An Overview to BackTrack Penetrations Tools
dc.contributor.advisor | Duffany, Jeffrey | |
dc.contributor.author | Grau Ortiz, Keiny J. | |
dc.date.accessioned | 2020-07-22T18:53:49Z | |
dc.date.available | 2020-07-22T18:53:49Z | |
dc.date.issued | 2012 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico | en_US |
dc.description.abstract | Abstract - This paper is in support of a newly created tutorial, focused on different penetration and vulnerabilities tools. These tutorials are specifically designed to provide basic understanding on the functionalities and capabilities of each particular tool. These tools are widely used by computer security personnel, and can be found as a freeware on internet. The use of these tools permits those who work with them to test the reliability of any network. This document contains a brief introduction to each tool, its capabilities and some examples of the results after being use. Key Terms- BackTrack 5, Linux, Penetration Tools, Security | en_US |
dc.identifier.citation | Grau Ortiz, K. J. (2012). An overview to BackTrack penetrations tools [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/465 | |
dc.language.iso | en | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.haspart | San Juan | en_US |
dc.relation.ispartof | Computer Engineering; | |
dc.relation.ispartofseries | Spring-2012; | |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |
dc.rights.license | All rights reserved | en_US |
dc.subject.lcsh | Penetration testing (Computer security) | en_US |
dc.subject.lcsh | Backtrack programming | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | An Overview to BackTrack Penetrations Tools | en_US |
dc.type | Article | en_US |