RE: Vulnerability Assessment Checklists?

From: McGill, Lachlan (mcgilll1_at_anz.com)
Date: 12/02/03

  • Next message: dave kleiman: "RE: how to flood the mac address table of a switch?"
    Date: Tue, 2 Dec 2003 10:27:19 +1100
    To: "Kim Clark" <kclark20001@hotmail.com>, <security-basics@securityfocus.com>
    
    

    Try the following link for the Open Source Security Testing Methodology manual:

    http://www.isecom.org/projects/osstmm.shtml

    -----Original Message-----
    From: Kim Clark [mailto:kclark20001@hotmail.com]
    Sent: Tuesday, 2 December 2003 9:46 AM
    To: security-basics@securityfocus.com
    Subject: Vulnerability Assessment Checklists?

    Hello,

    I've finished my Security+, and am almost through my Security Certified
    Network Professional training.

    I'm looking for some basic tips and resources (checklists or templates?) to
    do some vulnerability assessments because I just went to donate my
    services at a nonprofit job fair and got plenty of responses.

    Since I've never evaluated the security posture of a company before I could
    use some resources on how to best get started. They run the gamut from P2P
    to WANs. Of course, I want to give them some value while gaining valuable
    experience for my resume.

    Thanks in advance,

    Kim Clark

    _________________________________________________________________
    Need a shot of Hank Williams or Patsy Cline? The classic country stars are
    always singing on MSN Radio Plus. Try one month free!
    http://join.msn.com/?page=offers/premiumradio

    ---------------------------------------------------------------------------
    ----------------------------------------------------------------------------

    ---------------------------------------------------------------------------
    ----------------------------------------------------------------------------


  • Next message: dave kleiman: "RE: how to flood the mac address table of a switch?"