O'Reilly logo

Professional Penetration Testing by Thomas Wilhelm

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 16. Archiving Data

Introduction

В запас не наглядишься. – Russian proverb: “One cannot forestall all.”
During the course of a penetration test project, a lot of documentation gets saved by the PenTest engineers – vendor documents, client documents, protocol documents, initial reports, final reports, e-mails, and everything that is recorded during that actual system attacks. Most of this data does not need to be retained at the end of a penetration test, except for a few distinct reasons.
A project manager who puts a lot of value into gathered data, whether it is for compiling metrics or other purposes, may want to retain everything. For some managers, having all the data available when needed is better than not having ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required