Submit Search
Upload
BackTrack 4 R2 - SFISSA Presentation
•
5 likes
•
1,991 views
Jorge Orchilles
Follow
This presentation was put together for a South Florida ISSA technical workshop.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 24
Download Now
Download to read offline
Recommended
About linux-english
About linux-english
Shota Ito
Linux Virus
Linux Virus
Akhil Kadangode
Mak3
Mak3
webuploader
Penetration Testing Boot CAMP
Penetration Testing Boot CAMP
Shaikh Jamal Uddin l CISM, QRadar, Hack Card Recovery Expert
Backtrack
Backtrack
n|u - The Open Security Community
BackTrack5 - Linux
BackTrack5 - Linux
mariuszantal
Intro To Hacking
Intro To Hacking
nayakslideshare
NAS Botnet Revealed - Mining Bitcoin
NAS Botnet Revealed - Mining Bitcoin
Davide Cioccia
More Related Content
What's hot
visagie_freebsd
visagie_freebsd
webuploader
Managing the system and network connection Linux
Managing the system and network connection Linux
Shriharsh Shendre
Backtrack
Backtrack
One97 Communications Limited
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
Gregory Hanis
Snort-IPS-Tutorial
Snort-IPS-Tutorial
Vladimir Koychev
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
EMSC1515104 Shehansuhail
EMSC1515104 Shehansuhail
Mohomed Shehan
SSH: Seguranca no Acesso Remoto
SSH: Seguranca no Acesso Remoto
Tiago Cruz
SFScon 2020 - Jakob Schwienbacher - Linux as HA Router - Linux Kernel keepali...
SFScon 2020 - Jakob Schwienbacher - Linux as HA Router - Linux Kernel keepali...
South Tyrol Free Software Conference
Kali tools list with short description
Kali tools list with short description
Jose Moruno Cadima
Backtrack os 5
Backtrack os 5
Ayush Goyal
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
APNIC
Security Onion Conference - 2016
Security Onion Conference - 2016
DefensiveDepth
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
RootedCON
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
Vipin George
Snort
Snort
bala150985
amrapali builders @@ hacking challenges.pdf
amrapali builders @@ hacking challenges.pdf
amrapalibuildersreviews
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101
Cheng-Yi Yu
Metasploit for Web Workshop
Metasploit for Web Workshop
Dennis Maldonado
Ost ssl lec
Ost ssl lec
Kaustubh Joshi
What's hot
(20)
visagie_freebsd
visagie_freebsd
Managing the system and network connection Linux
Managing the system and network connection Linux
Backtrack
Backtrack
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
Snort-IPS-Tutorial
Snort-IPS-Tutorial
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
EMSC1515104 Shehansuhail
EMSC1515104 Shehansuhail
SSH: Seguranca no Acesso Remoto
SSH: Seguranca no Acesso Remoto
SFScon 2020 - Jakob Schwienbacher - Linux as HA Router - Linux Kernel keepali...
SFScon 2020 - Jakob Schwienbacher - Linux as HA Router - Linux Kernel keepali...
Kali tools list with short description
Kali tools list with short description
Backtrack os 5
Backtrack os 5
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
Security Onion Conference - 2016
Security Onion Conference - 2016
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
Snort
Snort
amrapali builders @@ hacking challenges.pdf
amrapali builders @@ hacking challenges.pdf
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101
Metasploit for Web Workshop
Metasploit for Web Workshop
Ost ssl lec
Ost ssl lec
Viewers also liked
Computer security
Computer security
Mohamed Abdo
Backtrack manual Part1
Backtrack manual Part1
Nutan Kumar Panda
How To Build The Perfect Backtrack 4 Usb Drive
How To Build The Perfect Backtrack 4 Usb Drive
kriggins
Backtrack Manual Part9
Backtrack Manual Part9
Nutan Kumar Panda
Backtrack Manual Part10
Backtrack Manual Part10
Nutan Kumar Panda
Backtrack Manual Part2
Backtrack Manual Part2
Nutan Kumar Panda
Viewers also liked
(6)
Computer security
Computer security
Backtrack manual Part1
Backtrack manual Part1
How To Build The Perfect Backtrack 4 Usb Drive
How To Build The Perfect Backtrack 4 Usb Drive
Backtrack Manual Part9
Backtrack Manual Part9
Backtrack Manual Part10
Backtrack Manual Part10
Backtrack Manual Part2
Backtrack Manual Part2
Similar to BackTrack 4 R2 - SFISSA Presentation
Presentación1
Presentación1
davidalbanc
bh-us-02-murphey-freebsd
bh-us-02-murphey-freebsd
webuploader
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
Andrew Case
RenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypots
APNIC
Linux or unix interview questions
Linux or unix interview questions
Teja Bheemanapally
Nullbyte 6ed. 2019
Nullbyte 6ed. 2019
Ricardo L0gan
Security & ethical hacking
Security & ethical hacking
Amanpreet Singh
Freeware Security Tools You Need
Freeware Security Tools You Need
amiable_indian
CEHv10 M0 Introduction.pptx
CEHv10 M0 Introduction.pptx
YasserOuda2
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
OlehLevytskyi1
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Igor Beliaiev
Security & ethical hacking p2
Security & ethical hacking p2
ratnalajaggu
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Nicolas Collery
ANILKUMAR_SOC-Analyst.pdf
ANILKUMAR_SOC-Analyst.pdf
EthioTelecom_Getahun Biratu
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
Yury Chemerkin
Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
Logicaltrust pl
How hackers attack networks
How hackers attack networks
Adeel Javaid
Linux Network commands
Linux Network commands
Hanan Nmr
8 steps to protect your cisco router
8 steps to protect your cisco router
IT Tech
Similar to BackTrack 4 R2 - SFISSA Presentation
(20)
Presentación1
Presentación1
bh-us-02-murphey-freebsd
bh-us-02-murphey-freebsd
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
RenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypots
Linux or unix interview questions
Linux or unix interview questions
Nullbyte 6ed. 2019
Nullbyte 6ed. 2019
Security & ethical hacking
Security & ethical hacking
Freeware Security Tools You Need
Freeware Security Tools You Need
CEHv10 M0 Introduction.pptx
CEHv10 M0 Introduction.pptx
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Security & ethical hacking p2
Security & ethical hacking p2
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
Let Me Pick Your Brain - Remote Forensics in Hardened Environments
ANILKUMAR_SOC-Analyst.pdf
ANILKUMAR_SOC-Analyst.pdf
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
How hackers attack networks
How hackers attack networks
Linux Network commands
Linux Network commands
8 steps to protect your cisco router
8 steps to protect your cisco router
More from Jorge Orchilles
SCYTHE Purple Team Workshop with Tim Schulz
SCYTHE Purple Team Workshop with Tim Schulz
Jorge Orchilles
So you want to be a red teamer
So you want to be a red teamer
Jorge Orchilles
Purple Team Use Case - Security Weekly
Purple Team Use Case - Security Weekly
Jorge Orchilles
KringleCon 3 Providing Value in Offensive Security
KringleCon 3 Providing Value in Offensive Security
Jorge Orchilles
C2 Matrix Anniversary - Blackhat EU 2020
C2 Matrix Anniversary - Blackhat EU 2020
Jorge Orchilles
Purple Team Exercise Workshop December 2020
Purple Team Exercise Workshop December 2020
Jorge Orchilles
External Threat Hunters are Red Teamers
External Threat Hunters are Red Teamers
Jorge Orchilles
Evolution of Offensive Assessments - SecureWV Conference
Evolution of Offensive Assessments - SecureWV Conference
Jorge Orchilles
Purple Team Exercise Hands-On Workshop #GrayHat
Purple Team Exercise Hands-On Workshop #GrayHat
Jorge Orchilles
Evolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootCon
Jorge Orchilles
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
Jorge Orchilles
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
Jorge Orchilles
Blackhat 2020 Arsenal - C2 Matrix
Blackhat 2020 Arsenal - C2 Matrix
Jorge Orchilles
Purple Team Exercise Framework Workshop #PTEF
Purple Team Exercise Framework Workshop #PTEF
Jorge Orchilles
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMCon
Jorge Orchilles
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Jorge Orchilles
Cuddling the Cozy Bear Emulating APT29
Cuddling the Cozy Bear Emulating APT29
Jorge Orchilles
Adversary Emulation - Red Team Village - Mayhem 2020
Adversary Emulation - Red Team Village - Mayhem 2020
Jorge Orchilles
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
Jorge Orchilles
Adversary Emulation - DerpCon
Adversary Emulation - DerpCon
Jorge Orchilles
More from Jorge Orchilles
(20)
SCYTHE Purple Team Workshop with Tim Schulz
SCYTHE Purple Team Workshop with Tim Schulz
So you want to be a red teamer
So you want to be a red teamer
Purple Team Use Case - Security Weekly
Purple Team Use Case - Security Weekly
KringleCon 3 Providing Value in Offensive Security
KringleCon 3 Providing Value in Offensive Security
C2 Matrix Anniversary - Blackhat EU 2020
C2 Matrix Anniversary - Blackhat EU 2020
Purple Team Exercise Workshop December 2020
Purple Team Exercise Workshop December 2020
External Threat Hunters are Red Teamers
External Threat Hunters are Red Teamers
Evolution of Offensive Assessments - SecureWV Conference
Evolution of Offensive Assessments - SecureWV Conference
Purple Team Exercise Hands-On Workshop #GrayHat
Purple Team Exercise Hands-On Workshop #GrayHat
Evolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootCon
8.8 Las Vegas - Adversary Emulation con C2 Matrix
8.8 Las Vegas - Adversary Emulation con C2 Matrix
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
DEFCON Safe Mode - Red Team Village - Emulating Evil Corp and WastedLocker
Blackhat 2020 Arsenal - C2 Matrix
Blackhat 2020 Arsenal - C2 Matrix
Purple Team Exercise Framework Workshop #PTEF
Purple Team Exercise Framework Workshop #PTEF
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMCon
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Cuddling the Cozy Bear Emulating APT29
Cuddling the Cozy Bear Emulating APT29
Adversary Emulation - Red Team Village - Mayhem 2020
Adversary Emulation - Red Team Village - Mayhem 2020
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation - DerpCon
Adversary Emulation - DerpCon
Recently uploaded
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
SANGHEE SHIN
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
Adam Moalla
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
Matt Ray
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
DianaGray10
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Safe Software
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
Anna Loughnan Colquhoun
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
IES VE
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
Eric D. Schabell
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
shyamraj55
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Aijun Zhang
Introduction to Quantum Computing
Introduction to Quantum Computing
GDSC PJATK
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
YounusS2
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
Christian Posta
20200723_insight_release_plan
20200723_insight_release_plan
Jamie (Taka) Wang
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
GDSC PJATK
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
infogdgmi
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
DianaGray10
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Daniel Santiago Silva Capera
Designing A Time bound resource download URL
Designing A Time bound resource download URL
Runcy Oommen
Recently uploaded
(20)
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Introduction to Quantum Computing
Introduction to Quantum Computing
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
20200723_insight_release_plan
20200723_insight_release_plan
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Designing A Time bound resource download URL
Designing A Time bound resource download URL
BackTrack 4 R2 - SFISSA Presentation
1.
2.
3.
Security Analyst –
Fortune 10
4.
Consultant by night
– Orchilles Consulting
5.
Master of Science
and BBA in Management Information Systems – Florida International University
6.
Author – Microsoft
Windows 7 Administrator’s Reference (Syngress)
7.
Certifications – CISSP,
GCIH, CEH, CICP, CCDA, CSSDS, MCTS, MCP, Security+
8.
Organizations:
9.
President South Florida
ISSA
10.
OWASP
11.
InfraGard
12.
Miami Electronic Crimes
Task Force
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
Download Now