From: SD List (list@security-database.com)
Date: Wed Feb 28 2007 - 15:46:56 EST
Try OSSTMM methodology (www.osstmm.org). It enumerates checks and tests to
perform.
This could be a good start.
Otherwise, imagination is the real weapon for a security pentester.
Security-Database Team.
> Does anyone have a good pentesting checklist they would recommend?
> Something to help me get organized, and away from using random attack
> vectors and the kitchen sink approach. Thanks.
>
>
> ------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Need to secure your web apps?
> Cenzic Hailstorm finds vulnerabilities fast.
> Click the link to buy it, try it or download Hailstorm for FREE.
>
> http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
> ------------------------------------------------------------------------
>
>
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:37 EDT