Security Basics mailing list archives
Re: Newbie Hacker Tools
From: Spigga <spigga () gmail com>
Date: Sun, 9 Jan 2005 23:41:08 -0600
WARNING!! I like to hear myself type so this will be long winded yet I hope provide some insight. I think there is a critical point being missed here, first I perform penetration tests and vulnerability scans as part of my position for a well known Service Provider and I used to write signatures for one of the many new "Patch Remediation: companies so I know a little about "security scanners". There are an untold number of tools out there that will give you a canned report that you then will send to your client with no understanding whatsoever of how secure or insecure they are. Classes are a great idea but have you seen the price tags on some of these"ethical hacker" coarses? In my opinion security evaluation of any kind is all in how its performed, not what tools you used. If Nessus shows a vuln do you take it at face value or do you verify that the version of the application is actually vulnerable? When you run a port scan, is it the box you are hitting or some security device in front of it performing a NAT? These and a million more things need to be considered for a complete "Penetration Test" or "Vulnerability Assessment". And make sure you know which of these two popular services you are selling. If you didn't attempt to exploit the service in a lab environment or under other controlled conditions then you are NOT performing a penetration test. Do you tell them that the version of IIS they are running is outdated or do you inform them that the custom ASP they are running allows SQL injection and show them the bogus entry you put into their sample "Northwind" database on the SQL server? Security is a process, testing security should be too. Try looking at http://www.isecom.org/osstmm/ or other similar testing methodologies. This will allow you to get a fair price for performing a fair service and not giving your client a false sense of security, or insecurity. A complete security evaluation fetches a better price and gives the client a better product as well as maybe even making their networks and applications more secure. On Wed, 05 Jan 2005 20:46:06 -0500, Edmond Chow <echow () videotron ca> wrote:
Hello all, My name is Ed and I run a technology consulting company. I have begun offering computer security audits to my clients and, as I am not experienced in hacking, have been subcontracting this work out. The written reports that I have received back from the hackers leave much to be desired! Not knowing too much about intrusion detection but realizing that when almost nothing is found wrong (from a security viewpoint) with a client's network, I am in big trouble! Either the hacker does not have the experience to find any problems or there really are not any problems. On my first few audit assignments, I was barely able to break even as I had to hire two independent hackers for each i.e., a second hacker had to be hired to give me an independent assessment of the network. I then cut and pasted the two reports into a final "acceptable" one. I am at a crossroads where I can either give up on the security audits or learn to do them myself. I have chosen the latter and was hoping to get some help from experts like you. I realize that I will have a steep hill to climb but I feel confident that I can learn enough to be much more proficient that the hackers that I am currently paying. I'm really confused about what tools I need in my "toolkit" for Windows-related audits. I've heard a lot about Nessus as a freeware program but am confused when I go on the nessus.org site and see that it might not be free. Other programs I've heard of include nmap, SAINT, Newt. And, perhaps, there are tools out there (either free or not) that would provide me with an "audit in a box?" I'm guessing that the pros have a select few tools of the trade that they use. You've listed a bunch of tools on your site as well. I realize that ethical hacking is an art and that no two hackers will use exactly the same tools but I am hoping to learn to use the tools they most often use. Thanks for any help that you can shed on this subject. Regards, Ed
Current thread:
- Re: Newbie Hacker Tools, (continued)
- Re: Newbie Hacker Tools Steve Sanders (Jan 07)
- Re: Newbie Hacker Tools Vijay Vikram (Jan 07)
- RE: Newbie Hacker Tools James McGee (Jan 07)
- RE: Newbie Hacker Tools skill2die4 (Jan 07)
- Re: Newbie Hacker Tools AdMod (Jan 07)
- Re: Newbie Hacker Tools Mordread Wallas (Jan 07)
- Re: Newbie Hacker Tools Corey LeBleu (Jan 07)
- Re: Newbie Hacker Tools Yann Autissier (Jan 07)
- Re: Newbie Hacker Tools Leif Ericksen (Jan 07)
- RE: Newbie Hacker Tools Edmond Chow (Jan 07)
- Re: Newbie Hacker Tools Spigga (Jan 10)
- Re: Newbie Hacker Tools James Eaton-Lee (Jan 10)
- RE: Newbie Hacker Tools Brunner, Mark (Jan 07)
- Re: Newbie Hacker Tools H Carvey (Jan 07)