BackBox Linux

BackBox Linux

BackBox Linux

This text is available for purchase but you need to login or register first.
You can buy this for 10 USD
Please register for free account or subscribe and get access to all issues on this website!

Remember Me
Important:
Active subscribers – To download this issue, click on the cover of the magazine on the main website or click the link above (visible only when signed in).

Single issue buyers – After paying for this issue, click “BackBox Linux ″ (which will show just above that text) to download your copy of the magazine.

BackBox Linux
by Ostendali
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

A Real Case of Penetration Testing Analysis
by Ostendali
In this article we will be introducing how to perform a Penetration Test based on a real case. Therefore, we will be performing the most common steps of information gathering by providing real examples of methods and tool usage

SSL and TLS Renegotiation Vulnerability
by Ostendali
In one of the previous article we had already done a vulnerability scan using OpenVAS and now we will take one more vulnerability from that report. The vulnerability is related to SSL/TLS renegotiation. We will be using “sslstrip” in order to verify if this vulnerability really exist. It is very important because checking 60% of systems you encounter, the SSL renegotiation option enabled.

Web Application Exploitation Using w3af
by Ostendali
In this article we will be introducing how to perform exploitation on a web application by using the powerful “w3af” tool.

DDoS Attack
by Ostendali
In this article we will be introducing how to perform a DDoS attack on a web server by using a simple stress tool called “slowhttptest”.

SQL Injection
by Ostendali
In this article we will be introducing how to performa SQL injection attack on a web server that is connected to a database by using a notorious tool called “sqlmap”.

Generate Undetectable Payload and Persistent Netcat Backdoor
by weVeg
In this article we show you how to built meterpreter payload inside an existent EXE, mask it at AV detenction and how to make a persistent netcat backdoor with BackBox 2.05

Crack wpa-wpa2 with aircrack-ng
by weVeg
In this article we will show howWPA-WPA2 network protection can be broken, we will also show how to crack theWPA wireless passphrase by using the aircrack-ng suite.

Comments are closed.