Re: What is your policy on customers particapating in a pen test?

From: Gary Warner (garat_private)
Date: Wed Jun 20 2001 - 13:49:41 PDT

  • Next message: George Milliken: "RE: What is your policy on customers participating in a pen test?"

    My observations have been that when IT folk want to be part of a PenTest, they are
    trying to study your techniques so they can make sure of two things:
     1)  they know what is going to be attacked and when, so if they can't defend they
    can at least react with due diligence.
     2)  they know how the attack was performed so that in a follow-up test there is no
    way in hell you are going to get in.  (Or better yet, that there won't be a
    follow-up test, because they can report that they could do it themselves for far
    less money.
    
    This comes largely from the misperception that the purpose of a Pen-Test is to slap
    the hands of IT and say "bad doggie".   Face it.  Our profession pits our skills as
    violators against their skills as defenders.  That's why it is so critical to help
    them understand that this is A PART of a much larger project.
    
    In our methodology, the IT department is usually made aware of PenTest when their
    alarms start going off OR when two weeks later we present our findings from phase
    one and two, and prepare to work with the IT staff for phases three and four.
    
    Involving IT in the PenTest creates an artificial world.  It would be like calling
    and making an appointment to burglarize someone's home.  Just as part of the PenTest
    is to analyze security vulnerabilites in their "normal state", part of the PenTest
    should be to analyze the responsiveness of IT to intrustions in their "normal
    state".
    
    Unfortunately, IT  usually wants to be very involved in the PenTest planning and
    knows you are coming and when.  You want to avoid this.  First, the more they tell
    you about their network, the more artificial your PenTest becomes.  Its impressive
    to own every box when they document all the servers first.  Its more impressive to
    start with a blank sheet of paper.  The first and second phases of our PenTest
    involve *NO* data provided from the customer.  They want to be involved?  Great!
    Promise them full disclosure during the Gap Analysis, and stroke their egos and tell
    them how critical their input will be during later phases of the PenTest.  As for
    the timing, try to work the engagement where the PenTest will be begun WITHIN 45
    DAYS.  Don't tell them when its going to start.  Have a coordination point, at the
    highest management level possible, who will receive daily briefings on planned
    activities, so they don't go calling the FBI when they shouldn't, or vice versa.
    But let them sweat.  Let them wonder for 30 days when the attack is coming.  Let
    them see some activity, but save the serious punching for the later rounds, when you
    are fresh, and they are exhausted from this uncustomary watching and waiting.
    
    _-_
    gar
    



    This archive was generated by hypermail 2b30 : Thu Jun 21 2001 - 12:46:16 PDT