BackTrack
![]() BackTrack 5 R1 |
|
Company / developer | Mati Aharoni, Emanuele Gentili, and others. |
---|---|
OS family | Unix-Like |
Working state | Active |
Source model | Open source |
Latest stable release | 5 R1 / August 18, 2011 |
Latest unstable release | 5 |
Supported platforms | i386(x86), amd64(x86-64), ARM |
Kernel type | Monolithic |
Default user interface | Bash, KDE Plasma Desktop, Fluxbox GNOME |
License | Various |
Official website | www.backtrack-linux.org |
The BackTrack distribution originated from the merger of two formerly competing distributions which focused on penetration testing:
- WHAX: a Slax based Linux distribution developed by Mati Aharoni, a security consultant. Earlier versions of WHAX were called Whoppix and were based on Knoppix.
- Auditor Security Collection: a Live CD based on Knoppix developed by Max Moser which included over 300 tools organized in a user-friendly hierarchy.
Tools
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.BackTrack includes many well known security tools including:
- Metasploit integration (Non-Working and Officially Unsupported )
- RFMON Injection capable wireless drivers
- Aircrack-NG
- Kismet
- Nmap
- Ophcrack
- Ettercap
- Wireshark (formerly known as Ethereal)
- BeEF (Browser Exploitation Framework)
- Hydra(software)
- OWASP Mantra Security Framework collection of hacking tools, add-ons and scripts based on Firefox
- Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enable default password.
- Quypt (Terminal Emulator) (which is private software by Crimson Hacking group, which has leaked to the Mainstream) Blackhat
- A large collection of exploits as well as more commonplace software such as browsers.
- Information Gathering
- Vulnerability Assessment
- Exploitation Tools
- Privilege Escalation
- Maintaining Access
- Reverse Engineering
- RFID Tools
- Stress testing
- Forensics
- Reporting Tools
- Services
- Miscellaneous
No comments:
Post a Comment