BackTrack 5 Guide II: Exploitation tools and frameworks

By | October 17, 2011

Hi all,

In the first part of this BackTrack 5 guide, we looked at information gathering and vulnerability assessment tools. In the second part of this BackTrack 5 guide, we will use BackTrack 5 tools to exploit a remote system and learn how the exploitation framework can be used with the privilege escalation tool John the Ripper to crack passwords and gain access to a remote Windows system.

Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link:

Keep looking this blog for more on BT5.



Leave a Reply

Your email address will not be published. Required fields are marked *

nineteen + 10 =