PENETRATION TESTING REPORT - INTRODUCTION
 

[Introduction] [Vulnerability ex1] [Vulnerability ex2] [Port Map] [Graphics] [Proof of Concept] [Report Key] [Exploit Code]

 

Contained within are the results of our security audits on your machines FOO & BAR. Please note there are serious security problems on both boxes and we recommend addressing these as soon as possible.

 

First of all, please address the issues outlined in the Vulnerability Analysis portion of this report. Detailed instructions are included that will allow your technicians to fix these problems quickly and easily. Complete port maps are also included for completeness and you should satisfy yourself that there are no services running that cannot be accounted for. Running software unnecessarily is a security vulnerability in itself and unidentified open ports can be an indication of Trojan Horse or 'rootkit' activity.

 

The Proof of Concept section demonstrates example techniques by which a hacker would exploit your system in its current configuration. In some of these cases, easily acquirable 'exploit source code' from the Internet has been used. For your information, this source code has been included in the Appendix section so as to greater facilitate your understanding of the threats.

 

Should you require further clarification of points raised in this report, our staff is always on hand to take your call.

 

For more information call us at 301-980-0501 or email us at: pwcrack@pwcrack.com

 

Please read our instructions before sending files or payments.

 
 
The information on this web site is protected by copyright.  Except as specifically permitted, no portion of this web site  may be distributed or reproduced by any means, or in any form,  without Password Crackers, Inc.'s prior written permission.   2012 Password Crackers, Inc., USA. All rights reserved.