2 | 2 |
|
3 | 3 |
<Menu>
|
4 | 4 |
<Name>Applications</Name>
|
5 | |
<Layout>
|
|
5 |
<Layout>
|
|
6 |
<Menuname>Usual Applications</Menuname>
|
|
7 |
<Menuname>Information Gathering</Menuname>
|
|
8 |
<Menuname>Vulnerability Analysis</Menuname>
|
|
9 |
<Menuname>Web Application Analysis</Menuname>
|
|
10 |
<Menuname>Database Assessment</Menuname>
|
|
11 |
<Menuname>Password Attacks</Menuname>
|
|
12 |
<Menuname>Wireless Attacks</Menuname>
|
|
13 |
<Menuname>Reverse Engineering</Menuname>
|
|
14 |
<Menuname>Exploit Frameworks</Menuname>
|
|
15 |
<Menuname>Sniffing - Spoofing</Menuname>
|
|
16 |
<Menuname>Maintaining Access</Menuname>
|
|
17 |
<Menuname>Forensic Tools</Menuname>
|
|
18 |
<Menuname>Reporting Tools</Menuname>
|
|
19 |
<Menuname>System Services</Menuname>
|
6 | 20 |
<Merge type="menus"/>
|
7 | |
<Menuname>09 - Sniffing/Spoofing</Menuname>
|
8 | |
<Menuname>01 - Information Gathering</Menuname>
|
9 | |
<Menuname>02 - Vulnerability Analysis</Menuname>
|
10 | |
<Menuname>03 - Web Application Analysis</Menuname>
|
11 | |
<Menuname>04 - Database Assessment</Menuname>
|
12 | |
<Menuname>05 - Password Attacks</Menuname>
|
13 | |
<Menuname>06 - Wireless Attacks</Menuname>
|
14 | |
<Menuname>08 - Exploitation Tools</Menuname>
|
15 | |
<Menuname>10 - Maintaining Access</Menuname>
|
16 | |
<Menuname>11 - Forensics</Menuname>
|
17 | |
<Menuname>12 - Reporting Tools</Menuname>
|
18 | |
<Menuname>13 - System Services</Menuname>
|
19 | 21 |
</Layout>
|
|
22 |
|
|
23 |
<Menu>
|
|
24 |
<Name>Usual Applications</Name>
|
|
25 |
<Directory>usual-apps.directory</Directory>
|
|
26 |
<!-- This is the target of <Move> at the end ... -->
|
|
27 |
</Menu>
|
20 | 28 |
|
21 | 29 |
<Menu>
|
22 | 30 |
<Name>Information Gathering</Name>
|
|
319 | 327 |
</Menu>
|
320 | 328 |
|
321 | 329 |
<Menu>
|
322 | |
<Name>Sniffing / Spoofing</Name>
|
|
330 |
<Name>Sniffing - Spoofing</Name>
|
323 | 331 |
<Directory>09-sniffing-spoofing.directory</Directory>
|
324 | 332 |
<Include><And>
|
325 | 333 |
<Category>09-sniffing-spoofing</Category>
|