Another good source is the book Hacking Exposed.

It will give you more ideas for your lab and a good
thing is that you will find vulnerabilities classified
by operating systems.

Cheers.

--- Indian Tiger <[EMAIL PROTECTED]> wrote:
> Hi All,
> 
> My management asks me to give detailed requirements
> for Penetration Testing 
> lab setup. Same Lab I would like to utilize for
> Computer Crime Investigation 
> as well. Currently we are following OSSTMM as
> baseline for Penetration 
> Testing.
> 
> Any suggestions, comments highly appreciated.
> Thanking You.
> 
> Sincerely,
> 
> Indian Tiger, CISSP
> 
> 
>
----------------------------------------------------------------------------
> 
> Are your vulnerability scans producing just another
> report?
> Manage the entire remediation process with
> StillSecure VAM's
> Vulnerability Repair Workflow.
> Download a free 15-day trial:
>
http://www2.stillsecure.com/download/sf_vuln_list.html
> 


__________________________________________________
Do you Yahoo!?
Yahoo! Tax Center - forms, calculators, tips, more
http://taxes.yahoo.com/

----------------------------------------------------------------------------

Are your vulnerability scans producing just another report?
Manage the entire remediation process with StillSecure VAM's
Vulnerability Repair Workflow.
Download a free 15-day trial:
http://www2.stillsecure.com/download/sf_vuln_list.html

Reply via email to