BackTrack v2.0 – Hackers LiveCD Finally Released


BackTrack is the result of the merging of the two innovative penetration testing live linux distributions Auditor security collection and Whax. By combining the best features from both distributions and putting continous development energy, the most complete and finest security testing live distro was born: BackTrack

BackTrack

BackTrack v.2.0 is finally released, it’s been a long wait that’s for sure, it does look good though so perhaps it was worth waiting.

You can find some screenshots here.

BackTrack ranked number one in Darknet’s well regarded list 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery).

It’s taken BackTrack almost 5 months to pull themselves out of the beta stage. Many features have been added and many of the persistent bugs have been fixed.

New exciting features in BackTrack 2, to mention a few:

  • Updated Kernel-Running 2.6.20, with several patches.
  • Broadcom based wireless card support
  • Most wireless drivers are built to support raw packet injection
  • Metasploit2 and Metasploit3 framework integration
  • Alignment to open standards and frameworks like ISSAF and OSSTMM
  • Redesigned menu structure to assist the novice as well as the pro
  • Japanese input support-reading and writing in Hiragana / Katakana / Kanji.

As usual, Nessus is not included into BackTrack as Tenable forbid redistribution.

The public wiki project is available at http://backtrack.offensive-security.com. Please help us by providing entries in HCL (Hardware compatibility list).

Read more about BackTrack here.

You can download BackTrack here:

BackTrack 2 Stable release Mar 06 2007

Posted in: Hacking Tools, Linux Hacking

, , , , , , ,


Latest Posts:


Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.


6 Responses to BackTrack v2.0 – Hackers LiveCD Finally Released

  1. honest lawyer September 7, 2007 at 6:07 pm #

    OK this all sounds great, but wont using this unwittingly win me eyes from echelon, the feds, interpol and all the other Bablyonians? Why is there no legality info on their homepage?Will visiting their homepage without proxy also win you a slot in echelon servers? I’m curious, the world is twitchy nervous these days, with all the bad things nice people do to each other ‘n all

  2. TheRealDonQuixote September 8, 2007 at 5:46 am #

    @ Honest Lawyer
    BackTrack is a security/penetration testing linux distro. Nothing illegal about the actual site or download at all, its how you use it that matters. It is pretty much basic knowledge that one crosses the line into being legally at risk, when one compromises a system that they either do not own or have written permission from the owner. Of course the laws around the hacking issues are pretty hard to enforce, kinda like bittorrent DL’s. In short, you’re totally safe unless you hack into the pentagon’s servers and you’re NOT in china ;)

    As for Echelon et al, no worries, I’ve been on their watchlist/scanned by all sorts of “secret” gov’t servers for a couple years now. And I have yet to be incarcerated. Darknet got a takedown notice for posting “Brutus Password Cracker” but that was it, as far as I know.

    Basically, all those peeps that you are worried about, are either completely incompetent or they don’t care unless a large business entity gets all pissed and starts suing people like the RIAA/MPAA. Gov’ts know who butters their bread.

    So feel free to learn away while hacking.

  3. Sandeep Nain September 8, 2007 at 11:02 am #

    honest lawyer: Backtrack should be considered as a set of tools to be used by penetration testers to test the security of the information systems so that any vulnerability found can be fixed before it gets exploited by the attackers

    .. and I believe as long as you are using the tools to secure the systems and not doing anything illegal… it doesnt matter if you may get spotted by echeleon servers or FBI…

    and as TRDQ said:you

  4. Ami June 22, 2008 at 1:39 pm #

    Hi,

    I have downloaded some stuff for wireless hacking live CD but enable to play it .I am using windows vista machine and it is having an file KNOPIX of 631mb Please assist how to run this.As we think it is a CD from Auditor security collection.

    Thanks & regards
    Amit

  5. Sleepy June 23, 2008 at 11:23 pm #

    Amit, at first glance it seems you are writing the file to the disk as data instead of burning it as an image? Or maybe you’re trying to load a bootable OS disk while still an OS? Regardless, I have a hard time believing this OS and its tools will do you much good, forgive me if I’m making a false judgment, but if you cant get the cd to work I don’t think you posses the expertise and understanding to use it. If you have a serious situation concerning network penetration testing or forensics you should contact a professional. If it’s academic, well, have fun. ;) If you still need help, post again with more specific information and I’ll try to help you.

  6. gomika November 6, 2008 at 12:51 pm #

    Hi guys,. is there any tutorial how to use this live cd?