What Is BackTrack 5 ? Free Download Back Track 5 New Full Version For All Operating Systems
BackTrack 5
HI Guys.Today i tell you about Back Track 5 operating system.BackTrack was a distribution based on the Debian GNU/Linux distribution aimed atdigital forensics and penetration testing use. It was named after backtracking, a search algorithm. In March 2013 the Offensive Security team later replaced it with a successor product, Kali Linux.
History
The BackTrack distribution originated from the merger of two formerly competing distributions which focused on penetration testing:
- WHAX: a Slax based Linux distribution developed by Mati Aharoni, a security consultant. Earlier versions of WHAX were called Whoppix and were based onKnoppix.
- Auditor Security Collection: a Live CD based on Knoppix developed by Max Moser which included over 300 tools organized in a user-friendly hierarchy.
The overlap with Auditor and WHAX in purpose and in their collection of tools partly led to the merger.
Tools
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to Security Audit. Support for Live CDand Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk and network is also an option.
BackTrack includes many well known security tools including:
- Metasploit for integration
- RFMON, injection capable wireless drivers
- Aircrack-ng
- Gerix Wifi Cracker
- Kismet
- Nmap
- Ophcrack
- Ettercap
- Wireshark (formerly known as Ethereal)
- BeEF (Browser Exploitation Framework)
- Hydra
- OWASP Mantra Security Framework, a collection of hacking tools, add-ons and scripts based on Firefox
- Cisco OCS Mass Scanner, a very reliable and fast scanner for Cisco routers with telnet and enabling of a default password.
- A large collection of exploits as well as more commonplace software such as browsers.
BackTrack arranges tools into 12 categories:
- Information gathering
- Vulnerability assessment
- Exploitation tools
- Privilege escalation
- Maintaining access
- Reverse engineering
- RFID tools
- Stress testing
- Forensics
- Reporting tools
- Services
- Miscellaneous
0 comments: