Penetration systems: BackBox Linux – installation and basic settings

Penetration systems: BackBox Linux – installation and basic settings

Text first published: March 2017
  • To install the BackBox operating system, an existing partition can be used, as well as unallocated (Unallocated) space on the hard disk .
  • The installation can be done from a burned .ISO disk, but also from a Flash USB, and of all the systems tested, BackBox proved to be the least demanding and definitely the most stable.

Author: Periša Reljić

Discreet Hero: BackBox

Installing the BackBox operating system can be done from a burned .ISO disc, but unlike Parrot, from a Flash USB. Due to updates during the installation and download of drivers, it is preferable that the computer is connected to the network.

Installation can be done on an already existing partition, but also on a previously created unallocated (Unallocated) space on the hard disk. BackBox is kind enough to offer the option “Install next to the existing system ” during the installation, which is not necessary in the specific example of this type of (unlocated) installation .

Built on the Debian Ubuntu 14.04 LtS platform, the installation process is similar to the Ubuntu operating system. Set the BIOS to boot the computer from the media on which the installation is located, which brings us right into the working environment where the icon is located:

  • “Install BakcBox Linux”

Clicking on the ” Install BakcBox ” icon starts the installation process, which brings us to the choice of the desired language – in the concrete example, Serbian , after which click on ” Continue “. Confirm (tick) the ” Download updates during installation ” and ” Install third-party software ” options.

When the ” Installation type ” screen appears, select ” Something else “, click ” Continue “, then mark the desired partition on the hard disk and click ” Change “. In the pop-up window for the desired partition, set ” Ext4 Journaling System “, ” Format partition ” and ” Mount Point ” to ” Root / “.

When a warning about changes on the disk appears, click ” Continue ” which returns us to the ” Type of installation ” selection, where first click on the desired partition , and then ” Install now “. Ignore the warning about the lack of SWAP space (which can be added after the installation is complete), click ” Continue “.

In the next dialogue ” Who are you ” (WhoAmI), type the name , choose and repeat the password , as well as ” Encrypt my folder ” (Home Folder) and ” Continue “.

  • Note: as with the Ubuntu installation, if a black screen appears there is nothing to worry about – just move the mouse as Screen is initially set to 5 minutes.

After the installation is complete, the notification “Installation is complete” will appear , after which restart the computer and remove the medium from which the installation was done . The initial GRUB screen is now black, with the option to select the operating system you want to run on placed first by BackBox , labeled Ubuntu 14.04 . The operating system selection time is 10 seconds , after which BackBox starts automatically .

After entering the password at the first start, a pop-up window ” Note your encryption password ” appears , where you should click on ” start this action now “. After typing the password in the terminal (Enter), copy-paste the PassPhrase to save in a text document.

The terminal is started with “ Ctrl + Alt + T “, turn on the firewall with the “ sudo ufw enable ” command, enter the password ( Enter ) and then “ sudo apt-get update ” starts the update. At the end of the process, type “ sudo apt-get upgrade ” and click “ Y ” ( Enter ).

The update can also be done with the ” Program Update ” program, located in the main menu (upper left corner). The graphically launched program update contains the option ” Other Software ” where to tick ” Canonical Partners ” and enter a password to verify identity.

  • Note: On portable ( Laptop ) computers , the network card must be activated during the first startup , which is done by starting ” Program Updates “, where in ” Settings ” – ” Additional drivers ” it is necessary to check “Use Source Broadcom 802.11 Linux “.

BackBox is well covered by drivers, and during many years of running that operating system, no additional driver problems have been detected other than the initial (very slight) activation of the wireless card for portable (Laptop) computers.

  • One of the many advantages of the BackBox system is the ability to encrypt documents found in the right-click context menu.

To initiate the encryption process, right-click on any document and click ” Encrypt with GPG “. A bubble in the upper right corner of the desktop will inform about the creation of the necessary folder and encryption database. After that, in ” All settings ” – ” Passwords and keys ” under ” GnuPG keys ” the encryption keys are imported (or created). After the initial key setup, any document or folder on your computer can be encrypted with a right-click with the ” Encrypt with GPG ” option.

In the upper corner of the screen there is a shelf, on which by clicking with the right mouse button ” Shelf ” – ” Add new items ” we can add, for easier access, for example: Screenshoot, System Load Monitor, Action Buttons, File Menu, Workspace Changer, Places, Refresh weather forecast, mail watcher and keyboard layout.

  • To set the weather forecast: right click, select ” Properties ” and in ” Edit ” set the location of your place.

Adding the Lubuntu Software Center:

Start terminal (Ctrl + Alt + T) and copy-paste:

sudo apt-get install -y lubuntu-software-center

After a short installation, the BackBox version of the software center is located in the ” System ” menu, which can be reached in the upper left corner, but also by right-clicking on the empty space ” Programs ” (all the way down) and ” System “.

Chromium, System Monitor and KeePassX can be installed through the Lubuntu Center , and programs can also be installed using the ” Sinaptik ” package manager, located in the ” System ” menu.

Downloading additional Internet browsers: TOR, Chrome or Opera are downloaded from the manufacturer’s website , where after downloading they are located in the ” Downloads ” folder. Chromium and Opera are installed by right-clicking the mouse and selecting the ” Gdebi Package Installer ” option. TOR creates a corresponding folder by right-clicking the mouse and using the ” Extract here ” option, where you just click on the Tor Browser and Connect icon .

  • One of the advantages of the BackBox system is the ” Secure Delete ” option , which is located in the quick right-click menu of the mouse, which permanently removes any presence of the document on the computer.

Although a somewhat more modest arsenal of penetration testing tools, its privacy protection capabilities make BackBox ideal for advanced users, network and system administrators.

In addition to classic options, right-clicking on the mouse offers quick access to all programs, including the penetration tools found in Auditing. Over a hundred penetration testing tools are divided into sections:

  • Information Gathering
  • Vulnerability Assessment
  • Exploration
  • Privilege Escalation
  • Maintaining Access
  • Documentation & Reporting
  • Reverse engineering
  • Social Engineering
  • Stress Testing
  • Automotive Analysis
  • Forensic Analysis
  • Malware Analysis
  • Mobile Analysis
  • VoIP Analysis
  • Wireless Analysis and
  • Miscellaneous

The system comes with Anonymous Mode already installed, as well as RAM Wipe protection against Cold Boot attacks.

BackBox randomly sets a new MAC address every time it is restarted , which further protects the user’s privacy. In addition to the standard office packages that come installed on the system, BackBox using MAT ( Metadata Anonymisation Toolkit ) enables the removal of all “meta” data on documents.

BackBox is not just a set of tools for penetration testing, but a serious and very stable operating system with minimum system requirements for all kinds of tasks, with a hearty recommendation from the author:


Download link: