Active subscribers – to download this issue click on the cover of the magazine on the main website or scroll down this page and click the Download button
Single issue buyers – after paying for this issue click “June Issue – What Should You Look For” (which will show just above that text)to download your copy of the magazine
June Issue – What Should You Look For 02/2011 The second issue of our magazine is devoted both to pentesters and those, who would like to benefit from their services. Pentesting is still black (hat) magic to some and it is our ambition to popularize it in the way it will be a common practice for every single enterprise, not only for those “bold” enough to let strangers through their kitchen door.
Thus, the main question in this issue – apart from the usual “how” – is “why”: why to pentest. If you like straightforward explanation through a series of real-world examples dressed in digestible metaphors, take a look at David Small’s “Why Would You Want a Pentest” – check if your IT “castle” is safe from hacking armies attempting at breaching the walls and stealing from it. Then you can go straight to the pentesting supermarket with Bill Mathew’s to-buy list: “What Should You Look For”. As Bill warns, all of the products you will find in this shop come with no guarantee (whatsoever), so it might be worthwhile to check why the purchase should be done with extreme care.
Iftach Ian Amit will tell you when your pentest is meaningless and how to prevent this meaninglessness, Rishi Narang will provide you with some good statistics on vulnerabilities (with quite a rethorical question – is it worth to pentest?), and Chad Jaenke will share with you his vision on how to add value to pentesting services.
These articles are of course accompanied by a portion of technical “how-to” writings: don’t miss the part on secure windows implementations, or the CSRF. If you want to see the full list of articles in June issue, go to “contents”.
Enjoy your reading!
& Pen Test Magazine Team