Dailydave mailing list archives

Re: Herps


From: Max Vision <vision () whitehats com>
Date: Sat, 28 Feb 2004 12:24:39 -0800 (PST)

On Fri, 27 Feb 2004, Dave Aitel wrote:
So I just finished a week-long assessment of a software product and
didn't even find a way to crash it. This sort of thing is very
depressing to me, but does occasionally happen. It's like another
assessment I did recently of a web application where the most
interesting thing I found was cross-site-scripting.

I understand the feeling you are describing.  I felt that the strongest
when I first ran into a customer whose network I couldn't get into from
the outside-in.  ("first", relative to since I started doing full time
penetration for r&d/living money)  I always knew the time would come, and
had a sinking feeling, though I was happy for the customer :).  However, I
quickly compromised their network using client-centric attack.  It was
then that I decided to scrap my old model of penetration testing and
include client-centric attack as a mandatory part of the exercise.  I've
been confident about the 100% rate ever since..  The thing is my playing
field is *giant*.  You're doing the hard work.  The more narrowly you look
at something, naturally the less there is to see.  I know you are
Fuzzmaster Dave, but seems like you should expect more "failure" when
narrowly focused on one piece of code.

We're really talking apples and oranges with site versus application
assessment.  Different tools, different techniques.. just the mindset is
the same.

I occasionally hear people say "We always find something in our
assessments. We've never failed to get in." Usually the way they
justify this is by putting ICMP timestamp on their deliverables (or
the equivalent - can we just take that out of Nessus now and stop
having to see it ever again? So many other protocols (SMB and RSYNC
for example) give you the current time that it's really not an issue.
It's really not. Please, please take it out of your vulnerability
database, nessus team, if you read this).

I agree that many reported findings are seemingly trivial, however I think
it is the responsibility of the person performing the audit to present the
results of his/her testing in a meaningful way.  ICMP timestamp or netmask
replies would be relevent if perhaps that was the only response at all
from a particular IP, so it would be an explanation for it's existence on
the map (am I the only person who loves making Visio network maps
manually?)  It could also indicate a broken firewall ruleset that could be
a clue that leads them to find larger problems.  I don't think anything
should be left out... I just think that it should be reported
appropriately - in the right context in the right part of the report.

Speaking for myself though, about your comments, for me penetrating a
network is about concrete deliverables - ceo's mailspool, adding entries
to a critical database, cutting demonstration payroll checks, handing
over a list of all the executive's passwords, etc.  I'm sure there are a
lot of security companies handing over default nessus output, and its
shameful they often use the same language we do to describe their work.

Oh and about Nessus, it's a great tool, but really downright weird how so
many people fail utterly to CONFIGURE the darn thing and use it as they
should.  Based on what I've heard, it looks as though people just run the
default configuration without making any effort at all. <insert long rant
about nessus here, or not>

I have to think that if you find something major on everything you
assess that you are:
1. Way ahead of your time, skill-wise...like the ADM/ISS X-Force
people, various people on this list who hate being named, MaXX, etc.

Hm, well personally I seem to know a lot, but often go through phases of
feeling really smart, and really stupid both.  I win in large part because
I am focused and stubborn, beating my head against a problem until it's
solved (hopefully learning something in the process).  Sometimes I do
something brilliant, but usually its just ordiary hard work and LOTS of
time.  (btw I agree about MaXX - good job with the module yesteray! I have
some comments I'll write offlist)

Sorry about your bad luck on the audit Dave.  Although under NDA, maybe
you could share general observations about the application without
disclosing names or trade secret - what language it was written in, and
any special things they did to resist attack.  Did you have source?

Max
_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://www.immunitysec.com/mailman/listinfo/dailydave


Current thread: