers, agents.profile AS agents_profile, agents.functions AS agents_functions, agents.kill_date AS agents_kill_date, agents.working_hours AS agents_working_hours, agents.lost_limit AS agents_lost_limit, agents.notes AS agents_notes, agents.architecture AS agents_architecture, agents.killed AS agents_killed, hosts_1.id AS hosts_1_id, hosts_1.name AS hosts_1_name, hosts_1.internal_ip AS hosts_1_internal_ip
FROM agents LEFT OUTER JOIN hosts AS hosts_1 ON hosts_1.id = agents.host_id]
(Background on this error at: http://sqlalche.me/e/13/e3q8)
                                                                                                        
┌──(cohst@kali-linux)-[~]
└─$ dpkg -l | grep -E '(python3-sqlalchemy |powershell-empire)' | awk '{print $1 " " $2 " " $3}' 1 ⨯
ii powershell-empire 4.1.3-0kali1
ii python3-sqlalchemy 1.3.22+ds1-1
                                                                                                        
┌──(cohst@kali-linux)-[~]
└─$
(0015282)
sbrun   
2021-10-12 12:47   
you need to run
sudo powershell-empire server --reset

Upstream changed the sqlite3 DB structure between version 4.0* and 4.1*
I didn't notice this change so I did not automate the "reset" when installing the new package version. I will fix that in the package.
(0015283)
sbrun   
2021-10-12 13:06   
upgrade from version 4.0 improved in version 4.1.3-0kali2

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6892 [Kali Linux] Queued Tool Addition minor have not tried 2020-12-01 10:56 2021-10-12 12:20
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Dufflebag - Search exposed EBS volumes for secrets
Description: [Name] - Dufflebag
[Version] - N/A
[Homepage] - https://github.com/BishopFox/dufflebag
[Download] - N/A
[Author] - Bishop Fox
[License] - GNU General Public License v3.0 ~ https://github.com/BishopFox/dufflebag/blob/master/LICENSE
[Description] - Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally left in. You may be surprised by all the passwords and secrets just laying around!
[Dependencies] - GoLang
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014062)
g0tmi1k   
2021-01-08 13:39   
@kali-team, please could this be packaged up.
(0015281)
sbrun   
2021-10-12 12:20   
dufflebag version 0.0~git20200205.9a01942-0kali3 is now available in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4579 [Kali Linux] Queued Tool Addition minor have not tried 2018-03-02 09:38 2021-10-12 12:18
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Reverse proxy grapher - generate a nice graphviz graph illustrating your reverse proxy flow
Description: Name: Reverse proxy grapher
Version: v0.1
Homepage: https://github.com/mricon/rev-proxy-grapher
Download: https://github.com/mricon/rev-proxy-grapher/archive/v0.1.tar.gz
Author: Konstantin Ryabitsev
Licence: GNU General Public License v3.0 (https://github.com/mricon/rev-proxy-grapher/blob/master/COPYING)
Description: This is a useful little tool that will generate a nice graphviz graph illustrating your reverse proxy flow. It takes a manually curated YAML file describing the topology of your network, proxy definitions, and optionally a collection of nmap output files for additional port/service information and output a graph in any format supported by graphviz.
Dependencies: python pydotplus pyyaml netaddr (https://github.com/mricon/rev-proxy-grapher/blob/master/requirements.txt)
Similar tools: Nothing?
Activity: 2017-10-05 - Current
How to use:
- rev-proxy-grapher.py \
    --topology examples/topology.yaml \
    --nmap-xml examples/nmap-external.xml \
    --out graph-with-nmap.svg
- rev-proxy-grapher.py --topology examples/topology.yaml

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0012073)
g0tmi1k   
2020-02-10 14:00   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0015280)
sbrun   
2021-10-12 12:18   
rev-proxy-grapher version 0~git20180301-0kali1 is now available in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6815 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-01 16:02 2021-10-12 12:17
Reporter: saeeddhqan Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Maryam - Open-source Intelligence(OSINT) framework
Description: [Name] - OWASP Maryam
[Version] - 1.4.8
[Homepage] - https://github.com/saeeddhqan/Maryam
[Author] - Saeed Dehqan
[License] - GPLv3?
[Description] - Maryam is a modular/optional open source framework based on OSINT and
data gathering. Maryam is written in Python programming language and It’s designed
to provide a powerful environment to harvest data from open sources and search
engines and collect data quickly and thoroughly.. If you have skill in Metasploit or Recon-ng, you can easily use it without prerequisites.

[Dependencies] -
python-3.8
python requests library

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013662)
g0tmi1k   
2020-11-06 14:41   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0013668)
saeeddhqan   
2020-11-07 10:06   
- [Name] - MARYAM
- [Version] - 0.20201106 - V.1.4.8
- [Homepage] - https://github.com/saeeddhqan/maryam
- [Package] - https://github.com/callforpapers-source/maryam-deb
- [Author] - Saeed Dehqan
- [License] - GNU General Public License V3
- [Description] - Open-source Intelligence(OSINT) Framework
- [Dependencies] - PYTHON3
- [Similar tools] - Metasploit, Recon-ng
- [Activity] - There was a commit last week
- [How to use] -
$ ./maryam
> help

I couldnt upload the package on gitlab!
(0014679)
necrose99   
2021-06-03 21:26   
https://salsa.debian.org/necrose99/maryam
I've added pkg owner to this..

I can add a kahli pkg maintaier , ie use debian salsa infra to automatically rebake a deb.
Or debs per platform/s.

Pip2deb or wheel to deb seems to regeneration of skeleton.

Debian 9 was used to generate deb pkging.
(0014680)
necrose99   
2021-06-03 21:28   
Can rig debian salsa to automatically sync..

Someone from kahli could rig docker/gitlab to rebuild evey 24 hours..
(0015279)
sbrun   
2021-10-12 12:17   
maryam version 2.5.0-0kali1 is now available in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7375 [Kali Linux] Tool Upgrade Request minor N/A 2021-10-07 12:26 2021-10-12 12:15
Reporter: thorin Platform:  
Assigned To: sbrun OS:  
Priority: high OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: ZAP 2.11 release
Description:     A new version of ZAP was released Today.
-----
ZAP 2.11.0 is now available from https://www.zaproxy.org/download/
For full details see the release notes: https://www.zaproxy.org/docs/desktop/releases/2.11.0/

Checksums for all of the ZAP downloads are maintained on the 2.11.0 Release Page (https://github.com/zaproxy/zaproxy/releases/tag/v2.11.0) and in the relevant version files (https://www.zaproxy.org/download/#latest-versions)
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015266)
thorin   
2021-10-07 23:54   
If it helps somehow, the openSuse package(s) have been updates:
- https://software.opensuse.org/download.html?project=home%3Acabelo&package=owasp-zap
- https://build.opensuse.org/package/show/home:cabelo/owasp-zap
(0015267)
thorin   
2021-10-07 23:54   
*updated
(0015278)
sbrun   
2021-10-12 12:15   
thanks for the report.
zaproxy version 2.11.0-0kali1 is now available in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5639 [Kali Linux] Queued Tool Addition minor have not tried 2019-08-16 04:50 2021-10-12 12:13
Reporter: re4son Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Proxmark3
Description: - [Name] - Proxmark3
- [Version] - RRG - Unreleased
- [Homepage] - https://github.com/RfidResearchGroup/proxmark3
- [Download] - https://github.com/RfidResearchGroup/proxmark3
- [Author] - Rfid Research Group
- [Licence] - GPL2 ~ https://github.com/RfidResearchGroup/proxmark3/blob/master/LICENSE.txt
- [Description] - Firmware, flasher, and client for the Proxmark3. It is dedicated to bringing the most out of the new features for Proxmark3 RDV4.0 new hardware and design but it will also support older hardware revisions.
Steps To Reproduce:
Additional Information: "Make install" enhancement discussion to which we have been invited to contribute:
https://github.com/RfidResearchGroup/proxmark3/issues/325
Attached Files:
Notes
(0010892)
rhertzog   
2019-08-16 07:52   
Assigning to Sophie since Jim sort of acked the addition of the tool (provided it doesn't take us too much time).
(0010894)
re4son   
2019-08-16 11:59   
It currently needs to be compiled for the particular revision of your proxmark hardware.
That's why they don't have releases:
https://github.com/RfidResearchGroup/proxmark3/releases

Building with "make" will build the firmware and client for the standard hardware revision "Proxmark3 RDV4" without bluetooth module.

By creating a "Makefile.platform" file in the root of the source tree you can specify a different platform to target and also additional extras:
https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Use_of_Proxmark/4_Advanced-compilation-parameters.md

That's the bit that makes packaging a little more complex.
(0010895)
re4son   
2019-08-16 12:02   
Usage:

cd client
./proxmark3 /dev/ttyACM0

You should see a Proxmark menu with a logo, hardware information and a "pm3 -->" prompt.
Example commands:

pm3 --> hw status
pm3 --> hw version
pm3 --> hw tune
pm3 --> quit

https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Use_of_Proxmark/1_Validation.md
(0011812)
g0tmi1k   
2020-01-06 13:15   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0015277)
sbrun   
2021-10-12 12:13   
proxmark3 is now available in kali, version 4.14434+git20211007-0kali3

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6836 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-12 00:01 2021-10-11 22:09
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: nuclei - targeted scanning based on templates
Description: [Name] - nuclei
[Version] - v2.1.1
[Homepage] - https://nuclei.projectdiscovery.io/
[Download] - https://github.com/projectdiscovery/nuclei
[Author] - projectdiscovery.io
[License] - MIT
[Description] - Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
[Dependencies] - GoLang
[Similar tools] - DirG, GoBuster
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014165)
g0tmi1k   
2021-01-29 13:42   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6834 [Kali Linux] Queued Tool Addition minor have not tried 2020-11-11 23:55 2021-10-11 22:08
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: dnsx - perform multiple dns queries
Description: [Name] - dnsprobe
[Version] - v1.0.3
[Homepage] - https://github.com/projectdiscovery/dnsprobe
[Download] - https://github.com/projectdiscovery/dnsprobe/tags
[Author] - projectdiscovery.io
[License] - MIT
[Description] - DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.
[Dependencies] - GoLang
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014167)
g0tmi1k   
2021-01-29 13:43   
Note - This project is discontinued. New updates and fixes will be pushed to dnsx.

https://github.com/projectdiscovery/dnsx
(0014168)
g0tmi1k   
2021-01-29 13:44   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7346 [Kali Linux] Kali Package Bug minor N/A 2021-09-27 20:15 2021-10-07 06:28
Reporter: Arszilla Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: 'ranger' removed from Kali Repositories
Description: Hi there,

During a build test for Kali i3-gaps, initinfosec realized that "ranger" (https://pkg.kali.org/pkg/ranger) was removed from the Kali repositories today (2021-09-27).

Is there a reason why 'ranger' was removed from Kali Linux repositories, despite the repository and package not having any issues (from what I can see)?

Kind regards.
Steps To Reproduce:
Additional Information: pkg.kali.org URL: https://pkg.kali.org/pkg/ranger
Debian Git URL: https://salsa.debian.org/debian/ranger.git
Attached Files:
Notes
(0015244)
sbrun   
2021-09-29 08:51   
ranger has been removed from Debian Testing (and then from Kali) because of this issue:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993029
(0015264)
Arszilla   
2021-10-07 05:51   
I assume once it's fixed, we'll see ranger return to the Kali repositories?
(0015265)
arnaudr   
2021-10-07 06:28   
Yes that's correct. In this case it would be good to look at upstream git repo https://github.com/ranger/ranger to see if this particular issue was already reported upstream.

Moreover it's possible that the issue is fixed in latest tagged version 1.9.3. It would be great is someone could:

- reproduce the issue mentioned at https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993029
- check if it's still present in 1.9.3
- check if it's still present in latest version from git master branch

If we're lucky it can be solved simply by updating the package to its latest version. Otherwise (if the issue is still present), then it needs to be reported and fixed upsteam.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7246 [Kali Linux] Queued Tool Addition minor N/A 2021-06-30 17:19 2021-10-05 01:50
Reporter: tonyg73 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: PSJsonWebToken PowerShell module - allows a tester to craft custom attacks against endpoints that accept JWTs for authentication
Description: [Name] - PSJsonWebToken

[Version] - What version of the tool should be added?
        Version 1.7.7
 
[Homepage] - Where can the tool be found online? Where to go to get more information?

             https://github.com/anthonyg-1/PSJsonWebToken
         https://www.powershellgallery.com/packages/PSJsonWebToken/1.7.7

[Download] - Where to go to get the tool? either a download page or a link to the latest version

             Can be installed from the PowerShell Gallery by executing the following command from pwsh:

             Install-Module -Name PSJsonWebToken -Repository PSGallery -RequiredVersion 1.7.7

             Links:
             https://www.powershellgallery.com/packages/PSJsonWebToken/1.7.7
             https://github.com/anthonyg-1/PSJsonWebToken

[Author] - Who made the tool?
                   Anthony Guimelli
               https://www.linkedin.com/in/anthony-guimelli-cissp-867b0918a/

[Licence] - How is the software distributed? What conditions does it come with?

            The software is distributed via the PowerShell Gallery and/or direct download from the module's github repo. MIT license applies: https://github.com/anthonyg-1/PSJsonWebToken/blob/main/LICENSE

[Description] - What is the tool about? What does it do?

                PSJsonWebToken is a PowerShell module that allows for the creation and manipulation of JSON Web Tokens (JWTs), an authentication token defined in RFC 7519, and JSON Web Keys (JWKs), an x509 public key serialized as JSON per RFC 7517. Both JWTs and JWKs are very common in modern web application security due to the prevalence of OpenID Connect. The benefits this module can offer a penetration tester include, but are not limited to:

                1) Token manipulation and subsequent submission to an endpoint (via Get-JsonWebTokenPayload which decodes and deserializes a payload for manipulation and ConvertTo-JwtPart which encodes and serializes the manipulated payload)

                2) The ability for a tester to craft their own tokens with a custom payload (via New-JwtSignature)

                3) Brute-forcing HS256, HS484, and HS512 signed JWTs (via Test-JsonWebToken or Test-JwtSignature)

                4) The ability to test an endpoint that accepts JWT vulnerabilities such as the "none" algorithm attack, algorithm substitution attack, CVE-2018-0114 (passing a jku in the header that references the attacker's JWK set URI, etc.).

The modular characteristics of this module make crafting custom attacks against endpoints that accept JWTs quick and efficient. For more please see the “JWT Attacks” section here: https://github.com/anthonyg-1/PSJsonWebToken

[Dependencies] - What is needed for the tool to work?

PowerShell 5.1 or above. Since Kali Linux comes with PowerShell 7.1.3, this will suffice. This module was developed on PowerShell 7.1.0 on Ubuntu 18.04 and tested on Ubuntu 20.04, Kali Linux 2021.1, Windows 10 and MacOS.

[Similar tools] - What other tools are out there?

Burp has a JWT plugin and Python has PyJwt. While there are a few other PowerShell modules for JWTs, none of these have JWK support and several of these don’t work on PowerShell Core (6.0 and above which is required for Linux).

[Activity] - When did the project start? Is is still actively being deployed?
                   This project started on 11/2021 and is being actively deployed.

[How to install] - How do you compile it? Note, using source code to acquire (e.g. git clone/svn checkout) can’t be used - Also downloading from the head. Please use a “tag” or “release” version.

This is a PowerShell module written in over 99% PowerShell and less than 1% C#. To that end, compilation is not necessary. To obtain and use the module type the following from PowerShell in Kali Linux:

Install-Module -Name PSJsonWebToken -Repository PSGallery -RequiredVersion 1.7.7

[How to use] - What are some basic commands/functions to demonstrate it?

Demonstration of multiple cmdlets can be found in the “JWT Attacks” section here: https://github.com/anthonyg-1/PSJsonWebToken

If needed I can copy them here but the formatting and clarity will be lost compared to what is shown in the above markdown.

[Packaged] - Is the tool already packaged for Debian?

This tool is packaged for any system running PowerShell 5.1 and above.
Steps To Reproduce: N/A new tool request
Additional Information: I would be happy to discuss/demonstrate use of this module. Please contact me if this is required.
Attached Files:
Notes
(0014880)
tonyg73   
2021-06-30 19:49   
Correction (can't seem to edit):

The Activity section should reflect that the project started on 11/2020, not 2021.

[Activity] - When did the project start? Is is still actively being deployed?
                   This project started on 11/2020 and is being actively deployed.
(0015024)
tonyg73   
2021-08-24 15:24   
Latest release version is 1.7.10 and contains some quality of life improvements (default parameters, options for JWK generation, etc).

Latest can be downloaded here: https://www.powershellgallery.com/packages/PSJsonWebToken/1.7.10

More info: https://github.com/anthonyg-1/PSJsonWebToken
(0015056)
g0tmi1k   
2021-08-31 10:06   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0015261)
tonyg73   
2021-10-05 01:50   
@g0tmi1k does this mean these modules are slated to be included in Kali? I can take a look at the packaging process if that's the case. Would it be the same process for PowerShell modules even if they're accessible from the PowerShell Gallery? Sorry for the delay, been absolutely slammed with work.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7268 [Kali Linux] Kali Package Bug minor always 2021-07-28 09:10 2021-10-02 09:00
Reporter: RoseDeSable Platform:  
Assigned To: arnaudr OS:  
Priority: normal OS Version:  
Status: resolved Product Version: kali-dev  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: shellter: cannot start / must do workaround
Description: Hi,
 after the upgrade yesterday I can't start shellter. My workaround: start it with the command "wineconsole /usr/share/windows-resources/shellter/shellter.exe, and it does its work.

Best Regards
Rose
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014952)
Gamb1t   
2021-07-28 19:35   
Can you please provide some extra information? Before yesterday, when was the last time you upgraded your system, what command did you use to upgrade, and do you happen to know how many packages in total got upgraded? Additionally, what system architecture are you on?

I cant replicate the problem you're describing, and I wonder if it is in relation to how wine is setup on your system rather than something wrong with an upgrade.
(0014953)
RoseDeSable   
2021-07-29 08:57   
- the last upgrade was Friday, 23 July 2021

- information about my system "<my-nds > 5.10.0-kali9-amd64 0000001 SMP Debian 5.10.46-1kali1 (2021-06-25) x86_64 GNU/Linux"

- the history.log of apt:

Start-Date: 2021-07-28 06:30:18
Commandline: apt dist-upgrade
Install: libgpac10:amd64 (1.0.1+dfsg1-4, automatic)
Upgrade: console-setup:amd64 (1.203, 1.205), krb5-locales:amd64 (1.18.3-5, 1.18.3-6), libgssapi-krb5-2:amd64 (1.18.3-5, 1.18.3-6), libgssapi-krb5-2:i386 (1.18.3-5, 1.18.3-6), libglx-mesa0:amd64 (20.3.4-1, 20.3.5-1), libglx-mesa0:i386 (20.3.4-1, 20.3.5-1), python3-dateutil:amd64 (2.8.1-5, 2.8.1-6), krb5-user:amd64 (1.18.3-5, 1.18.3-6), pack:amd64 (0.0.4-0kali3, 0.0.4-0kali4), libnftables1:amd64 (0.9.8-3, 0.9.8-3.1), chkrootkit:amd64 (0.54-1+b1, 0.54-1+b2), libx264-160:amd64 (2:0.160.3011+gitcde9a93-2+b2, 2:0.160.3011+gitcde9a93-2.1), libx264-160:i386 (2:0.160.3011+gitcde9a93-2+b2, 2:0.160.3011+gitcde9a93-2.1), libgbm1:amd64 (20.3.4-1, 20.3.5-1), libgbm1:i386 (20.3.4-1, 20.3.5-1), libkadm5srv-mit12:amd64 (1.18.3-5, 1.18.3-6), zsh:amd64 (5.8-6+b1, 5.8-6+b2), os-prober:amd64 (1.78, 1.79), x264:amd64 (2:0.160.3011+gitcde9a93-2+b2, 2:0.160.3011+gitcde9a93-2.1), netdiscover:amd64 (0.7-3, 0.7-4), cdebootstrap:amd64 (0.7.8+b2, 0.7.8+b3), geoipupdate:amd64 (4.6.0-1+b2, 4.6.0-1+b3), exim4-config:amd64 (4.94.2-6, 4.94.2-7), libkrb5support0:amd64 (1.18.3-5, 1.18.3-6), libkrb5support0:i386 (1.18.3-5, 1.18.3-6), libxatracker2:amd64 (20.3.4-1, 20.3.5-1), console-setup-linux:amd64 (1.203, 1.205), mesa-va-drivers:amd64 (20.3.4-1, 20.3.5-1), mesa-va-drivers:i386 (20.3.4-1, 20.3.5-1), exim4-base:amd64 (4.94.2-6, 4.94.2-7), libgl1-mesa-dev:amd64 (20.3.4-1, 20.3.5-1), libgl1-mesa-dri:amd64 (20.3.4-1, 20.3.5-1), libgl1-mesa-dri:i386 (20.3.4-1, 20.3.5-1), libosmesa6:amd64 (20.3.4-1, 20.3.5-1), libosmesa6:i386 (20.3.4-1, 20.3.5-1), libgl1-mesa-glx:amd64 (20.3.4-1, 20.3.5-1), python3-aiosqlite:amd64 (0.16.1-1, 0.16.1-3), kali-defaults-desktop:amd64 (2021.2.5, 2021.2.7), libaspell15:amd64 (0.60.8-2, 0.60.8-3), libkrb5-3:amd64 (1.18.3-5, 1.18.3-6), libkrb5-3:i386 (1.18.3-5, 1.18.3-6), mesa-vulkan-drivers:amd64 (20.3.4-1, 20.3.5-1), mesa-vulkan-drivers:i386 (20.3.4-1, 20.3.5-1), libk5crypto3:amd64 (1.18.3-5, 1.18.3-6), libk5crypto3:i386 (1.18.3-5, 1.18.3-6), libkdb5-10:amd64 (1.18.3-5, 1.18.3-6), python3-pil:amd64 (8.1.2+dfsg-0.2, 8.1.2+dfsg-0.3), theharvester:amd64 (4.0.0-0kali2, 4.0.0-0kali3), libglapi-mesa:amd64 (20.3.4-1, 20.3.5-1), libglapi-mesa:i386 (20.3.4-1, 20.3.5-1), keyboard-configuration:amd64 (1.203, 1.205), exim4-daemon-light:amd64 (4.94.2-6, 4.94.2-7), libegl-mesa0:amd64 (20.3.4-1, 20.3.5-1), mesa-vdpau-drivers:amd64 (20.3.4-1, 20.3.5-1), mesa-vdpau-drivers:i386 (20.3.4-1, 20.3.5-1), libgssrpc4:amd64 (1.18.3-5, 1.18.3-6), libkadm5clnt-mit12:amd64 (1.18.3-5, 1.18.3-6), kali-defaults:amd64 (2021.2.5, 2021.2.7), libdebconfclient0:amd64 (0.259, 0.260), nftables:amd64 (0.9.8-3, 0.9.8-3.1), aspell:amd64 (0.60.8-2, 0.60.8-3)
End-Date: 2021-07-28 06:34:57
(0015259)
cohst   
2021-10-02 08:31   
I have the same problem. Out put from console is

┌──(cohst@kali-linux)-[~]
└─$ shellter
wineconsole: Starting program "./ wineconsole /usr/share/windows-resources/shellter/shellter.exe" failed.
The command is invalid.
                                                                                                                  
┌──(cohst@kali-linux)-[~]
└─$

But when I start it with wineconsole /usr/share/windows-resources/shellter/shellter.exe or with wine /usr/share/windows-resources/shellter/shellter.exe it works fine.
(0015260)
arnaudr   
2021-10-02 08:58   
(Last edited: 2021-10-02 08:59)
Hi, that's an issue with Kali's wrapper script "kali-winexec". This script is provided by the package kali-defaults. It's been fixed in latest version 2021.4.0, that just landed in Kali Rolling.

So what you have to do is just to update your system (assuming you're on Kali rolling):

sudo apt update && sudo apt full-upgrade


After that, check that the package kali-defaults is indeed at latest version:

─$ dpkg -l | grep kali-defaults | awk '{print $2 " " $3 }'
kali-defaults 2021.4.0
kali-defaults-desktop 2021.4.0


From this point, it should work.

I close the issue, but feel free to re-open if ever it didn't solve the problem.


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7351 [Kali Linux] Kali Package Improvement major always 2021-09-30 13:01 2021-10-01 07:44
Reporter: Conternos1997UP Platform:  
Assigned To: arnaudr OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: I can't install gtkhash.
Description: Hi, I installed the latest kali, all the apps I tried to install worked except gtkhash, I tried to install via snap but it doesn't work. I checked kali live but it also doesn't work why. (repository links are fine, updated package list and upgrade all programs)
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015251)
arnaudr   
2021-09-30 15:45   
gtkhash has been removed from Debian Testing (and then from Kali) because of this issue:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978830
(0015257)
arnaudr   
2021-10-01 07:43   
gtkhash is now available again in Kali. It's been updated to the latest version (1.4). Please install it by running:

apt update && apt install -y gtkhash


Thanks for reporting the issue!

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7318 [Kali Linux] Feature Requests minor always 2021-09-04 08:59 2021-09-30 15:06
Reporter: fgndev Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Missing kernel modules for PXE boot via USB-C
Description: Dear Kali Team,

I am PXE-booting Kali Linux on a UEFI laptop via a USB-C ethernet adapter.
This does not work with the current Kali Live image oob as the Kali Live initrd.img is missing the required kernel modules (usbnet, cdc_ether).
As a workaround I am using a SysrescueCD kernel and patched the Kali Linux initrd.img with the respective SysrescueCD modules. This
works but technically also requires patching the live filesystem to have modules available at runtime, too.
Also the PXE boot docs https://www.kali.org/docs/installation/network-pxe/ do not cover PXE booting from a UEFI machine which I think
is a bit unfortunate.

So my request is:
a) Please include the aforementioned modules in the initrd.img
b) Update the PXE docs

I will gladly assist with either request.
Thanks, fgndev

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015219)
g0tmi1k   
2021-09-19 11:27   
This is more than likely needing to come from Debian
(0015239)
fgndev   
2021-09-25 11:33   
Right, so if anyone can put me on the path to requesting a feature with Debian, I'll just forward this request.
(0015250)
arnaudr   
2021-09-30 15:06   
Hi! Indeed this is something that should be addressed on Debian's side.

First thing is to validate that these modules are indeed missing on a Debian live image (just to be sure). I just checked that and I can confirm that those two modules are missing.

Second thing is to check if there's already a bug opened for this matter. Indeed, there is one: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980788. This bug report links to a merge request: https://salsa.debian.org/kernel-team/initramfs-tools/-/merge_requests/41.

I suggest that you add a comment at those two places (you might need to create an account on salsa.debian.org). Since you can describe exactly your use-case, and which modules are needed, this will be a very welcome contribution already.

Regarding the PXE boot docs, if you have a bit of time, feel free to improve the doc and open a MR at https://gitlab.com/kalilinux/documentation/kali-docs/-/tree/master/installation/network-pxe. I personally never did PXE boot, so I can't document that.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7341 [Kali Linux] Kali Package Bug major always 2021-09-23 11:32 2021-09-30 07:41
Reporter: Alfista-SK Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Bad VMware package...
Description: Have downloaded the preinstalled package for VMware and it will not work.
Will not start as the one from the disk file is corrupt.
I try to start it on ESXI 6.0U3 with vCenter 6.7. Have change the compatibility and also set the latest Debian OS in ESXi.

But after each start it tell the same.
Steps To Reproduce: Have added the pre installed VM.
Have change the compatibility and also set the latest Debian OS in ESXi.
And started.
Additional Information: Please when you will send it next time, please merge all snapshots, that is easier to use.
Attached Files:
Notes
(0015234)
Alfista-SK   
2021-09-23 11:54   
Error message:

File /vmfs/volumes/575d1d33-e76158f1/kali-linux-2021.3-vmware-amd64/Kali-Linux-2021.3-vmware-amd64.vmdk was not found Failed to start the virtual machine. Module 'Disk' power on failed. Cannot open the disk '/vmfs/volumes/575d1d33-e76158f1/kali-linux-2021.3-vmware-amd64/Kali-Linux-2021.3-vmware-amd64.vmdk' or one of the snapshot disks it depends on. The system cannot find the file specified VMware ESX cannot find the virtual disk "/vmfs/volumes/575d1d33-e76158f1/kali-linux-2021.3-vmware-amd64/Kali-Linux-2021.3-vmware-amd64.vmdk". Verify the path is valid and try again.
(0015235)
Gamb1t   
2021-09-23 19:13   
Have you re-downloaded the VM to ensure that it was not corrupted?
(0015237)
Alfista-SK   
2021-09-24 08:38   
Hi,

yes. The .7z package was correct. I have tried it more times.
(0015245)
arnaudr   
2021-09-30 07:41   
Hi, did you try another version of Kali Linux before with your setup? For example you could try the previous version, 2021.2, available at:

http://old.kali.org/SORT/kali-2021.2/kali-linux-2021-2-vmware-amd64/

That would help to understand if something change in Kali in the latest version, or if there's another issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7321 [Kali Linux] Feature Requests minor have not tried 2021-09-08 09:49 2021-09-25 10:21
Reporter: saberzaid Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: adding new active directory category with the tools in kali manu
Description: hello devs

it will be nice from you if you add active directory tools and category under the main manu of kali

there is many ldap, active directory tools , and im very sure the new manu can fit for 10 or 20 tools there , example passview, bloodhound , and many more, i will suggest to start add in the new manu those tools :


mimikatz
bloodhound
PowerSploit
lsassy
CrackMapExec
Rubeus
Impacket
powerview
PowerUpSQL
enum4linux


Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015089)
saberzaid   
2021-09-09 05:42   
another tool forget to add

kerbrute

suggestion name of the entry category under kali manu :

Active Directory and Enterprise Network
(0015094)
g0tmi1k   
2021-09-13 21:12   
Thanks for the suggestion!

You're right, they have been missing for too long.

This is something that we are activity working on ~ https://gitlab.com/kalilinux/packages/kali-menu/-/commits/kali/master/
And also we are hopefully soon going to be announcing something about the menu.
(0015238)
saberzaid   
2021-09-25 10:21   
thanks g0tmi1k , yes there is many tools missing in the kali manu , and also category , active directory is a must , cant wait for the update,

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7337 [Kali Linux] General Bug minor have not tried 2021-09-20 14:32 2021-09-23 08:06
Reporter: fbeltrao Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: update error
Description: After Monday's update the kali system was not fully updated due to this error:
Steps To Reproduce:
Additional Information:
Attached Files: error (369 bytes) 2021-09-20 14:32
https://bugs.kali.org/file_download.php?file_id=2152&type=bug
error 1 (1,198 bytes) 2021-09-20 19:11
https://bugs.kali.org/file_download.php?file_id=2153&type=bug
Notes
(0015226)
fbeltrao   
2021-09-20 19:11   
More details of the error that occurred follow below.
(0015227)
cyrus104   
2021-09-21 05:40   
I to ran into this issue on a brand new Kali 2021.3 x86 VMware VM, just logged in and ran apt update / upgrade.
(0015228)
sbrun   
2021-09-21 08:52   
issue in atftpd version 0.7.git20210202-3
(0015229)
rhertzog   
2021-09-21 11:51   
Effectively, the atftpd version that was released in 2021.3 is broken and creates issues during upgrades. We're working on preparing an update.
(0015230)
sbrun   
2021-09-21 13:19   
We report the bug to Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994808
(0015231)
sbrun   
2021-09-21 13:24   
we fix the upgrade with atftp version 0.7.git20210915-1kali1
(0015233)
sbrun   
2021-09-23 08:06   
FTR the version 0.7.git20210915-1kali1 didn't fix all upgrade cases.
The version 0.7.git20210915-2 fixes correctly the upgrades.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7006 [Kali Linux] Kali Package Bug minor always 2021-01-22 15:26 2021-09-21 13:39
Reporter: OS-74160 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: powershell-empire versions 3.6.2 and 3.6.3 require sudo on Kali
Description: Good day. I raised this issue on gitlab about a month ago after raising it with the upstream BC-Security powershell-empire project, who said it was a Kali package maintainer decision. I received no response on gitlab so I'm raising it here in case this is the right place.

Since upgrading from 3.6.0-0 to 3.6.2-0, powershell-empire requires sudo. This is a less secure setup than previous. I would prefer to run as an unprivileged user when not using a privileged port, as was possible before. This change/decision is actually a security downgrade. It should be possible to run powershell-empire without sudo, and it shouldn't have to be enforced by not allowing the unprivileged user to do so.

Thank you.
Steps To Reproduce: apt upgrade from powershell-empire 3.6.0-0kali1 to 3.6.2-0kali1
run powershell-empire as unprivileged user, as worked before
observe the new message and program exit: Please run powershell-empire with sudo: 'sudo powershell-empire'
Additional Information: References:

https://github.com/BC-SECURITY/Empire/issues/416
https://gitlab.com/kalilinux/packages/powershell-empire/-/issues/5
Attached Files:
Notes
(0014137)
sbrun   
2021-01-22 15:46   
Thanks for the report. I should have answered the Gitlab issue before.

We (Kali team) first packaged powershell-empire to use it with or without sudo. But there were issues with this packaging that can't be fixed easily if we run without sudo.
That's why now sudo is required.
I need to work with upstream to find a solution to run without sudo if they think it's important.
(0015232)
sbrun   
2021-09-21 13:39   
since powershell-empire version 4.*, only the server requires sudo.
The client can be run without sudo

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7338 [Kali Linux] General Bug major always 2021-09-20 16:13 2021-09-20 16:13
Reporter: Giovani587 Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: installation error
Description: When installing kali linux in my computer, show the error Can't mount and detect CD-ROM drives. I tryed to open terminal and create the directory manually, but the comand (Alt+F2) doeasn't not work.

Thank you for your attention.
Steps To Reproduce: 1. boot the computer with kali linux image boot in pendrive;
2. advance at driver's cd-rom,
Additional Information: I had change the version image, and the error persist.
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7336 [Kali Linux] General Bug major always 2021-09-20 05:18 2021-09-20 05:18
Reporter: hs303 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.3  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Desktop not loading, stuck on the black-blue login background after successful login
Description: I run fully updated Kali as main OS on a ThinkPad E14 Gen 2 Intel Core i7-1165G7.
Everything was fine up until today, when I booted the system after the last update. I get

[ 0.410245] pci 0000:00:07.0: DPC: RP PIO log size 0 is invalid

while booting. After logging in the black-blue background stucks, hence regular desktop does not load. Desktop icons are missing. Everything else seems to be working fine, including panels.

The bug itself seems to be related to the kernel and the new Intel processors: https://bugzilla.kernel.org/show_bug.cgi?id=209943

The same bug is present in log files previous to the update, but it never appeared on the boot screen before and did not cause any problems.

Steps To Reproduce: 1. Boot the system
2. Log in
Additional Information: Processor
1x Intel Core i7-1165G7 Processor(Core i7-1165G7)
Memory
1x 16GB DRR4 3200
Graphics
1x Intel® Iris® Xe Graphics
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7326 [Kali Linux] Feature Requests minor N/A 2021-09-10 13:39 2021-09-19 18:40
Reporter: vatsal gupta Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: [Suggestion] To keep Kali professional and security focused.
Description: As a part of CyberSecurity Community, I just want to suggest - If we remove root terminal icon from screen it can be better for beginners as well for security.

Non-root terminal have "sudo" to perform the permission based task.
If anyone want to use root terminal they can do it normally!

So I think it'll better in my opinion, if we can do it in 2021.3 update!

Thanks for your precious time!
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015097)
g0tmi1k   
2021-09-13 21:16   
We are in a freeze for 2021.3 already.

Will be addressed before 2021.4!
(0015225)
vatsal gupta   
2021-09-19 18:40   
Okay Brother!! Thanks for giving your precious time

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7317 [Kali Linux] Feature Requests minor always 2021-09-04 03:14 2021-09-19 14:28
Reporter: nayeemtby Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: The installer initrd image should have loop,ext4, ntfs-3g
Description: The installer initrd doesn't have loop, ext4, ntfs modules/libs. If these were present we could just iso-scan the iso image on a ntfs/ext4 hard drive without having to format a usb drive back to fat32.
I've seen this issue in almost all debian based distro I tried. Fedora works directly from my ntfs partition.
As I can see kali linux trying to be a versatile pentesting distro, this should be a step towards that.
Steps To Reproduce: Just put the iso or copy the files from the iso to any ntfs/ext4 drive.
Install grub/syslinux/isolinux.
Load the installer kernel and initrd.img
And it won't be able to mount your drive during the modules loading step.
Additional Information:
Attached Files:
Notes
(0015080)
arnaudr   
2021-09-04 07:12   
Sorry, I don't understand the use-case. What's wrong with just copying the iso straight on a USB drive, and then running it?
(0015082)
nayeemtby   
2021-09-06 10:30   
It's possible that the usb drive is formatted with ntfs, but fuse modules are not present in the installer initrd. So to make support the usb drive would have to be reformatted to fat. So copying directly to a ntfs filesystem would make installer unable to mount and load modules required for installation.
(0015224)
g0tmi1k   
2021-09-19 14:28   
Im not understnading what you're trying todo.

What is your use case?
What are you trying to achieve? and why?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7329 [Kali Linux] Kali Package Bug minor always 2021-09-14 19:33 2021-09-19 11:20
Reporter: neatrubble Platform:  
Assigned To: daniruiz OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Wireshark not opening document when not root
Description: Package kali-menu

When using xdg-open on a pcap or double-clicking a pcap, as a user that is not root or in the wireshark group, Wireshark will open but not the Pcap.

In /usr/share/applications/wireshark.desktop, the Exec line contains %f two times.

According to the documentation at https://specifications.freedesktop.org/desktop-entry-spec/latest/ar01s07.html, "A command line may contain at most one %f, %u, %F or %U field code.".

This cause Wireshark to launch but without arguments.

Steps To Reproduce: Using a user that is not in the wireshark group:

1. xdg-open somepcap.pcap
2. (An authentication window will appear to run the application as root)
3. (Wireshark will open, without the document)


Additional Information:
Attached Files:
Notes
(0015209)
daniruiz   
2021-09-15 09:32   
Hello!

Following the original Exec parameter for wireshark:
`Exec=sh -c "id -Gn | grep -qw wireshark && wireshark %f || pkexec wireshark %f"`

You are right, freedesktop indicates that a desktop file can only have '%f' once (https://specifications.freedesktop.org/desktop-entry-spec/latest/ar01s07.html), so it's only replacing that code the first match. Therefore wireshark only opens files if the user is part of the wireshark group.
I've fixed this and will be uploaded soon, but for now as a workaround you can add your user to the wireshark group (this is now the default in kali)

`sudo usermod $(whoami) -aG wireshark`
You probably need to reboot after adding the user to the group.

Here is the fix
https://gitlab.com/kalilinux/packages/kali-menu/-/commit/89dd1d48eb2b3f0d3ccc3333a490b01bf22c5b43
(0015215)
g0tmi1k   
2021-09-19 11:20   
I believe this has been addressed now

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7019 [Kali Linux] Queued Tool Addition minor N/A 2021-01-30 15:10 2021-09-16 09:12
Reporter: beesan Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: Name-That-Hash - a modern day hash-identifier
Description: Websites:
https://github.com/HashPals/Name-That-Hash
https://nth.skerritt.blog

Modern day hash-identifier with new features such as:
* Popularity, so NTLM will appear before Skype in the list.
* Descriptions, so pentesters can make informed decisions about the type of hash.
* Accessible CLI, so people with colour-blindness, screen-readers or those that can't read big blobs of text should be able to easily use it. https://github.com/HashPals/Name-That-Hash/wiki/Accessibility
* JSON output, API, file input, etc.

This uses the same database as HashID and Hash-Identifier, but modified & updated.

TL;DR:
* MIT
* Install via PyPi with `pip3 install name-that-hash`, usage is `nth`.
* Pyproject.toml https://github.com/HashPals/Name-That-Hash/blob/main/pyproject.toml
* Setup.py https://github.com/HashPals/Name-That-Hash/blob/main/packages/setup.py
* Authors: Beesan @bee_sec_san on Twitter
* Other similar tools: HashID, Hash-identifier
* Compute resources: The same as HashId or Hash-Identifier, very minimal.
* Maintained: Yes, I am an active open source maintainer (github.com/bee-san) so this tool shall remain maintained.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014180)
beesan   
2021-02-01 22:03   
Since I’m not sure if I can edit my original post, The HashPal’s organisation has 3 members now who are committed to keeping the tool update, so even in the sad event that something happens to me the tool will be okay.

Also, one of the core contributors to the original HashID approves of the fork and submitted a PR to update the license to GPL-3-0-or-later, as this project is based off of HashID (well, only the database of hashes) which uses that license.

https://github.com/HashPals/Name-That-Hash/pull/14
(0014280)
g0tmi1k   
2021-03-05 13:30   
@kali-team, please could this be packaged up.
(0014517)
beesan   
2021-05-05 16:57   
@g0tmi1k we packaged this up ourselves, let me know if there's anything that needs to be changed :-) https://github.com/HashPals/Name-That-Hash/issues/6
(0014518)
beesan   
2021-05-05 16:57   
Oops, the package is here: https://gitlab.com/nth-kali/name-that-hash_kali
(0014869)
beesan   
2021-06-27 06:59   
Anything we can do to help out? Is the package we built okay?
(0015210)
sbrun   
2021-09-16 09:12   
thanks for the help with the packaging.
name-that-hash version 1.10-0kali1 is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5076 [Kali Linux] Queued Tool Addition minor have not tried 2018-11-05 17:16 2021-09-16 09:10
Reporter: woodbine Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: trufflehog - Searches through git repositories for high entropy strings and secrets, digging deep into commit history
Description: - [Name] - trufflehog
- [Version] - latest
- [Homepage] - https://github.com/dxa4481/truffleHog
- [Download] - https://github.com/dxa4481/truffleHog
- [Author] - Dylan Ayrey (https://github.com/dxa4481)
- [Licence] - GNU GENERAL PUBLIC LICENSE
- [Description] - Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.
- [Dependencies] - https://github.com/dxa4481/truffleHog/blob/master/requirements.txt
- [Similar tools] - DumpsterDiver seems to be a similar tool: https://bugs.kali.org/view.php?id=4797
- [Activity] - Initial commit is end of 2016, latest commit is < 2 months ago
- [How to install] - pip install truffleHog
- [How to use] -
    trufflehog https://github.com/dxa4481/truffleHog
    truffleHog file:///user/dxa4481/codeprojects/truffleHog/
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0009905)
g0tmi1k   
2018-11-06 13:48   
Email'd author to see about getting a tag released
(0011619)
g0tmi1k   
2019-12-09 13:26   
(Last edited: 2020-01-06 13:19)
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

(0015085)
sbrun   
2021-09-07 07:23   
package version 2.2.1-0kali1 is ready for tests.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4611 [Kali Linux] Queued Tool Addition minor have not tried 2018-03-07 15:23 2021-09-16 09:10
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.4  
    Target Version:  
Summary: S3Scanner - Scan for open S3 buckets and dump
Description: - [Name] - S3Scanner
- [Version] - v0.1.0
- [Homepage] - https://github.com/sa7mon/S3Scanner
- [Download] - https://github.com/sa7mon/S3Scanner/archive/0.1.0.tar.gz
- [Author] - Dan Salmon
- [Licence] - CC BY-NC-SA 4.0 (https://raw.githubusercontent.com/sa7mon/S3Scanner/master/README.md)
- [Description] - A tool to find open S3 buckets and dump their contents
- [Dependencies] - python2/3 argparse requests awscli sh pytest coloredlogs (https://github.com/sa7mon/S3Scanner/blob/master/requirements.txt)
- [Similar tools] - Nothing?
- [Activity] - 2017-06-19 ~ Today
- [How to use] - python ./s3scanner.py --include-closed --out-file found.txt --dump names.txt
Steps To Reproduce:
Additional Information: Requires 3rd party online access
Attached Files:
Notes
(0011910)
g0tmi1k   
2020-01-13 13:59   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0011923)
bobert   
2020-01-14 14:41   
I made an initial attempt to package this myself, but was unsuccessful. I've made a post in the "Kali Linux Development" forum, but I'm not too hopeful that will help - there are only 2 other posts in that area and neither has any replies.
(0015084)
sbrun   
2021-09-07 07:22   
package version 2.0.1-0kali1 is ready for tests.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7331 [Kali Linux] Kali Websites & Docs minor always 2021-09-15 10:44 2021-09-15 11:41
Reporter: marcelosz Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Mirror selection issues for users behind cloud proxy
Description: I work for a cloud-delivered Next Gen Secure Web Gateway (cloud web proxy) company, and some of our users in Brazil are experiencing high latency when downloading ISOs for Kali's mirror. When they are steered through our web proxy platform to download the ISOs, they are being redirected to a mirror far from them (in France). When not using the web proxy, they are redirected to a closer mirror, and then the latency is ok.
We wanted to check with Kali's mirror admins to understand how the mirror selection takes place. Is it based on X-Forwarded-For (that we include in the request HTTP headers)? Or is it simply based on the Geo Location of the egress IPs of the user (in this case, our cloud web proxy)? Whatever the case, we suppose the GeoIP database being used by the mirror selector may be outdated or wrong for some reason.
Steps To Reproduce: Simply navigating through a cloud web proxy, and then without a proxy. But, depends on the egress IP that reaches Kali's CDN/mirror selector (cdimage.kali.org, I guess).
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6981 [Kali Linux] Queued Tool Addition minor N/A 2021-01-08 12:48 2021-09-14 15:46
Reporter: 0x4E0x650x6F Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: dscan - Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.
Description: Hi all,

I noticed that dmap is been in the distro for a while, since the project haven not evolved much, I decided to create something similar with additional features.

The tool's objective is similar, with additional features, it aggregates / splits address ranges, uses a configuration file where scan configuration can be adjusted, supports resume.
I thought it would be a nice addition to the distribution.

The tool repository, python pip, and documentation:

https://pypi.org/project/dscan-4E656F/
https://github.com/0x4E0x650x6F/dscan
https://dscan.readthedocs.io/en/0.1.1/

Suggestions and comments are welcome

Best Regards
Tiago Carvalho
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014079)
rhertzog   
2021-01-09 09:45   
Please don't file bugs in "Queued Tool Additions", you should use "New Tool Requests". And sometimes it's best to try to adopt an abandoned software instead of creating yet another fork. It makes it more likely to have it integrated as the continuation of the former tool...
(0014105)
0x4E0x650x6F   
2021-01-11 15:09   
Sorry about the confusion.
(0014147)
g0tmi1k   
2021-01-29 13:07   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging
(0014188)
0x4E0x650x6F   
2021-02-02 10:34   
Thanks alot.
I will do my best to create a package.
(0014228)
0x4E0x650x6F   
2021-02-17 16:04   
- [Name] - Dscan
- [Version] - 0.1.3
- [Homepage] - https://github.com/0x4E0x650x6F/dscan
- [Package] - https://gitlab.com/0x4E0x650x6F/dscan
- [documentation] - https://dscan.readthedocs.io/en/latest/
- [pip package] - https://pypi.org/project/dscan-4E656F/
- [Author] - 0x4E0x650x6F
- [License] - GPL-3
- [Description] - The tool's objective is similar, with additional features, it aggregates / splits address ranges, uses a configuration file where scan configuration can be adjusted, supports resume, and fail over when an agent goes down.
- [Dependencies] - python3, python3-libnmap
- [Similar tools] - some features can be found in dnmap, were the tool was inspired from.
- [Activity] - There was a commit this month
- [How to use] - dscan -h,
   generate ssl self sign cert: dscan --name <project-name> config -email mail@dscan.org -cn dscan -c pt -l earth -st nrw -o dscan -ou it -days 365
   run server mode: dscan --name <project name> srv --config dscan.conf targets.txt
   run agent mode: dscan --name <agent-project-name> agent --config <path-to-agent.conf> -s <server-ip-address> -p <server-port>
   note: certificate and agent configs need to be copied to the server host.
more details: in the readme where a link to a video demonstrating how it works.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7324 [Kali Linux] Tool Upgrade Request minor always 2021-09-10 11:15 2021-09-14 07:19
Reporter: hummAPT0 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: IDLE_3.9.2-3 doesn't support new Python3.9.7 so; idle_3.9.2-3 and python3-tk(3.9.2-3) should be upgraded to support python3.9.7
Description: After upgrading python3.9.2-3 to python3.9.7; idle-3.9.2-3 doesn't run then it shows error as

"ImportError: cannot import name '_setup_dialog' from 'tkinter.simpledialog' (/usr/lib/python3.9/tkinter/simpledialog.py)"

and I investigated the detail ,it's depends on python3-tk (3.9.7-2) but in Kali repository there is only python3-tk (3.9.2-3) available. But in the original tkinter repo there is python3-tk (3.9.7-2) already available.

Hope issue will be solved soon.
Thank you.
Humm Doc
Steps To Reproduce: 1. Upgrade the Kali system, sudo apt update & sudo apt -y upgrade
2. run 'idle'
it will show this:

└─$ idle
Traceback (most recent call last):
  File "/usr/bin/idle", line 3, in <module>
    from idlelib.pyshell import main
  File "/usr/lib/python3.9/idlelib/pyshell.py", line 53, in <module>
    from idlelib.editor import EditorWindow, fixwordbreaks
  File "/usr/lib/python3.9/idlelib/editor.py", line 19, in <module>
    from idlelib import configdialog
  File "/usr/lib/python3.9/idlelib/configdialog.py", line 27, in <module>
    from idlelib.config_key import GetKeysDialog
  File "/usr/lib/python3.9/idlelib/config_key.py", line 7, in <module>
    from tkinter.simpledialog import _setup_dialog
ImportError: cannot import name '_setup_dialog' from 'tkinter.simpledialog' (/usr/lib/python3.9/tkinter/simpledialog.py)
Additional Information:
Attached Files: idle.png (72,392 bytes) 2021-09-10 11:15
https://bugs.kali.org/file_download.php?file_id=2145&type=bug
png

idle-2.png (46,924 bytes) 2021-09-14 04:47
https://bugs.kali.org/file_download.php?file_id=2148&type=bug
png
Notes
(0015098)
hummAPT0   
2021-09-14 04:47   
Currently issue has been solved for temporary by installing python3.9-tk (3.9.7-1) version from http://ftp.br.debian.org/debian/pool/main/p/python3-stdlib-extensions/python3-tk_3.9.7-1_amd64.deb. Hope it will come in Kali repo by solving the issue.
(0015099)
sbrun   
2021-09-14 07:18   
python3-tk version 3.9.7-1 is now in kali-rolling (the update on all Kali mirrors can take a few hours)
It fixes this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4412 [Kali Linux] Queued Tool Addition minor N/A 2017-12-06 06:14 2021-09-13 23:02
Reporter: wetw0rk Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Sickle - Shellcode development tool
Description: Sickle is a shellcode development tool, created to speed up the various steps needed to create functioning shellcode. Aids the developer in eliminating bad characters, formatting output in various languages, executing shellcode in both Windows and Linux environments, comparing reversed shellcode to original, and disassembling shellcode into assembly language (ARM, x86, etc).
Steps To Reproduce: git clone https://github.com/wetw0rk/Sickle.git

cd Sickle/

apt-get install python3-pip

pip3 install capstone

chmod +x sickle.py && cp sickle.py /usr/bin/sickle

sickle
Additional Information: Written in Python 3, and only dependency required to run is capstone (for disassembly).
Attached Files: example.png (357,345 bytes) 2018-01-29 18:10
https://bugs.kali.org/file_download.php?file_id=1081&type=bug
compare.png (286,740 bytes) 2018-02-12 00:28
https://bugs.kali.org/file_download.php?file_id=1088&type=bug
dissemble.png (413,406 bytes) 2018-02-12 00:28
https://bugs.kali.org/file_download.php?file_id=1089&type=bug
Notes
(0007674)
steev   
2017-12-09 04:24   
is the version of capstone that we have in Kali not new enough for sickle?
(0007675)
wetw0rk   
2017-12-09 07:40   
After checking you are correct, the version currently installed in Kali will work perfectly. I made a couple changes, and verified sickle worked properly on a fresh Kali 2017.3 install.
(0007680)
wetw0rk   
2017-12-11 07:45   
Pushed some changes to the sickle. Thank you for your time.
(0008471)
g0tmi1k   
2018-01-29 15:13   
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

- [Name] - The name of the tool
- [Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
- [Homepage] - Where can the tool be found online? Where to go to get more information?
- [Download] - Where to go to get the tool?
- [Author] - Who made the tool?
- [Licence] - How is the software distributed? What conditions does it come with?
- [Description] - What is the tool about? What does it do?
- [Dependencies] - What is needed for the tool to work?
- [Similar tools] - What other tools are out there?
- [How to install] - How do you compile it?
- [How to use] - What are some basic commands/functions to demonstrate it?
(0008548)
wetw0rk   
2018-01-29 18:10   
Absolutely, if there’s any other information that would help let me know. Below is the
requested info:

-[Name] - Sickle

-[Version] - 1.4

-[Homepage] - https://github.com/wetw0rk/Sickle

-[Download] - https://github.com/wetw0rk/Sickle.git

-[Author] - Milton Valencia (wetw0rk)

-[License] - MIT License

-[Description] - Sickle is a shellcode development tool created to speed up the various steps
                    needed to create functioning shellcode. Sickle aids the developer in:
                    identification of bad characters, formatting in multiple languages (python,
                    perl, powershell, etc), executing shellcode in both Linux and Windows environments,
                    comparing reversed shellcode to original, and disassemble shellcode into various
                    architectures (ARM-THUMB, x86-32, x86-64, etc).

-[Dependencies] - capstone (If used within Kali the existing version of capstone works out of the
                    box. Otherwise it’s recommended to install via pip3 `pip3 install capstone`)

-[Similar tools] - msfvenom, ndisasm, shellnoob

-[How to install] - git clone https://github.com/wetw0rk/Sickle.git
                    cd Sickle/ && chmod +x sickle.py && cp sickle.py /usr/bin/sickle
                    echo “Sickle installed!”

-[How to use] - Identification of instructions what result bad characters:
                        sickle -r shellcode -f python -v jumpcode -b "\x00" -c
                    Running shellcode (Sickle detects if Windows or Linux):
                        sickle -r shellcode -rs
                    Comparing shellcode:
                        sickle -r <my reverse shell> -e <original reverse shell>
                    Disassembly of shellcode (x86-64):
                        sickle -r reverse-shell -d -a x86 -m 64
                    Asciinema example:
                        https://asciinema.org/a/7vvVRjZGbY7OlqMsh6dBi7FDU

I also went ahead and added screenshots.
(0008557)
wetw0rk   
2018-01-29 23:05   
I went ahead and added a git tag as well: https://github.com/wetw0rk/Sickle/releases/tag/v1.4

thanks
(0008654)
wetw0rk   
2018-02-12 00:26   
@g0tmi1k I recently released v1.5 the git tag is here:

https://github.com/wetw0rk/Sickle/releases/tag/v1.5

The only notable change is the compare function.

Thanks
(0009169)
wetw0rk   
2018-05-22 01:51   
Whenever a new change is made do we need to release a new tag?
(0009170)
steev   
2018-05-22 04:26   
Not for every change necessarily, but if you consider a new change worth a new release, then you should.

It depends on your idea of versioning.

If it's a bug change, you could do v1.5.1, if it's enough to be considered a new release, you could do v1.6. If it's massive changes, then possibly 2.0.
(0009171)
wetw0rk   
2018-05-23 01:14   
Alright sweet in that case I went ahead and added a new release tag https://github.com/wetw0rk/Sickle/releases/tag/v1.6

Syntax, Running Shellcode in 64bit, and Comparing shellcode has changed. Running shellcode in 64bit is more reliable thanks to contributor luoyeah, and comparing shellcode has dramatically changed since 1.5 (ASM and Opcodes vs just opcodes). Examples below:

Identification of instructions what result bad characters:
  sickle -r shellcode -f python -v jumpcode -b "\x00" -c
Running shellcode (Sickle detects if Windows or Linux):
  sickle -r shellcode -rs
Comparing shellcode:
  sickle -r <my reverse shell> -e <original reverse shell>
Disassembly of shellcode (x86-64):
  sickle -r reverse-shell -a x86_64 -d
Asciinema example:
  https://asciinema.org/a/7vvVRjZGbY7OlqMsh6dBi7FDU
(0010603)
wetw0rk   
2019-05-22 03:11   
v2 release ◝(⁰▿⁰)◜

https://github.com/wetw0rk/Sickle.git
(0011232)
g0tmi1k   
2019-10-28 13:16   
(Last edited: 2020-01-06 13:21)
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

(0011344)
wetw0rk   
2019-11-25 08:02   
Recently pushed v2.0.2 below is usage with the new module layout:

-[Name] - Sickle

-[Version] - 2.0.2

-[Homepage] - https://github.com/wetw0rk/Sickle

-[Download] - https://github.com/wetw0rk/Sickle.git

-[Author] - Milton Valencia (wetw0rk)

-[License] - MIT License

-[Description] - Sickle is a payload development tool originally created to aid in crafting shellcode, however it can be used in crafting payloads for other exploit types as well (non-binary). Although the current modules are mostly aimed towards assembly this tool is not limited to shellcode.

-[Dependencies] - capstone

-[Similar tools] - msfvenom, ndisasm, shellnoob

-[How to install] - git clone https://github.com/wetw0rk/Sickle.git && cd Sickle/ && python3 setup.py install

-[How to use] -

Help:
  sickle -h
List Modules:
  sickle -l
Diff module:
  sickle -i -m diff # help (applys to all modules)
  sickle -r <bin1> -m diff BINFILE=<bin2> MODE=hexdump
  sickle -r <bin1> -m diff BINFILE=<bin2> MODE=byte
  sickle -r <bin1> -m diff BINFILE=<bin2> MODE=asm
  sickle -r <bin1> -m diff BINFILE=<bin2> MODE=raw
Format module (default module):
  sickle -i # list formats
  sickle -r <bin> -f <format>

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7322 [Kali Linux] Kali Package Bug minor always 2021-09-09 21:08 2021-09-13 21:10
Reporter: Uknown Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SNAP ERROR
Description: Everytime after a reboot if you try to run a software installed with snap, it doesn't start.
Steps To Reproduce: Open a terminal and just type the program name, installed with snap, you want to start
Additional Information:
Attached Files: Schermata del 2021-09-09 23-08-18.png (9,398 bytes) 2021-09-09 21:08
https://bugs.kali.org/file_download.php?file_id=2143&type=bug
png
Notes
(0015090)
Uknown   
2021-09-09 21:10   
A temporary fix is this to be executed with root

apparmor_parser -r /var/lib/snapd/apparmor/profiles/*

I don't know if is snap broken or only a my machine error.
(0015093)
arnaudr   
2021-09-13 14:11   
Apparently this should be fixed with the next snapd version, the version `2.51.7-2`. Cf. https://forum.snapcraft.io/t/snap-apps-not-running-in-kali-linux/26542/4

At the moment it's blocked by the glibc transition, so I don't know exactly when it will enter kali-rolling. Could be a couple of days, I guess.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7214 [Kali Linux] Feature Requests minor always 2021-06-07 10:11 2021-09-13 21:10
Reporter: vanguard Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali live-build should start into wanted window-manager
Description: Dear maintainers,

I am stuck with a little issue, that maybe possible easily be fixed.

The issue: When I am building a live-build of kali (in the usual way with build.sh), I want to build it with LXDE.
This works, however, when the live-build is starting, it automatically is booting into XFCE (which is installed by default).

How can I force to the live-system boot into LXDE instead of XFCE?

I suppose, this can be set by me in the git files somewhere, however, that would force to edit this setting after any git pull.
 
Or is it possible to add a "boot parameter" to ./build.sh, so that it will start LXDE by default?

Thank you very much for any informations and thanks for all the great work.

Best

Hans
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot from 2021-09-02 14-09-19.png (938,573 bytes) 2021-09-02 07:16
https://bugs.kali.org/file_download.php?file_id=2140&type=bug
Notes
(0014691)
Michu   
2021-06-09 19:58   
in build.sh isn't there is line with graphical env choose then you may change it try it it won't cost you and maybe you could learn something valuable let us know if that worked
(0014695)
vanguard   
2021-06-10 19:08   
I checked the build.sh, but could not find any line, where to set the window-manager, except those lines with the "variant" entry. This tag is added by me, when I build a live system. I am building with a script, I made myself:

----- snip -----

#!/bin/sh
### Author Hans-J. Ullrich <hans.ullrich@loop.de>
### License: GPL

### Set some variables, not active yet.
### architecture: i386, amd64, arm
ARCH=i386
### Distribution, you might not want to change it.
DISTRO=kali-rolling
### Your preferred window-manager: lxde, kde, xfce, gnome
VARIANT=lxde
### Environmet for your local proxy
PROXY=http://localhost:3142/
### language, keyboard, locales everything you might not need to change
BOOTAPP="boot=live hostname=uit-kali ignore_uuid locales=de_DE.UTF-8 keyboard-layouts=de keyboard-variants=nodeadkeys"

### Clean your system, not really necessarey, as the latter "./build.sh" does
### this either.
# lb clean

### VERY IMPORTANT: Make sure, apt-cacher is started, even, if you are sure,
### it is already running!
/etc/init.d/apt-cacher-ng stop && sleep 3 && /etc/init.d/apt-cacher-ng start

### set your needed environment and preparations.
export http_proxy=http://localhost:3142/
lb config

### This command starts the actual build. All commands are in one line.
### However, this script might be improved, to use variables for better
### configuration possibilities.
# ./build.sh --arch $ARCH --distribution $DISTRO --variant $VARIANT --verbose -- --apt-http-proxy $PROXY
./build.sh --arch $ARCH --distribution $DISTRO --variant $VARIANT --verbose -- --apt-http-proxy $PROXY --bootappend-live "$BOOTAPP"

### these options can be used for further commands after build
### for example, if you want to burn a dvd, shutdown, whatever
### Examples for my personal needs below
#/etc/init.d/apt-cacher-ng stop

### Suggestions for handling the built image.
# cp /home/username/live-build-config/images/*.iso /home/user/
# wodim /path_to_your_live_build/live-build-config/images/your_image_name.iso

### Some opportunities at unattended build run, what to do after the build succeeded.
# halt -p
# reboot
# shutdown -h now

 ---- snap ------

As can be seen, I am using for the variant the term "lxde", so I expected LXDE as standard window-manger, not XFCE. This script worked most of the time, but some day something changed and kali-live is booting into XFCE. Is there soemthing wrong with my script???

Best regards

Hans
(0014699)
Michu   
2021-06-11 15:31   
./build.sh --arch $ARCH --distribution $DISTRO --variant $VARIANT --verbose -- --apt-http-proxy $PROXY --bootappend-live "$BOOTAPP" in my opinion this line have mispell afer verbose -- apt-http-proxy not -- --apt-http-proxy maybe change value variant from lxde to xfce :) just kidding if this won't work try update kali using apt full-upgrade
(0014705)
vanguard   
2021-06-11 16:40   
Does not work, the "--" before --apt-http-proxy is necessary, otherwise it does not build. Besides: This configration worked for years before!
Anyone else with ideas?
(0014713)
Michu   
2021-06-14 17:30   
maybe try build normally with xfce and after building process is complete just install lxde from repository
(0014717)
vanguard   
2021-06-20 07:31   
Ok, now I tried several things.
First, according to this link
https://live-team.pages.debian.net/live-manual/html/live-manual/examples.en.html
I created the directory /etc/skel in config/includes.chroot and put a custom .xsession in it for the default user. This did not work.

Second try, was to edit ./build.sh directly and do not use the tag "--variant lxde". Again no success.

Then I searched the whole downloaded git tree, to explore, how the user "kali" was created. I found the scripts and the hooks, but none of them showed me, how the default user was created (at least, maybe I did not see it)

It is also not clear for me, how the subdirectories in the home of user kali are created. Of course, in this home directory my .xsession from the /etc/skel was missing. However, I found my .xsession in /etc/skel, so any new added user would get it. But in the live-system I do not add new users!

So I guess, this is either a bug (because IMO setting the tag "--variant lxde" or any other variant) should set the default window manager to exactly that one.

Besides: This behaviour was exactly so in prior times, so something must have changed!

Due to this report should be changed to a higher level, as I believe it is defitely a bug.
(0014718)
Michu   
2021-06-20 16:42   
something is definitely not right i give you that because if you declaring variable --variant lxde then bash must execute her too in live-usb you can't add user AND after reboot and enter again in live usb there won't be that user you created because everything is written to RAM not physical disk at the end you're right this may be bug or your shell interpreting differently than it should
(0014719)
vanguard   
2021-06-21 15:44   
Ok, things are now clear. To avoid mixes between different shells I made a last try.
As can be seen in my script, I am using "/bin/sh" in the shebang line, and ./build.sh is using "/bin/bash". Of course, one could get the idea, these two
do not work together. But as I said before: This worked before!

So, to eliminate this point of failure, I build the image completely manually, just the ./build.sh command and the whole rats tail addded (yes, also --variant lxde added).

If everything would work like expected, doing this way (and all possible interferences are in this case eliminated!) it should now start LXDE by default.

But it does NOT! So it is clearly a bug. So it would be nice, if that could be fixed by those, who created the git tree or the build.sh - in short, the developers.

For those, who need a workaround:
After the build is finished, you can extract the ISO-file by some tools (i.e. Acetoniso whatever).
Then extract the filesystem.squashfs into a directory (kali got tools for this in its repo)
Now enter the /home/kali of the extracted filesystem.squashfs and add a ".xsession"-file in it with the needed entries for the required window-manager (see the link in my posts before related to debian).
At last repack the filesystem.suashfs and copy it to the folder, where you unpacked the ISO, then repack the ISO again.

This should solve the problem, however it is a large effort and I would appreciate a faster and easier solution.

So please change this report from wishlist to bugreport, state normal.

Thanks for reading this and any help.

Best regards

Hans
(0014852)
vanguard   
2021-06-25 08:24   
Hi again,
According to the following output in build.log

[2021-06-25 09:52:58] lb config -a amd64 --distribution kali-rolling -- --variant lxde --apt-http-proxy http://localhost:3142/ --bootappend-live boot=live hostname=kali ignore_uuid locales=de_DE.UTF-8 keyboard-layouts=de keyboard-variants=nodeadkeys

it is not very clear for me, what ./build.sh really does. Ok, I can set my variables here, after cleaning the old tree (lb clean --purge), it is starting lb config with my set variables, but according to line 187 in ./build.sh I there is a "--" before the command --variant. This looks weired for me, however, lb config does not know that command as the manual says.

Then, in line 289 you are using the entries of line 187 again (KERNEL_CONFIG_OPTS), and we are using still the "--" before the --variant. This looks weired for me.

As far as I know, it was possible in earlier times to use lb config and lb build with variables. In ./build.sh I can not see, where the variable --variant is given to lb build. On the other hand lb config does not know the tag --variant (according to the manual).

So, I would be happy, if someone could explain me, what I am reading wrong.

The other question is, why do we no more use the simple commands "lb config" and "lb build" like we did in earlier times and as it is recommended in the manual of live-build? What was the idea to change to ./build.sh?

Thanks for making things clearer for me!

Best regards

Hans
(0015047)
vanguard   
2021-08-27 18:50   
Me again. I am still hasseling with this issue.
For testing purposes I am trying several things.

Sorry, I am not very good in scripting, but please allow me to share my thoughts though.
I believe, that there is a problem with the file "build.sh" or auto/config or live-build itself and want to try to explain.

In line 187 of build.sh you are setting the variables for lb config. Taking a closer look, and starting manually "lb config --help", I can not see
any switch named "variant". So I just tried to do some things manually.

1. lb config --architecture amd64 --variant lxde
Did not work, and telling "variant not known"

2. lb config --architecture amd64 -- --variant lxde
Crashes.

3. Tried lb config, then lb build, this started. But when I put these two commands in a bash script. it does not work. The reason for it, is, that of undefinetly reasons the command "lb config" is called again.

I also discovered, that the given tag "--variant lxde" (i.e. doing a command "./build.sh --arch amd64 --distribution kali-rolling --variant lxde") is going to overwritten by something. So that the actuual tag is "--variant default --variant lxde".

This causes the build fallback to default, and so it appears, that whatever I give at variant, always XFCE will be chosen and built, because this is the default(!)
And of course, then it will start XFCE at boot, what is NOT intended. This is the bug and this bugreport should be set to "normal" I suggest.

Still I can not say, what has been changed in the past. Suddenly my scripts did not work any more - after an upgrade of the git tree!
And as I do not know, what was changed there and when, it is difficult for me, to say, what really happened.

Hopefully I could bring a little more light into this issue.

Of course I read the documentations, but this did not really help.

Please feel free for more information.

Best

Hans
(0015071)
arnaudr   
2021-09-02 07:16   
(Last edited: 2021-09-02 07:18)
Hi, I just tried to build a Kali Live ISO with the LXDE variant, and it works for me, I can't reproduce your problem.

I run the following command:

./build.sh --variant lxde --verbose


When I boot the iso, I land straigh on the LXDE desktop. See the screenshot attached.

I also checked whether XFCE was installed, and it is not. There are only a few utils from XFCE, but this is not the whole XFCE desktop, far from that.

┌──(root�kali)-[~]
└─# dpkg -l | grep xfce
ii  libxfce4util-bin                       4.16.0-1                           amd64        tools for libxfce4util
ii  libxfce4util-common                    4.16.0-1                           all          common files for libxfce4util
ii  libxfce4util7:amd64                    4.16.0-1                           amd64        Utility functions library for Xfce4


(0015072)
vanguard   
2021-09-02 07:45   
I tried this too, but got no success. However, did you try this with XFCE installed, too? I want XFCE and LXDE to be installed, and I want LXDE to be started.
But when you say, this is working, I will try to build a new image without any XFCE. Just to see, if this is working.
(0015073)
arnaudr   
2021-09-02 08:10   
(Last edited: 2021-09-02 09:35)
Yes I built with LXDE only. That's what you get if you invoke the build script with --variant, like in "./build.sh --variant lxde --verbose". You'll get Kali built with ONE desktop environment and only one.

If you want XFCE + LXDE, I guess that you can for example build with one variant, and list additional packages to install into this variant.

For example, if you want to build with "--variant lxde", and install XFCE additionally, try this:

# list additional packages to install
echo "xfce4" > kali-config/variant-lxde/package-lists/xfce.list.chroot

# build
./build.sh --variant lxde --verbose


With this, you build the LXDE variant, and you also install the xfce4 package. "xfce4" is the metapackage that brings in all the XFCE desktop environment. I didn't try it myself. You could also use the metapackage "kali-desktop-xfce" instead of "xfce4" in the example above.

(edited for clarity)


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7327 [Kali Linux] Queued Tool Addition minor have not tried 2021-09-13 14:08 2021-09-13 17:42
Reporter: R4yan Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: stegbrute - is a fast steganography brute force tool written in Rust
Description: [Name] - stegbrute
[Homepage] - https://github.com/R4yGM/stegbrute
[Download] - https://github.com/R4yGM/stegbrute/releases
[Version] - 0.1.1
[Author] - R4yan
[License] - Apache License 2.0
[Dependencies] - steghide
[Description] - stegbrute is a fast steganography brute force tool written in Rust useful for CTF's and analysing images
[Similar tools] - hostapd-wpe, freeradius-wpe, hostapd-mana
[How to install] - Check the documentation on how to install the tool https://github.com/R4yGM/stegbrute#installation
[How to use] - The documentation contains all the explanation with also an asciinema example https://github.com/R4yGM/stegbrute#usage
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015092)
R4yan   
2021-09-13 14:11   
Hi sorry, i put the wrong tools on the "Similar tools", can i change it to : stegcracker?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
3512 [Kali Linux] Queued Tool Addition minor have not tried 2016-08-30 21:58 2021-09-13 17:37
Reporter: kimocoder Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: WIFI-Pumpkin, a real nice GUI wireless MITM framework with plugin support.
Description: WIFI-Pumpkin, tool can be found @ https://github.com/P0cL4bs/WiFi-Pumpkin
and it deserves a spot in the Kali repos :)
Steps To Reproduce:
Additional Information:
Attached Files: test.png (1,028,597 bytes) 2016-08-30 21:58
https://bugs.kali.org/file_download.php?file_id=732&type=bug
Notes
(0008503)
g0tmi1k   
2018-01-29 15:19   
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

- [Name] - The name of the tool
- [Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
- [Homepage] - Where can the tool be found online? Where to go to get more information?
- [Download] - Where to go to get the tool?
- [Author] - Who made the tool?
- [Licence] - How is the software distributed? What conditions does it come with?
- [Description] - What is the tool about? What does it do?
- [Dependencies] - What is needed for the tool to work?
- [Similar tools] - What other tools are out there?
- [How to install] - How do you compile it?
- [How to use] - What are some basic commands/functions to demonstrate it?
(0010021)
Mister_X   
2018-11-26 18:41   
- [Name] - WIFI-Pumpkin
- [Version] - Latest release (in the release tab on GitHub)
- [Homepage] - https://github.com/P0cL4bs/WiFi-Pumpkin
- [Download] - https://github.com/P0cL4bs/WiFi-Pumpkin
- [Author] - P0cL4bs Team/mh4x0f - Marcos Bomfim (Nesster)
- [Licence] - GNU General Public License v3.0
- [Description] - Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.

- [Dependencies] - hostapd, isc-dhcp-server (optional), php5-cli (optional), rfkill , iptables (with nftables I believe) , nmcli
- [Similar tools] - Fern WiFi, Ghost Fisher, wifiphisher
- [How to install] - https://github.com/P0cL4bs/WiFi-Pumpkin/wiki/Installation
- [How to use] - Examples are shown in the README.md on their GitHub: https://github.com/P0cL4bs/WiFi-Pumpkin (Screenshots: https://github.com/P0cL4bs/WiFi-Pumpkin/wiki/Screenshots )
(0011612)
g0tmi1k   
2019-12-09 13:18   
(Last edited: 2020-01-06 13:21)
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6243 [Kali Linux] Queued Tool Addition minor N/A 2020-03-31 10:53 2021-09-13 17:36
Reporter: luisfontes10 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: XXExploiter - Tool to generate XXE payloads and automate attacks
Description:  [Name]
XXExploiter

[Version]
0.1.7

[Homepage]
https://luisfontes19.github.io/xxexploiter/

[Download]
https://www.npmjs.com/package/xxexploiter/v/0.1.7

[Author]
luisfontes19

[Licence]
MIT

[Description]
Tool to generate various XXE payloads and automate the process of sending to server. Also includes a fuzzer through xxe

[Dependencies]
Node (tested with version 10 and 12)

[Similar tools]
XXEinjector

[Activity]
Started on March 20, still being developed and improved

[How to install]
npm install xxexploiter.

To build it from source (without version bump):
npm install -g typescript ts-node
tsc --project ./tsconfig.json && chmod +x dist/cli.js

[How to use]
xxexploiter file /etc/somefile -x request.txt -t template.xml
command to generate an XXE payload to read a file from FS (/etc/somefile) and use an xml template to inject the payload. It will automatically make a request, based on the raw request in request.txt

command to generate multiple XXE payloads to read a file from FS (in root folder)based on a wordlist
It will automatically make the request, based on the raw request in request.txt and filter the responses by the string "not found". If the string is not preset, it was the expected "success" request
xxexploiter file /root/{FUZZ} -w wordlist.txt -n "not found" -x request.txt


[Packaged] - No need, packaged for NPM
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0012851)
g0tmi1k   
2020-05-29 14:10   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7274 [Kali Linux] Tool Upgrade Request minor N/A 2021-08-03 09:14 2021-09-07 08:02
Reporter: fl0 Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: VirtualBox packages version 6.1.26
Description: virtualbox 6.1.26-dfsg-2 is out in Debian unstable.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014964)
g0tmi1k   
2021-08-03 11:27   
This would happen on the debian side of things
(0014969)
fl0   
2021-08-04 06:55   
Thanks for the answer @g0tmi1k.

Since it is imported on unstable on Debian side and it seems that it is not automatically imported in kali-rolling (4 versions are missing see https://tracker.debian.org/pkg/virtualbox), maybe it needs to be manually imported ?
(0014970)
g0tmi1k   
2021-08-04 12:44   
It does need to be manually imported, as we are based on Debian testing ~ https://www.kali.org/docs/policy/kali-linux-relationship-with-debian/
 & https://www.kali.org/docs/general-use/kali-branches/

As its such a key part, it may be worth waiting for it to go from Debian unstable to testing to help reduce the chance of bugs
(0014971)
fl0   
2021-08-04 14:26   
Yes you are right, but it will not make it to testing or stable:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794466
https://tracker.debian.org/news/1038163/virtualbox-removed-from-testing/

VirtualBox is an exception and needs to be imported from unstable (automatically ?).

(0014972)
fl0   
2021-08-04 14:36   
In the future (kernel update), VirtualBox kernel modules will breaks and the package will be unusable if not updated.
(0015023)
sbrun   
2021-08-24 12:40   
virtualbox version 6.1.22-dfsg-2 has been imported in kali-rolling.

The version 6.1.22-dfsg-3 will not be imported for the moment in kali-rolling because of a build failure in Debian.
(0015026)
fl0   
2021-08-25 07:21   
But i was talking about upgrading to version 6.1.26 not 6.1.22.
(0015087)
sbrun   
2021-09-07 08:01   
the version 6.1.26 has been uploaded in Debian.
I just imported the package version 6.1.26-dfsg-4. It will be available very soon in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7319 [Kali Linux] Kali Package Bug minor always 2021-09-05 16:46 2021-09-06 02:27
Reporter: cloverskull Platform:  
Assigned To: arnaudr OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: kali-tweaks vmware shared folders package name issue
Description: When using 'kali-tweaks' to enable shared folder integration in a vmware vm, the following error is produced:

┌──(kali㉿kali)-[~]
└─$ kali-tweaks 1 ⨯
>>> Installing program: /usr/local/sbin/mount-share-folders
The screen object doesn't exist, can't destroy it
Traceback (most recent call last):
  File "/usr/bin/kali-tweaks", line 33, in <module>
    sys.exit(load_entry_point('kali-tweaks==2021.3.1', 'console_scripts', 'kali-tweaks')())
  File "/usr/lib/python3/dist-packages/kali_tweaks/__main__.py", line 991, in main
    do_main_screen()
  File "/usr/lib/python3/dist-packages/kali_tweaks/__main__.py", line 982, in do_main_screen
    ret = func()
  File "/usr/lib/python3/dist-packages/kali_tweaks/__main__.py", line 732, in do_virtual_screen
    action()
  File "/usr/lib/python3/dist-packages/kali_tweaks/utils.py", line 680, in configure
    install_program(script)
  File "/usr/lib/python3/dist-packages/kali_tweaks/utils.py", line 173, in install_program
    src = get_datafile(os.path.basename(program))
  File "/usr/lib/python3/dist-packages/kali_tweaks/utils.py", line 96, in get_datafile
    return _get_kali_tweaks_file("data", filename)
  File "/usr/lib/python3/dist-packages/kali_tweaks/utils.py", line 91, in _get_kali_tweaks_file
    raise FileNotFoundError(errno.ENOENT, os.strerror(errno.ENOENT), f)
FileNotFoundError: [Errno 2] No such file or directory: '/usr/lib/kali_tweaks/data/mount-share-folders'


This looks like a typo, since there _is_ a /usr/lib/kali_tweaks/data/mount-shared-folders but not mount-share-folders. and manually copying the file or creating a symlink does allow the task to complete.
Steps To Reproduce: 1. Setup vmware with fresh vmdk package
2. run 'kali-tweaks'
3. Select 'Virtualization'
4. Select shared folder addition (I can't see the original language since I've gotten this installed)
5. Watch 'kali-tweaks' close out with the above posted error message
Additional Information:
Attached Files:
Notes
(0015081)
arnaudr   
2021-09-06 02:21   
Thanks a lot for the report! A fix is included in the latest version of the kali-tweaks package: version 2021.3.2. This package should be available in kali-rolling in a few hours.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7310 [Kali Linux] Kali Package Bug block always 2021-09-02 08:10 2021-09-03 03:36
Reporter: Uknown Platform:  
Assigned To: arnaudr OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SNAP STOPPED WORKING
Description: Every software which I am trying to install with snap display to me this error.

error: cannot perform the following tasks:
- Mount snap "core" (11606) (snap is unusable due to missing files; contact developer)

I tried install through this guide https://www.kali.org/docs/tools/snap/ and It worked just fine until 2/3 days ago.
Steps To Reproduce: Just try to install anything available on https://snapcraft.io

Or in my case one example is this

snap install hello-world
Additional Information:
Attached Files: image.png (11,219 bytes) 2021-09-02 08:10
https://bugs.kali.org/file_download.php?file_id=2141&type=bug
png
Notes
(0015074)
arnaudr   
2021-09-02 09:50   
Hi, apparently this has been reported on Debian's side (Kali gets this package straight from Debian):

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993233

It seems like the problem is solved in that later version of snapd in Debian unstable, the version 2.51.7-1.
(0015075)
Uknown   
2021-09-02 12:08   
Thanks a lot arnaudr so how I fix this I need to wait or install the snap version from debian repo?
(0015076)
Uknown   
2021-09-02 12:57   
Solved installing that snap version from here.
(0015078)
arnaudr   
2021-09-03 03:35   
(Last edited: 2021-09-03 03:36)
I imported the package from Debian unstable into Kali rolling, so for anyone having this issue, updating your Kali install should fix it:

apt update && apt -y upgrade


@Uknown thanks a lot for the report!


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7298 [Kali Linux] Kali Package Bug minor always 2021-08-26 23:09 2021-09-02 14:10
Reporter: LeeRock Platform:  
Assigned To: arnaudr OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: sslyze is broken
Description: root@kali:~# sslyze
Traceback (most recent call last):
  File "/usr/bin/sslyze", line 33, in <module>
    sys.exit(load_entry_point('sslyze==4.1.0', 'console_scripts', 'sslyze')())
  File "/usr/bin/sslyze", line 25, in importlib_load_entry_point
    return next(matches).load()
  File "/usr/lib/python3.9/importlib/metadata.py", line 77, in load
    module = import_module(match.group('module'))
  File "/usr/lib/python3.9/importlib/__init__.py", line 127, in import_module
    return _bootstrap._gcd_import(name[level:], package, level)
  File "<frozen importlib._bootstrap>", line 1030, in _gcd_import
  File "<frozen importlib._bootstrap>", line 1007, in _find_and_load
  File "<frozen importlib._bootstrap>", line 972, in _find_and_load_unlocked
  File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed
  File "<frozen importlib._bootstrap>", line 1030, in _gcd_import
  File "<frozen importlib._bootstrap>", line 1007, in _find_and_load
  File "<frozen importlib._bootstrap>", line 986, in _find_and_load_unlocked
  File "<frozen importlib._bootstrap>", line 680, in _load_unlocked
  File "<frozen importlib._bootstrap_external>", line 790, in exec_module
  File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed
  File "/usr/lib/python3/dist-packages/sslyze/__init__.py", line 25, in <module>
    from sslyze.plugins.scan_commands import ScanCommand, ScanCommandType
  File "/usr/lib/python3/dist-packages/sslyze/plugins/scan_commands.py", line 12, in <module>
    from sslyze.plugins.certificate_info.implementation import CertificateInfoImplementation
  File "/usr/lib/python3/dist-packages/sslyze/plugins/certificate_info/implementation.py", line 8, in <module>
    from sslyze.plugins.certificate_info._cert_chain_analyzer import (
  File "/usr/lib/python3/dist-packages/sslyze/plugins/certificate_info/_cert_chain_analyzer.py", line 11, in <module>
    from cryptography.x509.ocsp import load_der_ocsp_response, OCSPResponseStatus, OCSPResponse
ModuleNotFoundError: No module named 'cryptography.x509.ocsp'
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015036)
g0tmi1k   
2021-08-27 11:10   
```
% docker run --rm --interactive --tty --entrypoint=/bin/bash --volume $(pwd):/mnt/ --workdir /mnt/ kalilinux/kali-rolling
┌──(root�8a59017fe629)-[/mnt]
└─# apt update && apt install -yqq sslyze
Get:1 http://kali.download/kali kali-rolling InRelease [30.5 kB]
Get:2 http://kali.download/kali kali-rolling/non-free amd64 Packages [201 kB]
Get:3 http://kali.download/kali kali-rolling/main amd64 Packages [17.8 MB]
Get:4 http://kali.download/kali kali-rolling/contrib amd64 Packages [108 kB]
Fetched 18.2 MB in 8s (2268 kB/s)
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
33 packages can be upgraded. Run 'apt list --upgradable' to see them.
The following additional packages will be installed:
  ca-certificates javascript-common libexpat1 libgpm2 libjs-jquery libjs-sphinxdoc libjs-underscore libmpdec3 libncursesw6 libpython3-stdlib libpython3.9-minimal libpython3.9-stdlib libreadline8
  libsqlite3-0 media-types openssl python3 python3-cffi-backend python3-cryptography python3-minimal python3-nassl python3-pkg-resources python3-six python3-tls-parser python3-typing-extensions
  python3.9 python3.9-minimal readline-common
Suggested packages:
  apache2 | lighttpd | httpd gpm python3-doc python3-tk python3-venv python-cryptography-doc python3-cryptography-vectors python3-setuptools python3.9-venv python3.9-doc binutils binfmt-support
  readline-doc
The following NEW packages will be installed:
  ca-certificates javascript-common libexpat1 libgpm2 libjs-jquery libjs-sphinxdoc libjs-underscore libmpdec3 libncursesw6 libpython3-stdlib libpython3.9-minimal libpython3.9-stdlib libreadline8
  libsqlite3-0 media-types openssl python3 python3-cffi-backend python3-cryptography python3-minimal python3-nassl python3-pkg-resources python3-six python3-tls-parser python3-typing-extensions
  python3.9 python3.9-minimal readline-common sslyze
0 upgraded, 29 newly installed, 0 to remove and 33 not upgraded.
Need to get 10.8 MB of archives.
After this operation, 37.0 MB of additional disk space will be used.
debconf: delaying package configuration, since apt-utils is not installed
Selecting previously unselected package libpython3.9-minimal:amd64.
(Reading database ... 6762 files and directories currently installed.)
Preparing to unpack .../libpython3.9-minimal_3.9.2-1_amd64.deb ...
Unpacking libpython3.9-minimal:amd64 (3.9.2-1) ...
Selecting previously unselected package libexpat1:amd64.
Preparing to unpack .../libexpat1_2.2.10-2_amd64.deb ...
Unpacking libexpat1:amd64 (2.2.10-2) ...
Selecting previously unselected package python3.9-minimal.
Preparing to unpack .../python3.9-minimal_3.9.2-1_amd64.deb ...
Unpacking python3.9-minimal (3.9.2-1) ...
Setting up libpython3.9-minimal:amd64 (3.9.2-1) ...
Setting up libexpat1:amd64 (2.2.10-2) ...
Setting up python3.9-minimal (3.9.2-1) ...
Selecting previously unselected package python3-minimal.
(Reading database ... 7056 files and directories currently installed.)
Preparing to unpack .../0-python3-minimal_3.9.2-3_amd64.deb ...
Unpacking python3-minimal (3.9.2-3) ...
Selecting previously unselected package media-types.
Preparing to unpack .../1-media-types_4.0.0_all.deb ...
Unpacking media-types (4.0.0) ...
Selecting previously unselected package libmpdec3:amd64.
Preparing to unpack .../2-libmpdec3_2.5.1-2_amd64.deb ...
Unpacking libmpdec3:amd64 (2.5.1-2) ...
Selecting previously unselected package libncursesw6:amd64.
Preparing to unpack .../3-libncursesw6_6.2+20201114-2_amd64.deb ...
Unpacking libncursesw6:amd64 (6.2+20201114-2) ...
Selecting previously unselected package readline-common.
Preparing to unpack .../4-readline-common_8.1-2_all.deb ...
Unpacking readline-common (8.1-2) ...
Selecting previously unselected package libreadline8:amd64.
Preparing to unpack .../5-libreadline8_8.1-2_amd64.deb ...
Unpacking libreadline8:amd64 (8.1-2) ...
Selecting previously unselected package libsqlite3-0:amd64.
Preparing to unpack .../6-libsqlite3-0_3.34.1-3_amd64.deb ...
Unpacking libsqlite3-0:amd64 (3.34.1-3) ...
Selecting previously unselected package libpython3.9-stdlib:amd64.
Preparing to unpack .../7-libpython3.9-stdlib_3.9.2-1_amd64.deb ...
Unpacking libpython3.9-stdlib:amd64 (3.9.2-1) ...
Selecting previously unselected package python3.9.
Preparing to unpack .../8-python3.9_3.9.2-1_amd64.deb ...
Unpacking python3.9 (3.9.2-1) ...
Selecting previously unselected package libpython3-stdlib:amd64.
Preparing to unpack .../9-libpython3-stdlib_3.9.2-3_amd64.deb ...
Unpacking libpython3-stdlib:amd64 (3.9.2-3) ...
Setting up python3-minimal (3.9.2-3) ...
Selecting previously unselected package python3.
(Reading database ... 7494 files and directories currently installed.)
Preparing to unpack .../00-python3_3.9.2-3_amd64.deb ...
Unpacking python3 (3.9.2-3) ...
Selecting previously unselected package openssl.
Preparing to unpack .../01-openssl_1.1.1k-1_amd64.deb ...
Unpacking openssl (1.1.1k-1) ...
Selecting previously unselected package ca-certificates.
Preparing to unpack .../02-ca-certificates_20210119_all.deb ...
Unpacking ca-certificates (20210119) ...
Selecting previously unselected package javascript-common.
Preparing to unpack .../03-javascript-common_11+nmu1_all.deb ...
Unpacking javascript-common (11+nmu1) ...
Selecting previously unselected package libgpm2:amd64.
Preparing to unpack .../04-libgpm2_1.20.7-8_amd64.deb ...
Unpacking libgpm2:amd64 (1.20.7-8) ...
Selecting previously unselected package libjs-jquery.
Preparing to unpack .../05-libjs-jquery_3.5.1+dfsg+~3.5.5-7_all.deb ...
Unpacking libjs-jquery (3.5.1+dfsg+~3.5.5-7) ...
Selecting previously unselected package libjs-underscore.
Preparing to unpack .../06-libjs-underscore_1.9.1~dfsg-3_all.deb ...
Unpacking libjs-underscore (1.9.1~dfsg-3) ...
Selecting previously unselected package libjs-sphinxdoc.
Preparing to unpack .../07-libjs-sphinxdoc_3.4.3-2_all.deb ...
Unpacking libjs-sphinxdoc (3.4.3-2) ...
Selecting previously unselected package python3-cffi-backend:amd64.
Preparing to unpack .../08-python3-cffi-backend_1.14.6-1_amd64.deb ...
Unpacking python3-cffi-backend:amd64 (1.14.6-1) ...
Selecting previously unselected package python3-six.
Preparing to unpack .../09-python3-six_1.16.0-2_all.deb ...
Unpacking python3-six (1.16.0-2) ...
Selecting previously unselected package python3-cryptography.
Preparing to unpack .../10-python3-cryptography_3.3.2-1_amd64.deb ...
Unpacking python3-cryptography (3.3.2-1) ...
Selecting previously unselected package python3-nassl.
Preparing to unpack .../11-python3-nassl_4.0.0-0kali2_amd64.deb ...
Unpacking python3-nassl (4.0.0-0kali2) ...
Selecting previously unselected package python3-pkg-resources.
Preparing to unpack .../12-python3-pkg-resources_52.0.0-4_all.deb ...
Unpacking python3-pkg-resources (52.0.0-4) ...
Selecting previously unselected package python3-tls-parser.
Preparing to unpack .../13-python3-tls-parser_1.2.2-0kali1_all.deb ...
Unpacking python3-tls-parser (1.2.2-0kali1) ...
Selecting previously unselected package python3-typing-extensions.
Preparing to unpack .../14-python3-typing-extensions_3.7.4.3-1_all.deb ...
Unpacking python3-typing-extensions (3.7.4.3-1) ...
Selecting previously unselected package sslyze.
Preparing to unpack .../15-sslyze_4.1.0-0kali1_all.deb ...
Unpacking sslyze (4.1.0-0kali1) ...
Setting up media-types (4.0.0) ...
Setting up javascript-common (11+nmu1) ...
Setting up libgpm2:amd64 (1.20.7-8) ...
Setting up libsqlite3-0:amd64 (3.34.1-3) ...
Setting up libncursesw6:amd64 (6.2+20201114-2) ...
Setting up libmpdec3:amd64 (2.5.1-2) ...
Setting up libjs-jquery (3.5.1+dfsg+~3.5.5-7) ...
Setting up openssl (1.1.1k-1) ...
Setting up readline-common (8.1-2) ...
Setting up libjs-underscore (1.9.1~dfsg-3) ...
Setting up libreadline8:amd64 (8.1-2) ...
Setting up ca-certificates (20210119) ...
debconf: unable to initialize frontend: Dialog
debconf: (No usable dialog-like program is installed, so the dialog based frontend cannot be used. at /usr/share/perl5/Debconf/FrontEnd/Dialog.pm line 78.)
debconf: falling back to frontend: Readline
debconf: unable to initialize frontend: Readline
debconf: (Can't locate Term/ReadLine.pm in @INC (you may need to install the Term::ReadLine module) (@INC contains: /etc/perl /usr/local/lib/x86_64-linux-gnu/perl/5.32.1 /usr/local/share/perl/5.32.1 /usr/lib/x86_64-linux-gnu/perl5/5.32 /usr/share/perl5 /usr/lib/x86_64-linux-gnu/perl-base /usr/lib/x86_64-linux-gnu/perl/5.32 /usr/share/perl/5.32 /usr/local/lib/site_perl) at /usr/share/perl5/Debconf/FrontEnd/Readline.pm line 7.)
debconf: falling back to frontend: Teletype
Updating certificates in /etc/ssl/certs...
129 added, 0 removed; done.
Setting up libjs-sphinxdoc (3.4.3-2) ...
Setting up libpython3.9-stdlib:amd64 (3.9.2-1) ...
Setting up libpython3-stdlib:amd64 (3.9.2-3) ...
Setting up python3.9 (3.9.2-1) ...
Setting up python3 (3.9.2-3) ...
running python rtupdate hooks for python3.9...
running python post-rtupdate hooks for python3.9...
Setting up python3-six (1.16.0-2) ...
Setting up python3-typing-extensions (3.7.4.3-1) ...
Setting up python3-nassl (4.0.0-0kali2) ...
Setting up python3-cffi-backend:amd64 (1.14.6-1) ...
Setting up python3-pkg-resources (52.0.0-4) ...
Setting up python3-tls-parser (1.2.2-0kali1) ...
Setting up python3-cryptography (3.3.2-1) ...
Setting up sslyze (4.1.0-0kali1) ...
Processing triggers for libc-bin (2.31-12) ...
Processing triggers for ca-certificates (20210119) ...
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.

┌──(root�8a59017fe629)-[/mnt]
└─#

┌──(root�8a59017fe629)-[/mnt]
└─# sslyze
  Command line error: No targets to scan.
  Use -h for help.

┌──(root�8a59017fe629)-[/mnt]
└─#

┌──(root�8a59017fe629)-[/mnt]
└─# dpkg -l | grep sslyze
ii sslyze 4.1.0-0kali1 all Fast and full-featured SSL scanner

┌──(root�8a59017fe629)-[/mnt]
└─#
```
(0015037)
g0tmi1k   
2021-08-27 11:11   
Please could you provide more details of the issue
(0015045)
LeeRock   
2021-08-27 13:49   
Same problem persists after running you command.

root@kali:~# apt update && apt install -yqq sslyze
Ign:1 https://packages.microsoft.com/debian/10/prod buster InRelease
Hit:2 http://kali.download/kali kali-rolling InRelease
Ign:1 https://packages.microsoft.com/debian/10/prod buster InRelease
Ign:1 https://packages.microsoft.com/debian/10/prod buster InRelease
Err:1 https://packages.microsoft.com/debian/10/prod buster InRelease
  Temporary failure resolving 'packages.microsoft.com'
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
28 packages can be upgraded. Run 'apt list --upgradable' to see them.
W: Failed to fetch https://packages.microsoft.com/debian/10/prod/dists/buster/InRelease Temporary failure resolving 'packages.microsoft.com'
W: Some index files failed to download. They have been ignored, or old ones used instead.
sslyze is already the newest version (4.1.0-0kali1).
0 upgraded, 0 newly installed, 0 to remove and 28 not upgraded.

root@kali:~# sslyze -h
Traceback (most recent call last):
  File "/usr/bin/sslyze", line 33, in <module>
    sys.exit(load_entry_point('sslyze==4.1.0', 'console_scripts', 'sslyze')())
  File "/usr/bin/sslyze", line 25, in importlib_load_entry_point
    return next(matches).load()
  File "/usr/lib/python3.9/importlib/metadata.py", line 77, in load
    module = import_module(match.group('module'))
  File "/usr/lib/python3.9/importlib/__init__.py", line 127, in import_module
    return _bootstrap._gcd_import(name[level:], package, level)
  File "<frozen importlib._bootstrap>", line 1030, in _gcd_import
  File "<frozen importlib._bootstrap>", line 1007, in _find_and_load
  File "<frozen importlib._bootstrap>", line 972, in _find_and_load_unlocked
  File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed
  File "<frozen importlib._bootstrap>", line 1030, in _gcd_import
  File "<frozen importlib._bootstrap>", line 1007, in _find_and_load
  File "<frozen importlib._bootstrap>", line 986, in _find_and_load_unlocked
  File "<frozen importlib._bootstrap>", line 680, in _load_unlocked
  File "<frozen importlib._bootstrap_external>", line 790, in exec_module
  File "<frozen importlib._bootstrap>", line 228, in _call_with_frames_removed
  File "/usr/lib/python3/dist-packages/sslyze/__init__.py", line 25, in <module>
    from sslyze.plugins.scan_commands import ScanCommand, ScanCommandType
  File "/usr/lib/python3/dist-packages/sslyze/plugins/scan_commands.py", line 12, in <module>
    from sslyze.plugins.certificate_info.implementation import CertificateInfoImplementation
  File "/usr/lib/python3/dist-packages/sslyze/plugins/certificate_info/implementation.py", line 8, in <module>
    from sslyze.plugins.certificate_info._cert_chain_analyzer import (
  File "/usr/lib/python3/dist-packages/sslyze/plugins/certificate_info/_cert_chain_analyzer.py", line 11, in <module>
    from cryptography.x509.ocsp import load_der_ocsp_response, OCSPResponseStatus, OCSPResponse
ModuleNotFoundError: No module named 'cryptography.x509.ocsp'
(0015069)
arnaudr   
2021-09-02 06:39   
I see in your logs:

 0 upgraded, 0 newly installed, 0 to remove and 28 not upgraded.

Can you try to upgrade your system? Run " apt update && apt -y full-upgrade ". Post the output here please!
(0015077)
LeeRock   
2021-09-02 13:49   
Fixed now, thanks!

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7299 [Kali Linux] Kali Package Bug minor always 2021-08-28 09:57 2021-09-01 09:22
Reporter: saberzaid Platform:  
Assigned To: OS:  
Priority: high OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: burpsuite wont start from the main manu
Description: hello

burpsuite wont start from the main manu

so i have to run it manual from the terminal by typing burpsuite

this happens after i fully apt update and upgrade my kali

thanks
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015052)
j_jito   
2021-08-28 11:16   
Change the folliwing in /usr/share/applications/burpsuite.desktop:

FROM
Exec=sh -c "java -jar /usr/bin/burpsuite"

TO
Exec=burpsuite

It should work like this
(0015062)
arnaudr   
2021-09-01 09:21   
Duplicate, see https://bugs.kali.org/view.php?id=7302. Closing here.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7302 [Kali Linux] General Bug major always 2021-08-31 10:21 2021-08-31 16:44
Reporter: user-system Platform:  
Assigned To: sbrun OS:  
Priority: immediate OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: BurpSuit Does not open
Description: Hello and Respect
Good Time
after this command
sudo apt update && sudo apt upgrade -y
or
sudo apt update -y
or
 sudo apt upgrade -y

when i click burpsuit icon it does not open and not just happen! even an error!
my java version is :
openjdk version "11.0.12" 2021-07-20
OpenJDK Runtime Environment (build 11.0.12+7-post-Debian-2)
OpenJDK 64-Bit Server VM (build 11.0.12+7-post-Debian-2, mixed mode, sharing)
-------------------------------------------------------------
and by the way before the update or upgrade burpsuit launch well with no problem almost.
so help and guide me if you know about this solution.
Thanks and Good Time
Linux For Ever! ;)
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015058)
sbrun   
2021-08-31 16:44   
Thanks for the report.

It's fixed in kali-menu version 2021.3.3. This package will be available in a few hours.
while waiting for the fix you can run burpsuite in a terminal with the command "burpsuite"

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7248 [Kali Linux] Queued Tool Addition minor N/A 2021-06-30 20:05 2021-08-31 10:06
Reporter: tonyg73 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: PSGraphQL PowerShell module - allows for testing GraphQL endpoints
Description: [Name] - PSGraphQL
 

[Version] - What version of the tool should be added?

        Version 1.1.5
 

[Homepage] - Where can the tool be found online? Where to go to get more information?

                 https://github.com/anthonyg-1/PSGraphQL
             https://www.powershellgallery.com/packages/PSGraphQL/1.1.5
                    

[Download] - Where to go to get the tool? either a download page or a link to the latest version

             Can be installed from the PowerShell Gallery by executing the following command from pwsh:

             Install-Module -Name PSGraphQL -Repository PSGallery -RequiredVersion 1.1.5
            
             Links:
             https://github.com/anthonyg-1/PSGraphQL
         https://www.powershellgallery.com/packages/PSGraphQL/1.1.5
 

[Author] - Who made the tool?
                   Anthony Guimelli
           https://www.linkedin.com/in/anthony-guimelli-cissp-867b0918a/

[Licence] - How is the software distributed? What conditions does it come with?

            The software is distributed via the PowerShell Gallery and/or direct download from the module's github repo. MIT license applies: https://github.com/anthonyg-1/PSGraphQL/blob/main/LICENSE

 

[Description] - What is the tool about? What does it do?

                PSGraphQL contains a single PowerShell function, Invoke-GraphQLQuery (aliased as ‘gql’) that allows a tester to perform queries and mutations (create, update, delete) operations against any GraphQL service. Based on that, a myriad of tests can be written using Invoke-GraphQLQuery to validate the security of a GraphQL endpoint including, but not limited to:

    1. Deep recursion attack
    2. Batch attacks
    3. Introspection/enumeration
    4. SQL injection
    5. Command Injection
    6. Authorization attacks

Given that PowerShell is an object-oriented shell, Invoke-GraphQLQuery returns objects by default. This affords the user easy parsing of results. If one wishes for serialized (JSON) results, the -Raw parameter changes the return type from object to string and the results can be piped to grep or whatever other string parsing utility.

[Dependencies] - What is needed for the tool to work?

PowerShell 5.1 or above. Since Kali Linux comes with PowerShell 7.1.3, this will suffice. This module was developed on PowerShell 7.1.0 on Ubuntu 18.04 and tested on Ubuntu 20.04, Kali Linux 2021.1, Windows 10 and MacOS.

[Similar tools] - What other tools are out there?

Burp has a GraphQL plugin and Python has a few GraphQL clients. This is the only PowerShell module in the PowerShell Gallery that functions as a generic GraphQL client. Also I've yet to find another object-oriented CLI GraphQL client like this one.

[Activity] - When did the project start? Is is still actively being deployed?

                   This project started on 3/2021 and is being actively deployed.
 

[How to install] - How do you compile it? Note, using source code to acquire (e.g. git clone/svn checkout) can’t be used - Also downloading from the head. Please use a “tag” or “release” version.

This is a PowerShell module written in 100% PowerShell. To that end, compilation is not necessary. To obtain and use the module type the following from PowerShell in Kali Linux:

Install-Module -Name PSGraphQL -Repository PSGallery -RequiredVersion 1.1.5

 

[How to use] - What are some basic commands/functions to demonstrate it?

Demonstration of Invoke-GraphQLQuery can be found in the "Examples" and "Damn Vulnerable GraphQL Application Solutions" sections in the Readme here: https://github.com/anthonyg-1/PSGraphQL

If needed I can copy them here but the formatting and clarity will be lost compared to what is shown in the above markdown.

[Packaged] - Is the tool already packaged for Debian?

This tool is packaged for any system running PowerShell 5.1 and above.
Steps To Reproduce: n/a
Additional Information: I would be glad to demonstrate the module and answer any questions if needed.
Attached Files:
Notes
(0015025)
tonyg73   
2021-08-24 15:28   
Latest release version is 1.1.6. Fixes a JSON depth deserialization issue.

Can be found here: https://www.powershellgallery.com/packages/PSGraphQL/1.1.6

More info: https://github.com/anthonyg-1/PSGraphQL
(0015055)
g0tmi1k   
2021-08-31 10:06   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7286 [Kali Linux] Queued Tool Addition minor have not tried 2021-08-17 17:01 2021-08-31 10:05
Reporter: steev Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets
Description: - [Name] - DorkScout
- [Version] - 1.0
- [Homepage] - https://r4ygm.github.io/dorkscout/
- [Download] - https://github.com/R4yGM/dorkscout
- [Author] - r4ygm
- [License] - Apache 2.0 License
- [Description] - Golang tool to automate google dork scan against the entiere internet or specific targets
- [Dependencies] - golang
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015054)
g0tmi1k   
2021-08-31 10:05   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7301 [Kali Linux] Queued Tool Addition minor have not tried 2021-08-31 10:03 2021-08-31 10:05
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: DNSTake - A fast tool to check missing hosted DNS zones that can lead to subdomain takeover
Description: [Name] - DNSTake
[Version] - v0.01
[Homepage] - https://github.com/pwnesia/dnstake
[Download] - https://github.com/pwnesia/dnstake/tags
[Author] - Pwnesia
[License] - MIT
[Description] - A fast tool to check missing hosted DNS zones that can lead to subdomain takeover

DNS takeover vulnerabilities occur when a subdomain (subdomain.example.com) or domain has its authoritative nameserver set to a provider (e.g. AWS Route 53, Akamai, Microsoft Azure, etc.) but the hosted zone has been removed or deleted. Consequently, when making a request for DNS records the server responds with a SERVFAIL error. This allows an attacker to create the missing hosted zone on the service that was being used and thus control all DNS records for that (sub)domain.¹
[Dependencies] - go
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015053)
g0tmi1k   
2021-08-31 10:04   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7280 [Kali Linux] Kali Package Bug minor always 2021-08-10 07:47 2021-08-27 12:38
Reporter: r1y4d Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Glibc cannot be installed or upgrade
Description: Whenever i m trying to upgrade there is a error

ERROR: Your kernel version indicates a revision number
of 255 or greater. Glibc has a number of built in assumptions that this revision number is less than 255. If you\'ve built your own kernel, please make sure that any custom version numbers are appended to the upstream kernel number with a dash or some other delimiter.

My device is an Android ARM64 device.
Kernel version 4.4.277
I have attached a snapshot
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot_20210810-122538_NetHunter_Terminal.png (312,761 bytes) 2021-08-10 07:47
https://bugs.kali.org/file_download.php?file_id=2132&type=bug
Notes
(0015038)
re4son   
2021-08-27 11:16   
Haven't seen that before. What's your device, image, and kernel version?
(0015039)
r1y4d   
2021-08-27 11:45   
I am using realme 2 pro, Android 10, kernel version is now 4.4.273-lineageos ,Architecture (AARCH64/ARM64 ). seems like the issue is related to kernel version or revision number i tried with an custom kernel which is 4.4.254 and the issue is gone.
(0015040)
re4son   
2021-08-27 11:52   
That's correct.
Both, the PATCHLEVEL= and SUBLEVEL= numbers are hardcoded as as 8-bits in both kernel source and userspace ABI, i.e. they must be within 0-255

Hope that helps
(0015041)
r1y4d   
2021-08-27 12:15   
can't do that because Lineage is officially maintained by their developer. thanks for the help
(0015042)
r1y4d   
2021-08-27 12:21   
and aosp kernels are also getting same type of revision number which is more than 255!! so i think the packages should be update their dependency too
(0015043)
re4son   
2021-08-27 12:29   
That would require to change the entire linux eco system. Easier to compile kernels correctly according to specs.
Do you have any contact details for that kernel. I can let the author know.
(0015044)
re4son   
2021-08-27 12:38   
fyi, here's a recent discussion on the kernel mailing list:
https://lore.kernel.org/lkml/7pR0YCctzN9phpuEChlL7_SS6auHOM80bZBcGBTZPuMkc6XjKw7HUXf9vZUPi-IaV2gTtsRVXgywQbja8xpzjGRDGWJsVYSGQN5sNuX1yaQ=@protonmail.com/T/

As you can see, the issue is so wide spread throughout user space that it is easier for the kernel devs to just stick with 255 as the upper limit. Fyi, none of the affected packages are maintained by us so changes would have to be made upstream.

Android apps are probably not affected by this at all, that's why the LineageOS people may not know about the limitations. Might be easier to just recompile the kernel.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6200 [Kali Linux] Kali Websites & Docs minor always 2020-03-19 07:32 2021-08-25 08:22
Reporter: maltfield Platform:  
Assigned To: daniruiz OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: no change required  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: No link to SHA256SUM.gpg on download page
Description: Please add an html anchor link to the 'SHA256SUM.gpg' file somewhere on the downloads page on the Kali Linux website.

This download page:

 * https://www.kali.org/downloads/

Has no link anywhere to the 'SHA256SUM.gpg' file:

 * https://cdimage.kali.org/kali-2020.1/SHA256SUMS.gpg

In fact, it doesn't even have a link to the equally necessary 'SHA256SUM' file:

 * https://cdimage.kali.org/kali-2020.1/SHA256SUMS

There appears to only be a link on that page to the SHA256SUM file for the weekly builds.

In fact, I recommend adding this in multiple places on the page to make it easy to find:

 1. For every row in the table, make the existing SHA256SUM value the text body of an anchor link to the SHA256SUM
 2. On a newline under every SHA256SUM link in [1], add an anchor link with the body "SHA256SUM.gpg" linking to https://cdimage.kali.org/kali-<release>/SHA256SUMS.gpg
 3. At the bottom in the "https://cdimage.kali.org/kali-2020.1/SHA256SUMS.gpg", turn the currently-bold text for "SHA256SUM" and "SHA256SUM.gpg" into anchor links that link to the corresponding files for the current release

Please update the Kali Linux downloads page to have at least one clear link to the SHA256SUM files and SHA256SUM.gpg files.
Steps To Reproduce:
Additional Information:
Attached Files: image.png (136,333 bytes) 2021-06-24 15:55
https://bugs.kali.org/file_download.php?file_id=2116&type=bug
png
Notes
(0014829)
daniruiz   
2021-06-24 08:11   
This is now fixed with the new get-kali page https://www.kali.org/get-kali/

https://www.kali.org/docs/introduction/download-images-securely/
(0014832)
maltfield   
2021-06-24 12:02   
Thanks for the updates! Great to see there's been some progress on this issue, but I'm afraid it's not quite complete yet.
(0014833)
maltfield   
2021-06-24 12:06   
This document is great!

 * https://www.kali.org/docs/introduction/download-images-securely/

But where is it linked-to in the new download page?

 * https://www.kali.org/get-kali/

In fact, where does the new download page link to the SHA256SUMS.gpg files at all?

To resolve this issue, please:

1. For each download type and release, provide a link to the corresponding .gpg file
2. Please put a link to the guide (https://www.kali.org/docs/introduction/download-images-securely/) somewhere on the download page (https://www.kali.org/get-kali/). I recommend putting a question-mark icon "(?)" as a link to this doc next to the link to the .gpg file link (see 0000001 above) for every release
(0014835)
daniruiz   
2021-06-24 15:55   
Under bare-metal downloads there's a link 'How to download Kali Linux images securely?' pointing to the documentation page I shared before.
I wouldn't include the information about the SHA256SUMS.gpg files in that page as it belongs to the documentation

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7289 [Kali Linux] Kali Package Bug minor unable to reproduce 2021-08-20 15:47 2021-08-24 09:22
Reporter: nimitz Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: gvm-check-setup script: line 352: [: too many arguments
Description: I installed openvas for the first time, however, I have hit a wall and am unable to start gvm initially it was the database error that was saying

ERROR: The default PostgreSQL version is not 13 required by libgvmd

I managed to fix the issue with the following solution

sudo nano /etc/postgresql/13/main/postgresql.conf and change the port to 5432.
sudo nano /etc/postgresql/12/main/postgresql.conf and change the port to 5433 (or any other port which is free).
sudo systemctl restart postgresql

However the problem persists, when I

gvm-check-setup
I get the error message saying:

ERROR: No users found. You need to create at least one user to log in.
FIX: create a user by running ‘sudo runuser -u _gvm – gvmd --create-user= --password=’

ERROR: Your GVM-21.4.2 installation is not yet complete!

Please follow the instructions marked with FIX above and run this
script again.

Steps To Reproduce: Please install openvas normally and follow the instructions to change postgresql ports as I have explained in the description
Additional Information: I attached is a screenshot of the of the error messages when executing "sudo gvm-start" and "sudo gvm-check-setup"
Attached Files: Screen Shot 2021-08-20 at 3.25.44 PM.png (843,541 bytes) 2021-08-20 15:47
https://bugs.kali.org/file_download.php?file_id=2135&type=bug
Notes
(0015022)
sbrun   
2021-08-24 09:22   
You should not change the postgresql port by changing the /etc/postgresql/*/main/postgresql.conf files. The fix indicates by the gvm-check-setup script (and by the gvm-setup script) is the correct one:
use pg_upgradecluster to fix this. (we can not automate the clusters upgrade)
FYI we are working with GVM developers to avoid the issue with the PostgreSQL version for the next GVM releases.

It's weird you didn't have the issue when you ran 'gvm-setup'. It checks the postrgresql installation too. What command did you run before gvm-check-setup?
On a fresh install you need to run 'gvm-setup' first and 'gvm-check-setup' after. See /usr/share/doc/gvm/README.Debian

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7287 [Kali Linux] Tool Upgrade Request minor always 2021-08-18 15:57 2021-08-24 07:22
Reporter: Mister_X Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: Freeradius 3.0.23
Description: The patch for Freeradius to convert it to Freeradius-WPE has been updated for version 3.0.23.

URL: https://github.com/aircrack-ng/aircrack-ng/tree/master/patches/wpe/freeradius-wpe

Same installation as before. Patch name has changed to reflect version.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015020)
sbrun   
2021-08-24 07:22   
version 3.0.23+dfsg-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7290 [Kali Linux] Tool Upgrade Request minor have not tried 2021-08-21 02:14 2021-08-24 07:22
Reporter: epi Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: Upgrade feroxbuster to version 2.3.3
Description: Good evening!

Respectfully requesting an upgrade of feroxbuster to version 2.3.3.

https://github.com/epi052/feroxbuster/

Thanks in advance for your help!
epi
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0015019)
sbrun   
2021-08-24 07:22   
version 2.3.3-0kali1is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7279 [Kali Linux] Kali Package Bug minor always 2021-08-08 11:04 2021-08-23 12:20
Reporter: vanguard Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: gvm - script "gvm-check-setup" version problem
Description: Dear maintrainers,

I believe, there is a little bug at Step 6 in the script "gvm-check-setup" of package gvm.

Please take a look at the last output:

----- snip -------------------
....
....
....

        OK: At least one user exists.
Step 6: Checking Greenbone Security Assistant (GSA) ...
Oops, secure memory pool already initialized
        ERROR: Greenbone Security Assistant too old or too new: 21.4.1~dev1
        FIX: Please install Greenbone Security Assistant >= 21.04.

 ERROR: Your GVM-21.4.1 installation is not yet complete!

Please follow the instructions marked with FIX above and run this

--------- snap ---------------

As you see, I have installed version 21.4, which is (as recommended) higher or equal than 21.04 .
If I am not wrong, this should work.

dpkg -s greenbone-security-assistant | grep Version
Version: 21.4.1-0kali1

Maybe I am not correctly understanding the versionary structure, but 21.4. shoud be the same as 21.04, isn't it?

A workaround is, just to comment Step 6 out, when you are sure, you have installed the correct version of greenbone-security-assistant.

Just a minor issue, but maybe you might want to fix it though.

Best regards

Hans



Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014997)
arnaudr   
2021-08-12 18:09   
See https://community.greenbone.net/t/gsa-is-too-old-or-too-new-error/9558/8. Can you try it and tell me if it solves the issue?
(0014999)
vanguard   
2021-08-12 21:44   
This worked. Already thought, this is just a typo and in the meantime, found already the solution. However, if a solution is working for me, this does not mean,
it will work for others.

So it is best, if the change in the script will be added in the next version, so everybody can easily update.

I suggest, if you just fix this little typo and build a new package, this little issue is solved and can safely be closed.

For those, who just do not want to wait, here is the fix from the community blog:

sed -i"" 's/GSA_MAJOR="21.04"/GSA_MAJOR="21.4"/g' $(which gvm-check-setup)

Thanks for the fast help!

Best regards

Hans
(0015015)
sbrun   
2021-08-23 12:20   
fixed in gvm version 21.4.2.0~0kali1

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7264 [Kali Linux] Kali Package Improvement minor always 2021-07-20 23:25 2021-08-19 16:35
Reporter: luzat Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: kali-dev  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: kali-linux-headless conflicts with plocate 1.1.8-2
Description: kali-linux-headless 2021.3.0 and in turn other metapackages depend on mlocate. Unfortunately, the often much faster plocate added a "Breaks: mlocate" somewhere after 1.1.7-1, which makes it uninstallable on most Kali systems.

I am not sure if the "Breaks" is correct, but if it is changing the dependency of kali-linux-headless to "mlocate | plocate" should work if no package defines of some specific behavior that mlocate offers.
Steps To Reproduce: Try

apt install plocate kali-linux-headless

on kali-rolling.
Additional Information:
Attached Files:
Notes
(0015001)
sbrun   
2021-08-13 07:11   
Confirmed:

plocate now breaks mlocate (recent change in Debian)

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976321
(0015003)
sbrun   
2021-08-16 07:40   
fixed in the kali-meta package version 2021.3.2

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5270 [Kali Linux] General Bug major always 2019-02-22 10:10 2021-08-16 18:19
Reporter: freakyclown Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2019.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2019.1  
    Target Version:  
Summary: Fresh Installation on Vmware Fusion from ISO freezes or fails
Description: Any of the latest 2019.1 ISO's all appear to have the same issue. When freshly downloaded (SHA256 matched) and used in VMware Fusion Version 10.1.5 (10950653) or VMware Fusion Version 10.1.4 will boot and then hang on the first screen of the GUI installation screen. The text install will go further but still fail on a mounting of the cd-rom drivers. There is no obvious indication to me why this is happening however the clue might be in the fact the text install of the 32bit version does appear at least to install fully, but in my experiments it failed to reboot and would not work.

Steps To Reproduce: 1. Download fresh (any) iso from the site
2. create new VM and assign it decent settings of ram and cpu etc and point to the new iso
3. boot the vm
4. select graphic install
5. observe neither mouse nor keyboard functions in order to select further steps.


1. Download fresh (any) iso from the site
2. create new VM and assign it decent settings of ram and cpu etc and point to the new iso
3. boot the vm
4. select install
5. observe that keyboard function works to confirm steps, however it will fail after a few asking to install cd-rom drivers

1. Download fresh 32bit iso from the site
2. create new VM and assign it decent settings of ram and cpu etc and point to the new iso
3. boot the vm
4. select gui install
5. observe that mouse fails to function but keyboard function works to confirm steps, installation appears successful, and will not reboot.
Additional Information: My versions tested
OSX - Mojave 10.14.2

Vmware Fusion 10.1.4
Vmware Fusion 10.1.5

ISOs:
Kali Linux 64 Bit HTTP | Torrent 3.2G 2019.1 5596f2b5da66a45a6e6d14510cedc3fc20980f21d01c18059809ef651e6726dd
Kali Linux 32 Bit HTTP | Torrent 3.3G 2019.1 da9f4a9ae7be7f35ca924160104944e03935a2e0e4c422e5e463ba70683d7c77
Kali Linux Xfce 64 Bit HTTP | Torrent 3.0G 2019.1 f86b3c6cc98af2d2d86e829fb8a3b08b4d5c4f376d6b8b1e108c58fcfdb46229

I also tried the same steps with
kali-linux-2018.4-amd64.iso 2018-10-16 16:08 2.9G
kali-linux-light-2018.4-amd64.iso 2018-10-16 17:05 867M

this issue does NOT appear in 2018.4
Attached Files: 02.PNG (133,759 bytes) 2019-02-26 03:43
https://bugs.kali.org/file_download.php?file_id=1302&type=bug
png

dmesg.zip (37,491 bytes) 2019-02-26 09:54
https://bugs.kali.org/file_download.php?file_id=1303&type=bug
Notes
(0010352)
freakyclown   
2019-02-22 10:14   
After expressing this issue on twitter a bunch of people jumped in with other helpful information:

Dist-ugrade appears to work fine so going from 2018.4 to 2019.1 works ok.
"Installed on Win10 with VMware Workstation Pro 14.1.5 build-10950780 without issue."
"I had the mate version do the same thing on GUI install. Text install worked"
"I tried installing on Workstation Pro 15 and either got unresponsive GUI or unable to detect the ISO to mount during CLI install. That was 64 bit. Haven't tried 32 bit."
(0010353)
muts   
2019-02-22 13:53   
I suspect the issue to be the version of VMware used. If you were to try to update your fusion version to 11.0.x (what we use for testing), it should work. Would anyone be able to test this?
(0010355)
Gamb1t   
2019-02-22 20:37   
Testing on VMware Fusion 10.1.2 with Mojave version 10.14 I experience the same issues. When I use the updated VMware Fusion, 11.0.2, I experience no bugs of that sort. I did not test with the 2018.4 as I already have a VM of that version.
(0010356)
Gamb1t   
2019-02-22 20:48   
Correction, I messed up and didn't select the right iso on the 11.0.2 test. On an 11.0.2 VMware Fusion version with Mojave 10.14.1 I am unable to use the mouse during graphical install of the 2019.1 64 Bit iso.
(0010365)
aschenix   
2019-02-26 03:43   
I have this same exact problem. This is far as I get.
(0010366)
rhertzog   
2019-02-26 09:12   
@Gamb1t Can you reproduce the same issue with this Debian ISO ? https://cdimage.debian.org/cdimage/buster_di_alpha5/amd64/iso-cd/debian-buster-DI-alpha5-amd64-netinst.iso
(0010367)
rhertzog   
2019-02-26 09:53   
I tried to reproduce the issue on a computer with Windows 10 and VMWare Workstation Pro 12.5.9.

On my first try, I was not able to reproduce the problem with the mouse and the keyboard. Neither with the main Kali 2019.1 image nor with the Debian Buster Alpha 5 image (each time on amd64).

On my second try with the Kali image, the mouse was not working but the keyboard was working.

On my third try with the Kali image, the mouse was again working but the installer failed to identify the network card (I had to go back and let it retry the auto-detection so that it works).

When I compare the "dmesg" output of both cases, I get this interesting output:
$ diff -u kali-{failed,working}-mouse-dmesg-no-timing
--- kali-failed-mouse-dmesg-no-timing 2019-02-26 10:41:53.669165986 +0100
+++ kali-working-mouse-dmesg-no-timing 2019-02-26 10:42:05.077218497 +0100
@@ -1279,6 +1279,8 @@
  hub 2-0:1.0: USB hub found
  hub 2-0:1.0: 2 ports detected
  mptbase: ioc0: Initiating bringup
+ input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3
+ input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input2
  libata version 3.00 loaded.
  ata_piix 0000:00:07.1: version 2.13
  scsi host0: ata_piix
@@ -1301,16 +1303,16 @@
  usb 2-1: Product: VMware Virtual USB Mouse
  usb 2-1: Manufacturer: VMware
  hidraw: raw HID events driver (C) Jiri Kosina
- usbcore: registered new interface driver usbhid
- usbhid: USB HID core driver
  scsi 2:0:0:0: Direct-Access VMware, VMware Virtual S 1.0 PQ: 0 ANSI: 2
  scsi target2:0:0: Beginning Domain Validation
+ random: fast init done
  scsi target2:0:0: Domain Validation skipping write tests
  scsi target2:0:0: Ending Domain Validation
  scsi target2:0:0: FAST-40 WIDE SCSI 80.0 MB/s ST (25 ns, offset 127)
- input: VMware VMware Virtual USB Mouse as /devices/pci0000:00/0000:00:11.0/0000:02:00.0/usb2/2-1/2-1:1.0/0003:0E0F:0003.0001/input/input2
+ usbcore: registered new interface driver usbhid
+ usbhid: USB HID core driver
+ input: VMware VMware Virtual USB Mouse as /devices/pci0000:00/0000:00:11.0/0000:02:00.0/usb2/2-1/2-1:1.0/0003:0E0F:0003.0001/input/input4
  on usb-0000:02:00.0-1/input0
- random: fast init done
  41943040 512-byte logical blocks: (21.5 GB/20.0 GiB)
  Write Protect is off
  Mode Sense: 61 00 00 00

It looks like that when it works it detects a PS/2 mouse and a USB mouse, and when it doesn't work in only detects an USB mouse. I'm attaching both dmesg output.
(0010368)
freakyclown   
2019-02-26 10:09   
Well this is good news (or bad) I guess, as the original theory was that this was a Vmware Fusion issue. Now the behaviour has been spotted on mac and windows I feel a bit vindicated at least.
(0010369)
rhertzog   
2019-02-26 10:27   
Despite multiple tries, I was not able to reproduce the problem (on Win 10 with VMWare WS Pro) with the Debian Buster Alpha 5 ISO image. And yet the amount of difference with the Kali image is not big... they have been created about at the same time. The Debian Buster one uses Linux 4.19.12, the Kali one 4.19.13. They have the same version of udev/systemd I think (240-4).
(0010370)
rhertzog   
2019-02-26 10:49   
I then tried with a daily build of Debian Installer: http://cdimage.debian.org/cdimage/daily-builds/daily/20190226-1/amd64/iso-cd/debian-testing-amd64-netinst.iso
This one uses Linux 4.19.16.

I was also not able to reproduce the problem with Windows 10 and VMWare Workstation Pro 12.5.9. I'm keen to know the result for those 2 ISOs on VMWare Fusion. Despite the fact, that I can reproduce the non-working mouse on Windows, there seems to be a big difference in terms how often the problem triggers (i.e. I can work around the issue by rebooting and doing another try) and in terms of impact as well (for me it's only the mouse, the keyboard was working fine).
(0010371)
rhertzog   
2019-02-26 10:59   
Coming back to the problematic case where the mouse is not working, since I have the keyboard that works I can switch to a text console (CTRL+ALT+F2) and typed "lsmod" and I saw that the "psmouse" module was not loaded (whereas it was correctly loaded in the working case). So a simple work-around is to run "modprobe psmouse" in that console and I can switch back to the graphical console (CTRL+ALT+F5) and there the mouse works now.

Now we should try to understand why it doesn't get loaded but I think that my first try will be to build a new image with a newer kernel image (4.19.20 that we have available in kali-experimental) and see if it's enough to solve the problem.
(0010372)
Gamb1t   
2019-02-26 17:12   
I tested out both Debian ISOs and did not experience the problem on either of them even after multiple attempts. I can also confirm that the "modprobe psmouse" re-enables the mouse and it works just fine after that.
(0010379)
rhertzog   
2019-02-28 16:26   
So I tried with a new daily ISO (which now uses Linux 4.19.20) and I can no longer reproduce the problem.
http://archive.kali.org/kali-daily-images/

So now the question, do we want to regenerate the 2019.1 ISO images to include Linux 4.19.20 ?
(0010394)
g0tmi1k   
2019-03-05 17:05   
2019.1a is out to address this issue

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4406 [Kali Linux] Queued Tool Addition minor have not tried 2017-12-05 21:38 2021-08-13 13:03
Reporter: j_jito Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Radamsa - a general-purpose fuzzer
Description: Radamsa is a test case generator for robustness testing, a.k.a. a fuzzer. It is typically used to test how well a program can withstand malformed and potentially malicious inputs. It works by reading sample files of valid data and generating interestringly different outputs from them. The main selling points of radamsa are that it has already found a slew of bugs in programs that actually matter, it is easily scriptable and easy to get up and running.
Steps To Reproduce: git clone https://github.com/aoh/radamsa.git

cd radamsa

make && make install

radamsa -h

echo "HAL 9000" | radamsa
Additional Information: apt-get install gcc make git wget
Attached Files:
Notes
(0007691)
dookie   
2017-12-11 22:00   
This builds and runs well and would make a good addition. As part of the build, it downloads the following project, which will likely need to be packaged separately:

https://github.com/aoh/owl-lisp
(0008460)
g0tmi1k   
2018-01-29 15:12   
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

- [Name] - The name of the tool
- [Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
- [Homepage] - Where can the tool be found online? Where to go to get more information?
- [Download] - Where to go to get the tool?
- [Author] - Who made the tool?
- [Licence] - How is the software distributed? What conditions does it come with?
- [Description] - What is the tool about? What does it do?
- [Dependencies] - What is needed for the tool to work?
- [Similar tools] - What other tools are out there?
- [How to install] - How do you compile it?
- [How to use] - What are some basic commands/functions to demonstrate it?
(0012354)
g0tmi1k   
2020-02-25 14:01   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4472 [Kali Linux] Queued Tool Addition minor N/A 2018-01-12 12:53 2021-08-13 13:00
Reporter: coloboslexx Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: dirsearch - designed to brute force directories and files in webservers.
Description: Search showed that there were no related tickets, sorry if this tool was already discussed.

Please, add dirsearch (https://github.com/maurosoria/dirsearch) tool to Kali repos. This tool has a lot of pros over current similar tools in Kali repos:
- it is multithreaded comparing to dirb;
- it also supports file extensions;
- it has a progress bar comparing to gobuster allowing to estimate time and understand whether the tool is working or just not responding (met such situation several times with gobuster);
- it supports custom headers, cookies, user-agents, proxy, can follow redirects;
- it can create reports in user-friendly manner or in json (easy to parse to other tools/scripts).
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0007830)
dookie   
2018-01-18 20:45   
This tool works well and it works fast. It would make a good addition to the distro.
(0008381)
g0tmi1k   
2018-01-29 14:51   
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):

- [Name] - The name of the tool
- [Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag)
- [Homepage] - Where can the tool be found online? Where to go to get more information?
- [Download] - Where to go to get the tool?
- [Author] - Who made the tool?
- [Licence] - How is the software distributed? What conditions does it come with?
- [Description] - What is the tool about? What does it do?
- [Dependencies] - What is needed for the tool to work?
- [Similar tools] - What other tools are out there?
- [How to install] - How do you compile it?
- [How to use] - What are some basic commands/functions to demonstrate it?
(0008564)
coloboslexx   
2018-01-30 09:18   
- [Name] - dirsearch
- [Version] - Current Release: v0.3.8 (2017.07.25)
- [Homepage] - https://github.com/maurosoria/dirsearch
- [Download] - https://github.com/maurosoria/dirsearch
- [Author] - maurosoria
- [Licence] - GNU General Public License, version 2
- [Description] - dirsearch is a simple command line tool designed to brute force directories and files in websites.
- [Dependencies] - python3
- [Similar tools] - gobuster, dirb, dirbuster
- [How to install] - no need to compile
- [How to use] - The basic usage for dirsearch is as follows:
$ python3 dirsearch.py -u https://secure.site.com -e php -w db/dirbuster/directory-list-2.3-medium.txt -x 403
$ python3 dirs3arch.py -u http://xyz.com/ -e php,html -t 5 -w db/dirbuster/directory-list-2.3-medium.txt -x 403 2>&1 | tee results1.txt
(0008649)
maurosoria   
2018-02-10 16:25   
I want to add some other basic commands:


Recursirvely scan php in /, /admin/ and /includes/

python3 dirsearch.py -u http://example.com -e php --scan-subdir ",admin,includes"

Using delays:
python3 dirsearch.py -u http://example.com -e php --delay 0.2

Settings Cookies, random User Agents, headers and Proxies:

python3 dirsearch.py -u http://example.com -e php --cookie "PHPSESSID=123456" --random-agents --header "X-Forwarded-For: 127.0.0.1" --headers "admin=1" --http-proxy "http://127.0.0.1:8080"








Here is the --help :


Usage: dirsearch [-u|--url] target [-e|--extensions] extensions [options]

Options:
  -h, --help show this help message and exit

  Mandatory:
    -u URL, --url=URL URL target
    -L URLLIST, --url-list=URLLIST
                        URL list target
    -e EXTENSIONS, --extensions=EXTENSIONS
                        Extension list separated by comma (Example: php,asp)

  Dictionary Settings:
    -w WORDLIST, --wordlist=WORDLIST
    -l, --lowercase
    -f, --force-extensions
                        Force extensions for every wordlist entry (like in
                        DirBuster)

  General Settings:
    -s DELAY, --delay=DELAY
                        Delay between requests (float number)
    -r, --recursive Bruteforce recursively
    --suppress-empty, --suppress-empty
    --scan-subdir=SCANSUBDIRS, --scan-subdirs=SCANSUBDIRS
                        Scan subdirectories of the given -u|--url (separated
                        by comma)
    --exclude-subdir=EXCLUDESUBDIRS, --exclude-subdirs=EXCLUDESUBDIRS
                        Exclude the following subdirectories during recursive
                        scan (separated by comma)
    -t THREADSCOUNT, --threads=THREADSCOUNT
                        Number of Threads
    -x EXCLUDESTATUSCODES, --exclude-status=EXCLUDESTATUSCODES
                        Exclude status code, separated by comma (example: 301,
                        500)
    -c COOKIE, --cookie=COOKIE
    --ua=USERAGENT, --user-agent=USERAGENT
    -F, --follow-redirects
    -H HEADERS, --header=HEADERS
                        Headers to add (example: --header "Referer:
                        example.com" --header "User-Agent: IE"
    --random-agents, --random-user-agents

  Connection Settings:
    --timeout=TIMEOUT Connection timeout
    --ip=IP Resolve name to IP address
    --proxy=HTTPPROXY, --http-proxy=HTTPPROXY
                        Http Proxy (example: localhost:8080
    --max-retries=MAXRETRIES
    -b, --request-by-hostname
                        By default dirsearch will request by IP for speed.
                        This forces requests by hostname

  Reports:
    --simple-report=SIMPLEOUTPUTFILE
                        Only found paths
    --plain-text-report=PLAINTEXTOUTPUTFILE
                        Found paths with status codes
    --json-report=JSONOUTPUTFILE
(0008658)
g0tmi1k   
2018-02-12 09:44   
So what can this tool do that gobuster (https://github.com/OJ/gobuster) can't?
What makes it stand out?
(0008659)
coloboslexx   
2018-02-12 10:10   
Comparing to gobuster:
- it supports custom headers;
- it has recursive mode, even can scan only particular subdirs;
- it supports delays, custom timeouts;
- it has a progress bar comparing to gobuster allowing to estimate time and understand whether the tool is working or just not responding (met such situation several times with gobuster);
- it can create reports in user-friendly manner or in json (easy to parse to other tools/scripts).
(0012061)
g0tmi1k   
2020-02-10 13:37   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6898 [Kali Linux] Queued Tool Addition minor have not tried 2020-12-03 11:35 2021-08-13 12:59
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: DefectDojo - open-source application vulnerability correlation and security orchestration tool.
Description: [Name] - DefectDojo
[Version] - 1.10.2
[Homepage] - https://www.defectdojo.org/
[Download] - https://github.com/DefectDojo/django-DefectDojo/tags
[Author] - Greg Anderson, Aaron Weaver (@weavera), Matt Tesauro (@matt_tesauro)
[License] - BSD-3 ~ https://github.com/DefectDojo/django-DefectDojo/blob/master/LICENSE.md
[Description] - DefectDojo is an open-source application vulnerability correlation and security orchestration tool.

DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers. Consolidate your findings into one source of truth with DefectDojo.
[Dependencies] - Django ....lots ~ https://github.com/DefectDojo/django-DefectDojo/blob/master/requirements.txt
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014865)
g0tmi1k   
2021-06-26 07:26   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7098 [Kali Linux] Queued Tool Addition minor N/A 2021-03-13 12:23 2021-08-13 11:29
Reporter: Jayy001 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Search-That-Hash - Searches Hash APIs to crack your hash quickly
Description: Github:
https://github.com/HashPals/Search-That-Hash

* Auto-Type Identification - Uses Name-That-Hash to get accurate results on the type of the hash.
* Offline Mode - Will automatically run Hashcat if offline or cant find the plaintext in any of the Hash APIs.
* Fast - We've made STH to be as fast as possible.

Examples:
https://github.com/HashPals/Search-That-Hash/raw/main/Pictures/thm_speedrun.gif
https://github.com/HashPals/Search-That-Hash/raw/main/Pictures/hashcat.gif

We also have our own serverless API with over 40 million hash / plaintexts

TL;DR:
* GPLv3
* Install via PyPi with `pip3 install search-that-hash`, usage is `sth`.
* Pyproject.toml https://github.com/HashPals/Search-That-Hash/blob/main/pyproject.toml
* Setup.py https://github.com/HashPals/Name-That-Hash/blob/main/packages/setup.py
* Authors: Beesan, Jayy001
* Other similar tools: Hash-Buster (Outdated)
* Compute resources: very minimal, only requires an active internet connection for online APIs - If your running hashcat, then whatever resources hashcat normally uses.
* Maintained: Yes, I am an active open source maintainer so this tool shall remain maintained.

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014345)
Jayy001   
2021-03-13 12:24   
(Last edited: 2021-03-15 15:14)
(For some reason the serverless API part linked to another bug? Its meant to say ~ 40 mil hashes / plaintext)

(0014346)
Jayy001   
2021-03-13 12:25   
~* Forty
(0014349)
Jayy001   
2021-03-13 14:02   
You should also remove this tool - https://gitlab.com/kalilinux/packages/findmyhash (Very outdated, last updated 8 years ago)
(0014395)
g0tmi1k   
2021-03-26 13:28   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6140 [Kali Linux] Queued Tool Addition minor have not tried 2020-02-26 21:33 2021-08-13 11:29
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Description: [Name] - FudgeC2

[Version] - v0.5.0 (Goblin Alchemist)

[Homepage] - https://github.com/Ziconius/FudgeC2

[Download] - hhttps://github.com/Ziconius/FudgeC2/releases

[Author] - Kris

[License] - GNU General Public License v3.0~ https://github.com/Ziconius/FudgeC2/blob/master/LICENSE.txt

[Description] - FudgeC2 is a Powershell C2 platform designed to facilitate team collaboration and campaign timelining, released at BlackHat Arsenal USA 2019. This aims to help clients better understand red team activities by presenting them with more granular detail of adversarial techniques.

Built on Python3 with a web frontend, FudgeC2 aims to provide red team operators a simple interface in which to manage active implants across their campaigns.

[Dependencies] - python3 flask, flask_sqlalchemy, flask_login, bcrypt, requests

[Similar tools] - https://bugs.kali.org/view.php?id=6093

[Activity] - 9 Sep 2018 ~ Today
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0012425)
sbrun   
2020-03-17 16:30   
I uploaded the new package, version 0.5.0-0kali1
(0012497)
sbrun   
2020-03-20 09:21   
(Last edited: 2020-03-20 09:22)
version 0.5.0-0kali1 doesn't work correctly: message error 'unable to opendatabase file'
I will fix it.


View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4827 [Kali Linux] Queued Tool Addition minor have not tried 2018-06-28 19:40 2021-08-13 11:28
Reporter: kali-bugreport Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: openvas-smb for the OpenVAS framework
Description: While the main modules of the OpenVAS framework listed at http://openvas.org/install-source.html are included in Kali the following highly recommended module
is currently missing:

openvas-smb 1.0.3
https://github.com/greenbone/openvas-smb

This is required to communicate with Windows target hosts over WMI and SMB for
extended (mostly authenticated) tests.
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6143 [Kali Linux] Queued Tool Addition minor have not tried 2020-02-26 21:46 2021-08-13 11:28
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: merlin - cross-platform post-exploitation HTTP/2 Command & Control server and agent
Description: [Name] - Merlin

[Version] - v0.8.0.BETA

[Homepage] - https://github.com/Ne0nd0g/merlin

[Download] - https://github.com/Ne0nd0g/merlineleases

[Author] - Russel Van Tuyl

[License] - GNU General Public License v3.0 ~ https://github.com/Ne0nd0g/merlin/blob/master/LICENSE

[Description] - Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang

[Dependencies] - Go

[Similar tools] - https://bugs.kali.org/view.php?id=6093

[Activity] - Jan 6, 2017 ~ 20 Aug 2019
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6139 [Kali Linux] Queued Tool Addition minor have not tried 2020-02-26 21:29 2021-08-13 11:28
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Faction - C2 framework
Description: [Name] - Faction

[Version] - N/A

[Homepage] - https://www.factionc2.com/

[Download] - https://github.com/FactionC2/Faction/releases

[Author] - Jared Haight ~ https://github.com/FactionC2/Faction/graphs/contributors

[License] - BSD 3-Clause ~ https://github.com/FactionC2/Faction/blob/master/LICENSE

[Description] - Faction is a C2 framework for security professionals, providing an easy way to extend and interact with agents. It focuses on providing an easy, stable, and approachable platform for C2 communications through well documented REST and Socket.IO APIs.

[Dependencies] - ... Hell ~ https://github.com/FactionC2/Faction/blob/master/install.sh

[Similar tools] - https://bugs.kali.org/view.php?id=6093

[Activity] - Mar 1, 2019 ~ 21 Oct 2019
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5540 [Kali Linux] Queued Tool Addition minor have not tried 2019-06-13 08:14 2021-08-13 11:27
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: SharpShooter - Payload Generation Framework
Description: Homepage: https://github.com/mdsecactivebreach/SharpShooter
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0011420)
sbrun   
2019-11-28 14:01   
there is no license information
https://github.com/mdsecactivebreach/SharpShooter/issues/30
(0011814)
g0tmi1k   
2020-01-06 13:16   
@kali-team, please could this be packaged up.
@author, If you want to help the packaging process, you can check the documentation here ~ https://www.kali.org/docs/development/public-packaging

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
1842 [Kali Linux] Queued Tool Addition minor have not tried 2014-10-24 10:34 2021-08-13 11:27
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Frida v10.2.3 - Explore native apps on Windows, Mac, Linux, iOS and Android
Description: Name: Frida
Version: v10.2.3
Homepage: https://www.frida.re/docs/home/
Download: https://github.com/frida/frida/releases
Licence : wxWindows Library Licence, Version 3.1 ~ https://github.com/frida/frida/blob/master/COPYING
Description: Inject JavaScript to explore native apps on Windows, Mac, Linux, iOS and Android.
Steps To Reproduce:
Additional Information: ## So what is Frida, exactly?

It’s Greasemonkey for native apps, or, put in more technical terms, it’s a dynamic code instrumentation toolkit. It lets you inject snippets of JavaScript into native apps on Windows, Mac, Linux and iOS. Frida also provides you with some simple tools built on top of the Frida API. These can be used as-is, tweaked to your needs, or serve as examples of how to use the API.


## Why do I need this?

Great question. We’ll try to clarify with some use-cases:

* There’s this new hot app everybody’s so excited about, but it’s only available for iOS and you’d love to interop with it. You realize it’s relying on encrypted network protocols and tools like Wireshark just won’t cut it. You pick up Frida and use it for API tracing.
* You’re building a desktop app which has been deployed at a customer’s site. There’s a problem but the built-in logging code just isn’t enough. You need to send your customer a custom build with lots of expensive logging code. Then you realize you could just use Frida and build an application- specific tool that will add all the diagnostics you need, and in just a few lines of Python. No need to send the customer a new custom build - you just send the tool which will work on many versions of your app.
* You’d like to build a Wireshark on steroids with support for sniffing encrypted protocols. It could even manipulate function calls to fake network conditions that would otherwise require you to set up a test lab.
* Your in-house app could use some black-box tests without polluting your production code with logic only required for exotic testing.
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6565 [Kali Linux] Queued Tool Addition minor have not tried 2020-07-11 22:36 2021-08-12 13:57
Reporter: Mister_X Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: EAPHammer - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Description: - [Name] - EAPHammer
- [Version] - v1.12.1
- [Homepage] - https://github.com/s0lst1c3/eaphammer
- [Download] - https://github.com/s0lst1c3/eaphammer/releases/tag/v1.12.1
- [Author] - s0lst1c3
- [Licence] - GNU General Public License v3.0
- [Description] - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
- [Dependencies] - apache2 dnsmasq libssl-dev libnfnetlink-dev libnl-3-dev libnl-genl-3-dev libcurl4-openssl-dev zlib1g-dev libpcap-dev
- [Similar tools] - hostapd-wpe, freeradius-wpe, hostapd-mana
- [How to install] - See Quick start guide in https://github.com/s0lst1c3/eaphammer/blob/master/README.md
- [How to use] - Documentation can be found at https://github.com/s0lst1c3/eaphammer/wiki
To steal RADIUS credentials by executing an evil twin attack against an EAP network, use the --creds flag as shown below.

./eaphammer --bssid 1C:7E:E5:97:79:B1 \
 --essid Example \
 --channel 2 \
 --interface wlan0 \
 --auth wpa-eap \
 --creds
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013362)
g0tmi1k   
2020-09-01 21:35   
@kali-team, please could this be packaged up.
(0014993)
sbrun   
2021-08-12 13:57   
version 1.13.5+git20201214-0kali3 is now in kali

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7263 [Kali Linux] Queued Tool Addition minor have not tried 2021-07-19 05:45 2021-08-12 13:56
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: IntelOwl - analyze files, domains, IPs in multiple ways from a single API at scale
Description: [Name] - Intel Owl
[Version] - 2.4.2
[Homepage] - https://intelowl.readthedocs.io/
[Download] - https://github.com/intelowlproject/IntelOwl/tags
[Author] - Matteo Lodi & Eshaan Bansal
[License] - GNU Affero General Public License v3.0
[Description] - analyze files, domains, IPs in multiple ways from a single API at scale

Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale. It integrates a number of analyzers available online and is for everyone who needs a single point to query for info about a specific file or observable.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014992)
g0tmi1k   
2021-08-12 13:56   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6677 [Kali Linux] Kali Package Bug minor always 2020-08-24 18:49 2021-08-12 13:55
Reporter: tweeks Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: Autopsy GUI menu needs to launch with sudo (otherwise autopsy crashes)
Description: Currently.. (verified on v2020.02), selecting autopsy from the XFCE GUI menu, autopsy reporting UI running on http://localhost:9999/autopsy fails and web UI never works.



Steps To Reproduce: Click XFCE GUI menu, navigate to:
11 - Foresniscs / autopsy

Crashes attempting to start autopsy interface: "Can't open log ..." (attachment)
Additional Information: To fix...
Click on:
11 - Foresniscs / autopsy and right click to "edit application" (see attachment VACR_autopsy1.png )
Edit Command from:
/usr/share/kali-menu/exec-in-shell "autopsy"
to
/usr/share/kali-menu/exec-in-shell "sudo autopsy"

and save icon... Now works fine.
(last screen shot)
Attached Files: VACR_autopsy-localhost-error.png (186,627 bytes) 2020-08-24 18:49
https://bugs.kali.org/file_download.php?file_id=1867&type=bug
png

VACR_autopsy1.png (78,759 bytes) 2020-08-24 18:49
https://bugs.kali.org/file_download.php?file_id=1868&type=bug
png

VACR_autopsy-localhost-fixed.png (185,724 bytes) 2020-08-24 18:49
https://bugs.kali.org/file_download.php?file_id=1869&type=bug
png
Notes
(0014991)
sbrun   
2021-08-12 13:55   
thanks for the report. It will be fixed in kali-menu version 2021.3.0

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7257 [Kali Linux] Queued Tool Addition minor have not tried 2021-07-15 08:48 2021-08-12 13:55
Reporter: g0tmi1k Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: BruteShark - Network Analysis Tool
Description: [Name] - BruteShark
[Version] - v1.2.2
[Homepage] - https://github.com/odedshimon/BruteShark
[Download] - https://github.com/odedshimon/BruteShark/tags
[Author] - Oded Shimon
[License] - GNU General Public License v3.0
[Description] - BruteShark is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack.

The main goal of the project is to provide solution to security researchers and network administrators with the task of network traffic analysis while they try to identify weaknesses that can be used by a potential attacker to gain access to critical points on the network.
[Dependencies] -libpcap
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014990)
g0tmi1k   
2021-08-12 13:55   
@kali-team, please could this be packaged up.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6577 [Kali Linux] Queued Tool Addition minor always 2020-07-16 01:12 2021-08-10 15:22
Reporter: Mister_X Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: WPA Sycophant - Evil client portion of EAP relay attack
Description: - [Name] - wpa_sycophant
- [Version] - 1.0
- [Homepage] - https://github.com/sensepost/wpa_sycophant
- [Download] - https://github.com/sensepost/wpa_sycophant/releases/tag/v1.0
- [Author] - Cablethief, Sensepost
- [Licence] - https://github.com/sensepost/wpa_sycophant/blob/v1.0/README
- [Description] - Evil client portion of EAP relay attack
- [Dependencies] - hostapd-mana openssl
- [Similar tools] - hostapd-mana
- [How to install] -
cd wpa_supplicant
make
make install
# Rename wpa_supplicant to wpa_sycophant (AFAIK, no need for any other binary)
# Download https://raw.githubusercontent.com/sensepost/wpa_sycophant/master/wpa_sycophant.sh and replace it in the package (it fixes the cleanup), guessing in /usr/local/sbin
- [How to use] -
Create configuration file:
network={
  ssid="TestingEAP"
  # The SSID you would like to relay and authenticate against.
  scan_ssid=1
  key_mgmt=WPA-EAP
  # Do not modify
  identity=""
  anonymous_identity=""
  password=""
  # This initialises the variables for me.
  # -------------
  eap=PEAP
  phase1="crypto_binding=0 peaplabel=0"
  phase2="auth=MSCHAPV2"
  # Dont want to connect back to ourselves,
  # so add your rogue BSSID here.
  bssid_blacklist=00:14:22:01:23:45
}
---
Run: wpa_sycophant.sh -c wpa_sycophant_example.conf -i wlan0
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013363)
g0tmi1k   
2020-09-01 21:36   
@kali-team, please could this be packaged up.
(0014987)
sbrun   
2021-08-10 15:22   
version 1.0+git20210103-0kali2 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6538 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-30 17:05 2021-08-10 15:22
Reporter: Mister_X Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: berate_ap - orchestrating mana rogue WiFi Access Points
Description: - [Name] - berate_ap
- [Version] - Latest git master (latest tag is from create_ap, as this repo forked create_ap and modified it)
- [Homepage] - https://github.com/sensepost/berate_ap
- [Download] - git clone https://github.com/sensepost/berate_ap
- [Author] - Cablethief, Sensepost
- [Licence] - BSD 2-Clause "Simplified" License
- [Description] - Script for orchestrating mana rogue WiFi Access Points. It can also handle regular hostapd AP and create AP easily.
- [Dependencies] - hostapd-mana bash util-linux procps hostapd-mana iproute2 iw iwconfig dnsmasq iptables (optionally: haveged)
- [Similar tools] - create_ap (https://github.com/oblique/create_ap)
- [How to install] -
git clone https://github.com/sensepost/berate_ap
- [How to use] -
Its help screen, invoked when there is no parameter explains the different parameters in details and provides examples.
The following example creates a Mana WPA network called PSKNet which will output handshakes to /tmp/hostapd.hccapx (See 0006537):
./berate_ap --mana-wpa wlan0 PSKNet MyPassphrase
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013361)
g0tmi1k   
2020-09-01 21:35   
@kali-team, please could this be packaged up.
(0014986)
sbrun   
2021-08-10 15:22   
version 0.4.6+git20191120-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6499 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-20 14:53 2021-08-10 15:21
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: HostHunter - a recon tool for discovering hostnames using OSINT techniques.
Description: [Name] - Hosthunter
[Homepage] - https://github.com/SpiderLabs/HostHunter
[Download] - https://github.com/SpiderLabs/HostHunter/releases
[Version] - 1.5
[Author] - SpiderLabs
[License] - MIT
[Dependencies] - Python 3, Google Chrome, ChromeDriver, pyOpenSSL, requests, selenium, urllib3
[Description] - HostHunter a recon tool for discovering hostnames using OSINT techniques.

A tool to efficiently discover and extract hostnames providing a large set of target IP addresses. HostHunter utilises simple OSINT techniques to map IP addresses with virtual hostnames. It generates a CSV or TXT file containing the results of the reconnaissance.

Latest version of HostHunter also takes screenshots of the targets, it is currently a beta functionality.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013020)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0014985)
sbrun   
2021-08-10 15:21   
version 1.5+git20210630-0kali1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
1329 [Kali Linux] General Bug minor always 2014-06-04 13:47 2021-07-26 12:58
Reporter: Sorax Platform: Intel x64  
Assigned To: dookie OS: Kali  
Priority: normal OS Version: 1.07  
Status: resolved Product Version: 1.0.7  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 1.0.8  
    Target Version:  
Summary: "acccheck" won't open from the kali-menu
Description: "acccheck" isn't able to load from the kali-menu (screenshot).
Open it from the commandline -> no problem
Open it from within the installed folder -> no problem
Steps To Reproduce: Go to Kali-menu -> Information-gathering -> SMB-analyse -> acccheck
Additional Information:
System Description Linux kali 3.14-kali1-686-pae #1 SMP Debian 3.14.4-1kali1 (2014-05-14) i686 GNU/Linux

- This system is a VM-Ware Workstation system
- VM-Ware Workstation 10.03
- Dual processor cores (2,4 Ghz Intel(R) Pentium(R))
- 2048 GB RAM
Attached Files: acccheck-error.png (250,233 bytes) 2014-06-04 13:47
https://bugs.kali.org/file_download.php?file_id=246&type=bug
png
Notes
(0001986)
dookie   
2014-06-04 14:12   
Fixed in kali-menu_1.370. It will be in the repos soon.

Thanks for the report.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7259 [Kali Linux] General Bug crash always 2021-07-15 20:46 2021-07-25 13:07
Reporter: Raees Khan Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: External Usb Adaptor desconnecting
Description: when i put my usb wifi adaptor it connect and then sudenly disconnect then again i do te same then again this happen and it's keep happening again and again while sometimes when i trying to connect it its says wlan0 is not compitable then i put it gin its name change to wlan1 so works an the suddenly disconnected
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014925)
arnaudr   
2021-07-16 08:04   
Can you provide more information on your setup please? What USB wifi adpator is it? What version of Kali? How are you running (baremetal or virtual machine, installed or live image, etc etc). Thanks.
(0014932)
Raees Khan   
2021-07-16 17:15   
yeah sure so i'm using alfha Ai ll3 usb wireless adaptor and i'm using installed kali on hard disk and the kali version is Linux 5.10.0-kali9-amd64 0000001 SMP Debian 5.10.46-1kali1 (2021-06-25) x86_64 GNU/Linux
(0014935)
Michu   
2021-07-18 18:27   
maybe try to plug in to different usb port

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6940 [Kali Linux] General Bug minor have not tried 2020-12-22 13:19 2021-07-24 08:19
Reporter: M4N Platform:  
Assigned To: daniruiz OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Password on boot
Description: When i input pass for boot kali counts the backspace key as a character
Steps To Reproduce:
Additional Information: https://drive.google.com/file/d/1SifiUY71jx3-oMOBBptoj7IHucoUPSXo/view?usp=sharing

link for report video
Attached Files:
Notes
(0014918)
daniruiz   
2021-07-13 10:52   
Tried it again and now it works fine.
So this might have been fixed from systemd-boot (I guess)

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7262 [Kali Linux] Kali Package Bug major always 2021-07-18 13:52 2021-07-23 17:52
Reporter: LaraLang Platform:  
Assigned To: steev OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.2  
Product Build: Resolution: no change required  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Nethunter Hammerhead Marshmallow - Apache2 is Broken
Description: Apache2 build is Broken.

Running Apache2 from App and Terminal doesn't work.

Error points to a missing or overridden function during compile.
Steps To Reproduce: Repro 1

- Fresh Image flash with TWRP Recovery and Magisk using nethunter full - Re4son
- Reboot
- Update or unupdated Nethunter App, run Chroot Manager
- Start Chroot
- Nethunter Menu, custom run apt-get update && apt-get -y upgrade
-- alternative is via Nethunter Terminal
-- wait until completed
- Nethunter Menu
- Settings, ensure some settings it needs to set are set
- Nethunter Menu
- Services, start all services listed. sshd, postgresl, dnsmasq, apache
-- alternative is via Nethunter Terminal, run apache2

Apache Fails

Error:

Function not implemented: AH00141: Could not initialize random number generator
Additional Information:
Building httpd from scratch works but menu system is useless. Convenience provided negated by non working menu and applications in the image released.
Attached Files: Screenshot_20210718-211849.png (406,631 bytes) 2021-07-18 13:52
https://bugs.kali.org/file_download.php?file_id=2123&type=bug
Screenshot_20210718-212256.png (167,558 bytes) 2021-07-18 13:52
https://bugs.kali.org/file_download.php?file_id=2124&type=bug
png

rebuild-apache2-hammerhead-marshmallow.sh (857 bytes) 2021-07-21 13:04
https://bugs.kali.org/file_download.php?file_id=2125&type=bug
Notes
(0014936)
Michu   
2021-07-18 18:28   
try this https://askubuntu.com/questions/1323305/apache-commands-failing-with-ah00141-could-not-initialize-random-number-genera
(0014937)
LaraLang   
2021-07-18 20:07   
Hi @Michu, thanks for the link. I've tried that with no success.

Perusing available online reports on AH00141 was the first thing I did.
I've tried most of what can be done up to recompiling httpd itself and symlinking the working binary but just could get the custom build to work with the provided convenience from the GUI.

I will retry downgrading all that can be downgraded soon using available binaries in the repository but at libaprutil1 alone, I could not downgrade that library.

I am still not sure though if Nethunter builds or issues from one of the official images should be reported here. If it should be on another bugtracking system, let me know so it can reach the right people.
(0014939)
Michu   
2021-07-20 18:36   
i found this article https://stackoverflow.com/questions/17884176/apache-could-not-initialize-random-number-generator and people there says that it could be PATH variable try it maybe it will work it don't cost you
(0014940)
LaraLang   
2021-07-21 13:04   
Managed to rebuild from source and by source this time, the source used in 2021.2 fullfs of the Nethunter release for Nexus 5

Last time I rebuilt it using apache repository.

tldr;
enable sources
apt source apache2
purge apache2 libapr1 libaprutil1
checked out an older version of libapr and libaprutil1
configure, compile, install, configure, run
(0014941)
Michu   
2021-07-21 13:21   
so this article helped you or you did it by yourself
(0014942)
LaraLang   
2021-07-21 13:55   
@Michu I took inspiration from the same first article we both found online. ex. Downgrade APR.

And figured out all the other necessary steps by myself to get an Apache build specific to the debian layout to ensure that Nethunter conveniences/menu are usable for the custom build.

Thank you all the same. :)
(0014945)
Michu   
2021-07-23 17:11   
good to hear that you figured out what you need to do to resolve your problem and i'm here to help just like the others that's what matters cheers :)

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7260 [Kali Linux] Kali Package Bug crash always 2021-07-17 05:16 2021-07-17 06:51
Reporter: LaraLang Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Nethunter App - KeX Manager Crashes
Description: Device: Hammerhead
Lock State: Unlocked, Rooted, TWRP & Magisk
Image: Official Kali Hammerhead

Issue reproducible in image installed nethunter (2021.1) and Nethunter Store version (2021.2)

Reproduction 1.

Upon successful image flash via TWRP

- open nethunter app
- menu, click chroot manager
- start chroot environment
- open nethunter terminal
- apt-get update && apt-get full-upgrade -y
- reboot for good measure
- open nethunter app
- check chroot manager status, ensure it is running
- menu, click KeX Manager
- nethunter app freezes and eventually crashes
- logcat shows
-- ... /etc/init.d/99kex File or directory not found
Steps To Reproduce:
Additional Information:
Attached Files: Log_2021-07-17_14-33-29.txt (10,756 bytes) 2021-07-17 06:51
https://bugs.kali.org/file_download.php?file_id=2122&type=bug
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7128 [Kali Linux] General Bug minor sometimes 2021-04-03 22:25 2021-07-16 09:57
Reporter: mingdao Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: confirmed Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: weekly images shasums can be out of date for a short while
Description: The weekly image currently at http://cdimage.kali.org/kali-images/kali-weekly/ is for 2021-W13, but the SHA1 and SHA256 sums downloadable from the same page are the previous week's (W12) ones.
Steps To Reproduce: workstation /home/mingdao/Downloads # sha256sum kali-linux-2021-W13-installer-amd64.iso
8f1ee7464bc87f0334f3abf333f46f663a9047b87a784a028783b8121f6f0d65 kali-linux-2021-W13-installer-amd64.iso
workstation /home/mingdao/Downloads # grep 8f1ee7464bc87f0334f3abf333f46f663a9047b87a784a028783b8121f6f0d65 SHA256SUMS
workstation /home/mingdao/Downloads # cat SHA256SUMS
2a02483585b73755698b1e9179ff2ecbc3c9728d80967538d0d8e536d1e92778 kali-linux-2021-W12-installer-amd64.iso
001b772fe7a3e53988c63b4db9beea51ebcaf56ed76ac380d5e35e09ff3ca9ee kali-linux-2021-W12-installer-arm64.iso
0b5c6553221cea5f8c2df83bb9f4eaa064f5365535ec1a0830e2f943f4a53244 kali-linux-2021-W12-installer-i386.iso
8a8c25888e3b235f7267f0be183d3e59d0c089c90bbf2948bdbeb4e36c84e735 kali-linux-2021-W12-installer-netinst-amd64.iso
f0ced0a87633571ae979c5c2a427b0d5c91effc3cfef83464328eff644bbd10e kali-linux-2021-W12-installer-netinst-arm64.iso
3e1311a1d2756a4c2ffdbc6ae32435820d73ce48376a8ee92e190b1fd58b6e29 kali-linux-2021-W12-installer-netinst-i386.iso
0c3f4cfe03b916b6086045d21ccc731ccee3c48dfa144bc3c6d4e153367e3c56 kali-linux-2021-W12-live-amd64.iso
0a058e2d900b65865a36bab4dcd264f516816771961fdd0ea766559acf2beba2 kali-linux-2021-W12-live-arm64.iso
100898a40d0716102cc364afeab7591507fc2394d2881c6d99903165cf2f5e6f kali-linux-2021-W12-live-i386.iso
Additional Information:
Attached Files:
Notes
(0014928)
arnaudr   
2021-07-16 09:07   
Thanks for spotting that! I don't know what happened. Just checking now, and it all looks good:

$ wget -q -O- http://cdimage.kali.org/kali-images/kali-weekly | html2text -width 100
****** Index of /kali-images/kali-weekly ******
[[ICO]] Name Last_modified Size Description
================================================================================================
[[PARENTDIR]] Parent_Directory   -  
[[ ]] SHA1SUMS 2021-07-11 03:04 744  
[[ ]] SHA1SUMS.gpg 2021-07-11 03:04 833  
[[ ]] SHA256SUMS 2021-07-11 03:04 960  
[[ ]] SHA256SUMS.gpg 2021-07-11 03:04 833  
[[ ]] kali-linux-2021-W28-installer-amd64.iso 2021-07-11 01:05 4.4G  
[[ ]] kali-linux-2021-W28-installer-arm64.iso 2021-07-11 01:17 3.2G  
[[ ]] kali-linux-2021-W28-installer-i386.iso 2021-07-11 01:34 3.4G  
[[ ]] kali-linux-2021-W28-installer-netinst-amd64.iso 2021-07-11 01:07 379M  
[[ ]] kali-linux-2021-W28-installer-netinst-arm64.iso 2021-07-11 01:28 315M  
[[ ]] kali-linux-2021-W28-installer-netinst-i386.iso 2021-07-11 01:36 324M  
[[ ]] kali-linux-2021-W28-live-amd64.iso 2021-07-11 01:29 3.7G  
[[ ]] kali-linux-2021-W28-live-arm64.iso 2021-07-11 02:59 2.6G  
[[ ]] kali-linux-2021-W28-live-i386.iso 2021-07-11 01:58 3.0G  
================================================================================================
     Apache/2.4.10 (Debian) Server at cdimage.kali.org Port 80

$ wget -q -O- http://cdimage.kali.org/kali-images/kali-weekly/SHA256SUMS
b177e27f07e1191acd56fc91c8e40eccaa00a92ffea5edc65c566c93021cdb4b kali-linux-2021-W28-installer-amd64.iso
e3eff4400b6a62ef25ad487a83e4de068523e0ea8a9fe25ae5c838a0e0af2264 kali-linux-2021-W28-installer-arm64.iso
3acf95dafee53f0d5106fc3fbd47b82a2b5645d1d43d17674f89174eac9cd409 kali-linux-2021-W28-installer-i386.iso
78ea0cfc35ab70e6cebdabc112003eec4f300493a19462edae0dab3ef5cbad8d kali-linux-2021-W28-installer-netinst-amd64.iso
4c76df176f85685a9231cb5e5cbb5145fa5bc53eecc845d747557b6c8fc2025f kali-linux-2021-W28-installer-netinst-arm64.iso
da5ad4d8b5581be5380d6131eb509fbe9ddae667cfcc7956183500a7b23334cb kali-linux-2021-W28-installer-netinst-i386.iso
4cfef2c2fa0b15957b7072abf3ebee07cb93e51899882d43517f8dc636ce19da kali-linux-2021-W28-live-amd64.iso
14947b7a505a4a0b155ce4c298c22ba4600bd55d48cd7c28f449196e04984839 kali-linux-2021-W28-live-arm64.iso
8914fb4ebfa7fc1d1146cfa373744eb0818463ebc53f0d77664ae942264775c8 kali-linux-2021-W28-live-i386.iso

$ wget -q -O- http://cdimage.kali.org/kali-images/kali-weekly/kali-linux-2021-W28-installer-netinst-arm64.iso | sha256sum
4c76df176f85685a9231cb5e5cbb5145fa5bc53eecc845d747557b6c8fc2025f -
(0014929)
arnaudr   
2021-07-16 09:57   
So this is actually a known issue. When the new images are uploaded every week, the shasums can be outdated for a short while, due to cache effect. This is a minor inconvenience though, and it only affects the weekly images, once a week when they are updated. We plan to improve that at some point.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7198 [Kali Linux] Kali Package Bug major always 2021-05-22 09:12 2021-07-16 08:34
Reporter: SalmanGL Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali tools are in danger
Description: I have these issues. The tools are not in a good function
1- apktool can not rebuild payload after creating it by msfvenom

2- hydra show false positives results (user and pass)

3- metasploit ( exploit complete but no session )

4- ettercap doesn’t open. After choosing the mode then click run it disappears
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014926)
arnaudr   
2021-07-16 08:34   
> 4- ettercap doesn’t open. After choosing the mode then click run it disappears

Works for me, in latest Kali "2021.2". Try to run it from a terminal with "ettercap-pkexec -G" and see what happens?

> 1- apktool can not rebuild payload after creating it by msfvenom
> 2- hydra show false positives results (user and pass)
> 3- metasploit ( exploit complete but no session )

I'm not familiar with these tools, are you sure there's really a problem with Kali here? It looks like that you need help and guidance to perform some task. We have community support forums on https://forums.kali.org/ or on IRC with the #kali-linux channel on irc.oftc.net), please post your questions there.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7251 [Kali Linux] General Bug major always 2021-07-04 13:58 2021-07-15 18:23
Reporter: vatsal gupta Platform:  
Assigned To: OS:  
Priority: urgent OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: external usb adapter is getting disconnected again and again,only in wlan0 (bridged connection)
Description: i'm noticing this bug from 2-3 days, actually the problem only in bridged connection whenever i connect to by external usb adapter,it always getting disconnected.

i'm using vmware's installer image.

that's not my usb adapter or vmware's fault, as usb adapter is working with host machine and vmware is showing it in removable devices. only wlan0 was getting disconnected in bridged connection.

hope! it'll be solved soon!

Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014909)
Gamb1t   
2021-07-08 23:07   
Can you provide more information on your setup please? VMWare version, what version of image, compatibility settings, etc
(0014911)
vatsal gupta   
2021-07-09 06:32   
i'm
(0014912)
vatsal gupta   
2021-07-09 06:41   
1. i'm using vmware workstation player 16
2. kali vmware file totally updated (2021.2)
3. bridged connection. 4gb ram

whenever i connect to usb external adapeter. then,after few seconds around 30-40 ,it getting disconnected
(0014923)
I-Cat   
2021-07-15 18:23   
[OBTW I forgot to Mention I am a Developer]
Do you have hardware issues at all?
There are many known issues with running in a VM.
The main ones are trying to use a virtual "usb" driver.

1 My suggestion is check your drivers on your system.
2 Run a Dual boot system/Make a bootable usb drive.
3 Use Don't use vmware if it is not working try something else

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7249 [Kali Linux] Kali Package Improvement tweak have not tried 2021-07-01 19:28 2021-07-14 08:43
Reporter: xtaran Platform:  
Assigned To: Gamb1t OS:  
Priority: urgent OS Version:  
Status: acknowledged Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: DOTNET_CLI_TELEMETRY_OPTOUT=1 needed in addition to POWERSHELL_TELEMETRY_OPTOUT=1 in /etc/environment
Description: Today's upgrade pulled in or upgraded dotnet-sdk-3.1 which outputs the following messages:

[…]
Setting up dotnet-sdk-3.1 (3.1.408-1) ...
This software may collect information about you and your use of the software, and send that to Microsoft.
Please visit http://aka.ms/dotnet-cli-eula for more information.
Welcome to .NET Core!
---------------------
Learn more about .NET Core: https://aka.ms/dotnet-docs
Use 'dotnet --help' to see available commands or visit: https://aka.ms/dotnet-cli-docs

Telemetry
---------
The .NET Core tools collect usage data in order to help us improve your experience. It is collected by Microsoft and shared with the community. You can opt-out of telemetry by setting the DOTNET_CLI_TELEMETRY_OPTOUT environment variable to '1' or 'true' using your favorite shell.

Read more about .NET Core CLI Tools telemetry: https://aka.ms/dotnet-cli-telemetry

Configuring...
--------------
A command is running to populate your local package cache to improve restore speed and enable offline access. This command takes up to one minute to complete and only runs once.
Setting up powershell-empire (4.0.0+gitsubmodule-0kali1) ...
[…]

So please add DOTNET_CLI_TELEMETRY_OPTOUT=1 to /etc/environment via the kali-defaults package
Steps To Reproduce: Install dotnet-sdk-3.1 at version 3.1.408-1 in a terminal.
Additional Information:
Attached Files:
Notes
(0014920)
arnaudr   
2021-07-14 08:43   
I pushed the change: https://gitlab.com/kalilinux/packages/kali-defaults/-/commit/acd71b6400b4369bb4a062de9fe4beaf92a77f5c

This will be available in kali-rolling as soon as a new version of the package kali-defaults is packaged and uploaded (ie. soon).

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6504 [Kali Linux] Queued Tool Addition minor have not tried 2020-06-20 15:04 2021-07-14 07:10
Reporter: g0tmi1k Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.3  
    Target Version:  
Summary: subjack - Subdomain Takeover tool written in Go
Description: [Name] - subjack
[Homepage] - https://github.com/haccer/subjack
[Download] - https://github.com/haccer/subjack/releases
[Version] - 2.1
[Author] - Cody Zacharias
[License] - Apache License 2.0
[Dependencies] - GoLang
[Description] - Subdomain Takeover tool written in Go

Subjack is a Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked. With Go's speed and efficiency, this tool really stands out when it comes to mass-testing. Always double check the results manually to rule out false positives.

Subjack will also check for subdomains attached to domains that don't exist (NXDOMAIN) and are available to be registered. No need for dig ever again! This is still cross-compatible too.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0013015)
g0tmi1k   
2020-06-28 09:58   
@kali-team, please could this be packaged up.
(0014919)
sbrun   
2021-07-14 07:10   
pacakge subjack version 2.1 is in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5803 [Kali Linux] General Bug tweak always 2019-11-21 01:12 2021-07-10 00:51
Reporter: elwood Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: HiDpi support
Description: Booted on a high rez system in live mode, Kali is not very usable as everything is so small. A "xrandr -s 1920x1080" in a terminal can be used as a work around, but we will need to automate this so as to allow for easier use for general users. Going to become more and more of an issue as super high rez displays become more common.
Steps To Reproduce:
Additional Information:
Attached Files: vga=test-kali.png (126,429 bytes) 2019-11-21 10:45
https://bugs.kali.org/file_download.php?file_id=1446&type=bug
png

kali-warx-16.png (469,652 bytes) 2019-11-21 10:45
https://bugs.kali.org/file_download.php?file_id=1447&type=bug
kali-warx-16-2.png (450,444 bytes) 2019-11-21 10:45
https://bugs.kali.org/file_download.php?file_id=1448&type=bug
kali-warx-16-3.png (785,997 bytes) 2019-11-21 10:45
https://bugs.kali.org/file_download.php?file_id=1449&type=bug
Notes
(0011333)
akejjeka   
2019-11-21 10:45   
hello, it seems to me that we can edit "TAB" and send a grub or syslinux a "vga = 893" (see the VESA_BIOS_Extensions correspondence table) for the live / initrd.img https://en.wikipedia.org / wiki / VESA_BIOS_Extensions
and that's the same problem with grub boot and debian-installer.
(0011334)
rhertzog   
2019-11-21 11:40   
I guess you have the same issue in non-live mode, i.e. if you install the system. This is really a problem that should be handled by the various desktops and not by us Kali.

It seems that GNOME has automatic support for this:
https://wiki.gnome.org/HowDoI/HiDpi

But Xfce doesn't seem to have anything automatic and it seems to be painful to configure:
https://forum.manjaro.org/t/wiki-xfce-settings-for-high-resolution-monitors/51534

So yeah, downgrading the resolution might be the easier approach.

Still I want to know. On a fresh live boot, what do you get as output for "xrandr" ?

Does "xrandr --dpi 196" gives a good result?

Does "xrandr --output XXX --scale 0.5x0.5" gives a good result?
(try on a fresh boot, without having called xrandr --dpi 192 first)
(0011335)
rhertzog   
2019-11-21 11:56   
I have read about "slick-greeter" supporting HiDPI. Maybe we should try to use it on a HiDPI screen and see if the sessions started through it behave better... I don't have any HiDPI screen to test anything though.
(0011340)
elwood   
2019-11-21 16:34   
(Last edited: 2019-12-12 08:26)
Screen 0: minimum 320 x 200, current 3840 x 2160, maximum 16384 x 16384
eDP-1 connected primary 3840x2160+0+0 (normal left inverted right x axis y axis) 309mm x 174mm
   3840x2160 60.00*+ 59.98 59.97 48.00
   3200x1800 59.96 59.94
   2880x1620 59.96 59.97
   2560x1600 59.99 59.97
   2560x1440 59.99 59.99 59.96 59.95
   2048x1536 60.00
   1920x1440 60.00
   1856x1392 60.01
   1792x1344 60.01
   2048x1152 59.99 59.98 59.90 59.91
   1920x1200 59.88 59.95
   1920x1080 60.01 59.97 59.96 59.93
   1600x1200 60.00
   1680x1050 59.95 59.88
   1600x1024 60.17
   1400x1050 59.98
   1600x900 59.99 59.94 59.95 59.82
   1280x1024 60.02
   1440x900 59.89
   1400x900 59.96 59.88
   1280x960 60.00
   1440x810 60.00 59.97
   1368x768 59.88 59.85
   1360x768 59.80 59.96
   1280x800 59.99 59.97 59.81 59.91
   1152x864 60.00
   1280x720 60.00 59.99 59.86 59.74
   1024x768 60.04 60.00
   960x720 60.00
   928x696 60.05
   896x672 60.01
   1024x576 59.95 59.96 59.90 59.82
   960x600 59.93 60.00
   960x540 59.96 59.99 59.63 59.82
   800x600 60.00 60.32 56.25
   840x525 60.01 59.88
   864x486 59.92 59.57
   800x512 60.17
   700x525 59.98
   800x450 59.95 59.82
   640x512 60.02
   720x450 59.89
   700x450 59.96 59.88
   640x480 60.00 59.94
   720x405 59.51 58.99
   684x384 59.88 59.85
   680x384 59.80 59.96
   640x400 59.88 59.98
   576x432 60.06
   640x360 59.86 59.83 59.84 59.32
   512x384 60.00
   512x288 60.00 59.92
   480x270 59.63 59.82
   400x300 60.32 56.34
   432x243 59.92 59.57
   320x240 60.05
   360x202 59.51 59.13
   320x180 59.84 59.32
DP-1 disconnected (normal left inverted right x axis y axis)
HDMI-1 disconnected (normal left inverted right x axis y axis)
DP-2 disconnected (normal left inverted right x axis y axis)

xrandr --dpi 196 does help, and "xrandr --output XXX --scale 0.5x0.5" works as well however things do start to look "fuzzy" across the board and the cursors get oversized.

Arch has a good guide at https://wiki.archlinux.org/index.php/HiDPI and for XFCE 4.14 does have better HIDPI support however when we change the scaling to 2x it does not impact all apps, most notably the terminal. Running "xrandr --dpi 196" combined with the XFCE change makes things usable (not perfect, but acceptable).

It seems like we could use an automated way of setting the xrandr dpi when on a hidpi display?

(0014892)
rhertzog   
2021-07-07 14:52   
We have kali-hidpi as workaround now, closing this ticket.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7252 [Kali Linux] Tool Upgrade Request minor have not tried 2021-07-05 12:10 2021-07-09 13:50
Reporter: epi Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Upgrade feroxbuster to version 2.3.1
Description: Good morning!

In response to https://github.com/epi052/feroxbuster/issues/301, I fixed and deployed a new minor release of feroxbuster that should fix feroxbuster's return value within your auto package tests.

Thank you for getting 2.3.0 out there! Sorry for breaking testing, lol.

epi
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014913)
sbrun   
2021-07-09 13:50   
Thanks for the fix!
I just uploaded the package in kali

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5561 [Kali Linux] Feature Requests feature N/A 2019-06-24 12:41 2021-07-07 15:26
Reporter: rhertzog Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: [REPOS] Repositories should use "Acquire-by-hash" to provide atomic updates
Description: When the release file contains "Acquire-By-Hash: yes", APT now tries to download the indices from an alternate path based on the checksums of each file, thus allowing multiple version of the metadata to co-exist and thus making atomic updates of repositories a reality.

Unfortunately, reprepro (that we use to manage our repositories) does not support that feature currently:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820660
Steps To Reproduce:
Additional Information:
Attached Files:
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4653 [Kali Linux] General Bug minor always 2018-03-25 10:46 2021-07-07 15:26
Reporter: coolaayush22 Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2018.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: [REPOS] Repository is missing DEP-11 / appstream metadata
Description: when ever i launch my gnome software all i can see is extensions ...... i have updated my packages ..upgraded packages and distribution ...but it doesn't work at all
Steps To Reproduce:
Additional Information:
Attached Files: Screenshot from 2018-03-24 23-16-57.png (29,415 bytes) 2018-03-25 10:46
https://bugs.kali.org/file_download.php?file_id=1127&type=bug
png
Notes
(0008967)
rhertzog   
2018-03-28 07:48   
I believe that the reason is the lack of appstream metadata in Kali repositories:
https://www.freedesktop.org/wiki/Distributions/AppStream/
http://dep.debian.net/deps/dep11/

Debian repositories have this. But we are using reprepro to manage the repository and it doesn't offer this feature currently.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824521

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5613 [Kali Linux] Feature Requests minor unable to reproduce 2019-08-04 14:34 2021-07-07 15:24
Reporter: Balling Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: assigned Product Version: kali-dev  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Deploy support for (p)diff incremental for apt-get update on https://http.kali.org/kali
Description: Сущ:1 http://files.viva64.com/deb viva64-release InRelease
Игн:2 http://dl.google.com/linux/chrome/deb stable InRelease
Сущ:3 http://dl.google.com/linux/chrome/deb stable Release
Пол:5 https://cdn-aws.deb.debian.org/debian experimental InRelease [78.9 kB]
Пол:7 https://cdn-aws.deb.debian.org/debian experimental/main amd64 Packages.diff/Index [27.8 kB]
Пол:8 https://cdn-aws.deb.debian.org/debian experimental/main i386 Packages.diff/Index [27.8 kB]
Пол:9 https://cdn-aws.deb.debian.org/debian experimental/main Translation-en.diff/Index [27.8 kB]
Пол:10 https://cdn-aws.deb.debian.org/debian experimental/main i386 Contents (deb).diff/Index [27.9 kB]
Пол:11 https://cdn-aws.deb.debian.org/debian experimental/main amd64 Contents (deb).diff/Index [27.9 kB]
Пол:6 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling InRelease [30.5 kB]
Пол:12 https://cdn-aws.deb.debian.org/debian experimental/main amd64 Packages 2019-08-04-0831.20.pdiff [9,063 B]
Пол:12 https://cdn-aws.deb.debian.org/debian experimental/main amd64 Packages 2019-08-04-0831.20.pdiff [9,063 B]
Пол:13 https://cdn-aws.deb.debian.org/debian experimental/main i386 Packages 2019-08-04-0831.20.pdiff [9,097 B]
Пол:13 https://cdn-aws.deb.debian.org/debian experimental/main i386 Packages 2019-08-04-0831.20.pdiff [9,097 B]
Пол:14 https://cdn-aws.deb.debian.org/debian experimental/main Translation-en 2019-08-04-0831.20.pdiff [6,018 B]
Пол:14 https://cdn-aws.deb.debian.org/debian experimental/main Translation-en 2019-08-04-0831.20.pdiff [6,018 B]
Пол:15 https://cdn-aws.deb.debian.org/debian experimental/main i386 Contents (deb) 2019-08-04-0831.20.pdiff [40.1 kB]
Пол:15 https://cdn-aws.deb.debian.org/debian experimental/main i386 Contents (deb) 2019-08-04-0831.20.pdiff [40.1 kB]
Пол:16 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/contrib Sources [66.0 kB]
Пол:17 https://cdn-aws.deb.debian.org/debian experimental/main amd64 Contents (deb) 2019-08-04-0831.20.pdiff [40.1 kB]
Пол:17 https://cdn-aws.deb.debian.org/debian experimental/main amd64 Contents (deb) 2019-08-04-0831.20.pdiff [40.1 kB]
Пол:18 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/non-free Sources [136 kB]
Пол:19 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/main Sources [12.8 MB]
Пол:20 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/main i386 Packages [17.0 MB]
Пол:21 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/main amd64 Packages [17.1 MB]
Пол:22 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/main amd64 Contents (deb) [36.9 MB]
Пол:23 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/main i386 Contents (deb) [36.9 MB]
Пол:24 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/non-free i386 Packages [168 kB]
Пол:25 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/non-free amd64 Packages [192 kB]
Пол:26 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/non-free i386 Contents (deb) [858 kB]
Пол:27 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/non-free amd64 Contents (deb) [925 kB]
Пол:28 https://ftp.acc.umu.se/mirror/kali.org/kali kali-rolling/contrib amd64 Packages [108 kB]


As you can see debian has incremental apt-get update (.pdiff and .diff) while with kali I have to download every day (practically) 122 MiB!!!
Obviously you will benefit from it as well. So please! It is as cool as https support. Thanks.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0010837)
crash   
2019-08-09 09:25   
Hi Balling,
I guess it is under evaluation.
(0010838)
Balling   
2019-08-09 09:33   
crash, the real problem that I cannot find pdiff server side open source implementation(( I suppose debian (and Amazon which help them) should have it, though...

About evaluation, I suppose it will be like 3-5 % more CPU time, but many, many times less bandwidth use... Because you do not need to do anything on kali destro side, it is all already supported (by apt).
(0010840)
crash   
2019-08-09 09:43   
Yeah sure. I totally understand your point. (:

Regarding the evaluation, I meant I guess the pdiff implementation is under evaluation (:
(0010841)
Balling   
2019-08-09 09:46   
crash, cannot you ask debian for it? It can't be propriatory! I mean it is debian and all.
(0010842)
crash   
2019-08-09 09:47   
I will chase it. (:
(0010843)
Balling   
2019-08-09 10:37   
crash, that was hard to google but --pdiff=mirror in debmirror can do the trick, no? Are you using it, of are you using apt-mirror (apt-cacher(-ng))?
(0010844)
Balling   
2019-08-09 10:54   
crash,
I found the utility debian use to generate diffs and pdiffs. Tell that to maintainers. It is dak (Debian Archive Kit).
https://wiki.debian.org/DebianRepository/Setup

dak generate-index-diffs

https://github.com/Debian/dak/blob/50ced4f9160d0fc5627a6b4ce717865165d87891/config/debian/dinstall.functions#L164
(0010863)
rhertzog   
2019-08-13 20:42   
We are using reprepro to manage our repositories. It doesn't support "pdiff" files natively though it provides some "example" script that is supposed to be able to generate those:
/usr/share/doc/reprepro/examples/pdiff.example.gz

I'm not sure whether that script still works and there are many warnings in the top-level comment. It needs some tests and further investigation...
(0010864)
Balling   
2019-08-13 21:19   
BTW, another benefit, I suppose as now kali update repo on every boot, it is even better for your servers.

 >"example" script

No! It is implemetation from 2006-2014! Do not use it please! https://salsa.debian.org/brlink/reprepro/commits/debian/docs/pdiff.example

You must use dak for this purpose. Reprepro is in python, and dak is as well.

Look for example how it is done in pureos. Thanks.
(0010875)
rhertzog   
2019-08-15 13:38   
Old code is not necessarily broken and no we won't switch to "dak" just for this feature. Changing the archive management software is not an easy operation and has many implications on other parts of our infrastructure.

BTW reprepro is written in C, but the pdiff example script is written in Python.
(0010878)
Balling   
2019-08-15 13:47   
Anyway, this script is derived from dak
https://github.com/ionos-enterprise/reprepro/blob/d18e2ed95520e34aca4f7f84c1364c2cac4da51e/docs/manual.html#L609
So you can as well use dak...
(0010888)
rhertzog   
2019-08-15 14:51   
Note to myself: look into using "rredtool" to generate those .diff files.
(0011137)
Balling   
2019-09-20 15:31   
@rhertzog
By the way if you open https://pkg.kali.org/derivative/kali-roll/ it has a name "Data about this Debian derivative",
so you are managing the difference with Debian, maybe you could use --pdiff=mirror in debmirror to clone all data which is the same as Debian and then just provide all derivative packets without diff and pdiff? There should be a way not to recompile pdiff and diff files...

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5132 [Kali Linux] Feature Requests minor have not tried 2018-11-30 07:52 2021-07-07 15:17
Reporter: rhertzog Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2018.4  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Ensure Qt can use OpenGL ES drivers for hardware acceleration on arm64
Description: Qt offers a build time configuration between using an OpenGL stack or an OpenGL ES stack. In Debian, it uses the OpenGL stack everywhere except on armel and armhf. We would like it to use OpenGL ES on arm64 too because arm64 has many embedded/mobile boards that support only OpenGL ES (either as a hardware restriction or, more frequently, as a restriction of the (proprietary) drivers shipped by the vendor).

When Qt is built for OpenGL and when the drivers only support OpenGL ES, the user is effectively stuck with no hardware acceleration at all and the 3D rendering falls back to the CPU and it's much slower, leading to a poor desktop experience.

This request has been brought to Debian in the following bug: https://bugs.debian.org/881333
The maintainers seemed to agree and then started a discussion on debian-devel to ensure that the community was in agreement with that change: https://lists.debian.org/debian-devel/2018/11/thrd2.html#00457
In the discussion, they seemed to have changed their mind and will now only do the change if the Debian technical committee believes that it's the best outcome.

At the same time, the discussion showed that it should be not too hard to build two versions of the Qt libraries and it might be that Dmitry Shachnev will implement this. However it's quite clear that it's a poor design decision from Qt to require the user to make that choice at build time and it turns out that for Windows it's possible to make that choice at runtime:
http://doc.qt.io/qt-5/windows-requirements.html#dynamically-loading-graphics-drivers

So ideally the best outcome would be to have a similar feature for Linux and with Dmitry we have requested this to the Qt developers through a bug report and a mailing list discussion:
https://bugreports.qt.io/browse/QTBUG-72128
https://lists.qt-project.org/pipermail/development/2018-November/034394.html
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0010136)
rhertzog   
2019-01-02 14:23   
Dmitry started to work on this: https://salsa.debian.org/mitya57/qtbase/commits/gles/master
He's waiting review from the other co-maintainers in Debian.
(0010195)
rhertzog   
2019-01-10 15:35   
The package has been uploaded to Debian experimental: qtbase-opensource-src-gles but it's currently stuck in the NEW review queue.
(0010204)
rhertzog   
2019-01-14 09:40   
Dmitry queried the Debian release team about updating packages to get the new dependency allowing to switch between the GL and GLES variant of Qt:
https://bugs.debian.org/919218
(0011489)
rhertzog   
2019-11-29 16:23   
The -gles variant of Qt is now available in testing and kali but many packages still have to be rebuilt to get the new dependency:
https://release.debian.org/transitions/html/libqt5gui5-gles.html

Dmitry also mentioned that qtdeclarative5-gles still needs to be created.
(0014899)
rhertzog   
2021-07-07 15:17   
The change is finished on the Debian side.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5594 [Kali Linux] Kali Package Bug minor always 2019-07-23 14:05 2021-07-07 15:16
Reporter: rhertzog Platform:  
Assigned To: rhertzog OS:  
Priority: low OS Version:  
Status: resolved Product Version: 2019.2  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Application "Software & Updates" (software-properties-gtk) does not work in Kali
Description: Running software-properties-gtk in the command line fails with:
ERROR:root:Cannot import UbuntuDrivers: No module named 'UbuntuDrivers'
Traceback (most recent call last):
  File "/usr/bin/software-properties-gtk", line 101, in <module>
    app = SoftwarePropertiesGtk(datadir=options.data_dir, options=options, file=file)
  File "/usr/lib/python3/dist-packages/softwareproperties/gtk/SoftwarePropertiesGtk.py", line 109, in __init__
    SoftwareProperties.__init__(self, options=options, datadir=datadir)
  File "/usr/lib/python3/dist-packages/softwareproperties/SoftwareProperties.py", line 109, in __init__
    self.reload_sourceslist()
  File "/usr/lib/python3/dist-packages/softwareproperties/SoftwareProperties.py", line 599, in reload_sourceslist
    self.distro.get_sources(self.sourceslist)
  File "/usr/lib/python3/dist-packages/aptsources/distro.py", line 93, in get_sources
    (self.id, self.codename))
aptsources.distro.NoDistroTemplateException: Error: could not find a distribution template for Kali/n/a
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0010797)
rhertzog   
2019-07-23 16:13   
To fix this, we need to modify python-apt to add some Kali specific files in data/templates (which get installed in /usr/share/python-apt/templates/ in python-apt-common).

This change should be submitted upstream (https://salsa.debian.org/apt-team/python-apt).
(0010798)
rhertzog   
2019-07-23 17:29   
The fix has been submitted here: https://salsa.debian.org/apt-team/python-apt/merge_requests/15

I also had to update base-files to add a VERSION_CODENAME value in /etc/os-release.
(0010800)
rhertzog   
2019-07-24 06:13   
I wanted to upload a forked python-apt but it fails to build currently so I can't do it: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932834
(0010952)
k13875656919   
2019-08-31 21:31   
I try your method,but still not working. T_T
(0011663)
rhertzog   
2019-12-12 08:22   
Our change has been merged in Debian, but it's only available in python-apt > 1.9.0 which is in experimental and has backwards incompatible changes so I will no import it for now. I'll wait until it reaches unstable/testing.
(0014898)
rhertzog   
2021-07-07 15:16   
Latest python-apt is now available in kali so this should be fixed.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5290 [Kali Linux] Feature Requests feature always 2019-03-04 15:31 2021-07-07 15:13
Reporter: tjnull Platform:  
Assigned To: rhertzog OS:  
Priority: low OS Version:  
Status: assigned Product Version: 2019.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Build powershell packages from sources
Description: For the past several months I have been working on maintaining the packages for Powershell Core to be working on Kali Linux. It appears that other distributions are now pushing Powershell to their Linux Distributions as well. Since other distributions are pushing Powershell on their Linux distributions I thought it would be fantastic if Kali Linux could also have it built-in to its operating system. Powershell is one of the most powerful languages for windows systems and many people are starting to use it now more then ever.

Please let me know if you decide to take this feature request into consideration because I absolutely love to help you all get Powershell working and installed by default on Kali Linux.
Steps To Reproduce: I have tested this in Kali Linux 2019.1 and it works very well!

First, we need to download and add the public repository GPG key so APT will trust the packages and alert you to any issues with package signatures:

curl https://packages.microsoft.com/keys/microsoft.asc | apt-key add -
Second, Once the GPG key has been added, we need to add the Microsoft package repository to its own package list file under /etc/apt/sources.list.d/ This will allow us to also pull any updated packages that the PowerShell team will release in the future:

echo "deb [arch=amd64] https://packages.microsoft.com/repos/microsoft-debian-stretch-prod stretch main" > /etc/apt/sources.list.d/PowerShell.list
apt update


Third we will need to install the following dependency packages below to continue the installation. You can download the package here:

libicu57: https://packages.debian.org/stretch/amd64/libicu57/download
icu-devtools: https://packages.debian.org/stretch/amd64/icu-devtools/download
liblttng-ust0: https://packages.debian.org/stretch/amd64/liblttng-ust0/download
liburcu4: https://packages.debian.org/stretch/amd64/liburcu4/download
liblttng-ust-ctl2: https://packages.debian.org/stretch/amd64/liblttng-ust-ctl2/download

Once the packages have been installed we can then install powershell on Kali Linux:

root@kali:~# apt-get install powershell
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
  libxmlsec1 libxmlsec1-openssl
Use 'apt autoremove' to remove them.
The following NEW packages will be installed:
  powershell
0 upgraded, 1 newly installed, 0 to remove and 32 not upgraded.
Need to get 58.0 MB of archives.
After this operation, 157 MB of additional disk space will be used.
Get:1 https://packages.microsoft.com/repos/microsoft-debian-stretch-prod stretch/main amd64 powershell amd64 6.1.3-1.debian.9 [58.0 MB]
Fetched 58.0 MB in 3s (20.1 MB/s)
Selecting previously unselected package powershell.
(Reading database ... 419462 files and directories currently installed.)
Preparing to unpack .../powershell_6.1.3-1.debian.9_amd64.deb ...
Unpacking powershell (6.1.3-1.debian.9) ...
Setting up powershell (6.1.3-1.debian.9) ...
Processing triggers for man-db (2.8.5-2) ...
root@kali:~/Downloads# pwsh
PowerShell 6.1.3
Copyright (c) Microsoft Corporation. All rights reserved.

https://aka.ms/pscore6-docs
Type 'help' to get help.

PS /root/Downloads>

Reference: https://www.netsecfocus.com/infosec/tools/2018/09/25/Installing_Powershell_and_Powershell_Preview_on_Kali_Linux_2018-3.html
Additional Information:
Attached Files: Proof of Powershell.PNG (65,114 bytes) 2019-03-04 15:31
https://bugs.kali.org/file_download.php?file_id=1305&type=bug
png
Notes
(0010395)
akozlov   
2019-03-05 18:48   
Neat. So would this allow .PS1 files to be run and executed within the context of Kali?
(0010400)
tjnull   
2019-03-07 16:04   
@akozlov Yep and even to import modules as well. However, powershell for linux uses .net core instead of .net framework but I do not think there are any big differences. Still testing that out :D
(0010534)
rhertzog   
2019-04-25 14:47   
You say " It appears that other distributions are now pushing Powershell to their Linux Distributions as well.". Can you give us pointers related to this? If others are working on this, it might make sense to cooperate instead of doing it alone on our side. So please share any link/information that you might have.
(0010535)
rhertzog   
2019-04-25 15:00   
FWIW, we are definitely interested in having powershell available as a first-class package in our repository. We will be working on it and I will keep this bug updated. But it will require some significant work, we will see.
(0010549)
tjnull   
2019-05-02 12:12   
@rhertzog Microsoft Published an article on how you can install powershell for different Linux distributions shown here: https://docs.microsoft.com/en-us/powershell/scripting/install/installing-powershell-core-on-linux?view=powershell-6

In the past, the instructions for installing Kali Linux are incorrect. That's why I created a guide back in September that covers step by step on installing PowerShell for Kali Linux.

As of now, the latest version of Ubuntu contains a snap in package that you can select to have PowerShell automatically install on your Ubuntu System. I do not know if there is one for debian based systems but it is definitely something we should look into further to see what process they have created already for adding powershell to Kali.
(0011081)
sbrun   
2019-09-12 08:24   
powershell is now in kali-rolling for amd64
(0011217)
rhertzog   
2019-10-22 16:52   
Sharing information gathered from MS: to build Powershell from source, we also need to build .NET Core from source. The latter can be done through https://github.com/dotnet/core-sdk

`Start-PSBuild` will look for `dotnet` CLI executable in the PATH, so if we build it ourselves and have it in the PATH, the build script should find it and use it.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
4974 [Kali Linux] Kali Package Bug minor have not tried 2018-09-11 14:12 2021-07-07 15:07
Reporter: rhertzog Platform:  
Assigned To: rhertzog OS:  
Priority: low OS Version:  
Status: resolved Product Version: 2018.3  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: Ensure cherrytree goes back to Debian testing
Description: We have forked cherrytree because it has been removed from Debian testing due to its usage of an obsolete package: python-gtksourceview2

This is bug https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822586

Unfortunately upstream never managed to port the code to the gobject-introspection version of the libraries:
https://github.com/giuspen/cherrytree/issues/125

He is mostly stuck on this limitation of GTK+ and their Python bindings:
https://gitlab.gnome.org/GNOME/pygobject/issues/133
https://gitlab.gnome.org/GNOME/gtk/issues/364

Due to this, he started to rewrite the application in C++ with gtkmm. The work is slowly progressing in the "future" directory of the master branch. The author shares some updates from time to time in https://www.giuspen.com/topic/status-of-the-development/
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0010219)
rhertzog   
2019-01-15 14:41   
As of today, the C++ port is not ready, though it should be able to work in read-only mode (displaying content) according to https://www.giuspen.com/topic/status-of-the-development/page/4/
(0014896)
rhertzog   
2021-07-07 15:07   
cherrytree 0.99.30+dfsg-1 is back in testing

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5894 [Kali Linux] Tool Upgrade Request minor have not tried 2019-12-09 22:36 2021-07-07 14:55
Reporter: Gamb1t Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2019.4  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version: 2020.1  
Summary: Add ARM PowerShell support
Description: https://github.com/PowerShell/PowerShell/releases/tag/v6.2.3
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0012336)
rhertzog   
2020-02-25 08:08   
The problem with powershell is that it's not packaged properly. We're just importing .deb provided by Microsoft, but MS is not providing ready to use .deb for ARM (at least last time I checked) so we can't just extend what we are doing to cover ARM.

Thus to get ARM support, we would want to build our own packaging on top of the upstream provided binaries, both for x86 and arm.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
5158 [Kali Linux] Feature Requests minor N/A 2018-12-14 10:55 2021-07-07 14:55
Reporter: rhertzog Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: assigned Product Version:  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Support old ciphers and old crypto protocols in various tools
Description: To increase the security of many tools, old (broken security-wise) crypto protocols have been dropped (or disabled by default) from OpenSSL and other libraries.

This is the case of SSLv2 for example (support dropped a long time ago) and TLSv1.0/TLSv1.1 is currently disabled by default (see MinProtocol in /etc/ssl/openssl.conf, change re-introduced in 1.1.1-2 see https://tracker.debian.org/news/998835/accepted-openssl-111-2-source-into-unstable/ and former revert in 0004238).

In the context of a penetration testing distribution, this is problematic because it doesn't let you connect/inspect services using those old crypto protocols.

There are various ways to work-around this limitation:
- the tool itself can use the OpenSSL API to re-enable support for things that are disabled by default
- the tool can be built against an old version of OpenSSL still supporting the desired protocols (sslscan is an example of this, see 0000146, same for sslyze see 0002106).

So we should look into some ways to have an openssl package supporting as many of those old protocols as possible.
Steps To Reproduce:
Additional Information: It would be nice to have a list of applications where we want to support old ciphers/crypto protocols:
- nikto (see 0004372)
- nmap (see 0004372)
- please complete (leave a comment)

It would be nice to have a list of old ciphers/crypto protocols that we would like to see supported:
- SSL 2.0
- TLS 1.0
- TLS 1.1
Attached Files:
Notes
(0010109)
Mister_X   
2018-12-14 15:54   
HostAPd-WPE. Even though it works with the current OpenSSL, it would benefit from an older version of OpenSSL that has heartbleed. See "Testing Heartbleed" at the bottom of the page: https://github.com/aircrack-ng/aircrack-ng/tree/master/patches/wpe/hostapd-wpe
In this case, we may need to have 2 versions of the tools (See https://github.com/aircrack-ng/aircrack-ng/commit/430ad28df861d1fe638646f51cdf468c5b8a3f61#diff-aec6cf8281af39bd2b455fadb9fcd3b4 ): one with the recent OpenSSL and one with the old one and old MD5 certs.

Freeradius may benefit from an older OpenSSL version but I would think even XP should still support the current setup.
(0010470)
sp   
2019-03-31 07:33   
Try to build with LibreSSL instead of OpenSSL. LibreSSL has TLS 1.0
(0010479)
Mister_X   
2019-04-05 19:59   
Another workaround: edit /etc/ssl/openssl.cnf and change MinProtocol to TLSv1.0 (at the very end of the file, in the '[system_default_sect]'.
(0010947)
cnotin   
2019-08-28 14:07   
FYI Metasploit is also impacted. I fixed it in one library with https://github.com/rapid7/metasploit-framework/pull/12214 but others might be concerned too.
Same in wpscan: https://github.com/wpscanteam/wpscan/issues/1380#issuecomment-525755956
(0011563)
cnotin   
2019-12-03 22:43   
Hello Raphaël, the issue seems to still be open (TLS 1.0 and 1.1 is still disabled system-wide on Kali for OpenSSL which leads to false positives when using security tools against older targets).

According to https://tracker.debian.org/pkg/openssl, Debian testing (from which Kali is based if I'm correct) is currently on 1.1.1d-2, where the Debian patches which disables older versions is still present, according to https://salsa.debian.org/debian/openssl/blob/debian/openssl-1.1.1d-2/debian/patches/Set-systemwide-default-settings-for-libssl-users.patch.

I saw your discussion on this bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875423 which was closed by the upgrade to 1.1.1-2. However, this only improved the documentation (see https://salsa.debian.org/debian/openssl/blob/debian/openssl-1.1.1d-2/debian/libssl1.1.NEWS) but TLS 1.0 and 1.1 are still disabled and this choice seems assumed by the maintainer.

I also saw your fork for Kali with an interesting commit to disable this patch from Debian: https://gitlab.com/kalilinux/packages/openssl/commit/53db08fd7598d4308a17cf3158489f40201da265

What are the next steps? Could I be useful in any way?
(0011581)
rhertzog   
2019-12-05 10:08   
@cnotin In the mean time, we have added http://pkg.kali.org/pkg/unsafeopenssl to our repository. Thus my suggestion would be that applications that need to support old protocols use that library. Unfortunately, this is also unlikely to be a viable long term solution as this is just a fork of an old libssl and it will likely not get support for new security protocols. :-|

I really don't want to fork openssl compared to Debian and the change you pointed out was really a temporary change.
(0011602)
cnotin   
2019-12-08 16:26   
Thanks/merci @rhertzog for your answer!

Indeed the situation is complicated and I do not see any solution that would not add a maintenance burden...
Would forking openssl for Kali from Debian be really complicated and heavy to maintain? For now the only difference would be removing the Debian patch that sets the systemwide default security level. But you know better than me :)

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6346 [Kali Linux] General Bug minor always 2020-04-30 17:23 2021-07-07 14:53
Reporter: naterang Platform:  
Assigned To: arnaudr OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: AWS AMI User Date Does Not Run
Description: Hello,

User Data (bash scripts) attached to the official AWS Kali AMI do not run.

It appears the AMI is not cleaned properly before the Image is taken and registered.

Running the following to clean/remove first run user data remediates the issue before taking an image for an AMI.

rm -rf /var/lib/cloud/*
cloud-init clean

I have tested and confirmed this by launching a new official Kali instance, running these commands, taking my own AMI of the instance then launching it with user data.
Steps To Reproduce: Launch AMI Kali Linux 2020.1a with User Data attached
Additional Information:
Attached Files:
Notes
(0013009)
g0tmi1k   
2020-06-28 09:56   
Please could you try with 2020.2?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6010 [Kali Linux] Kali Package Improvement minor always 2020-01-18 15:30 2021-07-07 14:49
Reporter: kimocoder Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version: kali-dev  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version: 2021.2  
    Target Version:  
Summary: NetHunter: Hashcat works great on arm/arm64
Description: Hashcat is not to be found in arm format, but it's supported/builds and works great in NetHunter chroot.
It should be added to the repo instead of us filling up the "Custom Commands" tab with scripts.

Added some images to show both Hashcat and OpenCL ICD support, which will add support for
cracking PMKID on the fly for wifite2 with the use of OpenCL ICD to enhance the speed for both Pyrit and Hashcat.

The OpenCL included we'll manage over on the 'nethunter-installer' at Gitlab, no worries about that one.

Thanks!
Steps To Reproduce:
Additional Information:
Attached Files: IMG_-uzh0iz.jpg (97,568 bytes) 2020-01-18 15:30
https://bugs.kali.org/file_download.php?file_id=1579&type=bug
jpg

IMG_25b9w.jpg (84,749 bytes) 2020-01-18 15:30
https://bugs.kali.org/file_download.php?file_id=1580&type=bug
jpg

Screenshot_20200118-162919.jpg (478,848 bytes) 2020-01-18 15:30
https://bugs.kali.org/file_download.php?file_id=1581&type=bug
IMG_-9040rl.jpg (74,219 bytes) 2020-01-18 15:30
https://bugs.kali.org/file_download.php?file_id=1582&type=bug
jpg
Notes
(0011943)
kimocoder   
2020-01-18 15:35   
It's all ment to be used with tools like wifite2, to make it allround supported 'on-the-fly' with a probeable wordlist, not for heavy duty calculations, but this will both bring speed enhancements and PMKID cracking support, which btw works very, very well :)

@sbrun
(0012348)
rhertzog   
2020-02-25 13:45   
I have uploaded hashcat_5.1.0+ds1-2 to Debian, enabling the armhf and arm64 architectures. Let's see how this goes.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6185 [Kali Linux] General Bug minor always 2020-03-11 17:51 2021-07-07 14:33
Reporter: vypr Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: assigned Product Version: 2020.1  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali-light install with encryption boots to initramfs prompt, no decryption prompt
Description: Installing kali light with standard system utilities and encrypting the HD on installation results in first boot to initramfs prompt. Checked after installation before reboot with alt-F2 and mount -bind /sys /target/sys and /dev to /target/dev. Did the apt update and apt install cryptsetup and it wasn't installed.

Fix: Add whatever package is missing for full HD encryption and prompt on boot to kali-light
Steps To Reproduce: Install Kali light from live usb, choose only xfce, standard system utilities and kali iight and kali-linux*?
Additional Information:
Attached Files: syslog-1.txt (794,039 bytes) 2020-03-13 16:59
https://bugs.kali.org/file_download.php?file_id=1672&type=bug
syslog-2.txt (1,338,873 bytes) 2020-03-13 16:59
https://bugs.kali.org/file_download.php?file_id=1673&type=bug
Notes
(0012410)
rhertzog   
2020-03-12 08:06   
What image did you use to run the installer?

Can you provide the logs of the initial installation? You should have them in /var/log/installer/syslog.
(0012411)
vypr   
2020-03-12 17:32   
Kali-linux-2020.1-live-amd64.iso

I wiped the drive and installed with tools instead so no logs.
Let me know if you want the logs, I'll reproduce the issue and fetch them from a live system
(0012412)
rhertzog   
2020-03-13 08:41   
Yes, I would like to see the logs. Since you installed kali-linux-light I assume that you made the installation with network enabled. Is that correct? (otherwise you should not see any extra meta-packages to install)
(0012413)
vypr   
2020-03-13 16:59   
Yes I did have the mirror enabled and network is working fine.

On first boot after install, i get the usual splash screen, then this:

[ 2.036476] i801_smbus 0000:00:1f.3: Failed to enable SMBus PCI device (-16)

BusyBox version... and (initramfs) prompt

I wrote PROBLEM MIGHT START HERE in the log where I think the issue comes from but I might be wrong

Thanks
(0014890)
rhertzog   
2021-07-07 14:33   
The log clearly shows that it tries to install cryptsetup-initramfs as part of the base-installer step, before the network mirror has been configured.

Not sure what's the right fix: modify d-i to retry queued package installation later? fix our live ISO to have the required .deb embedded so that the install works even without network?

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
6108 [Kali Linux] Kali Package Bug minor always 2020-02-17 18:04 2021-07-07 14:09
Reporter: OS-69474 Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2020.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: nmap segfault due to lua-lpeg
Description: Scanning a specific lab host using the vulners script will consistently lead to a crash. I made a post about it in the PWK forums.
Steps To Reproduce:
Additional Information: Log from dmesg:

[14294.399735] nmap[13062]: segfault at 7ffe3cddeff8 ip 00007ff3ca9264c7 sp 00007ffe3cddf000 error 6 in liblua5.3-lpeg.so.2.0.0[7ff3ca920000+a000]
[14294.399745] Code: 8d 50 f1 80 fa 01 77 0b b8 01 00 00 00 5b c3 0f 1f 40 00 48 8b 15 09 3b 20 00 0f b6 04 02 3c 01 74 21 3c 02 75 2d 48 8d 7b 08 <e8> 64 ba ff ff 85 c0 75 d5 48 63 43 04 48 8d 1c c3 eb ba 66 0f 1f


I was able to resolve the problem for myself by building the lua-lpeg package with the following patch included: https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=942031;filename=lua-lpeg_1.0.0-2ubuntu1.debdiff;msg=5
Attached Files:
Notes
(0012297)
rhertzog   
2020-02-18 10:01   
Thanks for the report. I pinged the Debian maintainer privately to try to get the fix into Debian, possibly by packaging the new upstream release 1.0.2. https://tracker.debian.org/pkg/lua-lpeg
(0014887)
rhertzog   
2021-07-07 14:09   
lua-lpeg 1.0.2 with the fix is in Debian and Kali.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7236 [Kali Linux] General Bug major unable to reproduce 2021-06-24 19:56 2021-07-07 13:41
Reporter: Santres Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: feedback Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Kali installation formats home partition
Description: When you are installing Kali Linux and select a home partition, even if you mark it as "don't format", it will format anyway. Unfortunately, this happened to me about a hour ago, I was unable to recover my data even with TestDisk.
Steps To Reproduce: 1. Select your home partition on the Kali graphical installation
2. Mark it as "don't format"
3. Wait for it to install.
4. When it installs, your home directory will be with the default data.
Additional Information: I am absolutely sure that I checked the "Don't format" option.
Attached Files:
Notes
(0014886)
rhertzog   
2021-07-07 13:41   
Please attach the log files of the installer, at least /var/log/installer/syslog and /var/log/installer/partman on a system where you experienced this...

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7228 [Kali Linux] Tool Upgrade Request minor have not tried 2021-06-18 22:00 2021-07-05 09:42
Reporter: epi Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version:  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Upgrade feroxbuster to version 2.3.0
Description: Howdy!

I'm the author of feroxbuster, and for the initial add into the kali repos, I got things ready and then asked for it to be added. I've pushed a new version to github, but don't know how to get it updated in the repos. Is there anything I need to do, or is it just a request now?

Thanks in advance for your help!
epi
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014878)
sbrun   
2021-06-30 08:55   
I will work on the update.

For the next update you can open an issue here (just like this one).
(0014884)
sbrun   
2021-07-05 09:42   
version 2.3.0-0kali1is now in kali-rolling

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7221 [Kali Linux] General Bug major random 2021-06-13 13:51 2021-06-30 08:49
Reporter: MartinHero13 Platform:  
Assigned To: OS:  
Priority: normal OS Version:  
Status: new Product Version: 2021.2  
Product Build: Resolution: open  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: inside xrdp of kali linux in windows remote desktop wont log me in after login details
Description: Hi! I had seriously problem. I tried just making xrdp service start in kali linux terminal in windows, I connected kali linux ip localhost in my windows remote desktop, I just type my correct username and password details, also I used session xorg only, when I clicked OK, then it took several minutes that looks stuck of blue background, after several seconds i got error connection log.
Steps To Reproduce: I tried just everything about reboot, xrdp upgrade, xrdp fix and more, it did not work. My files are still there in VHDX Linux.
Additional Information: Connection log:
connection to sesman ip 127.0.0.1 port 3350
sesman connect ok
sending login info to session manager, please wait
login successful for display 10
started connecting
connection problem, giving up
some problem
Attached Files: proofofremotedesktopxrdplinux.png (11,610 bytes) 2021-06-13 13:51
https://bugs.kali.org/file_download.php?file_id=2109&type=bug
png
There are no notes attached to this issue.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7203 [Kali Linux] Kali Websites & Docs major always 2021-05-28 15:18 2021-06-30 08:49
Reporter: droidjamil Platform:  
Assigned To: rhertzog OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: fixed  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Mirror http://kali.mirror.globo.tech/kali/ is 2 years out of date
Description: I was introducing a friend to Kali, and she was having trouble installing packages, we traced the problem to fact that the mirror that was being autoselected for her, http://kali.mirror.globo.tech/kali/, has a timestamp of 30-Apr-2019 18:03 on dists/kali-rolling/Release and dists/kali-rolling/Contents-amd64.gz, as well as many of the other files. Many files are older than that, and I could not find a file newer than that. Additionally, the list of versions available in that repo support the theory that it's an out of date repo and not just a timestamp failure.

Given that this repo is priority 100 for Canada, and diagnosing the problem is non-trivial for someone not familiar with debian repo mechanics, this seems moderately high priority to at least remove it from the metalink.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014595)
Michu   
2021-05-15 14:46   
try to find at kali.org repositories and copy paste them in /etc/apt/sources.list and save then apt update link to repo's https://www.kali.org/docs/general-use/kali-linux-sources-list-repositories/
(0014596)
securnetic   
2021-05-19 02:52   
Yes, commenting out the default kali update link and adding berkeley for example works, but TechyShishy is right, it is very annoying to have to edit all the VMs to reflect this if you're in Canada. This is a major issue I noticed since a few days too, it wasn't doing it a few weeks ago.
(0014597)
Michu   
2021-05-19 19:37   
seriously i didn't know about this isue
(0014598)
rhertzog   
2021-05-28 15:13   
Thanks for the notice. This was indeed a regression in our script that ensures that mirrors are up-to-date. It has been fixed now. Sorry for the inconvenience.

View Issue Details
ID: Category: Severity: Reproducibility: Date Submitted: Last Update:
7206 [Kali Linux] Kali Package Bug major have not tried 2021-05-28 15:18 2021-06-30 08:49
Reporter: droidjamil Platform:  
Assigned To: sbrun OS:  
Priority: normal OS Version:  
Status: resolved Product Version: 2021.1  
Product Build: Resolution: no change required  
Projection: none      
ETA: none Fixed in Version:  
    Target Version:  
Summary: Driver for Ralink Technology, Corp. MT7601U Wireless Adapter
Description: Yes, I've seen on many github repositories that its driver have been included into kali's main stream from/after kernel version 4.1 or 4.2

Still, my adapter doesn't seem to be recognised on my workstation (as full installation, like Real OS) but It did worked in VirtualBox (like Virtual OS)
Please fix this ASAP.

I'm using Up-To-Date kali system.
Steps To Reproduce:
Additional Information:
Attached Files:
Notes
(0014601)
Michu   
2021-05-12 15:03   
iwconfig ifconfig give output of those commands and dmesg | grep error and journalctl -xe maybe we can figure out in there what's the problem
(0014602)
c3s4r   
2021-05-13 10:14   
CONCERNED DEVICE IS "wlan1"
NO NEED TO WORRY ABOUT "wrx0"(changed name) and "inet, inet6, ether, ACCESS POINT" values, I've modified them.
@Michu

┌──(c3s4r㉿kali)-[~]
└─$ iwconfig
lo no wireless extensions.

eth0 no wireless extensions.

wlan0 IEEE 802.11 ESSID:"KratoSkills_5GHz"
          Mode:Managed Frequency:5.26 GHz Access Point: 11:22:33:44:55:66
          Bit Rate=780 Mb/s Tx-Power=20 dBm
          Retry short limit:7 RTS thr:off Fragment thr:off
        &