#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

Search results for BackTrack | Breaking Cybersecurity News | The Hacker News

BackTrack 5 Release in 5 days, on 10th May !

BackTrack 5 Release in 5 days, on 10th May !

May 06, 2011
BackTrack 5 Release in 5 days, on 10th May ! For all those who haven't heard, BackTrack 5 will be released in 5 days. So far, BT are on schedule and the whole team is excited by the release. The 10th will be a hectic day for us, so BT thought BT'd start putting out some information about BackTrack 5 ahead of time – to reduce thier load on the release day. BT know that there are probably many questions about BackTrack, to answer some of your questions here are some exciting points: BT5 release will start on May 10th (don't bug us about the timezone), and will primarily be available for download via torrents. This is to reduce the massive load on our mirrors for the first few hours. As time progresses into the release , BT will then allow direct downloads from our mirrors. BT will have KDE (4.6) and Gnome (2.6) Desktop environment flavours 32 and 64 bit support A basic ARM BackTrack image which can be chrooted into from android enabled devices. (hopefully released May 10th) Th
Hey Hackers, Get Ready For BackTrack 5 in February 2011 !

Hey Hackers, Get Ready For BackTrack 5 in February 2011 !

Dec 04, 2010
Hey Hackers, Get Ready For BackTrack 5 in February 2011 ! Exciting times here at Offensive Security. This week two prominent security communities are launching some monster news. We'll start with BackTrack.  The open source community has been the heart and soul behind its growth from a personal side project to over 5 million downloads.  As times go on it gets harder to devote the time and effort needed to maintain, update and enhance BackTrack.  That is no longer a problem as a funded team is now arranged to ensure those things get done.  We now have a  roadmap  that lands you at the end with the release of BackTrack 5. On to the Exploit Database.  In the past couple of months we've been putting a significant amount of effort in improving the database and adding new features. Today we begin a new initiative within the Exploit database – a new EDB Research and Development team. The team is actively working on vulnerability discovery and development, and will post interesting findin
Recover from Ransomware in 5 Minutes—We will Teach You How!

Recover from Ransomware in 5 Minutes—We will Teach You How!

Apr 18, 2024Cyber Resilience / Data Protection
Super Low RPO with Continuous Data Protection: Dial Back to Just Seconds Before an Attack Zerto , a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use snapshots, agents, or any other periodic data protection methodology. Zerto has no impact on production workloads and can achieve RPOs in the region of 5-15 seconds across thousands of virtual machines simultaneously. For example, the environment in the image below has nearly 1,000 VMs being protected with an average RPO of just six seconds! Application-Centric Protection: Group Your VMs to Gain Application-Level Control   You can protect your VMs with the Zerto application-centric approach using Virtual Protection Groups (VPGs). This logical grouping of VMs ensures that your whole applica
BackTrack 5 will also be for Motorola Xoom !

BackTrack 5 will also be for Motorola Xoom !

Apr 13, 2011
In the past few days offensive-security have been toying with some Motorola hardware, and have managed to get a basic build of BackTrack 5 (+ toolchain) on a Motorola Xoom. The possibilities look exciting as offensive-security are slowly building several experimental arm packages. offensive-security team does not have much experience with the Android OS nor ARM hardware, but so far – so good. offensive-security will not promise an ARM release on May 10th, as this new "experiment" was not planned in any way – but we'll do our best. As of now, offensive-security have got a modified version of an Ubuntu 10.04 ARM image, chrooted on a Motorola Xoom. The tablet is running a modified, overclockable kernel (from 1.0 to 1.5 GHz). The chrooted BackTrack environment is running a VNC server, from which you can connect from the tablet itself. When run locally from the Xoom tablet, the VNC session does not lag, and the touch keyboard and touchscreen are very workable. As expected from a chroote
cyber security

Today's Top 4 Identity Threat Exposures: Where To Find Them and How To Stop Them

websiteSilverfortIdentity Protection / Attack Surface
Explore the first ever threat report 100% focused on the prevalence of identity security gaps you may not be aware of.
BackTrack 5 R1 Released - Penetration Testing Distribution

BackTrack 5 R1 Released - Penetration Testing Distribution

Aug 19, 2011
BackTrack 5 R1 Released - Penetration Testing Distribution BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you're making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester. Official BackTrack 5 R1 change log: This release contains over 120 bug fixes, 30 new tools and 70 tool updates. The kernel was updated to 2.6.39.4 and includes the relevant injection patches. According to the guys at OffSec, This release is their best one yet! Some pesky issues such as rfkill in VMWare with rtl8187 issues have been fixed, which provides for a much more solid experience with BackTrack.We've have Gnome and KDE ISO images for 32 and 64 bit (no arm this release),
Book Review: BackTrack 4: Assuring Security by Penetration Testing

Book Review: BackTrack 4: Assuring Security by Penetration Testing

Jan 19, 2012
Book Review: BackTrack 4: Assuring Security by Penetration Testing This review is for the BackTrack 4: Assuring Security by Penetration Testing book published by Packtpub written by Wes Boudville. The authors tackle a persistent danger to many websites and networks that hang off the Internet, where often the complexity of the operating systems and applications and the interactions between these can open doors to attackers. So the basic idea of penetration testing is to preemptively probe ('attack') your system. Find the weaknesses first, before others do so. In part, the text offers a good overview of the field, separate from the usages of BackTrack. So you get a summary of several common security testing methodologies. Including the Open Source Security Testing Methodology Manual. If you have a background in science experiments, you'll see clear parallels in how this OSSTMM approach investigates an unknown system. As far as BackTrack is concerned, its capabilities are
Giveaway : Win a Backtrack or iPhone book

Giveaway : Win a Backtrack or iPhone book

Jan 19, 2012
Giveaway: Win a Backtrack or iPhone book After the huge success of our earlier giveaway we have again teamed up with Packt Publishing and we are organizing a giveaway where Three lucky winners stand a chance to win a copy of their choice between two great selling books i.e iPhone Applications Tune-Up or BackTrack 4: Assuring Security by Penetration Testing.  Keep reading to find out how you can be one of the Lucky Winner.  The contest will close on 05/FEB/2012. Overview of the first book: iPhone Applications Tune-Up Tune up every aspect of your iOS application for greater levels of stability and performance. Read more about this book and download free Sample Chapter here Overview of the second book: BackTrack 4: Assuring Security by Penetration Testing • Learn the black-art of penetration testing with in-depth coverage of BackTrack Linux distribution. Read more about this book and download free Sample Chapter here How to Enter? 1) Tweet this article – you can use the tweet but
BackTrack 5 R3 Released - Download Now !

BackTrack 5 R3 Released - Download Now !

Aug 13, 2012
The latest version of Backtrack is out! Check out Backtrack 5 R3! " The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – "Physical Exploitation", which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection. " Backtrack Team have released a single VMware Image (Gnome, 32 bit), for those requiring other VM flavors of BackTrack. Download BackTrack 5 R3
BackTrack 4 R2 : New release download now !

BackTrack 4 R2 : New release download now !

Nov 24, 2010
After being in production for almost 3 months, BackTrack has been updated – yet again! It has been aptly code named – " Nemesis ". "BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you're making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester." This is the official change log for the update: Kernel 2.6.35.8 – *Much* improved mac80211 stack. USB 3.0 support. New wireless cards supported. All wireless Injection patches applied, maximum support for wireless attacks. Even *faster* desktop environment. Revamped Fluxbox environment for the KDE challenged. Metasploit rebuilt from scratch , MySQL db_drivers working out of the
BackTrack 5 R2 Released, New Kernel, New Tools

BackTrack 5 R2 Released, New Kernel, New Tools

Mar 01, 2012
BackTrack 5 R2 Released, New Kernel, New Tools Hacker are your Ready ? Backtrack 5 R2 finally released with bug fixes, upgrades, and the addition of 42 new tools. With the best custom-built 3.2.6 kernel, the best wireless support available at maximum speed. This release have included Metasploit 4.2.0 Community Edition, version 3.0 of the Social Engineer Toolkit, BeEF 0.4.3.2, and many other tool upgrades. Backtrack also added the following new tools to R2: arduino bluelog bt-audit dirb dnschef dpscan easy-creds extundelete findmyhash golismero goofile hashcat-gui hash-identifier hexorbase horst hotpatch joomscan killerbee libhijack magictree nipper-ng patator pipal pyrit reaver rebind rec-studio redfang se-toolkit sqlsus sslyze sucrack thc-ssl-dos tlssled uniscan vega watobo wcex wol-e xspy Along with this, Backtrack added Wiki about Building a Pyrit Cluster, Creating a John the Ripper Cluster, Enabling PAE in BT5 R2 and Installing VMware P
BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing

May 05, 2011
BackTrack 4  : Assuring Security by Penetration Testing Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.  Download :  https://shrta.com/files/0ZYSOJBV/BackTrack-4-Assuring-Security-by-Penetration-Testing.zip Or https://www.multiupload.com/ZCV9Q3WO4X
Win Free Copies of BackTrack 5 Wireless Penetration Testing Guide with The Hacker News

Win Free Copies of BackTrack 5 Wireless Penetration Testing Guide with The Hacker News

Sep 22, 2011
Win Free Copies of BackTrack 5 Wireless Penetration Testing Guide with The Hacker News Fellow hackers would be very pleased to know that to celebrate the release of their new book- BackTrack 5 Wireless Penetration Testing Beginner's Guide , Packt Publishing is giving away 2 copies of the book to The Hacker News readers. Keep reading to find out how you can be one of the Lucky Winner. Here is a quick overview of BackTrack 5 Wireless Penetration Testing Beginner's Guide · Learn Wireless Penetration Testing with the most recent version of Backtrack · The first and only book that covers wireless testing with BackTrack · Concepts explained with step-by-step practical sessions and rich illustrations · Written by Vivek Ramachandran ¬ world renowned security research and evangelist, and discoverer of the wireless "Caffe Latte Attack" Read More How To Win Sound like something you might be interested in? All you need to do is head on over to the bo
BackTrack 5 “revolution” will Release on May 10th, 2011

BackTrack 5 "revolution" will Release on May 10th, 2011

Mar 14, 2011
BackTrack 5 " revolution " will Release on May 10th, 2011 As BackTrack 5 development rolls on full steam ahead, we've been getting numerous questions about the future release. We thought we'd publish a blog post with general information about BT5 for the impatient. The codename of this release will be " revolution ", for a bunch of reasons. BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS) , and will (finally) support both 32 bit and 64 bit architectures. We will be officially supporting KDE 4 , Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment (DE). Tool integration from our repositories will be seamless with all our supported DE's, including the specific DE menu structure. Perhaps most importantly BackTrack 5 "revolution" will be our first release to include full source code in it's repositories. This is a big thing for us, as it officially joins us to the open-source community and clears up any licensing issues which were pres
Book Review : Defense against the Black Arts

Book Review : Defense against the Black Arts

Jan 20, 2012
Book Review : Defense against the Black Arts How Hackers Do What They Do and How to Protect against It Ben Rothke  write a review of a   new book on hacking " Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It ". Authors are Jesse Varsalone, Matthew Mcfadden, Michael Schearer and Sean Morrissey. " If there ever was a book that should not be judged by its title, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, is that book. Even if one uses the definition in The New Hackers Dictionary of 'a collection of arcane, unpublished, and (by implication) mostly ad-hoc techniques developed for a particular application or systems area', that really does not describe this book. The truth is that hacking is none of the above. If anything, it is a process that is far from mysterious, but rather aether to describe. With that, the book does a good job of providing the reader with the information ne
BackTrack 5 Release 1 will be available on 10th of August,2011

BackTrack 5 Release 1 will be available on 10th of August,2011

Jul 20, 2011
BackTrack 5 Release 1 will be available on 10th of August,2011 BackTrack 5 R1 (Release one) will be available for download on the 10th of August,2011. This will complete our first 3 month cycle since the last release. With over 100 bug fixes, numerous package updates and the addition of over 30 new tools and scripts.  BackTrack Crew  will have a pre-release event of BackTrack 5 R1 at the BlackHat / Defcon Conference a few days earlier.
Contest Winners Announcement : Wireless Penetration Testing Guide book

Contest Winners Announcement : Wireless Penetration Testing Guide book

Oct 02, 2011
Contest Winners Announcement : Wireless Penetration Testing Guide book We ran a competition for the book " Backtrack 5 Wireless Penetration Testing " last week. Today, Vivek Ramachandran, the author of the book and Founder of SecurityTube.net is announcing the winners in the video below. We will be contacting the winners via email soon. Two Best Comments Selected by Author are : Scott Herbert : For me it's the "man-in-the middle" and other cutting edge wireless attacks that make it a book worth getting (even if I don't win). neutronkaos : What interests me most about this book is that it is dedicated to wireless hacking. In an age where almost everybody is rocking a wireless AP, this book could do alot in offense and defense. I have been a Backtrack fan since Backtrack 3 and I have seen several of Mr. Ramachandran's primers on security tube. I am currently deployed to Afghanistan and I am working towards a degree in Network Security. I would love to have this boo
Update : Backtrack Kali Linux 1.0.3 released with built-in accessibility features

Update : Backtrack Kali Linux 1.0.3 released with built-in accessibility features

Apr 26, 2013
BackTrack Linux, a specialized distribution of penetration testing tools, has long been a favorite of security specialists and IT pros. Security professionals have been relying on the BackTrack security distribution for many years to help them perform their assessments. A couple of weeks ago, futuristic major release of BackTrack was announced as   Kali Linux . Today Backtrack team released few updates to Kali Linux as version 1.0.3 and fixed couple of bugs. " Our first attempts at building an accessible version of Kali failed and after a bit of digging, we found that there were several upstream GNOME Display Manager (GDM3) bugs in Debian, which prevented these accessibility features from functioning with the GDM greeter. Working together with an upstream GNOME developer, we knocked out these bugs and had the fixes implemeted in Kali, and hopefully in future builds of GDM3 in Debian ." Download  new version of Kali Linux ( kali-linux-1.0.3-i386.iso ) wi
Carders.cc, Exploit-db.org, Inj3ct0r.com, backtrack-linux.org and others hacked on Christmas !

Carders.cc, Exploit-db.org, Inj3ct0r.com, backtrack-linux.org and others hacked on Christmas !

Dec 28, 2011
A group of hackers attacked and took offline several sites belonging to credit-card sharing groups, security experts and other hacking communities who made mistakes in basic security. Administrators of six Websites woke up Christmas morning to discover their sites had been hacked, according to an online newsletter published by the hackers themselves on Dec. 25. In the second issue of " Owned and Exposed ," the attackers listed carders.cc, ettercap, exploit-db, backtrack, inj3ct0r, and free-hack . While free-hack was taken down for being "lame script kiddies," the other sites had criminal ties or were security experts who "fail so hard at security that we wonder why people really take their training courses," according to the e-zine. Mati Aharoni, the administrator of  exploit-db , a security-oriented site that catalogs known exploits and vulnerabilities, admitted to being compromised in a blog post, but said that it was limited. "Other than our egos,
Download Kali Linux, from the creators of BackTrack

Download Kali Linux, from the creators of BackTrack

Mar 13, 2013
Great news for Hackers and Backtrack Linux fans! The most awaited penetration testing Linux distribution has been released called ' Kali Linux ' or ' Backrack 6 ', from the creators of BackTrack itself. From last 7 years we have seen five awesome versions of Backtrack Linux. But this time to achieve some higher goals, team decided to leave the 4 years old development architecture and ' Kali Linux ' born today. Kali Linux is based upon Debian Linux, instead of Ubuntu and new streamlined repositories synchronize with the Debian repositories 4 times a day, constantly providing users with the latest package updates and security fixes available. Another great feature introduced is that, because of Debian compliant system, it is now able to Bootstrap a Kali Installation/ISO directly from Kali repositories. This allow any user to easily build their own customization of Kali, as well as perform enterprise network installs from a local or remote repository. The Kali Li
Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran

Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran

Sep 14, 2011
Book : Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran This book will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide the readers with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools. We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the-Middle attacks, creating Wi-Fi Honeypots and compromise networks running WPA-Enterprise mechanisms such as PEAP and EAP-TTLS. Even though touted as a Beginner's Guide, this book has something for everyone - from the kiddies to the Ninjas. You can purchase the book from: Global: https://www.amazon.com/BackTrack-Wireless-Penetration-Testing-Beginners/dp/1849515581/ India: https://www.packtpub.com/backtrack-5-wireless-penetration-testi
BackTrack 5 ( BT5 ) Coming Soon !

BackTrack 5 ( BT5 ) Coming Soon !

Feb 22, 2011
BackTrack 5 ( BT5 ) Coming Soon ! We're behind schedule with BackTrack 5 , but are working hard to make up for lost time. We thought we'd post a few pictures for your enjoyment of the development BT5 ISO we're working on. The screenshots were taken on a 2.6.38-rc5 kernel. The screenshot above is of the KDE 4 theme currently in development. The screenshot above is of the current OSSIM compatible menu structure (WIP). The screenshot above is of working IEEE r8187 drivers on our new kernel. Take into account that many things may and will change in terms of appearance – these are initial mockups are are creating for various environments. Final release in a couple of months at least. News Source : BackTrack
Cybersecurity Resources