mikebrashierat July 12,2016 I'd never heard of backtracker before watching this video but I'm impressed by its functionality. Unfortunately, according to the backtracker website it looks like it is no longer supported.
kbacon5at September 06,2016 This is a great video. After watching the first part I tried out Maltego Chlorine on my virtual Kali machine and it was neat to see how it works. He did a good job explaining the steps. Also, when he mentioned arpspoofing I was curious about this and when I looked it up I learned it is often done as part of dos, session hijacking and mitm. This was very interesting and a great tutorial.
asdfaslkjadsfasdasdfasat September 18,2016 Great video. I'd be very interested in some discussion on how backtrack can be used from the data extraction, transforming, and loading (ETL) perspective. In other words, how well would it work/scale as the first tool in a chain that siphens real time network data for reconnaissance purposes into a graph database like neo4j. I guess what I'm looking for is more detail on how this suite of tools would go beyond one-time targeted analysis and be used as a part of a continuous, robust network surveillance tool. Overall, great video and very informative.
BBurgessat November 14,2016 Its been a while since I've used BackTrack, but I like the distribution very much. It's very interesting to me, all the different tools you have at your disposal, and the capabilities of those tools. There looks to be so many tools, and I can only imagine it taking a significant amount of time to learn them all. I am going to try scanning my internal network with nmap to see what avenues of approach I can take to exploit. I am a newbie to the pen testing/hacking world, but I look forward exploring the possibilities.
Safiyahat November 23,2016 First time learning about this program and it was nice to see it in action with explanations of what was happening as it went along, even though some things went a bit over my head. Wish I had known about the transform feature sooner...would have been a great tool for all those research papers. I agree with previous comments that it is overall a helpful and informative video, especially to get some insight into the intrusion analysis process.