Penetration Testing mailing list archives

Re: Mapping Class A network ( any easy trick?)


From: Tim <tim-pentest () sentinelchicken org>
Date: Wed, 9 Feb 2005 21:38:19 -0500

Apart from the timing issues (I agree totally) I still think that you
cannot call nmap+nbtstat or nmap+nessus or whatever combinatioin
'penetration testing'. To me that is Vulnerability Analysis. VA on a
class A is tricky enough. Pentesting (ie attempted exploitation of all
discovered vulenrabilities) on a full class A is extremely difficult.
Impossible for 1 man and his laptop, given average population of
networks. 

Of course not.  I was merely trying to provide some information on what
it takes to actually scan that many IPs.  Our scan only consisted of OS
fingerprinting, about 20 TCP and 20 UDP ports scanned, and a quick
nbtscan query.  This would be enough information to map a network where
one truly doesn't know what is out there, but by no means is it a
"penetration test".  Just the first step (in some situations).

tim


Current thread: