Penetration systems: BackBox Linux – installation and basic settings

Penetration systems: BackBox Linux – installation and basic settings

  • An existing partition can be used to install the BackBox operating system, as well as unallocated (Unalocated) hard disk space .
  • Installation can be done from a burnt .ISO disk, but also from Flash USB, and of all the tested systems, BackBox proved to be the least demanding system and definitely the most stable.

Author: Periša Reljić

Discreet Hero: BackBox

Installing the BackBox operating system can be done from a burned .ISO disk, but unlike Parrot and Flash USB. Due to updates during installation and download of drivers, it is recommended that the computer be connected to the network.

Installation can be done on an already existing partition, but also on a previously created unallocated (Unalocated) space on the hard disk. BackBox is kind enough to offer the option “Install next to an existing system “during installation, which is not necessary on a specific example of this type of (Unalocated) installation.

Built on the Debian Ubuntu 14.04 LtS platform, the installation process is similar to that of the Ubuntu operating system. Set the BIOS to boot the computer from the media on which the installation is located, which introduces us right to the work environment where the icon is located:

  • “Install BakcBox Linux”

Clicking on the ” Install BakcBox ” icon starts the installation process, which brings us to the selection of the desired language – on a specific example, Serbian , after which click on ” Continue “. Check the ” Download refresh during installation ” and ” Install third-party software ” options .

When the ” Installation type ” screen appears, select ” Something else “, click ” Continue “, then mark the desired partition on the hard disk and click ” Change “. In the pop-up window for the partition set ” Ext4 Journaling System “, ” Format partition ” and ” mount point ” (Mount Point) set to ” Root / ‘.

When a warning about changes to the disk appears, click ” Continue “, which returns us to the ” Installation type ” selection, where you first click on the desired partition , and then ” Install now “. Ignore the lack of SWAP space warning (which can be added after the installation is complete), click ” Continue “.

The next dialogue, ” Who are you ” (WhoAmI) enter the name , and choose to repeat the password and ” Encrypt my faciklu ” (Home Folder) and ” Continue “.

  • Note: as with the Ubuntu installation, if a black screen appears there is no reason to worry – just move the mouse because the Screen is initially set to 5 minutes.

When the installation is complete , the message “Installation is complete” will appear , after which restart the computer and remove the media from when the installation was done . The initial GRUB screen is now in black, with the option to select the operating system you want to work on in the first place set by BackBox , marked with Ubuntu 14.04 . The operating system selection time is 10 seconds , after which the BackBox starts automatically .

After entering the password on the first start-up, a pop-up window ” Record your encryption password ” appears , where you need to click on ” run this action now “. After typing the password into the terminal (Enter) copy-paste PassPhrase which save in a text document.

The terminal starts with “ Ctrl + Alt + T “, turn on the firewall command “ sudo ufw enable ” to enter the password ( Enter ) and then “ sudo apt-get update ” starts the update. At the end of the process, type “ sudo apt-get upgrade ” and click “ Y ” ( Enter ).

The update can also be done with the ” Program update ” program , which is located in the main menu (upper left corner). The graphically launched program update contains the ” Other Software ” option where you tick ” Canonical Partners ” and enter a password to verify your identity.

  • Note: For a portable ( laptop ) computers when you first start it is necessary to activate the network card , which is done by running ” Update Program “, where the ” Settings ” – ” Additional Drivers ” where it is necessary to tick “Use Source Broadkom 802.11 Linux “.

BackBox is well covered by drivers, and during many years of work on that operating system, no additional problems with drivers were detected, except for the initial (very easy) activation of the wireless connection card for laptops.

  • One of the many advantages of the BackBox system is the ability to encrypt documents located in the quick right-click menu.

To initiate the encryption process, you need to right-click on any document and click ” Encrypt with GPG “. A balloon in the upper right corner of the desktop will notify you of the creation of the required encryption folder and database. After that, encryption keys are imported (or created) in ” All settings ” – ” Passwords and keys ” under ” GnuPG keys “. After the initial setup of the keys, each document or folder on the computer can be encrypted by right-clicking the ” Encrypt with GPG ” option .

In the upper corner of the screen there is a shelf, to which by right-clicking ” Shelf ” – ” Add new items ” we can add for easier access for example: Screenshoot, System Load Monitor, Action Buttons, File Menu, Workspace Changer, Places, Refresh weather forecasts, Mail Observer and Keyboard Layout.

  • To set the weather forecast: right-click, select ” Properties ” and set the location of your place in ” Edit “.

Adding Lubuntu Software Center:

Launch terminal (Ctrl + Alt + T) and copy-paste:

sudo apt-get install -y lubuntu-software-center

After a short installation, the BackBox version of the software center is located in the ” System ” menu , which can be reached in the upper left corner, but also by right-clicking on the empty space ” Programs ” (all the way down) and ” System “.

Chromium, System Monitor and KeePassX can be installed through the Lubuntu Center , and programs can also be installed using the ” Synaptic ” package manager, which is located in the ” System ” menu .

Download additional web browser: TOR, Chrome or Opera , also from the manufacturer’s Web site , where they are after downloading the ‘ Downloads ‘ ( Downloads ) folder. Chromium and Opera are installed by right-clicking and the ” Gdebi Installer Package ” option . TOR right-click and the ” Unpack here ” option creates the appropriate folder, where you just click on the Tor Browser and Connect icon .

  • One of the advantages of the BackBox system is the ” Secure Delete ” option, which is located in the quick right-click menu, which permanently removes any presence of the document on the computer.

Although a somewhat more modest arsenal of penetration testing tools, due to its privacy capabilities, the BackBox is ideal for more advanced users, network and system administrators.

Right-clicking on the mouse, in addition to the classic options, also offers quick access to all programs, including the penetration tools found in Auditing. Just over a hundred penetration testing tools are divided into sections:

  • Information Gathering
  • Vulnerability Assessment
  • Exploration
  • Privilege Escalation
  • Maintaining Access
  • Documentation & Reporting
  • Reverse Engineering
  • Social Engineering
  • Stress Testing
  • Automotive Analysis
  • Forensic Analysis
  • Malware Analysis
  • Mobile Analysis
  • VoIp Analysis
  • Wireless Analysis i
  • Miscellaneous

The system comes with Anonymous Mode already installed, as well as RAM Wipe protection against Cold Boot attacks.

BackBox randomly sets a new MAC addresseach time it is started, which further protects user privacy. In addition to the standard office suites that come installed on the system, BackBox uses MAT ( Metadata Anonymisation Toolkit ) to remove all “meta” data on documents.

BackBox is not only a set of tools for penetration testing, but a serious and very stable operating system with minimum system requirements for all types of tasks, with the heartfelt recommendation of the author:


Download link: