Re: How we perform Pentration Testing and Vernability Assesment



I would also recommend the following links

http://www.penetrationtests.com/Methodology/
http://www.penetrationtests.com/Frameworks/
http://www.penetrationtests.com/Security-standards/
http://www.penetrationtests.com/Business/

and if what you want is tools, also

http://www.penetrationtests.com/Tools-Software/

cheers
-AV

--- On Sat, 7/26/08, Fernando Augusto <fernando@xxxxxxxxxxxxxxxxxx> wrote:

From: Fernando Augusto <fernando@xxxxxxxxxxxxxxxxxx>
Subject: Re: How we perform Pentration Testing and Vernability Assesment
To: "Ahmad, Md. Mustaque" <md-mustaque.ahmad@xxxxxx>
Cc: pen-test@xxxxxxxxxxxxxxxxx
Date: Saturday, July 26, 2008, 4:49 PM
Hello,

There is plenty of documentation from the internet. There
are specially few
places I would tell you to start looking:

1 - www.isecom.org: The OSSTMM methodology for pentesting
is really good,
not only for network testing, but eletronics, people,
telecom and ambient
testing. Not technical.
2 - www.oissg.org/issaf: Not too updated (public docs are
years old), but
there is good methodology, too. The technical documentation
is offline.
3 - www.de-ice.net: Really cool pentest labs for newbies
(and intermediate
as well). Nice to test methodology results.
3 - Mailing list like that one, to get specific technical
ideas. But you
need to know at least the basics (learnt from above refs)
to understand the
slang.

Regards,

Fernando Augusto
----- Original Message -----
From: "Ahmad, Md. Mustaque"
<md-mustaque.ahmad@xxxxxx>
To: <listbounce@xxxxxxxxxxxxxxxxx>
Cc: <pen-test@xxxxxxxxxxxxxxxxx>
Sent: Tuesday, July 22, 2008 7:27 AM
Subject: How we perform Pentration Testing and Vernability
Assesment


HI All,

How we perform Pentration Testing and Vernability
Assesment.

Can anyone show me first How we do that. I want to moove in
to security and
need to know these things I have a theoratical idea.
However, I need to know
practically How we do tht.

Thanks
Mustaque
MCSA,CEH

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------





------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------



Relevant Pages