Backtrack Manual Part2
Upcoming SlideShare
Loading in...5
×
 

Backtrack Manual Part2

on

  • 7,735 views

Enjoy the 2nd part...For any query contact: nutan.appin@gmail.com

Enjoy the 2nd part...For any query contact: nutan.appin@gmail.com

Statistics

Views

Total Views
7,735
Views on SlideShare
7,734
Embed Views
1

Actions

Likes
0
Downloads
390
Comments
0

1 Embed 1

http://www.slideshare.net 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Backtrack Manual Part2 Backtrack Manual Part2 Document Transcript

  • Project Report<br />-459105253365on<br />-22459952540<br />Project by - Nutan Kumar Panda<br />Technology Evangelist ISEH<br />R&D - ATL Guwahati<br />Backtrack:<br />BackTrack is one of the more popular distributions in the white hat circles. It is specially suited for penetration testing, with more than 300 tools available for the task. Like both Helix and Protech, BackTrack is based on Ubuntu. This means good stability and hardware detection and a whole lot of software that can be easily obtained.<br />BackTrack is a Linux distribution distributed as a Live CD which resulted from the merger of WHAX(previously Whoppix) and the auditor security collection, which used for penetration testing.<br />The BackTrack project was created by Mati Aharani and Max moser and is collaborative effort involving the community.<br />
    • Backtrack 2 released march 6, 2007
    (includes over 300 security tools)<br />
    • Beta version of BackTrack 3 released Dec. 14, 2007
    (focus was to support more and newer hardware as well as provide more flexibility and modularity)<br />
    • BackTrack 3 released june 19,2008
    (new additions include SAINT and Maltego)<br />
    • Backtrack 3 Final Realesed Feb 11,2009
    • BackTrack 4 Beta Released Feb 11, 2009
    (move to debian)<br />
    • BackTrack 4 pre-release Released 19th June, 2009
    • BackTrack 4 Final released 11th January 2010
    • BackTrack 4 R1 released may 8th,2010
    • BackTrack 4 R2 released November 22nd, 2010
    BACKTRACK 4<br />Company/DeveloperMati Aharani, Emanuele Gentilli, and othersOS familyUnix-likeWorking StateCurrentSource ModelOpen SourceLatest Stable release4.0 R2/November 22nd , 2010Kernel typeMonolithicDefault User InterfaceBash,KDE,FluxboxLicenseVariousOfficial Websitewww.backtrack-linux.org<br />Behind the curtains<br />BackTrack Base<br />There have been many changes introduced into BackTrack 4 ‐ most notably, our<br />move to an Ubuntu Intrepid base. We now maintain our own full repositories with<br />modified Ubuntu packages in addition to our own penetration testing tools.<br />Another significant change is the updated kernel version, currently at 2.6.29.4. This<br />new kernel brought an onset of internal changes, which have greatly changed the<br />structure of BackTrack.<br />BackTrack Kernel<br />We no longer use lzma enabled squashfs as our live filesystem, which on one hand<br />results in larger ISO size, but on the other hand, frees us from having to maintain<br />our own kernel patches. This is especially painful these days, as squashfs is slowly<br />moving into the mainstream kernel (at the time of this writing).<br />BackTrack 4 uses squashfs‐tools version 4.0 (which is not backward compatible<br />with previous versions), and the inbuilt squashfs kernel module, which is present in<br />2.6.29.4. AUFS is used as the unification filesystem (aufs2.x).<br />Several wireless driver injection/optimization patches have been applied to the<br />kernel, as well as a bootsplash patch. These patches can be found in the kernel<br />sources package (/usr/src/linux/patches).<br />These changes mean that much of what you were used has<br />changed in terms of boot cheatcodes and such, as this kernel shift also means we no<br />longer use the livelinux<br />scripts to create our images (we use casper now).<br />FEATURES:<br />BackTrack focuses its central idea on the needs of penetration testers. The inclusion of live CD and Live USB functionality enables any user to just insert their respective data medium and boot up BackTrack<br />Direct hard disk installation(2.7GB uncompressed) can also be completed within the Live DVD(1.5GB compressed) environment the basic graphical installation wizard with no restart subsequent to installation. BackTrack further continue its compatibility with accessibility and internationalization by including support for japenese input in reading and writing in hiragana, katakana and kanji.<br />THE KEY ADIITION TO THE BACKTRACK SUITE are notably<br />
    • Metasploit integration
    • RFMON Injection capable wireless drivers
    • Kismet
    • Autoscan-network(AutoScan-Network is a network discovering and managing application)
    • Nmap
    • Ettercap
    • Wireshark(Formely known as Ethereal)
    • BeEF(browser Exploitation Framework)
    BackTrack’s functionality further increases with the arrangement of each tool in 11 categories. The tool categories are as follows.<br />
    • Information Gathering
    • Network Mapping
    • Vulnerability Identification
    • Web Application Analysis
    • Radio network, Analysis(802.11, Bluetooth, Rfid)
    • Penetration(Exploit & social Engineering Toolkit)
    • Privilege Escalation
    • Maintaining Access
    • Digital Foreensics
    • Reverse Engineering
    • Voice over IP
    In relation to basic software packages, BackTrack includes some ordinary desktop programs such as Mozilla Firefox, Pidgin, K3b and XMMS.<br />UPDATING BACKTRACK<br />keeping BackTrack up to date is relatively simple by using the apt-get commands.<br />
    • apt-get update : Synchronizes your package list with our repository.
    • apt-get upgrade : downloads and installs all the updates available.
    • apt-get dist-upgrade :downloads and installs all new upgrades.
    • Meta Packages
    • A nice feature that arises from the tool categorization, is that we can now support “Backtrack meta Packages”.
    • A meta package is a dummy package which includes several other packages.
    • For eg., the meta package “backtrack web” would include all the web application penetration testing tools backtrack has to offer.
    • Meta Meta packages
    • There are two “Meta Meta Packages”: BackTrack world and BackTrack-desktop.
    • BackTrack-World contains all the backtrack meta packages, while backtrack-desktop contains backtrack-world, backtrack-networking and backtrack-multimedia. The latter two meta packages are select applications imported from Ubantu Repositories.
    Working with BackTrack<br />BackTrack 4 contains an “imposed” KDE3 repository, alongside the KDE4 Ubuntu<br />Intrepid repositories. <br />Updating tools manually<br />Our BackTrack repositories will always strive to keep updated with the latest<br />versions of tools, with the exception of a select few. These “special” tools get<br />updated by their authors very frequently, and often include significant updates. We<br />felt that creating static binaries for these types of tools would not be beneficial and<br />users were better of keeping these tools synched with the SVN versions<br />respectively. The tools include MSF, W3AF, Nikto, etc.<br />Installation<br />BackTrack comes as a live CD, so to run it, you simply need to insert it in the CD drive and then boot the system. At the prompt, log on as root and then enter the root password toor before going on to set up the GUI with xconf. After you have completed the setup, simply type startx to launch the GUI. If an error occurs, try gui as a workaround for launching the graphical interface.If you need to, you can type dhcpcd to ask the DHCP server for an IP address. BackTrack does not do this automatically. BackTrack’s KDE-based menu system provides access to dozens of security tools and other forensic-analysis applications (see Figure 1). Browsing the BackTrack menu is a little like browsing the many menus and submenus of a games distribution; only, instead of a bunch of games, the GUI is stocked with sniffers, spoofers, scanners, and other utilities to assist you with security testing.<br />Creating your own Live CD – Method 1<br />Creating your own flavor of BackTrack is easy.<br />1. Download and install the bare bones version of BackTrack<br />2. Use apt‐get to install required packages or meta packages.<br />3. Use remastersys to repackage your installation.<br />Creating your own Live CD – Method 2<br />Download the BackTrack 4 iso. Use the customization script to update and modify<br />your build as show here:<br />http://www.offensive‐security.com/blog/backtrack/customising‐backtrack‐live‐cdthe‐<br />easy‐way/<br />Installing BackTrack to USB<br />The easiest method of getting BackTrack4 installed to a USB key is by using the<br />unetbootin utility (resent in BackTrack in /opt/).<br />Installing Backtrack to a harddrive (using Ubiquity)<br />Boot from the Backtrack DVD and choose “Start Backtrack in Text Mode”<br />Backtrack will boot and will automatically end up at a root prompt.<br />Launch the GUI by running ‘startx’.<br />Open a konsole and run ‘ubiquity’.<br />At the “Language crashed” dialog, choose “Continue anyway’”<br />Set timezone and choose keyboard layout.<br />Let backtrack partition the disk. (‘Use entire disk’)<br />Enter new user account information. (Pick a strong password, as this will be the user account used to log on into Backtrack)<br />Review the installation summary and press “install” to start the installation.<br />Reboot when installation has completed<br />Log in with the newly created user<br />change the password for root (sudo passwd root)<br />Lots of great stuff <br />Like most Linux distros - and definitely all forensics/security-oriented tools, BackTrack works primarily as a live CD, with good hardware detection and low memory footprint, intended to make it usable even on older machines. It is also possible to install BackTrack, should one desire. <br />The boot menu is simple and elegant, with three options. <br />The second option (Console no FB) stands for Console no Framebuffers, i.e. the failsafe mode with minimal graphics that should work well on all hardware. Thanks k finity! As to the third option, MSRAMDUMP, I did try booting it, but this produced an error and threw me back into the boot menu. <br />The distro maintains its elegance by booting into the best-looking console I have seen, with stylish color gradients and mirror effects. You can begin working instantly on the command-line or boot into GUI desktop by issuing startx command. <br />Desktop <br />The desktop is simple and functional, running a lightweight KDE3 manager. You get a simple wallpaper with dragon-like theme. Another interesting element is the Run box embedded in the panel, which allows you to run applications without invoking a terminal first. <br />102870030480<br />The network is not enabled by default and you'll have to fire it up manually. <br />Tools <br />BackTrack is all about lots and lots of hacking tools. Once again, I'm only going to present the tools, not show you how to use them. These tools are all double-edged swords, and without the right amount of respect, skill and integrity, you may cause more harm than good. Furthermore, do not deploy them in a production environment without the explicit approval from system administrators and INFOSEC people. <br />The tools can all be found under Backtrack in the menu, arranged into sub-categories. The collection is long and rich and it will take you a long time pouring over all of them, let alone mastering them. Most of the tools are command-line utilities, with menu items a link to the console with the relevant tool running inside it. <br />Backtrack 4 R2 Tools:<br />Go to Kmenu->Backtrack<br />1. Information Gathering<br />
    • Archive
    • Metagoofil
    • SEAT
    • DNS
    • DNS-Walk
    • DNSTracer
    • Dns Enum
    • Dnsmap
    • Dnsmap-bulk
    • Dnsrecon
    • Fierce
    • Lbd
    • Route
    • 0trace
    • Dmitry
    • Ltrace
    • Lanmap
    • Netenum
    • Protos
    • TCPtraceroute
    • Tctrace
    • Searchengine
    • Googmail
    • Goohost
    • Goorecon
    • Gooscan
    • MetaGoofil
    • SEAT
    • TheHarvester
    • WhatWeb
    • Dradis Client
    • Dradis Server
    • Paterva Maltego CE
    2. Network Mapping<br />
    • Identify Live Hosts
    • 0trace
    • 5nmp
    • Angry IPScan
    • Arping
    • Autoscan
    • Fping
    • Genlist
    • Hping2
    • Hping3
    • Lanmap
    • Lanmap2
    • Nbtscan
    • Netifera
    • Nmap
    • Nsat
    • Onesixtyone
    • OutputPBNJ
    • SCTPscan
    • SSLscan
    • ScanPBNJ
    • TCPtraceroute
    • Unicornscan
    • Zenmap
    • OS-Fingerprinting
    • 5nmp
    • Autoscan
    • Lanmap2
    • Nmap
    • Nsat
    • Onesixtyone
    • P0f
    • Protos
    • SSLscan
    • Unicornscan
    • XProbe2
    • Zenmap
    • Portscanning
    • Angry IPScan
    • Autoscan
    • Genlist
    • Netifera
    • Nmap
    • Nsat
    • OutputPBJN
    • Propecia
    • SCTPscan
    • ScanPBJN
    • Unicornscan
    • Zenmap
    • Service Fingerprinting
    • Amap
    • Dmitry
    • Httprint
    • Httprint_GUI
    • Httsquash
    • LetDown
    • ReverseRaider
    • VPN
    • Ike-scan
    • PSK-Crack
    3. Vulnerability Identification<br />
    • Cisco
    • Cisco Auditing Tool
    • Cisco Global Exploiter
    • Cisco OCS Mass Scanner
    • Cisco Passwd Scanner
    • Copy Router Config
    • Merge Router Config
    • Fuzzers
    • Bed
    • Bf3
    • Bunny
    • Dkftpbench
    • Fuzzgrind
    • Fuzzgrind GUI
    • JBroFuzz
    • JBroFuzz-Encoder
    • Peach
    • Spike
    • Voiper
    • WsFuzzer
    • ZZuf
    • OpenVas
    • OpenVas Add User
    • OpenVas Cli
    • OpenVas Client
    • OpenVas Make Cert
    • OpenVas NVT Sync
    • Start OpenVas Administrator
    • Start OpenVas Manager
    • Start OpenVas Scanner
    • Stop OpenVas Administrator
    • Stop OpenVas Manager
    • Stop OpenVas Scanner
    • SMB Analysis
    • Impacket samrdump
    • Impacket smbclient
    • SMBclient
    • Smb4K
    • SNMP Analysis
    • ADMSnmp
    • Braa
    • SNMP Walk
    • SNMPcheck
    • Snmp Enum
    4. Web Application Analysis<br />
    • Database (backend)
    • MSSQL
    • DBPwAudit
    • MSSQLScan
    • Metacoretex
    • Pblind
    • SA Exploiter
    • SQL Ninja
    • SQLMap
    • SQLbrute
    • SQLix
    • MYSQL
    • DBPwAudit
    • Metacoretex
    • Mysqlaudit
    • Pblind
    • SQLCheck
    • SQLData
    • SQLMap
    • SQLix
    • Sqlsus
    • UDF
    • Oracle
    • DBPwAudit
    • Metacoretex
    • Opquery
    • Opwg
    • Oscanner
    • Ose
    • Otnsctl
    • Pblind
    • SQLMap
    • SQLbrute
    • SQLix
    • THC-OracleCrackert
    • Web (frontend)
    • ASP-Audit
    • Burpsuite
    • Burpsuite Msf
    • CSRFTester
    • Curl
    • DFF Scanner
    • DharmaEncoder
    • DirBuster
    • Fimap
    • Flare
    • Flasm
    • Grabber
    • Grendel Scan
    • HCraft
    • Httprint
    • Httprint_GUI
    • Jmeter
    • JoomScan
    • Lbd
    • List-Urls
    • Lynx
    • Mini Mysqlat0r
    • Nikto2
    • OpenAcunetix
    • Paros Proxy
    • Powerfuzzer
    • Ratproxy
    • SWFintruder
    • Skipfish
    • SoapUI
    • W3AF (Console)
    • W3AF (GUI)
    • WBox
    • WMAT
    • Wafw00f
    • Wapiti
    • Web Security
    • Webscarab Lite
    • Webshag CLI
    • Webshag GUI
    • Wfuzz
    • Xsss
    5. Radio Network Analysis<br />
    • 80211
    • Cracking
    • ASLEAP
    • AirSnarf
    • AirSnort
    • Airbase-ng
    • Aircrack-ng
    • Aircrack-ng
    • Airdecap-ng
    • Airdecloak-ng
    • Airdriver-ng
    • Airdrop-ng
    • Aireplay-ng
    • Airmon-ng
    • Airdump-ng
    • Airdump-ng-oui-update
    • Airolib-ng
    • Airoscript
    • Airpwn-ng
    • Airserv-ng
    • Airtun-ng
    • Buddy-ng
    • Cowpatty
    • Decrypt
    • Easside-ng
    • Gencases
    • Genpmk
    • Gerix-Wifi-Cracker-NG
    • GrimWepa
    • Ivstools
    • Kismat
    • Kstats
    • MDK3
    • Orino-Hopper
    • Packetforge-ng
    • Pyrit
    • Tkiptun-ng
    • WEPCrack
    • WEPCrack IVgen
    • WEPCrack getIV
    • WepBuster
    • Wep_keygen
    • Wesside-ng
    • WifiZoo
    • Misc
    • APHooper
    • AirFlood
    • Airgraph-ng
    • Airgraph-ng dump join
    • Airopdate
    • Baffle
    • Baffle GUI
    • GISKismat
    • GPSmap-expedia
    • Kisgearth
    • Kmsapng
    • MacChanger
    • Mitmap
    • PCapDump
    • SSIDSniff
    • Schnappi-dhcp
    • Wavemon
    • Wispy GTK
    • Xgps
    • Zulu
    • Spoofing
    • AirSnarf
    • Airbase-ng
    • Aircrack-ng
    • Aircrack-ng
    • Airdecap-ng
    • Airdecloak-ng
    • Airdriver-ng
    • Airdrop-ng
    • Aireplay-ng
    • Airmon-ng
    • Airdump-ng
    • Airdump-ng-oui-update
    • Airolib-ng
    • Airpwn-ng
    • Airserv-ng
    • Airtun-ng
    • Buddy-ng
    • Easside-ng
    • FakeAP
    • Gerix-Wifi-Cracker-NG
    • Ivstools
    • Kstats
    • Packetforge-ng
    • Tkiptun-ng
    • Wep_keygen
    • Wesside-ng
    • WifiZoo
    • Wifitap
    • Wifitap-Arp
    • Wifitap-DNS
    • Wifitap-Ping
    • Bluetooth
    • BCCMD
    • BSS
    • BTAddr
    • BTAudit psm
    • BTAudit rfcomm
    • BTPinCrack
    • BlueMaho
    • BlueScan
    • BlueSnaffer
    • BlueSquirrel
    • BlueSquirrel-Pico
    • Braces
    • CW-Tools
    • CarWhishper
    • Frontline
    • Ghettotooth
    • GreenPlaque
    • HID-Attack
    • ObexStress
    • Packet Replay
    • TBSearch
    • TBear
    • Tanya
    • BlueSmash
    • Bluebugger
    • Blueprint
    • Btscanner
    • HCIDump
    • Minicom
    • ObexFTP
    • Redfang
    • Ussp-Push
    • RFID
    • RFIDIOt ACG
    • Brute Force Hitag2
    • Bruteforce MIFARE
    • Bruteforce mifare
    • Calculate JCOP MIFARE Keys
    • Continuous Select TAG
    • Copy ISO15693 TAG
    • Epassport READ WRITE CLONE
    • Format MIFARE 1k Value Blocks
    • Identify HF TAG Type
    • Identify LF TAG Type
    • JCOP Info
    • JCOP MIFARE READ WRITE
    • JCOP Set ATR Historical Bytes
    • READ WRITE CLONE Unique (EM4x02)
    • Read ACG Reader EEPROM
    • Read LF TAG
    • Read MIFARE
    • Read TAG
    • Reset Q5 TAG
    • Select TAG
    • Set FDX-B ID
    • Test ACG LAHF
    • RFIDIOt Frosch
    • READ WRITE CLONE Unique (EM4x02)
    • Reset Hitag2 TAG
    • Set FDX-B ID
    • Test Frosh Reader
    • RFODIOt PCSC
    • /Identify HF TAG Type
    • Bruteforce MIFARE
    • Calculate JCOP MIFARE Keys
    • Chip & PIN info
    • Continuous Select TAG
    • EPassport READ/WRITE/CLONE
    • Install ATR Historical Byte applet to JCOP
    • Install Mifare applet to JCOP
    • Install vonjeek ePassport emulator to JCOP
    • Install vonjeek ePassport emulator to Nokia
    • JCOP Info
    • JCOP MIFARE READ/WRITE
    • JCOP Set ATR Historical Bytes
    • Read MIFARE
    • Read TAG
    • Select TAG
    6. Penetration<br />
    • ExploitDB
    • Online Resources
    • www.exploit-db.com
    • Update Exploitdb
    • Fast Track
    • Fast-Track Interactive
    • Fast-Track WebGUI
    • Fast-Track Command Line
    • Inguma
    • Inguma
    • Ingumagui
    • Metasploit Exploitation Framework
    • Framework Version 2
    • Framework2-MsfCli
    • Framework2-MsfConsole
    • Framework2-MsfUpdate
    • Framework2-Msfweb
    • Framework Version 3
    • MsfUpdate
    • MsfConsole
    • Msfgui
    • Social Engineering Toolkit
    • Social Engineering Toolkit
    • S.E.T-Web
    • S.E.T-Automation
    • S.E.T-Update
    • Sapyto
    7. Privilage Encapsulation<br />
    • PasswordAttacks
    • OfflineAttacks
    • Rainbowcrack
    • RTDump
    • RTGen
    • RTSort
    • Rainbowcrack
    • Bkhive
    • CUPP
    • CeWL
    • Crunch
    • Hashcat
    • John
    • Oclhashcat
    • Ophcrack
    • Ophcrack GUI
    • Pw-inspector
    • Pyrit
    • RTDump
    • RTGen
    • RTSort
    • Rainbowcrack
    • Rarcrack
    • Saltymd5
    • Samdump2
    • Whd
    • OnlineAttacks
    • BruteSSH
    • DNSBruteforce
    • Hydra
    • Lodowep
    • Medusa
    • NCrack
    • RWW-Attack
    • SSHater
    • TFTP-bruteforce
    • VNCrack
    • XHydra
    • Chntpw
    • Sniffers
    • Arpalert
    • DSniff
    • Driftnet
    • Etherape
    • Ettercap
    • Ettercap-GTK
    • Ferret
    • Hamster
    • Ntop
    • SMBRelay3
    • SSLDump
    • SSLStrip
    • TcPick
    • Tshark
    • Wireshark
    • XPlico
    • Xspy
    • Xwatchwin
    • Spoofing
    • ADM-dns-tools
    • Etherape
    • Ettercap
    • Ettercap-GTK
    • ICMP Redirect
    • IRDP Responder
    • ISP
    • Igrp route injection
    • Inundator
    • Middler
    • Nemesis
    • NetSed
    • Netenum
    • PackETH
    • Packit
    • SSLDump
    • SSLStrip
    • Scapy
    • Sing
    • TCPreplay
    • THC-IPv6
    8. Maintaining Access<br />
    • Backdoors and Rootkits
    • Web Backdoors Compilation
    • Tunneling
    • 3proxy
    • Cryptcat
    • DNS2tcp
    • Miredo
    • Miredo-server
    • Nstx
    • ProxyTunnel
    • Proxychains
    • Proxyresolv
    • Ptunnel
    • Sbd
    • Socat
    • Stunnel4
    • TinyProxy
    • UDPtunnel
    9. Digital Forensics<br />
    • Anti Forensics
    • Scrub
    • Wipe
    • File Carving
    • Foremost
    • Magicrescue
    • Forensic Analysis
    • Allin1
    • Autopsy
    • ExifTool
    • Fatback
    • MboxGrep
    • Memdump
    • PhotoRec
    • Scalpel
    • TestDisk
    • TrID
    • Unhide-Linux26
    • Unhide-Posix
    • Unhide-TCP
    • Vinetto
    • Volatility
    • XPlico
    • Image Aquiring
    • AIR Imager
    • Afcat
    • Afcompare
    • Afconvert
    • Affix
    • Afinfo
    • Afstats
    • Afxml
    • Aimage
    • Chkrootkit
    • Calmscan
    • DCFLDD
    • DD_rescue
    • Galleta
    10. Reverse Engineering<br />
    • Evans Debugger
    • GDB GNU Debugger
    • IDA Pro Free
    • OlleyDBG
    11. Voice Over IP<br />
    • VoIP Analysis
    • Signalling
    • Ace
    • Add_registrations
    • EnumlAX
    • Erase_Registrations
    • IWar
    • Iaxflood
    • Inviteflood
    • Ohrwurm
    • PCAPsipdump
    • Protos-Sip
    • RTP Flood
    • RTP InsertSound
    • RTP MixSound
    • RTPInject
    • RTPbreak
    • RedirectPoison
    • SIPP
    • SIPSak
    • SIPcrack
    • SIPdump
    • SIPvicious
    • Sip-scan
    • Sip_rouge
    • Smap
    • Teardown
    • UCSniff
    • Vnak
    • Voiper
    • Voiphopper
    • Voipong
    • Vomit
    • Warvox
    12. Miscellaneous<br />
    • Dkftpbench
    • Dragon
    • IPcalc
    • Icommander
    • Icommander-client
    • Kmsapng
    • Leo
    • MacChanger
    • Mitmap
    • NetActView
    • NetSed
    • Packet-o-matic
    • Schnappi-dhcp
    • SendEmail
    • Tpcat
    • USBview
    • Utilman
    • ValGrind
    • Wavemon
    • Wgetpaste
    Apart from all these tools, Backtrack 2 R2 contains some important services like<br />
    • BEEF
    • GPSD
    • HTTPD
    • Mysql
    • NETWORK
    • PCSCD
    • SNORT
    • SSH
    • TFTPD
    • VNC