BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments.

Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

As usual, this major release includes many updates. These include new kernel, updated tools and some structural changes with a focus on maintaining stability and compatibility with Ubuntu 18.04 LTS.

It includes some of the most commonly known/used security and analysis tools, aiming for a wide spread of goals, ranging from web application analysis to network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, automotive and exploitation.

It has been built on Ubuntu core system yet fully customized, designed to be one of the best Penetration testing and security distribution and more.

Also Read – Terminus : A Terminal For A More Modern Age

What’s New In BackBox

  •   Updated Linux Kernel 4.18
  •   Updated desktop environment
  •   Updated hacking tools
  •   Updated ISO Hybrid with UEFI support

System Requirements

  •   32-bit or 64-bit processor
  •   1024 MB of system memory (RAM)
  •   10 GB of disk space for installation
  •   Graphics card capable of 800×600 resolution
  •   DVD-ROM drive or USB port (3 GB)

The ISO images for both 32bit & 64bit can be downloaded from the official web site download section:

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

17 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago