SlideShare a Scribd company logo
1 of 19
“The quiter you become, the more you are able to hear”
Backtrack is Linux based operating system.
Based on ubuntu linux.
Specially made for penetration testers
The largest collection of wireless hacking, server exploiting, web
application assessing, social-engineering tools available in a
single Linux distribution.
First release was 2006.
BackTrack originally started with earlier versions of live Linux distributions called
Whoppix, WHAX, and Auditor.
When BackTrack was developed, it was designed to be an all in one live cd used
on security audits and was specifically crafted to not leave any remnants of itself
on the laptop.
It has since expanded to being the most widely adopted penetration testing
framework in existence and is used by the security community all over the world.
Backtrack is developed by Mati Aharoni, Devon Kearns .
 Penetration testing also known as Pentest.
Is a technique used by ethical hackers (White Hat Hackers).
 In which a white hat try to hack his own system in order to find
possible vulnerabilities present in his system. Which can be
exploited by any malicious hacker.
 Backtrack is used by worldwide.
White hats (good people)
Black hats (bad people)
Gray hats (both good n bad)
In both destruction an construction purposes.
Information Gathering
Vulnerability Assessment
Exploitation Tools
Privilege Escalation
Maintaining Access
Services
 RFID tools
 Stress Testing
Forensics
Reporting Tools
Miscellaneous
Reverse Engineering
 Metasploit integration
 RFMON
 Aircrack-NG
 Gerix Wifi Cracker
 Kismet
 Nmap
 Ophcrack
 Ettercap
 Wireshark
 BeEF (Browser Exploitation Framework)
 Network software suite consisting detector, packet sniffer,
WEP cracker and analysis tools.
 easside-ng: a tool for communicating to an access point, without the WEP key.
 wesside-ng: automatic tool for recovering wep key.
Ophcrack can crack most Windows passwords within a
few minutes.
It uses LM hash through rainbow tables.
LM hash is hash to encrypt Windows passwords.
Rainbow table is used to reverse cryptographic hash.
By default, ophcrack is bundled with tables that allows it to crack
passwords no longer than 14 characters.
Its good for security purpose.
Good G.U.I (Graphical User Interface)
Comes with lots of preinstalled tools
Does Not need high hardware configuration
 Hard to Install
 Can be used for destruction purposes
 Can cause loss of money , resources and privacy
 Does not have less number of application as
compared to Windows
 http://backtracktutorials.com/
 http://www.ehacking.net/2011/08/backtrack-5-tutorials.html
 http://www.ehacking.net/2011/07/fast-track-hacking-backtrack5-
tutorial.html
 System security is serious problem, and the tools that hackers use to compromise
your systems must be understood.
 Running your own checks first and strengthening your defenses, you could save
your project sometimes from millions of dollars in losses.
 BackTrack contains all the tools needed by someone who wants to check a system’s
security against unwantend guests.
Backtrack is very powerful tool which can be used for both construction and
destruction purposes
Backtrack
Backtrack

More Related Content

What's hot

Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
Information Technology
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
Sunil Kumar
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 

What's hot (20)

Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelDeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
CNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream CiphersCNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream Ciphers
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbg
 
CNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated EncryptionCNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated Encryption
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
CNIT 141: 2. Randomness
CNIT 141: 2. RandomnessCNIT 141: 2. Randomness
CNIT 141: 2. Randomness
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 

Viewers also liked

Adams Mountain Lion Slide Show
Adams Mountain Lion Slide ShowAdams Mountain Lion Slide Show
Adams Mountain Lion Slide Show
guestb4d93f
 
2 basics of operating systems
2 basics of operating systems2 basics of operating systems
2 basics of operating systems
myrajendra
 

Viewers also liked (20)

Backtrack os 5
Backtrack os 5Backtrack os 5
Backtrack os 5
 
Backtrack
BacktrackBacktrack
Backtrack
 
Mis 450 final presentation
Mis 450 final presentation Mis 450 final presentation
Mis 450 final presentation
 
Latest Software
Latest SoftwareLatest Software
Latest Software
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
BackTrack 4 R2 - SFISSA Presentation
BackTrack 4 R2 - SFISSA PresentationBackTrack 4 R2 - SFISSA Presentation
BackTrack 4 R2 - SFISSA Presentation
 
How To Build The Perfect Backtrack 4 Usb Drive
How To Build The Perfect Backtrack 4 Usb DriveHow To Build The Perfect Backtrack 4 Usb Drive
How To Build The Perfect Backtrack 4 Usb Drive
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Computer security
Computer securityComputer security
Computer security
 
Backtrack Manual Part10
Backtrack Manual Part10Backtrack Manual Part10
Backtrack Manual Part10
 
Backtrack Manual Part2
Backtrack Manual Part2Backtrack Manual Part2
Backtrack Manual Part2
 
Protect Folders without using any Software
Protect Folders without using any SoftwareProtect Folders without using any Software
Protect Folders without using any Software
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
windows CE
windows CEwindows CE
windows CE
 
Adams Mountain Lion Slide Show
Adams Mountain Lion Slide ShowAdams Mountain Lion Slide Show
Adams Mountain Lion Slide Show
 
2 basics of operating systems
2 basics of operating systems2 basics of operating systems
2 basics of operating systems
 
Symbian OS
Symbian OSSymbian OS
Symbian OS
 
Minix3 fosdem2014
Minix3 fosdem2014Minix3 fosdem2014
Minix3 fosdem2014
 
Symbian os presentation
Symbian os presentationSymbian os presentation
Symbian os presentation
 
openSUSE Project Presentation
openSUSE Project PresentationopenSUSE Project Presentation
openSUSE Project Presentation
 

Similar to Backtrack

powe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hackingpowe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hacking
dhruvpawar010
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22
MichaelM85042
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
Db Cooper
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
Laura Aviles
 
Backtrack
BacktrackBacktrack
Backtrack
oa Đi
 

Similar to Backtrack (20)

Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
Hacking
Hacking Hacking
Hacking
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
powe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hackingpowe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hacking
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
Cybercon 2015 brandon kravitz
Cybercon 2015   brandon kravitzCybercon 2015   brandon kravitz
Cybercon 2015 brandon kravitz
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22
 
CarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and NowCarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and Now
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
Security tools
Security  toolsSecurity  tools
Security tools
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 
Cybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdfCybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdf
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Backtrack
BacktrackBacktrack
Backtrack
 

More from One97 Communications Limited

More from One97 Communications Limited (20)

Er. Model Of Hospital Management
Er. Model Of Hospital ManagementEr. Model Of Hospital Management
Er. Model Of Hospital Management
 
Financial
FinancialFinancial
Financial
 
Railway
RailwayRailway
Railway
 
Library
LibraryLibrary
Library
 
Fcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt ChartFcfs Cpu Scheduling With Gantt Chart
Fcfs Cpu Scheduling With Gantt Chart
 
Neural Interfacing
Neural Interfacing Neural Interfacing
Neural Interfacing
 
Blue eye technology
Blue eye technology Blue eye technology
Blue eye technology
 
Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
 
Topology
TopologyTopology
Topology
 
WAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in javaWAP to invoke constructors using super keyword in java
WAP to invoke constructors using super keyword in java
 
WAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in javaWAP to find out whether the number is prime or not in java
WAP to find out whether the number is prime or not in java
 
Overriding abstract in java
Overriding abstract in javaOverriding abstract in java
Overriding abstract in java
 
How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java How to achieve multiple inheritances by using interface in java
How to achieve multiple inheritances by using interface in java
 
Method overriding in java
Method overriding in javaMethod overriding in java
Method overriding in java
 
WAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in javaWAP to implement inheritance and overloading methods in java
WAP to implement inheritance and overloading methods in java
 
program on Function overloading in java
program on  Function overloading in javaprogram on  Function overloading in java
program on Function overloading in java
 
Program on usage of Final keyword in java
Program on usage of  Final keyword in javaProgram on usage of  Final keyword in java
Program on usage of Final keyword in java
 
WAP to initialize different objects with different values in java
WAP to initialize different objects with different values in javaWAP to initialize different objects with different values in java
WAP to initialize different objects with different values in java
 
Conversion of data types in java
Conversion of data types in javaConversion of data types in java
Conversion of data types in java
 
Constructor Overloading in java
Constructor Overloading in javaConstructor Overloading in java
Constructor Overloading in java
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdf
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
The Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdfThe Ultimate Guide to Social Media Marketing in 2024.pdf
The Ultimate Guide to Social Media Marketing in 2024.pdf
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptx
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 

Backtrack

  • 1. “The quiter you become, the more you are able to hear”
  • 2. Backtrack is Linux based operating system. Based on ubuntu linux. Specially made for penetration testers The largest collection of wireless hacking, server exploiting, web application assessing, social-engineering tools available in a single Linux distribution.
  • 3. First release was 2006. BackTrack originally started with earlier versions of live Linux distributions called Whoppix, WHAX, and Auditor. When BackTrack was developed, it was designed to be an all in one live cd used on security audits and was specifically crafted to not leave any remnants of itself on the laptop. It has since expanded to being the most widely adopted penetration testing framework in existence and is used by the security community all over the world. Backtrack is developed by Mati Aharoni, Devon Kearns .
  • 4.  Penetration testing also known as Pentest. Is a technique used by ethical hackers (White Hat Hackers).  In which a white hat try to hack his own system in order to find possible vulnerabilities present in his system. Which can be exploited by any malicious hacker.
  • 5.  Backtrack is used by worldwide. White hats (good people) Black hats (bad people) Gray hats (both good n bad) In both destruction an construction purposes.
  • 6. Information Gathering Vulnerability Assessment Exploitation Tools Privilege Escalation Maintaining Access Services  RFID tools  Stress Testing Forensics Reporting Tools Miscellaneous Reverse Engineering
  • 7.
  • 8.  Metasploit integration  RFMON  Aircrack-NG  Gerix Wifi Cracker  Kismet  Nmap  Ophcrack  Ettercap  Wireshark  BeEF (Browser Exploitation Framework)
  • 9.  Network software suite consisting detector, packet sniffer, WEP cracker and analysis tools.  easside-ng: a tool for communicating to an access point, without the WEP key.  wesside-ng: automatic tool for recovering wep key.
  • 10. Ophcrack can crack most Windows passwords within a few minutes. It uses LM hash through rainbow tables. LM hash is hash to encrypt Windows passwords. Rainbow table is used to reverse cryptographic hash. By default, ophcrack is bundled with tables that allows it to crack passwords no longer than 14 characters.
  • 11.
  • 12.
  • 13.
  • 14. Its good for security purpose. Good G.U.I (Graphical User Interface) Comes with lots of preinstalled tools Does Not need high hardware configuration
  • 15.  Hard to Install  Can be used for destruction purposes  Can cause loss of money , resources and privacy  Does not have less number of application as compared to Windows
  • 16.  http://backtracktutorials.com/  http://www.ehacking.net/2011/08/backtrack-5-tutorials.html  http://www.ehacking.net/2011/07/fast-track-hacking-backtrack5- tutorial.html
  • 17.  System security is serious problem, and the tools that hackers use to compromise your systems must be understood.  Running your own checks first and strengthening your defenses, you could save your project sometimes from millions of dollars in losses.  BackTrack contains all the tools needed by someone who wants to check a system’s security against unwantend guests. Backtrack is very powerful tool which can be used for both construction and destruction purposes