RE: Blind penetration testing

From: Sanchez, Scott (Scott.Sanchezat_private)
Date: Tue Oct 02 2001 - 11:55:10 PDT

  • Next message: Meritt James: "Re: Blind penetration testing"

    You are entering risky territory, IMO.  You open yourself up to liability by
    potentially scanning/hacking another companies resources.  I would put this
    engagement into multiple phases.
    
    Phase 1: Blind *identification* of companies resources (DIG, nslookup,
    whois, d&b, etc.)
    
    After Phase 1 is complete, you go back to the company with your findings.
    They then check off the ip's, hosts, domains, locations, etc. that they
    authorize you to assess along with an agreement that has been reviewed by
    both sides.
    
    Phase 2: Actual testing of authorized resources.
    
    -Scott
    
    DISCLAIMER: My 2c, opinions are mine and do not necessarily reflect those of
    my employer or anyone else.
    
    -------------------------------------
    Scott C. Sanchez, CISSP
    Technology Project Manager
    
    Goldman Sachs Group, Inc.
    Information Security Department
    1-212-357-9070 (x7-9070)
    -------------------------------------
    
    
    -----Original Message-----
    From: Trey Mujakporue [mailto:tmujakat_private]
    Sent: Tuesday, October 02, 2001 10:50 AM
    To: Pen-Test
    Subject: Blind penetration testing
    
    
    Im about to start work on a completely blind penetraton test for a client.
    The only information i have been given is the company name. From this i can
    get their corporate web site and from there do a DIG for more company info
    and address ranges
    after which i can start my reconnaissance.
    Question, can anyone out there offer any tips based on this scenario?
    
    
    
    
    #include <signature.h>
    ://Trey Atarhe Mujakporue
    ://tmujakat_private
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Thu Oct 04 2001 - 10:38:37 PDT