Typical methodologies include the footprinting process which is basically
gathering information on the target hosts be that a Nmap scan or simple
information gathering from ARIN records.  Then a vuln scan is usually done
using Nessus or whatever.  From this step is where you seperate the real
"pen-testers" vs. the script kiddies in suits.  Some will take their
scanner reports slap their logo on it and call it a day while others will
have the abilities to use exploits be that borrowed from other sources or
created in house.  I guess it depends on what the customer wants and the
skill level of the team doing the work is............ but don't get me
started...........

On Sun, 2 Mar 2003, Rizwan Ali Khan wrote:

> Date: Sun, 2 Mar 2003 01:08:26 -0800 (PST)
> From: Rizwan Ali Khan <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: [Full-Disclosure] Penetration Testing or Vulnerability Scanning?
>
>
> When usually we talk about penetration testing tools, people mosly refer to 
> Vulnerability Scanners like iss, typhon, nessus, cybercop etc.
>
> However penetration testing tools are those who penetrate as well, the above 
> scanners do not do that.
>
> One needs to have a working version of SSH exploit for the SSH vulnerability 
> detected by the vulnerability scanner, so is it necessary for penetration tester to 
> have access to the latest of underground exploit? or could all this be done in an 
> ethical manner too?
>
> please guide I am so confused between two of these methodologies.
>
>
>
> ---------------------------------
> Do you Yahoo!?
> Yahoo! Tax Center - forms, calculators, tips, and more

-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

"I don't intend to offend, I offend with my intent"

[EMAIL PROTECTED]
http://www.nmrc.org/~hellnbak

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to