Security Basics mailing list archives
RE: penetration tester advice
From: Dave.Hartley () uk delarue com
Date: Wed, 17 Sep 2003 16:45:16 +0100
Pen testing is not as simple as firing up a scanner and exploiting or simply identifying and patching the exploitable service/applications/protocols etc.. that your scanner will throw up. There are many different approaches to consider and many different tools to utilise dependent on the desired results. You should clarify exactly what you hope to achieve from your "Pen Testing". For example do you simply wish to ensure that you have patched your systems and not test your Firewalls or IDS for example. There are many scenarios to consider. If you fire up say nessus (pure example) and launch a full blown scan against all of your network through your firewall and your IDS, those layers are going to go nuts logging and alerting like crazy. This may demonstrate that your firewall/IDS has holes and exposes vulnerabilities to an outsider. Or not show you any results, leaving you possibly with a false sense of security. As a serious intruder wouldn't be so silly. He/She would use common tools such as Traceroute, Ping, Telnet etc.. over periods of time (Sometimes months) depending on the "prize" and determination of the attacker. The above test would not make me sleep well at night knowing that this kind of attack would go unnoticed. The best advice is to investigate Pen Testing and techniques a lot more in depth before launching yourself into the task. You will learn a lot and you will be able to confidently and accurately be able to report on the security level of your network. If on the other hand you simply want to ensure that all your machines are fully patched and up to the latest SP's and aren't exposing any great security holes on your local or WAN networks, then using vulnerabilities scanners are a quick and sometimes easy way to do this. My best advice is really investigate the subject matter extensively and draw up or clarify exactly what it is you wish to test and prove. i.e correct or effective Firewall Policies, correct implementation and location of IDS's, secure operating systems and applications the list goes on, and to achieve each you need to have a structured methodical approach to your "Pen Test". Try the following course (If you can..) http://www.networkintrusion.co.uk/hacking.htm#ISS I'm sure you will recieve lots of alternative resources, URLS and books etc.. so I won't bother filling my mail with those. If you want anything offline, ask. Regards -----Original Message----- From: Mehmet Buyukozer [mailto:mbuyukozer () gmx co uk] Sent: 17 September 2003 20:13 To: security-basics () securityfocus com Subject: penetration tester advice Hi All; i dont know if i am sending this mail to wrong list but my problem is; i need some advice for penetration test. some of our clients wanted us to make them penetration test. I am already familiar with nessus, but they wanted to be test with different applications for scanning. Can u give me the names which are ur favourite. Thanx in advance --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ---------------------------------------------------------------------------- This message is strictly private and contains confidential information intended only for the use of the person named above. If you have received this e-mail in error and are not the intended recipient you must not disclose, copy or distribute it to anyone else. Please immediately advise the sender and delete this email and all attachments. --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ----------------------------------------------------------------------------
Current thread:
- penetration tester advice Mehmet Buyukozer (Sep 17)
- Re: penetration tester advice Valter Santos (Sep 17)
- Re: penetration tester advice Joe McCray (Sep 17)
- Re: penetration tester advice Kristopher Matthews (Sep 17)
- RE: penetration tester advice Balwant Rathore (Sep 17)
- RE: penetration tester advice Nick Owen (Sep 17)
- Re: penetration tester advice m0use (Sep 17)
- Re: penetration tester advice Evidence (Sep 17)
- <Possible follow-ups>
- RE: penetration tester advice Dave . Hartley (Sep 17)
