Penetration Testing mailing list archives

Re: How we perform Pentration Testing and Vernability Assesment


From: Victor DaViking <analogviking () yahoo com>
Date: Wed, 30 Jul 2008 09:38:20 -0700 (PDT)

I would also recommend the following links

http://www.penetrationtests.com/Methodology/
http://www.penetrationtests.com/Frameworks/
http://www.penetrationtests.com/Security-standards/
http://www.penetrationtests.com/Business/

and if what you want is tools, also

http://www.penetrationtests.com/Tools-Software/

cheers
-AV

--- On Sat, 7/26/08, Fernando Augusto <fernando () gamecreator com br> wrote:

From: Fernando Augusto <fernando () gamecreator com br>
Subject: Re: How we perform Pentration Testing and Vernability Assesment
To: "Ahmad, Md. Mustaque" <md-mustaque.ahmad () hp com>
Cc: pen-test () securityfocus com
Date: Saturday, July 26, 2008, 4:49 PM
Hello,

There is plenty of documentation from the internet. There
are specially few 
places I would tell you to start looking:

1 - www.isecom.org: The OSSTMM methodology for pentesting
is really good, 
not only for network testing, but eletronics, people,
telecom and ambient 
testing. Not technical.
2 - www.oissg.org/issaf: Not too updated (public docs are
years old), but 
there is good methodology, too. The technical documentation
is offline.
3 - www.de-ice.net: Really cool pentest labs for newbies
(and intermediate 
as well). Nice to test methodology results.
3 - Mailing list like that one, to get specific technical
ideas. But you 
need to know at least the basics (learnt from above refs)
to understand the 
slang.

Regards,

Fernando Augusto
----- Original Message ----- 
From: "Ahmad, Md. Mustaque"
<md-mustaque.ahmad () hp com>
To: <listbounce () securityfocus com>
Cc: <pen-test () securityfocus com>
Sent: Tuesday, July 22, 2008 7:27 AM
Subject: How we perform Pentration Testing and Vernability
Assesment


HI All,

How we perform Pentration Testing and Vernability
Assesment.

Can anyone show me first How we do that. I want to moove in
to security and 
need to know these things I have a theoratical idea.
However, I need to know 
practically How we do tht.

Thanks
Mustaque
MCSA,CEH

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in 
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


      


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in 
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


Current thread: