Recent Posts

Penetester and security expert must have to know that(Operating Systems)


Now a days penetester/Security expert is most wanted, huge amount of paid job. You must something if you want
to be a perfect penetester/security expert. You must know about Unix/Linux distribution. Mainly Unix/Linux distribution is made of penetration testing. If you use Unix/Linux distribution, then you will show a lot of pre-installed tools is there and these tools are made for penetration testing. Unix/Linux distribution is open source so you will use these tools freely and invent vulnerability of your target system and resolve by using it.Mainly some distribution of linux is made for penetesting so you should must have know this distribution knowledge,using and configuring methods.Main advantage is Linux operating system is free so you can customize as it your wish.

So hurry up and see different types Unix/Linux distribution, you have to needed to know .


1.Kali Linux: 



           The quieter you become the more you are able to hear
           
           Advantages:
                                 - Gnome Interface   
                                 - Pre-installed tools  
                                 - Designed for ARM architecture    
                                 - Designed for penetration testing.                  
                                 - Support Live-Cd install
                                 - Multiple workstation
                                 - Fast and efficient
                                 - Supporting dual boot
                                 - Top ten security tools 
                                 - Secure development environment

                                         Download link




2.Backtrack 5:



             (Backtrack distribution is now known as Kali Linux)

              Advantages:
                                  - Dedicated applications
                                  - Advanced security tools
                                  - Complete source codes
                                  - Support KDE and Gnome
                                  - Packaged tools
                                  - Forensic tools
                                  
                                      Download link 

3. ArchAssault:



                     Advantages:
                                      - Full of new packages
                                      - Not require bunch of time while installing
                                      - Designed for security professionals
                                      - Designed to help build security devices
                                      - Controlling drones also

                                      Download link

 4. Backbox:



                     Advantages:
                            - Designed For Security testing
                            - Highly customizable and good performing 
                            - Security analysis and Linux tools
                            - Web applications
                            - Forensic analysis and exploitation 
                            - More than 70 tools included
                            - Minimal desktop environment
                            - Compliant
                            - Designed for user friendly

                                      Download link

5. BlackArch Linux:



                     Advantages:
                                  - Designed for security researchers. 
                                  - At least 838 tools
                                  -  BlackArch  is an Arch based derivative
                                  -  Still a new project
                                  - Perfect for experts
                                  - Still updating 


                                    Download link


 6.Samurai Web Security framework:



                     Advantages:
                                  - Designed for live linux environment
                                  - Web pentesting environment OS
                                  - Open source and free tools
                                  - Reconnaissance
                                  - Clean distribution
                                  

                                     Download link

 7. Pentoo:


                        
Advantages:
- Dynamic OS
- Versatile distribution
- Ensure system security
- Self  Compiled
- Emerge application
- Firefox of KDE desktop environment
- Updated system

                                     Download link

 8.Parrot Linux:




  Advantages:
- Debian GNU/Linux mix with Frozenbox OS
- Especially made for security testers
- Mixed with kali linux
- MATE desktop environment and supports Gnome 2
-  Highly cutomizable
- Computer forensic
- Cloud pentesting
- Especial for cryptography

                                     Download Link

9.Cyborg Linux:



Advantages:
- Next generation penetesting distrobution
- Most powerful and advanced
- Designed for cyber security experts
- Integrated,stable linux environment
- 700 plus tools for penetesting and more than 300 dedicated tools
- Forensics and reverse engineering
- Designed for wireless security
- Mobile security

                              Download Link

10. Bugtraq Linux:



Advantages:
- Comprehensive distribution
- Automatic security to date
- Penetration and forensic tools
- Update and fully configured kernel
- Built in tools
                            Download Link
11. Weakerth4n:



Advantages:
- 2nd best OS after backtrack
- Mainly designed for penetration testing
- Built in Debian Squeeze
- Flubox window manager

                             Download Link

12.Deft(Digital evidence and forensics toolkit):
    

Advantages:
- Live cd install
- Excellent hardware detection
- Computer forensics
- Especially made for IT auditors,investigators and police

                                     Download Link

13. Matriux Krypton:



Advances:
- Fully filled with security distribution
- More than 300 security tools
- Especially for system and network administration 
- Designed for security enthusiasts and professions 
- Live environment
- IPV6 tools supported

                           Download Link

14.Fedora Security Spin:



Advantages:
- Electronic Lab
- Security Lab
- Designed Code analyzer software
- Forensics Lab
-  Intrusion Detection
- Password tools
- Wireless tools
                           Download Link


15.Kali Net Hunter:




              (Prepared for Android phone and Tab)
Advantages:
- Android penetesting platform
- Easy and fast
- Designed for wireless injection
-  Especially made for google nexus device
- User friendly

                                 Download Link

16.Node zero:



Advantages:
- Designed for security audits
- Robust testing environment
- Stable Linux environment
- Live system
- Reliable and most powerful

                                Download Link

17. Blackbuntu:



Advantages:
- Designed for security training
- Gnome desktop environment
- Vulnerability identification and analyzer
- Mapping network
- Digital forensic
- Radio network analyzer
- Maintaining access
- Reverse engineering

                                         Download Link

18.  CAINE:



Advantages:
- User friendly interface
- Updated and optimized environment
- Forensic analysis
- Italy born Ubuntu based distribution
- Completely modified

                                         Download link

19.NST(Network Security Toolkit):


                    (Mainly its for networking process and lookup)

Advantages:
- Live operating system
- Package management
- Web interface
- Nmap with the tools of Zenmap
- Network interface bandwidth monitor
- Mini-com based terminal server
- Wireless Management

                                            Download link

You can choose your favorite distribution from these an use of these distribution of Linux and keep calm and learn penetesting.

Installation process is hard but if you try you can successfully install these these distribution.If you think you are expert at using and configuring Linux distribution then you will make your own distribution by configuring any Linux distribution.

Post a Comment

0 Comments