BackTrack 5

Karan Singh Rajawat Sunday, May 15, 2011


Linux has many flavors present and it is dream operating system for hackers also, Well development of Linux is an open source project, Since, you know that Linux has many flavors therefore today i decided to post information about a flavor of Linux which is specially designed for hackers and penetration testers which scan applications and websites for vulnerability. The name of this flavor of Linux is BackTrack.

Its been released till its version 4, and version 5 is releasing soon. Some of my posts regarding Linux OS are here you may like to read them too for getting convinced to switch to Linux:





BackTrack 5 – Features & Properties
BackTrack previous versions were also loaded with many testing and penetration tools, Also information gathering tools were present in it, Now its version 5 will come with some new version of such tools and also with some new features. BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), and will (finally) support both 32 bit and 64 bit architectures. It will be officially supporting KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment (DE). Tool integration from its repositories will be seamless with all our supported DE’s, including the specific DE menu structure.
Major Tools Included in Backtrack
>>Metasploit integration

>>RFMON Injection capable wireless drivers

>>Kismet
>>Nmap
>>Ophcrack
>>Ettercap
>>Wireshark (formerly known as Ethereal)
>>BeEF (Browser Exploitation Framework)
>>Hydra
>>Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enable default   password.
>>Quypt (Terminal Emulator) (which is private software by Crimson Hacking group, which has leaked to the Mainstream) Blackhat
>>A large collection of exploits as well as more commonplace software such as browsers.

BackTrack Major Categories on Which Tools are Based
>>Information Gathering

>>Network Mapping

>>Vulnerability Identification
>>Web Application Analysis
>>Radio Network Analysis (802.11, Bluetooth, RFID)
>>Penetration (Exploit & Social Engineering Toolkit)
>>Privilege Escalation
>>Maintaining Access
>>Digital Forensics
>>Reverse Engineering
>>Voice Over IP

Screen Shots of BackTrack 5

Download BackTrack 5
BackTrack 5 has been released & will be available for download here.



Google+ Pinterest