Tuesday, 21 June 2011

BackTrack and Metasploit Intro

Hey guys,
Thanks for all the follows, I've been very keen to post this one up - was written some time ago and thus I had to edit it to suit the new release of BackTrack. Basically just a quick overview of some great penetration testing software. Check out the run down below and let me know what you think. Also if you have any suggestions or requests please hit me up in the comments section.

BackTrack 5 Final

What is it?
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.

What does it do?

Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.

You can download Backtrack 5 from the official webpage: http://www.backtrack-linux.org/downloads/

The MetaSploit Framework

What is it?
The Metasploit Framework is both a penetration testing system and a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

What does it do?

The framework consists of tools, libraries, modules, and user interfaces. The basic function of the framework is a module launcher, allowing the user to configure an exploit module and launch it at a target system. If the exploit succeeds, the payload is executed on the target and the user is provided with a shell to interact with the payload. Hundreds of exploits and dozens of payload options are available.

How do I get it?

Metasploit is included with BackTrack 5.


  1. Wow, Back Track 5 looks cool. I just don't know what I'd need it for..