tag:blogger.com,1999:blog-70183421619930286992024-02-21T07:19:05.134-08:00*******************BACKTRACK********************h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.comBlogger10125tag:blogger.com,1999:blog-7018342161993028699.post-81890746930222446372012-01-06T14:44:00.000-08:002012-01-06T14:44:37.645-08:00Backtrack 5 OpenVas Tutorial<span style="font-size: small;"><span class="st_stumbleupon_button"></span></span><div style="font-family: inherit;"><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><br />
<span></span></span></div><span style="font-size: small;"><span><b>OpenVas</b> is a open source vulnerability assesment system just like nessus, openVas used to find the vulnerabilities on a computer system, it is open source so you dont need to buy it, however you can get home feed of nessus for free too, but we consider both of them. I</span><br />
<br />
<a href="" name="more"></a></span> <span style="font-size: small;"><span>You can find nessus on <b>backtrack 5</b> but you have to install <b>openvas on backtrack5</b>, so below is the <b>tutorial for Openvas</b> it includes how to install openvas in backtrack 5 and some basic usage.</span><br />
<span><br />
</span><br />
<span>Backtrack5 is not necessary to run openvas, if you are using some other version of backtrack or if you are using some other distro like Ubuntu than the procedure is same.</span></span> <span style="font-size: small;"><br />
<span><b></b></span></span><span style="font-size: small;"><span><b>How To Install OpenVas</b></span></span><div style="text-align: left;"><ul style="text-align: left;"><li><span style="font-size: small;"><span><span style="color: blue;"><span style="color: black;">Open terminal on bt5 or ubuntu and type exactly</span></span></span></span></li>
</ul></div><div style="text-align: left;"><blockquote><div style="color: #444444;"><span style="font-size: small;"><span>root@bt:~# apt-get install openvas</span></span></div></blockquote><blockquote style="color: #444444;"><span style="font-size: small;"><span>root@bt:~# sudo apt-get update</span></span></blockquote><ul style="text-align: left;"><li><span style="font-size: small;"><span>It begins your openvas installation and update all the applications. When Openvas has been installed you can find it on Application --> Backtrack --> Vulnerability assessment --> vulnerability scanner --> Openvas . See the picture.</span></span></li>
</ul><span style="font-size: small;"><br />
</span> <div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjLOzab6Q5oMue5-J2VS7kQZ1S1_wJV9uyfOCYwFupXeK9PFSUng4eLGJwK9_kdR_hg3oAIK2CnSgNXAEkk7A3_Xy0rflqJo4p2UjYaCGSNgkRaMuaeEz4FdApvFOVwbKDh89PKjq3bP0/s1600/Openvas+backtrack5.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjLOzab6Q5oMue5-J2VS7kQZ1S1_wJV9uyfOCYwFupXeK9PFSUng4eLGJwK9_kdR_hg3oAIK2CnSgNXAEkk7A3_Xy0rflqJo4p2UjYaCGSNgkRaMuaeEz4FdApvFOVwbKDh89PKjq3bP0/s640/Openvas+backtrack5.png" width="640" /></a></span></span></div><span style="font-size: small;"><br />
</span> <ul style="text-align: left;"><li><span style="font-size: small;"><span><span style="color: blue;"><span style="color: black;">On the next step click on <span style="color: red;">openvas-check-setup</span>, it will show you the problem and suggest some solution.</span></span></span></span></li>
<li><span style="font-size: small;"><span><span style="color: blue;"><span style="color: black;">Its time to add user, from the menu select <span style="color: red;">Openvas adduser</span>, enter the login name and password, for rule type ctrl-d. </span></span></span></span></li>
</ul></div><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><span></span></span></div><ul style="text-align: left;"><li><span style="font-size: small;"><span>Now click on <span style="color: red;">OpenVas NVT sync</span>, by this you will get the latest NVT's from openvas database, you must do this step frequently to make update your <a href="http://www.ehacking.net/search/label/OpenVAS">Openvas</a>.</span></span></li>
<li><span style="font-size: small;"><span>Start openvas scanner from the menu, it may takes some time.</span></span></li>
<li><span style="font-size: small;"><span>Open terminal for setting up openvas manager, use the command<span style="color: #444444;"> </span></span></span></li>
</ul><blockquote><span style="font-size: small;"><span><span style="color: #444444;">root@bt:~# openvas-mkcert-client -n om -i</span></span></span></blockquote><span style="font-size: small;"><span>rebuild the database by the command </span></span> <blockquote><span style="font-size: small;"><span><span style="color: #444444;">root@bt:~# openvasmd --rebuild</span></span></span></blockquote><ul style="text-align: left;"><li><span style="font-size: small;"><span><b>On the terminal type the command to set openvas administrator</b><span style="color: #444444;"> </span></span></span></li>
</ul><blockquote><span style="font-size: small;"><span><span style="color: #444444;">root@bt:~# openvasad -c 'add_user' -n openvasadmin -r Admin</span></span></span></blockquote><ul style="text-align: left;"><li><span style="font-size: small;"><span><b>Now click on <span style="color: red;">start Openvas manager</span> from the menu and use the command. </b></span></span> </li>
</ul></div><blockquote style="font-family: inherit;"><span style="font-size: small;"><span><span style="color: #444444;">root@bt:~# openvasmd -p 9390 -a 127.0.0.1</span> </span></span></blockquote><ul style="font-family: inherit; text-align: left;"><li><span style="font-size: small;"><span>Start openvas administrator from the menu and type</span></span></li>
</ul><blockquote style="font-family: inherit;"><span style="font-size: small;"><span><span style="color: #444444;">root@bt:~# openvasad -a 127.0.0.1 -p 9393</span></span></span></blockquote><div style="font-family: inherit;"><span style="font-size: small;"><span>Your are almost done, just start Greenbone security assistant and use</span></span></div><blockquote style="font-family: inherit;"><span style="font-size: small;"><span><span style="color: #444444;">root@bt:~# gsad --http-only --listen=127.0.0.1 -p 9392</span></span></span></blockquote><ul style="font-family: inherit; text-align: left;"><li><span style="font-size: small;"><span>Now open your web browser and type http://127.0.0.1:9392/</span></span></li>
<li><span style="font-size: small;"><span>Use your username and password that has been set on previous step.</span></span></li>
</ul>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-55460510049624611112011-10-02T14:11:00.000-07:002011-10-02T14:11:21.001-07:00WiFi cracking with Backtrack and WiffyDo you want to <b>crack WiFi network</b> without touching a key? Well just install Wiffy on <b>Backtrack5</b>, sit back and relax.<br />
<br />
<br />
What is this?<br />
<br />
A bash script to automate <b>cracking WiFi networks</b>! Supports WEP (Client & Client-less), WPA/WPA2, MAC filtering and hidden SSID with the option of connecting afterwards.<br />
<span id="more-2145"></span><br />
<br />
<i>How does it work?</i><br />
<br />
> Scans for wireless networks and saves gathered data<br />
> Configures the attacker’s wireless card<br />
> Tries to detect currently connected clients<br />
> Starts to capture data<br />
> Depending on encryption on the wireless network – starts different attacks<br />
> Once enough ‘essential’ data has been collected starts to crack the WiFi key<br />
<i>> Optional: Connect to network with the clients MAC (For MAC Filtering) and WiFi Key</i><br />
<i><br />
What do I need?</i><br />
<br />
> The shellscript, wiffy.sh <i>(37.24 KB, SHA1:49f7a930120544a6cec11171abe500f7042ba49d)</i><i> </i><br />
> A wireless card <i>— that supports monitor mode</i><br />
> Dictionaries/Word-lists <i>—If you’re wanting to crack WPA/WPA2</i><br />
> aircrack-ng suite, <i>macchanger</i> — All on BackTrack!> <i>Optional: Subversion</i><br />
<i>How do I use it?</i><br />
1.) Either edit wiffy.sh or specify, via command line, your interface. <i>(You can view your interfaces via ifconfig and use kate to edit.)</i><br />
<i>2.) </i>If an ESSID or BSSID wasn’t set via command line, select which is YOUR network<br />
3.) Wait…<br />
4.) …Game over. (=<br />
<iframe allowfullscreen="" frameborder="0" height="400" src="http://blip.tv/play/hdkFgfv5RwI.html" width="600"></iframe><embed src="http://a.blip.tv/api.swf#hdkFgfv5RwI" style="display: none;" type="application/x-shockwave-flash"></embed><br />
<i>Links</i><br />
<br />
Download video<b>: </b><a href="http://www.mediafire.com/?3vvodwhxx191ex1"><i>http://www.mediafire.com/?3vvodwhxx191ex1</i></a><br />
Download Script<b> </b><i>(wiffy.sh)</i>: <a href="http://www.mediafire.com/?nmu7mixhis1u8km"><i>http://www.mediafire.com/?nmu7mixhis1u8km</i></a><br />
The latest version<b>:</b> <a href="https://code.google.com/p/g0tmi1k/source/browse/trunk/wiffy/wiffy.sh?r=33" target="_blank">wiffy.sh v0.2 (#0 BETA #6) ~ 2011-03-17</a>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-42131253815485096722011-06-16T08:17:00.000-07:002011-06-16T08:17:34.599-07:00Dual Boot Backtrack with WindowsThis method of installation is the simplest available. The assumption is that the you have a Windows installation taking up all the space on your drive, and you would like to resize and repartition your drive to allow a BackTrack install alongside your Windows. BACK UP YOUR WINDOWS INSTALLATION FIRST.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrHl0VX_3dbinS37_Mlugvrkh0Ky0mMFqWnTCEg8XOvRT_pQj_THGQeA67A6XQUwz5sHhXhKioDTHDl2rYQHeAEmpb6GrxXYBmbJaKfl-cPFA0-ypahnoVPysRfnfVYg0Jd5SB6c2EyVE-/s1600/backtrackinstall1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br />
</a></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpmZAWVxWOpJlHb1nEQGsI0twyHeb4A6V_KQQFarLi-78xNMe1Klu1HkOmuBz8rfOpvg4YSNzPzSMRhVfP6kZaliXwaNdpgPTSmrdHPxdNgnl6kcjAe5AUjpCJC24bV_Eh2uCB0NI-cYH-/s1600/backtrackinstall2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br />
</a></div><ol><li>Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface.<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrHl0VX_3dbinS37_Mlugvrkh0Ky0mMFqWnTCEg8XOvRT_pQj_THGQeA67A6XQUwz5sHhXhKioDTHDl2rYQHeAEmpb6GrxXYBmbJaKfl-cPFA0-ypahnoVPysRfnfVYg0Jd5SB6c2EyVE-/s1600/backtrackinstall1.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="460" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrHl0VX_3dbinS37_Mlugvrkh0Ky0mMFqWnTCEg8XOvRT_pQj_THGQeA67A6XQUwz5sHhXhKioDTHDl2rYQHeAEmpb6GrxXYBmbJaKfl-cPFA0-ypahnoVPysRfnfVYg0Jd5SB6c2EyVE-/s640/backtrackinstall1.png" width="640" /></a></li>
<li>Double click the “<i>install.sh</i>” script on the desktop, or run the command “<i>ubiquity</i>” in console </li>
<li>Select your geographical location and click “forward”. Same for the Keyboard layout.</li>
<li>The next screen allows you to configure the partitioning layout. The assumption is that we are resizing the Windows 7 partition and installing BackTrack on the newly made space.<img border="0" height="474" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpmZAWVxWOpJlHb1nEQGsI0twyHeb4A6V_KQQFarLi-78xNMe1Klu1HkOmuBz8rfOpvg4YSNzPzSMRhVfP6kZaliXwaNdpgPTSmrdHPxdNgnl6kcjAe5AUjpCJC24bV_Eh2uCB0NI-cYH-/s640/backtrackinstall2.png" width="640" /></li>
<li>Accept the installation summary and client “Install”. Allow the installation to run and complete. Restart when done.<a href="http://www.backtrack-linux.org/images/bt4inst-03.png"><img alt="" class="aligncenter" height="456" src="http://www.backtrack-linux.org/images/bt4inst-03.png" title="BackTrack Linux Install 03" width="640" /></a></li>
<li>Grub should allow you to boot both into BackTrack and Windows.<a href="http://www.backtrack-linux.org/images/bt4-bootup-dual.png"><img alt="" class="aligncenter" height="142" src="http://www.backtrack-linux.org/images/bt4-bootup-dual.png" title="BackTrack Dual Boot" width="441" /></a></li>
<li>Log into BackTrack with the default username and password <strong><span style="color: red;">root / toor.</span></strong> Change root password.</li>
<li>Fix the framebuffer splash by typing “fix-splash” ( or “fix-splash800″ if you wish a 800×600 framebuffer), reboot.</li>
</ol>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-72579764491931606962011-06-07T21:32:00.000-07:002011-06-07T21:32:06.494-07:00Configure Nessus on BacktrackHow to configure nessus on backtrack 5 <br />
<br />
1) Get a free activation key form <a href="http://www.nessus.org/products/nessus/nessus-plugins/obtain-an-activation-code%20">Tenable/Nessus</a> website<br />
<br />
2) Enter the key using nessus-fetch command<br />
<blockquote>/opt/nessus/bin/nessus-fetch –register xxxx-xxxx-xxxx-xxxx</blockquote>3) Create a user and password<br />
<blockquote>/opt/nessus/sbin/nessus-adduser</blockquote>4) Start the service<br />
<blockquote>/etc/init.d/nessusd start</blockquote>5) Start playing<br />
<blockquote>https://localhost:8834/</blockquote>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-5128123596916868262011-06-03T18:59:00.000-07:002011-06-03T18:59:13.744-07:00FCrackZIP Cracking Password Protected ZIP Files on BacktrackThis <b>tutorial</b> for <u>Ubuntu or<span style="color: purple;"> </span><a href="http://www.hackersbay.in/search/label/backtrack" style="color: white;">Backtrack</a> </u>users to crack password-protected zip files with wordlists. <br />
<br />
1. Install<b> FCrackZIP</b> packages.<br />
- apt-get install fcrackzip<br />
2. Crack it with Dictionary or Brute Force Attack.<br />
- Brute Force Attack.<br />
<br />
<br />
<ul><li> fcrackzip -v zipfiles. </li>
</ul> - Dictionary Attack. <br />
<ul><li> fcrackzip -v -D -p /pentest/passwords/wordlists/wordlists zipfiles.</li>
</ul> *** Wordlist is the file that contain a lists of words (one word per line)<br />
*** My wordlist is /pentest/passwords/wordlists/wordlists <br />
3. That's you crack the file.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMjvOTDjslC496Ud4l3lRRItyLzz6A6clJ-SviYyf3c0zhN4UbBL2iGi_FDmn299JDq4ZdPYXk0x8pNIOT7eAoimlsLsAQbJTiqVyyc9VvdoTLZJhJ2oHM32CWKxz8ZJH-91X6Gj___Ms/s1600/1.gif" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="fcrack" border="0" height="48" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMjvOTDjslC496Ud4l3lRRItyLzz6A6clJ-SviYyf3c0zhN4UbBL2iGi_FDmn299JDq4ZdPYXk0x8pNIOT7eAoimlsLsAQbJTiqVyyc9VvdoTLZJhJ2oHM32CWKxz8ZJH-91X6Gj___Ms/s640/1.gif" width="640" /></a></div>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-14158459053292224472011-06-03T18:55:00.000-07:002011-06-03T18:55:37.036-07:00Backtrack 5 on Mobile<b>Backtrack 5</b> has Released arm version for smart phones. <br />
The <b>Backtrack</b> Developing Team have introduced us their new updated creation that is <b>Backtrack-5</b>.It is a Penetration Focused Linux Distribution.<br />
<br />
Backtrack offers more than 250 tools for our penetration testing need. The tools include <b>Sniffers , Fuzzers , Forensic tools , Web App Testing Frameworks</b> and my favorite <b>Metasploit </b><br />
<br />
<span style="font-size: medium;"><b>BackTrack 5</b> On Motorola</span><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i53.tinypic.com/tz678.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="250" src="http://i53.tinypic.com/tz678.jpg" width="400" /></a></div><br />
<br />
For the first time, an ARM image is now provided. So far, the developers have tested it on a Motorola Atrix 4G smartphone and a Motorola Xoom tablet. According to a tweet from the developers they demonstrated the ARM version's functionality by using a Xoom to run <b>Metasploit</b> to gain <br />
<div class="post-body entry-content"><nobr>access to</nobr> a Windows XP system.</div><div class="post-body entry-content">You can find the guide to run backtrack in the <a href="http://www.backtrack-linux.org/forums/backtrack-5-how-tos/40376-%5Bhow-%5D-backtrack-5-motorola-xoom-gnome-ui-via-tightvncserver.html">Backtrack Forums </a></div><div class="post-body entry-content"><span style="font-size: medium;"><b> </b></span></div><div class="post-body entry-content"><span style="font-size: medium;"><b>BackTrack 5 </b>on Xperia</span></div><div class="separator" style="clear: both; text-align: center;"><a href="http://i56.tinypic.com/fcte0i.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="297" src="http://i56.tinypic.com/fcte0i.jpg" width="400" /></a></div><div class="post-body entry-content"><span style="font-size: medium;"><span style="font-size: x-small;"><b>Backtrack 5 </b>also runs on Samsung Xperia X10 .To run this you only need to know how and you will know this go <a href="http://forum.xda-developers.com/showthread.php?t=1074169">here </a></span></span><br />
<span style="font-size: medium;"><a href="http://hackomania.com/BT5/"><span style="font-size: x-small;">and the to run on androids </span></a><b> </b></span></div><br />
<br />
<span style="font-size: medium;"><b>BackTrack 5</b> On Nokia N900</span><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i56.tinypic.com/mtnfbq.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="300" src="http://i56.tinypic.com/mtnfbq.jpg" width="400" /></a></div><br />
<span style="font-size: medium;"><span style="font-size: x-small;">How to do this . Must be wondering how to know this also follow<a href="http://talk.maemo.org/showthread.php?t=72933"> this link </a></span></span><br />
<br />
<span style="font-size: medium;"><b>BackTrack 5 </b>on Droid Incredible</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www-bgr-com.vimg.net/wp-content/uploads/2010/04/HTC-Droid-Incredible-2.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="266" src="http://www-bgr-com.vimg.net/wp-content/uploads/2010/04/HTC-Droid-Incredible-2.jpg" width="400" /></a></div><span style="font-size: x-small;"> Thanks to <b>Security Tube</b> and <b>ac1d-ra1n</b></span><br />
<br />
<a href="http://www.securitytube.net/video/1864" target="_blank">http://www.securitytube.net/video/1864</a><br />
<a href="http://www.securitytube.net/video/1865" target="_blank">http://www.securitytube.net/video/1865</a><br />
<a href="http://www.securitytube.net/video/1866" target="_blank">http://www.securitytube.net/video/1866</a><span style="font-size: x-small;"><b> </b></span>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-466835931626618952011-05-20T12:22:00.000-07:002011-05-20T12:22:15.892-07:00Backtrack 5 featuresBacktrack, the GNU/Linux distribution focused on digital forensics and penetration testing, has a new version out, with the public release (on May 10) of <br />
<br />
<b>BackTrack 5</b>, code-named Revolution, by the BackTrack development team. BackTrack focuses primarily on providing a native environment purely dedicated to hacking. This latest distro was eight months in the making, and boasts of significant improvements over its predecessor.<br />
BackTrack 5 features a comprehensive arsenal of over 350 security-related tools to test everything from Web applications to RFID systems. The new version of BackTrack lives up to its “Revolution” moniker in that it has been completely overhauled and rewritten from the ground up, providing users with an optimized platform for penetration testing and digital forensics exercises. For the first time in its development road map, BackTrack now includes support for ARM-based systems — a significantly upgrade.<br />
<h2>BackTrack 5 features</h2>A major addition in the new version of BackTrack is the 64-bit offering. BackTrack 5 is based on Ubuntu Lucid Lynx v10.04, the latest long term support (LTS) release using Linux kernel v2.6.38. BackTrack 5 is the first version to be released with the complete source code in its repositories. This addition is expected to clear up licensing issues that existed in the previous Backtrack distros. BackTrack 4 is no longer available for download at the developer’s Website, and support for it has officially been discontinued.<br />
Here is a more detailed look at important features of BackTrack 5.<br />
<ul><li><b><span style="font-size: medium;">Support for KDE and Gnome</span></b></li>
</ul>BackTrack 5 boasts of support for KDE Plasma (4.6), Gnome (2.6) and Fluxbox. This makes it much simpler to migrate from Gnome-based distributions. Unifying the desktop environment has the added advantage of an easier learning curve for new users. Streamlined images for each desktop environment (DE) are available on the <a href="http://www.backtrack-linux.org/downloads/" target="_blank">backtrack website</a>. Tool integration with supported environments is seamless with DE-specific menu structures. However, while Gnome has a smaller memory footprint and is less resource hungry, the Gnome versions lack default package managers, which need to be added separately.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi3edZ4UzO-E_zVWh-oEewHyvSWk7NNX1vVep1W-Hiq7lLnDgAk7J5BR6GPc1WmMKuQhK7wU1D-15mmBW9_CRCYZFx8W8rAcOZ27uCogzjRYTv7_sBb4sszl2c81eu8RsU74DEmzgIsErZ/s1600/backtrack5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="backtrack5" border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi3edZ4UzO-E_zVWh-oEewHyvSWk7NNX1vVep1W-Hiq7lLnDgAk7J5BR6GPc1WmMKuQhK7wU1D-15mmBW9_CRCYZFx8W8rAcOZ27uCogzjRYTv7_sBb4sszl2c81eu8RsU74DEmzgIsErZ/s640/backtrack5.jpg" width="640" /></a></div><ul><li><b><span style="font-size: medium;">32-bit and 64-bit support</span></b></li>
</ul>The addition of 64-bit support in BackTrack 5 makes it possible to tap additional power for processor-intensive tasks such as brute force password cracking. The 32-bit and 64-bit images support various boot modes, including a “Stealth” mode that boots without generating network traffic and a “Forensics” mode for forensic purposes.<br />
<ul><li><b> <span style="font-size: medium;">ARM architecture support</span></b></li>
</ul> An ARM image of BackTrack 5 is available, having officially been tested on the Motorola Xoom tablet and the Motorola Atrix 4G smart phone by the developers. Custom <i>chroot</i> scripts are already available to run BackTrack 5 on Android systems with ARM processors.<br />
Users have successfully deployed <a href="http://blog.l-lacker.com/security-backtrack-5-on-a-galaxy-s-phone/" target="_blank">BackTrack 5 on Samsung Galaxy S</a> and Sony Xperia smart phones. However, there are still some issues with these systems and not all features are available. There are known issues with wireless drivers on ARM-based systems including lack of support, for WiFi packet injection.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBgHmnrmjGAuWj3yUcVE5rUPZ7HiKxOgajtfA1OtosXCOQKA3Hg2-yN55VUMj9pVT06VHcQh068GNYLRXhzJ6x8zNiyZ49doZYFi4fHWs9U_IhnsjCL4WigKXdVi4YzfQGQZ3Oq6Z3L92q/s1600/backtrackonmotorola.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="backtrackonmotorola" border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBgHmnrmjGAuWj3yUcVE5rUPZ7HiKxOgajtfA1OtosXCOQKA3Hg2-yN55VUMj9pVT06VHcQh068GNYLRXhzJ6x8zNiyZ49doZYFi4fHWs9U_IhnsjCL4WigKXdVi4YzfQGQZ3Oq6Z3L92q/s640/backtrackonmotorola.jpg" width="640" /></a></div>Anant Srivastava, a Mumbai-based software developer and member of the null community, was one of the first to successfully run <a href="http://forum.xda-developers.com/showthread.php?t=1074169" target="_blank">BackTrack 5 on a Sony Xperia X10.</a> Srivastava used a rooted Xperia x10 running Android 2.2 (Froyo) with an Android terminal application and an Android VNC viewer.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-Ecm_Lb-a4N-J6z4LupxfHtqLfAnBRFqBaydVByebxzm0UNNMYofrjFDJVmgL2eqHL8KiUf8uIGbkacAr-6rEGhC1YrGx9_5uva8QGKZWBhyd89tD4fIH0bg6Zq7XQW-ZdBZhdbQqSi4C/s1600/backtrackonxperia.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="backtrackonxperia" border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-Ecm_Lb-a4N-J6z4LupxfHtqLfAnBRFqBaydVByebxzm0UNNMYofrjFDJVmgL2eqHL8KiUf8uIGbkacAr-6rEGhC1YrGx9_5uva8QGKZWBhyd89tD4fIH0bg6Zq7XQW-ZdBZhdbQqSi4C/s640/backtrackonxperia.jpg" width="640" /></a></div><br />
<ul><li><b><span style="font-size: medium;">Packaged tools</span></b></li>
</ul>BackTrack 5’s arsenal of tools have been upgraded to the latest versions. BackTrack 5 comes preloaded with tools for LAN and WLAN sniffing, vulnerability scanning, digital forensics and password cracking. The Metasploit exploit framework v3.7.0 has been packaged into BackTrack 5. The tools are organized into a comprehensive menu structure, streamlined to comply with the PTES and OSSTMM standards.h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-56727024809207098642011-05-20T11:30:00.000-07:002011-05-20T11:30:45.072-07:00BackTrack 5 'Revolution' releaseOffensive Security, leaders in Online information security training, proudly announced , May 10th, the immediate availability for download of the new and highly anticipated <b>BackTrack 5</b> release, an extremely popular security oriented operating system.<br />
<br />
<b>BackTrack 5</b>, the most expected Linux distribution in the world, has been officially released a few minutes ago (see download link at the end of the article).<br />
<br />
Dubbed Revolution, <b>BackTrack 5 is based on Ubuntu 10.04</b> LTS (Lucid Lynx), it's powered by Linux kernel 2.6.38, patched with all the relevant wireless injection patches, and includes several major improvements.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi3edZ4UzO-E_zVWh-oEewHyvSWk7NNX1vVep1W-Hiq7lLnDgAk7J5BR6GPc1WmMKuQhK7wU1D-15mmBW9_CRCYZFx8W8rAcOZ27uCogzjRYTv7_sBb4sszl2c81eu8RsU74DEmzgIsErZ/s1600/backtrack5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi3edZ4UzO-E_zVWh-oEewHyvSWk7NNX1vVep1W-Hiq7lLnDgAk7J5BR6GPc1WmMKuQhK7wU1D-15mmBW9_CRCYZFx8W8rAcOZ27uCogzjRYTv7_sBb4sszl2c81eu8RsU74DEmzgIsErZ/s640/backtrack5.jpg" width="640" /></a></div><br />
"The BackTrack Dev team has worked furiously in the past months on BackTrack 5, code name “revolution”. Today, we are proud to release our work to the public, and then rest for a couple of weeks."<br />
<br />
"This new revision has been built from scratch, and boasts several major improvements over all our previous releases." - was stated in the release announcement.<br />
<br />
Highlights of BackTrack 5:<br />
<blockquote><br />
· Based on Ubuntu 10.04 LTS;<br />
· Linux kernel 2.6.38 (with wireless injection patches);<br />
· KDE 4.6;<br />
· GNOME 2.6;<br />
· 32-bit and 64-bit support;<br />
· Metasploit 3.7.0;<br />
· Forensics mode (a forensically sound instance);<br />
· Stealth mode (without generating network traffic);<br />
· Initial ARM image of BackTrack (for Android-powered devices);<br />
· ...and many more!</blockquote><br />
<iframe src="http://player.vimeo.com/video/23347352?title=0&byline=0&portrait=0&color=ff9933" width="601" height="338" frameborder="0"></iframe><br />
Existing BackTrack 4 users should definitely upgrade to this new version, especially because starting with May 10th, 2011, BackTrack 4 is no longer supported.h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0tag:blogger.com,1999:blog-7018342161993028699.post-7028380534580125042011-04-27T04:11:00.000-07:002011-04-27T05:03:24.006-07:00Backtrack download<h3 style="color: #ff6600; font-size: 22px; padding-bottom: 10px;">BackTrack 4 R2 Release ISO</h3><blockquote style="background-color: transparent; font-size: 14px; margin-top: -35px;"><span style="color: red;"></span><br />
<b>Name:</b>: bt4-r2.iso <b>Size</b>: 2000 MB <br />
<a class="external" href="https://www.offensive-security.com/md5/bt4-r2.txt" rel="nofollow" target="_blank" title="BackTrack 4 R2 ISO MD5"><b>MD5</b></a>: 9a94caa0e980a7331e9abc1d4c42c9a9 <br />
<br />
<div style="float: right; margin-left: -40px; margin-right: 40px; margin-top: -55px;"><a href="http://www.backtrack-linux.org/download.php?fname=bt4r2" title="Download BackTrack Linux R2"> <img alt="Download Backtrack" border="0" src="http://www.backtrack-linux.org/images/downloads.png" /></a> <a href="http://www.backtrack-linux.org/torrents/bt4-r2.iso.torrent"> <img alt="" height="32" src="http://www.backtrack-linux.org/images/torrent.png" width="150" /></a></div></blockquote><br />
<a name='more'></a><br />
<br />
<br />
<div style="background-image: url(http://www.backtrack-linux.org/images/VM-Download-Digi_frame.png); color: white; height: 148px; margin-bottom: -38px; width: 902px;"><div style="margin: 30px 0px 0px 40px; position: relative;"><br />
<h3 style="color: #ff6600; font-size: 22px; padding-bottom: 10px;">BackTrack 4 R2 Release VMware Image</h3><div class="separator" style="clear: both; text-align: center;"><a href="http://www.backtrack-linux.org/images/downloads.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Download Backtrack" border="0" height="32" src="http://www.backtrack-linux.org/images/downloads.png" style="border: 0pt none;" width="150" /></a><a href="http://www.backtrack-linux.org/images/torrent.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="" border="0" height="32" src="http://www.backtrack-linux.org/images/torrent.png" width="150" /></a></div><blockquote style="background-color: transparent; font-size: 14px; margin-top: -35px;"><span style="color: red;"></span><br />
<b>Name:</b>: bt4-r2-vm.tar.bz2 <b>Size</b>: 2400 MB <br />
<a class="external" href="https://www.offensive-security.com/md5/bt4-r2-vm.txt" rel="nofollow" target="_blank" title="BackTrack 4 R2 VM MD5"><b>MD5</b></a>: 95c8b727d01b96b6df84381065cd9da6 <br />
<br />
<div style="float: right; margin-left: -40px; margin-right: 40px; margin-top: -55px;"></div></blockquote></div></div><br />
<br />
<div style="background-image: url(http://www.backtrack-linux.org/images/ISO-Download-Digi_frame.png); color: white; height: 148px; margin-bottom: -38px; width: 902px;"><div style="margin: 30px 0px 0px 40px; position: relative;"><br />
<h3 style="color: #ff6600; font-size: 22px; padding-bottom: 10px;"> BackTrack 4 R1 Release ISO</h3><blockquote style="background-color: transparent; font-size: 14px; margin-top: -35px;"><br />
<br />
<b>Name:</b>: bt4-r1.iso <b>Size</b>: 2000 MB <br />
<b>MD5</b>: f393714a97862398ec2eaba1a5157784 <br />
<br />
<div style="float: right; margin-left: -40px; margin-right: 40px; margin-top: -55px;"><a href="http://www.backtrack-linux.org/download.php?fname=bt4r1" title="Download BackTrack Linux R1"> <img alt="Download Backtrack" border="0" src="http://www.backtrack-linux.org/images/downloads.png" /></a> <a href="http://www.offensive-security.com/bt4-r1.iso.torrent"> <img alt="" height="32" src="http://www.backtrack-linux.org/images/torrent.png" width="150" /></a></div></blockquote></div></div><br />
<br />
<div style="background-image: url(http://www.backtrack-linux.org/images/VM-Download-Digi_frame.png); color: white; height: 148px; margin-bottom: -38px; width: 902px;"><div style="margin: 30px 0px 0px 40px; position: relative;"><br />
<h3 style="color: #ff6600; font-size: 22px; padding-bottom: 10px;">BackTrack 4 R1 Release VMware Image</h3><blockquote style="background-color: transparent; font-size: 14px; margin-top: -35px;"><span style="color: red;"><br />
</span> <br />
<b>Name:</b>: bt4-r1-vm.tar.bz2 <b>Size</b>: 2500MB <br />
<b>MD5</b>: b54a345a0619817c893183908d0957e4 <br />
<br />
<div style="float: right; margin-left: -40px; margin-right: 40px; margin-top: -55px;"><a href="http://www.backtrack-linux.org/download.php?fname=bt4r1vm" title="Download BackTrack Linux"> <img alt="Download Backtrack" border="0" height="32" src="http://www.backtrack-linux.org/images/downloads.png" style="border: 0pt none;" width="150" /></a> <a class="external" href="http://www.offensive-security.com/bt4-r1-vm.tar.bz2.torrent" rel="nofollow"> <img alt="" height="32" src="http://www.backtrack-linux.org/images/torrent.png" width="150" /></a></div></blockquote></div></div><br />
<br />
<div style="background-image: url(http://www.backtrack-linux.org/images/ISO-Download-Digi_frame.png); color: white; height: 148px; margin-bottom: -38px; width: 902px;"><div style="margin: 30px 0px 0px 40px; position: relative;"><br />
<h3 style="color: white; font-size: 22px; padding-bottom: 10px;">BackTrack 4 Final Release ISO</h3><blockquote style="background-color: transparent; font-size: 14px; margin-top: -35px;"><span style="color: red;"><br />
</span> <br />
<b>Name:</b>: bt4-final.iso <b>Size</b>: 1570 MB <br />
<b>MD5</b>: af139d2a085978618dc53cabc67b9269 <br />
<br />
<div style="float: right; margin-left: -40px; margin-right: 40px; margin-top: -55px;"><a href="http://www.backtrack-linux.org/download.php?fname=bt4f" title="Download BackTrack Linux"> <img alt="Download Backtrack" border="0" src="http://www.backtrack-linux.org/images/downloads.png" /></a> <a href="http://www.backtrack-linux.org/torrents/bt4-final.iso.torrent"> <img alt="" src="http://www.backtrack-linux.org/images/torrent.png" /></a></div></blockquote></div></div><br />
<br />
<div style="background-image: url(http://www.backtrack-linux.org/images/VM-Download-Digi_frame.png); color: white; height: 148px; margin-bottom: -38px; width: 902px;"><div style="margin: 30px 0px 0px 40px; position: relative;"><br />
<h3 style="color: white; font-size: 22px; padding-bottom: 10px;">BackTrack 4 Final Release VMWare Image</h3><blockquote style="background-color: transparent; font-size: 14px; margin-top: -35px;"><span style="color: red;"><br />
</span> <br />
<b>Name:</b>: bt4-final-vm.zip <b>Size</b>: 2000 MB <br />
<b>MD5</b>: 733b47fad1d56d31bc63c16b3706a11c <br />
<br />
<div style="float: right; margin-left: -40px; margin-right: 40px; margin-top: -55px;"><a href="http://www.backtrack-linux.org/download.php?fname=bt4fvm" title="Download BackTrack Linux"><img alt="Download Backtrack" border="0" src="http://www.backtrack-linux.org/images/downloads.png" /></a><a href="http://www.backtrack-linux.org/torrents/bt4-final-vm.zip.torrent"><img alt="" src="http://www.backtrack-linux.org/images/torrent.png" /></a></div></blockquote></div></div><br />
<br />
<div style="background-image: url(http://www.backtrack-linux.org/images/ISO-Download-Digi_frame.png); color: white; height: 148px; margin-bottom: -38px; width: 902px;"><div style="margin: 30px 0px 0px 40px; position: relative;"><br />
<h3 style="color: white; font-size: 22px; padding-bottom: 10px;">BackTrack 4 Pre Release ISO</h3><blockquote style="background-color: transparent; font-size: 14px; margin-top: -35px;"><span style="color: red;"><br />
</span> <br />
<b>Name:</b>: bt4-pre-final.iso <b>Size</b>: 1390 MB <br />
<b>MD5</b>: b0485da6194d75b30cda282ceb629654 <br />
<br />
<div style="float: right; margin-left: -40px; margin-right: 40px; margin-top: -55px;"><a href="http://www.backtrack-linux.org/download.php?fname=bt4pf"> <img alt="Download Backtrack" border="0" src="http://www.backtrack-linux.org/images/downloads.png" /></a></div></blockquote></div></div><br />
<br />
<br />
<h3 style="color: white; font-size: 22px; padding-bottom: 10px;">BackTrack 4 Beta Release ISO</h3>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com1tag:blogger.com,1999:blog-7018342161993028699.post-28882692097763072262011-04-27T04:00:00.000-07:002011-04-27T04:00:44.231-07:00backtrack<b><span style="font-size: large;">Backtrack</span> </b>the highest rated and acclaimed <u>Linux</u> security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a<u> LiveDVD</u>, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the <b>penetration tester</b>.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiibqlzRWceaP94gXl0NK8aK5o0UQF284zLzGY0y58koaHXEG2T7CrCENGiysfrwMZNmzwkUo_GeBEPP6DQC61Si-SRn9yo3EduRIU2-J5XwCxne5w3F4hGAd5Fn28RtycfsDL2yj1P06E/s640/backtrack_4_r2.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="244" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiibqlzRWceaP94gXl0NK8aK5o0UQF284zLzGY0y58koaHXEG2T7CrCENGiysfrwMZNmzwkUo_GeBEPP6DQC61Si-SRn9yo3EduRIU2-J5XwCxne5w3F4hGAd5Fn28RtycfsDL2yj1P06E/s640/backtrack_4_r2.jpg" width="640" /></a> <br />
<span class="mw-headline" id="Tools"> </span><br />
<b><span style="font-size: large;"><span class="mw-headline" id="Tools">Tools in Backtrack</span></span></b><br />
<br />
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for <a href="http://en.wikipedia.org/wiki/Live_CD">Live CD</a> and <a href="http://en.wikipedia.org/wiki/Live_USB">Live USB</a> functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.<br />
BackTrack includes many well known security tools including:<br />
<ul><li><a href="http://en.wikipedia.org/wiki/Metasploit_Project" title="Metasploit Project">Metasploit</a> integration</li>
<li><a href="http://en.wikipedia.org/wiki/Monitor_mode" title="Monitor mode">RFMON</a> Injection capable wireless drivers</li>
<li><a href="http://en.wikipedia.org/wiki/Kismet_%28software%29" title="Kismet (software)">Kismet</a></li>
<li><a href="http://en.wikipedia.org/wiki/Nmap">Nmap</a></li>
<li><a href="http://en.wikipedia.org/wiki/Ophcrack">Ophcrack</a></li>
<li><a href="http://en.wikipedia.org/wiki/Ettercap_%28computing%29" title="Ettercap (computing)">Ettercap</a></li>
<li><a href="http://en.wikipedia.org/wiki/Wireshark">Wireshark</a> (formerly known as Ethereal)</li>
<li><a href="http://en.wikipedia.org/wiki/BeEF_%28Browser_Exploitation_Framework%29">BeEF (Browser Exploitation Framework)</a></li>
<li><a href="http://en.wikipedia.org/wiki/Hydra_%28software%29" title="Hydra (software)">Hydra</a></li>
<li>Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enable default password.</li>
<li><a class="new" href="http://en.wikipedia.org/w/index.php?title=Quypt_%28Terminal_Emulator%29&action=edit&redlink=1" title="Quypt (Terminal Emulator) (page does not exist)">Quypt (Terminal Emulator)</a> (which is private software by Crimson Hacking group, which has leaked to the Mainstream) Blackhat</li>
<li>A large collection of <a href="http://en.wikipedia.org/wiki/Exploit_%28computer_security%29" title="Exploit (computer security)">exploits</a> as well as more commonplace software such as <a href="http://en.wikipedia.org/wiki/Web_browser" title="Web browser">browsers</a>.</li>
</ul>BackTrack arranges tools into 11 categories:<br />
<ul><li>Information Gathering</li>
<li>Network Mapping</li>
<li>Vulnerability Identification</li>
<li>Web Application Analysis</li>
<li>Radio Network Analysis (802.11, Bluetooth, RFID)</li>
<li>Penetration (Exploit & Social Engineering Toolkit)</li>
<li>Privilege Escalation</li>
<li>Maintaining Access</li>
<li>Digital Forensics</li>
<li>Reverse Engineering</li>
<li>Voice Over IP</li>
</ul> <span style="font-size: large;"><b><span class="mw-headline" id="Releases">Releases</span></b></span><br />
<table class="wikitable"><tbody>
<tr> <th>Date</th> <th>Release</th> </tr>
<tr> <td>February 5, 2006</td> <td>BackTrack v.1.0 Beta</td> </tr>
<tr> <td>May 26, 2006</td> <td>The BackTrack project released its first non-beta version (1.0).</td> </tr>
<tr> <td>March 6, 2007</td> <td>BackTrack 2 final released.</td> </tr>
<tr> <td>June 19, 2008</td> <td>BackTrack 3 final released.</td> </tr>
<tr> <td>January 9, 2010</td> <td>BackTrack 4 final release. (Now based on Debian)</td> </tr>
<tr> <td>May 8, 2010</td> <td>BackTrack 4 R1 release</td> </tr>
<tr> <td>November 22, 2010</td> <td>BackTrack 4 R2 release</td> </tr>
<tr> <td>May 10, 2011</td> <td>BackTrack 5 release</td></tr>
</tbody></table><br />
Few screenshots(images) of backtrack<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2P8PWgjGfHkGqYSGlrBD2W0gWgBrBfuOsCgPq2y74auwXQzGiB4pMJS5pb5ykUY3Pyd2wK99KjJfAzQcIyab6bQXrgDTJ6zN3RFikXWYWgWNKt_kqklIYVb9srbNXBtLAAxxq7VvsFH4c/s1600/backtrack.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2P8PWgjGfHkGqYSGlrBD2W0gWgBrBfuOsCgPq2y74auwXQzGiB4pMJS5pb5ykUY3Pyd2wK99KjJfAzQcIyab6bQXrgDTJ6zN3RFikXWYWgWNKt_kqklIYVb9srbNXBtLAAxxq7VvsFH4c/s640/backtrack.jpg" width="640" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgysHirR7RiRPk-Bvj3j5PrHh-ghi4j_zFbyNdTE2qiY50FtAlTESSdfiAoXc84SMtZwIued5PYV7dTEsUxYzZJnfGX4LwTV6sDXrEtLWU3q-bTkh4UeRlxqNlD0JNM6IcwUqEQDOEEd2HH/s1600/backtrack4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="398" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgysHirR7RiRPk-Bvj3j5PrHh-ghi4j_zFbyNdTE2qiY50FtAlTESSdfiAoXc84SMtZwIued5PYV7dTEsUxYzZJnfGX4LwTV6sDXrEtLWU3q-bTkh4UeRlxqNlD0JNM6IcwUqEQDOEEd2HH/s640/backtrack4.png" width="640" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSDQVCrZz1zo5ssW6jvH457sy3WxpjPAdDmqYsy-g40TYs-olKb_-S6BAXv2JiB0CKgF3d3kUGZqLioElr_k80gh2EU14kczEZlSsHZIlu7RubzKglCJm2ZROrtRsDoUjLTyKiOZN3ycUL/s1600/backtracklinux.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="478" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSDQVCrZz1zo5ssW6jvH457sy3WxpjPAdDmqYsy-g40TYs-olKb_-S6BAXv2JiB0CKgF3d3kUGZqLioElr_k80gh2EU14kczEZlSsHZIlu7RubzKglCJm2ZROrtRsDoUjLTyKiOZN3ycUL/s640/backtracklinux.jpg" width="640" /></a></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiibqlzRWceaP94gXl0NK8aK5o0UQF284zLzGY0y58koaHXEG2T7CrCENGiysfrwMZNmzwkUo_GeBEPP6DQC61Si-SRn9yo3EduRIU2-J5XwCxne5w3F4hGAd5Fn28RtycfsDL2yj1P06E/s640/backtrack_4_r2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br />
</a></div>h4ck0lichttp://www.blogger.com/profile/01030672869936996937noreply@blogger.com0