Jump to content
xisto Community
Sign in to follow this  
0174098224

Hack Tools (for Education And Hobby Only) hack tools that most hackers use

Recommended Posts

For education and hobby use only.

The is a live cd called " backtrack"

 

there are many hacker tools inside include hydra- web cracking tools, wireshark -sniffing tool and ect.

 

BackTrack is the most Top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

 

It's evolved from the merge of the two wide spread distributions - Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new comers are using BackTrack as their favorite toolset all over the globe.

 

BackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts by Tomas M. (http://www.slax.org/) . Every package, kernel configuration and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.

 

After coming into a stable development procedure during the last releases and consolidating feedbacks and addition, the team was focused to support more and newer hardware as well as provide more flexibility and modularity by restructuring the build and maintenance processes. With the current version, most applications are built as individual modules which help to speed up the maintenance releases and fixes.

 

Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).

 

Being superior while staying easy to use is key to a good security live cd. We took things a step further and aligned BackTrack to penetration testing methodologies and assessment frameworks (ISSAF and OSSTMM). This will help our professional users during their daily reporting nightmares.

 

Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.

 

Backtrack currently have 3 version, backtrack 1, backtrack 2 (recommended), backtrack 3 (still consist of many bugs)

Just type in backtrack in google and you will find it.

Burnt it in a cd and boot it and enjoy the world of backtrack.

Share this post


Link to post
Share on other sites

I have not tried this particular distribution but it sounds complete. The one drawback to the CD format is the lack of updates. Metasploit and Nessus both have fairly regular updates to their databases so just like antivirus application, it is important to keep your scanning database updated. A read only CD is good for forensics work where you do not want to disturb the underlying system and especially file system, but I still prefer dedicating a complete system to these tasks.

Share this post


Link to post
Share on other sites

Toghether with a friend of mine we have tried this cd and while it offers a huge amount of tools, it still need a lot of improvements. The first problem we've encountered was the fact that it was very unstable. Another problem was that it was very hard to use all those tools, backtrack is nothing more than a livecd filled with command line applications. I know CLI apps are more powerfull than the GUIs, but even a simple GUI could make hacking a nicer experience :( .ps. we are no real hackers, we only wanted to get WEPkey from another wireless network at school so we could access internet without the limits that our network admin has implemented (very limited set of open ports and only 20kbps download speed).

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.