Penetration Testing mailing list archives
Re: How we perform Pentration Testing and Vernability Assesment
From: Victor DaViking <analogviking () yahoo com>
Date: Wed, 30 Jul 2008 09:38:20 -0700 (PDT)
I would also recommend the following links http://www.penetrationtests.com/Methodology/ http://www.penetrationtests.com/Frameworks/ http://www.penetrationtests.com/Security-standards/ http://www.penetrationtests.com/Business/ and if what you want is tools, also http://www.penetrationtests.com/Tools-Software/ cheers -AV --- On Sat, 7/26/08, Fernando Augusto <fernando () gamecreator com br> wrote:
From: Fernando Augusto <fernando () gamecreator com br> Subject: Re: How we perform Pentration Testing and Vernability Assesment To: "Ahmad, Md. Mustaque" <md-mustaque.ahmad () hp com> Cc: pen-test () securityfocus com Date: Saturday, July 26, 2008, 4:49 PM Hello, There is plenty of documentation from the internet. There are specially few places I would tell you to start looking: 1 - www.isecom.org: The OSSTMM methodology for pentesting is really good, not only for network testing, but eletronics, people, telecom and ambient testing. Not technical. 2 - www.oissg.org/issaf: Not too updated (public docs are years old), but there is good methodology, too. The technical documentation is offline. 3 - www.de-ice.net: Really cool pentest labs for newbies (and intermediate as well). Nice to test methodology results. 3 - Mailing list like that one, to get specific technical ideas. But you need to know at least the basics (learnt from above refs) to understand the slang. Regards, Fernando Augusto ----- Original Message ----- From: "Ahmad, Md. Mustaque" <md-mustaque.ahmad () hp com> To: <listbounce () securityfocus com> Cc: <pen-test () securityfocus com> Sent: Tuesday, July 22, 2008 7:27 AM Subject: How we perform Pentration Testing and Vernability Assesment HI All, How we perform Pentration Testing and Vernability Assesment. Can anyone show me first How we do that. I want to moove in to security and need to know these things I have a theoratical idea. However, I need to know practically How we do tht. Thanks Mustaque MCSA,CEH ------------------------------------------------------------------------ This list is sponsored by: Cenzic Top 5 Common Mistakes in Securing Web Applications Get 45 Min Video and PPT Slides www.cenzic.com/landing/securityfocus/hackinar ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: Cenzic Top 5 Common Mistakes in Securing Web Applications Get 45 Min Video and PPT Slides www.cenzic.com/landing/securityfocus/hackinar ------------------------------------------------------------------------
------------------------------------------------------------------------ This list is sponsored by: Cenzic Top 5 Common Mistakes in Securing Web Applications Get 45 Min Video and PPT Slides www.cenzic.com/landing/securityfocus/hackinar ------------------------------------------------------------------------
Current thread:
- How we perform Pentration Testing and Vernability Assesment Ahmad, Md. Mustaque (Jul 25)
- Re: How we perform Pentration Testing and Vernability Assesment Fernando Augusto (Jul 28)
- Re: How we perform Pentration Testing and Vernability Assesment Victor DaViking (Jul 30)
- Re: How we perform Pentration Testing and Vernability Assesment Fernando Augusto (Jul 28)