BackTrack – Linux Distribution for Penetration Testing

BackTrack Linux

What is BackTrack?

BackTrack Linux

BackTrack is a Linux-based penetration testing operating system that helps network security professionals in the ability to perform reports assessments in a purely native environment dedicated to penetration testing.

Whether you are making BackTrack your main operating system, booting it from a LiveDVD, or using your favorite USB, the penetration testing distribution has been customized down to every application and package, kernel configuration, scripts and patches solely for the purpose of the penetration testing.

BackTrack is intended for all people from network security professionals, or penetration testers to just beginners to the information security field.

BackTrack promotes a fast and easy way to find and update the largest database of information security tools collection up-to-date.

Our community of BackTrack users range from skilled penetration testers in the information and network security field, government entities, information technology people, security enthusiasts, and individuals new and wanted to learn about network and information security.

Whether you’re pentesting wireless, exposing servers vulnerabilities, performing a web application exploits, learning, or doing social-engineering,

BackTrack is the one-stop-shop for all of your security needs.

BackTrack includes many well known security tools including:

  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ophcrack
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)
  • Hydra
  • Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enable default password.
  • Quypt (Terminal Emulator) (which is private software by Crimson Hacking group, which has leaked to the Mainstream) Blackhat
  • A large collection of exploits as well as more commonplace software such as browsers.

BackTrack arranges tools into 12 categories:

  • Information Gathering
  • Vulnerability Assessment
  • Exploitation Tools
  • Privilege Escalation
  • Maintaining Access
  • Reverse Engineering
  • RFID Tools
  • Stress testing
  • Forensics
  • Reporting Tools
  • Services
  • Miscellaneous

No Comments