Chapter 4 Social Engineering Attacks
Chapter 5 Physical Engineering Attacks
Chapter 6 Insider Attacks
Chapter 7 Using the BackTrack Linux Distribution
Chapter 8 Using Metasploit
Chapter 9 Managing a Penetration Test
3.145.45.5