Another good source is the book Hacking Exposed. It will give you more ideas for your lab and a good thing is that you will find vulnerabilities classified by operating systems. Cheers. --- Indian Tiger <indiantigerat_private> wrote: > Hi All, > > My management asks me to give detailed requirements > for Penetration Testing > lab setup. Same Lab I would like to utilize for > Computer Crime Investigation > as well. Currently we are following OSSTMM as > baseline for Penetration > Testing. > > Any suggestions, comments highly appreciated. > Thanking You. > > Sincerely, > > Indian Tiger, CISSP > > > ---------------------------------------------------------------------------- > > Are your vulnerability scans producing just another > report? > Manage the entire remediation process with > StillSecure VAM's > Vulnerability Repair Workflow. > Download a free 15-day trial: > http://www2.stillsecure.com/download/sf_vuln_list.html > __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - forms, calculators, tips, more http://taxes.yahoo.com/ ---------------------------------------------------------------------------- Are your vulnerability scans producing just another report? Manage the entire remediation process with StillSecure VAM's Vulnerability Repair Workflow. Download a free 15-day trial: http://www2.stillsecure.com/download/sf_vuln_list.html
This archive was generated by hypermail 2b30 : Fri Mar 07 2003 - 11:42:59 PST