Penetration Testing mailing list archives
RE: snmp
From: "Harper, Patrick" <patrick.harper () phns com>
Date: Mon, 27 Sep 2004 10:39:33 -0500
Juan, Is this going to take you as long to get as it took you to get stuff working on the snort list? You start by telling your manager that you have security concerns and that you would like to perform a vulnerability analysis and provide a remediation plan for the network. This should be happening on a regular basis anyways. If he says no then keep all the e-mails and correspondence so you can prove to anyone who asks later that you had these concerns. If you feel very strongly take it to whomever is above your manager. -----Original Message----- From: DokFLeed [mailto:dokfleed () dokfleed net] Sent: Monday, September 27, 2004 9:10 AM To: pen-test () securityfocus com Subject: Re: snmp Jaun, I have no idea how you got the "Mcse Ccna Ccsa Scsa" tailing your name, first of all you are not authorized to do this, in a decent company you should get fired, second, you had just exposed your company by posting the phone number third, LEARN first what SNMP , then pen-test it . I ran to security bizness coz I got sick of new IT comers, and for a while I though none of them will dare to join the security bizness unless they feel they are competitive. It took me 16 years before I can say yes I know something about Security.. when you fix all of that you might be able to pen-test anything, I hope u got my point ========================= ----- Original Message ----- From: "R. DuFresne" <dufresne () sysinfo com> To: "Juan B" <juanbabi () yahoo com> Cc: <pen-test () securityfocus com> Sent: Saturday, September 25, 2004 12:39 AM Subject: Re: snmp
You start by getting yer "get out of jail free card" from mgt. If you lack that, you are likely to get fired and then prosecuted. thanks, Ron DuFresne On Wed, 22 Sep 2004, Juan B wrote:HI, I am responsible of the security in my company. One of the sysadmins told me that they use in one of the networks Snmp and that the community is public. I want to pen test this issue meaning that I want to find ways to retrieve from the devices info, and show the IT manager that he must change the community. The reason that I want to do It my self is that I don't believe in the way that is just going to him and tell him..." its written in the internet that we must change public community to something else. So how or from where do I start ? Thanks juan ===== Juan Fernandez. Security Engineer Tel: +972-52-4306781 Mcse Ccna Ccsa Scsa __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - 100MB free storage! http://promotions.yahoo.com/new_mail
------------------------------------------------------------------------ ------
Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one
interaction
with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of
an
Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------ -------
-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ admin & senior security consultant: sysinfo.com http://sysinfo.com "Cutting the space budget really restores my faith in humanity. It eliminates dreams, goals, and ideals and lets us get straight to the business of hate, debauchery, and self-annihilation." -- Johnny Hart testing, only testing, and damn good at it too!
------------------------------------------------------------------------ ------
Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one
interaction
with one of our expert instructors. Check out our Advanced Hacking
course,
learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of
an
Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------ -------
------------------------------------------------------------------------ ------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ------- Disclaimer: This electronic message, including any attachments, is confidential and intended solely for use of the intended recipient(s). This message may contain information that is privileged or otherwise protected from disclosure by applicable law. Any unauthorized disclosure, dissemination, use or reproduction is strictly prohibited. If you have received this message in error, please delete it and notify the sender immediately.
Current thread:
- Re: snmp, (continued)
- RE: snmp Jeff Gercken (Sep 24)
- RE: snmp Burnett, Robert (Sep 24)
- Re: snmp H Carvey (Sep 24)
- RE: snmp Guillaume Lavoix (Sep 24)
- RE: snmp Todd Towles (Sep 24)
- RE: snmp Christopher Adickes (Sep 24)
- Re:snmp Ghaith Nasrawi (Sep 27)
- Re: Re:snmp Jose Maria Lopez (Sep 28)
- RE: snmp Harper, Patrick (Sep 28)
- RE: snmp Hiten Pankhania (Sep 28)