Penetration Testing mailing list archives
Re: Trust Relationship Analysis
From: William Hancock <bill.hancock () isthmusgroup com>
Date: Fri, 24 Mar 2006 08:58:04 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Defining trusts is really going to be more of a manual process then leaning on any kind of tool set. While some tools are great for determining basic access, there are none to my knowledge that will discern if that access is granted via 'good ol fashion' trust v. simple inclusion type access. If I had this task ahead of me, I'd start with an up to date topology map, identify the servers that have the ability to lean on a trust relationship (MS Domain, NIS Cloud, etc) and then visit each host to review if there are any relationships set up, from there identify the machines that fall under the control of those 'master' servers. At that point you'll have a pretty accurate view of relationships in your network. Beyond that you'll be doing a ton of scanning with vary suspect results, and because a port opens on a target from some source doesn't mean there is a trust established. Bill Hancock www.exactconsutling.com Roman Tomazi wrote:
As part of a VA and Pen Test my company has been tasked to do, we have been asked to carry out a review of host and network trust relationships within the clients environment. Are there any best practices and/or tools used to facilitate this kind of analysis? Any advice would be appreciated. Thanks
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.1 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFEJAj8oShIrIREThQRArADAKCZMgLX3/tH7/lTs0BnMdfHtNdfQQCgkoH4 8r1IA/K1+Nt96CcnVlDar9s= =8ngy -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Trust Relationship Analysis Roman Tomazi (Mar 23)
- Re: Trust Relationship Analysis William Hancock (Mar 24)
- Fwd: Trust Relationship Analysis Roman Tomazi (Mar 31)
- <Possible follow-ups>
- Re: Trust Relationship Analysis Marco Ivaldi (Mar 28)