fbpx

BackTrack 5 R3 Released

Backtrack is one of the best Linux distribution for penetration testing, it helps ethical hackers to perform the penetration testing on the network, web application, wireless network, RFID and many more. Backtrack 5 was the last released but now backtrack 5 R3 has been released by the backtrack community. 


  


What official website describe about it:

The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released.
R3 focuses on bug-fixes as well as the addition of over 60 new tools –
several of which were released in BlackHat and Defcon 2012. A whole new
tool category was populated – “Physical Exploitation”, which now
includes tools such as the Arduino IDE and libraries, as well as the
Kautilya Teensy payload collection.
Building, testing and releasing a new BackTrack revision is never an easy task. Keeping up-to-date with all the latest tools, while balancing their requirements of dependencies, is akin to a magic show juggling act. Thankfully, active members of our redmine community such as backtracklover and JudasIscariot
make our task that much easier by actively reporting bugs and
suggesting new tools on a regular basis. Hats off to the both of you.
Together with our usual KDE and GNOME, 32/64 bit ISOs, we have released a
single VMware Image (Gnome, 32 bit). For those requiring other VM
flavors of BackTrack – building your own VMWare image is easy –
instructions can be found in the BackTrack Wiki.
For the insanely impatient, you can download the BackTrack 5 R3 release via torrent right
now. Direct ISO downloads will be available once all our HTTP mirrors
have synched, which should take a couple more hours. Once this happens,
we will update our BackTrack Download page with all links.




Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...