Vulnerability Enumeration For Penetration Testing

Docs that have proven to be a staple in understanding computer/network security. This is not an inclusive forum and nothing ipublished will tell you how to 0wn someone, these docs will help you understand how you got 0wnd.
Post Reply
User avatar
Aelphaeis_Mangarae
n00b
Posts: 12
Joined: Wed Jul 06, 2005 9:12 am
Contact:

Vulnerability Enumeration For Penetration Testing

Post by Aelphaeis_Mangarae » Mon Nov 13, 2006 12:05 am

This paper is a sequel to my “Learn Information Gathering By Example”.
This paper will go through looking for Vulnerabilities in remote system(s), which is what you would do in a Penetration Test after gathering information on the target. I will be using real world examples for nearly everything in this paper.
http://www.milw0rm.com/papers/112

Post Reply