BackTrack Linux Penetration Testing Distribution
Welcome to Backtrack-Linux.org, home of the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you re making BackTrack you Install BackTrack. boot it from a Live DVD or thumbdrive, the penetration distribution has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
Note: BackTrack Linux is no longer being maintained. Please check www.kali.org
Best viewed in full screen !
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.
Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security, a leading Information Security Training provider. Whether you re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.
Furthermore, if you ll get seriously into the business you ll be able to get security certification. Becoming a professional in the field is possible if you have just the right kind of information. When you ll learn the material required for information-security certifications. it will give you just the extra-edge you need as a professional over all the other security experts around. Information of security training is one of those things that should be taught only by professionals, and this is what OffSec offers you.
After you finish your studies, you ll be able to do security penetration testing at the highest level; and indeed also only for the highest bidder. Security certifications at the right place and at the right time, it s exactly what you need.
Offensive Security RSS Feed
A few months ago, we decided to make a new module for our Advanced Windows Exploitation class. After evaluating a few options we chose to work with an Adobe Flash 1day vulnerability originally discovered by the Google Project Zero team. Since we did not have any previous experience with Flash internals, we expected a pretty [ ]
Admittedly, somewhat of a click-bait blog post title – but bear with us, it s for a good reason. Lots of work goes on behind the scenes of Kali Linux, tools get updated every day and interesting new features are added constantly. Most of these tool updates and feature additions go unannounced, and are then discovered by inquisitive users [ ]
Managing the Exploit Database is one of those ongoing tasks that ends up taking a significant amount of time and often, we don t take the time to step back and look at the trends as they occur over time. Have there been more exploits over the years? Perhaps fewer? Is there a shift in platforms [ ]
In our recent blog post What it means to be an OSCP we asked OSCPs to share their experience of what it means to have earned this certification and we received many tales of hardship and reward. Mike Benich sent in an entry that we felt very much captured the essence of the Offensive Security [ ]
The time has come for yet another Kali ARM image release with new and updated images. Our collection of supported ARM hardware grows constantly with new images from Raspberry Pi 3, Banana Pi and Odroid-C2, with the latter being our first real arm64 image. We re really excited about our new arm64 build environment and hope [ ]
A while back we introduced the idea of Kali Linux Customization by demonstrating the Kali Linux ISO of Doom. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment. The customised Kali ISO would undergo an unattended autoinstall in a remote client site, and automatically connect back to [ ]
With the recent release of Kali Rolling 2016.1 completed, we ve gone ahead and updated our custom Kali VMware, VirtualBox, and ARM images. Here s a few news items and updates that we have regarding these images for those who prefer to get them pre-built.
NetHunter has been actively developed for over a year now, and has undergone nothing short of a complete transformation since its last release. We ve taken our time with v3.0, and the results are a complete overhaul of the NetHunter Android application, with a more polished interface and a fully functioning feature set. Through the amazing NetHunter community work led by binkybear, fattire, and jmingov, [ ]
When a student earns an Offensive Security certification such as the OSCP, it is a testament to the personal investment they have made as part of a commitment to excellence. Like getting a degree from a university, no matter what happens in your life from that point forward, the fact is your earned that certification [ ]
A couple of weeks ago, we had the opportunity to scan and map a large IP address space covering just over 3 million hosts. Our tool of choice for this was the fast and capable masscan, which is packaged in Kali. While masscan has several convenient output formats, such as binary and XML, one feature [ ]
With Kali 2.0 now released, we wanted to share a few post install procedures we find ourselves repeating over and over, in the hopes that you will find them useful as well. We ve also slapped in some answers to common questions we ve been getting. Here is our top 10 list:
Last years event was a rousing success, with many attendees staying all day long and working through the multiple exercises. We had such a great time, we wanted to do it again. This is a great chance to get hands on with Kali 2.0, learning the cutting edge features and how to best put them [ ]
New Features in the Exploit Database Over the past 6 years, we have been maintaining and updating the Exploit Database on a daily basis, which now boasts over 35,000 exploits. While we constantly work on improving our back-end and entry quality. Over the years there haven’t really been any updates.
Kali Linux Features Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often making use of some really amazing features that Kali Linux has to offer. One of these interesting use-cases includes booting instances of Kali Linux Live over HTTP, directly to RAM. We realized.
Kali NetHunter 1.2 Released! Kali NetHunter 1.2 is fresh out, with a whole bunch of improvements, bug fixes….and yes, Android Lollipop support. This means that NetHunter now supports the Nexus6 and Nexus 9 devices too! This is awesome news to all those who have bought these new Nexus devices and.