Penetration Testing mailing list archives

RE: What is your policy on customers particapating in a pen test?


From: Steve Hutchins <Steve.Hutchins () optimation co nz>
Date: Fri, 22 Jun 2001 09:46:04 +1200

At last, someone with a common sense approach.
There's nothing wrong with the customer being there,
but if they want to watch closely, then they should
*PAY* for the training!
If they are asking for a realistic pen-test from the net,
then why should they get any warning about when it's
going to happen? They wouldn't normally get this from 
an anonymous hacker.

If the customer watches you get onto a box, what's the
betting that they will stay all night patching all the
other similar boxes so you can't exploit them.

After the initial pen test has taken place and any
follow-on rectification work has taken place, they might
want a closer working relationship, but in forming this
relationship, you will probably be excluding your company
from the next anonymous test that they want.

IMHO
Steve

-----Original Message-----
From: Gary Warner [mailto:gar () askgar com]
Sent: Thursday, 21 June 2001 8:50 a.m.
To: Joe Klein; pen-test () securityfocus com
Subject: Re: What is your policy on customers particapating in a pen
test?


My observations have been that when IT folk want to be part of a PenTest,
they are
trying to study your techniques so they can make sure of two things:
 1)  they know what is going to be attacked and when, so if they can't
defend they
can at least react with due diligence.
 2)  they know how the attack was performed so that in a follow-up test
there is no
way in hell you are going to get in.  (Or better yet, that there won't be a
follow-up test, because they can report that they could do it themselves for
far
less money.

This comes largely from the misperception that the purpose of a Pen-Test is
to slap
the hands of IT and say "bad doggie".   Face it.  Our profession pits our
skills as
violators against their skills as defenders.  That's why it is so critical
to help
them understand that this is A PART of a much larger project.

In our methodology, the IT department is usually made aware of PenTest when
their
alarms start going off OR when two weeks later we present our findings from
phase
one and two, and prepare to work with the IT staff for phases three and
four.

Involving IT in the PenTest creates an artificial world.  It would be like
calling
and making an appointment to burglarize someone's home.  Just as part of the
PenTest
is to analyze security vulnerabilites in their "normal state", part of the
PenTest
should be to analyze the responsiveness of IT to intrustions in their
"normal
state".

Unfortunately, IT  usually wants to be very involved in the PenTest planning
and
knows you are coming and when.  You want to avoid this.  First, the more
they tell
you about their network, the more artificial your PenTest becomes.  Its
impressive
to own every box when they document all the servers first.  Its more
impressive to
start with a blank sheet of paper.  The first and second phases of our
PenTest
involve *NO* data provided from the customer.  They want to be involved?
Great!
Promise them full disclosure during the Gap Analysis, and stroke their egos
and tell
them how critical their input will be during later phases of the PenTest.
As for
the timing, try to work the engagement where the PenTest will be begun
WITHIN 45
DAYS.  Don't tell them when its going to start.  Have a coordination point,
at the
highest management level possible, who will receive daily briefings on
planned
activities, so they don't go calling the FBI when they shouldn't, or vice
versa.
But let them sweat.  Let them wonder for 30 days when the attack is coming.
Let
them see some activity, but save the serious punching for the later rounds,
when you
are fresh, and they are exhausted from this uncustomary watching and
waiting.

_-_
gar


Current thread: