You are entering risky territory, IMO. You open yourself up to liability by potentially scanning/hacking another companies resources. I would put this engagement into multiple phases. Phase 1: Blind *identification* of companies resources (DIG, nslookup, whois, d&b, etc.) After Phase 1 is complete, you go back to the company with your findings. They then check off the ip's, hosts, domains, locations, etc. that they authorize you to assess along with an agreement that has been reviewed by both sides. Phase 2: Actual testing of authorized resources. -Scott DISCLAIMER: My 2c, opinions are mine and do not necessarily reflect those of my employer or anyone else. ------------------------------------- Scott C. Sanchez, CISSP Technology Project Manager Goldman Sachs Group, Inc. Information Security Department 1-212-357-9070 (x7-9070) ------------------------------------- -----Original Message----- From: Trey Mujakporue [mailto:tmujakat_private] Sent: Tuesday, October 02, 2001 10:50 AM To: Pen-Test Subject: Blind penetration testing Im about to start work on a completely blind penetraton test for a client. The only information i have been given is the company name. From this i can get their corporate web site and from there do a DIG for more company info and address ranges after which i can start my reconnaissance. Question, can anyone out there offer any tips based on this scenario? #include <signature.h> ://Trey Atarhe Mujakporue ://tmujakat_private ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/ ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
This archive was generated by hypermail 2b30 : Thu Oct 04 2001 - 10:38:37 PDT