Penetration Testing mailing list archives

RE: snmp


From: "Harper, Patrick" <patrick.harper () phns com>
Date: Mon, 27 Sep 2004 10:39:33 -0500

Juan,
        Is this going to take you as long to get as it took you to get
stuff working on the snort list?

You start by telling your manager that you have security concerns and
that you would like to perform a vulnerability analysis and provide a
remediation plan for the network.  This should be happening on a regular
basis anyways.

If he says no then keep all the e-mails and correspondence so you can
prove to anyone who asks later that you had these concerns. If you feel
very strongly take it to whomever is above your manager.



 
-----Original Message-----
From: DokFLeed [mailto:dokfleed () dokfleed net] 
Sent: Monday, September 27, 2004 9:10 AM
To: pen-test () securityfocus com
Subject: Re: snmp


Jaun,
I have no idea how you got the "Mcse Ccna Ccsa Scsa"
tailing your name,
first of all you are not authorized to do this, in a decent company you
should get fired, second, you had just exposed your company by posting
the phone number third, LEARN first what SNMP , then pen-test it .
I ran to security bizness coz I got sick of new IT comers, and for a
while I though none of them will dare to join the security bizness
unless they feel they are competitive. It took me 16 years before I can
say yes I know something about Security..
when you fix all of that you might be able to pen-test anything, I hope
u got my point




=========================
----- Original Message -----
From: "R. DuFresne" <dufresne () sysinfo com>
To: "Juan B" <juanbabi () yahoo com>
Cc: <pen-test () securityfocus com>
Sent: Saturday, September 25, 2004 12:39 AM
Subject: Re: snmp



You start by getting yer "get out of jail free card" from mgt.  If you
lack that, you are likely to get fired and then prosecuted.

thanks,

Ron DuFresne

On Wed, 22 Sep 2004, Juan B wrote:

HI,



I am responsible of the security in my company.



One of the sysadmins told me that they use in one of
the networks Snmp and that the community is public.



I want to pen test this issue meaning that I want to
find ways to retrieve from the devices info, and show
the IT manager that he must change the community.



The reason that I want to do It my self is that I
don't believe in the way that is just going to him and
tell him..." its written in the internet that we must
change public community to something else.



So how or from where do I start ?



Thanks



juan

=====
Juan Fernandez.

Security Engineer

Tel: +972-52-4306781
Mcse Ccna Ccsa Scsa




__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail


------------------------------------------------------------------------
------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one
interaction
with one of our expert instructors. Check out our Advanced Hacking 
course,
learn to write exploits and attack security infrastructure. Attend a 
course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of
an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html

------------------------------------------------------------------------
-------


-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       admin & senior security consultant:  sysinfo.com
                       http://sysinfo.com

"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation."
               -- Johnny Hart

testing, only testing, and damn good at it too!



------------------------------------------------------------------------
------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one
interaction
with one of our expert instructors. Check out our Advanced Hacking
course,
learn to write exploits and attack security infrastructure. Attend a 
course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of
an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html

------------------------------------------------------------------------
-------





------------------------------------------------------------------------
------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one
interaction
with one of our expert instructors. Check out our Advanced Hacking
course,
learn to write exploits and attack security infrastructure. Attend a
course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------
-------







Disclaimer:
This electronic message, including any attachments, is confidential and intended solely for use of the intended 
recipient(s). This message may contain information that is privileged or otherwise protected from disclosure by 
applicable law. Any unauthorized disclosure, dissemination, use or reproduction is strictly prohibited. If you have 
received this message in error, please delete it and notify the sender immediately. 




Current thread: