Re: Penetration Whitepapers

From: miguel.dilaj@pharma.novartis.com
Date: Fri Feb 06 2004 - 02:59:35 EST


Hi Rob,

A very good source are the GIAC Certification Papers, in your case
specifically the papers on the GCIH and GCIA certification.
Links:
http://www.sans.org/
http://www.giac.org/
http://www.giac.org/GCIA.php
http://www.giac.org/GCIH.php

I hope this helps.
Kind regards,

Miguel
aka Nekromancer
(GSEC Analyst # 3425)

Rob Havelt <rob@cobal.org>
05/02/2004 17:51

 
        To: pen-test@securityfocus.com
        cc:
        Subject: Penetration Whitepapers

Hi All,

I was wondering if anyone could point me at a good resource, as I've been
looking in several different places, and haven't been able to find quite
what I needed.

I'm looking for either white papers or case studies or some such detailing

actual real world attacks (more like real-world computer crime, computer
fraud, internal attacks, etc. and less on the damage from worms or virus,
DDoS, or the like) on companies who either didn't know that they had a bad

security posture, couldn't keep on top of infosec issues, or ones who knew

(either as the result of a pen test, health check, or some other VA) and
simply didn't take any steps toward remediation.

There is a ton of theory out there, risk data, and the like, and I have
all
that. I also realize that usually when this happens companies and law
enforcement agencies, etc. try quite hard to keep the info under wraps for

the obvious reasons, but I'm thinking that there has to be a few
whitepapers out there as strictly "cautionary tales".

Anywhere anyone could point me for the info would be much appreciated.

---------------------------------------------------------------------------
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:48 EDT