Penetration Testing mailing list archives

Re: [PEN-TEST] 2 quick questions


From: "Bock, John (ISS San Francisco)" <JBock () ISS NET>
Date: Mon, 18 Dec 2000 14:26:20 -0500

There was a phrack article about setting up a tunn on the cisco and dumping
traffic out to
a internet host with a prog called tunnelx on your side.  Never tried it
tho,anybody
use this?

http://packetstorm.securify.com/mag/phrack/phrack56/p56-0x0a

/*
THINGS TO DO IN CISCOLAND WHEN YOU'RE DEAD:
"What you want to do is reroute some traffic from a router and send it to
some
other place, capture it and resend it to the router and make it look like
nothing ever happened."
*/

btw: is the dns for phrack.com hosed or is it just me?


From: Leon Rosenstein [mailto:l_rosenstein () MONTELSHOW COM]
Sent: Friday, December 15, 2000 8:55 AM
To: PEN-TEST () SECURITYFOCUS COM
Subject: [PEN-TEST] 2 quick questions


Hi everyone I was curious about two things as far as pen testing goes.

First is I was curious about routers:  If a network has a router (a
hardware
one, not a computer running Linux or NT).  Is there anything to be gained
from breaking into the router through one of the remote administration
points?  Is this thus a fruitless exercise or is there something to show
the
customer or gain yourself if you are auditing your network's security?

Second I was curious about social engineering.  Is this considered "fair
play?"  Is it discussed in advance?  If you're allowed to do it how far do
you take it?  Do you take it the point where you do a mass mailing of BO or
Sub 7 to show the owners of the network how vulnerable they are to this
flaw
(because isn't social engineering kind of a flaw even though it is a human
one?)  Or do you just stop with tricking them into revealing user names and
passwords?

I am not pen testing, I was just thinking about these things before I fell
asleep last night and I was curious.

Anyway public or private responses welcome.

Thanks.


Current thread: