The new BlackArch Linux already has more than 1.500 penetration tools

BlackArch Linux

The popular distribution BlackArch Linux has recently released a new install version, an ISO image that incorporates all the latest news of the distribution as well as the inclusion of new penetration tools and ethical hacking.

BlackArch Linux like other distributions like Kali Linux they dedicate themselves to giving the hacker or apprentice a Linux environment accompanied by tools and utilities focused on ethical hacking. As we can see from the name, BlackArch Linux is based on Arch Linux, but with a lightweight interface that consumes few resources.
BlackArch Linux is a rolling release distribution, that is, it is updated without the need for a new installation, although the installation discs are always necessary, that is why this new version has been released incorporates so many penetration and backtesting tools.

BlackArch Linux has a great guide to getting started with ethical hacking

In addition to these tools BlackArch Linux has the maintenance of two window managers (Openbox and FluxBox) that are used in the interface as well as an ethical hacking guide and use of the distribution that is aimed at the most novice users. This guide can be found at the official website of the project, along with the download images and it is highly recommended for users who start in this world, not in the world of Gnu / Linux but in the world of ethical hacking.

The hacker's work does not have to be bad or illegal, many hackers try to teach it and it seems that the BlackArch Linux developers have the same horizon, although it is not perceived by everyone like that. In any case it is positive that there are already more than 1.500 tools for these functions, tools that will help us to better understand the Gnu / linux operating system and its weaknesses or strengths Do not you think?


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.