Live Hacking DVD and Live Hacking CD are
Linux live distribution focused on penetration testing and ethical
hacking. With no installation required, the analysis platform is started
directly from the CD/DVD-Rom and is fully accessible within minutes to
conduct live hacking and penetration tests.
Live Hacking distribution comes in two
forms. A full Linux desktop (Live Hacking DVD) including a graphical
user interface (GNOME) and applications like Firefox along with tools
and utilities for DNS enumeration, reconnaissance, foot-printing,
password cracking and network sniffing. For greater accessibility there
is a Live Hacking menu to help you quick find and launch the tools.
The second variation is the Live Hacking
Mini CD, which is command line only. However this doesn’t detract from
the power of the tools and utilities included as most of the penetration
testing and ethical hacking tools are command line tools. The included
/lh directory has symbolic links to the different tools included.
The system requirements for the Live
Hacking DVD and CD are quite reasonable. A fast Pentium 3 or any Pentium
4 class processor (or greater) is sufficient. For the desktop version
512MB of memory is required with 1GB recommended. For the command line
version just 128MB of memory is needed.
Please accept the terms of use below to gain access to the ISO images:
Live Hacking DVD, Version 1.3TDC Beta May 17, 2011, ISO-MD5 Hash: 78876a830dc9bc779cd4b2fed10c61a1I acknowledge that the provided tools and techniques are to educate, introduce and demonstrate various ethical hacking techniques. I should not use these techniques and tools for any illegal or malicious activities, and I should not use any of the described techniques and tools in an attempt to compromise any computer system.I acknowledge that the contents of the provided media are provided “as is”. No warranties of any kind, either express or implied, including, but not limited to, the implied warranties of solutions and instructions for a particular purpose, are made in relation to the accuracy, reliability or contents of the mentioned tools in this media.I acknowledge, the provided tools are not authored by Dr. Ali Jahangiri and in many cases are submitted by the companies or security communities. While every reasonable effort is made to ensure that these programs do what is claimed, Dr. Ali Jahangiri will not be held accountable for any damage or distress caused by the proper or improper usage of these materials, and makes no guarantee in regards to their operation or suitability for any specific purpose.
No comments:
Post a Comment