Skip to main content

BackTrack 5 Released | Best Operating System For Hackers

BackTrack is back with its new version- BackTrack 5. It was released on May 10th, 2011. I am quite late to inform you about this, but I know many of you didn't know about it release so for that I am here to inform them. BackTrack 5 have got a new and a great look, it is added with new tools, and many more. The developers had worked very furiously for this project.
For them who didn't know what is BackTrack I am discussion some terms for them below.

What is BackTrack?

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. In simple words, its a Linux-based penetration testing tool used by the hackers. BackTrack provides users with the largest and the greatest collection of security testing tools



Features of BackTrack

  • It is freely distributed to all
  • It contains many useful security testing tools
  • Fully Patched with all new and updated tools
  • Can be used without installing
  • Superb Look
  • Can be boot from a USB drive
  • Many more.....
Well Known Tools In BackTrack

  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ophcrack
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)
  • Hydra
  • Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enable default password.
  • A large collection of exploits as well as more commonplace software such as browsers.
Tools in BackTrack are arranged in the following 11 categories:

  • Information Gathering
  • Network Mapping
  • Vulnerability Identification
  • Web Application Analysis
  • Radio Network Analysis (802.11, Bluetooth, RFID)
  • Penetration (Exploit & Social Engineering Toolkit)
  • Privilege Escalation
  • Maintaining Access
  • Digital Forensics
  • Reverse Engineering
  • Voice Over IP

You can download it from here.
Alternate link: Click to download
If you have anything to say or ask post it below.

Comments

Popular posts from this blog

Sharecash Downloader | Bypass Surveys and Download from Sharecash

Sometimes when your looking for the right file and when you have found it,you end up with a sad note because you realize that its a SHARECASH Link.So now,this is the tool which your looking for.To know more about this tool let us see what it actually does. What does the Sharecash Downloader Do ? This auto downloader bypasses the sharecash server by using a premium account and gives you the direct link for the sharecash download.But the important thing to be noted here that in Normal Sharecash you have to finish the survey which takes nearly 10 minutes.But this will get you the the sharecash files download link in seconds ! If your too lazy I have an alternate for you !! I'll Download the Sharecash files for you !! How to use Sharecash Auto Downloader ? It is quite self explanatory to use this tool.Some times you might have a mirror for your Sharecash file.For ex. http://fileups.net/1g9Xe.So in order to convert this link into the original sharecash link for ex. http://sh...

What is Autosys ?

Introduction to Autosys Autosys is an automated job control system for scheduling, monitoring, and reporting. These jobs can reside on any Autosys-configured machine that is attached to a network. An AutoSys job is any single command, executable, script, or Windows batch file. Each AutoSys job definition contains a variety of qualifying attributes, including the conditions specifying when and where a job should be run. Defining Jobs : There are the two methods you can use to create job definitions: ¦ Using the AutoSys Graphical User Interface (GUI). ¦ Using the AutoSys Job Information Language (JIL) through a command-line interface. Autosys Jobs: Job Types and Structure : There are three types of jobs: command, file watcher, and box. As their names imply, command jobs execute commands, box jobs are containers that hold other jobs (including other boxes), and file watcher jobs watch for the arrival of a specif...

Evil Twin and Fake Wireless Access Point Hacks: What They Are, How To Defend

Hacking is a term with a wide variety of acts associated with it. Some are incredibly complex and demand a high degree of knowledge, others are little more than installing some software on your device and acting a bit...less than ethically. One of the most common hacks is also one of the easiest to defend against. This is what is known as a fake wireless access point. Hackers use this tactic to easily steal data of unsuspecting wireless users in public places. What is a fake wireless access point data theft? This type of attack has a number of nicknames associated with it: AP Phishing, Wi-Fi Phishing, Hotspotter, Evil Twins, and Honeypot AP. All of these are associated with creating a fake Wi-Fi connection that people log into, and whose goal is to steal credentials, logins, and passwords. To accomplish this, hackers simply use a piece of software, or app, that is designed to capture data that is sent over a wireless connection. Examples of software that is sued d...