![]() ![]() ![]() This assumes that you have some knowledge of disk partitioning in Linux. Use the fourth option (Specify partitions manually (advanced)) if you want to create a custom set of partitions. Select option 3 (Use the largest continuous free space) only if there is unpartitioned space on the target disk and you want the installer to auto-partition the space. Select the first option if all the space on the disk is taken up by Windows and you want the installer to shrink Windows and install BackTrack. Since the objective is to set up a dual-boot system, you obviously do not want to choose the second option (Erase and use entire disk). How you want to set up the dual-boot system will determine which one you select. Notice that you have four disk partitioning options. And when the installer launches, click through the first few steps until you get to the one shown below, It is the fourth of eight steps of the installation process. Once in the Live desktop, click on the Install BackTrack icon on the desktop. To boot into a Live KDE desktop, type startx and press the Enter key on your keyboard. The system will boot into a console and you will see a prompt just like the one in the image below. Burn it to a DVD, then place the DVD in your computer’s optical drive and reboot. To begin, download an installation image from here. ![]() In this article, the steps required to dual-boot the KDE edition with Windows 7 (there is also a GNOME edition), are presented. The latest edition is BackTrack 5 R2 (the “R” is for Revolution), and the most recent article about it published on this website, before the publication of this one, is Install BackTrack 5 Revolution 2 on external hard drive. īackTrack is a Linux distribution that is based on Ubuntu, designed for hackers and/or security professionals, and loaded with the best Free Software and Open Source penetration testing applications available. You may read all Kali Linux articles and tutorial at. The potential of BackTrack is enormous given the tools it incorporates, which is why special care should be taken in its use, doing it always from a responsible point of view since some of its functions may infringe on the law.BackTrack Linux is now known as Kali Linux. Forensic Tools: A complete analysis of those systems that have suffered from some attack so that the damages caused can be fixed and future attacks avoided.Tunneling: To implement a net protocol over another.Spoofing: The techniques of criminal impersonation such as IP changes, forgery of ARP table, etc.Fuzzers: Tools to look for protocol failures.Exploit Archives: All the exploits are contained here.Enumeration: With the tools included, we will get determined information about the equipment, such as the Kernel, Operating System, etc.The tools we can use with BackTrack are classified according to their functionality into the following groups: Anyway, on the official website, many helpful tutorials are available for the different installation options, use of the unique characteristics of BackTrack, customization of distribution, etc. We have to keep in mind that, in contrast to the great functionalities that BackTrack incorporates, to get good performance, it will be necessary to count on at least some basic knowledge to use them. With BackTrack, we dispose of a wide array of tools that allow us to perform limitless tests, diagnoses, and cross-checks, all related to important aspects when evaluating the information security of analyzed equipment. ![]()
0 Comments
Leave a Reply. |