Ethical Experts
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
HomeHome  SearchSearch  FAQFAQ  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!

Display results as :
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Why Backtrack ?  EmptyTue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Why Backtrack ?  EmptyFri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Why Backtrack ?  EmptyThu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Why Backtrack ?  EmptySat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Why Backtrack ?  EmptySat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Why Backtrack ?  EmptySat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Why Backtrack ?  EmptyWed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Why Backtrack ?  EmptyFri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Why Backtrack ?  EmptyFri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
Hack Your BroadBand !! RISK FREE !!
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
Hacking With Keyloggers Prorat
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
hack wifi netcat LARGEST
Facebook Like


 Why Backtrack ?

Go down 
The Joker
The Joker

Posts : 182
Join date : 2012-06-11
Age : 28

Why Backtrack ?  Empty
PostSubject: Why Backtrack ?    Why Backtrack ?  EmptyWed Aug 15, 2012 4:54 pm

BackTrack purpose: Information gathering: This category contains several tools that can be used to get information regarding a target DNS, routing, e-mail address, websites, mail server, and so on. This information is gathered from the available information on the Internet, without touching the target environment.

• Network mapping: This category contains tools that can be used to check the live host, fingerprint operating system, application used by the target, and
also do portscanning.
• Vulnerability identification: In this category you can find tools to scan vulnerabilities (general) and in Cisco devices. It also contains tools to carry out fuzzing and analyze Server Message Block (SMB) and Simple Network Management Protocol (SNMP).
• Web application analysis: This category contains tools that can be used in auditing web application.
• Radio network analysis: To audit wireless networks, bluetooth and Radio Frequency Identifier (RFID), you can use the tools in this category.
• Penetration: This category contains tools that can be used to exploit the vulnerabilities found in the target machine.
• Privilege escalation: After exploiting the vulnerabilities and gaining access to the target machine, you can use tools in this category to escalate your privilege to the highest privilege.
• Maintaining access: Tools in this category will be able to help you in maintaining access to the target machine. You might need to get the highest privilege first before you can install tool to maintain access.
• Voice Over IP (VOIP): To analyze VOIP you can utilize the tools in this category.

BackTrack also contains tools that can be used for:

• Digital forensics: In this category you can find several tools that can be used to do digital forensics such as acquiring hard disk image, carving files, and analyzing hard disk image. To use the tools provided in this category, you may want to choose Start BackTrack Forensics in the booting menu. Some practical forensic procedures require you to mount the internal hard disk and
swap files in read-only mode to preserve evidence integrity.

• Reverse engineering: This category contains tools that can be used to debug a program or disassemble an executable file.
Back to top Go down
View user profile
Why Backtrack ?
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
Ethical Experts :: Hacking Section :: Hacking Tutorials-
Jump to: