CIP Cyber

BackBox Linux- A Flexible Penetration Testing Distribution

Table of Contents

Life changes everyday and the researcher and developer makes new development everyday, if you have not read our previous post on best linux distro for penetration than it is recommended to read it click here.
   
In this article we will add a new distribution in our list and that is BackBox a flexible penetration testing distribution. BackBox is a Linux distribution based on Ubuntu Lucid 10.04 LTS developed to perform penetration tests and security assessments. BackBox is simple, reliable and fast distro, it supports the various penetration testing tool.
Well developed and most commonly penetration testing tools are available on backbox built in. It support both 32-bit and 64-bit operating system.

Includes a section within category of Web application analysis, focused on content management systems. This is an interesting distinction because content management systems (CMS) has become a popular choice for Web publishing.



  • Denial of Service
    • siege
  • Maintaining Access
    • weevely
  • Miscellaneous
    • macchanger-gtk
    • netcat
    • netwox
  • Network Napping
    • hping3
    • nbtscan
    • netdiscover
    • p0f
    • xprobe
    • zenmap
  • Privilege Escalation
    • Password Cracking
      • chntpw
      • fcrackzip
      • john
      • medusa
    • Sniffing
      • drifnet
      • dsniff
      • ettercap-gtk
      • ngrep
      • tcpdump
      • tshark
      • wireshark
    • Spoofing
      • python-scapy
      • yersinia
  • Vulnerability Assessment
    • Exploitation
      • Metasploit-3
    • Social Engineering
      • set
    • Vulnerability Scanners
      • openvas
  • Web Application Analysis
    • CMS Scanners
      • blindelephant
      • cms-explorer
      • plecost
      • whatweb
    • Database Assessment
      • sqlibf
      • sqlmap
      • pynject
    • Proxies
      • paros
    • Scanners
      • DirBuster
      • nikto
      • skipfish
      • w3af
      • xsser
  • Wireless Analysis
    • Cracking
      • aircrack-ng
    • Scanning
      • kismet


Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

How Organizations Can Win at Website Security

An insecure website is a serious security risk for organizations of all sizes. Insecure websites are highly vulnerable to cyberattacks, malware, and other cyberthreats, and

LINUX GAME HACKING GUIDE 2021

In the past, most games had cheat codes, yet these days it’s more uncommon. As a programmer, I like to perceive how things work, so

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings