Hope some uberhackers read the newbie forum and take pity:
I posted something like this in the computer security forum, but here it goes anyway.
When penetration testing a single host, what steps does one usually follow. Or, is it more of a freeflow of ideas, try this, that didn't work, so try this. I would think the latter is alot more "noisy" than a carefully planned and researched attack patern. Anyone comment here?
--red0x:)
BTW: i'm at red0x@ieee.org with this [huge assed] PGP key (its the attachment)
I posted something like this in the computer security forum, but here it goes anyway.
When penetration testing a single host, what steps does one usually follow. Or, is it more of a freeflow of ideas, try this, that didn't work, so try this. I would think the latter is alot more "noisy" than a carefully planned and researched attack patern. Anyone comment here?
--red0x:)
BTW: i'm at red0x@ieee.org with this [huge assed] PGP key (its the attachment)
Comment