• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

BackTrack 5 Released – The Most Advanced Linux Security Distribution & LiveCD

May 18, 2011

Views: 35,246

We have of course been following BackTrack since the very early days, way back in 2006 when it was just known as BackTrack – A merger between WHAX and Auditor. They’ve come a long way and BackTrack is now a very polished and well rounded security distro, most of the others have dropped off the map leaving BackTrack as the giant in the security LiveCD space.

The last major release was BackTrack Final 4 Released – Linux Security Distribution – back in January 2010.

The BackTrack Dev team has worked furiously in the past months on BackTrack 5, code name “revolution” – they released it on May 10th. This new revision has been built from scratch, and boasts several major improvements over all our previous releases. It’s based on Ubuntu Lucid LTS – Kernel 2.6.38, patched with all relevant wireless injection patches. Fully open source and GPL compliant.

BackTrack 5 – Penetration Testing Distribution from Offensive Security on Vimeo.

The interesting part for me is that the new .ISO downloads offer multiple versions, including a choice between GNOME and KDE desktops and the images include ARM, 32-Bit and 64-Bit versions.

New in Version 5

  • Based on Ubuntu 10.04 LTS;
  • Linux kernel 2.6.38 (with wireless injection patches);
  • KDE 4.6;
  • GNOME 2.6;
  • 32-bit and 64-bit support;
  • Metasploit 3.7.0;
  • Forensics mode (a forensically sound instance);
  • Stealth mode (without generating network traffic);
  • Initial ARM image of BackTrack (for Android-powered devices);
  • All support for Backtrack 4 will end on May 10th, 2011 and BackTrack 4 will not be available for download from our official mirrors from that date onwards.

As for the ARM image, they have had some joy getting BackTrack running on a Motorola Xoom tablet – check it out here.

You can download BackTrack version 5 here:

http://www.backtrack-linux.org/downloads/

Related Posts:

  • An Introduction To Web Application Security Systems
  • SmbCrawler - SMB Share Discovery and Secret-Hunting
  • Autoswagger - Automated discovery and testing of…
  • mcp-scan - Real-Time Guardrail Monitoring and…
  • Upload_Bypass - Bypass Upload Restrictions During…
  • SetupHijack - Installer and Updater Race Condition…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools, Linux Hacking, Networking Hacking Tools Tagged With: backtrack, hacking-livecd, linux-livecd, penetration testing livecd, security-livecd



Reader Interactions

Comments

  1. aim4r says

    May 18, 2011 at 11:35 am

    Really “Fully open source and GPL compliant” ? it has Nessus installed by default (and no openvas)

  2. MiJa says

    May 18, 2011 at 11:49 am

    Hey that are cool news…. but it would be cooler if some one make a pentest android image for the xoom. So you get host support and can add some other wireless adapter. That will make the live more beautyfull ;=)))))))

  3. Hacking Tricks says

    May 18, 2011 at 11:57 am

    its really cool since they are offering two download options.

  4. outlaw says

    May 18, 2011 at 6:37 pm

    Who uses SamuraiWTF?

  5. Captain Sensible says

    May 19, 2011 at 1:37 pm

    Linux Security Distribution…

    Err can we rephrase it as… Ubuntu 10.04 minimal, lots of tools, more tools, tools, tools, tools, tools,….. Oh yeah runs as root. It’s not really a distro is it? More like what happens if you ask kiddies to make a meal you get cake topped with cake cake cake cake cake….

    Root user as default? Isn’t this why we all laugh at XP installations? Skiddie heaven and lame as fuck. From the same security pros who got their server and forum busted. They really should take their own advice and try harder.

    • Darknet says

      May 19, 2011 at 5:36 pm

      That’s a bit harsh isn’t it? Yah maybe they could do better, maybe you could help?

      I still think it’s a pretty cool collection of tools and it puts together a lot of stuff people would struggle to get working.

      No one is suggesting you install BackTrack on a critical infrastructure node.

      • Bogwitch says

        May 20, 2011 at 5:31 pm

        Backtrack is a skiddie tool, make no mistake, it is also a serious security tool. On most security distros, there will be a requirement to run as root quite often so I see no big problem with it.
        I have run tests from Backtrack, Slackware, CentOS, Fedora even Win2K. The one thing each assignment has in common is, following the test, the customer required a wipe (or submission) of my HDD.
        I don’t think anyone is suggesting that Backtrack is a long-term installed use distro, it is what it is.

    • Kamesh says

      May 23, 2011 at 1:18 pm

      Agreed CS comments seem a little over critical less constructive however I think I can understand his disposition. Backtrack is almost completely reliant in it’s notoriety and capability on 3rd party programmers who have created the tools independently.

      I believe the frustration is sourced in that Backtrack’s actual contribution has been bundling the tools together within Ubuntu Linux. Furthermore Ubuntu is commonly discredited for basing the majority of it’s capability on Debian whilst not feeding much back to Debian… take patches for example.

      So it transpires what we have in Backtrack is a copy of a copy. Personally I admire it’s strength in combining so many tools within one platform however I can agree in the argument that there is really a very minor amount of any contribution to the linux community.

      It’s convenient and in some ways overpowering with it’s capability but within a very knowledgeable Linux community notorious for high standards and code scrutiny I think many people (e.g CS) are feeling it clearly could be packaged better with a greater degree of in-house contribution.

      Ultimately people have the choice to use whatever they wish however I do feel there almost needs to be a governing body of the standards an OS should meet. I’m of the opinion personally that if there was less distributions we would all have a closer community and greater amount of shared knowledge and contribution which could only result in higher standards and greater impact upon what is still an achingly Windows dominated market.

      Off subject I do want to say thanks for creating a great site Darknet, it’s a very good recourse!

      • Darknet says

        May 23, 2011 at 5:46 pm

        I agree, but that’s the paradox of Open Source. It’s a blessing and a curse at the same time, if you don’t like something – you can change it. But if the change doesn’t get merged upstream – you can fork off your own project. Which inevitably happens, like with Debian and Ubuntu – Debian moves slow and always has which doesn’t make it very exciting but makes it very stable. Not very good if you want a desktop oriented distro which is user friendly.

        Personally I enjoy the variety (Debian, Ubuntu, Mint, Kubuntu, BackTrack, GnackTrack etc..).

        There’s a place for them all.

        And thanks – I do my best :)

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 694

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 722

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 405

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,644

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 504

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 577

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,403,975)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,904)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,362)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,192)
  • Password List Download Best Word List – Most Common Passwords (934,431)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,145)
  • Hack Tools/Exploits (674,084)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,148)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy