PaulDotCom mailing list archives

documenting during pentest


From: nberthaume at gmail.com (Nicholas B.)
Date: Wed, 17 Mar 2010 14:48:06 -0400

You might want to look into the dradis framework.  It works with
multiple tools including nikto, metasploit and burp proxy for host
information storage.  http://dradisframework.org/

On Wed, Mar 17, 2010 at 1:27 PM, Paul Asadoorian <paul at pauldotcom.com> wrote:
I use vim :)

Cheers,
Paul

On 3/17/10 12:01 PM, Arnaud wrote:
I just completed my first hacker challenge and was surprised by the fact
that my biggest obstacle was keeping track of the various
systems/ports/services/vulns that I identified. With no coherent strategy
for keeping track of what systems and services I had already targeted I
quickly lost track of where I had been and what I had done. What strategy or
software do others use to keep track of such things?

Thanks.
Arnaud-

_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

--
Paul Asadoorian
PaulDotCom Enterprises
Web: http://pauldotcom.com
Phone: 401.829.9552
_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com



Current thread: