Project Report<br />-459105253365on<br />-22459952540<br />Project  by - Nutan Kumar Panda<br />Technology Evangelist ISEH...
BackTrack 4 Beta Released Feb 11, 2009</li></ul>(move to debian)<br /><ul><li>BackTrack 4 pre-release Released 19th June, ...
BackTrack 4 Final released 11th January 2010
BackTrack 4 R1 released may 8th,2010
BackTrack 4 R2 released November 22nd, 2010</li></ul>BACKTRACK 4<br />Company/DeveloperMati Aharani, Emanuele Gentilli, an...
RFMON Injection capable wireless drivers
Kismet
Autoscan-network(AutoScan-Network is a network discovering and managing application)
Nmap
Ettercap
Wireshark(Formely known as Ethereal)
BeEF(browser Exploitation Framework)</li></ul>BackTrack’s functionality further increases with the arrangement of each too...
Network Mapping
Vulnerability Identification
Web Application Analysis
Radio network, Analysis(802.11, Bluetooth, Rfid)
Penetration(Exploit & social Engineering Toolkit)
Privilege Escalation
Maintaining Access
Digital Foreensics
Reverse Engineering
Voice over IP</li></ul>In relation to basic software packages, BackTrack includes some ordinary desktop programs such as M...
apt-get upgrade : downloads and installs all the updates available.
apt-get dist-upgrade :downloads and installs all new upgrades.
Meta Packages
A nice feature that arises from the tool categorization, is that we can now support “Backtrack meta Packages”.
A meta package is a dummy package which includes several other packages.
For eg., the meta package “backtrack web” would include all the web application penetration testing tools backtrack has to...
Meta Meta packages
There are two “Meta Meta Packages”: BackTrack world and BackTrack-desktop.
BackTrack-World  contains all the backtrack meta packages, while backtrack-desktop contains backtrack-world, backtrack-net...
Upcoming SlideShare
Loading in...5
×

Backtrack Manual Part2

8,565

Published on

Enjoy the 2nd part...For any query contact: nutan.appin@gmail.com

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
8,565
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
490
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Backtrack Manual Part2

  1. 1. Project Report<br />-459105253365on<br />-22459952540<br />Project by - Nutan Kumar Panda<br />Technology Evangelist ISEH<br />R&D - ATL Guwahati<br />Backtrack:<br />BackTrack is one of the more popular distributions in the white hat circles. It is specially suited for penetration testing, with more than 300 tools available for the task. Like both Helix and Protech, BackTrack is based on Ubuntu. This means good stability and hardware detection and a whole lot of software that can be easily obtained.<br />BackTrack is a Linux distribution distributed as a Live CD which resulted from the merger of WHAX(previously Whoppix) and the auditor security collection, which used for penetration testing.<br />The BackTrack project was created by Mati Aharani and Max moser and is collaborative effort involving the community.<br /><ul><li>Backtrack 2 released march 6, 2007</li></ul>(includes over 300 security tools)<br /><ul><li>Beta version of BackTrack 3 released Dec. 14, 2007</li></ul>(focus was to support more and newer hardware as well as provide more flexibility and modularity)<br /><ul><li>BackTrack 3 released june 19,2008</li></ul>(new additions include SAINT and Maltego)<br /><ul><li>Backtrack 3 Final Realesed Feb 11,2009
  2. 2. BackTrack 4 Beta Released Feb 11, 2009</li></ul>(move to debian)<br /><ul><li>BackTrack 4 pre-release Released 19th June, 2009
  3. 3. BackTrack 4 Final released 11th January 2010
  4. 4. BackTrack 4 R1 released may 8th,2010
  5. 5. BackTrack 4 R2 released November 22nd, 2010</li></ul>BACKTRACK 4<br />Company/DeveloperMati Aharani, Emanuele Gentilli, and othersOS familyUnix-likeWorking StateCurrentSource ModelOpen SourceLatest Stable release4.0 R2/November 22nd , 2010Kernel typeMonolithicDefault User InterfaceBash,KDE,FluxboxLicenseVariousOfficial Websitewww.backtrack-linux.org<br />Behind the curtains<br />BackTrack Base<br />There have been many changes introduced into BackTrack 4 ‐ most notably, our<br />move to an Ubuntu Intrepid base. We now maintain our own full repositories with<br />modified Ubuntu packages in addition to our own penetration testing tools.<br />Another significant change is the updated kernel version, currently at 2.6.29.4. This<br />new kernel brought an onset of internal changes, which have greatly changed the<br />structure of BackTrack.<br />BackTrack Kernel<br />We no longer use lzma enabled squashfs as our live filesystem, which on one hand<br />results in larger ISO size, but on the other hand, frees us from having to maintain<br />our own kernel patches. This is especially painful these days, as squashfs is slowly<br />moving into the mainstream kernel (at the time of this writing).<br />BackTrack 4 uses squashfs‐tools version 4.0 (which is not backward compatible<br />with previous versions), and the inbuilt squashfs kernel module, which is present in<br />2.6.29.4. AUFS is used as the unification filesystem (aufs2.x).<br />Several wireless driver injection/optimization patches have been applied to the<br />kernel, as well as a bootsplash patch. These patches can be found in the kernel<br />sources package (/usr/src/linux/patches).<br />These changes mean that much of what you were used has<br />changed in terms of boot cheatcodes and such, as this kernel shift also means we no<br />longer use the livelinux<br />scripts to create our images (we use casper now).<br />FEATURES:<br />BackTrack focuses its central idea on the needs of penetration testers. The inclusion of live CD and Live USB functionality enables any user to just insert their respective data medium and boot up BackTrack<br />Direct hard disk installation(2.7GB uncompressed) can also be completed within the Live DVD(1.5GB compressed) environment the basic graphical installation wizard with no restart subsequent to installation. BackTrack further continue its compatibility with accessibility and internationalization by including support for japenese input in reading and writing in hiragana, katakana and kanji.<br />THE KEY ADIITION TO THE BACKTRACK SUITE are notably<br /><ul><li>Metasploit integration
  6. 6. RFMON Injection capable wireless drivers
  7. 7. Kismet
  8. 8. Autoscan-network(AutoScan-Network is a network discovering and managing application)
  9. 9. Nmap
  10. 10. Ettercap
  11. 11. Wireshark(Formely known as Ethereal)
  12. 12. BeEF(browser Exploitation Framework)</li></ul>BackTrack’s functionality further increases with the arrangement of each tool in 11 categories. The tool categories are as follows.<br /><ul><li>Information Gathering
  13. 13. Network Mapping
  14. 14. Vulnerability Identification
  15. 15. Web Application Analysis
  16. 16. Radio network, Analysis(802.11, Bluetooth, Rfid)
  17. 17. Penetration(Exploit & social Engineering Toolkit)
  18. 18. Privilege Escalation
  19. 19. Maintaining Access
  20. 20. Digital Foreensics
  21. 21. Reverse Engineering
  22. 22. Voice over IP</li></ul>In relation to basic software packages, BackTrack includes some ordinary desktop programs such as Mozilla Firefox, Pidgin, K3b and XMMS.<br />UPDATING BACKTRACK<br />keeping BackTrack up to date is relatively simple by using the apt-get commands.<br /><ul><li>apt-get update : Synchronizes your package list with our repository.
  23. 23. apt-get upgrade : downloads and installs all the updates available.
  24. 24. apt-get dist-upgrade :downloads and installs all new upgrades.
  25. 25. Meta Packages
  26. 26. A nice feature that arises from the tool categorization, is that we can now support “Backtrack meta Packages”.
  27. 27. A meta package is a dummy package which includes several other packages.
  28. 28. For eg., the meta package “backtrack web” would include all the web application penetration testing tools backtrack has to offer.
  29. 29. Meta Meta packages
  30. 30. There are two “Meta Meta Packages”: BackTrack world and BackTrack-desktop.
  31. 31. BackTrack-World contains all the backtrack meta packages, while backtrack-desktop contains backtrack-world, backtrack-networking and backtrack-multimedia. The latter two meta packages are select applications imported from Ubantu Repositories.</li></ul>Working with BackTrack<br />BackTrack 4 contains an “imposed” KDE3 repository, alongside the KDE4 Ubuntu<br />Intrepid repositories. <br />Updating tools manually<br />Our BackTrack repositories will always strive to keep updated with the latest<br />versions of tools, with the exception of a select few. These “special” tools get<br />updated by their authors very frequently, and often include significant updates. We<br />felt that creating static binaries for these types of tools would not be beneficial and<br />users were better of keeping these tools synched with the SVN versions<br />respectively. The tools include MSF, W3AF, Nikto, etc.<br />Installation<br />BackTrack comes as a live CD, so to run it, you simply need to insert it in the CD drive and then boot the system. At the prompt, log on as root and then enter the root password toor before going on to set up the GUI with xconf. After you have completed the setup, simply type startx to launch the GUI. If an error occurs, try gui as a workaround for launching the graphical interface.If you need to, you can type dhcpcd to ask the DHCP server for an IP address. BackTrack does not do this automatically. BackTrack’s KDE-based menu system provides access to dozens of security tools and other forensic-analysis applications (see Figure 1). Browsing the BackTrack menu is a little like browsing the many menus and submenus of a games distribution; only, instead of a bunch of games, the GUI is stocked with sniffers, spoofers, scanners, and other utilities to assist you with security testing.<br />Creating your own Live CD – Method 1<br />Creating your own flavor of BackTrack is easy.<br />1. Download and install the bare bones version of BackTrack<br />2. Use apt‐get to install required packages or meta packages.<br />3. Use remastersys to repackage your installation.<br />Creating your own Live CD – Method 2<br />Download the BackTrack 4 iso. Use the customization script to update and modify<br />your build as show here:<br />http://www.offensive‐security.com/blog/backtrack/customising‐backtrack‐live‐cdthe‐<br />easy‐way/<br />Installing BackTrack to USB<br />The easiest method of getting BackTrack4 installed to a USB key is by using the<br />unetbootin utility (resent in BackTrack in /opt/).<br />Installing Backtrack to a harddrive (using Ubiquity)<br />Boot from the Backtrack DVD and choose “Start Backtrack in Text Mode”<br />Backtrack will boot and will automatically end up at a root prompt.<br />Launch the GUI by running ‘startx’.<br />Open a konsole and run ‘ubiquity’.<br />At the “Language crashed” dialog, choose “Continue anyway’”<br />Set timezone and choose keyboard layout.<br />Let backtrack partition the disk. (‘Use entire disk’)<br />Enter new user account information. (Pick a strong password, as this will be the user account used to log on into Backtrack)<br />Review the installation summary and press “install” to start the installation.<br />Reboot when installation has completed<br />Log in with the newly created user<br />change the password for root (sudo passwd root)<br />Lots of great stuff <br />Like most Linux distros - and definitely all forensics/security-oriented tools, BackTrack works primarily as a live CD, with good hardware detection and low memory footprint, intended to make it usable even on older machines. It is also possible to install BackTrack, should one desire. <br />The boot menu is simple and elegant, with three options. <br />The second option (Console no FB) stands for Console no Framebuffers, i.e. the failsafe mode with minimal graphics that should work well on all hardware. Thanks k finity! As to the third option, MSRAMDUMP, I did try booting it, but this produced an error and threw me back into the boot menu. <br />The distro maintains its elegance by booting into the best-looking console I have seen, with stylish color gradients and mirror effects. You can begin working instantly on the command-line or boot into GUI desktop by issuing startx command. <br />Desktop <br />The desktop is simple and functional, running a lightweight KDE3 manager. You get a simple wallpaper with dragon-like theme. Another interesting element is the Run box embedded in the panel, which allows you to run applications without invoking a terminal first. <br />102870030480<br />The network is not enabled by default and you'll have to fire it up manually. <br />Tools <br />BackTrack is all about lots and lots of hacking tools. Once again, I'm only going to present the tools, not show you how to use them. These tools are all double-edged swords, and without the right amount of respect, skill and integrity, you may cause more harm than good. Furthermore, do not deploy them in a production environment without the explicit approval from system administrators and INFOSEC people. <br />The tools can all be found under Backtrack in the menu, arranged into sub-categories. The collection is long and rich and it will take you a long time pouring over all of them, let alone mastering them. Most of the tools are command-line utilities, with menu items a link to the console with the relevant tool running inside it. <br />Backtrack 4 R2 Tools:<br />Go to Kmenu->Backtrack<br />1. Information Gathering<br /><ul><li>Archive
  32. 32. Metagoofil
  33. 33. SEAT
  34. 34. DNS
  35. 35. DNS-Walk
  36. 36. DNSTracer
  37. 37. Dns Enum
  38. 38. Dnsmap
  39. 39. Dnsmap-bulk
  40. 40. Dnsrecon
  41. 41. Fierce
  42. 42. Lbd
  43. 43. Route
  44. 44. 0trace
  45. 45. Dmitry
  46. 46. Ltrace
  47. 47. Lanmap
  48. 48. Netenum
  49. 49. Protos
  50. 50. TCPtraceroute
  51. 51. Tctrace
  52. 52. Searchengine
  53. 53. Googmail
  54. 54. Goohost
  55. 55. Goorecon
  56. 56. Gooscan
  57. 57. MetaGoofil
  58. 58. SEAT
  59. 59. TheHarvester
  60. 60. WhatWeb
  61. 61. Dradis Client
  62. 62. Dradis Server
  63. 63. Paterva Maltego CE</li></ul>2. Network Mapping<br /><ul><li>Identify Live Hosts
  64. 64. 0trace
  65. 65. 5nmp
  66. 66. Angry IPScan
  67. 67. Arping
  68. 68. Autoscan
  69. 69. Fping
  70. 70. Genlist
  71. 71. Hping2
  72. 72. Hping3
  73. 73. Lanmap
  74. 74. Lanmap2
  75. 75. Nbtscan
  76. 76. Netifera
  77. 77. Nmap
  78. 78. Nsat
  79. 79. Onesixtyone
  80. 80. OutputPBNJ
  81. 81. SCTPscan
  82. 82. SSLscan
  83. 83. ScanPBNJ
  84. 84. TCPtraceroute
  85. 85. Unicornscan
  86. 86. Zenmap
  87. 87. OS-Fingerprinting
  88. 88. 5nmp
  89. 89. Autoscan
  90. 90. Lanmap2
  91. 91. Nmap
  92. 92. Nsat
  93. 93. Onesixtyone
  94. 94. P0f
  95. 95. Protos
  96. 96. SSLscan
  97. 97. Unicornscan
  98. 98. XProbe2
  99. 99. Zenmap
  100. 100. Portscanning
  101. 101. Angry IPScan
  102. 102. Autoscan
  103. 103. Genlist
  104. 104. Netifera
  105. 105. Nmap
  106. 106. Nsat
  107. 107. OutputPBJN
  108. 108. Propecia
  109. 109. SCTPscan
  110. 110. ScanPBJN
  111. 111. Unicornscan
  112. 112. Zenmap
  113. 113. Service Fingerprinting
  114. 114. Amap
  115. 115. Dmitry
  116. 116. Httprint
  117. 117. Httprint_GUI
  118. 118. Httsquash
  119. 119. LetDown
  120. 120. ReverseRaider
  121. 121. VPN
  122. 122. Ike-scan
  123. 123. PSK-Crack</li></ul>3. Vulnerability Identification<br /><ul><li>Cisco
  124. 124. Cisco Auditing Tool
  125. 125. Cisco Global Exploiter
  126. 126. Cisco OCS Mass Scanner
  127. 127. Cisco Passwd Scanner
  128. 128. Copy Router Config
  129. 129. Merge Router Config
  130. 130. Fuzzers
  131. 131. Bed
  132. 132. Bf3
  133. 133. Bunny
  134. 134. Dkftpbench
  135. 135. Fuzzgrind
  136. 136. Fuzzgrind GUI
  137. 137. JBroFuzz
  138. 138. JBroFuzz-Encoder
  139. 139. Peach
  140. 140. Spike
  141. 141. Voiper
  142. 142. WsFuzzer
  143. 143. ZZuf
  144. 144. OpenVas
  145. 145. OpenVas Add User
  146. 146. OpenVas Cli
  147. 147. OpenVas Client
  148. 148. OpenVas Make Cert
  149. 149. OpenVas NVT Sync
  150. 150. Start OpenVas Administrator
  151. 151. Start OpenVas Manager
  152. 152. Start OpenVas Scanner
  153. 153. Stop OpenVas Administrator
  154. 154. Stop OpenVas Manager
  155. 155. Stop OpenVas Scanner
  156. 156. SMB Analysis
  157. 157. Impacket samrdump
  158. 158. Impacket smbclient
  159. 159. SMBclient
  160. 160. Smb4K
  161. 161. SNMP Analysis
  162. 162. ADMSnmp
  163. 163. Braa
  164. 164. SNMP Walk
  165. 165. SNMPcheck
  166. 166. Snmp Enum</li></ul>4. Web Application Analysis<br /><ul><li>Database (backend)
  167. 167. MSSQL
  168. 168. DBPwAudit
  169. 169. MSSQLScan
  170. 170. Metacoretex
  171. 171. Pblind
  172. 172. SA Exploiter
  173. 173. SQL Ninja
  174. 174. SQLMap
  175. 175. SQLbrute
  176. 176. SQLix
  177. 177. MYSQL
  178. 178. DBPwAudit
  179. 179. Metacoretex
  180. 180. Mysqlaudit
  181. 181. Pblind
  182. 182. SQLCheck
  183. 183. SQLData
  184. 184. SQLMap
  185. 185. SQLix
  186. 186. Sqlsus
  187. 187. UDF
  188. 188. Oracle
  189. 189. DBPwAudit
  190. 190. Metacoretex
  191. 191. Opquery
  192. 192. Opwg
  193. 193. Oscanner
  194. 194. Ose
  195. 195. Otnsctl
  196. 196. Pblind
  197. 197. SQLMap
  198. 198. SQLbrute
  199. 199. SQLix
  200. 200. THC-OracleCrackert
  201. 201. Web (frontend)
  202. 202. ASP-Audit
  203. 203. Burpsuite
  204. 204. Burpsuite Msf
  205. 205. CSRFTester
  206. 206. Curl
  207. 207. DFF Scanner
  208. 208. DharmaEncoder
  209. 209. DirBuster
  210. 210. Fimap
  211. 211. Flare
  212. 212. Flasm
  213. 213. Grabber
  214. 214. Grendel Scan
  215. 215. HCraft
  216. 216. Httprint
  217. 217. Httprint_GUI
  218. 218. Jmeter
  219. 219. JoomScan
  220. 220. Lbd
  221. 221. List-Urls
  222. 222. Lynx
  223. 223. Mini Mysqlat0r
  224. 224. Nikto2
  225. 225. OpenAcunetix
  226. 226. Paros Proxy
  227. 227. Powerfuzzer
  228. 228. Ratproxy
  229. 229. SWFintruder
  230. 230. Skipfish
  231. 231. SoapUI
  232. 232. W3AF (Console)
  233. 233. W3AF (GUI)
  234. 234. WBox
  235. 235. WMAT
  236. 236. Wafw00f
  237. 237. Wapiti
  238. 238. Web Security
  239. 239. Webscarab Lite
  240. 240. Webshag CLI
  241. 241. Webshag GUI
  242. 242. Wfuzz
  243. 243. Xsss</li></ul>5. Radio Network Analysis<br /><ul><li>80211
  244. 244. Cracking
  245. 245. ASLEAP
  246. 246. AirSnarf
  247. 247. AirSnort
  248. 248. Airbase-ng
  249. 249. Aircrack-ng
  250. 250. Aircrack-ng
  251. 251. Airdecap-ng
  252. 252. Airdecloak-ng
  253. 253. Airdriver-ng
  254. 254. Airdrop-ng
  255. 255. Aireplay-ng
  256. 256. Airmon-ng
  257. 257. Airdump-ng
  258. 258. Airdump-ng-oui-update
  259. 259. Airolib-ng
  260. 260. Airoscript
  261. 261. Airpwn-ng
  262. 262. Airserv-ng
  263. 263. Airtun-ng
  264. 264. Buddy-ng
  265. 265. Cowpatty
  266. 266. Decrypt
  267. 267. Easside-ng
  268. 268. Gencases
  269. 269. Genpmk
  270. 270. Gerix-Wifi-Cracker-NG
  271. 271. GrimWepa
  272. 272. Ivstools
  273. 273. Kismat
  274. 274. Kstats
  275. 275. MDK3
  276. 276. Orino-Hopper
  277. 277. Packetforge-ng
  278. 278. Pyrit
  279. 279. Tkiptun-ng
  280. 280. WEPCrack
  281. 281. WEPCrack IVgen
  282. 282. WEPCrack getIV
  283. 283. WepBuster
  284. 284. Wep_keygen
  285. 285. Wesside-ng
  286. 286. WifiZoo
  287. 287. Misc
  288. 288. APHooper
  289. 289. AirFlood
  290. 290. Airgraph-ng
  291. 291. Airgraph-ng dump join
  292. 292. Airopdate
  293. 293. Baffle
  294. 294. Baffle GUI
  295. 295. GISKismat
  296. 296. GPSmap-expedia
  297. 297. Kisgearth
  298. 298. Kmsapng
  299. 299. MacChanger
  300. 300. Mitmap
  301. 301. PCapDump
  302. 302. SSIDSniff
  303. 303. Schnappi-dhcp
  304. 304. Wavemon
  305. 305. Wispy GTK
  306. 306. Xgps
  307. 307. Zulu
  308. 308. Spoofing
  309. 309. AirSnarf
  310. 310. Airbase-ng
  311. 311. Aircrack-ng
  312. 312. Aircrack-ng
  313. 313. Airdecap-ng
  314. 314. Airdecloak-ng
  315. 315. Airdriver-ng
  316. 316. Airdrop-ng
  317. 317. Aireplay-ng
  318. 318. Airmon-ng
  319. 319. Airdump-ng
  320. 320. Airdump-ng-oui-update
  321. 321. Airolib-ng
  322. 322. Airpwn-ng
  323. 323. Airserv-ng
  324. 324. Airtun-ng
  325. 325. Buddy-ng
  326. 326. Easside-ng
  327. 327. FakeAP
  328. 328. Gerix-Wifi-Cracker-NG
  329. 329. Ivstools
  330. 330. Kstats
  331. 331. Packetforge-ng
  332. 332. Tkiptun-ng
  333. 333. Wep_keygen
  334. 334. Wesside-ng
  335. 335. WifiZoo
  336. 336. Wifitap
  337. 337. Wifitap-Arp
  338. 338. Wifitap-DNS
  339. 339. Wifitap-Ping
  340. 340. Bluetooth
  341. 341. BCCMD
  342. 342. BSS
  343. 343. BTAddr
  344. 344. BTAudit psm
  345. 345. BTAudit rfcomm
  346. 346. BTPinCrack
  347. 347. BlueMaho
  348. 348. BlueScan
  349. 349. BlueSnaffer
  350. 350. BlueSquirrel
  351. 351. BlueSquirrel-Pico
  352. 352. Braces
  353. 353. CW-Tools
  354. 354. CarWhishper
  355. 355. Frontline
  356. 356. Ghettotooth
  357. 357. GreenPlaque
  358. 358. HID-Attack
  359. 359. ObexStress
  360. 360. Packet Replay
  361. 361. TBSearch
  362. 362. TBear
  363. 363. Tanya
  364. 364. BlueSmash
  365. 365. Bluebugger
  366. 366. Blueprint
  367. 367. Btscanner
  368. 368. HCIDump
  369. 369. Minicom
  370. 370. ObexFTP
  371. 371. Redfang
  372. 372. Ussp-Push
  373. 373. RFID
  374. 374. RFIDIOt ACG
  375. 375. Brute Force Hitag2
  376. 376. Bruteforce MIFARE
  377. 377. Bruteforce mifare
  378. 378. Calculate JCOP MIFARE Keys
  379. 379. Continuous Select TAG
  380. 380. Copy ISO15693 TAG
  381. 381. Epassport READ WRITE CLONE
  382. 382. Format MIFARE 1k Value Blocks
  383. 383. Identify HF TAG Type
  384. 384. Identify LF TAG Type
  385. 385. JCOP Info
  386. 386. JCOP MIFARE READ WRITE
  387. 387. JCOP Set ATR Historical Bytes
  388. 388. READ WRITE CLONE Unique (EM4x02)
  389. 389. Read ACG Reader EEPROM
  390. 390. Read LF TAG
  391. 391. Read MIFARE
  392. 392. Read TAG
  393. 393. Reset Q5 TAG
  394. 394. Select TAG
  395. 395. Set FDX-B ID
  396. 396. Test ACG LAHF
  397. 397. RFIDIOt Frosch
  398. 398. READ WRITE CLONE Unique (EM4x02)
  399. 399. Reset Hitag2 TAG
  400. 400. Set FDX-B ID
  401. 401. Test Frosh Reader
  402. 402. RFODIOt PCSC
  403. 403. /Identify HF TAG Type
  404. 404. Bruteforce MIFARE
  405. 405. Calculate JCOP MIFARE Keys
  406. 406. Chip & PIN info
  407. 407. Continuous Select TAG
  408. 408. EPassport READ/WRITE/CLONE
  409. 409. Install ATR Historical Byte applet to JCOP
  410. 410. Install Mifare applet to JCOP
  411. 411. Install vonjeek ePassport emulator to JCOP
  412. 412. Install vonjeek ePassport emulator to Nokia
  413. 413. JCOP Info
  414. 414. JCOP MIFARE READ/WRITE
  415. 415. JCOP Set ATR Historical Bytes
  416. 416. Read MIFARE
  417. 417. Read TAG
  418. 418. Select TAG</li></ul>6. Penetration<br /><ul><li>ExploitDB
  419. 419. Online Resources
  420. 420. www.exploit-db.com
  421. 421. Update Exploitdb
  422. 422. Fast Track
  423. 423. Fast-Track Interactive
  424. 424. Fast-Track WebGUI
  425. 425. Fast-Track Command Line
  426. 426. Inguma
  427. 427. Inguma
  428. 428. Ingumagui
  429. 429. Metasploit Exploitation Framework
  430. 430. Framework Version 2
  431. 431. Framework2-MsfCli
  432. 432. Framework2-MsfConsole
  433. 433. Framework2-MsfUpdate
  434. 434. Framework2-Msfweb
  435. 435. Framework Version 3
  436. 436. MsfUpdate
  437. 437. MsfConsole
  438. 438. Msfgui
  439. 439. Social Engineering Toolkit
  440. 440. Social Engineering Toolkit
  441. 441. S.E.T-Web
  442. 442. S.E.T-Automation
  443. 443. S.E.T-Update
  444. 444. Sapyto</li></ul>7. Privilage Encapsulation<br /><ul><li>PasswordAttacks
  445. 445. OfflineAttacks
  446. 446. Rainbowcrack
  447. 447. RTDump
  448. 448. RTGen
  449. 449. RTSort
  450. 450. Rainbowcrack
  451. 451. Bkhive
  452. 452. CUPP
  453. 453. CeWL
  454. 454. Crunch
  455. 455. Hashcat
  456. 456. John
  457. 457. Oclhashcat
  458. 458. Ophcrack
  459. 459. Ophcrack GUI
  460. 460. Pw-inspector
  461. 461. Pyrit
  462. 462. RTDump
  463. 463. RTGen
  464. 464. RTSort
  465. 465. Rainbowcrack
  466. 466. Rarcrack
  467. 467. Saltymd5
  468. 468. Samdump2
  469. 469. Whd
  470. 470. OnlineAttacks
  471. 471. BruteSSH
  472. 472. DNSBruteforce
  473. 473. Hydra
  474. 474. Lodowep
  475. 475. Medusa
  476. 476. NCrack
  477. 477. RWW-Attack
  478. 478. SSHater
  479. 479. TFTP-bruteforce
  480. 480. VNCrack
  481. 481. XHydra
  482. 482. Chntpw
  483. 483. Sniffers
  484. 484. Arpalert
  485. 485. DSniff
  486. 486. Driftnet
  487. 487. Etherape
  488. 488. Ettercap
  489. 489. Ettercap-GTK
  490. 490. Ferret
  491. 491. Hamster
  492. 492. Ntop
  493. 493. SMBRelay3
  494. 494. SSLDump
  495. 495. SSLStrip
  496. 496. TcPick
  497. 497. Tshark
  498. 498. Wireshark
  499. 499. XPlico
  500. 500. Xspy
  501. 501. Xwatchwin
  502. 502. Spoofing
  503. 503. ADM-dns-tools
  504. 504. Etherape
  505. 505. Ettercap
  506. 506. Ettercap-GTK
  507. 507. ICMP Redirect
  508. 508. IRDP Responder
  509. 509. ISP
  510. 510. Igrp route injection
  511. 511. Inundator
  512. 512. Middler
  513. 513. Nemesis
  514. 514. NetSed
  515. 515. Netenum
  516. 516. PackETH
  517. 517. Packit
  518. 518. SSLDump
  519. 519. SSLStrip
  520. 520. Scapy
  521. 521. Sing
  522. 522. TCPreplay
  523. 523. THC-IPv6</li></ul>8. Maintaining Access<br /><ul><li>Backdoors and Rootkits
  524. 524. Web Backdoors Compilation
  525. 525. Tunneling
  526. 526. 3proxy
  527. 527. Cryptcat
  528. 528. DNS2tcp
  529. 529. Miredo
  530. 530. Miredo-server
  531. 531. Nstx
  532. 532. ProxyTunnel
  533. 533. Proxychains
  534. 534. Proxyresolv
  535. 535. Ptunnel
  536. 536. Sbd
  537. 537. Socat
  538. 538. Stunnel4
  539. 539. TinyProxy
  540. 540. UDPtunnel</li></ul>9. Digital Forensics<br /><ul><li>Anti Forensics
  541. 541. Scrub
  542. 542. Wipe
  543. 543. File Carving
  544. 544. Foremost
  545. 545. Magicrescue
  546. 546. Forensic Analysis
  547. 547. Allin1
  548. 548. Autopsy
  549. 549. ExifTool
  550. 550. Fatback
  551. 551. MboxGrep
  552. 552. Memdump
  553. 553. PhotoRec
  554. 554. Scalpel
  555. 555. TestDisk
  556. 556. TrID
  557. 557. Unhide-Linux26
  558. 558. Unhide-Posix
  559. 559. Unhide-TCP
  560. 560. Vinetto
  561. 561. Volatility
  562. 562. XPlico
  563. 563. Image Aquiring
  564. 564. AIR Imager
  565. 565. Afcat
  566. 566. Afcompare
  567. 567. Afconvert
  568. 568. Affix
  569. 569. Afinfo
  570. 570. Afstats
  571. 571. Afxml
  572. 572. Aimage
  573. 573. Chkrootkit
  574. 574. Calmscan
  575. 575. DCFLDD
  576. 576. DD_rescue
  577. 577. Galleta</li></ul>10. Reverse Engineering<br /><ul><li>Evans Debugger
  578. 578. GDB GNU Debugger
  579. 579. IDA Pro Free
  580. 580. OlleyDBG</li></ul>11. Voice Over IP<br /><ul><li>VoIP Analysis
  581. 581. Signalling
  582. 582. Ace
  583. 583. Add_registrations
  584. 584. EnumlAX
  585. 585. Erase_Registrations
  586. 586. IWar
  587. 587. Iaxflood
  588. 588. Inviteflood
  589. 589. Ohrwurm
  590. 590. PCAPsipdump
  591. 591. Protos-Sip
  592. 592. RTP Flood
  593. 593. RTP InsertSound
  594. 594. RTP MixSound
  595. 595. RTPInject
  596. 596. RTPbreak
  597. 597. RedirectPoison
  598. 598. SIPP
  599. 599. SIPSak
  600. 600. SIPcrack
  601. 601. SIPdump
  602. 602. SIPvicious
  603. 603. Sip-scan
  604. 604. Sip_rouge
  605. 605. Smap
  606. 606. Teardown
  607. 607. UCSniff
  608. 608. Vnak
  609. 609. Voiper
  610. 610. Voiphopper
  611. 611. Voipong
  612. 612. Vomit
  613. 613. Warvox</li></ul>12. Miscellaneous<br /><ul><li>Dkftpbench
  614. 614. Dragon
  615. 615. IPcalc
  616. 616. Icommander
  617. 617. Icommander-client
  618. 618. Kmsapng
  619. 619. Leo
  620. 620. MacChanger
  621. 621. Mitmap
  622. 622. NetActView
  623. 623. NetSed
  624. 624. Packet-o-matic
  625. 625. Schnappi-dhcp
  626. 626. SendEmail
  627. 627. Tpcat
  628. 628. USBview
  629. 629. Utilman
  630. 630. ValGrind
  631. 631. Wavemon
  632. 632. Wgetpaste</li></ul>Apart from all these tools, Backtrack 2 R2 contains some important services like<br /><ul><li>BEEF
  633. 633. GPSD
  634. 634. HTTPD
  635. 635. Mysql
  636. 636. NETWORK
  637. 637. PCSCD
  638. 638. SNORT
  639. 639. SSH
  640. 640. TFTPD
  641. 641. VNC

×