mailing list archives
Re: [PEN-TEST] Noisy ou stealthy ?
From: Jose Nazario <jose () BIOCSERVER BIOC CWRU EDU>
Date: Wed, 8 Nov 2000 11:28:32 -0500
On Wed, 8 Nov 2000, Nicolas Gregoire wrote:
When you are doing some pen-tests, do you use the noisy way (full port
range scan, lot of scanning for cgi whitout IDS evasion techniques,
brute force attacks on FTP) or the sthealthy one ?
So, what's your method ?
depends on what they're interested in testing, their intrusion detection
systems (ie staff, host or network based IDS systems, what have you) or
vulnerability assessments. for the former, try the whole shebang from
obvious to stealthy with all possible options and permutations attempted.
see what shows up. for the latter, there's no need if all you want to do
is evaluate the software they're running unless it's to attempt to
penetrate. if it suffices to say, 'this database interface is known to be
vulnerable at these points' then, unless it's contracted for, you don't
jose nazario jose () cwru edu
PGP: 89 B0 81 DA 5B FD 7E 00 99 C3 B2 CD 48 A0 07 80
PGP key ID 0xFD37F4E5 (pgp.mit.edu)