International Journal of Scientific and Research Publications, Volume 5, Issue 2, February 2015 1 ISSN 2250-3153 www.ijsrp.org BackTrack System: Security against Hacking Munir A. Ghanem Information Technology Department, Northern Border University Abstract- Hacking became one of the world's most famous information technology problem. It's the work of whom doesn't has a work, a work to gain more money, a work to harm others, and a work for many other purposes. Almost every week, if it is not every day, we hear about hacking attacks that hits many significant sites in the country, such as: Ministries, Banks, Uniform sites and many other important persons accounts on the social network sites. Fortunately, not all the hackers are professional in hacking, but they trained them self on one or more of such programs for one of the previous purposes. On the other side, the secret of success in such hacking attacks is that the intended attacked targets did not take the proper precautionary measures to protect themselves from such attacks. In this research, I am focusing on "BackTrack System" and highlight more on its security and protection capabilities that can be used to rise security precautions levels and analyze system network in order to determine weakness points and identify points that attack our system. My research subject is very important, especially in these days, where we heard in almost every week, about an e-attack that hits major sites in my country; Saudi Arabia, while the majority of people frightened , doesn't know how to stop such attack. Index Terms- BackTrack, Hacking, Security, tools. I. INTRODUCTION ue to great developments that occurred in different technology fields and covers most of life aspects, depending on computer applications becomes an issue that no one can evade using it. Computer applications exist in many important sites that can pose a threat to anyone, such as banks, passports general directorate, universities, ministries, emails web hosts, social media sites and many other sensitive country sites. Depending on his interest, the hacker will be having so many options in which site to attack. In the past few months, we heard about many e-attacks that hits many important electronic sites in Saudi Arabia. Unfortunately, these attacks happened without any reaction on how to stop such attacks, nor how to defend against it. The assumed hacker repeated his attack so many times, as he was confident that no one can stop him. In this research, I am going to focus on the security tools of BackTrack system, which are really efficient and capable to analyze and protect from any hacking attack. This operating system "BackTrack" can launch a counter destructive attack. Lastly, our research presentation in front of the discussion committee, will be followed by a practical application to show the security tools of BackTrack. II. PROBLEM DEFINITION Problem that imposes to write this research can be summarized as follows: 1. Clear increase of hacking attacks without any deterrent or knowing how to stop it. 2. Unawareness of many individuals on how to secure their computers. 3. Raise people knowledge on e-piracy culture, and consequently raising knowledge of information security. 4. Active participating in national efforts against hackers attack. III. BACKTRACK SYSTEM 3.1. Definition: It is an operating system based on Ubuntu GNU/Linux distribution aimed at digital forensics and penetration testing use. The most updated version of this operating system is" BackTrack 5", which called "Revolution”[1]. It is intended for all audiences from the most savvy security professionals to early newcomers in the information security field. It consists of many different programs and tools specialized in security, protection and hacking. BackTrack is famous with "Penetration test" that can identify network security weakness. 3.2. History: BackTrack distribution originated from merging of two formerly competing distributions which focused on penetration testing[2]: WHAX: a Slax based Linux distribution that was developed by a security consultant, MatiAharoni; Earlier versions of WHAX were called Whoppix and based on Knoppix. Auditor Security Collection: a Live CD based on Knoppix that was developed by Max Moser, which includes over 300 tools organized in a user-friendly hierarchy. 3.3. Tools: BackTrack system provide users with easy access to a comprehensive and large collection of security-related tools, ranging from port scanners to password crackers. BackTrack includes many well known security tools that can be summarized as follows: Metasploit integration: One of the major contents of Metasploit integration is the Metasploit project, which is used to analyze & test computer network by giving D