Bugtraq-1 Final – Pentesting Distro Linux

We have previously discussed the Penetration testing Linux distribution Bugtraq and the bugtraq team has released the final version called bugtraq-1 final, the team offers the most comprehensive distribution, optimal, stable and automatic security to date. Bugtraq is a distribution based on the 2.6.38 kernel has a wide range of penetration and forensic tools. Bugtraq can install from a Live DVD or USB drive, the distribution is customized to the last package, configured and updated the kernel and the kernel has been patched for better performance and to recognize a variety of hardware, including wireless injection patches pentesting other distributions do not recognize.




Some
of the special features that you can appreciate are:


  • Administrative
    improvements of the system for better management of services.

  • Expanded
    the range of recognition for injection wireless drivers.
  • Patching
    the kernel 2.6.38 to recognize 4 gigs of RAM in 32-bit.
  • Tools
    perfectly configured, automated installation scripts and tools like
    Nessus, OpenVAS, Greenbone, Nod32, Hashcat, Avira, BitDefender,
    ClamAV, Avast, AVG, etc…
  • Unique
    Scripts from Bugtraq-Team (SVN updates tools, delete tracks,
    backdoors, Spyder-sql, etc.)
  • Stability
    and performance optimized: Enhanced performance flash and java and
    start purging unnecessary services. So that the user can use only
    the services you really want.



  • It has incorporated the creation of the user
    in the installation, which is created with all system
    configurations.


  • We are the distribution
    and Forensic Pentesting with more tools built and functional, well
    organized menu without repetition of the same to avoid overwhelming
    the user.

 

Download the bugtraq-1 from the official website, the team is actively looking for people to participate on Bugtraq-II (2) so you can contact them via their website or just via twitter


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...

Digital Forensics Investigation using Autopsy In Kali Linux

Autopsy is one of the digital forensics tools use to investigate what happened on a computer. It offers a GUI access to variety of...