• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

BackTrack Live Hacking CD BETA 3 Released

January 22, 2008

Views: 93,872

The guys at BackTrack e-mailed me to let me know their Version 3 BETA has been released recently, and perhaps our readers would like to know about it.

For those that don’t know BackTrack evolved from the merging of two wide spread security related distributions – Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new comers are using BackTrack as their favorite toolset all over the globe.

BackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts. Every package, kernel configuration and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.

Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).

Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.

It’s definitely a favourite amongst pen-testers, myself included.

You can donwload BackTrack BETA 3 here (Please try and use the torrent links and seed!):

BackTrack 3 Beta – 14-12-2007

Or read more here.

Related Posts:

  • An Introduction To Web Application Security Systems
  • BloodHound - Hacking Active Directory Trust Relationships
  • Privacy Implications of Web 3.0 and Darknets
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
  • GKE Auditor - Detect Google Kubernetes Engine…
  • CloudFrunt - Identify Misconfigured CloudFront Domains
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools, Linux Hacking Tagged With: auditor, backtrack, live-hacking-cd, livecd, metasploit, penetration-testing, whax



Reader Interactions

Comments

  1. mumble says

    January 22, 2008 at 9:45 am

    BackTrack 3 is also the first security distro to add support for the Eeepc by ASUS. That combination is very nice, as you have access to effectively all the power of BackTrack on a laptop that weighs about 2 pounds (1kg).

  2. goodpeople says

    January 22, 2008 at 11:14 am

    YEE-HAW!

    Download in progress..

  3. James says

    January 22, 2008 at 9:02 pm

    download the USB version, runs smoother than the CD version. Well its has for me anyway.

  4. mumble says

    January 23, 2008 at 9:18 am

    I took a lab box and installed it directly on the HDD. So far, it looks pretty clean. On my Eeepc, I’ve had trouble with the wireless driver cutting in and out, but there’s a patch for the problem, and it should be fixed before release.

  5. d347hm4n says

    January 24, 2008 at 5:27 pm

    Bit late for this, have already had a play around with it, great work, thanks to muts and max over at the BT|3 Cr3w

  6. Dornez says

    February 1, 2008 at 10:36 pm

    Have there been any major changes other than increased hardware compatibility?

  7. d347hm4n says

    February 2, 2008 at 4:09 pm

    I took this straight from their site.

    http://backtrack.offensive-security.com/index.php/Main_Page

    A few updates about the upcoming release:

    * We will be releasing a ~ 1 GB USB / DVD image, as well as a stripped down 700 MB iso.
    * Dual core issues have been fixed (mostly due to the new kernel – 2.6.15.5).
    * Wireless card compatibility has maximised, and injection patches applied wherever possible.
    * Xorg configuration scripts have been improved.
    * Updated exploit repositories, updated metasploit exploit framework and dependencies.
    * PXE network boot feature finally added (USB Version)
    * PwnSauce Instant John the Ripper Cluster feature finally added (USB version)
    * Compiz with ATI/Intel Drivers (USB version) get the Nvidia drivers here
    * Get BT3 Kernel Sources
    * More updates coming soon

  8. eM3rC says

    February 7, 2008 at 5:47 am

    Backtrack and Metasploit are the two best hacking distros out there (in my opinion).

    Downloading now!

  9. Fast|Track says

    March 23, 2008 at 12:23 pm

    None of you appear to have picked up on some facts about BT3 so I

  10. Pantagruel says

    March 23, 2008 at 6:20 pm

    @Fast|Track

    Thanks for the info, but I guess the majority of us will use BT (be it 2 or 3beta) as a live distro (read above USB/CD/DVD/whatever bootable medium) and hopefully will not use BT as a real life OS (I for one would not and consequently use the live CD.
    I know this doesn’t resolve the insecure kernel, but will reduce the risk (have yet to come across another actively trying to get into my box while I am scanning through the network with BT)

  11. fever says

    April 8, 2008 at 7:34 pm

    got it, love it, would recommend it to everyone.

  12. macdaddy says

    May 8, 2008 at 7:52 pm

    am downloading, but after looking into the other comments, doesnt look like such a good idea anymore …

  13. Andy says

    May 8, 2008 at 8:37 pm

    Hi guys,

    wonder if anyone can help me. iv got the iso @ 701mb.Im using vista on my laptop and i really want to be able to use this software. Do i need any external software such as VMware or can i just burn to CD and it will run. i dont really wanna have to have a dual boot set up. Im new to this software but heard raving reviews.

    Please help guys. Or email me at [email protected]

    cheers

    Andy

  14. Kevins says

    May 16, 2008 at 5:44 pm

    Use VMWare / Microsoft Virtual PC to install / run Backtrack.. While even if you run directly on to you PC while booting from the CD -ROM it won’t get installed as it is a Live-CD…

    for installing it on your hard drive or Virtual Machine.. use the link below.. or try googling up…

    http://backtrack.offensive-security.com/index.php?title=Howto:Install_GUI

  15. plushNbl0@t3d says

    May 24, 2008 at 7:01 am

    I’m fairly new to pentest. I’ve played a little with BT2, BT3 iso, and BT3 usb. If you plan on using as a live disk and not installing, I recommend USB. For logical reasons the live usb distro runs faster, because your not getting info from an optical drive. BT2 doesn’t come stock with usb drivers for my hardware, both BT3 iso and usb do. bt2 doesn’t come stock with drivers for the wireless card in my laptop, bt3 does. For someone new to linux i recommend bt2, because it will force you to learn how to configure/install many things that normal windows users have automated for them. bt2 was my first real intro to linux. having learned how to get my wirless card up i am now hooked. I love a good challenge

  16. robo says

    July 15, 2008 at 11:05 pm

    he guys.. new to linux..ish..
    was wondering.. ( sorry to ask lame Q’s) but
    has BT got ALL the software i need to test to see if i can access secure wifi connections ?
    and is there a how to, for the software incorporated in BT3 ?
    thanks guys :)

  17. d347hm4n says

    February 2, 2009 at 5:28 pm

    @robo, for fear of helping a n00b, go here:http://forums.remote-exploit.org/

    Don’t ask a single question until you have really read all of the threads. They have all of the information that you seek. And remember, you can only gain access to networks with the EXPLICIT permission of the owner.

    Peace and Love,

    d3 ;)

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 883

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 892

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 514

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,846

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 586

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 619

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,406,846)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,935)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,383)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,209)
  • Password List Download Best Word List – Most Common Passwords (934,468)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,176)
  • Hack Tools/Exploits (674,119)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,180)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy