• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

BackTrack 5 Released – The Most Advanced Linux Security Distribution & LiveCD

May 18, 2011

Views: 35,196

We have of course been following BackTrack since the very early days, way back in 2006 when it was just known as BackTrack – A merger between WHAX and Auditor. They’ve come a long way and BackTrack is now a very polished and well rounded security distro, most of the others have dropped off the map leaving BackTrack as the giant in the security LiveCD space.

The last major release was BackTrack Final 4 Released – Linux Security Distribution – back in January 2010.

The BackTrack Dev team has worked furiously in the past months on BackTrack 5, code name “revolution” – they released it on May 10th. This new revision has been built from scratch, and boasts several major improvements over all our previous releases. It’s based on Ubuntu Lucid LTS – Kernel 2.6.38, patched with all relevant wireless injection patches. Fully open source and GPL compliant.

BackTrack 5 – Penetration Testing Distribution from Offensive Security on Vimeo.

The interesting part for me is that the new .ISO downloads offer multiple versions, including a choice between GNOME and KDE desktops and the images include ARM, 32-Bit and 64-Bit versions.

New in Version 5

  • Based on Ubuntu 10.04 LTS;
  • Linux kernel 2.6.38 (with wireless injection patches);
  • KDE 4.6;
  • GNOME 2.6;
  • 32-bit and 64-bit support;
  • Metasploit 3.7.0;
  • Forensics mode (a forensically sound instance);
  • Stealth mode (without generating network traffic);
  • Initial ARM image of BackTrack (for Android-powered devices);
  • All support for Backtrack 4 will end on May 10th, 2011 and BackTrack 4 will not be available for download from our official mirrors from that date onwards.

As for the ARM image, they have had some joy getting BackTrack running on a Motorola Xoom tablet – check it out here.

You can download BackTrack version 5 here:

http://www.backtrack-linux.org/downloads/

Share
Tweet36
Share9
Buffer
WhatsApp
Email
45 Shares

Filed Under: Hacking Tools, Linux Hacking, Networking Hacking Tools Tagged With: backtrack, hacking-livecd, linux-livecd, penetration testing livecd, security-livecd



Reader Interactions

Comments

  1. aim4r says

    May 18, 2011 at 11:35 am

    Really “Fully open source and GPL compliant” ? it has Nessus installed by default (and no openvas)

  2. MiJa says

    May 18, 2011 at 11:49 am

    Hey that are cool news…. but it would be cooler if some one make a pentest android image for the xoom. So you get host support and can add some other wireless adapter. That will make the live more beautyfull ;=)))))))

  3. Hacking Tricks says

    May 18, 2011 at 11:57 am

    its really cool since they are offering two download options.

  4. outlaw says

    May 18, 2011 at 6:37 pm

    Who uses SamuraiWTF?

  5. Captain Sensible says

    May 19, 2011 at 1:37 pm

    Linux Security Distribution…

    Err can we rephrase it as… Ubuntu 10.04 minimal, lots of tools, more tools, tools, tools, tools, tools,….. Oh yeah runs as root. It’s not really a distro is it? More like what happens if you ask kiddies to make a meal you get cake topped with cake cake cake cake cake….

    Root user as default? Isn’t this why we all laugh at XP installations? Skiddie heaven and lame as fuck. From the same security pros who got their server and forum busted. They really should take their own advice and try harder.

    • Darknet says

      May 19, 2011 at 5:36 pm

      That’s a bit harsh isn’t it? Yah maybe they could do better, maybe you could help?

      I still think it’s a pretty cool collection of tools and it puts together a lot of stuff people would struggle to get working.

      No one is suggesting you install BackTrack on a critical infrastructure node.

      • Bogwitch says

        May 20, 2011 at 5:31 pm

        Backtrack is a skiddie tool, make no mistake, it is also a serious security tool. On most security distros, there will be a requirement to run as root quite often so I see no big problem with it.
        I have run tests from Backtrack, Slackware, CentOS, Fedora even Win2K. The one thing each assignment has in common is, following the test, the customer required a wipe (or submission) of my HDD.
        I don’t think anyone is suggesting that Backtrack is a long-term installed use distro, it is what it is.

    • Kamesh says

      May 23, 2011 at 1:18 pm

      Agreed CS comments seem a little over critical less constructive however I think I can understand his disposition. Backtrack is almost completely reliant in it’s notoriety and capability on 3rd party programmers who have created the tools independently.

      I believe the frustration is sourced in that Backtrack’s actual contribution has been bundling the tools together within Ubuntu Linux. Furthermore Ubuntu is commonly discredited for basing the majority of it’s capability on Debian whilst not feeding much back to Debian… take patches for example.

      So it transpires what we have in Backtrack is a copy of a copy. Personally I admire it’s strength in combining so many tools within one platform however I can agree in the argument that there is really a very minor amount of any contribution to the linux community.

      It’s convenient and in some ways overpowering with it’s capability but within a very knowledgeable Linux community notorious for high standards and code scrutiny I think many people (e.g CS) are feeling it clearly could be packaged better with a greater degree of in-house contribution.

      Ultimately people have the choice to use whatever they wish however I do feel there almost needs to be a governing body of the standards an OS should meet. I’m of the opinion personally that if there was less distributions we would all have a closer community and greater amount of shared knowledge and contribution which could only result in higher standards and greater impact upon what is still an achingly Windows dominated market.

      Off subject I do want to say thanks for creating a great site Darknet, it’s a very good recourse!

      • Darknet says

        May 23, 2011 at 5:46 pm

        I agree, but that’s the paradox of Open Source. It’s a blessing and a curse at the same time, if you don’t like something – you can change it. But if the change doesn’t get merged upstream – you can fork off your own project. Which inevitably happens, like with Debian and Ubuntu – Debian moves slow and always has which doesn’t make it very exciting but makes it very stable. Not very good if you want a desktop oriented distro which is user friendly.

        Personally I enjoy the variety (Debian, Ubuntu, Mint, Kubuntu, BackTrack, GnackTrack etc..).

        There’s a place for them all.

        And thanks – I do my best :)

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 289

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 493

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 490

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 690

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,479

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

DataSurgeon is an open-source Linux-based data extraction and transformation tool designed for forensic investigations and recovery scenarios.

DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux

Views: 470

DataSurgeon is an open-source Linux-based data extraction and transformation tool designed for … ...More about DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (73)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,291,667)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,069)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,614)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,675)
  • Password List Download Best Word List – Most Common Passwords (933,462)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,130)
  • Hack Tools/Exploits (673,286)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,143)

Search

Recent Posts

  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025
  • DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux April 28, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy