Re: pentest documentation

From: Jürgen R. Plasser (plasser@hexagon.at)
Date: Mon Oct 02 2006 - 14:55:56 EDT


David Swafford wrote:
> I have not used this personally but I have seen it demonstrated in an
> ethical hacker training:
>
> A commercial product by the name of Core Impact. It's capabilities are
> enormous as it can capture the entire packet flow, key commands, and all
> the necessary info and then break it out to nicely written reports.
>
> Link: www.coresecurity.com/products/coreimpact/

I've heard of Core Impact and even tried to get a price info. Their
sales dpt did not respond ...

It would be nice to have some open source tools for this tasks.

Jürgen

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:04 EDT