Penetration Testing mailing list archives
RE: Exploit through firewall question
From: <lists () kevskorner net>
Date: Wed, 19 Jul 2006 23:03:48 -0400
Another scenario is if you're doing VA or pentesting to support of something like the Security Testing and Evaluation (ST&E) part of a Certification and Accreditation (C&A) process. You'll want to enumerate as many of the raw vulnerabilities on your systems so the TRA can have real vulnerabilities to work with. It's one thing to enumerate vulnerabilities and another to determine exposure and the appropriate effectiveness of safeguards based on threat agents and threat scenarios and their likelihood of exploiting the residual risk. kev -----Original Message----- From: killy [mailto:killfactory () gmail com] Sent: Wednesday, July 19, 2006 3:00 PM To: mr.nasty () ix netcom com Cc: pen-test () securityfocus com Subject: Re: Exploit through firewall question
What would be the reason to test behind the firewall?
Insider threats? What if another box was compromised right next to this one? That box could be used as a springboard for other attacks. These new attacks would originate from behind the firewall. On 19 Jul 2006 13:33:13 -0000, mr.nasty () ix netcom com <mr.nasty () ix netcom com> wrote:
Thanks for the responses. You've confirmed what I had passed to mgmt. But
I still have a problem (with mgmt) understanding why?...
I perform vulnerability analysis on our outside (public) web presense,
usually during development and then after it's been deployed. I basically use the same tools for each.
Mgmt wants me to only test through the firewall as if I'm coming in like
the public. The rational is that the fw will prevent any attacks though ports other than 80 and 443. Therefore, there is no reason to change this configuration.
What would be the reason to test behind the firewall? Any suggestions? Thanks
---------------------------------------------------------------------------- --
This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's
Choice Award from eWeek. As attacks through web applications continue to
rise,
you need to proactively protect your applications from hackers. Cenzic has
the
most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with
a
managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
---------------------------------------------------------------------------- --
---------------------------------------------------------------------------- -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------------- -- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: Exploit through firewall question, (continued)
- Re: Exploit through firewall question brad Causey (Jul 18)
- Re: Exploit through firewall question mr . nasty (Jul 19)
- Re: Exploit through firewall question jm (Jul 19)
- Re: Exploit through firewall question Neil (Jul 19)
- Re: Exploit through firewall question Allen Pomeroy (Jul 19)
- Re: Exploit through firewall question Gary E. Miller (Jul 19)
- Re: Exploit through firewall question Larry Offley (Jul 19)
- Re: Exploit through firewall question Curt Purdy (Jul 19)
- Re: Exploit through firewall question Phil Frederick (Jul 19)
- Re: Exploit through firewall question killy (Jul 19)
- RE: Exploit through firewall question lists (Jul 19)
- Re: Exploit through firewall question R. DuFresne (Jul 20)
- RE: Exploit through firewall question salexander (Jul 19)
- RE: Exploit through firewall question Bob.Maggard (Jul 19)
- RE: Exploit through firewall question Moonen, Ralph (Jul 19)
- Re: Re: Exploit through firewall question bradcausey (Jul 19)