• About Us
  • Contact Us
  • Terms Of Services
  • Privacy Policy
  • DMCA Policy
  • Our Sitemap
OperateLab
  • Home
  • Computers & Electronics
  • Technology
  • Internet
  • Internet Marketing
No Result
View All Result
  • Home
  • Computers & Electronics
  • Technology
  • Internet
  • Internet Marketing
OperateLab
No Result
View All Result

Home » General » WSL2 and Kali Linux

WSL2 and Kali Linux

David Wilson by David Wilson
August 16, 2022
in General
0
508
SHARES
1.6k
VIEWS
Share on FacebookShare on Twitter

Kali Linux has had support for WSL for some time, but its usefulness has been somewhat limited. This was mostly due to restrictions placed on some system calls , most importantly those revolving around networking. Furthermore, additional issues with speed, specifically I/O, were also problematic. Because of this, Kali WSL has mostly been relegated to reporting functions after an assessment is completed. A cool technology, and certainly an amazing engineering feat, but as is, it just was not that useful in the field.

When WSL 2 was announced however, we were excited about what this could mean for actually making Kali WSL more useful in. As such, when we saw that WSL 2 was available in the Windows Insiders program we wanted to jump right on it and see what improvements were made.

WSL2 Conversion

After you have the new Windows Insider build installed, converting Kali WSL 1 to 2 is very easy.

This was a great surprise for us, as it also means we don’t have to do anything on our end to support WSL2. Kali’s current WSL distribution will work just fine, and you can convert your existing installation easily. According to the docs you can also set WSL2 as your default if you don’t have a Kali installed yet.

Overall, this was a great surprise, and means Kali is ready for WSL 2 today.

Kali WSL 2 Usage

Ok, so WSL 2 works with Kali, but is it useful? We are just starting to play with WSL 2, so it’s really too early to say. However there are a few quick observations we have.

Basic usage, such as updating Kali and installing packages, appears to work just fine.

However, simply installing something is not that interesting, The question is: does it work? One specific tool we wanted to immediately check was Nmap, which has always been a WSL pain point. As you can see from the screenshot, a basic Nmap scan works right out of the box! Thats great news and is very promising for WSL 2 as it continues development.

That should not be a great surprise however, as WSL 2 at its core is really a low overhead and optimized VM. This has brought about some changes for those of us who have been using WSL for a while. These changes fall mostly along the lines of process spaces, networking, and filesystem interaction. This brings up some items we will have to watch as WSL continues to mature.

All networking appears to be NATed in the current release.

Microsoft states:

In the initial builds of the WSL 2 preview, you will need to access any Linux server from Windows using the IP address of your Linux distro, and any Windows server from Linux using the IP address of your host machine. This is something that is temporary, and very high on our priority list to fix.

So, no bridged mode. Anyone who uses Kali in a VM knows that for an actual assessment work it’s always better to run Kali in bridged mode, not NAT. With the current release, reverse shells are really not going to be an easy option without playing around with port forwarding on the Windows side. Additionally, we don’t yet know the strength of the NAT engine. While scans ran through WSL2 are now possible, their results will remain questionable until we find how much the NAT engine impacts them.

As it is in a VM, the process space is separate.

This is interesting, as it might actually open up Kali WSL 2 to be a useful endpoint protection bypass. If you get code execution on a Windows 10 system that supports WSL 2, could you install a Kali instance and pivot from there instead of the base operating system? This remains to be seen as this is still in development and Microsoft seems to want to unify the Linux and Windows experience as much as possible. The end point protection programs might become “WSL Aware”, which makes this is an interesting item to watch.

WSL 2’s filesystem is now in a virtual disk.

Similar to traditional VMs, there is now a virtual disk that holds the WSL 2 instance. In the past, one of the WSL issues that would come up is that many Kali tools would trigger anti-virus protections. To keep Kali WSL useful you would have to make exclusions for the location in which the Kali files were saved on the Windows filesystem.

Now that it’s in a virtual disk, much like the process space isolation, it will remain to be seen how AV might deal with it. Currently, it appears that AV ignores this virtual disk and its contents but as WSL reaches general availability it is possible AV products will become WSL 2 aware. Again, something we will need to watch.

Overall

As it stands, WSL 2 is an exciting technology and most definitely worth paying attention to. This is the first public beta and a lot will change over time. As such, we will track its development and see what we can do to make WSL 2 more useful for our purposes. As it stands however, it already seems more useful than what we have experienced with WSL 1 for actual production use. However, WSL 1 is still supported on a WSL 2 system so if you are a WSL user you can pick what’s best for you.

Previous Post

How To Tell What iPad You Have: Model Numbers & Other Clues

Next Post

14 Most Alarming Cyber Security Statistics

Related Posts

5 Microsoft Powerpoint alternatives for Linux users

December 20, 2022

How to connect to Ubuntu from Windows

December 4, 2022

Best Halloween iPhone Apps

November 26, 2022

How to make Netflix playback on Linux easier with ElectronPlayer

November 19, 2022

5 best Gnome-based Linux distributions to check out

October 28, 2022

How to link your Nintendo Network ID and your Nintendo Account

September 6, 2022
Next Post

14 Most Alarming Cyber Security Statistics

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

RECOMMENDEDREADS

Technology

How To Install Adobe Flash Player On Mac

by David Wilson
February 16, 2023
Web Development

Install Ubuntu Linux by Removing Windows [Beginner’s Guide]

by David Wilson
February 9, 2023
Technology

5 Best Armband Phone Holder For LG G8 ThinQS

by David Wilson
February 8, 2023
Technology

Best Free Ad Blockers for Web Browsers – 2022

by David Wilson
February 5, 2023
Technology

Background Check Services: How to Choose the Right Company?

by David Wilson
February 4, 2023

Top Stories

ZenMate VPN Review 2020 – Why it has a 45+ million usersbase?

January 17, 2023

WP Engine vs WPX Hosting: A Comparison With Speed Tests

November 29, 2022

Will Netflix Ban Me For Using a VPN?

February 19, 2022

Why website security affects SEO rankings (and what you can do about it)

January 27, 2022

Why is the High-Speed Internet Necessary

January 25, 2023

Which Apps Won’t Work in iOS 13? Compatible iPhone Apps

August 10, 2022

Find on Categories

  • Business & Industries (1)
  • Computers & Electronics (2)
  • Education & Careers (2)
  • Gaming (1)
  • General (24)
  • Internet (25)
  • Internet Marketing (14)
  • Technology (121)
  • Web Development (4)

OperateLab

We are a community of technology enthusiasts who believe that technology should be available to all and an effort should be made to help everyone understand it.

Contact Us at mail@operatelab.com

Connect on Social

Business & Industries

How to Use TickTick for Productivity: Notes, Read-Later, and Tasks

by David Wilson
January 1, 2022
Internet

ZenMate VPN Review 2020 – Why it has a 45+ million usersbase?

by David Wilson
January 17, 2023

© 2022 Copyright | OperateLab | All Rights Reserved By Us | Reproduction Of Contents Is Not Allowed.

No Result
View All Result
  • Home
  • Computers & Electronics
  • Technology
  • Internet
  • Internet Marketing

© 2022 Copyright | OperateLab | All Rights Reserved By Us | Reproduction Of Contents Is Not Allowed.