PaulDotCom mailing list archives

documenting during pentest


From: lists at arnaudloos.com (Arnaud)
Date: Wed, 17 Mar 2010 12:01:02 -0400

I just completed my first hacker challenge and was surprised by the fact
that my biggest obstacle was keeping track of the various
systems/ports/services/vulns that I identified. With no coherent strategy
for keeping track of what systems and services I had already targeted I
quickly lost track of where I had been and what I had done. What strategy or
software do others use to keep track of such things?

Thanks.
Arnaud-



Current thread: