Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Pentester convicted..
From: Mark Teicher <mht3 () earthlink net>
Date: Fri, 12 May 2006 15:01:06 -0400 (GMT-04:00)

That is one of the many versions that spawned from the Intel vs Randal Schwartz story.  The real story had a lot more 
interesting tidbits of information that led that the contractor under question demonstrated patterns of behavior that 
violated Intel's contractor policies.  I was in a very similiar situation with my previous employer but it had to do 
with transferring from one business unit from one company into another business unit in the same company, thus the 
statement was made to me is that they frowned upon "cowboy" like behavior when in fact no one in the second group took 
any initiative at all, they were afraid of their own shadow.  Et Tu Cesar is all I can say..

-----Original Message-----
From: Dotzero <dotzero () gmail com>
Sent: May 11, 2006 8:51 PM
To: pen-test () securityfocus com
Subject: Re: Pentester convicted..

I'm surprised that there are people who claim to be pen-testers that
are even surprised that he has been charged under the circumstances.
Anyone remember Randal Schwartz, Intel and Randals felony conviction?
And remember, Randal was employed at Intel. His defense was (surprise)
that he was being a good samaritan showing the flaws in their
security.

You can agree or disagree with whether these sorts of prosecutions
make sense but to be surprised that they occur defies belief. The
bottom line is that you generally don't test other peoples systems
without permission and expect not to have bad things happen to you.

I'm by no means advocating security through obscurity. I cannot
condone random individuals actively attacking a websites security
under the guise of helping. What would your position be if his
activity had been identified and he had been arrested and charged
before emailing Securityfocus?

Just a few thoughts.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]