Penetration Systems: BackBox Linux – Installation and basic settings

By: Perisa Reljic | AnArch, first appear on 6th March 2017

  • To install the operating system can be used BackBox existing partition, and unallocated (Unalocated) hard disk space .
  • Istalacija can be done to cut .ISO disc, but also with a USB Flash all tested system BackBox proved to be systemic least demanding and definitely stable.

Discreet Hero: BackBox

Installing the operating system BackBox can be done to cut .ISO disc, but unlike Parrot and the Flash USB. Because updates during the installation and downloading drivers, it is desirable that the computer is connected to the network.

Installation can be done on an already existing partition, but the pre-made unallocated (Unalocated) space on the hard disk. BackBox was kind enough to offer when installing the option “Install next to the existing system ,” which in the particular case of this kind (Unalocated) installation is not necessary .

Built on Debian Ubuntu 4.14 LTS platform, the installation process is similar to the operating system Ubuntu. Set the computer BIOS to boot from the media, as is the installation, which leads us right into the work environment where there is an icon:

  • “Install Linux BakcBox”

Clicking on the icon ” Install BakcBox ” begins the installation process, which leads us to choose the desired language – on the concrete case, Serbian , and then click ” Continue “. Confirm (tick) the ” Download refreshments during installation ” and ” Install third-party software .”

When the screen ” Installation Type ” choose ” Something else “, click ” Continue ” then mark the partition on the hard drive and click on ” Change “. In the pop-up window for the partition set ” Ext4 Journaling System “, ” Format partition ” and ” mount point ” (Mount Point) set to ” Root / ‘.

When the warning changes to disk, click ” Continue ” brings us back to the selection ” Type of installation “, where first click on the partition , and then ” Install Now “. Ignore the warning about the lack of swap space (which can be added after the installation is complete ), click on ” Continue “.

The next dialogue, ” Who are you ” (WhoAmI) enter the name , and choose to repeat the password and ” Encrypt my faciklu ” (Home Folder) and ” Continue “.

  • Note: as with Ubuntu installation, if a black screen is no reason to worry – just pomeiriti mouse because the Screen initially set to 5 minutes.

After the installation pops up showing “Installation is complete” after you restart the computer and remove the disc from which the installation was performed . The initial GRUB screen is now in the black, with the option to select an operating system on which you want to work in the first place by BackBox , marked with Ubuntu 14.04 . Weather choice of operating system is 10 seconds , after which it automatically runs BackBox .

After entering the password the first time you launch a pop-up window ” Record the password encryption “, where you should click ” Run this action immediately .” After typing in a password in the terminal (Enter) copy-paste the passphrase that you saved in a text document.

Terminal starts with “ Ctrl + Alt + T “, turn on firewall command “ sudo ufw enable ” enter a password ( without quotes ) and then “ sudo apt-get update ” to start the update. Upon completion of the process of typing “ sudo apt-get upgrade ” and click “ Y ” ( without quotes ).

Updating can be done and the program ” Update “, located in the main menu (upper left corner). Graphical launched the program update includes the ” Other Software ” where tickPartners Kanonikala ” and enter a password to verify identity.

  • Note: For a portable ( laptop ) computers when you first start it is necessary to activate the network card , which is done by running ” Update Program “, where the ” Settings ” – ” Additional Drivers ” where it is necessary to tick “Use Source Broadkom 802.11 Linux “.

BackBox is well covered drivers, and during višegodinjeg work on this operating system are detected additional problems with drivers other than the original (very slow) activation maps wireless connectivity for portable (laptop) computers.

  • One of the many advantages of the system is the ability BackBox encryption of documents, which is located in the fast right click menu.

To initiate the process of encryption you need to right-click on any document, click the ” Encrypt with GPG .” Bubble in the top right corner of the desktop will inform the development of the necessary folders and database encryption. Then in the ” All items ” – ” Passwords and Keys ” under ” GnuPG keys ” import (or device) keys for encryption. After the initial setup keys, each document or folder on your computer can be encrypted by right-clicking the option ” Encrypt with GPG .”

In the upper corner of the screen there is a shelf on which clicking the right mouse button ” Shelf ” – ” Add new item ” we can for easy access to add, for example: Screenshoot, System Load Monitor, buttons Store, File Menu, Heat workspace, Venues, Refresh a weather spotter mail and keyboard layout.

  • To adjust weather forecasts: right click, choose ” Properties ” and in the ” Edit ” to set the location of your city.

Adding Lubuntu Software Center:

Initiate terminal (Ctrl + Alt + T) and copy-paste:

sudo apt-get install -y lubuntu-software-center

After a short preparation includes BackBox version of the software center is located in the ” system “, to which can be reached in the upper left corner, and right-click on an empty space ” Programs ” (way down) and ” System “.

Over Lubuntu Center can be installed Chromium, System Monitor and KeePassX and programs can be installed by using the ” Sinaptik ‘package manager, which is located in the” system “.

Download additional web browser: TOR, Chrome or Opera , also from the manufacturer’s Web site , where they are after downloading the ‘ Downloads ‘ ( Downloads ) folder. Chromium and Opera are installed by right-clicking the option ” gdebi installer package .” TOR right-click the option ” Extract here ” says the appropriate folder, where only clicked on the icon Tor Browser and Connect .

  • One of the advantages BackBox system option ” Secure Delete ” which is located in the fast right-click menu, which permanently removes the presence of any document on your computer.

Although somewhat modest arsenal of tools for penetration testing, because of its privacy options BackBox is ideal for advanced users, network and system administrators.

Right click on your mouse next to the classic option offers a quick access to all applications, including tools for penetration contained in Auditing. A little over a hundred tools for penetration testing is divided into sections:

  • information Gathering
  • vulnerability Assessment
  • Exploration
  • Privilege Escalation
  • maintaining Access
  • Documentation & Reporting
  • reverse Engineering
  • Social Engineering
  • stress Testing
  • Automotive Analysis
  • Forensic Analysis
  • malware Analysis
  • mobile Analysis
  • VoIp Analysis
  • Wireless and Analysis
  • Miscellaneous

The system comes with pre-installed Anonymous Mode, and the RAM Wipe protection from the Cold Boot attacks.

BackBox each time you start a new randomly sets a new MAC address, which additionally protects the privacy of users. In addition to standard office packages that come installed on the system, BackBox using MAT ( Metadata Anonymisation Toolkit ) allows the removal of all “meta” information on documents.

BackBox not just a set of tools for penetration testing, more serious, and very stable operating system Minimum system requirements for all kinds of tasks, with a warm recommendation of the author:

EnJoy 🙂

Link to download: