Backtrack Hacking Tutorials Full Collection (4DVDs + Bonus) | 7.38 GB
English| FLV | 720×480 | Audio: mp3, 44100 Hz, stereo, 160 kb/s | Video: flv, yuv420p, 29.97 fps(r)
Genre: Video Tutorial

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field.

BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.

Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community. Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available.

Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.

BackTrack 4 Final Changelog
* Kernel – With fragmentation patches, etc.
* Meta-packages removed from base image. Can still be installed from the repository.
* Several “ieee802.11 wireless driver oldies” have been added for versatility.
* Additional (non injecting) wireless drivers added for improved support
* Large number of tool updates
* Large number of bug fixes
* Streamlined kernel updates for future updates
* Frequently updated repositories for security fixes and tool updates

BackTrack 4 Final is out and along with this release come some exciting news, updates, and developments. BackTrack 4 has been a long and steady road, with the release of a beta last year, we decided to hold off on releasing BackTrack 4 Final until it was perfected in every way shape and form.

With this release includes a new kernel, a larger and expanded toolset repository, custom tools that you can only find on BackTrack, and more importantly, fixes to all (well, most..) major bugs that we knew of. This release we received an overwhelming support from the community and we are grateful to everyone that has contributed to the success of this release.

Installing Backtrack 3

Episode 1 Network Hacking Arp Poisoning
Episode 2 Wireless Hacking Cracking WEP
Episode 3 Wireless Hacking DeAuth
Episode 5 Lock Picking Bump Key
Episode 6 Phone Phreaking Beige Box
Episode 7 Phone Phreaking/Network Hacking Sniffing VOIP
Episode 8 Lock Picking DIY Padlock Shims
Episode 9 Lock Picking Mult-Disc Combo Locks
Episode 10 Hacking Basics MD5
Episode 11 Website Hacking Sql Injection
Episode 12 Hacking Basics Backtrack
Episode 13 Website Hacking XSS
Episode 14 Staying Secure SSH Tunnel
Episode 15 Modding Xbox Softmod
Episode 16 Wireless Hacking Cracking WPA
Episode 17 Triple Boot Windows, Backtrack, & Ubuntu
Episode 18 Local Password Cracking
Episode 19 Lock Picking Basics
Episode 20 Ettercap
Episode 21 XSS Tunnel
Episode 22 Playstation 2 Softmod
Episode 23 Cracking WEP Update
Episode 24 Bypass Hotspots Access Controls

Underground Install Backtrack 3 on USB
Underground CSRF(Cross Site Request Forgery)
Underground Alternate Data Streams
Underground Local File Inclusion
Underground Windows Privilege Escalation
Underground Bluetooth Hacking
Underground VMWare
Underground Fix Google Mail Enumerator
Underground Home Made Lock Picks
Underground Downfalls of Anti-Virus Software Part 2
Underground Downfalls of Anti-Virus Software
Underground Evilgrade
Underground Trojan Basics
Underground Manipulating Windows User Accounts
Underground Combine Files
Underground Password Phishing
Underground Windows SMB Relay Exploit
Underground Application Patching
Underground Metasploit Autopwn
Underground Email Spoofing
Underground Introduction

Extracting Database Information from Information Schema
FPGA MD5 Cracker
Arduino ARP Cop
Email Injection
Ping of Death
DNS Spoofing with Virtual Hosts
Bypass Cisco Clean Access & Cisco NAC Appliance
Dual Boot Windows & Backtrack
Sql Injection Challenge How-to
How to use Intel Pro/Wireless 3945ABG in Backtrack 2
Local Privilege Escalation Vulnerability in Cisco VPN Client

Extabit = High Speed