An Overview to BackTrack Penetrations Tools
Abstract
Abstract - This paper is in support of a newly created tutorial, focused on different penetration
and vulnerabilities tools. These tutorials are specifically designed to provide basic understanding on the functionalities and capabilities of each particular tool. These tools are widely used by computer security personnel, and can be found as a freeware on internet. The use of these tools permits those who work with them to test the reliability of any network.
This document contains a brief introduction to each tool, its capabilities and some examples of the results after being use.
Key Terms- BackTrack 5, Linux, Penetration Tools, Security