Skip to content

Penetration Testing Tools

  • Home
  • Apple
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology
  • Home
  • Apple
  • Google
    • Android
  • Information Security
    • Cyber Security
    • Cybercriminals
    • Data Leak
    • Malware
    • Vulnerability
  • Linux
  • Microsoft
    • Windows
  • Open Source Tool
  • Technology

Penetration Testing Tools

  • Linux

Kali Linux will no longer use root account by default

by ddos · Published January 6, 2020 · Updated January 6, 2020

The Kali Linux operating system, which is very well-known in the security industry, has released a version update announcement. If there is no accident, the project team will release the Kali Linux 2020.1 update later this month. It is also from this version that the operating system will no longer use the root account by default, and switch to the new security model.

The Kali Linux project team said: “As part of our evaluation of Kali tools and policies we have decided to change this and move Kali to a “traditional default non-root user” model. This change will be part of the 2020.1 release, currently scheduled for late January. However, you will notice this change in the weekly images starting now.”

Kali Linux Raspberry Pi 4

Image: kali

The overall stability of Kali Linux has been getting higher and higher, which has also made more and more users use this operating system as the main operating system, although researchers or ordinary users are not encouraged to use Kali as the main operating system. But more and more users have indeed done so in the past few years, and their main use may not be penetration and security testing.

When people use Kali as the main operating system, they obviously do not need to run the root account, because most software and tools do not require root permissions. For this reason, the project team decided to change the security model in accordance with user needs. The root account is no longer the default account.

Next, Kali will guide the user to create a non-root account with administrator privileges for daily use during the installation phase. Of course, if the user needs root privileges, he can still switch to root privileges.

• Kali in live mode will be running as user kali password kali. No more root/toor. (Get ready to set up your IDS filters, as we are sure this user/pass combo will be being scanned for by bots everywhere soon).
• On install, Kali will prompt you to create a non-root user that will have administrative privileges (due to its addition to the sudo group). This is the same process as other Linux distros you may be familiar with.
• Tools that we identify as needing root access, as well as common administrative functions such as starting/stopping services, will interactively ask for administrative privileges (at least when started from the Kali menu). If you really don’t care about security, and if you prefer the old model, you can install kali-grant-root and run dpkg-reconfigure kali-grant-root to configure password-less root rights.

Share

Tags: kali linuxroot account

Follow:

  • Next story Microsoft Office 2016 will be moved into extended support starting in October
  • Previous story Microsoft may remove Focus Inbox in Windows 10 Mail app

Search

MAKE THE WEBSITE ONLINE

  • Popular Posts
  • Tags
  • Persistence utility

    Open Source Tool

    PowerDodder: The Stealthy New Tool That Hides Malware in Your Script Files

    August 25, 2025

  • Crypto Hack Federal Courts Data Breach NNSA Breach CrushFTP Zero-Day GMX Hack Resupply Exploit CVE-2023-22952 Humac Cyberattack

    Cyber Security / Vulnerability

    US Nuclear Agency Hit by SharePoint Zero-Day: Over 400 Orgs Breached as Ransomware Threat Escalates

    July 25, 2025

  • GitHub Spark

    Technology

    GitHub Unveils Spark: Build Full Applications with AI Using Just Your Ideas

    July 26, 2025

  • Proton AI Privacy

    Technology

    Proton Unveils Lumo: The Privacy-First AI Assistant with Zero-Access Encryption & No Data Logging

    July 26, 2025

  • WordPress RCE WordPress Backdoor WordPress Plugin, Arbitrary File Deletion

    Malware

    Stealthy WordPress Backdoor Found Hiding in Must-Use Mu-Plugins Directory for Persistent Access

    July 26, 2025

  • AI Amazon AMD Android Apple ARM Artificial intelligence Asus ChatGPT chrome cryptocurrency cyberattack cybercrime cybersecurity data breach facebook Firefox Github google Google Chrome Huawei Intel LG Linux Linux Kernel malware MediaTek Microsoft microsoft edge Nvidia OpenAI open source phishing privacy Qualcomm ransomware RCE Samsung Sony TSMC vulnerability windows Windows 10 Windows 11 Xbox




Reward

Brilliantly

SAFE!

meterpreter.org

Content & Links

Verified by Sur.ly

2022

  • Home
  • About Us
  • Contact Us
  • DMCA NOTICE
  • Privacy Policy

Penetration Testing Tools © 2025. All Rights Reserved.