BackBox Linux: the distro for pentesting

Backbox

If you dedicate yourself to perform pentesting or security audits, or simply try to violate systems for leisure or to practice, you will already know some very famous GNU / Linux distributions that include large paks of tools for this type of practice, such as Kali Linux, Parrot OS, Santoku, CAIN, DEFT, WifiSlax, etc., well, now we present you BackBox, another of the great and well-known distros of this guild that continues to receive updates.

If you are interested, you can get ISO image of this distribution for both x86 32-bit and 64-bit architectures from this link. You already know that, even if you already use one of the distros mentioned above, you may like to use this other one for certain specific tasks, since not all of them include the same tools and some are more oriented to pentesting in general, WiFi audits, analysis digital forensics, for mobile devices, etc.

Installation is simple, like any Ubuntu or Debian distro, in addition, you can install it on a USB in order to make it more portable and take it wherever you want to perform penetration tests. And if you want more details because you still did not know what this distros offers us, say that you will find tools for web application analysis, exploits, network analysis, stress tests, privilege escalation, vulnerability assessment, forensic analysis, and more.

All with powerful and popular tools that are used in the guild such as Ettercap, Msfconsole, Wireshark, ZAP, john the ripper, Zenmap, BeEF Browser Exploitation, Sqlmap, Driftnet, Tcpdump, Cryptcat, Autopsy, Siege, Weevely, and a very long etc. Everything updated in its latest version 5.3 that was released in the middle of last month, with a very current kernel and with a minimalist desktop environment so that you can focus on what you are really doing.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.