Security Basics mailing list archives
RE: Consulting Question
From: "Craig Wright" <Craig.Wright () bdo com au>
Date: Thu, 10 May 2007 08:54:21 +1000
Chris, My take would be: 1 Does the company have a statement on their site that categorically allows you to find other means of access and check the code? 2 Do they categorically and clearly state that they allow all forms of deep browsing? 3 Do they ask for you to check and find possible vulnerabilities? 4 Do you have a (good) prior contract with the firm to engage in these actions. If the answer is not "yes" to all three you have committed a trespass. There are limits on an implied access to a website. Any implied (i.e. not express access as mention above) access is limited by the aims of the firm and convention. Although public, websites are not designed to be targets (though they may end up as one). The result is that you have in fact breached the website owners property rights. The result is that in most (US, AU, NZ, EU) jurisdictions, you have committed a crime if you do this action. If you approach the firm - you have provided them evidence. If you post it to a list in this case there is evidence. Being public knowledge is not a shield. Estoppel provisions will not help you other than in for maybe downstream civil consequences. Google hacking is still a violation. The information is in Google, but you have to take an informed action to uncover it. This makes up intent. Regards, Craig Craig Wright Manager of Information Systems Direct +61 2 9286 5497 Craig.Wright () bdo com au +61 417 683 914 BDO Kendalls (NSW) Level 19, 2 Market Street Sydney NSW 2000 GPO BOX 2551 Sydney NSW 2001 Fax +61 2 9993 9497 www.bdo.com.au Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. The information in this email and any attachments is confidential. If you are not the named addressee you must not read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received this message in error, please notify the sender by return email, destroy all copies and delete it from your system. Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator () bdo com au. BDO Kendalls is a national association of separate partnerships and entities. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Simmons, James Sent: Thursday, 10 May 2007 4:55 AM To: sammons () cs utk edu; security-basics () securityfocus com Subject: RE: Consulting Question I wont mention about how what you said was wrong since others have already commented. But for your disclosure I would suggest 3com's Zero Day Initiative, if in fact what you found was a zero day. http://www.zerodayinitiative.com/ If you found an existing exploit with their site, then I would be very careful in how you approach this. It really depends on how you found it (i.e.. some google hacking). Or were you illegally scanning this companies systems? If it was a google hack, then an argument can be made that it is public knowledge and thus you COULD be shielded from legal action. (Of course this is theoretical, as the company can sue you just because ... See MPAA and RIAA lawsuits for references.) Personally, I really wouldn't mention it to the company (unless you are proof positive of your legal standing), and just solicit them for your services like a professional. Regards, Simmons -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of sammons () cs utk edu Sent: Tuesday, May 08, 2007 2:32 PM To: security-basics () securityfocus com Subject: Consulting Question Hello All, I would like to get my feet wet doing some general security consultation work (network audits, penetration testing, etc.). My questions concerns a proper approach to potential clients. Consider this situation, I have found a few vulnerabilities in the company's web application product that could lead to potential identity theft and system compromise. This being a relatively large company, how would one go about informing the company about this vulnerability without them leaving you 100% out of the equation? In the case that the company is not interested in further third-party assistance I have a second question (concerning credit for finding such vulnerability). What is the proper/ethical protocol for publishing a software vulnerability? Are there any other methods that would insure credit while protecting the company from mass exploitation? I thank you in advanced for your input. Best Regards, Chris
Current thread:
- 3 questions on MSN, Security Logs and Federal help, (continued)
- 3 questions on MSN, Security Logs and Federal help Ismael Gonzalez (May 09)
- Re: Consulting Question Fabio Cerullo (May 09)
- Re: Consulting Question Adam Pal-Moldovan (May 09)
- Re: Consulting Question sammons (May 09)
- RE: Consulting Question Jones, David H (May 09)
- RE: Consulting Question David Gillett (May 09)
- RE: Consulting Question Simmons, James (May 09)
- Re: Consulting Question me (May 09)
- RE: Consulting Question Al Saenz (May 09)
- RE: Consulting Question Laundrup, Jens (May 09)
- RE: Consulting Question Craig Wright (May 09)
- Re: Consulting Question Stephen Thornber (May 10)
- RE: Consulting Question Craig Wright (May 10)