Penetration Testing mailing list archives
Re: Penetration Testing Reports
From: "Alice Bryson" <abryson () bytefocus com>
Date: Wed, 12 Apr 2006 20:22:58 +0800
You may try Eeye Retina scanner evaluation version. You have 15 days to use, and the report is neatly. But evaluation version do not include remedation report. Will remedation important for you? 30 Mar 2006 03:53:32 -0000, rkraus () telcomtex net <rkraus () telcomtex net>:
Hey all, I am looking to put together some reports for client that give a outline of what vulnerabilities were found on his network. I know I could just print out the Nessus and LanGuards scans and present that, but I think that alone is kind of cheesy. Is there anyplace that I can get a example of a vulnerability assessment report, for external and internal audits? I dont want to re-create the wheel, I am sure someone already has on put together. Any help would be greatfull, I have docs put together for my HIPAA audits, but none for Pen Tests. Thanks for any help!!! Even an example of a good one would be great, i can recreat it and format it to my companys style guide to make it our own :-) ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
-- http://www.lwang.org lwang.org provides online base64 encode and decode, crc32 md5 and sha1 hashing, online ciphers, encryption and decryption. We are engaged in adding more common use lookup service. We collect spam for research at abryson () bytefocus com ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- RE: Penetration Testing Reports Debasis Mohanty (Apr 03)
- Penetration Testing Password via Wireless Access sherwyn williams (Apr 16)
- Re: Penetration Testing Password via Wireless Access Thierry Zoller (Apr 16)
- RE: Penetration Testing Password via Wireless Access Andy Meyers (Apr 16)
- Re: Penetration Testing Password via Wireless Access Abhishek (Apr 16)
- Re: Penetration Testing Password via Wireless Access bvbgtg (Apr 16)
- Re: Penetration Testing Password via Wireless Access intel96 (Apr 17)
- <Possible follow-ups>
- Re: Penetration Testing Reports Alice Bryson (Apr 12)
- Penetration Testing Password via Wireless Access sherwyn williams (Apr 16)