Friday, November 8, 2013

Why BackTrack is recommended for Hackers ?

If you're a hacker or a geek who is seeking to do something different,then you might be familiar with the most recommended os BACKTRACK.Penetration (Pen) testing and security auditing are now part of every system administrator's "other duties as assigned." BackTrack Linux ( is a custom distribution designed for security testing for all skill levels from novice to expert. It has the largest collection of wireless hacking, server exploiting, web application assessing, social-engineering tools available in a single Linux distribution.BackTrack Linux contains more than 300 security tools and utilities that are all open source. Many security professionals prefer them over expensive commercial programs. And, hackers certainly prefer hundreds of no cost, high-end applications to anything commercial. One reason for BackTrack's popularity is its anonymity. You don't have to register (Registration is optional). No names, bank accounts, or user accounts are associated with obtaining the ISO image. Additionally, no spyware will report back to any vendor.

In short, BackTrack's tagline says it all: "The quieter you become, the more you are able to hear."

The distro is a bootable, live DVD that's approximately 2GB in size. If you decide to install it to a hard disk or USB drive, the installation expands to almost 7GB. BackTrack is perfectly suited to installation to a USB drive, so that it's portable and stealthier than a hard disk install. A 16GB USB drive holds the installation with plenty of room for saving files and data.
Remember that you'll need to save your data from your information gathering exercises so that you can write security audit reports for your clients. The Live DVD is powerful but considerably slower than a hard disk or USB disk. If you use the DVD, use a USB drive or mountable hard disk partition to save the information you gather.

What's Included in the Distro

The BackTrack Distribution includes the following major tool categories:

Information Gathering
Vulnerability Assessment
Exploitation Tools
Privilege Escalation
Maintaining Access
Reverse Engineering
RFID Tools
Stress Testing
Reporting Tools


No comments:

Post a Comment