Security Basics mailing list archives

Re: Any security attack state model


From: "mike king" <ngiles () hushmail com>
Date: Mon, 11 Jul 2005 15:05:34 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

OSSTMM - Open Source Security Testing Methodology Manual

http://www.isecom.org/osstmm/

I think this is what you are looking for.

hope this helps


On Wed, 06 Jul 2005 21:55:12 -0700 ricci <ricci () cs ust hk> wrote:
Hello All,

I have been working on IT security attack methodology. Is there
any security
attack methodology and category information that has been adopted
by IT
market?

Besides, as I thought through security attack methodology, there
should be
some step by step attack states. That is, after port scanning, you

will be
able to attack web, etc. Is there any methodology or good
reference
document?

Please advise.

Thx.

Ricci
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkLS7SEACgkQUjm7xSZSd8HlDwCgncFZuID21OTxQOKnc1Q7+SpdUlkA
n1lpBsCTSZe17wJdWeVKz4jkTQXI
=6N1/
-----END PGP SIGNATURE-----



Current thread: