This may or may not be 100% on topic, but I believe that it would fit in good. From what I have read pen-tests are supposedly well documented from the start (or should be) and some form of report generated at the end. My question is, what templates/procedures do the members of this list use? Are there any standards for documentation, and/or publicly available templates/procedures? Thanks, Gerald Cody Bunch gbunchat_private --------------------------------------------------------------------------- Attend Black Hat Briefings & Training Federal, September 29-30 (Training), October 1-2 (Briefings) in Tysons Corner, VA; the world<92>s premier technical IT security event. Modeled after the famous Black Hat event in Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors. Symantec is the Diamond sponsor. Early-bird registration ends September 6 Visit: www.blackhat.com ----------------------------------------------------------------------------
This archive was generated by hypermail 2b30 : Sun Aug 24 2003 - 10:44:38 PDT