From: Joel Jose (joeljose420@gmail.com)
Date: Mon Apr 24 2006 - 01:21:52 EDT
people,
i am facing a small conceptual difficulty in the
project(ospttm.pbwiki.com). we need to do a reconnaisance of the
target and prepare logistics for the attack, like mapping the target
network.. etc but when we use nessus and metasploit, where do our
efforts fit the picture?.. when we have correctly mapped the target
network using firewalk,nmap,amap..etc . Ok the whois and dnsquery can
give you target ip's to put in nessus, but what bout others?...
isthere a way to integrat our results with these automated tools?.. or
the traditional method of using firewalk,nmap..etc has fallen down to
current trends like nessus?
joel.
-- As soon as men decide that all means are permitted to fight an evil, then their good becomes indistinguishable from the evil that they set out to destroy. - Christopher Dawson, The Judgment of Nations ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@cenzic.com for details. ------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:52 EDT