Penetration Testing mailing list archives

Re: Trust Relationship Analysis


From: William Hancock <bill.hancock () isthmusgroup com>
Date: Fri, 24 Mar 2006 08:58:04 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
Defining trusts is really going to be more of a manual process then
leaning on any kind of tool set.   While some tools are great for
determining basic access, there are none to my knowledge that will
discern if that access is granted via 'good ol fashion' trust v.
simple inclusion type access.   If I had this task ahead of me, I'd
start with an up to date topology map, identify the servers that have
the ability to lean on a trust relationship (MS Domain, NIS Cloud,
etc) and then visit each host to review if there are any relationships
set up, from there identify the machines that fall under the control
of those 'master' servers.   At that point you'll have a pretty
accurate view of relationships in your network.

Beyond that you'll be doing a ton of scanning with vary suspect
results, and because a port opens on a target from some source doesn't
mean there is a trust established.

Bill Hancock
www.exactconsutling.com


Roman Tomazi wrote:
As part of a VA and Pen Test my company has been tasked to do, we have
been asked to carry out a review of host and network trust
relationships within the clients environment. Are there any best
practices and/or tools used to facilitate this kind of analysis?

 Any advice would be appreciated.

 Thanks
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
iD8DBQFEJAj8oShIrIREThQRArADAKCZMgLX3/tH7/lTs0BnMdfHtNdfQQCgkoH4
8r1IA/K1+Nt96CcnVlDar9s=
=8ngy
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: