
May 10, 2010
BackTrack 4 R1 Dev Public Release
The best information security distribution for penetration testing and security audits. Help us test the R1 Development release.
As promised, we are releasing a BackTrack 4 R1 information security and penetration testing development build to the public for hardware testing. This is an unofficial build which is meant to help the BackTrack Dev team to assess any hardware incompatibilities with the new kernel we have put in place. This is NOT an official release, however we do need your input as to what works and what doesn’t. We are not interested in tracking broken applications as much as hearing how your hardware is fairing – particularly wireless cards, injection support, etc.
What’s Changed:
- Updated all packages, manual update of aircrack-ng.
- Updated to kernel 2.6.34-rc6
- Known to work with broadcom wireless 4312/5.
- No additional drivers installed other than stock kernel drivers.
Known Bugs:
- ATH5K is semi functional – we added patched madwifi-ng drivers as backup.
- VMWare tools does not play nice with the new kernel.
- Only the first boot option is viable, the 800×600 initrd and forensics initrd have not been updated. Do not try to boot the ISO with those options.
PLEASE NOTE : We will be dedicating a SINGLE THREAD in the backtrack forums for hardware issue reports with the R1 release. Forum posts outside of this thread will be deleted.
The testing kernel has been updated in our development repositories. If you want to test it out, you can uncomment the appropriate line in sources.list, and then issue an apt-get update && apt-get dist-upgrade. We ask that you test our new kernel and post your hardware compatibility observations in our forums.
Download:
Download BackTrack R1 Dev here:
md5sum : ea30ac34e58b3cf9902c59baffc62aa7
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability
CVE-2024-12029: A critical deserialization vulnerability in InvokeAI’s /api/v2/models/install endpoint allows remote code execution via malicious model files. Exploit risk for AI art servers.
Jul 17, 2025
0
Research & Tutorials
What is Phishing? Introduction to Phishing Demo (for Beginners)
Learn how phishing attacks work and how to spot them. Watch OffSec’s animated video to protect yourself from scams, spoofed sites, and social engineering.
Jul 15, 2025
2 min read

Research & Tutorials
CVE-2025-27636 – Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass
Discover the critical Apache Camel vulnerability (CVE-2025-27636) that allows remote code execution via case-sensitive HTTP header manipulation in the exec component. Learn how attackers exploit this flaw and how to mitigate it.
Jul 10, 2025
2 min read