Metasploit mailing list archives

BackTrack 2 Stable released


From: mmo at remote-exploit.org (max moser)
Date: Wed, 7 Mar 2007 00:01:02 +0100


It's taken us almost 5 months to pull ourselves out of the beta  
stage. Every time we thought we were done, a new idea or improvement  
would surface, and we just *had* to implement it. Many features were  
added, and many of the old (yet persistent) bugs were fixed.

We honestly believe that BackTrack v 2.0 Final is the leanest, mind  
blowing and sexiest version to come out and hope that you enjoy using  
it as much as we did making it. Get yours at http://www.remote- 
exploit.org

=== Wireless Attacks @ their best ===
* We included a bunch of new drivers into the latest release and  
where able to make the desired packet injection functionalities to a  
wider audience.
* By supporting the new ALFA USB hi-power devices there is now a  
great USB wireless dongle available which allows us to connect an  
external antenna and use BackTrack to attack even on my Intel Macbook  
or VMware
* Even broadcom 43xx based cards should be able to inject - a bit  
sloppy but should work.
* The following drivers are now on our CD:
        * madwifi-ng (Patched for Injection)
        * hostap (Patched for Injection)
        * prism54 (Patched for Injection)
        * bcm43xx (Patched for Injection)
        * rtl8180 (Patched for Injection)
        * rtl8187 (Patched for Injection)
        * ipw2200 (Patched for Injection)
        * rt2570 (ASPj's Drivers)
        * rt2500
        * rt61
        * rt73
        * ipw2100
        * ipw3945
        * acx100
        * zd1211rw

=== Faster @ Work ===
* Most of our Main-menu entries have a grouping "All" menu, which  
allows the experienced user to quickly find a tool.
* Less experienced users are guided through the new menu structure to  
find the right tools for the right tasks.

=== Alignment to Open Standards and Frameworks ===
* Being superior while staying easy to use is key to a good security  
live cd. We took things a step further and aligned BackTrack to  
Penetration Testing Methodologies and Assessment Frameworks (ISSAF  
and OSSTMM). This will help our professional users during their daily  
reporting nightmares.
* The most obvious alignment can be seen in the menu structure and  
framework documentation that has been included into BackTrack.
* We suggest that you take your time to read the Frameworks,  
especially the ISSAF methodology guide.
* Unfortunately we where not able to include a newer OSSTMM paper  
because they did not release it to the public.

=== Cutting Edge Exploitation Framework & Information ===
* We put extra effort in integrating Metasploit Framework3 as well as  
the Stable Metasploit Framework2. Features such as db_autopwn, Wifi  
driver exploits etc are all functional.
* Default password lists and online resources have been added and  
updated.

=== Latest Tech ===
* Packages are now based on the Slax 6 LZM format, which allowed use  
to get more space and work in a more stable environment
* We are running on a tweaked Kernel 2.6.20
* Apple patches are applied
* Broad Wireless Card Support
* Lorcon Wifi / Metasploit integration
* Wireshark Wifi Frame Injection patch
* Japanese Input support
* Over 300 updated security tools
* New section related to VoIP

=== Community ===
* The public wiki project is available at backtrack.offensive- 
security.com. Please help us by providing entries in HCL (Hardware  
compatibility list)
* Meet us at irc.freenode.org #remote-exploit

=== Thank You ===
* We would like to thank every developer, tester and our users.  
Without you, BackTrack would simply not be what it is today, But most  
of all we like to thank our wifes and families who supported us with  
this creative endeavor.

Signing out,

Max, Muts and Mjm (aka the 3 mystical M's behind BackTrack)




Current thread: