Back to Results
First PageMeta Content
Software testing / Cross-platform software / Computer network security / Hacking / BackTrack / KDE / OpenVAS / Nessus / Vulnerability scanner / Software / System software / Computer security


P a g e |1 BackTrack 5 tutorial Part I: Information gathering and VA tools Karthik R, Contributor You can read the original story here, on SearchSecurity.in.
Add to Reading List

Document Date: 2012-02-07 06:48:44


Open Document

File Size: 778,49 KB

Share Result on Facebook

City

Joomla / /

Company

CISCO / /

/

Facility

National Institute of Technology / port Here / /

IndustryTerm

action Web application scanners / network analysis tool / conclusive foot-printing / joomscan tool / Apache server / information gathering tools / vulnerability assessment tool / target information such as services / penetration testing tools / search algorithm / target network / vulnerability assessment tools / remote systems / web application analysis / /

Organization

Institute of Technology / /

Person

Karthik / /

Position

author / /

Product

BackTrack 5 / /

ProgrammingLanguage

PHP / /

Technology

PHP / operating system / search algorithm / client/server / VOIP / firewall / Information Technology / /

URL

http /

SocialTag