HI all.
I've been reading a couple of books on pentesting, IT security in generl, have a virtual test environment, using Kali linux.
From an accessability PoV, asking for any tips / experiences / pitfalls with using some of the main tools mentioned in the reading material I've got. I'm a screen reader user and typically SSH into Kali from the Windows host. (espeakup is broken at the moment.)
I know Berp Suite isn't accessible.
How do you find Nessus? I've got it installed and tried a basic scan. I can't make much sense of the table of results or see how to get
Hi,
Sorry if I misunderstood you but are you saying you aren't getting replies to emails you send to this list?
Do you get this reply?
Thanks.
Andrew.
________________________________________
From: Blind-sysadmins [blind-sysadmins-bounces@lists.hodgsonfamily.org] on behalf of Mitchell Green [mgreen@outlooknebraska.com]
Sent: 04 April 2017 14:15
To: Blind sysadmins list
Subject: Re: [Blind-sysadmins] Pentesting tools, experiences with accessibility thereof
It seems as if I post to a reply I think people can see my messages but if
I post a regular message I get no replies. Can anyone help?
Mitchell Green
Information Technology Facilitator
o | 402-614-3331 x226 c | 402-871-1063 f | 402-933-1616
mgreen@outlooknebraska.com
4125 S. 72nd Street | Omaha, NE 68127
NOTICE: The information contained in this e-mail transmission and any
attachment is intended solely for the person or entity to which it is
addressed and may contain confidential and/or privileged material. Any
review, retransmission, dissemination or other use of, or taking of any
action in reliance upon, this information by persons or entities other
than the intended recipients is prohibited. If you have received this
communication in error, please contact the sender and destroy any copies
of this document.
-----Original Message-----
From: Blind-sysadmins
[mailto:blind-sysadmins-bounces@lists.hodgsonfamily.org] On Behalf Of
Chris Nestrud
Sent: Monday, April 3, 2017 6:16 PM
To: Blind sysadmins list
Maybe I'm misunderstanding it or missing a button with JAWS. I'm accessing it via Firefox.
I'm fine at picking my way through learning the command line tools. Using metasploit framework, so far. I got into this as interested in networking and security. I suspect it might be one of those things I can only get so far with then be at a significant disadvantage due to accessability and speed. Well and my brain maybe too... :D
Anyway thoughts welcome.
Cheers.
Chris Turner
--- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus
_______________________________________________ Blind-sysadmins mailing list Blind-sysadmins@lists.hodgsonfamily.org https://lists.hodgsonfamily.org/listinfo/blind-sysadmins
_______________________________________________ Blind-sysadmins mailing list Blind-sysadmins@lists.hodgsonfamily.org https://lists.hodgsonfamily.org/listinfo/blind-sysadmins _______________________________________________ Blind-sysadmins mailing list Blind-sysadmins@lists.hodgsonfamily.org https://lists.hodgsonfamily.org/listinfo/blind-sysadmins