Application and Effectiveness of Pen-testing

From: Drew Masters (drewmasters@gmail.com)
Date: Thu Aug 04 2005 - 08:32:04 EDT


I'm currently completing an MSc in Information Security with my
dissertation covering the application and effectiveness of
pen-testing.

Is anyone willing to give their views on the effectiveness of
different methods in different situations?

More importantly if anyone is able to give real world examples of
different approaches to pen-testing and their effectiveness It'd be
much appreciated.

Cheers

Drew

------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:41 EDT