Results 1 to 5 of 5

Thread: Backtrack 5 Tutorial

  1. #1
    Join Date
    May 2011

    Default Backtrack 5 Tutorial

    Hello to everyone, i'm writing a little tutorial about backtrack which i hope that could be useful to anyone who wants to learn more about network security and to my self which im learning it and i also want to do it so i dont forget about some important concepts.

    So far i've made a brief explanation about WPA and WEP, showed some tutorials about how to get WEP (open sys and shared key) and WPA/WPA2 passwords using aircrack-ng and also with pyrit on WPA

    I'm also writing now about TLS/SSL, what is it and SSL Striping.

    I would like some one to tell me more things that i should search for and put it on my tutorial, like things they think its important.

    What i want to do is to focus on types of attacks that could happen in your own network, would like to make tutorials about how to do that type of attack and the countermeasure against it.

    Thats the idea, show to attacks but also show how to make harder someone to break your network, since there is no 100% safer network.

    Hope i could post the tutorial here when im finished

    Last edited by strakar; 09-25-2011 at 10:46 PM.

  2. #2
    Senior Member ShadowMaster's Avatar
    Join Date
    Jul 2011

    Default Re: Backtrack 5 Tutorial

    Add MITM attacks using arpspoof and ettercap. Also add SSlStrip and fake ssl stuff.
    World Domination is such an ugly phrase. I prefer the term World Optimization.

  3. #3
    Junior Member M00kaw's Avatar
    Join Date
    Oct 2010

    Default Re: Backtrack 5 Tutorial

    I think it's a really good idea to write some tutorials on how to use backtrack. You'll learn a lot by writing it - and you get to educate others...
    Im kinda curious - do you plan on writing down the theory behind TLS/SSL and SSL-Stripping ? the same question goes for the wireless hacking as well..

    What I often miss, when I read tutorials is some theory / explanation on WHY and HOW does ssl-strip actually work...

    I hope you get my point...

    Best regards


  4. #4
    Member shadowzero's Avatar
    Join Date
    Jun 2011

    Default Re: Backtrack 5 Tutorial

    Good luck, that's a big undertaking considering there are hundreds of tools and different ways to accomplish the same thing. Some things to think about: Are you just covering tool use, or are you including a pentesting methodology of some sort? How will you decide which tool/technique to use when attacking a certain vulnerable service (ie: metasploit all the way, or some other included script, or both)? Are you going to talk about "why" and "how" a certain technique works or just the tool that exploits it (ie: why/how does SQL injection works, or just jump straight to using the sqlmap tool)?

  5. #5
    Join Date
    May 2011

    Default Re: Backtrack 5 Tutorial

    Well as i'm a beginner i will write about what i learn. For example, i learned some ways of hacking wep and wpa by reading and watching how, and im writing my own tutorial with what i learn. As I'm learning I'll writing about it on my tutorial. It will take a while because i really want to make a good thing out of it.

Similar Threads

  1. Backtrack Tutorial Series
    By fifo_thekid in forum OLD BackTrack3 Howtos
    Replies: 15
    Last Post: 11-16-2009, 08:49 AM
  2. tutorial for backtrack
    By chandal_keta in forum OLD Tutorials and Guides
    Replies: 1
    Last Post: 04-08-2009, 07:20 AM
  3. Tutorial : .NET for Backtrack
    By williamc in forum OLD Tutorials and Guides
    Replies: 4
    Last Post: 04-04-2008, 08:43 PM
  4. backtrack 2 hdd tutorial
    By imported_cirrus in forum OLD Tutorials and Guides
    Replies: 10
    Last Post: 02-04-2008, 08:22 AM
  5. Replies: 1
    Last Post: 10-06-2007, 09:38 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts