Pentoo

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment.[3][4][5][6] Based on Gentoo Linux, Pentoo is provided both as 32 and 64-bit installable live CD. Pentoo is also available as an overlay[7] for an existing Gentoo installation. It features packet injection patched wifi drivers, GPGPU cracking software, and many tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches - with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.

Pentoo Linux
Pentoo Linux 2010.0
DeveloperGrimmlin (Michael Zanetta - founder), Zero_Chaos (Rick Farina), blshkv (Anton Bolshakov), Wuodan (Stefan Kuhn), Jensp (Jens Pranaitis)[1]
OS familyUnix-like
Working stateActive[2]
Source modelOpen source
Initial releaseJune 22, 2005 (2005-06-22)
Latest release2019.1 / January 17, 2019 (2019-01-17)
Latest preview2018.0 RC7.1 / July 10, 2018 (2018-07-10)
Update methodEmerge
Package managerPortage with Pentoo overlay
PlatformsIA-32, x86-64
Kernel typeModular (Linux)
UserlandGNU
Default user interfaceXfce4 WM from LiveCD, various
LicenseFree software licenses
(mainly GPL)
Official websitewww.pentoo.ch and development page: github.com/pentoo/

Features

  • Available in 32-bit and 64-bit versions, the latter having a significant speed increase from 32 bits
  • Includes the required environment to crack passwords using GPGPU with openCL and CUDA configured 'out of the box'[8][9][10]
  • Built on hardened linux, including a hardened kernel and toolchain
  • Hardened kernel with extra patches[11]
  • Uses a Pentoo overlay, which allows tools to be built on top of a standard Gentoo build
  • Support for full disk encryption with LUKS if installed on HDD
  • Automated installation[12]

Tools

Tools are installed with versioned ebuilds and open-ended ebuilds,[13] making it possible to pull in the latest subversions and still have installs tracked by package management. The following tool categories are included:[14]

  • Analyzer
  • Bluetooth
  • Cracker
  • Database
  • Development
  • Exploit
  • Footprint
  • Forensics
  • Forging
  • Fuzzers
  • Misc
  • MitM
  • Pentoo
  • Proxy
  • RCE
  • Scanner
  • SIP-VOIP
  • Wireless

Releases

Pentoo uses rolling releases with periodic ISO snapshots of the latest committed updates.

Date Release[15]
2005/06/22 Pentoo 2005.1
2006/02/02 Pentoo 2006.0
2006/07/05 Pentoo 2006.1
2009/12/04 Pentoo 2009.0
2012/07/30 Pentoo 2012.0
2013/03/09 Pentoo 2013.0 RC1.1
2013/07/04 Pentoo 2013.0 RC1.8
2014/08/08 Pentoo 2013.0 RC1.9
2014/03/17 Pentoo 2014.0 RC2.1
2014/08/08 Pentoo 2014.0 RC3
2014/09/25 Pentoo 2014.0 RC3.5
2014/11/16 Pentoo 2014.0 RC3.6
2015/01/05 Pentoo 2015.0 RC3.7
2015/12/02 Pentoo 2015.0 RC4.6[16][17][18]
2016/08/02 Pentoo 2015.0 RC5
2018/03/26 Pentoo 2018.0 RC6.3
2018/07/10 Pentoo 2018.0 RC7.1
2019/01/17 Pentoo 2019.0
gollark: The idea is to horribly abuse things to allow data tunneling over DNS.
gollark: Sort of.
gollark: Thusly, none are safe from osmarksDNS™.
gollark: It now serves RRsets which may violate several standards but appear to work.
gollark: ```osmarks@fenrir ~/P/rsapi (master)> dig @::1 -p5353 osmarks.net; <<>> DiG 9.16.11 <<>> @::1 -p5353 osmarks.net; (1 server found);; global options: +cmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19728;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1;; WARNING: recursion requested but not available;; OPT PSEUDOSECTION:; EDNS: version: 0, flags:; udp: 8192;; QUESTION SECTION:;osmarks.net. IN A;; Query time: 3 msec;; SERVER: ::1#5353(::1);; WHEN: Wed Feb 24 12:43:16 GMT 2021;; MSG SIZE rcvd: 40```

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.