Penetration Testing mailing list archives
RE: Penetration Whitepapers
From: "Erik Birkholz" <erik () foundstone com>
Date: Tue, 17 Feb 2004 19:02:23 -0800
<Blatant_Bias_Warning> I am the lead author on the Special Ops book. </Blatant_Bias_Warning> In Special Ops (www.SpecialOpsSecurity.com) we have a minimum of one case study per chapter. That should help you along. Additionally, the Incident Response books by Osborne are a great read if you are focused on the response part. The problem I see with your post is that it is VERY broad. Give us some more specifics and I think you will get a better response. For example, who is your audience? Then move into, what is your goal for this data given the audience you selected. Then we should be able to chime in effectively. Otherwise, you can probably expect emails that plug this or that book... Wait! Ummm. Err. Too late. ;) -----Original Message----- From: Technoboy [mailto:technoboy () packetswar org] Sent: Monday, February 16, 2004 9:56 AM To: pen-test () securityfocus com Subject: RE: Penetration Whitepapers For 'real life example' I would also recommand the following books: Addison Wesley - Web Hacking Attacks and Defence [ISBM:0201761769] Prentice Hall PTR - IT Security: Risking the Corporation [ISBN:013101112] The Prentice book might be exactly what you are looking for. Hope it help, - Anon -----Original Message----- From: Ricardo AbrahamAréchiga Cervantes [mailto:raac () academ01 gda itesm mx] Sent: Friday, February 13, 2004 6:21 PM To: pen-test () securityfocus com Cc: Rob Havelt Subject: Re: Penetration Whitepapers Hi, Too much fiction, but this books can help you: - Hacker's Challenge 2: Test Your Network Security & Forensic Skills - Stealing the Network: How to Own the Box Ricardo Abraham Rob Havelt wrote:
I'm looking for either white papers or case studies or some such detailing actual real world attacks (more like real-world computer crime, computer fraud, internal attacks, etc. and less on the damage from worms or virus, DDoS, or the like) on companies who either didn't know that they had a bad security posture, couldn't keep on top of infosec issues, or ones who knew (either as the result of a pen test, health check, or some other VA) and simply didn't take any steps toward remediation.
--------------------------------------------------------------------------- Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection Protect your network with the comprehensive security solution that integrates six applications for ease of use and lower TCO. Firewall - Virus protection - Spam protection - URL blocking - VPN - Wireless security. Download 30-day evaluation at: http://www.astaro.com/php/contact/securityfocus.php ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection Protect your network with the comprehensive security solution that integrates six applications for ease of use and lower TCO. Firewall - Virus protection - Spam protection - URL blocking - VPN - Wireless security. Download 30-day evaluation at: http://www.astaro.com/php/contact/securityfocus.php ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection Protect your network with the comprehensive security solution that integrates six applications for ease of use and lower TCO. Firewall - Virus protection - Spam protection - URL blocking - VPN - Wireless security. Download 30-day evaluation at: http://www.astaro.com/php/contact/securityfocus.php ----------------------------------------------------------------------------
Current thread:
- Penetration Whitepapers Rob Havelt (Feb 05)
- Re: Penetration Whitepapers SecurIT Informatique Inc. (Feb 07)
- Re: Penetration Whitepapers Ricardo AbrahamAréchiga Cervantes (Feb 16)
- RE: Penetration Whitepapers Technoboy (Feb 17)
- <Possible follow-ups>
- Re: Penetration Whitepapers miguel . dilaj (Feb 06)
- RE: Penetration Whitepapers Erik Birkholz (Feb 18)