Penetration Testing mailing list archives

Some help on methodologies and reports


From: Nikolaj <lorddoskias () gmail com>
Date: Wed, 27 Dec 2006 13:28:02 +0200

I would like to ask a few question concerning some aspects of penetration testing.

A friend setup a little lan to mimic an ISP. He has different services - ranging from mysql to nagios etc. I was able to penetrate one of the server which let me to another and so forth. Eg. I penetrated his network. Now I want to create a legit report, so that it looks like a real one. Can you give me links or some hints on what should one such report include? Maybe there are drafts somewhere.

I feel that what I did was more plain hacking than just pen testing. What are the differences between them, except the business relationship.

Regards.


Current thread: