RE: Penetration testing scope/outline

From: Chuck Fullerton (chuckf69@ceinetworks.com)
Date: Tue Oct 05 2004 - 12:53:29 EDT


Billy,

What your asking depends alot on what you want to test. I recommend you
check out the OSSTMM at www.isecom.org. The Open Source Security Testing
Methodology Manual is an excellent resource for Security Testing.

If you have any questions feel free to contact me directly and I'd be
willing to discuss it further with you.

Thanks!!

Chuck Fullerton
CEH,OPST,CISSP,CSS1,CCNP,CCDA,CNA,A+

-----Original Message-----
From: Billy Dodson [mailto:CraftedPacket@securitynerds.org]
Sent: Tuesday, October 05, 2004 10:45 AM
To: pen-test@securityfocus.com
Subject: Penetration testing scope/outline

Anyone have any documents they are willing to share on the scope of work
for a pen-test? I have looked online but was unable to find any available
documentation. If anyone could provide me with a some links or
documentation outlining a pen-test/network audit it would be greatly
appreciated.

----------------------------------------------------------------------------

--
Internet Security Systems. - Keeping You Ahead of the Threat
When business losses are measured in seconds, Internet threats must be
stopped before they impact your network. To learn how Internet Security
Systems keeps organizations ahead of the threat with preemptive intrusion
prevention, download the new whitepaper, Defining the Rules of Preemptive
Protection, and end your reliance on reactive security technology.
http://www.securityfocus.com/sponsor/ISS_pen-test_041001
----------------------------------------------------------------------------
---
------------------------------------------------------------------------------
Internet Security Systems. - Keeping You Ahead of the Threat
When business losses are measured in seconds, Internet threats must be stopped before they impact your network. To learn how Internet Security Systems keeps organizations ahead of the threat with preemptive intrusion prevention, download the new whitepaper, Defining the Rules of Preemptive Protection, and end your reliance on reactive security technology. 
http://www.securityfocus.com/sponsor/ISS_pen-test_041001
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:07 EDT