got try www.sans.org. They often list the most common security holes in
companies and weaknesses in desktops, poliocies, and a whole bunch of stuff.
I took a security class with company (online courses that is) and this is a
top notch site with excellent classes if you are serious. there prices
Kurt Wall babbled on about:
> I would start with nmap, then proceed to more aggressive probes such
> as Saint or Satan. In the process, consider password guessing
> programs, packet sniffers, and some of the common root kits.
are Saint/Satan still worth it? Doesn't Nessus cover them?
--
Douglas
On January 07, Douglas J Hunley enlightened our ignorance thusly:
> If I was to start some side consulting as a Network Security Analyzer, what
> tools/steps/methodologies would everyone recommend? Opensource would be best,
> but I'm open to anything. I've made some recommendations to my firm (w