Install BackTrack Tools in Ubuntu

UPDATE [11-7-2010]: It is *best* to use the actual BackTrack distribution due to the patches and optimizations they make to the kernel. Patching the standard Ubuntu kernel would make it no longer *Ubuntu*. I’d highly suggest you either:

  1. Install BackTrack on a real or virtual machine environment
  2. Manually download and install the security tools you need to use on your system.

—————————-

NOTE: I have posted a more comprehensive guide to installing BackTrack 4 tools within Ubuntu that will also install the correct menu structure and fixes the problem where some commands would not launch from the menu.

You really should follow the above guide. It is more accurate and more comprehensive than the guide on this page.

===============

BackTrack belongs in every penetration tester’s or security engineer’s toolbox. With the release of BT4, it is now based on Ubuntu, and therefore supports Debian based packages.

As described by the developers:

BackTrack is the most top rated Linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

It’s evolved from the merge of the two wide spread distributions – Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new-comers are using BackTrack as their favorite toolset all over the globe.

One of my test systems is running Ubuntu 9.04, and I don’t want to wipe it to install all the great open-source tools that come on the BackTrack Live DVD. Luckily, it is possible to automate the installation of all of BT4′s utilities within Ubuntu. Let’s get started…

Let’s begin by launching a root bash shell by typing:

sudo bash

The next step is to add the BackTrack repositories to your apt-get sources.list file:

1. Add the Backtrack repository:

echo deb http://repo.offensive-security.com/dist/bt4 binary/ >> /etc/apt/sources.list

2. Import the Backtrack PGP key and update your sources (and set a proxy server to use if you need it):

export http_proxy="http://myproxyserver.com:8080"
wget http://repo.offensive-security.com/dist/bt4/binary/public-key && sudo apt-key add public-key && sudo aptitude update

3. Build your package list (NOTE that I am specifying a proxy server — remove this part from the command if you do not use a proxy):

links -http-proxy myproxyserver.com:8080 -dump http://repo.offensive-security.com/dist/bt4/binary/ | awk '{print $3}' | grep -i deb | cut -d . -f 1 > backtrack.txt

If you do not use a proxy server, then the command will look like this:

links -dump http://repo.offensive-security.com/dist/bt4/binary/ | awk '{print $3}' | grep -i deb | cut -d . -f 1 > backtrack.txt

4. Install packages:

for i in $(cat backtrack.txt); do sudo aptitude -y install $i; done

Sit back and wait for the install to complete. (Credit for these steps goes to the SecLogic Applied Security blog.)

Next, we need to run a Perl script to ensure that the newly installed applications can be correctly executed from our GNOME Applications menu.

Copy the following code and save it to a file. I saved mine to a file called UpdateBTMenu.pl

#!/usr/bin/perl
#
##
# Written by Mick Grove
# http://micksmix.wordpress.com
#
#  [v0.1]		11/20/2009
##
#
# BSD Licensed
#
#       Redistribution and use in source and binary forms, with or without
#       modification, are permitted provided that the following conditions are
#       met:
#
#       * Redistributions of source code must retain the above copyright
#         notice, this list of conditions and the following disclaimer.
#       * Redistributions in binary form must reproduce the above
#         copyright notice, this list of conditions and the following disclaimer
#         in the documentation and/or other materials provided with the
#         distribution.
#       * Neither the name of the  nor the names of its
#         contributors may be used to endorse or promote products derived from
#         this software without specific prior written permission.
#
#       THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
#       "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
#       LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
#       A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
#       OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
#       SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
#       LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
#       DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
#       THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
#       (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
#       OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
#
use strict;
use warnings;
use Tie::File;

my $dir     = "/usr/local/share/applications";
my $section = "Desktop Entry";
my $in_section;
my @files;

opendir(BIN, $dir) or die "Can't open $dir: $!";
while (defined(my $file = readdir BIN))
{
    next if $file =~ /^\.\.?$/;    # skip . and ..
    if ($file =~ m/.*\.desktop$/i)
    {
        push(@files, $file);
    }
}
closedir(BIN);

foreach my $curfile (@files)
{
    open( FH, "<", "$dir/$curfile" ) or die "$!";
    chomp( my @fileparts =  );

    my $termval = TerminalStatus(\@fileparts);
    next if $termval == 0;    # skip if this is not a terminal application

    #lets see if this is actually a BT program
    my $btprogram = IsBTProgram(\@fileparts);
    next if $btprogram == 0;    # skip if this is not a BT application

    my $ExecKey     = "Exec";
    my $TerminalKey = "Terminal";
    my @tiedfile;

    #open this file for editing
    tie @tiedfile, 'Tie::File', "$dir/$curfile" or die "$!";

    #read file line by line here
    # updating "Exec" line
    foreach my $fline (@tiedfile)
    {
        next if $fline =~ /^#/;       # skip comments
        next if $fline =~ /^\s*$/;    # skip empty lines

        if ($fline =~ /^\[$section\]$/)
        {
            $in_section = 1;
            next;
        }

        if ($fline =~ /^\[/)
        {
            $in_section = 0;
            next;
        }

        my $oldline;
        my $updatedline;
        if ($in_section and $fline =~ /^$ExecKey\s*=\s*(.*)$/)
        {

            # this means we have the "Exec key"
            $oldline = $1;
            next if $oldline =~ m/^.*xterm -e.*;bash.*$/i;    #skip
            $oldline =~ s/"/\\"/img;
            $updatedline = "Exec=xterm -e \"$oldline;bash\"";
            $fline       = $updatedline;

            print "New exec: " . $fline . "\n";
            next;
        }
        elsif ($in_section and $fline =~ /^$TerminalKey\s*=\s*(.*)$/)
        {

            # this means we have the "Terminal key"
            # we will set it to "0" to turn it off --- we are launching
            #   xterm ourselves, if we set to 1, we'll get an extra
            #   terminal opened
            #
            $oldline     = $1;
            $updatedline = "Terminal=0";
            $fline       = $updatedline;
            next;
        }

    }
    untie @tiedfile;
}

print "\n\nAll menu entries have been updated\n";

###
### Subroutines ###
###
sub TerminalStatus
{
    my @lines       = @{$_[0]};
    my $TerminalKey = "Terminal";
    my $ExecKey     = "Exec";
    my $termkeyval  = 0;            #default = 0 FALSE, 1= TRUE
    my $i           = 0;
    my $execkeyval = 0;  #default = 0 = this exec line probably wasn't set by us

    foreach my $fline (@lines)
    {
        next if $fline =~ /^#/;       # skip comments
        next if $fline =~ /^\s*$/;    # skip empty lines

        if ($fline =~ /^\[$section\]$/)
        {
            $in_section = 1;
            next;
        }

        if ($fline =~ /^\[/)
        {
            $in_section = 0;
            next;
        }

        if ($in_section and $fline =~ /^$TerminalKey\s*=\s*(.*)$/)
        {

            # this means we have the "terminal key"
            $termkeyval = $1;
            next;    #last;
        }

        if ($in_section and $fline =~ /^$ExecKey\s*=\s*(.*)$/)
        {

            # this means we have the "exec key"
            $execkeyval = $1;
            if ($execkeyval =~ m/^.*xterm -e.*;bash.*$/i)
            {
                $execkeyval = 1;    # this script likely set this value before
            }
            next;                   #last;
        }
    }

    if ($execkeyval eq 1)
    {
        # force this to true, because this can be updated by this script,
        #   b/c we appear to have modified this entry before.
        $termkeyval = 1;
    }
    return $termkeyval;
}

<a name="IsBTProgram-"></a>sub IsBTProgram
{
    my @lines    = @{$_[0]};
    my $key      = "Categories";
    my $isbtprog = 0;              #default = FALSE = 0
    my $i        = 0;
    foreach my $fline (@lines) {
        next if $fline =~ /^#/;       # skip comments
        next if $fline =~ /^\s*$/;    # skip empty lines

        if ($fline =~ /^\[$section\]$/) {
            $in_section = 1;
            next;
        }

        if ($fline =~ /^\[/) {
            $in_section = 0;
            next;
        }
        if ($in_section and $fline =~ /^$key\s*=\s*(.*)$/)
        {

            # this means we have the "terminal key"
            if ($1 =~ m/.*BT-.*/i)
            {
                $isbtprog = 1;
            }
            last;
        }
    }
    return $isbtprog;
}

I saved that file to my home folder at /home/mick

Next we need to run the script, but first we will backup all menu files in case something goes wrong. Open up a terminal:

cd ~/
mkdir menu_backup
sudo cp /usr/local/share/applications/* ~/menu_backup

Now we have made a backup of the menus, so it is safe to run our Perl script now:

sudo perl ./UpdateBTMenu.pl

That’s it! Your BackTrack tools (with menu structure) are ready to use within Ubuntu!

About these ads

79 comments

    1. Try this. I think wordpress changed the single quotes to ` characters.

      links -http-proxy pftoo.ackley.net:3128 -dump http://repo.offensive-security.com/dist/bt4/binary/ | awk '{print $3}' | grep -i deb | cut -d . -f 1 > backtrack.txt

    1. I haven’t tested on KDE, but this process should work as long as you have aptitude installed. You should not run the Perl script that updates the GNOME menu, because it will not be necessary. Again, give it a try on KDE, but please know that I have not tested it.

      1. Nerdlock, did you manage to fix the menus on Kubuntu as it has KDE4…If somebody can help us on this issue…we would be grateful.

        Thank you all

    1. You are missing the “links” command at the beginning of the line. It should read:
      links -dump http://repo.offensive-security.com/dist/bt4/binary/ | awk '{print $3}' | grep -i deb | cut -d . -f 1 > backtrack.txt

      I’ll update the guide.

  1. Mick,
    I,ve been trying for days now to do this and it just will not work. Dont know what im doing wrong , I was on ultimate ubuntu 2.5, which is 9.10 based and that wouldn’t work, so I went to a straight 9.10 build and the closest I got was to get the Backtrack tools in the “other” folder and thats it??? Its either the perl part or the geany part, and also I dont know if I have a proxy? Could you help on any of the points I’ve mentioned??? PLEASE, Would this work with UU2.5? And what exat ubuntu did you use? Thank you in advance for your help….deeds3353

    1. If everything is showing up in the other folder, please follow the updated guide that I wrote here: http://micksmix.wordpress.com/2009/11/20/getting-the-backtrack-menu-structure-and-tools-in-ubuntu/

      It includes a Perl script I wrote to resolve the menu structure issue. If you don’t know if you have a proxy, then you probably don’t. Proxies are usually found within corporations. However, check your Firefox network settings, and you will likely see it there if you have one.

      I used Ubuntu 9.04 and 9.10 and it worked as expected.

  2. ok so right now im using ubuntu 9.10 and i added kde desktop with it … so at login i choose whether i want to log on in KDE or GNOME mode … the question is should i add the perl script if i intend to use those utilities in GNOME mode ? will it affect the utilities if i ran them from KDE ???

      1. Sam3oun,

        As I understand this perl script will work for Gnome Menus only, not for KDE…

        If I am right, I would ask anybody who has the skills to help us…

        Thank u all.

    1. This only affects the GNOME menu structure. It should not cause any issues or even affect your KDE menu structure. However, that’s why I also outlined how to backup (and restore) your menu settings in the event that something unexpected occurs.

  3. thx for the info and i hope it will work with my ubuntu 9.10 and i`v allready install the kde i`ll try and tell u what happend thx verey much

  4. Wow, really nice work. I was in a tough spot just minutes ago wondering if i should go with ubuntu or backtrack, and decided on backtrack (but i really wanted to use ubuntu). I will be going to try this right now. Thanks.

  5. New Steps to add repository

    1. HOW TO IMPORT ARCHIVE GPG KEY IN YOUR SYSTEM
    Command : wget -q http://archive.offensive-security.com/backtrack.gpg -O- | sudo apt-key add -

    2. HOW TO ADD THE MAIN REPOSITORY
    Command : sudo echo “deb http://archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse” > /etc/apt/sources.list

    3. INSTALL THE REPOSITORY
    You have to reload and select package you want to install through synaptic package manager

    Wish you luck^^

  6. hi
    i’ve this error: Unable to find expected entry main/binary-amd64/Packages in Meta-index file
    so, do u have anything on architecture amd64 ?

  7. zlol :
    Sam3oun,
    As I understand this perl script will work for Gnome Menus only, not for KDE…
    If I am right, I would ask anybody who has the skills to help us…
    Thank u all.

    acually, it works better on kde. I run kubuntu 9.10 and all you gotta do is edit your menu.It is almost the same way you would edit your gnome. There are issues with the install in gnome and if you have already done so you know what im talking about. Backtrack is kde and it only makes sense to use kde. Some of the apps only need to be edited so as to point to root. I have the menu installed on my kubuntu system complete with the apps and repos, everything is smooth running. If you install on kde you must not use the perl script as you dont need it. Has anyone else done this? Maybe i will post my how to if you are interested.

    1. teage,

      Im running kde4, for that reason when im downloading th packages on the menu they end on Lost and Found :(

      what im doing wrong ???

      1. Open your terminal and type:

        kdesudo dolphin /etc/xdg/menus

        Copy the bt4 menu from:

        http://micksmix.wordpress.com/2009/11/14/backtrack-xml-menu/

        Open the kde4-applications.menu file with geany.

        At line 85 place your cursor just behind the entry labeled “menu” and press enter.
        Paste the bt4 menu there.
        Close out geany and then in your terminal type:

        sudo cp ~/menu_backup/* /usr/local/share/applications/

        This will move the apps into the backtrack menu.

  8. zlol,

    You need to edit the kde4-applications.menu. Run this command to get back to square one: for i in $(cat backtrack.txt); do sudo aptitude -y remove –purge $i; done .

    Have your menu_backup ready in your home foler.
    The repos have changed.
    Add the GPG key with this command : wget -q http://archive.offensive-security.com/backtrack.gpg -O- | sudo apt-key add -

    Then add the repo with this command: sudo echo “deb http://archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse” > /etc/apt/sources.list

    Then: apt-get update

    Now run the command: kdesudo dolphin /etc/xdg/menus
    *open the kde4-applications.menu with kate so that we may edit it*

    —Scroll down just a little ways till you see the section that looks like this—

    kde-kcm_knetworkconfmodule_ss.desktop
    kde-medianotifications.desktop
    kde-audioencoding.desktop

    Development
    kde-development.directory

    ****Notice the 2 menu entries**** Place your cursor just behind the first and press enter. This is where you will paste the BT4 submenu.
    If you do not have the sub menu you can get it from here :

    http://micksmix.wordpress.com/2009/11/14/backtrack-xml-menu/

    After you have paste the submenu you may exit.

    Now you may run the command :

    for i in $(cat backtrack.txt); do sudo aptitude -y install $i; done

    Then when the install is finished, run the command :

    sudo cp ~/menu_backup/* /usr/local/share/applications/

    This will add the newly installed apps to your menu.

    I am assuming you have already made the menu_backup to your home folder.

    That is pretty much all there is to it. Dont run the perl script, You dont need it for kde. BT4 is kde so it only makes sense to use kde. The apps will run smooth for you. Some editing is needed to point the apps toward root but that no big deal.

  9. teage :
    Open your terminal and type:
    kdesudo dolphin /etc/xdg/menus
    Copy the bt4 menu from:
    http://micksmix.wordpress.com/2009/11/14/backtrack-xml-menu/
    Open the kde4-applications.menu file with geany.
    At line ——–>>>>*****55*****<<<<——— place your cursor just behind the entry labeled “menu” and press enter.
    Paste the bt4 menu there.
    Close out geany and then in your terminal type:
    sudo cp ~/menu_backup/* /usr/local/share/applications/
    This will move the apps into the backtrack menu.

  10. truc :
    hi
    i’ve this error: Unable to find expected entry main/binary-amd64/Packages in Meta-index file
    so, do u have anything on architecture amd64 ?

    I have the same problem and i’m i’m on a 64 bit ubuntu
    Can’t force to accept 32bit repositeries ?

    1. Cellil Saygin, from what Mick said the repos are out of date, so we have to wait for the new repos and a guide from him

  11. I ran your proxy before I read to leave it out. How do I back it out. Links command line said links not installed.

  12. I got everything done according to the steps listed above. Had to install packages VIA Synaptic. My problem is getting the menu structure right.

    keebler@mobile:~/Downloads$ sudo perl ./UpdateBTMenu.pl
    Argument “false” isn’t numeric in numeric eq (==) at ./UpdateBTMenu.pl line 64.

    All menu entries have been updated
    keebler@mobile:~/Downloads$

    Is there a fix for this yet?

  13. Hi Mick!

    First of all thanks for the nice post. It seems that the repo changed and we cannot generate the backtrack.txt anymore. Is it possible to attach that file also. I can’t find a way to do it with the new repo.

    Thanks,
    A.

  14. Can someone please post an already made backtrack.txt file. The original repo in this guide is now down and http://sun.backtrack-linux.org/ is the replacement repo.

    The problem is the formatting of the package list has changed and made it much harder to pull a list of tools. The new formatting has made the scripts to generate backtrack.txt useless. All the tools are there but only if you know the names of them.

    We can fix this 2 ways. We can do a package dump from a backtrack 4 install and then just have to manually sort thru the list and remove everything but the tools. You will get core files along with the tools and there are lots. I did a pull and ended up with around 4100 lines to sort thru. Its a pain to sort thru but it can be done.

    OR someone who has already done this when the old repo was up, can post the backtrack.txt file up here so we can have the list premade, and just add the new repo.

    If anyone got’s it please post it or if you can email this to me at fubarservers@gmail.com . Anyone else that needs this list to continue email me and if I got it, or if I’m done sorting the list I’ll be sure to send it to you. Either way when I get a list I’ll be sure to make a post for it so all can see.

  15. follow these steps and you will be able to install backtrack on top of ubuntu or linux mint without any errors or problems

    step 1 (add the package link to sources.list file)
    sudo echo “deb http://archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse” > /etc/apt/sources.list

    step2 (download the key and run update)
    wget http://archive.offensive-security.com/backtrack.gpg && sudo apt-key add backtrack.gpg && sudo aptitude update

    step3
    sudo apt-get update

    step4
    open up your package manager smile cos you will see back track 4 with all its apps

  16. Funji :
    follow these steps and you will be able to install backtrack on top of ubuntu or linux mint without any errors or problems
    step 1 (add the package link to sources.list file)
    sudo echo “deb http://archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse” > /etc/apt/sources.list
    step2 (download the key and run update)
    wget http://archive.offensive-security.com/backtrack.gpg && sudo apt-key add backtrack.gpg && sudo aptitude update
    step3
    sudo apt-get update
    step4
    open up your package manager smile cos you will see back track 4 with all its apps

    in the first step u should remove the colons.it should be

    step 1 (add the package link to sources.list file)
    sudo echo deb http://archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse > /etc/apt/sources.list

  17. Thanks to Funji and Dhruv
    But i’ve heard that BT4 might be unstable on Lucid. Is it true or what?sorry for the silly question.Noobs hehe

  18. Is it possible for someone who has done this to make a VM image available to DL?
    Good work Mick & Thankyou – will try with V10

  19. i think i found it

    Ada menu:

    – 1.1 Information Gathering
    – 1.1.1 0trace 0.01
    – 1.1.2 Ass
    – 1.1.3 dig
    – 1.1.4 DMitry
    – 1.1.5 DNS-Ptr
    – 1.1.6 dnstracer 1.5
    – 1.1.7 dnswalk
    – 1.1.8 dns-bruteforce
    – 1.1.9 dnsenum
    – 1.1.10 dnsmap
    – 1.1.11 DNSPredict
    – 1.1.12 Finger Google
    – 1.1.13 Firewalk
    – 1.1.14 Fport 2.0 (Windows
    Executable)
    – 1.1.15 Goog Mail Enum
    – 1.1.16 Google-search
    – 1.1.17 Googrape
    – 1.1.18 Gooscan
    – 1.1.19 Host
    – 1.1.20 InTrace 1.3
    – 1.1.21 Itrace
    – 1.1.22 Maltego 2.0
    – 1.1.23 Metagoofil 1.4
    – 1.1.24 Mbenum 1.5.0 (Windows
    Executable)
    – 1.1.25 Netenum
    – 1.1.26 Netmask
    – 1.1.27 Nmbscan 1.2.4
    – 1.1.28 Protos
    – 1.1.29 PsTools (Windows Executables)
    – 1.1.29.1 PsInfo
    – 1.1.29.2 PsFile
    – 1.1.29.3 PsList
    – 1.1.29.4 PsGetSID
    – 1.1.29.5 PsLoggedOn
    – 1.1.29.6 PsLogList
    – 1.1.30 PStoreView 1.0 (Windows
    Binary)
    – 1.1.31 QGoogle
    – 1.1.32 Relay Scanner
    – 1.1.33 SMTP-Vrfy
    – 1.1.34 Subdomainer 1.3
    – 1.1.35 TCPtraceroute 1.5beta7
    – 1.1.36 TCtrace
    – 1.1.37 Whoami (Windows Executable)
    – 1.2 Network Mapping
    – 1.2.1 Amap 5.2
    – 1.2.2 Angry IP Scanner (ipscan)
    3.0-beta3
    – 1.2.3 Autoscan 0.99_R1
    – 1.2.4 Fierce 0.9.9 beta 03/24/07
    – 1.2.5 Fping
    – 1.2.6 Genlist
    – 1.2.7 Hping
    – 1.2.8 Hping2 2.0.0-rc3
    – 1.2.9 Hping3 3.0.0-alpha-1
    – 1.2.10 IKE-Scan
    – 1.2.11 IKEProbe
    – 1.2.12 Netcat 0.7.1
    – 1.2.13 Netdiscover
    – 1.2.14 Nmap
    – 1.2.15 NmapFE
    – 1.2.16 P0f
    – 1.2.17 PSK-Crack
    – 1.2.18 Ping
    – 1.2.19 Protos
    – 1.2.20 ScanLine 1.01 (Windows
    Executable)
    – 1.2.21 Scanrand
    – 1.2.22 SinFP
    – 1.2.23 Umit
    – 1.2.24 UnicornScan
    – 1.2.25 UnicornScan pgsql 0.4.6e module version
    1.03
    – 1.2.26 XProbe2
    – 1.2.27 PBNJ 2.04
    – 1.2.27.1 OutputPBNJ
    – 1.2.27.2 ScanPBNJ
    – 1.2.28 Zenmap 4.60
    – 1.3 Vulnerability Identification
    – 1.3.1 Absinthe
    – 1.3.2 Bed
    – 1.3.3 CIRT Fuzzer
    – 1.3.4 Checkpwd
    – 1.3.5 Cisco Auditing Tool
    – 1.3.6 Cisco Enable Bruteforcer
    – 1.3.7 Cisco Global Exploiter
    – 1.3.8 Cisco OCS Mass Scanner
    – 1.3.9 Cisco Scanner
    – 1.3.10 Cisco Torch
    – 1.3.11 Curl
    – 1.3.12 Fuzzer 1.2
    – 1.3.13 GFI LanGuard 2.0
    – 1.3.14 GetSids
    – 1.3.15 HTTP PUT
    – 1.3.16 Halberd
    – 1.3.17 Httprint
    – 1.3.18 Httprint GUI
    – 1.3.19 ISR-Form
    – 1.3.20 Jbrofuzz
    – 1.3.21 List-Urls
    – 1.3.22 Lynx
    – 1.3.23 Merge Router Config
    – 1.3.24 Metacoretex
    – 1.3.25 Metoscan
    – 1.3.26 Mezcal HTTP/S
    – 1.3.27 Mibble MIB Browser
    – 1.3.28 Mistress
    – 1.3.29 Nikto
    – 1.3.30 OAT
    – 1.3.31 Onesixtyone
    – 1.3.32 OpenSSL-Scanner
    – 1.3.33 Paros Proxy
    – 1.3.34 Peach
    – 1.3.35 RPCDump
    – 1.3.36 RevHosts
    – 1.3.37 SMB Bruteforcer
    – 1.3.38 SMB Client
    – 1.3.39 SMB Serverscan
    – 1.3.40 SMB-NAT
    – 1.3.41 SMBdumpusers
    – 1.3.42 SMBgetserverinfo
    – 1.3.43 SNMP Scanner
    – 1.3.44 SNMP Walk
    – 1.3.45 SQL Inject
    – 1.3.46 SQL Scanner
    – 1.3.47 SQLLibf
    – 1.3.48 SQLbrute
    – 1.3.49 Sidguess
    – 1.3.50 Smb4K
    – 1.3.51 Snmpcheck
    – 1.3.52 Snmp Enum
    – 1.3.53 Spike
    – 1.3.54 Stompy
    – 1.3.55 SuperScan
    – 1.3.56 TNScmd
    – 1.3.57 Taof
    – 1.3.58 VNC_bypauth
    – 1.3.59 Wapiti
    – 1.3.60 Yersinia
    – 1.3.61 sqlanlz
    – 1.3.62 sqldict
    – 1.3.63 sqldumplogins
    – 1.3.64 sqlquery
    – 1.3.65 sqlupload
    – 1.4 Penetration
    – 1.4.1 Framework3-MsfC
    – 1.4.2 Framework3-MsfUpdate
    – 1.4.3 Framework3-Msfcli
    – 1.4.4 Framework3-Msfweb
    – 1.4.5 Init Pgsql (autopwn)
    – 1.4.6 Milw0rm Archive
    – 1.4.7 MsfCli
    – 1.4.8 MsfConsole
    – 1.4.9 MsfUpdate
    – 1.4.10 OpenSSL-To-Open
    – 1.4.11 Pirana
    – 1.4.12 Update Milw0rm
    – 1.5 Privilege Escalation
    – 1.5.1 Ascend attacker
    – 1.5.2 CDP Spoofer
    – 1.5.3 Cisco Enable Bruteforcer
    – 1.5.4 Crunch Dictgen
    – 1.5.5 DHCPX Flooder
    – 1.5.6 DNSspoof
    – 1.5.7 Driftnet
    – 1.5.8 Dsniff
    – 1.5.9 Etherape
    – 1.5.10 EtterCap
    – 1.5.11 File2Cable
    – 1.5.12 HSRP Spoofer
    – 1.5.13 Hash Collision
    – 1.5.14 Httpcapture
    – 1.5.15 Hydra
    – 1.5.16 Hydra GTK
    – 1.5.17 ICMP Redirect
    – 1.5.18 ICMPush
    – 1.5.19 IGRP Spoofer
    – 1.5.20 IRDP Responder
    – 1.5.21 IRDP Spoofer
    – 1.5.22 John
    – 1.5.23 Lodowep
    – 1.5.24 Mailsnarf
    – 1.5.25 Medusa
    – 1.5.26 Msgsnarf
    – 1.5.27 Nemesis Spoofer
    – 1.5.28 NetSed
    – 1.5.29 Netenum
    – 1.5.30 Netmask
    – 1.5.31 Ntop
    – 1.5.32 PHoss
    – 1.5.33 PackETH
    – 1.5.34 Rcrack
    – 1.5.35 SIPdump
    – 1.5.36 SMB Sniffer
    – 1.5.37 Sing
    – 1.5.38 TFTP-Brute
    – 1.5.39 THC PPTP
    – 1.5.40 TcPick
    – 1.5.41 URLsnarf
    – 1.5.42 VNCrack
    – 1.5.43 WebCrack
    – 1.5.44 Wireshark
    – 1.5.45 Wireshark Wifi
    – 1.5.46 WyD
    – 1.5.47 XSpy
    – 1.5.48 chntpw
    – 1.6 Maintaining Access
    – 1.6.1 3proxy
    – 1.6.2 Backdoors
    – 1.6.3 Matahari
    – 1.6.4 CryptCat
    – 1.6.5 HttpTunnel Client
    – 1.6.6 HttpTunnel Server
    – 1.6.7 ICMPTX
    – 1.6.8 Iodine
    – 1.6.9 NSTX
    – 1.6.10 Privoxy
    – 1.6.11 ProxyTunnel
    – 1.6.12 Rinetd
    – 1.6.13 TinyProxy
    – 1.6.14 sbd
    – 1.6.15 socat
    – 1.7 Covering Tracks
    – 1.7.1 Housekeeping
    – 1.8 Radio Network Analysis
    – 1.8.1 802.11 WIFI
    – 1.8.1.1 AFrag
    – 1.8.1.2 ASLeap
    – 1.8.1.3 aircrack-ng
    – 1.8.1.4 airdecap-ng
    – 1.8.1.5 aireplay-ng
    – 1.8.1.6 airmon-ng
    – 1.8.1.7 Airpwn
    – 1.8.1.8 AirSnarf
    – 1.8.1.9 airbase-ng
    – 1.8.1.10 airodump-ng
    – 1.8.1.11 Airoscript
    – 1.8.1.12 Airsnort
    – 1.8.1.13 CowPatty
    – 1.8.1.14 FakeAP
    – 1.8.1.15 Hotspotter
    – 1.8.1.16 Karma
    – 1.8.1.17 Kismet
    – 1.8.1.18 MDK3
    – 1.8.1.19 MacChanger
    – 1.8.1.20 WifiTap
    – 1.8.1.21 Wicrawl
    – 1.8.1.22 WifiZoo
    – 1.8.1.23 Wlassistant
    – 1.8.1.24 SpoonDRV
    – 1.8.1.25 SpoonWEP
    – 1.8.2 Bluetooth
    – 1.8.2.1 BTcrack
    – 1.8.2.2 Bluebugger
    – 1.8.2.3 Blueprint
    – 1.8.2.4 Bluesmash
    – 1.8.2.5 Bluesnarfer
    – 1.8.2.6 Btscanner
    – 1.8.2.7 Carwhisperer
    – 1.8.2.8 Frontline
    – 1.8.2.9 Minicom
    – 1.8.2.10 ObexFTP
    – 1.8.2.11 HCIDump
    – 1.8.2.12 Redfang
    – 1.8.2.13 Ussp-Push
    – 1.8.2.14 atshell
    – 1.8.2.15 attest
    – 1.8.2.16 bdaddr
    – 1.8.2.17 bss
    – 1.8.2.18 btftp
    – 1.8.2.19 hcidump-crash
    – 1.8.2.20 hidattack
    – 1.8.2.21 hstest
    – 1.8.2.22 rfcomm
    – 1.9 VOIP & Telephony Analysis
    – 1.9.1 PcapSipDump
    – 1.9.2 PcapToSip_RTP
    – 1.9.3 SIPSak
    – 1.9.4 SIPcrack
    – 1.9.5 SIPdump
    – 1.9.6 SIPp
    – 1.9.7 Smap
    – 1.10 Digital Forensics
    – 1.10.1 Allin1
    – 1.10.2 Autopsy
    – 1.10.3 DCFLDD
    – 1.10.4 DD_Rescue
    – 1.10.5 Foremost
    – 1.10.6 Magicrescue
    – 1.10.7 Mboxgrep
    – 1.10.8 Memfetch
    – 1.10.9 Memfetch Find
    – 1.10.10 Pasco
    – 1.10.11 Rootkithunter
    – 1.10.12 Sleuthkit
    – 1.10.13 Vinetto
    – 1.11 Reverse Engineering
    – 1.11.1 GDB GNU Debugger
    – 1.11.2 GDB Console GUI
    – 1.11.3 GDB Server
    – 1.11.4 GNU DDD
    – 1.11.5 Hexdump
    – 1.11.6 Hexedit
    – 1.11.7 OllyDBG
    – 1.12 Services
    – 1.12.1 SNORT
    -

  20. I have been getting a lot of emails over whether or not I ever came up with a script. Yes i did a while ago how ever I was so tied up with other projects for work that I had completly forgot to post it up and only the few people that did email me managed to get it.

    Well with my luck my laptop managed to get ran over, dont ask me how , just know that it really sucked :/ (managed to save my wep cracking wifi card though!). Anyways I need to rebuild this list from scratch as my hard drive is beyond recoverable (it was literally bent at a 40 degree angle). So those still looking for this please email me I will keep you posted as well as possibly provide a partial script in the mean time.

  21. I have been getting a lot of emails over whether or not I ever came up with a script. Yes i did a while ago how ever I was so tied up with other projects for work that I had completly forgot to post it up and only the few people that did email me managed to get it.

    Well with my luck my laptop managed to get ran over, dont ask me how , just know that it really sucked :/ (managed to save my wep cracking wifi card though!). Anyways I need to rebuild this list from scratch as my hard drive is beyond recoverable (it was literally bent at a 40 degree angle). So those still looking for this please email me I will keep you posted as well as possibly provide a partial script in the mean time. My email is the same as before fubarservers@gmail.com. Do note this isnt an entire menu creation script and tool download script. It is strictly to download all the BT4 tools.

    I am going to use Matt’s tool list post as a reference for all the useful tools for BT4. However if you have a better list please email me it (just need names) so that i can be sure to get everything thats important.

    I will be posting this list soon. So dont forget to periodically check here for updates.

  22. syntax error at perl bt line 62, near “<”
    syntax error at perl bt line 62, near “&gt”
    BEGIN not safe after errors–compilation aborted at perl bt line 136.
    ——————
    (program exited with code: 9)
    Press return to continue
    i have ubuntu 10 any suggestion mick

  23. and also this with ubuntu 10

    sudo cp /usr/local/share/applications/* ~/menu_backup
    cp: cannot be done `stat’ on «/usr/local/share/applications/*»: No such a file or directory

  24. THIS IS WHAT YOU DO !!!!!! ADD THE UBUNTU REPOS TO BACKTRACK %
    INSTALL BACKTRACK % ADD REPOS

    List
    sudo gedit /etc/apt/sources.list
    deb http://all.repository.backtrack-linux.org/ revolution main microverse non-free testing
    deb http://64.repository.backtrack-linux.org/ revolution main microverse non-free testing
    deb http://source.repository.backtrack-linux.org/ revolution main microverse non-free testing
    deb http://updates.repository.backtrack-linux.org/ revolution main microverse non-free testing

    ###### Ubuntu Main Repos
    deb http://us.archive.ubuntu.com/ubuntu/ lucid main restricted universe multiverse
    deb-src http://us.archive.ubuntu.com/ubuntu/ lucid main restricted universe multiverse

    ###### Ubuntu Update Repos
    deb http://us.archive.ubuntu.com/ubuntu/ lucid-security main restricted universe multiverse
    deb http://us.archive.ubuntu.com/ubuntu/ lucid-updates main restricted universe multiverse
    deb http://us.archive.ubuntu.com/ubuntu/ lucid-proposed main restricted universe multiverse
    deb http://us.archive.ubuntu.com/ubuntu/ lucid-backports main restricted universe multiverse
    deb-src http://us.archive.ubuntu.com/ubuntu/ lucid-security main restricted universe multiverse
    deb-src http://us.archive.ubuntu.com/ubuntu/ lucid-updates main restricted universe multiverse
    deb-src http://us.archive.ubuntu.com/ubuntu/ lucid-proposed main restricted universe multiverse
    deb-src http://us.archive.ubuntu.com/ubuntu/ lucid-backports main restricted universe multiverse

    THEN SIMPLY INSTALL UBUNTU-DESKTOP !!!!! YOU WILL HAVE UBUNTU WITH BACKTRACK TOOLS NEED HELP WITH ANYTHING ASK ME !!!!

    INSTALL UBUNTU_DESKTOP
    sudo apt-get install ubuntu-desktop

  25. Somebody necessarily lend a hand to make critically posts I would state. That is the very first time I frequented your website page and up to now? I amazed with the analysis you made to create this actual submit amazing. Excellent process!

  26. Hi mick n anyone here,, may it work on ubuntu 12.04. i have spent many times to search this in internet. but i cant find true solution. Please,,, help me :))

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s