Table Of Contents

Which operating system do real hackers use?

Which operating system do the real hackers use?

So which operating system do such black hat or gray hat hackers use?

Which operating system do ‘professional’ hackers use?

Many of the high-risk hacking show that some real hackers run MS windows to hide in plain sight.

These throw in of burner laptops have USB and SD card for memory options.

This makes it easier to hide, destroy or even swallow if needed.

spot_img

The new smaller bootable ghost OS image is then written out to an encrypted SD card.

The burner laptop is dismantled and thoroughly destroyed.

Hackers pay special attention to the physical destruction of the hard drive, data pipe card, and RAM.

Sometimes they use even use a blowtorch or sledgehammer can do destroy such computers.

Kali Linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing.

Kali Linux is the most versatile and advanced penetration testing distro.

Kali updates its tools and it is available for many different platforms like VMware and ARM.

it is an operating system for IT security and penetration testing developed by the Frozenbox Dev Team.

It is a GNU/Linux distribution based on Debian and mixed with Kali.

Each of these works might come under a different license.

It includes the graphical user interface GNOME inbuilt.

There is a second variation available which has command line only, and it has very fewer hardware requirements.

The CD contains the best of the open source and free tools that focus on testing and attacking websites.

We have included the tools used in all four steps of a web pen-test.

NodeZero

It is said the necessity is the mother of all inventions, and NodeZero Linux is no different.

The NodeZero team consists of testers and developers who have put together this amazing distro.

Ergo all changes are gone after reboot and run from media such as discs and USBs drives.

It is also believed that Live Systems just dont scale well in a robust testing environment.

Pentoo

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment.

Based on Gentoo Linux, Pentoo is provided both as 32 and 64-bit installable live cd.

Pentoo is also available as an overlay for an existing Gentoo installation.

GnackTrack

GnackTrack is an open and free project to merge penetration testing tools and the Linux Gnome desktop.

GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu.

Blackbuntu is penetration testing distribution with GNOME Desktop Environment.

Its currently being built using the Ubuntu 10.10 and work on reference Back|Track.

Knoppix STD version 0.1 was published January 24, 2004, on Knoppix 3.2.

Thereafter, the project stagnated, lacking updated drivers and packages.

A release date for version 0.2 has not yet been announced.

A list of tools is available on the official website.

Weakerth4n

Weakerth4n is a penetration testing distribution which is built from Debian Squeeze.

It has a very well maintained website and a devoted community.

Lined up with the ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts.

Also, it is easy to compare it with Kali as to make a better OS than Kali .

It is a new operating system based on Ubuntu Linux.

Though that is changing with most financial firms now moving to Linux based servers.

source: www.techworm.net