Top Banner
“The quieter you become, the more you able to hear” Group 02 : Thieu Quang Cuong Ho Ngoc Doanh Nguyen Duc Cuong
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Backtrack

“The quieter you become, the more you able to hear”

Group 02: Thieu Quang Cuong Ho Ngoc Doanh Nguyen Duc Cuong

Page 2: Backtrack

Introduction

Linux based operating system.

Aimed at digital forensics and penetration testing.

Backtrack has many security tools compiled and preinstalled

Named after “Backtrack” a search algorithm

The newest version is Kali Linux, was released at March 2013

Page 3: Backtrack

Why we like BACKTRACK?

Open Source Platform. Linux platform

More number of tools availableEasier to script and perform operations

Has better compatibility with tools (nmap) Compiled toolkit

Lesser dependency at client side Easy to use – Ubuntu + GUI

Page 4: Backtrack

Merger of two  formerly competing distributions focused on penetration testing.

○ WHAX- a Slax based Linux distribution developed by Mati Aharoni, a security consultant.  Earlier versions of WHAX were called Whoppix and were based on Knoppix

○ Auditor Security Collection- a live CD based on Knoppix included 300 tools.

History

Page 5: Backtrack

GNOME OR KDE

Page 6: Backtrack

Starting with Backtrack• You need to log in first

– User name: root– Password: toor

• The graphical desktop does not start by default#> startx

Page 7: Backtrack
Page 8: Backtrack

Categories

Page 9: Backtrack
Page 10: Backtrack

Information Gathering and Enumeration ToolNmap-Utility for network exploration and

security auditing.Wireshark-Network Protocol analyzer.Hping-TCP/IP packet assembler/analyzer.Maltego- Information Gathering tool.

Important tools

Page 11: Backtrack

Vulnerability Assessment ToolNiktoNessusW3afBurpSuite

Exploitation tools Metasploit Exploitdb Sqlmap Aircrack-ng Beef SET (Social Engineering Toolkit)

Important tools

Page 12: Backtrack

Maintaining AccessWebshellsMetasploit

Reverse EngineeringOllydbg

ForensicsAutospyWiresharkPdfidVoltality

Important tools

Page 13: Backtrack

Reporting ToolDradisMagictree

Important tools

Page 14: Backtrack

Thanks for listening!