Friday, January 6, 2012

Backtrack 5 OpenVas Tutorial


OpenVas is a open source vulnerability assesment system just like nessus, openVas used to find the vulnerabilities on a computer system, it is open source so you dont need to buy it, however you can get home feed of nessus for free too, but we consider both of them. I

You can find nessus on backtrack 5 but you have to install openvas on backtrack5, so below is the tutorial for Openvas it includes how to install openvas in backtrack 5 and some basic usage.


Backtrack5 is not necessary to run openvas, if you are using some other version of backtrack or if you are using some other distro like Ubuntu than the procedure is same.

How To Install OpenVas
  • Open terminal on bt5 or ubuntu and type exactly
root@bt:~# apt-get install openvas
root@bt:~# sudo apt-get update
  • It begins your openvas installation and update all the applications. When Openvas has been installed you can find it on Application --> Backtrack --> Vulnerability assessment --> vulnerability scanner --> Openvas . See the picture.


  • On the next step click on openvas-check-setup, it will show you the problem and suggest some solution.
  • Its time to add user, from the menu select Openvas adduser, enter the login name and password, for rule type ctrl-d.
  • Now click on OpenVas NVT sync, by this you will get the latest NVT's from openvas database, you must do this step frequently to make update your Openvas.
  • Start openvas scanner from the menu, it may takes some time.
  • Open terminal for setting up openvas manager, use the command 
root@bt:~# openvas-mkcert-client -n om -i
rebuild the database by the command 
root@bt:~# openvasmd --rebuild
  • On the terminal type the command to set openvas administrator 
root@bt:~# openvasad -c 'add_user' -n openvasadmin -r Admin
  • Now click on start Openvas manager from the menu and use the command. 
root@bt:~# openvasmd -p 9390 -a 127.0.0.1
  • Start openvas administrator from the menu and type
root@bt:~# openvasad -a 127.0.0.1 -p 9393
Your are almost done, just start Greenbone security assistant and use
root@bt:~# gsad --http-only --listen=127.0.0.1 -p 9392
  • Now open your web browser and type http://127.0.0.1:9392/
  • Use your username and password that has been set on previous step.

Sunday, October 2, 2011

WiFi cracking with Backtrack and Wiffy

Do you want to crack WiFi network without touching a key? Well just install Wiffy on Backtrack5, sit back and relax.


What is this?

A bash script to automate cracking WiFi networks! Supports WEP (Client & Client-less), WPA/WPA2, MAC filtering and hidden SSID with the option of connecting afterwards.


How does it work?

> Scans for wireless networks and saves gathered data
> Configures the attacker’s wireless card
> Tries to detect currently connected clients
> Starts to capture data
> Depending on encryption on the wireless network – starts different attacks
> Once enough ‘essential’ data has been collected starts to crack the WiFi key
> Optional: Connect to network with the clients MAC (For MAC Filtering) and WiFi Key

What do I need?


> The shellscript, wiffy.sh (37.24 KB, SHA1:49f7a930120544a6cec11171abe500f7042ba49d)
> A wireless card — that supports monitor mode
> Dictionaries/Word-lists —If you’re wanting to crack WPA/WPA2
> aircrack-ng suite, macchanger — All on BackTrack!> Optional: Subversion
How do I use it?
1.) Either edit wiffy.sh or specify, via command line, your interface. (You can view your interfaces via ifconfig and use kate to edit.)
2.) If an ESSID or BSSID wasn’t set via command line, select which is YOUR network
3.) Wait…
4.) …Game over. (=

Links

Download video: http://www.mediafire.com/?3vvodwhxx191ex1
Download Script (wiffy.sh): http://www.mediafire.com/?nmu7mixhis1u8km
The latest version: wiffy.sh v0.2 (#0 BETA #6) ~ 2011-03-17

Thursday, June 16, 2011

Dual Boot Backtrack with Windows

This method of installation is the simplest available. The assumption is that the you have a Windows installation taking up all the space on your drive, and you would like to resize and repartition your drive to allow a BackTrack install alongside your Windows. BACK UP YOUR WINDOWS INSTALLATION FIRST.
  1. Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface.
  2. Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console
  3. Select your geographical location and click “forward”. Same for the Keyboard layout.
  4. The next screen allows you to configure the partitioning layout. The assumption is that we are resizing the Windows 7 partition and installing BackTrack on the newly made space.
  5. Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done.
  6. Grub should allow you to boot both into BackTrack and Windows.
  7. Log into BackTrack with the default username and password root / toor. Change root password.
  8. Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800″ if you wish a 800×600 framebuffer), reboot.

Tuesday, June 7, 2011

Configure Nessus on Backtrack

How to configure nessus on backtrack 5

1) Get a free activation key form Tenable/Nessus website

2) Enter the key using nessus-fetch command
/opt/nessus/bin/nessus-fetch –register xxxx-xxxx-xxxx-xxxx
3) Create a user and password
/opt/nessus/sbin/nessus-adduser
4) Start the service
/etc/init.d/nessusd start
5) Start playing
https://localhost:8834/

Friday, June 3, 2011

FCrackZIP Cracking Password Protected ZIP Files on Backtrack

This tutorial for Ubuntu or Backtrack users to crack password-protected zip files with wordlists. 

1. Install FCrackZIP packages.
   -  apt-get install fcrackzip
2. Crack it with Dictionary or Brute Force Attack.
   - Brute Force Attack.


  •      fcrackzip -v zipfiles.
   - Dictionary Attack.
  •      fcrackzip -v -D -p /pentest/passwords/wordlists/wordlists zipfiles.
      *** Wordlist is the file that contain a lists of words (one word per line)
      *** My wordlist is /pentest/passwords/wordlists/wordlists
3. That's you crack the file.

fcrack

Backtrack 5 on Mobile

Backtrack 5 has Released  arm version for smart phones.
The Backtrack Developing Team have introduced us their new updated creation that is Backtrack-5.It is a Penetration Focused Linux Distribution.

Backtrack offers more than 250 tools for our penetration testing need. The tools include Sniffers , Fuzzers , Forensic tools , Web App Testing Frameworks and my favorite Metasploit 

BackTrack 5 On Motorola




For the first time, an ARM image is now provided. So far, the developers have tested it on a Motorola Atrix 4G smartphone and a Motorola Xoom tablet. According to a tweet from the developers they demonstrated the ARM version's functionality by using a Xoom to run Metasploit to gain
access to a Windows XP system.
You can find the guide to run backtrack in the Backtrack Forums
 
BackTrack 5 on Xperia
Backtrack 5 also runs on Samsung Xperia X10 .To run this you only need to know how and you will know this go  here 
and the to run on androids   


BackTrack 5 On Nokia N900

How to do this . Must be wondering how to know this also follow this link

BackTrack 5 on Droid Incredible

 Thanks to Security Tube and ac1d-ra1n

http://www.securitytube.net/video/1864
http://www.securitytube.net/video/1865
http://www.securitytube.net/video/1866

Friday, May 20, 2011

Backtrack 5 features

Backtrack,  the GNU/Linux distribution focused on digital forensics and penetration testing, has a new version out, with the public release (on May 10) of

BackTrack 5, code-named Revolution, by the BackTrack development team. BackTrack focuses primarily on providing a native environment purely dedicated to hacking. This latest distro was eight months in the making, and boasts of significant improvements over its predecessor.
BackTrack 5 features a comprehensive arsenal of over 350 security-related tools to test everything from Web applications to RFID systems. The new version of BackTrack lives up to its “Revolution”  moniker in that it has been completely overhauled and rewritten from the ground up, providing  users with an optimized platform for penetration testing and digital forensics exercises. For the first time in its development road map, BackTrack now includes support for ARM-based systems — a significantly upgrade.

BackTrack 5 features

A major addition in the new version of BackTrack is the 64-bit offering. BackTrack 5 is based on Ubuntu Lucid Lynx v10.04, the latest long term support (LTS) release using Linux kernel v2.6.38. BackTrack 5 is the first version to be released with the complete source code in its repositories. This addition is expected to clear up licensing issues that existed in the previous Backtrack distros. BackTrack 4 is no longer available for download at the developer’s Website, and support for it has officially been discontinued.
Here is a more detailed look at important features of BackTrack 5.
  • Support for KDE and Gnome
BackTrack 5 boasts of support for KDE Plasma (4.6), Gnome (2.6) and Fluxbox. This makes it much simpler to migrate from Gnome-based distributions. Unifying the desktop environment has the added advantage of an easier learning curve for new users. Streamlined images for each desktop environment (DE) are available on the backtrack website. Tool integration with supported environments is seamless with DE-specific menu structures. However, while Gnome has a smaller memory footprint and is less resource hungry, the Gnome versions lack default package managers, which need to be added separately.

backtrack5
  • 32-bit and 64-bit support
The addition of 64-bit support in BackTrack 5 makes it possible to tap additional power for processor-intensive tasks such as brute force password cracking. The 32-bit and 64-bit images support various boot modes, including a “Stealth” mode that boots without generating network traffic and a “Forensics” mode for forensic purposes.
  •  ARM architecture support
 An ARM image of BackTrack 5 is available, having officially been tested on the Motorola Xoom tablet and the Motorola Atrix 4G smart phone by the developers. Custom chroot scripts are already available to run BackTrack 5 on Android systems with ARM processors.
Users have successfully deployed BackTrack 5 on Samsung Galaxy S and Sony Xperia smart phones. However, there are still some issues with these systems and not all features are available. There are known issues with wireless drivers on ARM-based systems including lack of support, for  WiFi packet injection.
backtrackonmotorola
Anant Srivastava, a Mumbai-based software developer and member of the null community, was one of the first to successfully run BackTrack 5 on a Sony Xperia X10. Srivastava used a rooted Xperia x10 running Android 2.2 (Froyo) with an Android terminal application and an Android VNC viewer.
backtrackonxperia

  • Packaged tools
BackTrack 5’s arsenal of tools have been upgraded to the latest versions. BackTrack 5 comes preloaded with tools for LAN and WLAN sniffing, vulnerability scanning, digital forensics and password cracking. The Metasploit exploit framework v3.7.0 has been packaged into BackTrack 5. The tools are organized into a comprehensive menu structure, streamlined to comply with the PTES and OSSTMM standards.