Penetration Testing mailing list archives

Re: [PEN-TEST] Noisy ou stealthy ?


From: Jose Nazario <jose () BIOCSERVER BIOC CWRU EDU>
Date: Wed, 8 Nov 2000 11:28:32 -0500

On Wed, 8 Nov 2000, Nicolas Gregoire wrote:

When you are doing some pen-tests, do you use the noisy way (full port
range scan, lot of scanning for cgi whitout IDS evasion techniques,
brute force attacks on FTP) or the sthealthy one ?

So, what's your method ?

depends on what they're interested in testing, their intrusion detection
systems (ie staff, host or network based IDS systems, what have you) or
vulnerability assessments. for the former, try the whole shebang from
obvious to stealthy with all possible options and permutations attempted.
see what shows up. for the latter, there's no need if all you want to do
is evaluate the software they're running unless it's to attempt to
penetrate. if it suffices to say, 'this database interface is known to be
vulnerable at these points' then, unless it's contracted for, you don't
need to.

*shrug*

jose nazario                                                 jose () cwru edu
                     PGP: 89 B0 81 DA 5B FD 7E 00  99 C3 B2 CD 48 A0 07 80
                                       PGP key ID 0xFD37F4E5 (pgp.mit.edu)


Current thread: