Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity

Table Of Contents

Summary
Foreword
Introduction
Document Scope
OPST / OPSA / OPSE / OWSE
Certifications of Compliance
Products and Services
Intended Audience
End Result
Analysis
Terms and Definitions
Security Test Type
Common Terms
Glossary
Compliance
Legislation
Policy
Rules Of Engagement
Sales and Marketing
Assessment / Estimate Delivery
Contracts and Negotiations
Scope Definition
Test Plan
Test Process
Reporting
Process
The Security Map
Security Map Module List
Risk Assessment
Risk Evaluation
Perfect Security
Security Metrics
Sections and Modules
Test Modules and Tasks
Module Example
Methodology
3. Document Grinding
Section B – Process Security
1. Request Testing
2. Guided Suggestion Testing
3. Trusted Persons Testing
Section C – Internet Technology Security
1. Network Surveying
2. Port Scanning
3. Services Identification
4. System Identification
5. Vulnerability Research and Verification
6. Internet Application Testing
7. Router Testing
8. Trusted Systems Testing
9. Firewall Testing
10. Intrusion Detection System Testing
11. Containment Measures Testing
12. Password Cracking
13. Denial of Service Testing
14. Security Policy Review
Section D – Communications Security
1. PBX Testing
2. Voicemail Testing
3. FAX Review
4. Modem Testing
Section E – Wireless Security
1. Electromagnetic Radiation (EMR) Testing
2. [802.11] Wireless Networks Testing
3. Bluetooth Network Testing
4. Wireless Input Device Testing
5. Wireless Handheld Security Testing
6. Cordless Communications Testing
7. Wireless Surveillance Device Testing
8. Wireless Transaction Device Testing
9. RFID Testing
10. Infrared Systems Testing
11. Privacy Review
Section F – Physical Security
1. Perimeter Review
2. Monitoring Review
3. Access Controls Testing
4. Alarm Response Review
5. Location Review
6. Environment Review
Report Requirements Templates
Network Profile Template
Server Information Template
Firewall Analysis Template
Advanced Firewall Testing Template
IDS Test Template
Social Engineering E-mail Attack Template
Trust Analysis Template
Privacy Review Template
Containment Measures Review Template
E-Mail Spoofing Template
Competitive Intelligence Template
Document Grinding Template
Social Engineering Template
Legal Penetration Testing Checklist
Test References
sap 27
Protocols
Open Methodology License (OML)
0 of .
Results for:
No results containing your search query
P. 1
osstmm.en.2.2

osstmm.en.2.2

Ratings: (0)|Views: 500|Likes:
Published by Mikhail Kalinin

More info:

Published by: Mikhail Kalinin on Dec 21, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/10/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 43 are not shown in this preview.
You're Reading a Free Preview
Pages 47 to 98 are not shown in this preview.
You're Reading a Free Preview
Pages 102 to 106 are not shown in this preview.
You're Reading a Free Preview
Pages 110 to 129 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->