An overview of penetration testing with Backtrack. Walks through the enumeration, exploitation, and post exploitation process.Read less