Full Disclosure mailing list archives

Re: new pen-test tool!


From: Jim Credland <jim () cernproductions com>
Date: Mon, 7 Jul 2014 20:44:19 +0100


I like it.  It's short - which is a blessing in these things.

However, the bigger the company the easier it is to answer positively to a general question. And generally people want 
to give you a positive answer.

SO, for a quick win make it shorter, but demand hard evidence that relates to the service you are buying. 

For example:

For insurance: check the certificate.  

For backups: check for records of tests. Backups don't count unless there's a test.  And only check the backups of the 
data that you care about.  Not any old tests the vendor happens to find a good result for.

The focused questions which require evidence are ten times as valuable - and you'll get a more consistent metric no 
matter what the company size or who you interview.

J.



On 3 Jul 2014, at 12:44, Pete Herzog <lists () isecom org> wrote:

Hi!

I have been working on a means for testing parties that we may not be
able to legally directly test yet gives a clear answer for decision
making. The idea was to use an interview like a pen-test to get
information from the subject like a tester would where "asking them"
was considered just one of the 4 means of getting information, treated
much like throwing packets to get system responses does in a pen test.

This allows you to get an idea of an attack surface of the target
before you even probe them for an attack. You can also find the weak
areas of trust to exploit. It also serves as an intro to a client's
security on the first meeting and enhances the final report.

The app has 2 parts - a trust metric and an attack surface metric (how
much you can trust them and how protected they are). Eventually this
will also combine into a final analysis. But until then...

You can try it out here:

http://archon.thewatchers.net/ISECOM/



*************
For those who want some more background about it:

The hardest part was to craft reasonable questions to answer in a
short list that didn't require much time or technical expertise. So it
is written for the office manager or similar to execute. It also meant
the questions had to be really loaded so as to answer multiple things
at once, both pro and con security/trust. I am still not satisfied
with the wording of the questions and I'm sure it may still have bugs
but we turned it from a document into a web app that allowed basic
clicking to get the answer.

Now the client had this to save in a file to revisit for annual vendor
reviews as well as for quarterly self-assessment of how they stand in
their own services and offerings. This app doesn't have that
functionality yet. They also wanted clear instructions on how to
improve the score if it was low (rudimentary analysis/resolution)
which this app also doesn't have yet.

So the Vendor Checklist uses the RAV scoring from OSSTMM 3 derived
from answers made in the checklist. The Trust Metric is a score based
on trust metrics from the same place. But both have had the OSSTMM 4
updates which include 2 new trust properties and changes in the
calculation of operational controls.

http://archon.thewatchers.net/ISECOM/

Sincerely,
-pete.

-- 
Pete Herzog - Managing Director - pete () isecom org
ISECOM - Institute for Security and Open Methodologies
www.isecom.org - www.osstmm.org
www.hackerhighschool.org - www.badpeopleproject.org
-- 
Pete Herzog - Managing Director - pete () isecom org
ISECOM - Institute for Security and Open Methodologies
www.isecom.org - www.osstmm.org
www.hackerhighschool.org - www.badpeopleproject.org

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Current thread: