Contents
◾
xi
Using Exploit-db with BackTrack .................................................................................. 136
Searching for Exploits inside BackTrack .........................................................................137
Conclusion ......................................................................................................................138
Dostları ilə paylaş: