Penetration Testing mailing list archives

Re: Penetration Testing Reports


From: "Alice Bryson" <abryson () bytefocus com>
Date: Wed, 12 Apr 2006 20:22:58 +0800

You may try Eeye Retina scanner evaluation version. You have 15 days
to use, and the report is neatly. But evaluation version do not
include remedation report. Will remedation important for you?


30 Mar 2006 03:53:32 -0000, rkraus () telcomtex net <rkraus () telcomtex net>:
Hey all,

I am looking to put together some reports for client that give a outline of what vulnerabilities were found on his 
network. I know I could just print out the Nessus and LanGuards scans and present that, but I think that alone is 
kind of cheesy.

Is there anyplace that I can get a example of a vulnerability assessment report, for external and internal audits? I 
dont want to re-create the wheel, I am sure someone already has on put together.

Any help would be greatfull, I have docs put together for my HIPAA audits, but none for Pen Tests.

Thanks for any help!!!

Even an example of a good one would be great, i can recreat it and format it to my companys style guide to make it 
our own :-)

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------




--
http://www.lwang.org
lwang.org provides online base64 encode and decode, crc32 md5 and sha1
hashing, online ciphers, encryption and decryption. We are engaged in
adding more common use lookup service.
We collect spam for research at abryson () bytefocus com

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: