
Jun 5, 2009
The Fingerprinting power in BackTrack4
BackTrack4 fprint configuration guide
If you prefer running your BackTrack4 system in “secure mode” and not always have to type your password … fingerprinting can help you!
In the new BackTrack repository, the packages required to get this running are all in place:
The Installation
The base installation is very simple, just run apt-get to import the required libraries and the fprint-demo GTK software.
The Configuration
To configure the fingerprint sensor, run fprint-demo (you can find it in K -> Accessories -> Fingerprint-demo). Import and save your fingerprint.
Extra stuff
If you to use the fingerprint with the default login method, install pam-fprint. You can use it via console, kdm, kde notifier etc..
Security
BIG sneak preview… It`s possible crack this authentication method, using the “isinglass” method. More info will be posted about this later.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-39914 – Unauthenticated Command Injection in FOG Project’s export.php
Discover details about CVE-2024-39914, a critical unauthenticated command injection vulnerability in FOG Project ≤ 1.5.10.34. Learn how attackers can exploit export.php to execute system commands or deploy persistent webshells.
Jun 26, 2025
2 min read

OffSec News
What It Really Means to “Try Harder”
Discover how OffSec’s “Try Harder” mantra evolved into a mindset, and how it helps learners build grit, creativity, and real-world problem-solving skills.
Jun 23, 2025
7 min read

Research & Tutorials
CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage
CVE-2025-3248 is a critical RCE vulnerability in Langflow that allows unauthenticated attackers to execute arbitrary Python code via unsanitized input to exec(). Learn how it works and how to protect your system.
Jun 18, 2025
2 min read