BackTrack 5 R3 | |
Developer | Mati Aharoni, Devon Kearns, Offensive Security[1] |
---|---|
OS family | Linux (Unix-like) |
Working state | Superseded by Kali Linux |
Source model | Open source |
Latest release | 5 R3 / August 13, 2012; 7 years ago |
Platforms | i386 (x86), AMD64 (x86-64), ARM |
Kernel type | Monolithic |
Default user interface | Bash, KDE Plasma Desktop, Fluxbox,[2][3]GNOME |
License | Various |
Official website | www.backtrack-linux.org |
The Secunia Personal Software Inspector (PSI) even automates the updates for your insecure programs, making it a lot easier for you to maintain a secure PC. Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer. 6/10 (445 votes) - Download BackTrack Free. Of the utilities in BackTrack have been taken straight from the world of computer hackers. Software languages.
BackTrack was a Linux distribution that focused on security, based on the KnoppixLinux distribution aimed at digital forensics and penetration testing use.[4] In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux.[5]
History[edit]
The BackTrack distribution originated from the merger of two formerly competing distributions which focused on penetration testing:
- WHAX: a Slax-based Linux distribution developed by Mati Aharoni, a security consultant. Earlier versions of WHAX were called Whoppix[6] and were based on Knoppix.
- Auditor Security Collection: a Live CD based on Knoppix developed by Max Moser which included over 300 tools organized in a user-friendly hierarchy.
On January 9th, 2010, BackTrack 4 improved hardware support, and added official FluxBox support.[7] The overlap with Auditor and WHAX in purpose and in collection of tools partly led to the merger. The overlap was done based on Ubuntu Lucid LTS starting from BackTrack 5.[8]
Tools[edit]
BackTrack provided users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to Security Audit. Support for Live CD and Live USB functionality allowed users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk and network was also an option.
BackTrack included many well known security tools including:
- Metasploit for integration
- Wi-Fi drivers supporting monitor mode (rfmon mode) and packet injection
- Reaver, a tool used to exploit a vulnerability in WPS
- Wireshark (formerly known as Ethereal)
- Hydra
- OWASP Mantra Security Framework, a collection of hacking tools, add-ons and scripts based on Firefox
- Cisco OCS Mass Scanner, a very reliable and fast scanner for Cisco routers to test default telnet and enabling password.
- A large collection of exploits as well as more commonplace software such as browsers.
- Armitage - java frontend to Metasploit.
BackTrack arranged tools into 12 categories:
- Information gathering
- Vulnerability assessment
- Exploitation tools
- Privilege escalation
- Maintaining access
- RFID tools
- Stress testing
- Forensics
- Reporting tools
- Services
- Miscellaneous
Releases[edit]
Date | Release |
---|---|
May 26, 2006 | First stable release of BackTrack [9][10] |
October 13, 2006 | BackTrack 2 beta #1 released [11][12] |
November 19, 2006 | BackTrack 2 beta #2 released [13] |
March 6, 2007 | BackTrack 2 final released [14][15] |
December 14, 2008 | BackTrack 3 beta released [16][17] |
June 19, 2008 | BackTrack 3 final released (Linux kernel 2.6.21.5) [18][19] |
February 11, 2009 | BackTrack 4 beta released [20] |
January 9, 2010 | BackTrack 4 final release (Linux kernel 2.6.30.9) [21][22] |
May 8, 2010 | BackTrack 4 R1 release [23] |
November 22, 2010 | BackTrack 4 R2 release [24] |
May 10, 2011 | BackTrack 5 release (Linux kernel 2.6.38) [25][26] |
August 18, 2011 | BackTrack 5 R1 release (Linux kernel 2.6.39.5) [27] |
March 1, 2012 | BackTrack 5 R2 release (Linux kernel 3.2.6) [28] |
August 13, 2012 | BackTrack 5 R3 release [29] |
Whenever a new version of BackTrack was released, older versions would lose their support and service from the BackTrack development team. There are currently no supported versions of BackTrack.[30]
References[edit]
- ^'Developers'. Archived from the original on 2010-03-22. Retrieved 2010-03-19.
- ^'HowTo:Install KDE 4.1'. Offensive-security.com. Archived from the original on 2009-08-06. Retrieved 2009-12-12.
- ^'BackTrack 4 tutorial'. Archived from the original on 2011-10-26.
- ^'BackTrack Linux – Penetration Testing Distribution'.
- ^'Kali Linux Has Been Released!'. 2013-03-12. Retrieved 2013-03-18.
- ^'BackTrack - remote-exploit.org'.
- ^'BackTrack Linux - Penetration Testing Distribution'. www.backtrack-linux.org. Retrieved 2018-09-18.
- ^'BackTrack Linux - Penetration Testing Distribution'. backtrack-linux.org. 2018-04-09. Archived from the original on 2018-04-09. Retrieved 2018-04-14.
- ^'BackTrack Downloads (seriously old)'. Retrieved 2019-04-09.
- ^'BackTrack Security Final Release'. Retrieved 2019-04-09.
- ^'Downloads'. Retrieved 2019-04-09.
- ^'BackTrack v2.0 Public Beta Has Been Released!'. Retrieved 2019-04-09.
- ^'BackTrack Downloads'. Retrieved 2019-04-09.
- ^'BackTrack Developers Log'. Retrieved 2019-04-09.
- ^'BackTrack 2.0 Final Due End of Febuary [sic]'. Retrieved 2019-04-09.
- ^'Latest News'. Retrieved 2019-04-09.
- ^'BackTrack 3 Beta out!'. Retrieved 2019-04-09.
- ^'BackTrack Developers Log'. Retrieved 2019-04-09.
- ^'BackTrack'. Retrieved 2019-04-09.
- ^'BackTrack Downloads'. Retrieved 2019-04-09.
- ^'BackTrack 4 Final Released'. Retrieved 2019-04-09.
- ^'BackTrack 4 Final Release'. Retrieved 2019-04-09.
- ^'BackTrack 4 R1 – Public Release'. Retrieved 2019-04-09.
- ^'BackTrack 4 R2 Download!'. Retrieved 2019-04-09.
- ^'BackTrack Linux'. Retrieved 2019-04-09.
- ^'BackTrack 5 Release'. Retrieved 2019-04-09.
- ^'BackTrack 5 R1 released'. Retrieved 2019-04-09.
- ^'BackTrack 5 R2 Released'. Retrieved 2019-04-09.
- ^'BackTrack 5 R3 Released!'. Retrieved 2019-04-09.
- ^'BackTrack to be Reborn as Kali Linux!'. 2013-02-01.
External links[edit]
Retrieved from 'https://en.wikipedia.org/w/index.php?title=BackTrack&oldid=920992404'
As security professionals, we strive to be proactive, while also having a good 'plan B' at the ready. While we must accept that there will inevitably be times when we have to pick up the pieces after an exploit, a solid toolkit called BackTrack is designed to help ferret out the insecurities before the malicious hackers do.
![Hacking Hacking](http://2.bp.blogspot.com/-vxvULVp3vBg/T0onUuOgZpI/AAAAAAAAAp0/3oDUF-CIUX4/s1600/setwithbacktrack2.jpg)
![Backtrack wifi hacking software Backtrack wifi hacking software](http://static.flickr.com/34/100644607_c1ba469de7.jpg?v=0)
As a re-entrant to the hacking field, BackTrack 2.0 has been revived with many new tricks. Based on a live Linux distribution requiring no installation, BackTrack performs the role of a digital multifunctional tool that can help pick locks and bug rooms -- so to speak -- while cloaking one's presence. BackTrack 2.0 contains more than 250 modules covering everything from information gathering and network mapping through vulnerability identification, to penetration testing and privilege escalation. BackTrack also has radio network analysis capabilities (for Wi-Fi and Bluetooth), VoIP and telephony analysis tools and even tools for reverse engineering. Backtrack is more than just a collection of automated hacking tools -- it's more like a ninja-on-a-CD, since all the tools are grouped by function and brought together under a single menu.
This is not the first time an all-in-one toolset has been released, but this is certainly one of the most complete offerings, as its integration with Linux-based 802.x Wi-Fi wrappers makes it fairly straightforward to perform wireless sniffing and packet injection. Another feature is BackTrack's integration with the Metasploit framework. Metasploit is designed to automate payloads to provide shell access or privilege escalation, both locally and remotely.
|
While it might seem that BackTrack is meant for bad-attitude black hats, the new version of BackTrack is specifically aligned with the white hat hacker methodologies used by the Information Systems Security Assessment Framework (ISSAF) and the Open Source Security Testing Methodology Manual (OSSTMM). These organizations publish tomes used by many in the industry to provide enterprise-level formal security assessment and testing methodologies.
In the wrong hands, BackTrack can be a scary tool on your network, as it can be run from a CD, hard drive or even a USB thumb drive, and soon it will be available as a VMware virtual image as well. Fortunately, most tools are only as harmful as the people using them.
About the author:
Scott Sidel is an ISSO with Lockheed Martin.
Scott Sidel is an ISSO with Lockheed Martin.
For more information
- Read Sidel's previous edition -- Wireshark: Taking a bite out of packet analysis.
- Can't wait for next month's installment? Check out SearchSecurity.com's IT Downloads section for more valuable security freeware offerings.