Email Techs

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 26 September 2009

Backtrack 4 Overview

Posted on 10:14 by Unknown

So, Its Linux Backtrack 4 which i am going to discuss now in this blog post.

Its the newly released backtrack 4,

which is HEAVEN for hackers to find 200_backtrack_07

exploits and break the hell out of the security,

well i am not that good in backtrack

but i think i am good enough to write this article !! :D

 

So, lets start this blog post is on installing the latest version of backtrack i.e. Backtrack 4 And its overview .

its really cool if you are a penetration testers sector or a hacker or you are a security guy.

 

Backtrack is extension of LINUX which you all must be aware off.

Quiz  :  What is Backtrack ?

Backtrack is the most top rated Linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

 

Now, A mockup

Backtrack , Backtrack 4 has become the most used Linux security distro by security

pentesters out there. If being compared to Backtrack 3 , backtrack 4 has less tutorials and documentations than backtrack 3 does.

 

In this post , you will watch a video about Backtrack 4 tutorial , the video is about installing backtrack 4.

 

 

If you are totally new to backtrack LIKE ME .

then you must check out this website of backtrack developers.

 

So where were we,

if you wan to download backtrack 4 then you must download Backtrack 4 Pre Final DVD ISO

 

Backtrack 4 Pre Final DVD ISO- 1.4 GB md5 b0485da6194d75b30cda282ceb629654
OR

Backtrack 4 Pre Final VMware 6.5.2 Workstation Image - 2.1 GB md5 1e790d4c6d68acc971a1ad3bd3731cdc

 

If you are really interested in pro hacking then try this,

 

The earlier version of backtrack was backtrack 3 which was a HIT.

 

600_backtrack-wallpaper

 

A little more about Backtrack

 

Backtrack is a Linux distribution distributed as a Live CD which resulted from the merger of WHAX (previously Whoppix) and the Auditor Security Collection, which is used for penetration testing. It allows the user to include customizable scripts, additional tools and configurable kernels in personalized distributions. The Backtrack project was created by Mati Aharoni and Max Moser and is a collaborative effort involving the community.

  • Backtrack 2 was released on March 6, 2007 and includes over 300 security tools. A beta version of Backtrack 3 was released on December 14, 2007, but it was announced that its main focus was to support more and newer hardware as well as provide more flexibility and modularity.
  • Backtrack 3 was released on June 19, 2008. New additions include SAINT and Malt ego. Nessus was not included in this release, and the developers decided not to upgrade from kernel version 2.6.21.5.
  • Backtrack 4 Beta was released on February 11, 2009, with the biggest change being the move to Debian.
  • Backtrack 4 pre-release was released on 19 June 2009.

The key additions to the Backtrack suite are notably -

  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • AutoScan-Network - AutoScan-Network is a network discovering and managing application
  • Nmap
  • Ettercap
  • Wireshark (formerly known as Ethereal)

Backtracks functionality further increases with the arrangement of each tool in 16 categories. The tool categories are as follows -

    • Enumeration
    • Exploit Archives
    • Scanners
    • Password Attacks
    • Fuzzers
    • Spoofing
    • Sniffers
    • Tunneling
    • Wireless Tools
    • Bluetooth
    • Cisco Tools
    • Database Tools
    • Forensic Tools
    • Reversing
    • Misc

 

 

For Further reference i refer to you there LINKS

http://www.remote-exploit.org/backtrack.html

http://backtrack.offensive-security.com/index.php/Main_Page

http://lifehacker.com/5166530/backtrack-is-a-security+focused-live-cd-packed-with-system-tools

 

No other commercial or freely available analysis platform offers an equivalent level of usability with automatic configuration and focus on penetration testing.

Email ThisBlogThis!Share to XShare to Facebook
Posted in Hacking, Hacking Software | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • New iPhone Worm That Attacks Jail Broken iPhones Also
    Well its again the iPhone which have come to the headlines again , But this time the apple is really pissed of with the kind of work the Ha...
  • Ophcrack Guide : Hack Any Password In Windows
    There might be many times you have heard of Ophcrack, now what is actually it well is a popular to crack passwords in windows. Many...
  • ‘New Moon” Fans Beware Of Hackers
    We are Getting Constant Rumors from many places that Hackers are going to target the the fans of the upcoming movie “New Moon” ...
  • Modern Warfare 2 Hacked By Hackers Now Up For Sale
    Looks like our hackers mate out there have now come with some cool shit, Its the New COD : MODERN WARFARE 2 which is the continuation o...
  • Official Indian Army Website –“Safe From Hackers”
    The new website for the Indian army (IA) have been launched and the authorities are saying it is really safe from any Hackers Activity. ...
  • Dear Mozilla, Please “DONT” fix this. [Pic]
    Today only i found this pic on Digg and i thought there should be a “DONT” in it. isn't it ? ..
  • Norton And Kaspersky On Commercial Fight For Security Suit’s 2010
    When there is Cyber crime there are antivirus and after that there is a fight in between them. You all be knowing about the two most pop...
  • Ubisoft Hacked : Fake or Real ?
    Some days ago we got news about Ubisoft being hacked by some hackers and was being believed till yet but after then some news breached out...
  • Peer Block : Safeguard Yourself From Harmful Server’s
    Have you ever heard of a software called Peer Guardian . So do you know what it is actually well here is the guide for you guys. Peer G...
  • 30 Million Facebook, MySpace, and Orkut ID’s Hacked
    Hackers Have crossed the security boundaries of a widget and multi-social networking based company RockYou.com which host many users from s...

Categories

  • Broadband
  • cyberwar
  • Ebooks
  • email
  • Gamers
  • Guides
  • Hacked
  • Hacker The Dude News
  • Hacking
  • Hacking Software
  • keylogger
  • Misc
  • Mobie's
  • News
  • Orkut
  • PHP
  • Pics
  • Pro Hacks
  • Small Hacks
  • Stylize
  • Tools
  • Torrent
  • Tricks
  • Twitter
  • Video's
  • Virus's
  • Weekly Top 10 Internet Tools
  • Windows
  • XSS

Blog Archive

  • ►  2010 (32)
    • ►  March (7)
    • ►  February (3)
    • ►  January (22)
  • ▼  2009 (123)
    • ►  December (34)
    • ►  November (30)
    • ►  October (24)
    • ▼  September (9)
      • Backtrack 4 Overview
      • Make Your Computer Talk !
      • Impress Your Friends With Invisible Folders !!
      • Xss Phishing
      • How To Download as premium on all premium hosting !
      • 100 Cool Windows Shortcut you must know!
      • Weekly Top 10 Internet tools #2
      • Around The Hacks In 90 seconds #1
      • How To Hack Windows 97 Security
    • ►  August (6)
    • ►  July (1)
    • ►  June (3)
    • ►  May (16)
Powered by Blogger.

About Me

Unknown
View my complete profile