Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: rose fragmentation attack
From: "Jay" <jay.tomas () infosecguru com>
Date: Wed, 27 Jun 2007 15:14:25 -0400

Installing malware is by no means similar to sending enough syn packets to overwelm a server.

A boilerplate or framework is just that a framework. It can and should be altered to serve the best needs of the client.

Thats is why its beneficial to think through and develop your open approach vs. downloading someone else's and 
following it line by line.

Penetration testing is an art and a science and requires an open mind not rigid structure

Jay

----- Original Message -----
From: Justin Ferguson [mailto:jnferguson () gmail com]
To: jay.tomas () infosecguru com
Cc: pen-test () securityfocus com
Sent: Wed, 27 Jun 2007 11:55:40 -0700
Subject: Re: rose fragmentation attack

Yes it could be part of a pen-test, just like popping the internal
webserver and putting up mpack to own the workstations could be,
however my point being that I've never been involved in one where DoS
was in scope (in fact every boilerplate that ive seen has specifically
included language to strictly prohibit it).

On 6/27/07, Jay <jay.tomas () infosecguru com> wrote:
DoS could very well be part of a penetration test. It just depends on whether you have permission from the client.

It is important to understand every vector that may be used to attack the infrastructure.

Customarily this would be a test environment that mirrors production that would not impact their clients if it was 
taken offline.

Its better they know they are susceptable to DoS in a penetration test vs. when their site is offline for hours/days 
when a botnet comes a knocking.

Jay

----- Original Message -----
From: Justin Ferguson [mailto:jnferguson () gmail com]
To: pen-test () securityfocus com
Sent: Wed, 27 Jun 2007 08:25:31 -0700
Subject: Re: rose fragmentation attack

i apologize to everyone whose time i wasted with their helping me, but
i was curious, The rose attack was a DoS, and I cannot recall a single
penetration test where DoS was in scope, which should make one
question the legitimacy of my request, however that didn't happen (i
got a lot of pretty helpful replies)

So really, whats the difference between what I asked and what this guy asked?

--- Nikolaj <lorddoskias () gmail com> wrote:

Anyone has some first-hand info about this exploitation toolkit? Or
any info where it can be bought?



Kishore
Penetration Tester
Smart Security
T.Nagar , Chennai
Phone: 91 98841 80767


------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------




------------------------------------------------------------------------
This List Sponsored by: Cenzic

Swap Out your SPI or Watchfire app sec solution for
Cenzic's robust, accurate risk assessment and management
solution FREE - limited Time Offer

http://www.cenzic.com/wf-spi
------------------------------------------------------------------------

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]