Security Basics mailing list archives

RE: pen test


From: "Worrell, Brian" <BWorrell () isdh IN gov>
Date: Wed, 12 Dec 2007 07:45:49 -0500

Mike,


The Feds have changed things in recent years, in such that Pen testing
on your own gear / apps is a suggesting thing.  Go look at the Nist
800-100 document. Below is a copy of what they say you SHOULD do as part
of a Vulnerability Identification step of a Risk Management plan.


**System security testing, using methods such as automated vulnerability
scanning tools; security, test, and evaluation (ST&E); and penetration
testing can be used to augment the vulnerability source reviews and
identify vulnerabilities that may not have been previously identified in
other sources.**

NIST 800-30 goes on to say **The automated vulnerability scanning tool
is used to scan a group of hosts or a network for known vulnerable
services (e.g., system allows anonymous File Transfer Protocol [FTP],
sendmail relaying).**

I recall seeing a demo of a pen testing tool that did not exploit them,
but did run checks to see if you were open to them.

All I am saying is that if you are suppose to do a Risk Assessment due
to HIPAA or even the PCI-DSS, it has to be more than a port scan, you
have to assess the patch level, known coding issues, etc, or you are not
meeting the regs / laws.  Still, I would work with your web host, and
get a project plan together, and document and see.  Who knows, maybe you
just need to VM the box and pen test if off the VM not the live.

Thanks
Brian

-----Original Message-----
From: Michael R. Martinez [mailto:mike () security-bounce com] 
Sent: Tuesday, December 11, 2007 12:05 PM
To: Worrell, Brian; Marty Resnick; listbounce () securityfocus com;
security-basics
Subject: Re: pen test

Brian,

A vulnerability assessment is completely different as well. Yes, you can
assess the vulnerability from a technilogical standpoint of your host.
For example, an open port, let's say, port 80 is open on your host. What
you are looking for is a vulnerability, port 80 "can" be vulnerability.
My "want" to attack that port can, and the vulnerabilities associated
with port 80, create the exploit. Basically, a vulnerability assessment
is a test to see what ports are open and if any are open are they
vulnerable to the attack. After which you begin to label the likelyhood,
high, med, low or scale it 1-10. 

You are not wrong about the laws, such as PCI compliance that want you
to testprocess, procedures and technology, but PCI is more than just
testing ports, its identify process associated with how you handle
personal identifiable information, privacy practices, physical access to
servers, procedures, etc. Port scanning for vulnerabilities is a
component of the overall compliance test.

You cannot ask your host to subvert there security measures but they
will certainly deny you, you can however, ask that you run security
scans because there are services for this such as comodo and scan alert.


I am well aware of the security certs out there and the C|EH as I am a
certified ethical hacker among sevaral other security certs, I just
don't add them on because 1) there are guys with no certs that are just
as good and 2) they mean I passed a test. From my answers I hope you can
judge me and not my certs.

Having said that, I hope I clarified some of this for you and if not
feel free to respond back.

Cheers!

Mike

Michael R. Martinez
TF: 800-987-7307

-----Original Message-----
From: "Worrell, Brian" <BWorrell () isdh IN gov>

Date: Tue, 11 Dec 2007 07:13:41
To:<mike () security-bounce com>,"Marty Resnick"
<marty () techmaking com>,<listbounce () securityfocus com>,"security-basics"
<security-basics () securityfocus com>
Subject: RE: pen test


Michael,

Am I wrong, but there are lots of practices and in some cases laws that
say that you need to run  vulnerability assessments to be compliant.
If you were to ask you web host in writing before doing it, that should
solve the possible "legality" issue that it sounds like you talking
about.

As far as I know, White Hat hacking has never been illegal, if done
correctly and above board.  If it was, why would SANS and other offer
Certified Hacker classes and certs?

Thanks
Brian

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Michael R. Martinez
Sent: Monday, December 10, 2007 7:54 PM
To: Marty Resnick; listbounce () securityfocus com; security-basics
Subject: Re: pen test

Marty,

absolutely not, this is called hacking. Pen testing is actively
exploiting a server, identifying a weakness exploiting gaining access.
Are you talking about scanning ports? Could you provide a little more
detail. If you mean pen-testing, then the answer is no.

Cheers
------Original Message------
From: Marty Resnick
Sender: listbounce () securityfocus com
To: security-basics
Sent: Dec 10, 2007 9:35 AM
Subject: pen test

Am I able to pen test or run a vulnerability assessment on my web
hosting company. I got the idea after reading this article.
http://www.securitypark.co.uk/Security_article.asp?articleid=260173

--
Marty Resnick
Techmaking Inc.
(877) 291-1110 (office)
(661) 209-2089 (mobile)
(805) 512-9603 (fax)
marty () techmaking com



Michael R. Martinez
TF: 800-987-7307


Current thread: