Results 1 to 3 of 3

Thread: Network Security Approach

  1. #1
    Just burned his ISO
    Join Date
    Oct 2007

    Default Network Security Approach

    Hi guys...

    absolutely new here on the scene. Kind of got thrown into network security for my job and am still fumbling around a bit...

    been asked to poke around the company servers to find out if there's anything easily exploitable (with perm of course) just to get more acquainted with the field(so far, just poking around /w backtrack info gathering and network mapping tools), but now trying to dig in a bit deeper, but I am kind of lost as to how to begin; did some port scans, but don't know what to do with all this info :P

    Assuming that I am somewhat decent /w windows / linux / programming / networking in general, what books/ links do you recommend for pen testing procedures, etc?

  2. #2

  3. #3
    Jenkem Addict imported_wyze's Avatar
    Join Date
    Jul 2007


    One book I acquired lately that would give you a broad overview is an O'Reilly Publication: "Security Warrior"

    ISBN 0-596-00545-8
    dd if=/dev/swc666 of=/dev/wyze

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts