Penetration Testing mailing list archives
Re: The legal / illegal line?
From: admin <admin () propergander org uk>
Date: Mon, 05 Mar 2007 11:05:24 +0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Barry Fawthrop wrote:
Hi All Curious to hear other views, where does the legal and illegal line stand in doing a pen test on a third party company? Does it start at the IP Address/Port Scanning Stage or after say once access is gained?? very vague I know I'm also curious to hear from other external/3rd party pen-test consultants, how they have managed to solve the problem Where they approach a client who is convinced they have security, and yet there is classic signs that they don't? You know that if you did a simple pen-test you would have the evidence to prove your point all would be mute But from my current point that would be illegal, even if no access was gained. (maybe I'm wrong) ?? Perhaps this is just a problem here where I am or perhaps it exists elsewhere also? I look forward to your input Barry ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Hi Barry, I am new to IT security and new to this list. I could be wrong here but, as far as I am aware scanning for open ports is not illegal. It is akin to walking down a residential street knocking on doors or pushing them to see if they are open. As soon as you enter a system through an open port, just as in the residential street metaphor, you are then committing trespass. The only legal option and this is dependent on the laws of the country in which the target system is located would be to scan for open ports and potential exploits, yet make no attempt to enter the system or leverage those exploits to gain access. Produce a report for the company explaining how you could take control of or pull information from their systems using the results of your legal scan. Any IT manager/leader/security bod should take your report seriously if he is worth his/her salt. Regards Dave -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFF6/l0BStvyIzJtOARAj19AJ4wk2YJ0iE5y4pgciyUxXpcdYzLmACeM6x2 1/YhnAnrCZ0EP9Rt+ObORUQ= =5eN0 -----END PGP SIGNATURE----- ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- The legal / illegal line? Barry Fawthrop (Mar 04)
- Re: The legal / illegal line? Philosophil (Mar 05)
- Re: The legal / illegal line? Varun Nair (Mar 27)
- Re: The legal / illegal line? admin (Mar 05)
- Re: The legal / illegal line? Security Guy (Mar 05)
- RE: The legal / illegal line? Craig Wright (Mar 05)
- Re: The legal / illegal line? Barry Fawthrop (Mar 05)
- RE: The legal / illegal line? McCarty, Eric C. (Mar 05)
- Re: The legal / illegal line? Tim Shea (Mar 05)
- RE: The legal / illegal line? Craig Wright (Mar 05)
- Re: The legal / illegal line? Dotzero (Mar 05)
- Re: The legal / illegal line? Martin Zimmermann (Mar 05)
- Re: The legal / illegal line? Chris Travers (Mar 05)
- Re: The legal / illegal line? Security Guy (Mar 05)
- Re: The legal / illegal line? Philosophil (Mar 05)