Is it possible to access someone else system without knowing the actual username and password for that system..? Yes, it is possible when you have a live BackTrack bootable disk (or) usb stick.
So, what is Backtrack?
BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm. Interesting right..? Read more about it in Wikipedia.
BackTrack is an Open source operating system. You can get it here for free.
Here, we will see the basic penetration testing using BackTrack.
Quick steps :-
1. Create a live bootable disk (or) USB stick from the image file.
2. Plugin your flash drive (Recommended) into USB and start the system.
3. If the flash drive is not detected, Apply the following changes in BIOS.
BIOS >> BOOT >> ENABLE BOOT USB DEVICES FIRST >> F10 >> SAVE AND EXIT
4. Restart system and the flash drive must be detected now. Choose BackTrack Text mode (Default).
5. When it asks for your Login credentials, Use the following details.
USERNAME : root
PASSWORD : toor
6. Once you are logged in, type startx in the command line. Startx command is used for Graphical interface.
7. Now you have complete access to his system. You can copy files, modify and even delete them.
8. Once you are done, you can just shut down the system and remove your flashdrive.
- Wonder why USB stick is preferred over a live bootable cd or dvd? Read This!
- Having problems in creating a live usb stick? This might help you!
- Is your BIOS protected by a password? Read this article on Bypassing the BIOS password!
- Protect your files from BackTrack Penetration using Truecrypt.
Even though the article here seems to be encouraging hacking, the pure intention is to create awareness among PC users about BackTrack and other penetrations. Also remember, this could help you when you have forgotten the password for your own system or the operating system is corrupted and you are no longer able to access your system. This article is strictly for educational purposes only. The author of this article is in noway responsible for the actions of the reader.