mailing list archives
Re: pen test
From: "Michael R. Martinez" <mike () security-bounce com>
Date: Tue, 11 Dec 2007 17:04:40 +0000
A vulnerability assessment is completely different as well. Yes, you can assess the vulnerability from a technilogical
standpoint of your host. For example, an open port, let's say, port 80 is open on your host. What you are looking for
is a vulnerability, port 80 "can" be vulnerability. My "want" to attack that port can, and the vulnerabilities
associated with port 80, create the exploit. Basically, a vulnerability assessment is a test to see what ports are open
and if any are open are they vulnerable to the attack. After which you begin to label the likelyhood, high, med, low or
scale it 1-10.
You are not wrong about the laws, such as PCI compliance that want you to testprocess, procedures and technology, but
PCI is more than just testing ports, its identify process associated with how you handle personal identifiable
information, privacy practices, physical access to servers, procedures, etc. Port scanning for vulnerabilities is a
component of the overall compliance test.
You cannot ask your host to subvert there security measures but they will certainly deny you, you can however, ask that
you run security scans because there are services for this such as comodo and scan alert.
I am well aware of the security certs out there and the C|EH as I am a certified ethical hacker among sevaral other
security certs, I just don't add them on because 1) there are guys with no certs that are just as good and 2) they mean
I passed a test. From my answers I hope you can judge me and not my certs.
Having said that, I hope I clarified some of this for you and if not feel free to respond back.
Michael R. Martinez
From: "Worrell, Brian" <BWorrell () isdh IN gov>
Date: Tue, 11 Dec 2007 07:13:41
To:<mike () security-bounce com>,"Marty Resnick" <marty () techmaking com>,<listbounce () securityfocus
com>,"security-basics" <security-basics () securityfocus com>
Subject: RE: pen test
Am I wrong, but there are lots of practices and in some cases laws that
say that you need to run vulnerability assessments to be compliant.
If you were to ask you web host in writing before doing it, that should
solve the possible "legality" issue that it sounds like you talking
As far as I know, White Hat hacking has never been illegal, if done
correctly and above board. If it was, why would SANS and other offer
Certified Hacker classes and certs?
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Michael R. Martinez
Sent: Monday, December 10, 2007 7:54 PM
To: Marty Resnick; listbounce () securityfocus com; security-basics
Subject: Re: pen test
absolutely not, this is called hacking. Pen testing is actively
exploiting a server, identifying a weakness exploiting gaining access.
Are you talking about scanning ports? Could you provide a little more
detail. If you mean pen-testing, then the answer is no.
From: Marty Resnick
Sender: listbounce () securityfocus com
Sent: Dec 10, 2007 9:35 AM
Subject: pen test
Am I able to pen test or run a vulnerability assessment on my web
hosting company. I got the idea after reading this article.
(877) 291-1110 (office)
(661) 209-2089 (mobile)
(805) 512-9603 (fax)
marty () techmaking com
Michael R. Martinez
Re: pen test Gregory Boyce (Dec 12)
Re: pen test scott (Dec 12)
- <Possible follow-ups>
- pen test Marty Resnick (Dec 11)