Penetration Testing mailing list archives

Re: TCP/IP skills


From: "M. D." <nekromancer () eudoramail com>
Date: Thu, 08 Jul 2004 07:24:17 0000

Don Parker wrote:
Hello all, I just wanted to comment on what I see as a rather alarming trend in the 
security industry today. More and more many are becoming reliant upon tools to do their 
job whilst they ignore core components of their skillset. Specifically in this case an 
in-depth knowledge of TCP/IP. 

{snip}

I would be curious to hear of your opinions on this?


Hi Don et all,

Well... that's not news flash for me, and it has also been my concern for some time (now I've relaxed a bit...)
In fact the fundamental lack of skills can be detected in most IT security knowledge areas, except for a few qualified 
individuals (and by 'qualified' I don't mean formal qualification, don't misunderstand me).
The problem, IMHO, can be dissected in 4 parts:

a) there are not enough people with the proper skills out there
b) a lot of people consider that they HAVE the proper skills simply by using the tools
c) management [mis]understand that they only need people who use tools to do the job
d) it's usually cheaper to hire an expert rather than hiring an EXPERT ;-)

Point (a) is a reality. Probably we don't see that in the lists (perhaps because they're oriented to gather people of 
the same bizarre inclinations together ;-) but I know that most of the people working in IT security can be amazed by 
reading basic IT security books.
(On the other hand, and as long as companies are not hiring the people with the skills for whatever reason, there'll be 
a handful of such people out there waiting to be hired, or so I hope!)

Point (b) is serious, but it's hard to make the people understand that their university degree in IT plus their M$ 
certification is not preparing them to face the real IT security world. I can't (strongly) blame them, they spent a 
hell of a lot of time and money in getting all this, and they DO think that's fine. We've to blame the university and 
the company providing the certification IF they said so.

Point (c) is a tricky one... 99.9% of the time they do their job only using tools. The company don't need EXPERTS or 
"investigators" 99.9% of the time.
Company X doesn't want anyone doing a pen-test, or deploying a large scale vulnerability assessment, or doing proactive 
password auditing (or even training!). Everything is running, so... what's the reason for "spending" money in such 
strange activities?
Reality shows its ugly face 0.1% of the time, when something serious happens. Then millions can be spent (depending 
upon availability) on solving that by hiring a third party, praying to the gods, whatever.
If WE (yes, WE) don't convince management that money used in IT security prevention and detection is money INVESTED, 
they'll continue believing that's money SPENT. We know the truth, money is spent when we've to work on remediation.

Point (d) should be fairly obvious, and you can always refer to my comment on point (c) above.

In the first sentece of this email I wrote that I've relaxed a bit, and the reason is that most of the companies out 
there are as messy as we are, so even when we can face some problems (everyone is exposed to that) we're not 
PARTICULARLY vulnerable. I still would like to enhance things, but I understand that's not soooo urgent (I don't have 
to run unplugging systems ;-)

Out of the bullet points above, I would like to mention something that's specific to me. Probably other people share 
the same feelings.
I like the technical side of things. I like to be in touch with the iron. I like to pen-test.
I strongly prefer the above rather than sitting in a office (where I know how vulnerable we are) writing reports to 
management.
I know that there will be people who like to do the reports.
I will fit OK if I've to sit in front of the console and start playing g4m3z (no, not pacman).
I will do my job if I've to do reporting... I know how to do that, I've the experience, but deep in my heart I'll be 
waiting for the time when everyone realizes that we've to do something...

Cheers,

--
Nekromancer
Have YOU ever tried Lepton's Crack?



Need a new email address that people can remember
Check out the new EudoraMail at
http://www.eudoramail.com


Current thread: