BackBox
Encyclopedia
BackBox is a Linux distribution
Linux distribution
A Linux distribution is a member of the family of Unix-like operating systems built on top of the Linux kernel. Such distributions are operating systems including a large collection of software applications such as word processors, spreadsheets, media players, and database applications...

 based on Ubuntu developed to perform penetration test
Penetration test
A penetration test, occasionally pentest, is a method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders and malicious insiders...

s and security assessments. Designed to be fast, easy to use and to provide a minimal yet complete desktop environment thanks to its own software repositories constantly updated to the last stable version of the most known and used ethical hacking tools.

Contents

Backbox uses the light window manager
Window manager
A window manager is system software that controls the placement and appearance of windows within a windowing system in a graphical user interface. Most window managers are designed to help provide a desktop environment...

 XFCE
Xfce
Xfce is a free software desktop environment for Unix and other Unix-like platforms, such as Linux, Solaris, and BSD – though recent compatibility issues have arisen with regard to BSD Unix platforms...

.

It includes some of the most used security and analysis programs for Linux, such as web application analysis, network analysis, stress tools, sniffing, vulnerability assessment tools, forensic and exploitation.

Complete List of Tools of BackBox Linux

Releases

Date Release
Sep 9, 2010 Release BackBox Linux 1 RC
Oct 21, 2010 Release BackBox Linux 1 RC2
Jan 3, 2011 Release BackBox Linux 1
May 5, 2011 Release BackBox Linux 1.05
Sep 3, 2011 Release BackBox Linux 2


BackBox Linux categories listed as follow:
  • Information Gathering
  • Vulnerability Assessment
    Vulnerability assessment
    A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply...

  • Exploitation
    Exploit (computer security)
    An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic...

  • Privilege Escalation
    Privilege escalation
    Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user...

  • Maintaining Access
  • Forensic Analysis
    Computer forensics
    Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media...

  • VoIP Analysis
  • Wireless
    Wireless
    Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications...

     Analysis
  • Stress Tools
  • Miscellaneous

BackBox Linux includes nearly 70 tools, here the list of some well known tools:
  • Metasploit/Armitage
    Metasploit Project
    The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development....

  • Nmap
    Nmap
    Nmap is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a "map" ofthe network...

  • OpenVAS
    OpenVAS
    OpenVAS is a framework of several services and tools offering avulnerability scanning and vulnerability management solution.The actual security scanner is accompanied with a daily updated feed...

  • W3af
    W3af
    w3af is an open-source web application security scanner. The project provides a vulnerability scanner and exploitation tool for Web applications...

  • The Social Engineering Toolkit
    Social engineering (security)
    Social engineering is commonly understood to mean the art of manipulating people into performing actions or divulging confidential information...

  • Ettercap
    Ettercap (computing)
    Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It runs on various Unix-like operating systems including Linux, Mac OS X, BSD and Solaris, and on Microsoft Windows...

  • Scapy
    Scapy
    Scapy is a packet manipulation tool for computer networks, written in Python by Philippe Biondi. It can forge or decode packets, send them on the wire, capture them, and match requests and replies...

  • Wireshark
    Wireshark
    Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education...

  • Kismet
  • Aircrack
    Aircrack-ng
    Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g...

  • Ophcrack
    Ophcrack
    Ophcrack is a free open source program that cracks Windows passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows...

  • John The Ripper
    John the Ripper
    John the Ripper is a free password cracking software tool. Initially developed for the UNIX operating system, it currently runs on fifteen different platforms...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK