What is Backtrack Linux?
Backtrack Linux is (and I quote) the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
To cut a long story short, it’s all you need for pen-testing, hacking and use as a primary OS.
Where can I download Backtrack Linux from?
You can find all of the releases on this download page – http://www.backtrack-linux.org/downloads/
Downloading BackTrack makes me a hacker, right?
Wrong. In fact, anyone who calls themselves a “hacker” because of the Operating System which they use is an idiot. It’s all about how you use that OS, making use of the tools on it, etc. Hell, you don’t even have to be running Backtrack to hack or pen-test. You might choose to run a different Linux distro, or even Windows. Keep in mind that Backtrack comes loaded with all the tools you’re going to need, which makes it my primary recommendation.
Backtrack is installed, but I have no idea what I’m doing
It is recommended that you have some basic Linux knowledge before you go and install this OS, but it’s not completely necessary. Whether you’ve jumped straight in or are starting with some experience, you need to get some basics under your belt. You need to learn your way around the Operating System, and get used to it a little.
You also need to read like crazy, and learn things. Here are some links to get you started.
- BackTrack Support Forums
- Metasploit Unleashed – AMAZING guide on using the Metasploit Framework
- IronGeek – Some brilliant videos on here.
I’ve done my reading, what next?
Read more! You can’t get enough of it, and combined with some experience when using the tools, you can’t be going wrong at all.
Try some basic shit, like cracking your own Wireless network, port scanning another machine, and finding vulnerabilities.
Most of all, have fun!