BackBox Linux penetration tests now and out of the cloud

The operating BackBox Linux designed for penetration testing, hacking και άλλες δοκιμές ασφαλείας είναι από σήμερα διαθέσιμο στο Amazon Web ().

Εάν θέλετε μπορείτε να τρέξετε το BackBox Linux στο σύννεφο, από το λογαριασμό σας στο AWS, καθώς είναι πλέον διαθέσιμο στην πλατφόρμα cloud της Amazon Web Services σαν εικονική συσκευή AMI (Amazon Image) που μπορείτε να εγκαταστήσετε με μερικά clicks.BackBox Linux

The BackBox Linux operating system is based on Ubuntu and promises to offer Amazon Web Services users an optimal environment for professional penetration penetration testing as it has a remarkable collection of the best hacking tools

Available only for members of BackBox Linux

The BackBox Linux team promises reliable access to your Amazon Web Services (AWS) virtual server at all times. The team reports that there are a few custom settings for each case, which will allow you to have all the e.g you need for top performance, high reliability and availability.

BackBox Linux at AWS is currently only available for BackBox members, so those who are interested in trying to distribute to AWS should pre-subscribe to the official distribution page. Once you sign up, and you need specific hacking tools, you can request them from here.

If you want to run the BackBox on your computer instead of the cloud of Amazon Web Services, you can download the last edition BackBox 5.2, based on the operating system Ubuntu LTS 16.04 ( Xerus). The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).