PaulDotCom mailing list archives

documenting during pentest


From: jim.halfpenny at gmail.com (Jim Halfpenny)
Date: Wed, 17 Mar 2010 16:25:54 +0000

Does Nessus count as a strategy?

On 17 March 2010 16:01, Arnaud <lists at arnaudloos.com> wrote:

I just completed my first hacker challenge and was surprised by the fact
that my biggest obstacle was keeping track of the various
systems/ports/services/vulns that I identified. With no coherent strategy
for keeping track of what systems and services I had already targeted I
quickly lost track of where I had been and what I had done. What strategy
or
software do others use to keep track of such things?

Thanks.
Arnaud-

_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20100317/2da02bba/attachment.htm 


Current thread: