-
sstumvoll
at February 10,2017
This is a very good video on information gathering and vulnerability analysis, although he moved through it very fast. Using the various tools of Backtack5 you can really reach deeply with very little information Backtrack very powerful. Since I'm not very good with the command line, I would be interested to see the graphical version. I am impressed that it can still gather information even when the firewall is turned on.
-
msharma6
at March 06,2017
Great video! Its a good tutorial to learn what all can be done using backtrack and how powerful this tool can be. It can be very useful to look for vulnerabilities in a network.
-
shubhragupta
at March 11,2017
The video is full of information about the tool Back Track used for penetration testing and forensic investigations. It was very useful in demonstrating ways to look for network vulnerabilities and demonstrate to potential clients. Looks like there are multiple ways to gather information about targets.
-
jahmad
at March 12,2017
This video is a great intro to Back Track. This version of Linux has since been named Kali though. I believe gathering information before carrying out an attack is the key to all successful attacks. The more information you have the more knowledgable you are on how the network works and what avenues you have to exploit. I believe Kali Linux is a great tool for penetration testing as it gives you all the tools.
-
student0
at March 14,2017
The tools demonstrated by the penetration tester are certainly powerful. I do think Maltego appears to be a very useful tools; however, I wonder how much these tools cost. It seems that there are a plethora of tools out there to conduct open source research as well as network reconnaissance. I would like to see how the presenter would use multiple databases/tools to collect and synthesize data.