-
thorner
at March 29,2017
Back Track seems very powerful and relatively easy to use. I like that there are GUI elements in the command prompt as well - it's impressive how many options there are. This was a good video because he walked us through the process of information gathering and showed how powerful the tool is/how much information you can get from a network that is relatively unsecure. This tool is useful for a hacker but can also be very useful to someone trying to test the security of their network.
-
bschmid5
at April 28,2017
This video was published on February 14, 2013 and discusses the BackTrack 5r3 penetration testing tool. BackTrack is a Linux-based operating system distribution that comes with a rich repository of security and forensics tools to provide a penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Visiting the BackTrack website (http://www.backtrack-linux.org/) displays a message that BackTrack is no longer maintained and a link to the Kali Linux distribution (https://www.kali.org/) website is prominently displayed. BackTrack was a Linux distribution that focused on security based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux, therefore superseding the older BackTrack.
-
tritran42
at April 30,2017
This video shows how to using the BackTrack for penetration testing and vulnerability. Moreover, the video also introduces maltego tool. It is very useful tool in the forensic investigation because it can show the relationships between two or more objects. Furthermore, the video talks about the scapy, arping, nbtscan and nmap tools. Those tools use to analyze the vulnerability and how soft the internal network is. Last is driftnet, which uses to intercepting the information. Overall, this video is very useful for penetration testing and vulnerability.
-
BSharma
at May 03,2017
this video discusses how to use Backtrack for information gathering and penetration testing. The speaker mentions that this tool is potential time saving activity. Starts with using Maltego to begin the investigation. This tool shows "exposure" , meaning how much information is readily available about the source. The source is defined as an email address, Ip address, phone number or even a name. The tool searches the web for information about the source. The tools allows you to captures as much information about the target as possible. The graph workspace allows the user to show relationships between the objects. Shows multiple relationships between objects and other downstream objects such as email address or phone numbers. This tool seems relatively straight forward for finding entity relationships. It would be interesting to see how close it resembles the capability of tools such as Palantir.
-
BSharma
at May 03,2017
this video discusses how to use Backtrack for information gathering and penetration testing. The speaker mentions that this tool is potential time saving activity. Starts with using Maltego to begin the investigation. This tool shows "exposure" , meaning how much information is readily available about the source. The source is defined as an email address, Ip address, phone number or even a name. The tool searches the web for information about the source. The tools allows you to captures as much information about the target as possible. The graph workspace allows the user to show relationships between the objects. Shows multiple relationships between objects and other downstream objects such as email address or phone numbers. This tool seems relatively straight forward for finding entity relationships. It would be interesting to see how close it resembles the capability of tools such as Palantir.