Does Nessus count as a strategy? On 17 March 2010 16:01, Arnaud <[email protected]> wrote:
> I just completed my first hacker challenge and was surprised by the fact > that my biggest obstacle was keeping track of the various > systems/ports/services/vulns that I identified. With no coherent strategy > for keeping track of what systems and services I had already targeted I > quickly lost track of where I had been and what I had done. What strategy > or > software do others use to keep track of such things? > > Thanks. > Arnaud- > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
