What you will learn from this book
1) Install and set up BackTrack 5 on multiple platforms
2) Customize BackTrack to fit your individual needs
3) Exploit vulnerabilities found with Metasploit
4) Locate vulnerabilities Nessus and OpenVAS
5) Provide several solutions to escalate privileges on a compromised machine
6) Learn how to use BackTrack in all phases of a penetration test
7) Crack WEP/WPA/WPA2 Encryption
8) Learn how to monitor and eavesdrop on VOIP networks
1) Install and set up BackTrack 5 on multiple platforms
2) Customize BackTrack to fit your individual needs
3) Exploit vulnerabilities found with Metasploit
4) Locate vulnerabilities Nessus and OpenVAS
5) Provide several solutions to escalate privileges on a compromised machine
6) Learn how to use BackTrack in all phases of a penetration test
7) Crack WEP/WPA/WPA2 Encryption
8) Learn how to monitor and eavesdrop on VOIP networks
0 comments:
Post a Comment