“If you want to learn Hacking then Backtrack should be your first choice”
Backtrack is an operating system based on Linux Distribution. This OS is used for Penetration testing purposes in the network. Its a latest technology used for security purposes in Industry. As it is a free and open source OS, you can easily view the source code of the penetration tools which are present in this OS.
Backtrack 5 R1 is the latest version of this operating system in market, with code-name “Revolution and its Revision”. Backtrack is a penetration testing and security auditing platform which provides advance tools to identify, detect and exploit any network or vulnerabilities.
Backtrack is an operating system based on Linux Distribution. This OS is used for Penetration testing purposes in the network. Its a latest technology used for security purposes in Industry. As it is a free and open source OS, you can easily view the source code of the penetration tools which are present in this OS.
Backtrack 5 R1 is the latest version of this operating system in market, with code-name “Revolution and its Revision”. Backtrack is a penetration testing and security auditing platform which provides advance tools to identify, detect and exploit any network or vulnerabilities.
This operating system is created by merging three different live Linux penetration testing distribution -IWHAX, WHOPPIX, and Auditor. Its current version is based on Ubuntu Linux Distribution.
Purpose of Backtrack Operating System:
This operating system contains a number of tools that can be use for penetration testing process.
Some of you are thinking about actually, “what is penetration testing?”. Penetration testing is often a confused term. So don't panic about this term.
Penetration testing is totally depend on human intelligence. In this you have to be think that by which tools you can secure or exploit networks. You can test for vulnerabilities attack by different hackers or attackers in network and protect your system.
Special features on Backtrack OS:
1. Information Gathering:
In this you can gather information of target DNS, routing, email address, websites and mail servers etc from Internet without touching the target machine.
2. Network Mapping:
This category contains tools that can check the live hosts, fingerprints of operating system, application used by target and also do port scanning.
3. Privilege Escalation:
This category contain tools that can give you the access to the target machine and form there you can easily retrieve their passwords and a lot of important details.
4. Vulnerabilities Identification:
In this you can easily scan the Cisco routers and easily retrieve information from the routers.
All Backtrack Information regarding installation of OS, E books, and tutorials series are available at:http://www.backtrack-linux.org/
You can easily learn hacking by this operating system. So challenge your friends and start hacking their systems .
Installation Tip:
Try to use virtual machine for this operating system and use virtulization tools (i.e Microsoft Virtual PC, VMware and Oracle Virtual Box etc). By this you will be save in your network. Nobody can attack back on your original system. By these virtual tools you will not be identify in network because of fake MAC and IP address provided by these virtualization tools.
Try to use virtual machine for this operating system and use virtulization tools (i.e Microsoft Virtual PC, VMware and Oracle Virtual Box etc). By this you will be save in your network. Nobody can attack back on your original system. By these virtual tools you will not be identify in network because of fake MAC and IP address provided by these virtualization tools.
For any query mail me at: