Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line

Posted on August 21, 2025August 21, 2025 By CWS

The Kali Linux crew has introduced a big enhancement of its Vagrant picture construct course of, streamlining growth and simplifying deployment for customers.

In a transfer to unify its infrastructure, the crew has transitioned from HashiCorp’s Packer to DebOS for producing its pre-configured Vagrant digital machines. The discharge additionally features a helpful cheat sheet to get safety professionals and lovers up and working in minutes.

Vagrant packing containers are pre-packaged VM pictures that permit customers to create, handle, and destroy digital environments totally from the command line, providing a workflow much like containers however for full digital machines. For years, the Kali crew relied on Packer to automate the creation of those pictures.

Whereas efficient, Packer had a notable limitation: it required the host machine to have the goal hypervisor put in, stopping cross-building. As an illustration, constructing a Hyper-V picture was not attainable on a Linux-based construct server.

Recognizing an inefficiency, the event crew determined to consolidate its toolchain. Having already efficiently used DebOS for constructing different Kali VM pictures, they sought to unify the method. “Why do we now have two totally different programs, for a similar goal?” the crew famous of their announcement.

Adapting DebOS for Vagrant builds proved simple. The core necessities for a Vagrant base field are minimal: a set username (vagrant), pre-configured public SSH keys for entry, and sudo privileges.

The Kali crew integrated these requirements, together with really helpful tweaks for person comfort like fastened credentials and SSH optimizations, right into a post-install step inside their current kali-vm construct script. This modification means all Kali VMs, whether or not inventory or Vagrant-specific, at the moment are constructed utilizing the identical automated course of on a centralized Linux infrastructure.

This transition did introduce a problem for Home windows customers working Hyper-V. The brand new DebOS-generated pictures lack sure binary recordsdata (.vmcx/.vmrs) that Packer beforehand included.

Older variations of Vagrant anticipated these recordsdata and would fail upon import. To resolve this, a patch was submitted to the upstream Vagrant mission, which was integrated into a brand new launch.

Consequently, customers wishing to run Kali 2025.2 or newer with Hyper-V should improve their Vagrant set up to model 2.4.8 (launched August 5, 2025) or increased.

To replicate the change, the outdated Packer-based construct scripts have been archived in a renamed Git repository for group members who should want to use them.

To assist customers shortly leverage the brand new pictures, Kali has offered a “cheat-sheet” of instructions. A person can obtain, initialize, and entry a brand new Kali occasion with just some strains of their terminal:

vagrant field add kalilinux/rolling –force –clean –provider virtualbox –box-version 2025.2.1mkdir -pv kali-vagrant/ && cd $_vagrant init kalilinux/rolling –force –minimal –output – –box-version 2025.2.1 | tee Vagrantfilevagrant up –provider virtualboxvagrant ssh

This streamlined launch marks a big inner enchancment for the Kali Linux crew and delivers a extra constant and accessible expertise for its world person base.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and minimize incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Command, DebOS, Kali, Line, Preconfigured, Rebuilt, Released, Vagrant, VMs

Post navigation

Previous Post: Password Managers Vulnerable to Data Theft via Clickjacking
Next Post: Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy

Related Posts

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle Cyber Security News
WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities Cyber Security News
RubyGems Malware Attack Weaponizes 60+ Packages to Steal Credentials from Social Media and Marketing Tools Cyber Security News
CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News
Cybercrime-as-a-Service – Countering Accessible Hacking Tools Cyber Security News
New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks
  • Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks
  • Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News