BlackArch Linux – Penetration Testing Distribution

BlackArch – really a very powerful distro for penetration testing. The official sponsor of the development of the distribution is a hacker group NullSecurity, so we can say with certainty that it is a product created by professionals for professionals. BlackArch – a distribution based on ArchLinux. The distribution comes in the form of iso images live version can be download here . It is also fully compatible with of Arch, which allows us to enjoy all its benefits by downloading required from the repositories, good articles about it enough. We consider the live version of this distribution.
After enabling us welcomes the login panel where we can choose the language of the system and window manager. All managers are lightweight without any graphical frills, but it is understandable, because the main goal of this distribution – to be highly functional, user-friendly and not demanding of computer resources, making it a welcome guest on your VirtualBox or Raspberry Pi.

Source: https://blackarch.org

Source: https://blackarch.org

Default username/password: root/blackarch

BlackArch supports i686 and x86_64 architectures. Its main advantage is a wide arsenal of various tools and programs. At the moment, the latest version has a list of more than 1,544 applications.

Source: https://blackarch.org

Source: https://blackarch.org

To summarize, BlackArch is an excellent solution for those who are seriously engaged pentesting or those who work in this field. It has a huge range of specialized tools, but lack of standard software, such as office applications, editors, etc., make it an unwelcome guest in your home machine, but the possibility to install it “on top” of ArchLinux will allow you to enjoy all its benefits in the longer axis assembled or put on top of your ArchLinux ARM. On the other hand, easy graphical environment allows it to run on relatively slow computers.  It can be a substitute for Kali Linux for those who lead a serious research activity in the field of information security.