Follow us on social networks:


ATTENTION! If You're from the US and You'd like to buy a subscribtion please contact us directly at email:

BackBox Linux

September 11, 2012

Issues admin Comments Off
BackBox Linux

BackBox Linux

This text is available for purchase but you need to login or register first.

You can buy this for 10 USD

Please register for free account or subscribe and get access to all issues on this website!
Remember Me

Active subscribers – To download this issue, click on the cover of the magazine on the main website or click the link above (visible only when signed in).

Single issue buyers – After paying for this issue, click “BackBox Linux ″ (which will show just above that text) to download your copy of the magazine.

BackBox Linux
by Ostendali
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

A Real Case of Penetration Testing Analysis
by Ostendali
In this article we will be introducing how to perform a Penetration Test based on a real case. Therefore, we will be performing the most common steps of information gathering by providing real examples of methods and tool usage

SSL and TLS Renegotiation Vulnerability
by Ostendali
In one of the previous article we had already done a vulnerability scan using OpenVAS and now we will take one more vulnerability from that report. The vulnerability is related to SSL/TLS renegotiation. We will be using “sslstrip” in order to verify if this vulnerability really exist. It is very important because checking 60% of systems you encounter, the SSL renegotiation option enabled.

Web Application Exploitation Using w3af
by Ostendali
In this article we will be introducing how to perform exploitation on a web application by using the powerful “w3af” tool.

DDoS Attack
by Ostendali
In this article we will be introducing how to perform a DDoS attack on a web server by using a simple stress tool called “slowhttptest”.

SQL Injection
by Ostendali
In this article we will be introducing how to performa SQL injection attack on a web server that is connected to a database by using a notorious tool called “sqlmap”.

Generate Undetectable Payload and Persistent Netcat Backdoor
by weVeg
In this article we show you how to built meterpreter payload inside an existent EXE, mask it at AV detenction and how to make a persistent netcat backdoor with BackBox 2.05

Crack wpa-wpa2 with aircrack-ng
by weVeg
In this article we will show howWPA-WPA2 network protection can be broken, we will also show how to crack theWPA wireless passphrase by using the aircrack-ng suite.


Share and Enjoy:
These icons link to social bookmarking sites where readers can share and discover new web pages.

  • LinkedIn
  • Facebook
  • MySpace
  • Google Bookmarks
  • BlinkList
  • MisterWong
  • Y!GG
  • Webnews
  • Digg
  • StumbleUpon
  • YahooBuzz
  • Reddit
  • Wikio UK

Tagged with:

Comments are closed.

Contact Us

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa