From: Nikolaj (lorddoskias@gmail.com)
Date: Wed Dec 27 2006 - 06:28:02 EST
I would like to ask a few question concerning some aspects of
penetration testing.
A friend setup a little lan to mimic an ISP. He has different services -
ranging from mysql to nagios etc. I was able to penetrate one of the
server which let me to another and so forth. Eg. I penetrated his
network. Now I want to create a legit report, so that it looks like a
real one. Can you give me links or some hints on what should one such
report include? Maybe there are drafts somewhere.
I feel that what I did was more plain hacking than just pen testing.
What are the differences between them, except the business relationship.
Regards.
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:30 EDT