fbpx

Bugtraq-I Distribution for Pentesting & Forensics

Bugtraq system offers the most comprehensive distribution, optimal, stable and automatic security to date. Bugtraq is a distribution based on the 2.6.38 kernel has a wide range of penetration and forensic tools. Bugtraq can be installed from a Live DVD or USB drive, the distribution is customized to the last package, configured and updated the kernel. The kernel has been patched for better performance to recognize a variety of hardware, including wireless injection patches pentesting that other distributions do not recognize.

Some of the special features that you can appreciate are:

  • Administrative improvements of the system for better management of services.
  • Expanded the range of recognition for injection wireless drivers.
  • Patching the kernel 2.6.38 to recognize 4 gigs of RAM in 32-bit.
  • Tools perfectly configured, automated installation scripts and tools like Nessus,
    OpenVAS, Greenbone, Nod32, Hashcat, Avira, BitDefender, ClamAV, Avast,
    AVG, etc…
  • Unique Scripts from Bugtraq-Team (SVN updates tools, delete tracks,
    backdoors, Spyder-sql, etc.)
  • Stability and performance optimized: Enhanced performance flash and java and
    start purging unnecessary services. So that the user can use only the services you
    really want.
  • It has incorporated the creation of the user in the installation, which is created
    with all system configurations.
  • We are the distribution and Forensic Pentesting with more tools built and
    functional, well organized menu without repetition of the same to avoid
    overwhelming the user.

WIRELESS AND BLUETOOH SUPPORTED PATCHES

Wireless chipsets:

adm8211
ath5k
ath9h
ar9170
b43
b43legacy
iwl3945
iwlagn
ipw2100
ipw2200
libertas_cs (Libertas)
ub8xxx (Libertas)
p54pci
p54usb
rt2400pci (rt2x00)
rt2500pci (rt2x00)
rt2500usb (rt2x00)
rt61pci (rt2x00)
rt73usb (rt2x00)
rtl8180 (Realtek)
rtl8187 (Realtek)
zd1211rw

Bluetooth drivers:

bluetooth
btusb
hci_uart
btsdio
btuart_cs
bluecard_cs
bfusb

Kindly click on an image to see the full and the clear view





For download it and more additional information, visit :


Languages available in Spanish and English

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...