SlideShare a Scribd company logo
(PEN) TESTING
TOOLKITS:
BACKBOX & KALI LINUX
JELMER DE REUS

2014/01/07

LINUX/UNIX Night @msterdam
Overview
 What

are testing toolkits used for
 What you can do with off-the-shelf distro’s
 Comparing BackBox and Kali Linux
 Considerations
What are testing toolkits used
for?


Enumeration
Open ports
 Firewall/IDS testing
 Topology mapping
 Software version indexing


Vulnerability scan
 Penetration testing
 Social Engineering
 Forensics

What are testing toolkits used
for?
Enumeration
 Vulnerability scan


Finding software editions & leaks
 Finding bad configurations
 Faster insight than a whitebox scan


Penetration testing
 Social Engineering
 Forensics

What are testing toolkits used
for?
Enumeration
 Vulnerability scan
 Penetration testing


Creatively, and with the help of tools, exploring the security
boundaries for opportunities to exploit
 WIFI cracking


Social Engineering
 Forensics

What are testing toolkits used
for?
 Enumeration
 Vulnerability

scan
 Penetration testing (incl. WIFI cracking)
 Social Engineering
 E.g.

emailing with hidden links in iFrames to get
malicious software on your target
 Inject malicious software in ‘regular’ software and
spread it
What are testing toolkits used
for?
 Social

Engineer

Toolkit
 Web

attack
What are testing toolkits used
for?
Enumeration
 Vulnerability scan
 Penetration testing
 Social Engineering
 WIFI cracking


Cracking wireless keys
 Redirecting/tapping WIFI users
 Social engineering (e.g. redirect to a fake website, collect
pw)
 Exploiting browsers

What are testing toolkits used
for?
There can be also different use cases like
 Network
 Firewall

troubleshooting

handling for fragmented packets
 Stress testing networks and servers
 DoS defense testing
BackBox Linux in short
Properties
 Ubuntu user
experience
 Many functions
through the start menu
 Not extensively
documented
 However

it’s just Ubuntu

 Non-root

user
 Smaller selection of
tools
 Sorted

by technology

 Updates

of tools are
integrated and easy
Kali Linux in short
Properties
 Custom Gnome2
 ARM support (for your
Pi)
 Extensive
documentation
 Videos and books

 Root

user
 Extensive collection of
tools
 Sorted

 Arduino

by activity

IDE
Differences in menu structure
Differences in menu structure
BackBox Linux documentation
 Forum
 Technical

questions
 Tooling requests
 Howto’s
 Blog

articles

(links at the end)
BackBox Linux Tutorials on
sinflood.net
Kali Linux documentation
 Extensive

documentation
 Securitytube
 Youtube
(links at the end)
Kali Linux Books & Tutorials
 Packt

Publishing (5x)
 Securitytube
DEMO – GUI overview
 BackBox

Linux
 Kali Linux
Tooling
What is it really about when choosing either?
 Installed and available tools (very personal)
 Keeping track of various types of
updates, e.g.
 Metasploit

Framework
 OpenVAS signatures
 Documentation

and personal knowledge
 Platform support (e.g. ARM)
Tooling - advice
Penetration Testing Execution Standard
 PTES Technical Guidelines
 Structured

index of available tools andn
technologies

Tools with an active community are more
reliable on the long term.
Tooling – some favorites
Useful
 Fragtest
 Hping3
 MSF Auxiliary scanners
Very dangerous
 Social engineer toolkit
 Sslsniff/sslstrip (this says more about SSL/TLS)
Tip: use databases in Metasploit
Tip: use databases in Metasploit
DEMO – tooling overview
Thanks for your time! More info:


Kali Linux





BackBox Linux






Main: http://www.backbox.org
Forum/Howto: http://forum.backbox.org/

Penetration Testing Execution Standard




Main: http://www.kali.org
Official Docs: http://www.kali.org/official-documentation/

http://www.penteststandard.org/index.php/PTES_Technical_Guidelines

Metasploit Unleashed


http://www.offensive-security.com/metasploit-unleashed/Main_Page

More Related Content

PPTX
Kali Linux
PPTX
Kali Linux - Falconer - ISS 2014
PDF
Tools kali
PPTX
Kali linux
PPTX
Kali presentation
PPTX
Kali Linux - Falconer
PPTX
kali linux.pptx
PPTX
Kali Linux
Kali Linux
Kali Linux - Falconer - ISS 2014
Tools kali
Kali linux
Kali presentation
Kali Linux - Falconer
kali linux.pptx
Kali Linux

What's hot (18)

PDF
penetration test using Kali linux ppt
PPTX
Kali linux summarised
PDF
penetration test using Kali linux seminar report
PPTX
Shamsa altayer 10bg kali linux
PPTX
Kali linux
ODP
Kali linux and some features [view in Full screen mode]
PDF
(03 2013) guide to kali linux
PPTX
Kali linux
PPTX
kali linux
PPTX
kali linux Presentaion
PPTX
kali linux
PPTX
Kali linux
PPTX
Kali Linux - CleveSec 2015
PPTX
Kali Linux
PPTX
Kalilinux
PDF
BASIC OVERVIEW OF KALI LINUX
PPTX
Kali linux
PDF
Web Application Security Testing: Kali Linux Is the Way to Go
penetration test using Kali linux ppt
Kali linux summarised
penetration test using Kali linux seminar report
Shamsa altayer 10bg kali linux
Kali linux
Kali linux and some features [view in Full screen mode]
(03 2013) guide to kali linux
Kali linux
kali linux
kali linux Presentaion
kali linux
Kali linux
Kali Linux - CleveSec 2015
Kali Linux
Kalilinux
BASIC OVERVIEW OF KALI LINUX
Kali linux
Web Application Security Testing: Kali Linux Is the Way to Go
Ad

Viewers also liked (20)

PPTX
linux backbox
 
PDF
toolkit_spread_A4
PDF
The Javascript Toolkit 2.0
PDF
Toolkits Overview for IBM Streams V4.2
PDF
IBM ODM Rules Compiler support in IBM Streams V4.2.
PDF
Service frameworks and toolkits: Making design artefacts actionable
PPTX
Working on the event budget and timeline
PDF
Marketer's guide to Facebook timeline: Tips for brands and marketers for the ...
PDF
Investing in local communities by sharing the power of design
PPTX
Prophets presents "Facebook Timeline for brands essential training"
PDF
Design Toolkit Analysis
PDF
A tutorial showing you how to crack wifi passwords using kali linux!
PDF
Future Proof Design and the Platform Design Canvas
PDF
The Platform Design Toolkit v 0.1
PDF
Timeline roadmap product graphs powerpoint ppt templates.
PPTX
Visual CV - based on a timeline
PDF
Download editable road map power point slides and road map powerpoint templates
PDF
EINTROEVM - Contingency planning
PPT
Brand Strategy Toolkit
PDF
The True Timeline Behind The People vs. O.J. Simpson
linux backbox
 
toolkit_spread_A4
The Javascript Toolkit 2.0
Toolkits Overview for IBM Streams V4.2
IBM ODM Rules Compiler support in IBM Streams V4.2.
Service frameworks and toolkits: Making design artefacts actionable
Working on the event budget and timeline
Marketer's guide to Facebook timeline: Tips for brands and marketers for the ...
Investing in local communities by sharing the power of design
Prophets presents "Facebook Timeline for brands essential training"
Design Toolkit Analysis
A tutorial showing you how to crack wifi passwords using kali linux!
Future Proof Design and the Platform Design Canvas
The Platform Design Toolkit v 0.1
Timeline roadmap product graphs powerpoint ppt templates.
Visual CV - based on a timeline
Download editable road map power point slides and road map powerpoint templates
EINTROEVM - Contingency planning
Brand Strategy Toolkit
The True Timeline Behind The People vs. O.J. Simpson
Ad

Similar to Linux/Unix Night - (PEN) Testing Toolkits (English) (20)

PDF
Operating system
PPTX
Kalilinux
PPTX
Kali Linux
DOCX
Operating project
PPTX
Kali linux.ppt
PPTX
Kali linux
PPTX
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
PDF
CRYPTOGRAPHY AND CYBER SECURITY LAB EXPERIMENTS
PPTX
Kali Linux-Operating System Presentation.pptx
DOCX
kali linix
PPTX
technical-presentation-kali-linux.pptx
PPTX
Web Security Jumpstart
PPTX
Web Security Workshop : A Jumpstart
PPTX
technical-presentation-kali-linux.pptx hakkında
PDF
0764-kali-linux.pdf
DOCX
Backtrack Manual Part2
PPTX
Intro to Kali Linux -.pptx
PPTX
Kali linux
PDF
Embedded Operating System - Linux
Operating system
Kalilinux
Kali Linux
Operating project
Kali linux.ppt
Kali linux
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
CRYPTOGRAPHY AND CYBER SECURITY LAB EXPERIMENTS
Kali Linux-Operating System Presentation.pptx
kali linix
technical-presentation-kali-linux.pptx
Web Security Jumpstart
Web Security Workshop : A Jumpstart
technical-presentation-kali-linux.pptx hakkında
0764-kali-linux.pdf
Backtrack Manual Part2
Intro to Kali Linux -.pptx
Kali linux
Embedded Operating System - Linux

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm

Linux/Unix Night - (PEN) Testing Toolkits (English)

  • 1. (PEN) TESTING TOOLKITS: BACKBOX & KALI LINUX JELMER DE REUS 2014/01/07 LINUX/UNIX Night @msterdam
  • 2. Overview  What are testing toolkits used for  What you can do with off-the-shelf distro’s  Comparing BackBox and Kali Linux  Considerations
  • 3. What are testing toolkits used for?  Enumeration Open ports  Firewall/IDS testing  Topology mapping  Software version indexing  Vulnerability scan  Penetration testing  Social Engineering  Forensics 
  • 4. What are testing toolkits used for? Enumeration  Vulnerability scan  Finding software editions & leaks  Finding bad configurations  Faster insight than a whitebox scan  Penetration testing  Social Engineering  Forensics 
  • 5. What are testing toolkits used for? Enumeration  Vulnerability scan  Penetration testing  Creatively, and with the help of tools, exploring the security boundaries for opportunities to exploit  WIFI cracking  Social Engineering  Forensics 
  • 6. What are testing toolkits used for?  Enumeration  Vulnerability scan  Penetration testing (incl. WIFI cracking)  Social Engineering  E.g. emailing with hidden links in iFrames to get malicious software on your target  Inject malicious software in ‘regular’ software and spread it
  • 7. What are testing toolkits used for?  Social Engineer Toolkit  Web attack
  • 8. What are testing toolkits used for? Enumeration  Vulnerability scan  Penetration testing  Social Engineering  WIFI cracking  Cracking wireless keys  Redirecting/tapping WIFI users  Social engineering (e.g. redirect to a fake website, collect pw)  Exploiting browsers 
  • 9. What are testing toolkits used for? There can be also different use cases like  Network  Firewall troubleshooting handling for fragmented packets  Stress testing networks and servers  DoS defense testing
  • 10. BackBox Linux in short Properties  Ubuntu user experience  Many functions through the start menu  Not extensively documented  However it’s just Ubuntu  Non-root user  Smaller selection of tools  Sorted by technology  Updates of tools are integrated and easy
  • 11. Kali Linux in short Properties  Custom Gnome2  ARM support (for your Pi)  Extensive documentation  Videos and books  Root user  Extensive collection of tools  Sorted  Arduino by activity IDE
  • 12. Differences in menu structure
  • 13. Differences in menu structure
  • 14. BackBox Linux documentation  Forum  Technical questions  Tooling requests  Howto’s  Blog articles (links at the end)
  • 15. BackBox Linux Tutorials on sinflood.net
  • 16. Kali Linux documentation  Extensive documentation  Securitytube  Youtube (links at the end)
  • 17. Kali Linux Books & Tutorials  Packt Publishing (5x)  Securitytube
  • 18. DEMO – GUI overview  BackBox Linux  Kali Linux
  • 19. Tooling What is it really about when choosing either?  Installed and available tools (very personal)  Keeping track of various types of updates, e.g.  Metasploit Framework  OpenVAS signatures  Documentation and personal knowledge  Platform support (e.g. ARM)
  • 20. Tooling - advice Penetration Testing Execution Standard  PTES Technical Guidelines  Structured index of available tools andn technologies Tools with an active community are more reliable on the long term.
  • 21. Tooling – some favorites Useful  Fragtest  Hping3  MSF Auxiliary scanners Very dangerous  Social engineer toolkit  Sslsniff/sslstrip (this says more about SSL/TLS)
  • 22. Tip: use databases in Metasploit
  • 23. Tip: use databases in Metasploit
  • 24. DEMO – tooling overview
  • 25. Thanks for your time! More info:  Kali Linux    BackBox Linux    Main: http://www.backbox.org Forum/Howto: http://forum.backbox.org/ Penetration Testing Execution Standard   Main: http://www.kali.org Official Docs: http://www.kali.org/official-documentation/ http://www.penteststandard.org/index.php/PTES_Technical_Guidelines Metasploit Unleashed  http://www.offensive-security.com/metasploit-unleashed/Main_Page