Security Basics mailing list archives
Re: Any security attack state model
From: "mike king" <ngiles () hushmail com>
Date: Mon, 11 Jul 2005 15:05:34 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OSSTMM - Open Source Security Testing Methodology Manual http://www.isecom.org/osstmm/ I think this is what you are looking for. hope this helps On Wed, 06 Jul 2005 21:55:12 -0700 ricci <ricci () cs ust hk> wrote:
Hello All, I have been working on IT security attack methodology. Is there any security attack methodology and category information that has been adopted by IT market? Besides, as I thought through security attack methodology, there should be some step by step attack states. That is, after port scanning, you
will be able to attack web, etc. Is there any methodology or good reference document? Please advise. Thx. Ricci
-----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkLS7SEACgkQUjm7xSZSd8HlDwCgncFZuID21OTxQOKnc1Q7+SpdUlkA n1lpBsCTSZe17wJdWeVKz4jkTQXI =6N1/ -----END PGP SIGNATURE-----
Current thread:
- Re: Any security attack state model mike king (Jul 12)
- <Possible follow-ups>
- RE: Any security attack state model Cronican, John (Jul 12)