Blog Archives
BackTrack 5 Guide II: Exploitation tools and frameworks
Hi all,
In the first part of this BackTrack 5 guide, we looked at information gathering and vulnerability assessment tools. In the second part of this BackTrack 5 guide, we will use BackTrack 5 tools to exploit a remote system and learn how the exploitation framework can be used with the privilege escalation tool John the Ripper to crack passwords and gain access to a remote Windows system.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
http://searchsecurity.techtarget.in/tip/BackTrack-5-Guide-II-Exploitation-tools-and-frameworks
Keep looking this blog for more on BT5.
Cheers
3ps!L0nLaMbDa
BackTrack 5 tutorial Part I: Information gathering and VA tools
Greetings!
In this BackTrack 5 penetration testing tutorial, we will look at the information gathering and vulnerability assessment tools in BackTrack 5.
Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:
Cheers
3ps!L0nLaMbDa