These days the word Hacking is one of the most popular keywords searched or being interrogated. Though there are so many articles we can get around over the web which claims to have the best hacking materiel as well as there are so many tools also available to get the idea of hacking. On this blog as we have several articles written related to hacking world; but on this post today we will know about the best operating system .. preferred by several hacker….
To get so I have searched many forums and articles and reached a final conclusion that the favorite Operating System for Hackers is a Linux Based Operating called BackTrack Linux… as well as the Microsoft Windows XP. These are also one of the easiest operating system as well but have so many functionality and feature you would love to know. Windows XP is still the most loved windows operating system and there is nothing left secret so here i think I need not to have it explained… so here just we will discuss only BackTrack Linux.
This operating system not only suited to the experienced profession but early newcomers can also get the information they need to start their carrier. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date. Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hat hackers, it provides an easy access to software that facilitates exploitations for secured systems and other reverse engineering. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!
- Based on: Debian, Ubuntu
- Origin: Switzerland
- Architecture: i386
- Desktop: Fluxbox, KDE
- Category: Forensics, Rescue, Live Medium
- Cost: Free
- Metasploit integration
- RFMON Injection capable wireless drivers
- Kismet
- Nmap
- Ettercap
- Wireshark (formerly known as Ethereal)
- BeEF (Browser Exploitation Framework)
- Information Gathering
- Network Mapping
- Vulnerability Identification
- Web Application Analysis
- Radio Network Analysis (802.11, Bluetooth, Rfid)
- Penetration (Exploit & Social Engineering Toolkit)
- Privilege Escalation
- Maintaining Access
- Digital Forensics
- Reverse Engineering
- Voice Over IP
and much more…. the list endless and lot more such features….