![pen-test logo](/images/pen-test-logo.png)
Penetration Testing mailing list archives
Re: Level of Exploitation
From: Goni Sarakinov <gsarak () sarakinovconsulting com>
Date: Wed, 03 Dec 2008 14:57:11 -0500
pentestr wrote:
Hi list, I have come across a situation where I need to specify the "Level of Exploitation" to the client ( a govt. agency). I was able to do SQL Injection, Cross Site Scripting attacks against the web application. Could you share your ideas about level of exploitation. What level we can give for SQL Injection, Cross site scripting, buffer overflow, TCP stack exploit,etc thanks in advance Pen Testr
I would ask them for a sample of previous reports or a definition document outlining the various levels that their management has agreed upon or been told to comply to. -- Goni. ------------------------------------------------------------------------ This list is sponsored by: Cenzic Security Trends Report from Cenzic Stay Ahead of the Hacker Curve! Get the latest Q2 2008 Trends Report now www.cenzic.com/landing/trends-report ------------------------------------------------------------------------
Current thread:
- Level of Exploitation pentestr (Dec 03)
- Re: Level of Exploitation Goni Sarakinov (Dec 03)
- Re: Level of Exploitation Adriel T. Desautels (Dec 05)
- Rogue Access Point Alerting Daniel Constantino (Dec 05)
- Re: Rogue Access Point Alerting Joshua Wright (Dec 05)
- Re: Rogue Access Point Alerting Robin Wood (Dec 05)
- Re: Level of Exploitation Adriel T. Desautels (Dec 03)
- Re: Level of Exploitation Matthew Zimmerman (Dec 05)
- Re: Level of Exploitation Adriel T. Desautels (Dec 05)
- RE: Level of Exploitation Shenk, Jerry A (Dec 05)
- Re: Level of Exploitation Anthony Cicalla (Dec 05)
- Re: Level of Exploitation gold flake (Dec 07)
- Re: Level of Exploitation Matthew Zimmerman (Dec 05)
- Re: Level of Exploitation Goni Sarakinov (Dec 03)