Penetration Testing mailing list archives
Re: Security Audit
From: "bluefur0r bluefur0r" <bluefur0r () drea ms>
Date: 6 Sep 2001 21:26:31 -0000
Here are my experiences although this thread will be put to death soon... When asked by sales/billing dept. They ask me: "how long will this take?" here's an for you all. Ask for the audit to be done in two phases. Automated scanning (eg vuln-assessment) nmap, nessus, other automated tools whisker ect. and then the pen-test. The reason for this is once you do the automated scan you know exactly how many boxes are up, what services are running and what might exist on the webservers. This will help you greatly in gauging the time it will take to do the pen-test. Now you all the information you'd need to start the pen-test. In the past I made a grave error... (when i first started ;P). I did the automated scans then penetrated with JUST the results I had from the automated scans. As I reflect, I realize that was not an audit but just a pen-test. Yeah great give them the report with how you broke in. But I missed a lot of information! What about the application layer? What about custom cgi's? Audits are ment for one reason. To be through and try to find every single hole you can. Would a finicial auditor ever leave out any detail on how a company was doing? Hell no, and if they did you might want to find a new auditor ;). Obviously audits aren't the "cure all" but they should be pretty damn up-to-date and pretty damn complete to give the company the best idea possible of where the risks are and where they are tight. -blue ================================================================= Kies een origineel e-mailadres op www.emails.nl ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- RE: Security Audit, (continued)
- RE: Security Audit PM Systems - Rick Woehler (Sep 05)
- Re: Security Audit H Carvey (Sep 06)
- RE: Security Audit Filer, Eddie (ZA - Johannesburg) (Sep 06)
- RE: Security Audit Wertheimer, Ishai (Sep 06)
- Re: Security Audit Erik Tayler (Sep 06)
- Re: Security Audit Renaud Deraison (Sep 07)
- Re: Security Audit Justin Stanford (Sep 07)
- Re: Security Audit bacano (Sep 10)
- RE: Security Audit Roberts, Kevin S (Sep 06)
- RE: Security Audit Ogle Ron (Rennes) (Sep 06)
- Re: Security Audit bluefur0r bluefur0r (Sep 06)
- Re: Security Audit Rob J Meijer (Sep 07)
- RE: Security Audit Aleksander Czarnowski (Sep 07)
- RE: Security Audit Ogle Ron (Rennes) (Sep 10)
- Re: Security Audit H Carvey (Sep 10)
- Re: Security Audit bacano (Sep 10)
- How to discover FW-1 management module or GUI? Carmelo Floridia (Sep 12)
- Re: How to discover FW-1 management module or GUI? Sheik Abdulla (Sep 13)
- Re: How to discover FW-1 management module or GUI? Alex Butcher (Sep 13)
- Re: How to discover FW-1 management module or GUI? Michael Batchelder (Sep 14)
- Re: How to discover FW-1 management module or GUI? Gareth Bromley (Sep 23)
- Re: Security Audit bacano (Sep 10)
