{"id":2054,"date":"2009-07-04T16:10:04","date_gmt":"2009-07-04T14:10:04","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/"},"modified":"2009-07-04T16:10:04","modified_gmt":"2009-07-04T14:10:04","slug":"backtrack-4-cheat-sheet","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/","title":{"rendered":"Backtrack 4 cheat sheet"},"content":{"rendered":"<h4>\n<p><a href=\"\/wp-content\/uploads\/2009\/07\/image.png\" target=\"_blank\" rel=\"noopener\"><font size=\"2\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"92\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/07\/image_thumb.png\" width=\"320\" border=\"0\" \/><\/font><\/a><\/p>\n<p><font size=\"2\">Download backtrack from <\/font><font size=\"2\">http:\/\/www.remote-exploit.org\/backtrack_download.html<\/font><font size=\"2\">. Current version at the time of writing is BT4 Pre-Final.This document is based on BT4 pre-final. Ergo, some of the instructions below may not work with other versions of BT.<\/font><\/p>\n<p><font size=\"2\">FYI : An excellent guide about Backtrack4 can be found at <a title=\"BackTrack 4 \u2013 The Definitive Guide\" href=\"http:\/\/www.offensive-security.com\/backtrack4-guide-tutorial.pdf\">BackTrack 4 \u2013 The Definitive Guide<\/a><\/font>&#160;<\/p>\n<\/h4>\n<p>&#160;<\/p>\n<h4>1. Installing Backtrack to a harddrive (using Ubiquity)<\/h4>\n<p><a title=\"http:\/\/www.offensive-security.com\/videos\/install-backtrack-hard-disk\/install-backtrack-hard-disk.html\" href=\"http:\/\/www.offensive-security.com\/videos\/install-backtrack-hard-disk\/install-backtrack-hard-disk.html\">http:\/\/www.offensive-security.com\/videos\/install-backtrack-hard-disk\/install-backtrack-hard-disk.html<\/a><\/p>\n<ul>\n<li>Boot from the Backtrack DVD and choose \u201cStart Backtrack in Text Mode\u201d <\/li>\n<li>Backtrack will boot and will automatically end up at a root prompt. <\/li>\n<li>Launch the GUI by running \u2018<em>startx<\/em>\u2019. <\/li>\n<li>Open a konsole and run \u2018<em>ubiquity<\/em>\u2019. <\/li>\n<li>At the \u201cLanguage crashed\u201d dialog, choose \u201cContinue anyway'\u201d <\/li>\n<li>Set timezone and choose keyboard layout. <\/li>\n<li>Let backtrack partition the disk. (\u2018Use entire disk\u2019) <\/li>\n<li>Enter new user account information. (Pick a strong password, as this will be the user account used to log on into Backtrack) <\/li>\n<li>Review the installation summary and press \u201cinstall\u201d to start the installation. <\/li>\n<li>Reboot when installation has completed <\/li>\n<li>Log in with the newly created user <\/li>\n<li>change the password for root (<em>sudo passwd root<\/em>) <\/li>\n<\/ul>\n<p>Installing VirtualBox guest additions (if you have installed BT on VirtualBox) :<\/p>\n<ul>\n<li>In Virtualbox, select \u201cDevices - Install Guest Additions\u201d) <\/li>\n<li>open Konsole, mount cdrom (\u201c<em>mount cdrom<\/em>\u201d) and run \u201c<em>sudo \/media\/cdrom\/VBoxLinuxAdditions-x86.run<\/em>\u201d <\/li>\n<li>reboot (\u201c<em>sudo reboot<\/em>\u201d) <\/li>\n<\/ul>\n<p>&#160;<\/p>\n<h4>2. Running Backtrack from USB (with support for persistent changes)<\/h4>\n<p>Check out Backtrack 4 USB Install - Offensive Security and http:\/\/forums.remote-exploit.org\/backtrack-4-howto\/23652-bt4-usb-installation-noob-proof-tutorial.html<\/p>\n<p>This procedure only works for Backtrack 4 Pre-final. You need a 4Gb (or bigger) USB stick to run BT4 Pre-Final.<\/p>\n<ul>\n<li>Boot Backtrack and insert the USB. In my test environment, I\u2019m running BT on VirtualBox. Let\u2019s say the USB was detected as <em>sda<\/em> (run \u2018dmesg\u2019 to see system messages after you have connected the USB) . <br \/><a href=\"\/wp-content\/uploads\/2009\/07\/image1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"112\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/07\/image_thumb1.png\" width=\"359\" border=\"0\" \/><\/a> <\/li>\n<li>Mount the Backtrack CDRom\n<ul>\n<li>mount \/dev\/cdrom \/media\/cdrom <\/li>\n<\/ul>\n<\/li>\n<li>Run fdisk :\n<ul>\n<li>fdisk \/dev\/sda\n<ul>\n<li>Verify that there are no partitions :&#160; \u2018p\u2019&#160;&#160; (or use&#160; \u2018d\u2019 to remove any existing partitions, \u2018w\u2019 to write the changes, and run fdisk again) <\/li>\n<li>create a new partion : \u2018n\u2019\n<ul>\n<li>p&#160;&#160; (primary) <\/li>\n<li>Partition number 1 <\/li>\n<li>First cilinder : use default 1 <\/li>\n<li>Last cylinder : +1500M <\/li>\n<\/ul>\n<\/li>\n<li>create another new partition : \u2018n\u2019\n<ul>\n<li>p&#160;&#160;&#160; (primary) <\/li>\n<li>Partition number 2 <\/li>\n<li>First cilinder : use default value <\/li>\n<li>Last cylinder : +1500M <\/li>\n<\/ul>\n<\/li>\n<li>Set first partition active and set partition type of first partition to FAT32\n<ul>\n<li>a\n<ul>\n<li>1 <\/li>\n<\/ul>\n<\/li>\n<li>t\n<ul>\n<li>1 <\/li>\n<li>b <\/li>\n<\/ul>\n<\/li>\n<li>Look at the partition table now. There should be 2 partitions of each 1,5G <br \/><a href=\"\/wp-content\/uploads\/2009\/07\/image2.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"102\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/07\/image_thumb2.png\" width=\"368\" border=\"0\" \/><\/a> <\/li>\n<li>write the changes to disk : \u2018w\u2019 <\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Format the 2 partitions :\n<ul>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">mkfs.vfat -F 32 -n BT4 \/dev\/sda1 mkfs.ext3 -b 4096 -L casper-rw \/dev\/sda2<\/pre>\n<p>Use the default journal size (8192 blocks)<\/p>\n<\/p><\/div>\n<\/ul>\n<\/li>\n<li>Mount the USB key and copy the file structure from the CDRom to USB stick\n<ul>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">mkdir \/mnt\/sda1 mount \/dev\/sda1 \/mnt\/sda1 rsync -avh \/media\/cdrom\/ \/mnt\/sda1\/ <\/pre>\n<p>(don\u2019t forget the backslashes after \u2018cdrom\u2019 and after \u2018sda1\u2019 !)<\/p>\n<\/p><\/div>\n<\/ul>\n<\/li>\n<li>When all files are copied (1,32Gbytes, may take a little while) , run grub-install\n<ul>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">grub-install --no-floppy --root-directory=\/mnt\/sda1 \/dev\/sda1<\/pre>\n<p><a href=\"\/wp-content\/uploads\/2009\/07\/image3.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" height=\"155\" alt=\"image\" src=\"\/wp-content\/uploads\/2009\/07\/image_thumb3.png\" width=\"435\" border=\"0\" \/><\/a> <\/p>\n<\/p><\/div>\n<\/ul>\n<\/li>\n<li>Edit boot menu\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">vi \/mnt\/sda1\/boot\/grub\/menu.lst<\/pre>\n<\/p><\/div>\n<div>Set \u2018default\u2019 to 5<\/div>\n<div>Find the entry with title \u201cStart Persistent Live CD\u201d. Change the title to for example \u201cStart Persistent Live USB\u201d.<\/div>\n<div>Edit the line below the title (\u201ckernel\u201d line) and add the following statement at the end of the line :<\/div>\n<div>vga=0x317 <\/div>\n<div>Save the changes<\/div>\n<\/li>\n<li>Unmount the USB key\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">cd \/ umount \/mnt\/sda1<\/pre>\n<\/p><\/div>\n<\/li>\n<\/ul>\n<p>&#160;<\/p>\n<ul>\n<li>Boot a computer from this newly created USB and verify that BT works, and that changes are written onto the USB.&#160; <\/li>\n<\/ul>\n<p>&#160;<\/p>\n<p>Alternatively, you can create a USB based BT from Windows by using <a href=\"http:\/\/unetbootin.sourceforge.net\/\" target=\"_blank\" rel=\"noopener\">UNetbootin<\/a> (Windows).<\/p>\n<p>Partition the USB drive (as explained above), run UNetbootin, select the BT4 Pre-final ISO file, select the USB drive and install.<\/p>\n<p>After the installation, find syslinux.cfg in the root of the first partition on the USB.&#160; Edit the file and add the vga=0x317 parameter after \u201cStart Persistent Live CD\u201d (under label ubnentry4)<\/p>\n<p>At the top of the file, set default to ubnentry4. Save the file and you\u2019re all set<\/p>\n<p>&#160;<\/p>\n<h4>3. Networking and Network Services<\/h4>\n<p><strong><u>Networking<\/u><\/strong><\/p>\n<p>By default, DHCP (or networking for that matter) is disabled. You need to run \u2018<em>\/etc\/init.d\/networking start<\/em>\u2019 to start networking. If you want to load networking at boot (on a HD install or USB with persistent changes), add that command into \/etc\/init.d\/rc.local or run \u201c<em>sudo \/usr\/sbin\/update-rc.d networking defaults<\/em>\u201d<\/p>\n<p>Wireless networking can be started with Knetworkmanager (run \u201c<em>sudo<\/em> <em>\/etc\/init.d\/NetworkManager\u201d<\/em>)<\/p>\n<p><strong><u>SSH<\/u><\/strong><\/p>\n<p>Edit ssh config and disable root logon via ssh :<\/p>\n<p><em>sudo vi \/etc\/ssh\/sshd_config<\/em>&#160; and set \u201cPermitRootLogin\u201d to no.<\/p>\n<p>If you get an error about the ssh_host_dsa_key or ssh_host_rsa_key not being found, generate the keys and try again<\/p>\n<p><em>Starting OpenBSD Secure Shell server: sshd <\/p>\n<p><\/em><em>Could not load host key: \/etc\/ssh\/ssh_host_dsa_key<\/em><em> <\/p>\n<p>Could not load host key: \/etc\/ssh\/ssh_host_rsa_key<\/em><\/p>\n<p>Generate host keys :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">ssh-keygen -t dsa -f \/etc\/ssh\/ssh_host_dsa_key ssh-keygen -t rsa -f \/etc\/ssh\/ssh_host_rsa_key<\/pre>\n<\/p><\/div>\n<p>Start sshd (\u201c<em>sudo \/etc\/init.d\/ssh start\u201d)<\/em><\/p>\n<p>If you want to enable ssh to start at boot time, run <em>update-rc.d ssh defaults<\/em><\/p>\n<p>&#160;<\/p>\n<p><em><\/em><\/p>\n<h4>&#160;<\/h4>\n<h4>4. Keeping Backtrack up-to-date<\/h4>\n<div><strong><u>Updating &amp; Upgrading Backtrack<\/u><\/strong><\/div>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">\/usr\/bin\/apt-get -y update \/usr\/bin\/apt-get -y upgrade<\/pre>\n<\/p><\/div>\n<p>To download and install all new updates, run <em>apt -get dist- upgrade<\/em><\/p>\n<p>The first time you run the apt-get update, you may get an error \u201cGPG error : <a href=\"http:\/\/ppa.launchpad.net\">http:\/\/ppa.launchpad.net<\/a> intrpid Release: The following signatures couln\u2019t be verified because the public key\u2026\u201d<\/p>\n<p>Quick fix :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">wget http:<span style=\"color: #008000\">\/\/apt.pearsoncomputing.net\/public.gpg<\/span> sudo apt-key add <span style=\"color: #0000ff\">public<\/span>.gpg rm <span style=\"color: #0000ff\">public<\/span>.gpg<\/pre>\n<\/p><\/div>\n<p>(Then run the apt-get update again and it should work)<\/p>\n<p>Upgrading the distro to the lastest version :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">apt-get update &amp;&amp; apt-get dist-upgrade -y<\/pre>\n<\/p><\/div>\n<p>Warning : an \u201cupgrade\u201d&#160; in BT4Beta will also upgrade KDE to 3.5.. If KDE is not working anymore after update\/upgrade&#160; ?&#160; (a.k.a. \u2018startx\u2019 does not seem to work) :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt:~# cd \/etc\/alternatives\/ root@bt:\/etc\/alternatives# mv x-session-manager x-session-manager-broken root@bt:\/etc\/alternatives# ln -s \/opt\/kde3\/bin\/startkde x-session-manager root@bt:\/etc\/alternatives# startx<\/pre>\n<\/p><\/div>\n<p>(this issue should be fixed in the final version)<\/p>\n<p>&#160;<\/p>\n<div>&#160;<\/div>\n<p>&#160;<strong><u>Updating security components<\/u><\/strong><\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">\/pentest\/exploits\/fast-track.py -i<\/pre>\n<\/p><\/div>\n<p>First update fast-track, then update other individual components (Metasploit, Aircrack, nikto, etc; or choose \u20189\u2019 to update all)<\/p>\n<p>If updating nikto doesn\u2019t work :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">Updating Nikto... cd: 1: can't cd to \/pentest\/scanners\/nikto\/ \/bin\/sh: .\/nikto.pl: not found <\/pre>\n<\/p><\/div>\n<p>Fix :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt:~# mkdir \/pentest\/scanners\/nikto\/ root@bt:~# ln -s \/usr\/bin\/nikto \/pentest\/scanners\/nikto\/nikto.pl root@bt:\/pentest\/exploits\/~# .\/fast-track -c 1 2<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p>&#160;<\/p>\n<h4>5. Change keyboard layout<\/h4>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">dpkg-reconfigure console-setup<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p>&#160;<\/p>\n<h4>6. Installing Nessus<\/h4>\n<p>First, download the Nessus and NessusClient installation packages from the Nessus (Tenable Network Security) website : <a title=\"http:\/\/www.nessus.org\/download\/\" href=\"http:\/\/www.nessus.org\/download\/\">http:\/\/www.nessus.org\/download\/<\/a><\/p>\n<p>(Choose \u2018Nessus for Linux\u2019) and download the packages for Ubuntu. Put the .deb files in \/tmp<\/p>\n<p><strong><u>Install Nessus Daemon<\/u><\/strong><\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# ls Nessus* -al -rw-r--r-- 1 root root 3002846 Jul 4 15:46 Nessus-4.0.1-ubuntu810_i386.deb -rw-r--r-- 1 root root 500624 Jul 4 15:46 NessusClient-4.0.1-ubuntu810_i386.deb root@bt4-1:\/tmp# root@bt4-1:\/tmp# <strong>dpkg --install Nessus-4.0.1-ubuntu810_i386.deb<\/strong> Selecting previously deselected package nessus. (Reading database ... 183074 files and directories currently installed.) Unpacking nessus (from Nessus-4.0.1-ubuntu810_i386.deb) ... Setting up nessus (4.0.1) ... nessusd (Nessus) 4.0.1. <span style=\"color: #0000ff\">for<\/span> Linux (C) 1998 - 2009 Tenable Network Security, Inc. - Please run \/opt\/nessus\/sbin\/nessus-adduser to add a user - Register your Nessus scanner at http:<span style=\"color: #008000\">\/\/www.nessus.org\/register\/ to obtain<\/span> all the newest plugins - You can start nessusd by typing \/etc\/init.d\/nessusd start root@bt4-1:\/tmp# <\/pre>\n<\/p><\/div>\n<p><strong><u>Install Nessus Client<\/u><\/strong><\/p>\n<p>Before installing the client, you will need to install some dependencies :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>apt-get install libqt4-core libqt4-gui libqtcore4 libqt4-network libqt4-script libqt4-xml libqt4-dbus libqt4-test libqtgui4 libqt4-svg libqt4-opengl libqt4-designer libqt4-assistant<\/strong> Reading package lists... Done Building dependency tree Reading state information... Done libqtcore4 <span style=\"color: #0000ff\">is<\/span> already the newest version. libqtcore4 set to manually installed. libqt4-network <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-network set to manually installed. libqt4-script <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-script set to manually installed. libqt4-xml <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-xml set to manually installed. libqt4-dbus <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-dbus set to manually installed. libqt4-test <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-test set to manually installed. libqtgui4 <span style=\"color: #0000ff\">is<\/span> already the newest version. libqtgui4 set to manually installed. libqt4-svg <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-svg set to manually installed. libqt4-designer <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-designer set to manually installed. libqt4-assistant <span style=\"color: #0000ff\">is<\/span> already the newest version. libqt4-assistant set to manually installed. The following NEW packages will be installed: libqt4-core libqt4-gui libqt4-opengl 0 upgraded, 3 newly installed, 0 to remove and 0 not upgraded. Need to get 176kB of archives. After <span style=\"color: #0000ff\">this<\/span> operation, 762kB of additional disk space will be used. Get:1 http:<span style=\"color: #008000\">\/\/archive.offensive-security.com pwnsauce\/main libqt4-core 4.4.3-0ubuntu1.2 [7562B]<\/span> Get:2 http:<span style=\"color: #008000\">\/\/archive.offensive-security.com pwnsauce\/main libqt4-opengl 4.4.3-0ubuntu1.2 [161kB]<\/span> Get:3 http:<span style=\"color: #008000\">\/\/archive.offensive-security.com pwnsauce\/main libqt4-gui 4.4.3-0ubuntu1.2 [7554B]<\/span> Fetched 176kB <span style=\"color: #0000ff\">in<\/span> 1s (114kB\/s) debconf: apt-extracttemplates failed: Bad file descriptor Selecting previously deselected package libqt4-core. (Reading database ... 183131 files and directories currently installed.) Unpacking libqt4-core (from ...\/libqt4-core_4.4.3-0ubuntu1.2_i386.deb) ... Selecting previously deselected package libqt4-opengl. Unpacking libqt4-opengl (from ...\/libqt4-opengl_4.4.3-0ubuntu1.2_i386.deb) ... Selecting previously deselected package libqt4-gui. Unpacking libqt4-gui (from ...\/libqt4-gui_4.4.3-0ubuntu1.2_i386.deb) ... Setting up libqt4-core (4.4.3-0ubuntu1.2) ... Setting up libqt4-opengl (4.4.3-0ubuntu1.2) ... Setting up libqt4-gui (4.4.3-0ubuntu1.2) ... Processing triggers <span style=\"color: #0000ff\">for<\/span> libc6 ... ldconfig deferred processing now taking place<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p>Now you can install the client :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>dpkg --install NessusClient-4.0.1-ubuntu810_i386.deb<\/strong> Selecting previously deselected package nessusclient. (Reading database ... 183150 files and directories currently installed.) Unpacking nessusclient (from NessusClient-4.0.1-ubuntu810_i386.deb) ... Setting up nessusclient (4.0.1) ...<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p><strong><u>Create Certificate <\/u><\/strong><\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>\/opt\/nessus\/sbin\/nessus-mkcert<\/strong> ------------------------------------------------------------------------------- Creation of the Nessus SSL Certificate ------------------------------------------------------------------------------- This script will now ask you the relevant information to create the SSL certificate of Nessus. Note that <span style=\"color: #0000ff\">this<\/span> information will *NOT* be sent to anybody (everything stays local), but anyone with the ability to connect to your Nessus daemon will be able to retrieve <span style=\"color: #0000ff\">this<\/span> information. CA certificate life time <span style=\"color: #0000ff\">in<\/span> days [1460]: Server certificate life time <span style=\"color: #0000ff\">in<\/span> days [365]: Your country (two letter code) [FR]: BE Your state or province name [none]: WVL Your location (e.g. town) [Paris]: Deerlijk Your organization [Nessus Users United]: Corelan Congratulations. Your server certificate was properly created. The following files were created : . Certification authority : Certificate = \/opt\/nessus<span style=\"color: #008000\">\/\/com\/nessus\/CA\/cacert.pem<\/span> Private key = \/opt\/nessus<span style=\"color: #008000\">\/\/var\/nessus\/CA\/cakey.pem<\/span> . Nessus Server : Certificate = \/opt\/nessus<span style=\"color: #008000\">\/\/com\/nessus\/CA\/servercert.pem<\/span> Private key = \/opt\/nessus<span style=\"color: #008000\">\/\/var\/nessus\/CA\/serverkey.pem<\/span> root@bt4-1:\/tmp# <\/pre>\n<\/p><\/div>\n<p><strong><u><\/u><\/strong><\/p>\n<p><strong><u>Create a Nessus user<\/u><\/strong><\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>\/opt\/nessus\/sbin\/nessus-adduser<\/strong> Login : MyGreatNessusAdminUser Authentication (pass\/cert) : [pass] Login password : Login password (again) : Do you want <span style=\"color: #0000ff\">this<\/span> user to be a Nessus <span style=\"color: #006080\">'admin'<\/span> user ? (can upload plugins, etc...) (y\/n) [n]: y User rules ---------- nessusd has a rules system which allows you to restrict the hosts that peter has the right to test. For instance, you may want him to be able to scan his own host only. Please see the nessus-adduser manual <span style=\"color: #0000ff\">for<\/span> the rules syntax Enter the rules <span style=\"color: #0000ff\">for<\/span> <span style=\"color: #0000ff\">this<\/span> user, and enter a BLANK LINE once you are done : (the user can have an empty rules set) Aborted by end-user.<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p><strong><u>Register\/update plugins<\/u><\/strong><\/p>\n<p>Get yourself a key that will provide access to the free home update feed&#160; : Register a HomeFeed<\/p>\n<p>You will receive an email that contains the feed code.<\/p>\n<p>Install\/Register the code with the following command (and update the plugins at the same time) :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>\/opt\/nessus\/bin\/nessus-fetch --register PUT-YOUR-CODE-HERE <\/strong>Your activation code has been registered properly - thank you. Now fetching the newest plugin set from plugins.nessus.org... Your Nessus installation <span style=\"color: #0000ff\">is<\/span> now up-to-date. If auto_update <span style=\"color: #0000ff\">is<\/span> set to <span style=\"color: #006080\">'yes'<\/span> <span style=\"color: #0000ff\">in<\/span> nessusd.conf, Nessus will update the plugins by itself.<\/pre>\n<\/p><\/div>\n<p>Verify that \u201cauto_update\u201d in \/opt\/nessus\/etc\/nessus\/nessusd.conf is set according to the behaviour you want to achieve. If you want to manually update the plugins, you can run :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>\/opt\/nessus\/sbin\/nessus-update-plugins<\/strong> Fetching the newest updates from nessus.org... Done. The Nessus server will restart when its scans are finished<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p><strong><u>Make sure Nessus does not start at boot<\/u><\/strong><\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>update-rc.d -f nessusd remove<\/strong> Removing any system startup links <span style=\"color: #0000ff\">for<\/span> \/etc\/init.d\/nessusd ... \/etc\/rc0.d\/K20nessusd \/etc\/rc1.d\/K20nessusd \/etc\/rc2.d\/S20nessusd \/etc\/rc3.d\/S20nessusd \/etc\/rc4.d\/S20nessusd \/etc\/rc5.d\/S20nessusd \/etc\/rc6.d\/K20nessusd<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p><strong><u>Launch Nessus daemon<\/u><\/strong><\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt4-1:\/tmp# <strong>\/etc\/init.d\/nessusd start<\/strong> Starting Nessus : . root@bt4-1:\/tmp# <\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<p><strong><u>Install additional plugins<\/u><\/strong><\/p>\n<p><a title=\"http:\/\/www.alienvault.com\/free_feed_for_nessus.php\" href=\"http:\/\/www.alienvault.com\/free_feed_for_nessus.php\">http:\/\/www.alienvault.com\/free_feed_for_nessus.php<\/a><\/p>\n<p><a title=\"OpenVAS wrapper for ike-scan\" href=\"\/index.php\/2009\/01\/31\/nessus-wrapper-for-ike-scan\/\">Nessus\/OpenVAS wrapper for ike-scan<\/a><\/p>\n<p>&#160;<\/p>\n<p>&#160;<\/p>\n<h4>7. Wireless auditing<\/h4>\n<p>Crack WEP : <a title=\"Cheatsheet - Cracking WEP with Backtrack 4 and aircrack-ng\" href=\"\/index.php\/2009\/02\/20\/cheatsheet-cracking-wep-with-backtrack-4-and-aircrack-ng\/\">Cheatsheet - Cracking WEP with Backtrack 4 and aircrack-ng<\/a><\/p>\n<p>Crack WPA2 PSK : <a title=\"Cheatsheet - Cracking WPA2 PSK with Backtrack 4, aircrack-ng and John The Ripper\" href=\"\/index.php\/2009\/02\/24\/cheatsheet-cracking-wpa2-psk-with-backtrack-4-aircrack-ng-and-john-the-ripper\/\">Cheatsheet - Cracking WPA2 PSK with Backtrack 4, aircrack-ng and John The Ripper<\/a><\/p>\n<p>Wepbuster : Download from <a title=\"http:\/\/code.google.com\/p\/wepbuster\/\" href=\"http:\/\/code.google.com\/p\/wepbuster\/\">http:\/\/code.google.com\/p\/wepbuster\/<\/a>. Installation procedure (assuming that wepbuster was downloaded into \/tmp) :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">root@bt:\/# cd \/tmp root@bt:\/tmp# tar xvfz wepbuster.tgz wepbuster-1.0_beta\/ wepbuster-1.0_beta\/README.TXT wepbuster-1.0_beta\/wepbuster root@bt:\/tmp# mv wepbuster-1.0_beta\/wepbuster \/usr\/local\/bin root@bt:\/tmp# <\/pre>\n<\/p><\/div>\n<p>Modify parameters :<\/p>\n<p>edit wepbuster and change the $airodumpwait and $scan_duration parameters (and set them to a value higher than 20):<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\"># Time to wait before reading the airodump output. 23 seconds\/sleeps should be safe on <span style=\"color: #0000ff\">default<\/span> aircrack -ng installation which updates ] # .csv files every 20 seconds; my $airodumpwait = 23 ; # Initial airodump scan duration (sleeps) when trying to build target AP list my $scan_duration = 23;<\/pre>\n<\/p><\/div>\n<p>&#160;<\/p>\n<h4>8. Installing\/Running in VMWare, but KDE resolution is bad ?<\/h4>\n<p>Run \u201c<em>fixvmware\u201d<\/em><\/p>\n<p>&#160;<\/p>\n<h4>9. Log on in KDE with root (dangerous ! But if you still want to do it\u2026)<\/h4>\n<p>Edit \/etc\/kde3\/kdm\/kdmrc&#160; and set the following parameters :<\/p>\n<div>\n<pre style=\"padding-right: 0px; padding-left: 0px; font-size: 8pt; padding-bottom: 0px; margin: 0em; overflow: visible; width: 100%; color: black; border-top-style: none; line-height: 12pt; padding-top: 0px; font-family: consolas, &#39;Courier New&#39;, courier, monospace; border-right-style: none; border-left-style: none; background-color: #f4f4f4; border-bottom-style: none\">AllowRootLogin=<span style=\"color: #0000ff\">true<\/span> AutoLoginEnable=<span style=\"color: #0000ff\">true<\/span> AutoLoginUser=root AutoLoginPass=secret <\/pre>\n<\/p><\/div>\n<p>Reboot<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Download backtrack from http:\/\/www.remote-exploit.org\/backtrack_download.html. Current version at the time of writing is BT4 Pre-Final.This document is based on BT4 pre-final. Ergo, some of the instructions below may not work with other versions of BT. FYI : An excellent guide about Backtrack4 can be found at BackTrack 4 \u2013 The Definitive Guide&#160; &#160; 1. Installing Backtrack &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Backtrack 4 cheat sheet\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[64,127],"tags":[3734,1512,1475,204,131],"class_list":["post-2054","post","type-post","status-publish","format-standard","hentry","category-linux","category-security","tag-wpa-wpa2","tag-wireless","tag-nessus","tag-backtrack","tag-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Backtrack 4 cheat sheet - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backtrack 4 cheat sheet - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Download backtrack from http:\/\/www.remote-exploit.org\/backtrack_download.html. Current version at the time of writing is BT4 Pre-Final.This document is based on BT4 pre-final. Ergo, some of the instructions below may not work with other versions of BT. FYI : An excellent guide about Backtrack4 can be found at BackTrack 4 \u2013 The Definitive Guide&#160; &#160; 1. Installing Backtrack &hellip; Continue reading &quot;Backtrack 4 cheat sheet&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2009-07-04T14:10:04+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Backtrack 4 cheat sheet\",\"datePublished\":\"2009-07-04T14:10:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/\"},\"wordCount\":1204,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"wpa wpa2\",\"wireless\",\"nessus\",\"backtrack\",\"Linux and Unix\"],\"articleSection\":[\"Linux and Unix\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/\",\"name\":\"Backtrack 4 cheat sheet - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2009-07-04T14:10:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/07\\\/04\\\/backtrack-4-cheat-sheet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backtrack 4 cheat sheet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backtrack 4 cheat sheet - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/","og_locale":"en_US","og_type":"article","og_title":"Backtrack 4 cheat sheet - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Download backtrack from http:\/\/www.remote-exploit.org\/backtrack_download.html. Current version at the time of writing is BT4 Pre-Final.This document is based on BT4 pre-final. Ergo, some of the instructions below may not work with other versions of BT. FYI : An excellent guide about Backtrack4 can be found at BackTrack 4 \u2013 The Definitive Guide&#160; &#160; 1. Installing Backtrack &hellip; Continue reading \"Backtrack 4 cheat sheet\"","og_url":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2009-07-04T14:10:04+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Backtrack 4 cheat sheet","datePublished":"2009-07-04T14:10:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/"},"wordCount":1204,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["wpa wpa2","wireless","nessus","backtrack","Linux and Unix"],"articleSection":["Linux and Unix","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/","url":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/","name":"Backtrack 4 cheat sheet - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2009-07-04T14:10:04+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2009\/07\/04\/backtrack-4-cheat-sheet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Backtrack 4 cheat sheet"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":106555,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/2054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=2054"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/2054\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=2054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=2054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=2054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}