RE: Blind penetration testing

From: Jim Becher (jimat_private)
Date: Tue Oct 02 2001 - 20:07:43 PDT

  • Next message: talisker: "Re: Hacking demo - most spectacular techniques"

    Two suggestions:
    
    1) One thing I have found useful in identifying address blocks is (in the
    US) ARIN.  If you do a whois at the ARIN site for the company name, it will
    tell you what address space has been SWIP'd out to them.
    
    2) Also, if they have an Autonomous System Number, and are running BGP --
    that is another way to find out address space, who their providers are, etc.
    Telnet into route-views.oregon-ix.net (no username/password needed), and do
    a "show ip bgp | in <AS #>.
    
    HTH
    
    
    -bech
    
    -----Original Message-----
    From: Trey Mujakporue [mailto:tmujakat_private]
    Sent: Tuesday, October 02, 2001 9:50 AM
    To: Pen-Test
    Subject: Blind penetration testing
    
    
    Im about to start work on a completely blind penetraton test for a client.
    The only information i have been given is the company name. From this i can
    get their corporate web site and from there do a DIG for more company info
    and address ranges
    after which i can start my reconnaissance.
    Question, can anyone out there offer any tips based on this scenario?
    
    
    
    
    #include <signature.h>
    ://Trey Atarhe Mujakporue
    ://tmujakat_private
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Thu Oct 04 2001 - 10:55:53 PDT