Re: Penetration Testing or Vulnerability Scanning?

From: Doug Foster (fosterdat_private)
Date: Sun Mar 09 2003 - 16:38:10 PST

  • Next message: mike Hughes: "A little Help with Pen Testing My systems!"

    I like the explanation in the new FFIEC Information Security booklet:
    
    "Penetration tests, audits, and assessments can use the same set of
    tools in their methodologies. The nature of the tests, however, is
    decidedly different. Additionally, the definitions of penetration test
    and assessment, in particular, are not universally held and have changed
    over time.
    
    Penetration Tests. A penetration test subjects a system to the
    real-world attacks selected and conducted by the testing personnel. The
    benefit of a penetration test is to identify the extent to which a
    system can be compromised before the attack is identified and assess the
    response mechanism’s effectiveness. Penetration tests generally are not
    a comprehensive test of the system’s security and should be combined
    with other independent diagnostic tests to validate the effectiveness of
    the security process.
    
    Audits. Auditing compares current practices against a set of standards.
    Industry groups or institution management may create those standards.
    Institution management is responsible for demonstrating that the
    standards they adopt are appropriate for their institution.
    
    Assessments. An assessment is a study to locate security vulnerabilities
    and identify corrective actions. An assessment differs from an audit by
    not having a set of standards to test against. It differs from a
    penetration test by providing the tester with full access to the systems
    being tested. Assessments may be focused on the security process or the
    information system. They may also focus on different aspects of the
    information system, such as one or more hosts or networks."
    
    -- Doug
    
    On Fri, 2003-03-07 at 01:07, Rizwan Ali Khan wrote:
    > When usually we talk about penetration testing tools, 
    > people mosly 
    > refer to Vulnerability Scanners like iss, typhon, 
    > nessus, cybercop etc. 
    > 
    > 
    > However penetration testing tools are those who 
    > penetrate as well, the 
    > above scanners do not do that. 
    > 
    > 
    > One needs to have a working version of SSH exploit for
    > 
    > the SSH 
    > vulnerability detected by the vulnerability scanner, 
    > so is it necessary for 
    > penetration tester to have access to the latest of 
    > underground exploit? or 
    > could all this be done in an ethical manner too? 
    > 
    > 
    > please guide I am so confused between two of these 
    > methodologies. 
    > 
    > 
    > 
    > 
    > __________________________________________________
    > Do you Yahoo!?
    > Yahoo! Tax Center - forms, calculators, tips, more
    > http://taxes.yahoo.com/
    > 
    > ----------------------------------------------------------------------------
    > 
    > Are your vulnerability scans producing just another report?
    > Manage the entire remediation process with StillSecure VAM's
    > Vulnerability Repair Workflow.
    > Download a free 15-day trial:
    > http://www2.stillsecure.com/download/sf_vuln_list.html
    > 
    > 
    
    
    
    



    This archive was generated by hypermail 2b30 : Tue Mar 11 2003 - 08:59:58 PST