Home page logo

pen-test logo Penetration Testing mailing list archives

Re: [PEN-TEST] Noisy ou stealthy ?
From: Iván Arce <core.lists.pentest () CORE-SDI COM>
Date: Wed, 8 Nov 2000 13:39:33 -0300

----- Original Message -----
From: "Nicolas Gregoire" <nicolas.gregoire () 7THZONE COM>
Newsgroups: core.lists.pentest
Sent: Wednesday, November 08, 2000 1:19 PM
Subject: [PEN-TEST] Noisy ou stealthy ?

Hi pen-testers,

just a question about methodology.

When you are doing some pen-tests, do you use the noisy way (full port
range scan, lot of scanning for cgi whitout IDS evasion techniques,
brute force attacks on FTP) or the sthealthy one ?

It all depends on time constraints, who did contract you to
do the pen test and what are the requirements of the customer.

I think that the noisy way is easiest (just schedule a Nessus scan , a
whisker scan and an ISS scan for the night, read the results and attack)

Well, generally we have to validate the results of our scans first.
I dont know if this is the case for everyone here but we usually
double check the results of nessus/iss/cybercop/nmap/etc.

I havent seen yet two runs of any of those programs
against a remote network across slow links that outputs exactly
the same results.



"Understanding. A cerebral secretion that enables one having it to know
 a house from a horse by the roof on the house,
 It's nature and laws have been exhaustively expounded by Locke,
 who rode a house, and Kant, who lived in a horse." - Ambrose Bierce

==================[ CORE Seguridad de la Informacion S.A. ]=========
Iván Arce
PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836  B25D 207B E78E 2AD1 F65A
email   : iarce () core-sdi com
Florida 141 2do cuerpo Piso 7
C1005AAG Buenos Aires, Argentina.
Tel/Fax : +(54-11) 4331-5402

--- For a personal reply use iarce () core-sdi com

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]