An Introduction to Backtrack & Linux (Password- IHA)

Embed Size (px)

Citation preview

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    1/17

    BackTrackThe Quieter you become the more you are able to hear

    10/30/2012

    Internet Hacking Articles (IHA)

    Shehab Imam

    Please Note Before Reading this e-book.

    IHA has No Legal/ Illegal issues with this e-book. This e-book has been published keeping in mind that it can/will

    be useful for those who are wanting to learn ethical hacking or want to move on to a higher level. The authors and

    Team IHA just have one request to all of you. PLEASE DO NOT UPLOAD IT ON MONETI ZING SITES. This

    e-book is free and will be free and shall be Free. If by Chance on any site you are asked to payPLEASE LET US

    KNOW. You can upload it to any site (for sharing) but please remember to give credits to the Author and Team

    IHA. Hope You All Will Find This Book Useful and HELPFUL.

    Admin of Team IHA: Shehab Imam / Team IHA

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    2/17

    An Introduction to Linux (For Beginners)

    Now before we proceed to Backtrack we should have some Basic Idea of what is Backtrack. Well

    So First We Cover about Linux, which is pretty much the same as backtrack. If you can get hold

    of Linux, Backtrack is your Best Friend. Well I have tried to cover Backtrack 4 (ONLY). DidntUse Backtrack 5 or Higher versions although I had downloaded and kept. But in a recent HDD

    crash I lost all the data. Sometimes Later We Will cover Backtrack Higher Versions.

    Fig 1 : A typical Linux Desktop

    1. What is Linux?Linux is a free Unix-type operating system for computer devices. The operating system is what makes thehardware work together with the software. The OS is the interface that allows you to do the things you

    want with your computer. Linux is freely available to everyone. OS X and Windows are other widelyused OS.

    Linux gives you a graphical interface that makes it easy to use your computer, yet it still allows those with

    know-how to change settings by adjusting 0 to 1.

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    3/17

    It is only the kernel that is named Linux, the rest of the OS are GNU tools. A package with the kernel andthe needed tools make up a Linux distribution. Mandrake , SUSE Linux, Gentoo and Redhat are some of

    the many variants. GNU/Linux OS can be used on a large number of boxes, including i386+ , Alpha,PowerPC and Sparc.

    2. Understanding files and folders

    Linux is made with one thought in mind: Everything is a file.

    A blank piece of paper is called a file in the world of computers. You can use this piece of paper to writea text or make a drawing. Your text or drawing is called information. A computer file is another way ofstoring your information.If you make many drawings then you will eventually want to sort them in different piles or make some

    other system that allows you to easily locate a given drawing. Computers use folders to sort your files in ahieratic system.

    A file is an element of data storage in a file system. Files are usually stored on harddrives, cdroms andother media, but may also be information stored in RAM or links to devices.

    To organize our files into a system we use folders. The lowest possible folder is root / where you will findthe user homes called /home/.

    //home//home/mom/

    /home/dad/

    Behind every configurable option there is a simple human-readable text file you can hand-edit to suit your

    needs. These days most programs come with nice GUI (graphical user interface) like Mandrakes ControlCenter and Suses YAST that can smoothly guide you through most configuration. Those who choose can

    gain full control of their system by manually adjusting the configuration files from foo=yes to foo=no inan editor.Almost everything you do on a computer involves one or more files stored locally or on a network.

    Your filesystems lowest folder root / contains the following folders: /binEssential user command binaries

    (for use by all users)/bootStatic files of the boot loader, only used at system startup/devDevice files, linksto your hardware devices like /dev/sound, /dev/input/js0 (joystick)/etcHost-specific systemconfiguration/homeUser home directories. This is where you save your personal files/libEssential sharedlibraries and kernel modules/mntMount point for a temporarily mounted filesystem like

    /mnt/cdrom/optAdd-on application software packages/usr/usr is the second major section of thefilesystem. /usr is shareable, read-only data. That means that /usr should be shareable between variousFHS-compliant hosts and must not be written to. Any information that is host-specific or varies with timeis stored elsewhere./var/var contains variable data files. This includes spool directories and files,administrative and logging data, and transient and temporary files./procSystem information stored in

    memory mirrored as files.

    The only folder a normal user needs to use is /home/you/ - this is where you will be keeping all your

    documents./home/elvis/Documents/home/elvis/Music/home/elvis/Music/60s

    Files are case sensitive, myfile and MyFile are two different files.For more details, check out:

    3. Understanding users and permissions

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    4/17

    Linux is based on the idea that everyone using a system has their own username and password.Every file belongs to a user and a group, and has a set of given attributes (read, write and executable) for

    users, groups and all (everybody).A file or folder can have permissions that only allows the user it belongs to to read and write to it,allowing the group it belongs to to read it and at the same time all other users cant even read the file.

    4. Who and what is rootLinux has one special user called root (this is the user name). Root is the system administrator and hasaccess to all files and folders. This special user has the right to do anything.You should never log on as this user unless you actually need to do something that requires it!Use su - to temporary become root and do the things you need, again: never log into your sytem as root!Root is only for system maintenance, this is not a regular user (LindowsOS dont have any user

    management at all and uses root for everything, this is a very bad idea!).You can execute a command as root with:

    su -c 'command done as root'Gentoo Linux: Note that on Gentoo Linux only users that are member of the wheel group are allowed to

    su to root.

    BACKTRACK

    What is Backtrack?

    BackTrack is a distribution based on the UbuntuGNU/Linux distribution aimed at digital forensics

    andpenetration testing use. It is named afterbacktracking, a search algorithm. The current version isBackTrack 5 R2, codenamed Revolution and its Revision.

    WHAX: a Slax based Linux distribution developed by Mati Aharoni, a security consultant. Earlierversions of WHAX were called Whoppix and were based on Knoppix.The BackTrack distribution

    originated from the merger of two formerly competing distributions which focused on penetration testing.

    Auditor Security Collection: a Live CD based onKnoppix developed by Max Moser which included over300 tools organized in a user-friendly hierarchy.

    The overlap with Auditor and WHAX in purpose and tools collection partly led to the merger.

    ToolsBackTrack provides users with easy access to a comprehensive and large collection of security-related

    tools ranging from port scanners to password crackers. Support for Live CD and Live USBfunctionalityallows users to boot BackTrack directly from portable media without requiring installation, though

    permanent installation to hard disk is also an option.

    BackTr ack inclu des many well known secur i t y tools in cludi ng:

    Metasploit integration (Non-Working and Officially Unsupported )

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    5/17

    RFMON Injection capable wireless drivers Aircrack-NG Kismet Nmap Ophcrack Ettercap Wireshark (formerly known as Ethereal) BeEF (Browser Exploitation Framework) Hydra OWASP Mantra Security Framework collection of hacking tools, add-ons and scripts based on

    Firefox

    Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enabledefault password.

    Quypt (Terminal Emulator) (which is private software by Crimson Hacking group, which hasleaked to the Mainstream) Blackhat

    A large collection of exploits as well as more commonplace software such as browsers.BackTr ack arr anges tools into 12 categori es:

    Information Gathering Vulnerability Assessment Exploitation Tools Privilege Escalation Maintaining Access Reverse Engineering RFID Tools Stress testing Forensics Reporting Tools Services Miscellaneous

    Why BackTrack?

    The purpose of creating Backtrack Was for information gathering: This category contains several tools

    that can be used to get information regarding a target DNS, routing, e-mail address, websites, mail

    server, and so on. This information is gathered from the available information on the Internet, withouttouching the target environment.

    Network mapping: This category contains tools that can be used to check the live host, fingerprint

    operating system, application used by the target, and also do port-scanning.

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    6/17

    Vulnerability identification: In this category you can find tools to scan vulnerabilities (general) and

    in Cisco devices. It also contains tools to carry out fuzzing and analyze Server Message Block (SMB) and

    Simple Network Management Protocol (SNMP).

    Web application analysis: This category contains tools that can be used in auditing web application.

    Radio network analysis: To audit wireless networks, bluetooth and Radio Frequency Identifier

    (RFID), you can use the tools in this category.

    Penetration: This category contains tools that can be used to exploit the vulnerabilities found in the

    target machine.

    Privilege escalation: After exploiting the vulnerabilities and gaining access to the target machine,

    you can use tools in this category to escalate your privilege to the highest privilege.

    Maintaining access: Tools in this category will be able to help you in maintaining access to the target

    machine. You might need to get the highest privilege first before you can install tool to maintain access.

    Voice Over IP (VOIP): To analyze VOIP you can utilize the tools in this category.

    BackTrack also contains tools that can be used for:

    Digital forensics: In this category you can find several tools that can be used to do digital forensics

    such as acquiring hard disk image, carving files, and analyzing hard disk image. To use the tools provided

    in this category, you may want to choose Start BackTrack Forensics in the booting menu. Some practical

    forensic procedures require you to mount the internal hard disk and swap files in read-only mode topreserve evidence integrity.

    Reverse engineering: This category contains tools that can be used to debug a program or

    disassemble an executable file.

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    7/17

    BACKTRACK 4

    In the first parts, we had an introduction to basic concepts on and some common tools, Linux distributionspecially designed for penetration testing, security auditing, incidence handling, system investigation and

    analysis, data recovery, and other useful tasks, security-oriented distribution, BackTrack.

    IntroductionBackTrack is one of the more popular distributions in the white hat circles. It is specially suited for

    penetration testing, with more than 300 tools available for the task. Like both Helix and Protech,BackTrack is based on Ubuntu. This means good stability and hardware detection and a whole lot of

    software that can be easily obtained. Sound quite interesting. Lets see how it behaves. Were going tocheck version 4 Beta. Lots of great stuff. Like most Linux distros - and definitely all forensics/security-

    oriented tools, BackTrack works primarily as a live CD, with good hardware detection and low memoryfootprint, intended to make it usable even on older machines. It is also possible to install BackTrack,should one desire. The boot menu is simple and elegant, with three options available.

    Fig 2 : Backtrack BootMenu

    The second option (Console no FB) stands for Console no Framebuffers, i.e. the failsafe mode withminimal graphics that should work well on all hardware. Thanks k finity! As to the third option,MSRAMDUMP, I did try booting it, but this produced an error and threw me back into the boot menu.Anyhow

    The distro maintains its elegance by booting into the best-looking console I have seen, with stylish colorgradients and mirror effects. You can begin working instantly on the command-line or boot into GUIdesktop by issuing startx command.

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    8/17

    Fig 3 : this is where you enter the GUI mode

    One thing worth noting in the screenshot above is the mounting error on hda1, which is formatted with

    Ext4, a relatively new filesystem. In fact, the system I booted BackTrack on hosts a Jaunty install, withthe Ext4 root partition. This is something that is probably solved in future releases.

    Desktop

    The desktop is simple and functional, running a lightweight KDE3 manager. You get a simple wallpaperwith dragon-like theme. Another interesting element is the Run box embedded in the panel, which allowsyou to run applications without invoking a terminal first. The network is not enabled by default and youllhave to fire it up manually.

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    9/17

    Fig4: Backtrack Desktop

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    10/17

    Tools:-BackTrackis all about lots and lots of hacking tools. Once again, Im only going to present the tools, notshow you how to use them. These tools are all double-edged swords, and without the right amount of

    respect, skill and integrity, you may cause more harm than good. Furthermore, do not deploy them in aproduction environment without the explicit approval from system administrators and INFOSEC people.

    The tools can all be found under Backtrack in the menu, arranged into sub-categories. The collection islong and rich and it will take you a long time pouring over all of them, let alone mastering them. Most ofthe tools are command-line utilities, with menu items a link to the console with the relevant tool running

    inside it.

    Fig5 : backtrack Tools

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    11/17

    Fig6: Backtrack Tools 2

    Fig 7 : Backtrack Tools 3

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    12/17

    A few practical examples, theres the venerable nmap, Hydra and hping3:

    Fig8: Backtrack Tool Hydra (password Cracker)

    Fig9: Backtrack Tool Nmap

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    13/17

    Fig10: Backtrack Tool hping3 (network scanner)

    Then, theres the gdb (GNU Debugger) for analyzing crash dumps and memory cores.

    Fig11: Backtrack Tool GDB (analyze crash dumps)

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    14/17

    Last But not the Least WIRESHARK (formerly ethereal ;)

    Fig12: Backtrack Wireshark

    Other programs:-

    BackTrack is mainly loaded with security applications, however it also has a reasonable assortment ofnormal programs. You get:-

    1. Firefox, already configured to use the exceptional Noscript extension.2. Synaptic, which makes software management easy and pleasant:

    Fig13 : Synaptics

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    15/17

    3. Also comes with WINE for windows Softwares.

    Fig14: Backtrack Tool WINE (for windows softwares)

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    16/17

    Errors:-Being a beta, BackTrack 4 was not the most stable distro. In addition to the Ext4 error during the boot,

    there were some other problems. For example, both Lynx text browser and QtParted partitioning software

    refused to work.

    Fig15: Backtrack beta version error

    Other thingsOne thing that may bother you is the issue with the documentation section on the official site. Its secure

    site, self-signed with an expired certified, at last when this article was written, although the expiration hasbeen in effect since August 2008. This is not something you expect to see on a site catering to thesecurity-conscious audience. Furthermore, theres the small issue of inconsistency when it comes toapplication names. For example, BlueSmash shows up as blue-smash on the command line, hping3 has acapital H in the menus, etc. BackTrack itself also comes in two flavors, with both lowercase and

    uppercase Ts. Overall, there were no big issues, except for the occasional application errors.

    ConclusionBackTrack is a powerful hacking suite. It is well made, with stylish touches that add to the overall feel ofthe distribution. It runs very fast in the live mode, even faster than most installed distributions. Mostimportantly, the array of tool is rich, well balanced and overall quite impressive. The Beta version did

    throw a few errors here and there, but it was nothing major. Small consistency issues also arise, andtheres the lack of support for Ext4, which I expect will be solved soon. Documentation needs to beimproved, starting with the website SSL certificate and continuing with lots of questions regarding thegeneral usage. Nevertheless, for security professionals looking for a complete testing package that has all

  • 7/28/2019 An Introduction to Backtrack & Linux (Password- IHA)

    17/17

    their favorite gadgets neatly arrayed, on top of a stable, popular distribution and with Synaptic packagemanagement for easy replenishment of any missing bits, BackTrack is an excellent candidate for their

    work

    THE END

    -:MORELINKS:-

    1. How to Hack Windows Password In Backtrack using Ophcrack2. Hacking Wireless Networks (Part 1) (Part 2)3. Cracking WPA2 PSK with Backtrack 4, aircrack-ng and John The Ripper

    -:OFFICIAL LINKS:-

    1. Backtrack 52. Backtrack Wiki3. Backtrack Forum

    LIKE US JOIN US

    VISIT US ASK US

    http://adfoc.us/4557110749573http://adfoc.us/4557110749573http://adfoc.us/4557111565236http://adfoc.us/4557111565236http://adfoc.us/4557111565236http://adfoc.us/4557111565263http://adfoc.us/4557111565263http://adfoc.us/4557111565263http://adfoc.us/4557111565271http://adfoc.us/4557111565271http://adfoc.us/4557111565283http://adfoc.us/4557111565283http://adfoc.us/4557111565426http://adfoc.us/4557111565426http://adfoc.us/4557111565440http://adfoc.us/4557111565440http://www.facebook.com/thehackercommunityhttp://www.facebook.com/groups/hacking.arthttp://www.shehab3451-hacking.tumblr.com/http://www.ethical-experts.forumfree.co.uk/http://www.ethical-experts.forumfree.co.uk/http://www.shehab3451-hacking.tumblr.com/http://www.facebook.com/groups/hacking.arthttp://www.facebook.com/thehackercommunityhttp://adfoc.us/4557111565440http://adfoc.us/4557111565426http://adfoc.us/4557111565283http://adfoc.us/4557111565271http://adfoc.us/4557111565263http://adfoc.us/4557111565236http://adfoc.us/4557110749573