Learn about the BackBox operating system

Any task can succeed or fail, depending on the tools at hand. For security professionals in particular, building the right toolkit can make things exponentially easier. Fortunately, with open source, you have a wide range of applications and environments at your disposal, from simple commands to complex and integrated tools.

However, the problem with a partial approach is that you may miss something that can create or disrupt something, or waste you a lot of time searching for the right tools. for work. Finally, it is always a good idea to consider an operating system specifically for penetration testing (aka pentesting).

In the open source world, the most popular pentesting distribution is Kali Linux. However, this is not the only tool you can use. In fact, there is another version of Linux, specifically aimed at pentesting, called BackBox. BackBox is based on Ubuntu Linux, which also means you have easy access to a host of other outstanding applications besides those already available.

What do you know about BackBox operating system?

  1. What is BackBox?
  2. What makes BackBox special?
  3. Install BackBox
  4. Use the BackBox

What is BackBox?

BackBox provides a simple way to ensure all security and network device backups are collected fully, stored securely and are available for recovery with just one click when needed. This security and network automation software also offers 1,000 other customized task automation features related to equipment maintenance, as well as dynamic warehouse management and pre-device health checks for over 160 supplier.

When BackBox is connected to all devices on the network, many routine and manual procedure management procedures become automatic or scheduled to help organizations save their time and effort. like saving time, money and resources.

What makes BackBox special?

BackBox includes a special hacking tool kit aimed at pentesting. These testing tools include items such as:

  1. Web application analysis
  2. Exploit experiment
  3. Network analysis
  4. The test for pressure
  5. Privilege escalation
  6. Vulnerability assessment
  7. Computer forensic analysis
  8. etc .

Also, one of the most significant differences between Kali Linux and BackBox is the number of tools installed. While Kali Linux offers hundreds of pre-installed tools, BackBox significantly limits that number to about 70. However, BackBox still includes many tools needed to get the job done, such as:

  1. Ettercap
  2. Msfconsole
  3. Wireshark
  4. ZAP
  5. Zenmap
  6. BeEF Browser Exploitation
  7. Sqlmap
  8. Driftnet
  9. Tcpdump
  10. Cryptcat
  11. Weevely
  12. Siege
  13. Autopsy

BackBox is in development, the latest version (5.3) was released on February 18, 2019. But how to use BackBox? Let's install and find out!

Install BackBox

If you've ever installed a Linux distribution, the BackBox installation is almost the same, with only a slight change. The BackBox is quite similar to any other setting. Download BackBox ISO, burn (burn) ISO to USB, boot from USB and click the Install icon .

The installer will immediately become familiar to anyone who has installed an Ubuntu or Debian version. Just because BackBox is a distribution exclusively for security administrators, doesn't mean starting and running this operating system is a difficult task. In fact, BackBox is an operating system that anyone, with any skill, can install.

Learn about the BackBox operating system Picture 1

The hardest part of installation is the Installation Type. As you can see, even this step is quite simple.

Learn about the BackBox operating system Picture 2

After installing BackBox, reboot the system, unplug the USB and wait for the login screen to appear. Please log in to the desktop and get ready to continue.

Learn about the BackBox operating system Picture 3

Use the BackBox

Thanks to the Xfce desktop environment, BackBox is easy enough for new Linux users to navigate. Click the menu button in the top left corner to display the menu.

Learn about the BackBox operating system Picture 4

From the desktop menu, click on any favorites (in the left panel) or click on a category to display the relevant tools.

Learn about the BackBox operating system Picture 5

The menu items you might be interested in are:

  1. Anonymous - allows you to start an anonymous networking session.
  2. Auditing - the majority of pentesting tools are found here.
  3. Services - allows you to start or stop services like Apache, Bluetooth, Logkeys, Network, Polipo, SSH and Tor.

Before you run any testing tools, first make sure to update and upgrade BackBox. This can be done via the GUI or the command line. If you choose to use the GUI, click the menu on the desktop, then select System> Software Updater . When the updater completes checking for updates, it will prompt you if a new version is available, or if a restart is needed (after the upgrade).

Learn about the BackBox operating system Picture 6

If you choose manually, open a terminal window and issue the following two commands:

 sudo apt-get update sudo apt-get upgrade -y 

Many of the BackBox pentesting tools require a deep understanding of how they work, so before trying to use any specific tool, make sure you know exactly how to use them. Working with some tools (like Metasploit) is a little easier thanks to BackBox.

To run Metasploit, click the menu button on the desktop and click on msfconsole from favorites (the left panel). When the tool opens for the first time, you will be asked to configure a few options. Just select each of the default options provided by pressing the Enter key on the keyboard when prompted. When you see the Metasploit prompt, you can run commands like:

 db_nmap 192.168.0/24 

The above command will list all ports detected on the network map 192.168.1.x.

Learn about the BackBox operating system Picture 7

Even challenging tools like Metasploit are made much easier on BackBox than other distributions (in part because you don't have to worry about installing tools). That alone is worth using BackBox.

Although the use of BackBox may not be as popular as Kali Linux, it still deserves attention. For anyone looking to perform pentest on many different environments, BackBox will make this job a lot easier than other operating systems. Try this Linux distribution and see if it will support you while conducting the security check process!

4.1 ★ | 7 Vote

May be interested

  • Learn to use lesson computer 11 - Find out about the operating systemLearn to use lesson computer 11 - Find out about the operating system
    operating system - one of the factors that directly determine how a computer works.
  • What is the OS (Operating System)? Overview of the operating system (OS)What is the OS (Operating System)? Overview of the operating system (OS)
    computers, tablets, smartphones, or even modern tvs all have operating systems (os) inside. however, there are many people who still use it every day but never know what the operating system is. the following article will introduce an overview of the operating system to help you better understand.
  • What test you know about operating system P4What test you know about operating system P4
    operating system is a term that is no longer strange to users on mobile devices or computers. in the article below, invite readers to try the multiple choice questions about the operating system of the network administrator.
  • Interesting operating systems may be unknown to youInteresting operating systems may be unknown to you
    in addition to the usual operating systems such as windows, mac os or linux, there are many other operating systems suitable for many different uses. here are 8 interesting operating systems that you may not know yet.
  • What is CentOS? Learn about the CentOS operating systemWhat is CentOS? Learn about the CentOS operating system
    used quite a lot in web hosting servers, but for most computer users, centos is still a relatively vague concept. so what is centos? use for what purpose? if you are in need of learning about centos, please refer to the following article!
  • Understanding Network Operating System Network Operating System (NOS)Understanding Network Operating System Network Operating System (NOS)
    a network operating system is a specialized operating system for a network device such as a router, switch or firewall.
  • How to Install Linux Mint Operating SystemHow to Install Linux Mint Operating System
    linux mint is a linux operating system distribution that is becoming increasingly popular quickly, largely because of its ease of use and simplicity, neat interface, and friendliness to windows operating system users who want to change their operating systems. change the air. like most other linux distributions, because this is a free distribution, you can install it as many times as you want on as many devices as you want. over the years, the process of installing linux has become much simpler than before, even simpler than installing the windows operating system. read on to learn how to install and use linux mint.
  • What is RTOS operating system? What stands out? On which devices is RTOS supported?What is RTOS operating system? What stands out? On which devices is RTOS supported?
    the article provides information about rtos operating system, operation, advantages, which devices rtos supports, the difference between real-time operating system and normal operating system and some products. running rtos
  • Learn 20+ new features on macOS Big SurLearn 20+ new features on macOS Big Sur
    new features are equipped on apple's macos big sur operating system such as new interface, faster and more energy-efficient safari, messages, maps, .. with tipsmake learn new features on macos big sur!
  • A sample of Nokia's Meltemi operating system is availableA sample of Nokia's Meltemi operating system is available
    few people know that after the death of meego, nokia secretly developed a separate operating system that also uses the linux kernel (similar to android) with the name meltemi.