This document provides instructions for hands-on exercises using the security testing tools in BackTrack 5. It discusses running a live BackTrack CD, configuring network settings, using Wireshark to capture network traffic, Nmap for scanning targets, Hydra for password cracking, and observing the results. Students are warned that any illegal activities outside the classroom are their full responsibility, and basic security best practices like keeping systems patched and using firewalls are recommended. The document concludes by providing questions to analyze the results of exercises using Nmap, Telnet, Wireshark, Hydra and TCPdump to observe network protocols, password cracking attempts, and the three-way handshake process between targets and hosts.