TUTORIAL : Search Results : BackTrack Linux – Penetration Testing Distribution



Social Engineering Toolkit Training Available

Wednesday, April 28th, 2010

The Social-Engineering Toolkit (SET) was designed by David Kennedy (ReL1K) and incorporates many useful Social-Engineering attacks all in one simplistic interface. The main purpose of SET is to automate and improve on many of the social-engineering attacks out there. As pentesters, social-engineering is often a practice that not many people perform. A set of new set of videos called “Social Engineering Toolkit Training” has been made available – the pentesters choice for Client Side Attacks and other Social Engineering related attacks. Check them out here and here.

Taken directly from the social-engineer.org site:

The downloads of the latest release of the Social Engineering Toolkit has been truly remarkable.  The new additions to the tool are just amazing in itself.

Yet we get a lot of requests for tutorials and/or training on how to effectively use the tool.  We heard your cries for help and asked Dave to help us out.  Dave put together a series of training videos showing how to complete some of the main attacks with SET.

We then added a whole new section added to the resources page that is just for SET Tutorials.  Check it out and let us know what you think.

3G

Monday, March 29th, 2010

Configuring USB760 cell modem for Verizon Wireless:

Required Materials: Modern Laptop/Desktop Backtrack 4 Final USB Boot/DVD USB760 EvDO modem w/ Service This tutorial makes the following assumptions: Other then the USB stick, this tutorial assumes the modem will be the only device connected to your system during the execution of this tutorial. If you are planning on using other USB devices on the system, such as GPS, please connect and configure these devices after this tutorial is finished. Getting Started: Boot BT4 on your machine and log in as root after which start the windowing manager. This tutorial will use nedit to make the configuration files, however you are not limited to this and may use the editor of your choice. A few terminal windows will need to be open for this configuration.

Terminal and Nedit

Showing an open Terminal and text editor Nedit

Replicate the following data below and save it as “vzw_chat” to this location “/etc/ppp/peers/” on your system.

Saving the vzw_chat script

Saving the vzw_chat script

ABORT  'NO CARRIER' ABORT 'ERROR' ABORT 'NO DIALTONE' ABORT 'BUSY' ABORT  'NO ANSWER' '' ATZ OK-AR-OK ATDT#777 CONNECT \d\c
In nedit we need to make 2 configuration files for pppd, which is available within BT4. The configuration files are for Verizon modems, ATT configurations will need to edit their user line to match their ISP Replicate the following data below and save it as “vzw” to this location “/etc/ppp/peers/” on your system.

Saving vzw script

Saving vzw script

ttyUSB0 115200 debug defaultroute usepeerdns connect-delay  10000 user 8765309@vzw3g.com show-password lock lcp-echo-failure  4 lcp-echo-interval 65535 connect '/usr/sbin/chat -v -t3 -f  /etc/ppp/peers/vzw_chat'
Once the two files saved are saved to your system, its time to get the system to properly use the modem. If there is any troubles with the device not being located at ttyUSB0 you will need to edit the first line of “vzw” to match your devices location. If you have not already done so, please plug in your modem now. Allow 5-10 seconds for the system to settle down after the device is inserted. A caviot to this particular modem is that a SD Card is on this device which mounts to the system as /dev/sr0. We need to eject this device to get the EvDO device to function and identify properly. If you are using a different modem then the one specified your results will vary.

Shows the Dmesg output

Shows the Dmesg output

root@bt:/# dmesg cut ... usb-storage:  device scan complete sr0: scsi3-mmc drive: 297x/297x sr 17:0:0:0:  Attached scsi CD-ROM sr0 sr 17:0:0:0: Attached scsi generic sg2 type  5 usb-storage: device scan complete sd 16:0:0:0: [sdb] Attached  SCSI removable disk sr0: CDROM (ioctl) error, command: cdb[0]=0x46 46  00 00 00 00 00 00 00 20 00 sr: Sense Key : 0x0 [current] sr:  ASC=0x0 ASCQ=0x0
If you issue lsusb command you will note this device as :

Showing lsusb output

Showing lsusb output

root@bt:/# lsusb cut ... Bus 003  Device 002: ID 1410:5030 Novatel Wireless cut ...
Notice the vendor:product number of 1410:5030, this is the address of the SD Card on the device and will interfere with the configuration. The first command we will issue is to eject the SD card from the system:
root@bt:/#  eject /dev/sr0
Now the device has been ejected, wait approx: 5 seconds then issue lsmod again and compare the vendor:product number to the original

Showing lsusb output

Showing lsusb output

 root@bt:/# lsusb cut  ... Bus 003 Device 002: ID 1410:6000 Novatel Wireless cut  ...
This identifier is now pointing to the EvDO modem. This allows the configuration to continue using a kernel module known as usbserial. This is done using modprobe usbserial and providing the vendor:product number we learned from the previous command as arguments.

Showing modprobe output

Showing modprobe output

root@bt:/# modprobe usbserial vendor=0x1410 product=0x6000
If this command issued with out error you are almost on the Internet with your EvDO modem. The final step involves using pppd to connect. This connection is not persistent and if it drops, you will need to reconnect much like a vpn. Issue the following command to make the connection:

Showing pppd connected to the ISP

Showing pppd connected to the ISP

root@bt:/# pppd call vzw
Monitoring the connection can be accomplished with the following command:
 root@bt:/#  tail -f /var/log/messages Mar 12 15:38:01 bt chat[6462]: CONNECT Mar 12 15:38:01 bt chat[6462]:  -- got it Mar 12 15:38:01 bt  chat[6462]: send (\d) Mar 12 15:38:02 bt pppd[6461]: Serial  connection established. Mar 12 15:38:02 bt pppd[6461]: Using  interface ppp0 Mar 12 15:38:02 bt pppd[6461]: Connect: ppp0  <--> /dev/ttyUSB0 cut ...
Other things to take into consideration: If you remove the device you will need to reissue all the commands from “eject /dev/sr0″ to “pppd call vzw” If the connection drops after you have successfully connected 1 time, you just need to issue : “pppd call vzw” If you have other USB devices such as GPS, it will be located at “ttyUSB1″ after you enable the EvDO modem If you know bash or other languages, please do not hesitate to elaborate on these steps for automation

BT4 VM Install

Friday, January 8th, 2010

Install BackTrack in VMWare.

  1. Follow the basic install instructions here to get BackTrack installed in a VMware machine.
  2. Log into BackTrack. To install the VMWare drivers, the kernel source and headers need to be in place. By default in the BackTrack 4 final release, the kernel (denoted by {version} ) is configured and ready. However in some cases, you might need to make sure you have the latest kernel sources by typing in:
  3.  apt-get update apt-get install linux-source cd /usr/src tar jxpf linux-source-{version}.tar.bz2 ln -s linux-source-{version} linux cd linux zcat /proc/config.gz > .config make scripts make prepare

  4. Now that your kernel sources and headers are in place, run the “Install VMWare tools” for the specific guest VM.
  5. Mount the VMWare tools virtual cd, copy over the VMWare tools package and run the installer:
  6. mount /dev/cdrom3 /mnt/cdrom cp /mnt/cdrom/VMwareTools-{version}.tar.gz /tmp/ cd /tmp/ tar zxpf VMwareTools-{version}.tar.gz cd vmware-tools-distrib ./vmware-install.pl

  7. Complete the VMWare tools installation as required. Run “fix-splash” to reintroduce the green framebuffer console. Reboot.

FAQ

Friday, January 8th, 2010

  • I’ve just installed BackTrack, what is the root password ?
  • The ubiquity  installer uses the “toor” password by default.
  • Is BackTrack free for download?
  • Yes, and it always will be.
  • I’ve just burned my iso and it will not boot ?
  • The 3 most common problems are the md5sum is wrong, the program you used to burn the .iso file or cheap media. Please check these three things before asking for help.
  • I use Windows and I do not want to mess it up?
  • Backtrack can be run as a live dvd environment which will not affect your Windows install in any way. If you run the installer and install to hard disk you are responsible for partitioning your drive properly.
  • I’ve heard its stupid to run as root ?
  • Many of the tools in Backtrack need root access to run. Backtrack is a specialized penetration testing distribution. We trust our users know the security risks of running as the root user.
  • Whats the “perfect” laptop to run backtrack on?
  • Every one’s version of perfect is different. There is no perfect computer. Please check our HCL and check the forums. Our users post their thoughts on models of computers frequently
  • Where is the Backtrack manual ?
  • There is no manual. We do write official documentation on how to install Backtrack and how to use some of the more exotic tools, however, we do not write guides on hacking in general. We have a forum community and a wiki which both contain many user submitted tutorials. Please check the manual section for more info on official documentation.
  • Where can I find out more information about BackTrack ?
  • Keep updated with our blogs, and check our forums. Check for BackTrack Fixes here.
  • Why cant I just add the Backtrack repositories to my Ubuntu install ?
  • We recommend against this action because Backtrack tools are built with many custom features and libraries. We have no way of knowing how they will preform on a non Backtrack distribution. If you decide on this course of action you do so at your own risk and the backtrack team will not be able to offer support.
  • Why don’t my network cards show up when I boot ?
  • BackTrack is a penetration testing distribution and as such DHCP requests etc entering the network when you boot are usually very undesirable. You can easily enable networking by issuing the following command /etc/init.d/networking start
  • Why cant BackTrack use wireless card “X” inside VMWare or Virtualbox ?
  • Any virtualisation software can only use USB wireless network cards as physical devices, all other types of wireless card are seen as virtual ethernet devices and can only be seen as a wireless device by the host and not by the guest operating system. So if you want to run BackTrack in VMWare or Virtualbox and have full wireless capabilities, make sure you are using a USB device.
  • Why don’t you provide a USB image like you did with previous versions ?
  • Previous versions required sometimes quite complicated methods to install to a USB stick, so for convenience we provided special images for easy installation. With the latest editions of BackTrack we have eliminated this need as it can easily be installed to a USB stick with tools such as Unetbootin or via manual methods as described in the manual section of this site.

BackTrack Linux

Friday, January 8th, 2010
twitter

Welcome to Backtrack-Linux.org, home of the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack you Install BackTrack, boot it from a Live DVD or thumbdrive, the penetration distribution has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.


Note: BackTrack Linux is no longer being maintained. Please check www.kali.org



Best viewed in full screen !


 

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.

Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.



twitter