[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <829b2de40703061623k2929f0afre616944d7dbd5821@mail.gmail.com>
Date: Tue, 6 Mar 2007 18:23:39 -0600
From: "Jason Miller" <jammer128@...il.com>
To: "Mati Aharoni" <muts@...ensive-security.com>,
full-disclosure@...ts.grok.org.uk
Subject: Re: BackTrack v.2.0 Is out
Been following this project since before Whax. Still one of my fave
penetration testing distros. :-)
On 3/6/07, Mati Aharoni <muts@...ensive-security.com> wrote:
>
> Dear List,
>
>
>
> BackTrack v.2.0 Final is out!
>
> It's taken us almost 5 months to pull ourselves out of the beta stage.
> Every time we thought we were done, a new idea or improvement would surface,
> and we just *had* to implement it. Many features were added, and many of the
> old (yet persistent) bugs were fixed.
>
>
>
> We honestly believe that BackTrack v 2.0 Final is the leanest, meanest and
> sexiest version to come out and hope that you enjoy using it as much as we
> did making it.
>
>
>
> Get yours at http://www.remote-exploit.org
>
>
>
> === Wireless Attacks @ their best ===
>
> * We included a bunch of new drivers into the latest release and where
> able to make the desired packet injection functionalities to a wider
> audience.
>
> * By supporting the new ALFA USB hi-power devices there is now a great USB
> wireless dongle available which allows us to connect an external antenna and
> use BackTrack to attack even on Intel Macbook or VMware.
>
> * Broadcom 43xx based cards should be able to inject - a bit sloppy but
> should work.
>
> * The following drivers are now on our CD:
>
> * madwifi-ng (Patched for Injection)
>
> * hostap (Patched for Injection)
>
> * prism54 (Patched for Injection)
>
> * bcm43xx (Patched for Injection)
>
> * rtl8180 (Patched for Injection)
>
> * rtl8187 (Patched for Injection)
>
> * ipw2200 (Patched for Injection)
>
> * rt2570 (ASPj's Drivers)
>
> * rt2500
>
> * rt61
>
> * rt73
>
> * ipw2100
>
> * ipw3945
>
> * acx100
>
> * zd1211rw
>
>
>
> === Faster @ Work ===
>
> * Most of our Main-menu entries have a grouping "All" menu, which allows
> the experienced user to quickly find a tool.
>
> * Less experienced users are guided through the new menu structure to find
> the right tools for the right tasks.
>
>
>
> === Alignment to Open Standards and Frameworks ===
>
> * Being superior while staying easy to use is key to a good security live
> cd. We took things a step further and aligned BackTrack to Penetration
> Testing Methodologies and Assessment Frameworks (ISSAF and OSSTMM). This
> will help our professional users during their daily reporting nightmares.
>
> * The most obvious alignment can be seen in the menu structure and
> framework documentation that has been included into BackTrack.
>
> * We suggest that you take your time to read the Frameworks, especially
> the ISSAF methodology guide.
>
> * Unfortunately we were not able to include a newer OSSTMM paper because
> they did not release it to the public.
>
>
>
> === Cutting Edge Exploitation Framework & Information ===
>
> * We put extra effort in integrating Metasploit Framework3 as well as the
> Stable Metasploit Framework2. Features such as db_autopwn, Wifi driver
> exploits etc are all functional.
>
> * Default password lists and online resources have been added and updated.
>
>
>
> === Latest Tech ===
>
> * Packages are now based on the Slax 6 LZM format, which allowed use to
> get more space and work in a more stable environment
>
> * We are running on a tweaked Kernel 2.6.20
>
> * Apple patches are applied
>
> * Broad Wireless Card Support
>
> * Lorcon Wifi / Metasploit integration
>
> * Wireshark Wifi Frame Injection patch
>
> * Japanese Input support
>
> * Over 300 updated security tools
>
> * New section related to VoIP
>
>
>
> === Disappointments ===
>
> As usual, Nessus is not included into BackTrack as Tenable forbid
> redistribution.
>
>
>
> === Community ===
>
> * The public wiki project is available at
> http://backtrack.offensive-security.com. Please help us by providing
> entries in HCL (Hardware compatibility list)
>
> * Meet us at irc.freenode.org #remote-exploit
>
>
>
> === Thank You ===
>
> * We would like to thank every developer, tester and our users. Without
> you, BackTrack would simply not be what it is today, But most of all we like
> to thank our wives and families who supported us with this creative
> endeavor.
>
>
>
> Signing out,
>
>
>
> Muts, Max and Mjm
>
>
>
> http://www.remote exploit.org
>
> http://www.offensive-security.com
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists