BackTrack – Linux Distribution for Penetration Testing

BackTrack Linux

What is BackTrack?

BackTrack Linux

BackTrack is a Linux-based penetration testing operating system that helps network security professionals in the ability to perform reports assessments in a purely native environment dedicated to penetration testing.

Whether you are making BackTrack your main operating system, booting it from a LiveDVD, or using your favorite USB, the penetration testing distribution has been customized down to every application and package, kernel configuration, scripts and patches solely for the purpose of the penetration testing.

BackTrack is intended for all people from network security professionals, or penetration testers to just beginners to the information security field.

BackTrack promotes a fast and easy way to find and update the largest database of information security tools collection up-to-date.

Our community of BackTrack users range from skilled penetration testers in the information and network security field, government entities, information technology people, security enthusiasts, and individuals new and wanted to learn about network and information security.

Whether you’re pentesting wireless, exposing servers vulnerabilities, performing a web application exploits, learning, or doing social-engineering,

BackTrack is the one-stop-shop for all of your security needs.

BackTrack includes many well known security tools including:

  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ophcrack
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)
  • Hydra
  • Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enable default password.
  • Quypt (Terminal Emulator) (which is private software by Crimson Hacking group, which has leaked to the Mainstream) Blackhat
  • A large collection of exploits as well as more commonplace software such as browsers.

BackTrack arranges tools into 12 categories:

  • Information Gathering
  • Vulnerability Assessment
  • Exploitation Tools
  • Privilege Escalation
  • Maintaining Access
  • Reverse Engineering
  • RFID Tools
  • Stress testing
  • Forensics
  • Reporting Tools
  • Services
  • Miscellaneous

Like our Facebook Fan Page.

Subscribe and get the latest tips, tricks, news, and updates delivered straight to your e-mail inbox.

Enter your email address:

Delivered by FeedBurner


Ameer is your techie friend, the head admin, and editor-in-chief of this blog. In here we share the latest technology news and updates, computer tips and tricks, SEO, games and gaming news, and other tech articles that aims to help you with today's technology.


No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to mailing list and download the content.
  We hate SPAM and promise to keep your email address safe.
Disclaimer: You are being added to a mailing list which you can unsubscribe at any time.
Read previous post:
How to Run Android Apps on Mac, Linux and Windows

Run and install Android apps on Mac, Linux or Windows computers through ARChon , a modified version of Google’s App...