BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments.

Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

As usual, this major release includes many updates. These include new kernel, updated tools and some structural changes with a focus on maintaining stability and compatibility with Ubuntu 18.04 LTS.

It includes some of the most commonly known/used security and analysis tools, aiming for a wide spread of goals, ranging from web application analysis to network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, automotive and exploitation.

It has been built on Ubuntu core system yet fully customized, designed to be one of the best Penetration testing and security distribution and more.

Also Read – Terminus : A Terminal For A More Modern Age

What’s New In BackBox

  •   Updated Linux Kernel 4.18
  •   Updated desktop environment
  •   Updated hacking tools
  •   Updated ISO Hybrid with UEFI support

System Requirements

  •   32-bit or 64-bit processor
  •   1024 MB of system memory (RAM)
  •   10 GB of disk space for installation
  •   Graphics card capable of 800×600 resolution
  •   DVD-ROM drive or USB port (3 GB)

The ISO images for both 32bit & 64bit can be downloaded from the official web site download section:

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

7 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

7 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

7 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago