Penetration Testing mailing list archives

Re: Qualys


From: Mark Teicher <mht3 () earthlink net>
Date: Thu, 9 Feb 2006 17:02:10 -0500 (GMT-05:00)

So a quick network security assessment using automated tools could result in a network security assessment that could 
take 8 hours from start to finish, as a remote service, which could be seen as the main attack point of hackers.??  Bad 
marketing speak in my mind, and a possible deliverable would be: an Executive Report, Top Threats to the Network 
Report, Threat Matrix Listing, Full Technical Report and an Outbriefing...  Right there sounds like a lot of work or 
not depending on one's view.  With some automated vulnerability assessment tools, the easier way to do this would be 
insert one's logo in the left or right hand corner of the automated report, add a few blurbs and send it out.  Caveat: 
Verify the results before sending, some automated tools generate lots of false positives, one would be very foolish if 
they were to send a 18,000 page report with only two recommendations.  BTW, recommending updated Cisco IOS to the 
current release may be an option, young jedi


-----Original Message-----
From: Gail Thorpe <gail () sec-tec co uk>
Sent: Feb 9, 2006 11:29 AM
To: pen-test () securityfocus com
Subject: Re: Qualys

Well, if we are going to get picky about terminology, surely a Class A 
environment  means a network with a Class A subnet configured, not 
necessarily one with any particular number of hosts. Ever seen a 10.X.X.X 
network with three hosts on it? I have.

The devil is in the detail, so be careful.

----- Original Message ----- 
From: "Justin Ferguson" <jnferguson () gmail com>
To: "Byron Sonne" <blsonne () rogers com>
Cc: "US Infosec" <usinfosec () gmail com>; <pen-test () securityfocus com>
Sent: Thursday, February 09, 2006 4:19 AM
Subject: Re: Qualys


Everyone seems to have missed what I think was his/her's point. He
asked the *technical* contact if they had every deployed in a Class A
environment (aka 16 million hosts), and he/she responded 'sure we've
supported clients with 60 thousand hosts!' (which isn't even a class b
btw), and the technical ignorance of their technical person is what
closed the door for ncircle. Or at least that is what I get out of his
email, not 'please tell me how i should deploy a vulnerability scanner
in my network' but rather a dialogue on the technical competence of
the employee's.



On 2/8/06, Byron Sonne <blsonne () rogers com> wrote:
Greetings,

nCircle came to do a demonstration for my team once.  I work in an
enviornment that has a full routable class A.   I asked the technical
guy there if they had ever deployed their appliances in a Class A
enviornment and he said sure we have supported clients with 60K hosts.
   That was the end of our consideration.

How long ago did you give it a demo? That sounds like it must have been
a good while ago, or perhaps there was a mis-understanding of some sort.

For folks with class A networks, something that big you'd deploy
multiple units of our product as per our product architecture and
design, as most orgs of that kind of size have done.

If you like, I could put you in touch with someone inside the company
that could discuss any issues you had. If I may ask, who did you opt to
go with instead of nCircle?

Cheers,
Byron




------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, 
forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers 
are
futile against web application hacking. Check your website for 
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before 
hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers 
are
futile against web application hacking. Check your website for 
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before 
hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------






__________________________________________________________________________
The contents of this e-mail are confidential and are intended solely for
the use of the person to whom they are addressed.  If you are not the
intended recipient of this message please notify the sender and delete it
immediately, disclosure of its content to any other person is prohibited
and may be unlawful.  Sec-Tec does not accept any responsibility for
viruses and it is your responsibility to scan the e-mail and attachments.
Any liability arising from any third party acting on information contained
in this e-mail is hereby excluded.
--------------------------------------------------------------------------


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: