From: ijl20042004@yahoo.es
Date: Wed Nov 30 2005 - 13:22:32 EST
Hi all.
I'm making a pentration test, and there is a program with full access to
the instalation.
I would like to know if exist another program to control and monitor any
kind of execution of a program with access to full instalation:
- What files execute de file monitorized
- What files read
- What files create
- What files modify
- What communications generate (output): ftp, telnet, http, https,
etc. with its output directions
- What communications receive (input): ftp, telnet, http, https,
etc. with its input directions
- Memory usage
- etc.
Any information will be grateful.
Thanks in advance.
______________________________________________
Renovamos el Correo Yahoo!
Nuevos servicios, más seguridad
http://correo.yahoo.es
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:
Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:12 EDT