SECURITY AUDITING AND
EXPLOITATION OF A
COMPUTER SYSTEM
THROUGH PENETRATION
TESTING
 !
 "#$
 ! %&
' ()
*
+
-
,%-#&.#/ .&01%
-
)2
-
3)4#!1 3!56
-
7!3%%3 6
-
%%&. 81.!09/
-
!3 #%3!!3/%
:
+
;5/&2
 ##
* #
: +##
 <#%##
= ;%0
>?@A
-
$0%54$53!'
-
4%0%3&1##
-
3)! 1#%05%
-
(#4) !35 #
=
+
%0.1)1!
-
13%>)084)4$8/A
-
)%%&%,!4)#/->#!8#%
A
4!/33!$0# 0%##%&