Re: Penetration Testing Reports

From: Alice Bryson (abryson@bytefocus.com)
Date: Wed Apr 12 2006 - 08:22:58 EDT


You may try Eeye Retina scanner evaluation version. You have 15 days
to use, and the report is neatly. But evaluation version do not
include remedation report. Will remedation important for you?

30 Mar 2006 03:53:32 -0000, rkraus@telcomtex.net <rkraus@telcomtex.net>:
> Hey all,
>
> I am looking to put together some reports for client that give a outline of what vulnerabilities were found on his network. I know I could just print out the Nessus and LanGuards scans and present that, but I think that alone is kind of cheesy.
>
> Is there anyplace that I can get a example of a vulnerability assessment report, for external and internal audits? I dont want to re-create the wheel, I am sure someone already has on put together.
>
> Any help would be greatfull, I have docs put together for my HIPAA audits, but none for Pen Tests.
>
> Thanks for any help!!!
>
> Even an example of a good one would be great, i can recreat it and format it to my companys style guide to make it our own :-)
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> As attacks through web applications continue to rise, you need to proactively
> protect your applications from hackers. Cenzic has the most comprehensive
> solutions to meet your application security penetration testing and
> vulnerability management needs. You have an option to go with a managed
> service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
> Download FREE whitepaper on how a managed service can help you:
> http://www.cenzic.com/forms/ec.php?pubid=10025
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com
> ------------------------------------------------------------------------------
>
>

--
http://www.lwang.org
lwang.org provides online base64 encode and decode, crc32 md5 and sha1
hashing, online ciphers, encryption and decryption. We are engaged in
adding more common use lookup service.
We collect spam for research at abryson@bytefocus.com
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:49 EDT