Blog Posts Tagged with "Backtrack"


Penetration Testers: Backtrack 5 Release Slated for May

May 04, 2011 Added by:Headlines

BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), will support 32 and 64 bit architectures, and will officially support KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment...

Comments  (0)


Network Security Monitoring vs Backtrack Autopwn

February 25, 2011 Added by:Dan Dieterle

For this part of the series I will be using three machines – a target machine, an attacker system and a third computer running the Network Security Monitoring (NSM) Security Onion Live CD. The NSM machine will be connected to the target machine via a mirrored port...

Comments  (0)


Armitage: AKA - Making Metasploit Even Easier

January 20, 2011 Added by:Ben Keeley

The application is aimed at Security Professionals who whilst understanding hacking and knowing what they want to accomplish with Metasploit, may not be familiar enough with Metasploit itself to carry the required actions out. This is a brief introduction into Armitage's power...

Comments  (0)


Drive Encryption Useless Against Some Online Attacks

January 11, 2011 Added by:Dan Dieterle

Drive encryption is recommended, and it works very well, but just how well will it protect you from online attacks? Truth be told, in some situations it may not help you at all. I wanted to see how well drive encryption would protect a Windows XP SP3 machine from a common online Java based attack...

Comments  (5)


Viewing Remote Video with Backtrack 4 and Metasploit

December 16, 2010 Added by:Dan Dieterle

Many people have wondered if hackers could take control of a remote webcam. Well, the short answer is yes. If a hacker has compromised your system via malware, exploit or by you clicking on one of those fake online virus scan programs, they could in fact view images through your webcam...

Comments  (0)


Backtrack 4: Penetration Testing with Social Engineering Toolkit

June 29, 2010 Added by:Dan Dieterle

People do not understand how dangerous it is to click on unknown links in an e-mail or even on a website. Hackers will disguise their malware shell and make it look very appealing. Be it a video codex that you must install to watch a video that you really want to watch or even a webpage that tells you that you have a virus and you must install and run the latest online anti-virus scanner to remove...

Comments  (4)

Page « < 1 - 2 > »