į
ာį”ုį်įါį”įျį်į”įį်įျားį”įį်းįį်įော်įြįျį်
(1)Up and Running with BackTrack
(2)Customizing BackTrack
(3)Information Gathering
(4)Vulnerability Identification
(5)Exploitation
(6)Privilege Escalation
(7)Wireless Network Analysis
(8)Voice over IP(VoIP)
(9)Password Cracking
(10)BackTrack Forensics
