SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
WITH ASSOCIATION OF COMPUTER SOCIETY OF
INDIA
&
GUIDELINES GIVEN BY A.I.C.T.E FOR VOCATION
STUDIES
CREZONE TECHNOLOGIES STARTING
VOCATIONAL  INDUSTRIAL
TRAINING
FOR
M.C.A / B.TECH (C.S.E/ I.T./ E.C.E) / M.TECH
(C.S.E / I.T./ E.C.E)
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
TRAINING CONTENTS STRUCTURE DURATION : 6 MONTHS
MODULE – I
System Hacking
 Operating System hacking
 Virtualization
 Password Cracking
 Customizing Windows
 Operating system vulnerabilities
 Locating Viruses in Operating system
 Window hidden tools and utilities
 Windows Firewall
Basics of Hacking
 Definition of hacking
 Hacking Legal or Illegal?
 Future Scope in this Field
 Job Opportunities
 Types of Hackers
 White Hat Hacker
 Black Hat Hacker
 Grey Hat Hacker
 Suicide Hackers
Facebook/Yahoo/Gmail/Twitter
 E-mail Hacking
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Sending Fake Mail
 Detecting Fake email’s
 Email Bombing
 Making own fake mailer/bomber Script
 Email Phising
 Email password Hacking (Facebook/gmail/yahoomail)
 Step Verification (Only for gmail)
MALWARES
 Creating Trojan
 Working of Trojan
 Creating Viruses
 Spreading Viruses and Trojans
 Spywares(Keyloggers)
 Spreading Virus
 Isrealer 6.0,6.3 Legend Pack (Setup)
 Implementing Java Drive
 Compromising Remote System
 Detection & removal of Trojan Viruses,Spywares
 How to Make virus Undeteactable Using Crypters
 Crypting
Web Application hacking
 Credit Card Hacking (Free Online shoping)
 Efficient Google Searching
 Hacking CCTV Camera (Google cam dorks)
 Finding Websites Ip address
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Locating Server ip addresses where Website’s get hosted (via ping, tools)
 Locating websites
 Footprinting website’s
 Finding Admin pages of site’s (tool)
 Sql Injection Attacks (using tool Havij)
 XSS ATTACKS
 What is Shell (c99,r57, 404, barc0de mini)
 Shell Uploading
 What isDefacement page
 Website Defacement
 Using Bots to attack system’s/site
 Web Scanners
 Website penetration testing and assessment
Internet Security & Proxy
 Introduction to proxies
 Anonymous proxy
 Elite Proxy
 Web based Proxies
 Tor Web Browser
 Ip Spoofing Attacks
 Mac Address change
Reverse Engineering or Software Cracking
 Disassembling the Softwares
 Getting the code of EXEs
 Manipulating the Code of EXEs
 Dis-assemblers & Debuggers
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Olly DBG
 Windows Dis-assembler
 Software Cracking & Serial Key Phishing
 Analyzing Assembly Code of Software
 Tracing the Error Message
 Setting Break Point
 Stepping the Assembly Code
 Checking the Registers for the Key
Attacks On demand
MODULE-II
ADVANCE HACKING
 Tamper Data
 IRC Botnet
 Password Stealer (Paid)
 Shell Backdooring
 What is an IFrame Injection ?
 Windows Based IIS 7 Websites Hacking
 Installing Back Track 5R3
 Website Hacking with Sqlmap (Sql Injection)
 WebVulScan Web Application Vulnerability Scanner Setup
 Advance WiFi Hacking
 Waffit tool on BackTrack 5 R3
 Metasploit Framework
 Nmap Advanced Scanning
 Pentesting A Website
 Setting Up Your Pentest Labs
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Social Engineering Toolkit (INTRO)
 HTTP Hacking Man In The Middle Attack(MITMA)
 Advance Phishing (MITM)
 System Hacking with Social Engineering Toolkit (SET)
 Port Scanning
 DDOS (Denial Of Service)
 Bruteforce
 Mass Uploading on zone-h
 Scanning web site with Uniscan and Nikto perl scanner on BackTrack 5 R2
 What is Backbox n How to install Backbox in VMware (xrhstos)

Más contenido relacionado

Último

ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Último (20)

ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

IT Security-Ethical Hacking Training Institue in Delhi

  • 1. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com WITH ASSOCIATION OF COMPUTER SOCIETY OF INDIA & GUIDELINES GIVEN BY A.I.C.T.E FOR VOCATION STUDIES CREZONE TECHNOLOGIES STARTING VOCATIONAL INDUSTRIAL TRAINING FOR M.C.A / B.TECH (C.S.E/ I.T./ E.C.E) / M.TECH (C.S.E / I.T./ E.C.E)
  • 2. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com TRAINING CONTENTS STRUCTURE DURATION : 6 MONTHS MODULE – I System Hacking  Operating System hacking  Virtualization  Password Cracking  Customizing Windows  Operating system vulnerabilities  Locating Viruses in Operating system  Window hidden tools and utilities  Windows Firewall Basics of Hacking  Definition of hacking  Hacking Legal or Illegal?  Future Scope in this Field  Job Opportunities  Types of Hackers  White Hat Hacker  Black Hat Hacker  Grey Hat Hacker  Suicide Hackers Facebook/Yahoo/Gmail/Twitter  E-mail Hacking
  • 3. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Sending Fake Mail  Detecting Fake email’s  Email Bombing  Making own fake mailer/bomber Script  Email Phising  Email password Hacking (Facebook/gmail/yahoomail)  Step Verification (Only for gmail) MALWARES  Creating Trojan  Working of Trojan  Creating Viruses  Spreading Viruses and Trojans  Spywares(Keyloggers)  Spreading Virus  Isrealer 6.0,6.3 Legend Pack (Setup)  Implementing Java Drive  Compromising Remote System  Detection & removal of Trojan Viruses,Spywares  How to Make virus Undeteactable Using Crypters  Crypting Web Application hacking  Credit Card Hacking (Free Online shoping)  Efficient Google Searching  Hacking CCTV Camera (Google cam dorks)  Finding Websites Ip address
  • 4. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Locating Server ip addresses where Website’s get hosted (via ping, tools)  Locating websites  Footprinting website’s  Finding Admin pages of site’s (tool)  Sql Injection Attacks (using tool Havij)  XSS ATTACKS  What is Shell (c99,r57, 404, barc0de mini)  Shell Uploading  What isDefacement page  Website Defacement  Using Bots to attack system’s/site  Web Scanners  Website penetration testing and assessment Internet Security & Proxy  Introduction to proxies  Anonymous proxy  Elite Proxy  Web based Proxies  Tor Web Browser  Ip Spoofing Attacks  Mac Address change Reverse Engineering or Software Cracking  Disassembling the Softwares  Getting the code of EXEs  Manipulating the Code of EXEs  Dis-assemblers & Debuggers
  • 5. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Olly DBG  Windows Dis-assembler  Software Cracking & Serial Key Phishing  Analyzing Assembly Code of Software  Tracing the Error Message  Setting Break Point  Stepping the Assembly Code  Checking the Registers for the Key Attacks On demand MODULE-II ADVANCE HACKING  Tamper Data  IRC Botnet  Password Stealer (Paid)  Shell Backdooring  What is an IFrame Injection ?  Windows Based IIS 7 Websites Hacking  Installing Back Track 5R3  Website Hacking with Sqlmap (Sql Injection)  WebVulScan Web Application Vulnerability Scanner Setup  Advance WiFi Hacking  Waffit tool on BackTrack 5 R3  Metasploit Framework  Nmap Advanced Scanning  Pentesting A Website  Setting Up Your Pentest Labs
  • 6. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Social Engineering Toolkit (INTRO)  HTTP Hacking Man In The Middle Attack(MITMA)  Advance Phishing (MITM)  System Hacking with Social Engineering Toolkit (SET)  Port Scanning  DDOS (Denial Of Service)  Bruteforce  Mass Uploading on zone-h  Scanning web site with Uniscan and Nikto perl scanner on BackTrack 5 R2  What is Backbox n How to install Backbox in VMware (xrhstos)