HOME

TheInfoList



OR:

BackBox is a penetration test and security assessment oriented
Ubuntu Ubuntu ( ) is a Linux distribution based on Debian and composed mostly of free and open-source software. Ubuntu is officially released in three editions: '' Desktop'', ''Server'', and ''Core'' for Internet of things devices and robots. All ...
-based
Linux distribution A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that includes the Linux kernel and, often, a package management system. Linux users usually obtain their operating system by downloading one ...
providing a network and informatic systems analysis toolkit. It includes a complete set of tools required for
ethical hacking A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabili ...
and security testing.


Contents

The main aim of BackBox is providing an alternative, highly customizable and well performing system. BackBox uses the light
window manager A window manager is system software that controls the placement and appearance of windows within a windowing system in a graphical user interface. Most window managers are designed to help provide a desktop environment. They work in conjunctio ...
Xfce. It delivers a fast, effective, customizable and complete experience. It also has a very helpful community behind it. It includes some of the most used security and analysis Linux tools, aiming for a wide spread of goals, ranging from web application analysis to network analysis, from stress tests to sniffing, also including vulnerability assessment, computer forensic analysis and exploitation. Part of the power of this distribution comes from its
Launchpad A launch pad is an above-ground platform from which rocket- missiles or space launch vehicles take off vertically. Launch pad may also refer to: Computing * Launchpad (macOS), an application launcher introduced in Mac OS X Lion * Launch Pad (sof ...
repository core, constantly updated to the latest stable version of the most known and used
ethical hacking A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabili ...
tools. The integration and development of new tools in the distribution follows the open source community, particularly the
Debian Free Software Guidelines The Debian Free Software Guidelines (DFSG) is a set of guidelines that the Debian Project uses to determine whether a software license is a free software license, which in turn is used to determine whether a piece of software can be included in De ...
criteria.


Releases


Categories

BackBox Linux categories listed as follow: *
Information Gathering Intelligence assessment, or simply intel, is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information (intelligence). Assessments ...
* Vulnerability Assessment * Exploitation *
Privilege Escalation Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The re ...
* Maintaining Access *Documentation & Reporting *
Reverse Engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
* Social Engineering *
Forensic Analysis Forensic science, also known as criminalistics, is the application of science to criminal and civil laws, mainly—on the criminal side—during criminal investigation, as governed by the legal standards of admissible evidence and criminal p ...
*
VoIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
Analysis *
Wireless Wireless communication (or just wireless, when the context allows) is the transfer of information between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most ...
Analysis *Miscellaneous


Tools

More than 70 tools are included in BackBox: * Metasploit *
Armitage Armitage is a village in Staffordshire, England on the south side of the Trent and Mersey Canal south just outside of the market town of Rugeley and north of the city of Lichfield, and noteworthy for the Armitage Shanks sanitary porcelain factor ...
*
Nmap Nmap (Network Mapper) is a network scanner created by Gordon Lyon (also known by his pseudonym ''Fyodor Vaskovich''). Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provide ...
* OpenVAS *
W3af w3af (Web Application Attack and Audit Framework) is an open-source web application security scanner. The project provides a vulnerability scanner and exploitation tool for Web applications. It provides information about security vulnerabilitie ...
* The Social Engineering Toolkit * Ettercap * Scapy *
Wireshark Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 du ...
* Kismet *
Aircrack Aircrack-ng is a network software suite consisting of a detector, packet sniffer, Wired Equivalent Privacy, WEP and Wi-Fi Protected Access, WPA/IEEE 802.11i-2004, WPA2-PSK cracking of wireless networks, cracker and analysis tool for 802.11 wirele ...
*
Ophcrack Ophcrack is a free open-source ( GPL licensed) program that cracks Windows log-in passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly f ...
* Sqlmap *
John The Ripper John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platforms (eleven of which are architecture-specific versions of Unix, DOS, Win32, BeOS, and OpenVMS) ...


References


External links

*
BackBox Linux on OpenSourceFeed Gallery
{{Operating system Linux security software Ubuntu derivatives Debian-based distributions X86-64 Linux distributions Operating system distributions bootable from read-only media Pentesting software toolkits Linux distributions