Tuesday, 21 June 2011

BackTrack and Metasploit Intro

Hey guys,
Thanks for all the follows, I've been very keen to post this one up - was written some time ago and thus I had to edit it to suit the new release of BackTrack. Basically just a quick overview of some great penetration testing software. Check out the run down below and let me know what you think. Also if you have any suggestions or requests please hit me up in the comments section.

BackTrack 5 Final

What is it?
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.

What does it do?

Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.

You can download Backtrack 5 from the official webpage: http://www.backtrack-linux.org/downloads/

The MetaSploit Framework

What is it?
The Metasploit Framework is both a penetration testing system and a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

What does it do?

The framework consists of tools, libraries, modules, and user interfaces. The basic function of the framework is a module launcher, allowing the user to configure an exploit module and launch it at a target system. If the exploit succeeds, the payload is executed on the target and the user is provided with a shell to interact with the payload. Hundreds of exploits and dozens of payload options are available.

How do I get it?

Metasploit is included with BackTrack 5.

Monday, 20 June 2011


After entertaining the idea of putting up my own blog, I've finally done it! I now have my own blogging machine. The blog will cover my ideas, experiences, tips and tricks into different fields of technology and personal computers. I will share the revelations and frustrations, talk about different products and try to share some knowledge with fellow technology lovers (and maybe haters).

I'd just like to start with a little bit of an introduction about myself. My name is Darren, I'm from sunny northern Queensland. I'm an automotive air-conditioning repairer with a very strong love of computers and technology, when I'm not working I'm spending time with my family (2 daughters and my wife Janet) or trawling the internet. I've been following many bloggers as of late and this is one of the key decisions which has brought me to making my own blog. Below I've included one of the views from our recent trips to the coast! I hope some of you can share some insight into your lives with me in the comments below :) 

I think that'll do for now, come back when I have some new posts ready, which will be very soon, this is a promise!

Beautiful sunny coasts of Queensland!