Backtrack
Upcoming SlideShare
Loading in...5
×
 
  • 2,681 views

Mumbai null May 2012 Meet

Mumbai null May 2012 Meet

Statistics

Views

Total Views
2,681
Views on SlideShare
2,359
Embed Views
322

Actions

Likes
6
Downloads
214
Comments
0

2 Embeds 322

http://null.co.in 321
http://webcache.googleusercontent.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Backtrack Backtrack Presentation Transcript

  • Presentation By: Wasim Halani & Vinesh Redkar Network Intelligence India Pvt. Ltd.
  • Source: Online
  •  Introduction to Backtrack Why we need Backtrack Difference between GNOME and KDE. File Permission $PATH Variable Starting up with Backtrack. Major tool in Backtrack. Configuring the Network Connect Backtrack With putty. Installation of Program and Update Backtrack Useful Command View slide
  •  A Linux distribution designed for penetration testing and information security auditing distribution. Backtrack is based on Ubuntu/Debian Backtrack has many security tools compiled and preinstalled. Download  http://www.backtrack-linux.org/downloads/ View slide
  •  Open Source Platform. Linux platform  More number of tools available  Easier to script and perform operations Has better compatibility with tools (nmap) Compiled toolkit  Lesser dependency at client side Easy to use – Ubuntu + GUI
  •  Does it really matter ??! Personal preference
  •  Each file and directory has three user based permission groups:  Owner(u)  Group(g)  Others(o) Permission Types  Read(r)-4  Write(w)-2  Execute(x)-1 Viewing the permission of file  Ls –l <file name> Assigning Permission to file  Chmod +x <file name> (Note: x is for execute)
  •  $PATH is Environment Variable This Variable allows programs residing in the different working directory to be executed directly. Viewing the $PATH variable  Echo $PATH Setting up $PATH variable  export PATH=$PATH:”directory”
  • • You need to log in first – User name: root – Password: toor• The graphical desktop does not start by default #> startx
  •  Information Gathering Vulnerability Assessment Exploitation tool Maintaining Access Reverse Engineering Forensics Reporting Tool Services
  •  Information Gathering and Enumeration Tool  Nmap-Utility for network exploration and security auditing.  Wireshark-Network Protocol analyzer.  Hping-TCP/IP packet assembler/analyzer.  Maltego- Information Gathering tool.
  •  Vulnerability Assessment Tool  Nikto  Nessus  W3af  BurpSuite Exploitation tools  Metasploit  Exploitdb  Sqlmap  Aircrack-ng  Beef  SET (Social Engineering Toolkit)
  •  Maintaining Access  Webshells  Metasploit Reverse Engineering  Ollydbg Forensics  Autospy  Wireshark  Pdfid  Voltality
  •  Reporting Tool  Dradis  Magictree
  •  Manually Setting IP address  ifconfig eth0 up  ifconfig eth0 [youripaddress] netmask [your netmask]  route add default gw [your gateway] eth0  echo nameserver [yourDNS]> /etc/resolv.conf  etc/init.d/networking restart Dynamically Setting IP address  dhclient
  •  Putty  Download: http://www.putty.org/ Connecting Backtrack using putty over SSH  sshd-generate  /etc/init.d/ssh start
  •  Software Installation  Extracting tar file ▪ tar xvf filename.tar.gz ▪ tar xvjf filename.tar.bz2  apt-get install <software_name>  apt-cache search <software_name> Fetching File From Internet  wget <link> Update Backtrack  apt-get update  apt-get dist-upgrade  apt-get install beef  reboot
  •  Show Information  Man-man option <keyword>  Info-info <keyword>  Help-<Program name> -help Finding file  Locate-locate <filename>  Search-search <keyword>  Find Create and edit a file  Nano