Premium Essay

Backtrack Boys

Submitted By
Words 427
Pages 2
As young teens skip school and do criminal activities, their life doesn’t change and only gets worse when sent to Juvie.

There are currently 812 juveniles aged between 10-17 in detention centres with 110 of these in Perth alone, creating youth at risk of isolation, detachment and loss of confidence.

A local youth program in Armidale, run by Bernie Shakeshaft, has taken troubled teens, Rusty, Tyson & Zac (along with many others) to try and prove that imprisonment is not the way to go. Backtrack Boys is a program that should arguably be placed everywhere in Australia.

The program is an alternative program that helps the boys to navigate their relationships, deal with personal trauma, take responsibility, and gain practical job skills so they can eventually create a sustainable future for themselves.

“The last thing we …show more content…
The documentary highlighted the journey of three boys, aged as young as 12, Tyson’s background was family trauma and drug addiction, Rusty was lacking family structure and support which led him to surround himself with not very nice people and Zac was brought up in the Backtrack program and became a confident leader, mentoring kids through their Backtrack journey. Zac went on to prove the assumptions of society which believed that race or ethnicity changes a youth for the worse, through developing leadership and perseverance within the program.

Bernie thought of trying something different that would help the boys engage in commitment, in preparation for ‘work life’, therefore the ‘Paws Up’ program was introduced. “It’s amazing when you see the dogs selecting kids in that way. It’s great to watch this happen in front of you. The right dog will pick the right kid, the ADHD kid will have the ADHD dog and the dog that wants to lay around in the sun all day will be with the chilled-out kid”. he says in the

Similar Documents

Premium Essay

Pen Test Plan

...Megan Patterson IS4560 Monday E1 Class Week 1-Penetration Test Plan June 17, 2013 Attack and Penetration Test Plan Megan Patterson IS4560 Childers June 17, 2013 External Penetration testing tests the security surrounding externally connected systems from the Internet, as well as within a corporate network. Controlled tests are used to gain access to Internet resources and ultimately to the DMZ, which is an internal network; by going through and around firewalls from the Internet. External Penetration Testing involves the finding and exploitation of actual known and unknown vulnerabilities from the perspective of an outside attacker. The External Attack and Penetration testing Process is as follows: * Phase 1-Discovery * Analysis * Footprint * Identify * Phase 2-Services * Ping * Map * Scan * Phase 3-Enumeration * Extract * Collect * Intrusive * Phase 4-Application Layer Testing * Manual * Depth * Blind * Phase 5-Exploit * Attack * Penetrate * Compromise The purpose of the External Attack and Penetration testing plan is to outline on what to do for an external penetration test within a corporate network. The goals for this plan if it is successful, is that to go ahead and deploy whatever the tester is testing after documentation has been written, saved, and reviewed by the IT staff. If the plan is not successful, then the tester needs to go through the steps of retesting the application...

Words: 402 - Pages: 2

Free Essay

Test

...P a g e |1 BackTrack 5 guide 4: How to perform stealth actions Karthik R, Contributor You can read the original story here, on SearchSecurity.in. In previous installments of this BackTrack 5 how to tutorial, we have discussed information gathering and vulnerability assessment of the target system; explored network assessment, scanning and gaining access into the target; and, delved into privilege escalation tools. In this installment of the tutorial on BackTrack 5, how to perform stealth actions will be discussed. Why stealth? The objective of penetration testing is to replicate the actions of a malicious attacker. No attacker desires discovery of surreptitious entry into the network, and hence employs stealth techniques to remain unnoticed. The penetration tester needs to adopt the same stealth methods, in order to honestly assess the target network. http://searchsecurity.techtarget.in/tip/BackTrack-5-guide-4-How-to-perform-stealth-actions P a g e |2 Figure 1. The ‘maintaining access’ category in BackTrack 5, with a focus on OS backdoors. This installment of the BackTrack 5 how to tutorial deals with the “Maintaining Access” feature, within which are options for OS backdoors, tunneling and Web backdoors, as shown in Figure 1. OS backdoors > Cymothoa: Cymothoa is a stealth backdooring tool on BackTrack 5 that injects backdoor shell code into an existing process. This tool has been developed by codewizard and crossbower from ElectronicSouls. The general...

Words: 1111 - Pages: 5

Free Essay

A Hands on Intro to Hacking

...Penetration testing Penetration testing A Hands-On Introduction to Hacking by Georgia Weidman San Francisco Penetration testing. Copyright © 2014 by Georgia Weidman. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14   123456789 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066...

Words: 117203 - Pages: 469

Free Essay

It Security

...A. Memo of Record: Permission to purchase a network penetration tool 1. Three Possible Network Penetration Testing Tools: Three possible network penetration tools that can be used in this scenario to perform a Vulnerability Assessment (VA) are; Backtrack, Core Impact Pro, and Sword&Shield Enterprise Security solutions. Each product provides a number or penetration techniques such as scanning, enumeration, network mapping, packet sniffing, and password cracking. Each product requires a different level of user and/or contractor knowledge to perform the VA. Backtrack is a LINUX distribution that requires the Information Technology (IT) department to install and perform in house testing. This product is very low cost but requires extensive hours to learn and perform testing using the applications provided in this distribution. Backtrack provides the full range of tests; network, mapping, enumeration, sniffing, and cracking. When used in a Microsoft Windows environment can go undetected by most security appliances internal to the network. Backtrack can be used both as an external penetration tool and an internal (client side) vulnerability scanner. Many Hacker tools are built in to Backtrack and additional plugins make this a powerful tool for penetration testing (PENtest). Core Impact Pro (CIP) provides a software solution that automates the penetration testing process. Core can provide technical assistance and/or perform independent PENtest services. (Core Security Technologies...

Words: 362 - Pages: 2

Premium Essay

It Penetration Testing

...Use offense to inform defense. Find flaws before the bad guys do. Copyright SANS Institute Author Retains Full Rights This paper is from the SANS Penetration Testing site. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Hacker Techniques, Exploits & Incident Handling (SEC504)" at https://pen-testing.sans.org/events/ Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 A Management Guide to Penetration Testing David A. Shinberg © SANS Institute 2003, © SA NS In sti tu As part of GIAC practical repository. te 20 03 ,A ut ho rr Version 2.1a eta Practical Assignment ins SANS Hacker Techniques, Exploits, and Incident Handling (GCIH) fu ll r igh ts. Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Abstract Penetration tests are an excellent method for determining the strengths and weaknesses of a network consisting of computers and network devices. However, the process of performing a penetration test is complex, and without care can have disastrous effects on the systems being tested. This paper provides guidance, primarily focused around planning and management, on how to conduct a penetration test comprised of five phases – Preparation, Public Information, Planning, Execution and Analysis and Reporting. However, due to the technical and sometimes...

Words: 4111 - Pages: 17

Premium Essay

Nt1310 Unit 3 Penetration Test

...For your information, several methodologies exist for performing a pen test; however, we will be using the Penetration Test Execution Standard framework (PTES) to execute the assessment. PTES consists of seven guidelines to follow during an evaluation: Pre-Engagement Interactions occurred when management approved conducting a pen test of the network. Additionally, we have defined the scope of the project, including the goals of the assessment, which tools will be used to conduct the evaluation and how long it will take to complete the penetration test. Intelligence Gathering entails collecting as much information about the network as possible to use during the vulnerability analysis and exploitation phases of the assessment. Specifically, the Nmap scanner is used to look at the network and gather intelligence systems. We will search for network devices, their IP addresses and MAC addresses, the services or running on the systems or the open ports, the operating systems installed on the systems during this phase. Threat modeling occurs when we decide which systems to target during the assessment. The targets for “attack” will become clear after we use the OpenVAS tool to find weak systems on the network. For example, it has already been determined that the file server is vulnerable, so it is logical to focus on the system during the assessment. In sum, threat modeling is critical to the pen test since the targets are identified for the scope of the project. Vulnerability analysis...

Words: 449 - Pages: 2

Free Essay

Pink for Girls, Blue for Boys?

...Pink for girls; Blue for boys? Nowadays if we walk into a department store we can be sure that we will find pink and some blue clothes, toys and little other objects for children such as books, bikes, lunchboxes, board games, toy cookers, cash registers, even games consoles. If we look at these objects there is no wonder everybody knows that pink is specified for girls and blue for boys. But how did this become a common thought? Since when do we use colors to make a difference between genders? And why exactly did we choose pink and blue to fulfill this role? In the 1800s most infants were dressed in white and both boys and girls wore dresses or short skirts until the age of five or six. Although, there was a few small difference between boy and girl clothing. For example girls wore dresses which were buttoned up in the back while boys’ dresses were buttoned up in the front. So gender difference wasn’t highlighted just in a little scale. Why wasn’t this important in that age of time? One theory is that distinguishing boys from girls was less important than distinguishing kids from adults. Childhood was a time of innocence while adulthood typically meant working hard. By the 1850s other colors than white had started to appear in baby clothing, but gender-based distinctions were slow to emerge. For example a Times fashion report from 1880 says that boys and girls were dressed alike in shades of blue, pink, white or violet; another report from 1892 says young girls were wearing...

Words: 1419 - Pages: 6

Free Essay

Juvenile Delinquenccy

...juveniles growing up in New York’s Hell’s Kitchen in the 1960’s. Lorenzo Carcatarra claims it is a true story, but New York denies anything and everything. The four boys are good friends with their Catholic priest named Father Bobby, who is played by Robert DeNeiro. Father Bobby is a good priest who likes to have fun and play basketball, smoke, and drink, but he really cares about the boys. One time one of the boys was hit by his mother’s boyfriend and he had a talk with him and basically told him if you hit the by again ill kill you. One day the boys are hanging out on a rooftop and they decide to steel some hotdogs from a portable hotdog vendor, they’ve done it before so it was nothing new, but this time as the decoy boy orders a hotdog and don’t pay for it, and is chased by the hot dog vendor the three other kids start to push the cart, and as the other kid returns they move it over a subway stairway and as the vendor appears the boys cannot hold on any longer, so the cart goes down the steps and smashes a guy into the wall, h does not die but is hospitalized. The four juveniles go to court and three of them are sentenced to at least 1 year and not more than 18 months, and the other one is sentenced to at least 6 months and not more than one year. They are required to serve their term at the Wilkinson home for boys, it has 5 units and holds 780 juveniles. While serving there sentence a guard Shawn Nokes played by Kevin Bacon beats them and sexually abuses them with the help and...

Words: 966 - Pages: 4

Free Essay

Confessions

...Natural Effects on a Boy Jean-Jacques Rousseau’s Confessions has the entire life of its author’s experiences, virtues, and detailed imperfections. Rousseau’s Confessions is one of the first notable autobiographies and has influenced many forms of narratives. It inaugurated modern day autobiography and inspired a narrative technic used in many great novels. Rousseau wrote this autobiography in order to tell the world about himself and express the nature of man. He did not want to be known by how people thought of him, but rather be able to tell people exactly what happened in his life and let them be the judge. Rousseau begins Confessions by stating, “this is the only portrait of a man, painted exactly according to nature and in all of its truth, that exists and will probably ever exist” (57). He included embarrassing experiences and personal thoughts from throughout his life to show every possible virtue of his life. He portrays what every boy encounters from mischievous trickery to entering sexual adulthood. The events that change his life and himself become a consistent theme while he describes his childhood, sexual cravings, and natural thoughts of a boy’s life. One of the most common subjects in Rousseau autobiography is the story of his childhood and the nature of a boy. Rousseau’s mother passed away during his birth, which strained the relation between him and his father. When they tried to speak of her the conversation would end with tears because his father saw Rousseau’s...

Words: 1263 - Pages: 6

Free Essay

Beyond Words

...Living in a world where you feel like you are not seen or heard can be mind blowing and depressing. A young high school boy named Brandon in the short film, The Most Beautiful Thing by Cameron Covell, is a social outcast and has an isolated mindset. He feels as if he is never seen nor heard. Knowing that, he realizes that prom is just around the corner and he has to build up the courage to not only find a girl but also to ask her to go to prom with him. He has his eyes on one girl in particular and attempts to speak to her every time he sees her. The first time he speaks to her in the hallway she keeps walking. He later sees this girl outside sitting beside him and he speaks again. She did not respond. He persists and yells, “You can’t hear me?” She realizes he is trying to get her attention so she looks over at him. She writes him a note informing him that she is deaf and refuses to speak and that her name is Emily. They start writing notes, and then transition into hanging out, texting and even liking each other. Then he realizes he just might have a date for prom. First he has to figure out how he will ask her. But one day just might change everything for the worst. An unexpected obstacle occurs and he has to figure out a resolution. The acting of the main characters, the setting where the short film takes place, and the music that is playing in the background all has a positive impact on my thought of this film. The acting in this film was highly significant. Due...

Words: 855 - Pages: 4

Free Essay

Ghost Story

...What makes this ghost story so interesting is that it is so unexpected. Sitting on a cold bench, right before practice, I figured I would ask around to see if anyone had any good ghost stories to tell. Little did I know that I would find one that would send chills down my spine. As the oldest sibling growing up in their two story house in Bergen county, Dana remembers a lot of her childhood as well as her brothers, who is only a couple of years younger. She made known that her house was in fact a vacation home that had the luxury of having the lake right in the backyard. It is a two-story house and after moving in they decided to put on addition. Prior to the addition and back when it was just a vacation home, a family who had two little boys occupied the house. The events that took place...

Words: 1084 - Pages: 5

Free Essay

Physical Education Teacher

...Physical Education Teacher “As the time came, I started to ponder. What could I possibly do five days a week, year-round, and not get bored with it.” As her hands were flipping she said, “My brain was rushing with thoughts and ideas.” It then hit me, choose something you love doing. Be something you’re good at and perfect it. Never slack. At this moment what I love doing most is playing sports and working out. With that being said, what better job than a physical education teacher? Five days a week, weekends off, holidays off, and two entire months off, what a better job?” Looking like a skeleton, I can see where she’s going with this. She was a sophisticated looking woman, with dark skin, but not gloomy. As she talked about her job her eyes lit up like stars in the sky. It was obvious she loved her job, and wouldn’t choose be anywhere else. The students moved on to new activities or sports every other week. The students were respectful, and disciplined very well. They were also cooperative and seemed to love the activities they had to participate in. Some activities included: basketball, soccer, hockey, badminton, table tennis (ping pong), and other teamwork involving activities. She taught all of the students how to use teamwork, and inspired many people to engage in sports. Some people who never even thought about playing sports before, played soccer because she opened up her own soccer team. She was the teacher of the year. This interested me even more. Maybe I could...

Words: 811 - Pages: 4

Premium Essay

D. H. Lawrence

...great deal of short stories, but he also created novels, poems, plays, essays, travel books, paintings, translations, and literary criticisms. Lawrence was obviously a unique individual, and this is reflected in his short story writing. Many other authors of his time wrote with a common characteristic, passion, or setting; but Lawrence uses his unique personality to write with a common theme of intimacy, emotions, and instinct. More specifically, in D. H. Lawrence’s short stories “Tickets, Please”, “You Touched Me”, and “The Blind Man”, Lawrence reflects the characters’ level of intimacy with the sense of touch. In “Tickets, Please” D. H. Lawrence tells the story of a young boy, unfit for war and “crippled”, who tries to win over as many girls as possible. John Thomas was the only decent looking boy left at the tramway system during the war, and he used that to his advantage. Every night, John Thomas would “walk” a girl home; however, he never came close to an actual relationship. Eventually, John Thomas had been with every single girl at the station, and by that time, his girls were fed up. The ladies were tired of being used and treated poorly by John Thomas, so they all got together and came up with a plot for revenge. The girls decided that they would make him choose just ONE of them to be with. When they asked him upfront, he didn’t give an answer, so they tried something else. The girls have John Thomas turn and face the wall; then, each girl was supposed to touch...

Words: 701 - Pages: 3

Premium Essay

In the National Gallery

...In The National Gallery ”In the National Gallery” is a short story written by Doris Lessing in 2007. The story is a about a person visiting in the National Gallery. The main character has decided to spend an hour looking at one special picture. At first the person is sitting quietly studying the picture, but then an elder man enter the room and sits next to the main character. After a little while another man sits down next to the older man, but the second man is younger. As they sit the elder man starts to tell the younger boy about the painting and the painter Stubbs. The main character can’t help but listen to the elder man and his knowledge about the painting and painter. As the two men has sit for a while the young man suddenly gets annoyed and snaps at the elder man and then leaves room afterwards. The elder man stays in his seat. The room gets filled with some young French schoolgirls; they are loud and noisy and get a lot of attraction from everyone in the room. But there is one girl that the main character especially observes. The main character notices that the man next to him/her is staring at the girl as well, but more as if she was really something special. The main character starts to analyse the girl and also see that there is something special about her. The girl suddenly leaves the rest of the group and sits down next to the man. At first she watch the picture but then falls asleep. The man and main character starts to talk about her. The man tells that the...

Words: 388 - Pages: 2

Free Essay

Romance

...Romance is a term that is described as a pleasurable feeling of excitement and wonder associated with love. With the coming of age for adolescents, it is normal to experience such emotions towards another individual. However, sometimes these feelings are misinterpreted or misdirected. In John Updike’s short story “A&P” and James Joyce “Araby”, both authors tell of a tale of teenagers and their struggles with young love. Updike allows reader’s to see through the eyes of a teenager in his story “A&P”. The story begins with Sammy, a young clerk who becomes fascinated with the arrival of three girls in his store. The girl that grabs his attention the most is Queenie, by carefully observing her walk through the aisles and talk to her friends, he goes through a tremendous change in his character. At first, Updike shows us the immature side of Sammy, he quotes “The one that caught my eye first was the one in the plaid green two-piece…where the sun never seems to hit, at the top of the backs of her legs” (pg. 835), this shows the reader that Sammy is immature concentrating on the girls instead of doing his job. However, as we go further into the story, his somewhat obsession for Queenie leads him to question his own life. His feelings become so powerful that he forms his own conclusions about Queenie and her life and wonders if he could be part of that life too. When the girls finally approach the register, they are embarrassed by Lengel. This angers Sammy and causes him to change from...

Words: 797 - Pages: 4