source article: http://backtrack4.blogspot.com/2009/...-released.html
EDIT: About BackTrack Linux:
Edited by yawnbox - 2/11/09 at 5:18pm
BackTrack 4 Beta released
The Remote Exploit Development Team is happy to announce the release of BackTrack 4 Beta. We have taken huge conceptual leaps with BackTrack 4, and have some new and exciting features. The most significant of these changes is our expansion from the realm of a Pentesting LiveCD towards a full blown "Distribution".
Now based on Debian core packages and utilizing the Ubuntu software repositories, BackTrack 4 can be upgraded in case of update. When syncing with our BackTrack repositories, you will regularly get security tool updates soon after they are released.
Some of the new features include:
* Kernel 184.108.40.206 with better hardware support.
* Native support for Pico e12 and e16 cards is now fully functional, making BackTrack the first pentesting distro to fully utilize these awesome tiny machines.
* Support for PXE Boot - Boot BackTrack over the network with PXE supported cards!
* SAINT EXPLOIT - kindly provided by SAINT corporation for our users with a limited number of free IPs.
* MALTEGO - The guys over at Paterva did outstanding work with Maltego 2.0.2 - which is featured in BackTrack as a community edition.
* The latest mac80211 wireless injection pacthes are applied, with several custom patches for rtl8187 injection speed enhancements. Wireless injection support has never been so broad and functional.
* Unicornscan - Fully functional with postgress logging support and a web front end.
* RFID support
* Pyrit CUDA support...
* New and updated tools - the list is endless!
We consider the Beta to be stable and usable. Some tools were kept back from this version, and will be soon added to the repositories.
If you would like to add a link to BackTrack downloads to your website, please use http://www.remote-exploit.org/backtrack_download.html as the download link.
Tuesday, February 10, 2009
Weve gone live with the beta, and the downloads are going crazy. All our mirrors are at 90 mbit, more or less.
You can get the iso here md5sum and sha512sum
And the VMWare image here md5sum and sha512sum
We are trying to get estimates of downloads. If you link to our ISOs, please use:
and do not link them directly.
Release information will shortly be available on the Remote Exploit Web site.
Monday, February 9, 2009
The Beta ISO and VMWare images are uploaded, and should be synced with our mirrors soon. We will be making a formal announcement on the Remote Exploit site and in the various mailing lists once the links are active.
We've set up a quick install guide for BT4, as there is no official GUI installer yet (we're working on it).
Remember to look here for basic commands / tips and tricks for getting up and running with BT4.
We will be releasing an 850 +MB iso and a VMWare image install. The image was created under VMWare Workstation 6.5.1 and has VMware tools installed. Should also work with VMWare player 2.5.1.
A few additional bugs and cosmetic changes were made since the Shmoo edition, mainly fixing a MySQL server login issue. We will try our best to have an upgrade path from this beta to the final , but by no means make any promises.
We consider the Beta to be very stable and usable. A few tools were kept back from this version, and will be soon added to the repositories.
Keep tuned with this blog for updates !
Friday, February 6, 2009
This is it! After many months of effort from the Remote Exploit Dev team, BackTrack 4 Beta is ready and available at our Shmoo booth. I thought I'd post up some "getting started" notes, to help people out with the first surge of questions.
* Default password to BackTrack 4 hasn't changed, still root / toor.
* KDE 3 is being used in BT4. We tried KDE 4, really, we did. It sucked. Maybe 4.2 in BT4 final.
* Most of the KDE "apt gettable" packages have "kde3" appended to their names. So "apt-get install kate-kde3" is good, "apt-get install kate" is bad. Use "apt-cache search " to search for packages to install.
* Kernel sources included in /usr/src/linux.
* DHCP disabled by default on boot, you need to /etc/init.d/networking start
* If you do an HD install and want to restore networking (DHCP) to be enabled at boot, type "update-rc.d networking defaults".
* Getting a live USB install is nice and easy with Unetbootin
* VMware users - to fix the KDE resolution, type "fixvmware" before starting X.
* Vmware tools and kernel modules compile perfectly on VMWare 6.5.1
* If you can't get X to work, first try to autogenerate an xorg.conf by typing "Xorg -configure" and try using the generated conf file. If that bums out, you can revert to VESA by typing "fixvesa".
* Wireless networking in KDE can be started with KnetworkManager (/etc/init.d/NetworkManager)
* Various drivers can be found in /opt/drivers (various madwifi branches, video drivers for Nvidia and HP 2133's).
* Installation of BT4 to HD is similar to BT3. (tip - dont forget to modify /etc/fstab after the install. Change the first line from aufs / aufs .... to the corresponding device and filesystem. For example, on my box it's /dev/sda3 / reiserfs defaults 0 0, as my root partition is on sda3 and i used the resiserfs filesystem).
* The warning message "W: GPG error: http://ppa.launchpad.net intrepid Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY CB2F6C86F77B1CA9" when "apt-get update" occurs as the Intrepid KDE 3 repos do not use a GPG key. We will eventually host these package in our own repo.
* To generate ssh keys for the first time type "sshd-generate"
* Conky takes a while to load.
I will be adding items to this list as relevant.
So far we have been receiving outstanding feedback as far as hardware support is concerned. We are looking forward to hearing people's feedback in Shmoo. Rock on!
BackTrack is the most top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.
It's evolved from the merge of the two wide spread distributions - Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new-comers are using BackTrack as their favorite toolset all over the globe.
BackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts by Tomas M. (www.slax.org) . Every package, kernel configuration and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.
After coming into a stable development procedure during the last releases and consolidating feedbacks and addition, the team was focused to support more and newer hardware as well as provide more flexibility and modularity by restructuring the build and maintenance processes. With the current version, most applications are built as individual modules which help to speed up the maintenance releases and fixes.
Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).
Being superior while staying easy to use is key to a good security live cd. We took things a step further and aligned BackTrack to penetration testing methodologies and assessment frameworks (ISSAF and OSSTMM). This will help our professional users during their daily reporting nightmares.
Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.
No other commercial or freely available analysis platform offers an equivalent level of usability with automatic configuration and focus on penetration testing.
Edited by yawnbox - 2/11/09 at 5:18pm