• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

BackTrack Live Hacking CD BETA 3 Released

January 22, 2008

Views: 93,834

The guys at BackTrack e-mailed me to let me know their Version 3 BETA has been released recently, and perhaps our readers would like to know about it.

For those that don’t know BackTrack evolved from the merging of two wide spread security related distributions – Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new comers are using BackTrack as their favorite toolset all over the globe.

BackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts. Every package, kernel configuration and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.

Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).

Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.

It’s definitely a favourite amongst pen-testers, myself included.

You can donwload BackTrack BETA 3 here (Please try and use the torrent links and seed!):

BackTrack 3 Beta – 14-12-2007

Or read more here.

Share
Tweet2
Share
Buffer
WhatsApp
Email
2 Shares

Filed Under: Hacking Tools, Linux Hacking Tagged With: auditor, backtrack, live-hacking-cd, livecd, metasploit, penetration-testing, whax



Reader Interactions

Comments

  1. mumble says

    January 22, 2008 at 9:45 am

    BackTrack 3 is also the first security distro to add support for the Eeepc by ASUS. That combination is very nice, as you have access to effectively all the power of BackTrack on a laptop that weighs about 2 pounds (1kg).

  2. goodpeople says

    January 22, 2008 at 11:14 am

    YEE-HAW!

    Download in progress..

  3. James says

    January 22, 2008 at 9:02 pm

    download the USB version, runs smoother than the CD version. Well its has for me anyway.

  4. mumble says

    January 23, 2008 at 9:18 am

    I took a lab box and installed it directly on the HDD. So far, it looks pretty clean. On my Eeepc, I’ve had trouble with the wireless driver cutting in and out, but there’s a patch for the problem, and it should be fixed before release.

  5. d347hm4n says

    January 24, 2008 at 5:27 pm

    Bit late for this, have already had a play around with it, great work, thanks to muts and max over at the BT|3 Cr3w

  6. Dornez says

    February 1, 2008 at 10:36 pm

    Have there been any major changes other than increased hardware compatibility?

  7. d347hm4n says

    February 2, 2008 at 4:09 pm

    I took this straight from their site.

    http://backtrack.offensive-security.com/index.php/Main_Page

    A few updates about the upcoming release:

    * We will be releasing a ~ 1 GB USB / DVD image, as well as a stripped down 700 MB iso.
    * Dual core issues have been fixed (mostly due to the new kernel – 2.6.15.5).
    * Wireless card compatibility has maximised, and injection patches applied wherever possible.
    * Xorg configuration scripts have been improved.
    * Updated exploit repositories, updated metasploit exploit framework and dependencies.
    * PXE network boot feature finally added (USB Version)
    * PwnSauce Instant John the Ripper Cluster feature finally added (USB version)
    * Compiz with ATI/Intel Drivers (USB version) get the Nvidia drivers here
    * Get BT3 Kernel Sources
    * More updates coming soon

  8. eM3rC says

    February 7, 2008 at 5:47 am

    Backtrack and Metasploit are the two best hacking distros out there (in my opinion).

    Downloading now!

  9. Fast|Track says

    March 23, 2008 at 12:23 pm

    None of you appear to have picked up on some facts about BT3 so I

  10. Pantagruel says

    March 23, 2008 at 6:20 pm

    @Fast|Track

    Thanks for the info, but I guess the majority of us will use BT (be it 2 or 3beta) as a live distro (read above USB/CD/DVD/whatever bootable medium) and hopefully will not use BT as a real life OS (I for one would not and consequently use the live CD.
    I know this doesn’t resolve the insecure kernel, but will reduce the risk (have yet to come across another actively trying to get into my box while I am scanning through the network with BT)

  11. fever says

    April 8, 2008 at 7:34 pm

    got it, love it, would recommend it to everyone.

  12. macdaddy says

    May 8, 2008 at 7:52 pm

    am downloading, but after looking into the other comments, doesnt look like such a good idea anymore …

  13. Andy says

    May 8, 2008 at 8:37 pm

    Hi guys,

    wonder if anyone can help me. iv got the iso @ 701mb.Im using vista on my laptop and i really want to be able to use this software. Do i need any external software such as VMware or can i just burn to CD and it will run. i dont really wanna have to have a dual boot set up. Im new to this software but heard raving reviews.

    Please help guys. Or email me at [email protected]

    cheers

    Andy

  14. Kevins says

    May 16, 2008 at 5:44 pm

    Use VMWare / Microsoft Virtual PC to install / run Backtrack.. While even if you run directly on to you PC while booting from the CD -ROM it won’t get installed as it is a Live-CD…

    for installing it on your hard drive or Virtual Machine.. use the link below.. or try googling up…

    http://backtrack.offensive-security.com/index.php?title=Howto:Install_GUI

  15. plushNbl0@t3d says

    May 24, 2008 at 7:01 am

    I’m fairly new to pentest. I’ve played a little with BT2, BT3 iso, and BT3 usb. If you plan on using as a live disk and not installing, I recommend USB. For logical reasons the live usb distro runs faster, because your not getting info from an optical drive. BT2 doesn’t come stock with usb drivers for my hardware, both BT3 iso and usb do. bt2 doesn’t come stock with drivers for the wireless card in my laptop, bt3 does. For someone new to linux i recommend bt2, because it will force you to learn how to configure/install many things that normal windows users have automated for them. bt2 was my first real intro to linux. having learned how to get my wirless card up i am now hooked. I love a good challenge

  16. robo says

    July 15, 2008 at 11:05 pm

    he guys.. new to linux..ish..
    was wondering.. ( sorry to ask lame Q’s) but
    has BT got ALL the software i need to test to see if i can access secure wifi connections ?
    and is there a how to, for the software incorporated in BT3 ?
    thanks guys :)

  17. d347hm4n says

    February 2, 2009 at 5:28 pm

    @robo, for fear of helping a n00b, go here:http://forums.remote-exploit.org/

    Don’t ask a single question until you have really read all of the threads. They have all of the information that you seek. And remember, you can only gain access to networks with the EXPLICIT permission of the owner.

    Peace and Love,

    d3 ;)

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

AI-Powered Malware - The Next Evolution in Cyber Threats

AI-Powered Malware – The Next Evolution in Cyber Threats

Views: 278

Introduction Artificial Intelligence (AI) is reshaping cybersecurity on both sides of the … ...More about AI-Powered Malware – The Next Evolution in Cyber Threats

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 378

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 701

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 605

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 646

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 487

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (230)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,299,707)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,113)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,648)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,695)
  • Password List Download Best Word List – Most Common Passwords (933,536)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,183)
  • Hack Tools/Exploits (673,305)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,198)

Search

Recent Posts

  • AI-Powered Malware – The Next Evolution in Cyber Threats May 21, 2025
  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy