HACKING

BackTrack Hacking

စာအုပ်ပါအချက်အလက်များအနည်းငယ်​ဖော်ပြချက်


  1. Up and Running with BackTrack
  2. Customizing BackTrack
  3. Information Gathering
  4. Vulnerability Identification
  5. Exploitation
  6. Privilege Escalation
  7. Wireless Network Analysis
  8. Voice over IP(VoIP)
  9. Password Cracking
  10. BackTrack Forensics


Post a Comment