I'll give it a whirl but I would like to note to others here about (drum roll) relying on tools
I currently use Backtrack (older version) and I have my own security testing distro cobbled together from FreeBSD - minimal view on the "Rage Against the Vista Machine - Social Engineering Toolkit" video (http://www.infiltrated.net/Rage-Against-the-Vista-Machine/
) It's compromised of almost all alternative tools to the usual suspects (e.g., hping vs. nmap ... Scapy, etc.)
Backtrack - and I'm sure Archtrack - place a lot of emphasis on getting cool things working but I found that at times there is a lot of bloat (KDE?...) Also, some of the tool selections are ... "too hip" to be useful. I've found that custom tailoring my own "Backtrack" like clone, I can mix and match specifics, for example, I could probably slap on an entire VoIP pentesting distro alongside backtrack whereas some tools are limited, and some are overkill With that said, good luck with Archtrack, hope to see it come nicely together.
don't be a slacker... Go make your own distro! When I get to work Monday I'll throw together a detailed list of things I have on there if anyone messages me out of curiousity. Also, I noticed on the "defensive/covert" side, I can see Backtrack and others coming a mile away. The tool signatures are almost always the same.