Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

Wednesday, November 9, 2011

BackTrack : Intro to the beast.


Hey guys how are you... Xeo Hacker suggested that it wud be better to discuss backtrack from very beginning. Although there are previously some posts on backtrack but m marking it as first post . here we go :

What is BackTrack

Although most of you know this still in case you dont , m writing about wat this is actually .
This is basically a Ubuntu/Linux based Operating System in Gnome as well as KDE flavours. BackTrack is named after an algorithm "backtracking" . This is made ,keeping digital forensics and penetration testing in mind.
Backtrack is originated from two earlier distribution who focused on penetration testing:
  • WHAX
  • Auditor Security Collection


whats so special about this  ???


You must have heard backtrack here n there . Why its so special in the field of hacking and why hackers are using it frequently ???
Is it necessary to use BT for hacking ???  These are some questions we'll be discussing here.

Why its so special !!!
It is special because of its pre-installed CLI and GUI tools for hacking ,mostly for penetration testing and digital forensics. It has a lot of inbuilt tools which helps u in a complete Security assesment ....

Is it necessary yo use BT in hacking ???
BT is not necessary but its highly recommended for hacking . If you wish to get benefits of backtrack without using BT then u have to install more than 200 tools . And if u r interested in hacking , why to suffer all these troubles , simply install backtrack.


Tools Included


As i said there are more than 200 inbuilt tools in bactrack , and i cant list all of them , but in backtrack tools are arranged in a very good manners .

BackTrack arranges tools into 12 categories:
  • Information Gathering
  • Vulnerability Assesment
  • Exploitation
  • Privilege Escalation 
  • Maintaining Access
  • Reverse Engineering
  • RFID tools
  • Stress Testing Tools
  • Forensics
  • Reporting tools
  • Services
  • Miscellaneous
Thats it.


Ok guys thats all for this post , will post very soon again.
Hope u enjoyed this post , thank you for reading .
Stay Tuned !

" Copyright © 2011. All rights reserved by “Kumar Sourav" & "xeo hacker" "

About the Author

I am XEO Hacker, the founder of Hack With Style (HWS). I am blogging since 2009 before that I just search things and now I am sharing my knowledge through this plateform.I'm also a freelance writer on topics related to Website Hacking,Website Optimization (SEO), blogger customizations and making money online.
In 61 people's circles

Subscribe To Get FREE Tutorials!


Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.

0 comments:

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Note:-
Please do not spam Spam comments will be deleted immediately upon my review.

Regards,
XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers