Penetration Testing mailing list archives

RE: distributed computing project for pen-testing?


From: "Craig Wright" <cwright () bdosyd com au>
Date: Wed, 29 Mar 2006 08:28:19 +1100


2 hosts scanning a C class

First scan 1-128 2nd 129-256

Brute force - split the keys/passwords etc.

I am missing something here as I do not see how you could possibly
require grid computing to do anything other than brute forcing (and this
is available already and has been for over a decade)

What is so difficult about splitting the processes?

Craig

-----Original Message-----
From: Joel Jose [mailto:joel () firstlegion net]
Sent: 28 March 2006 10:26
To: pen-test () securityfocus com
Subject: distributed computing project for pen-testing?

does anyone have any idea or know of any current project that uses
distributed computing power to work tools like nessus, nmap.. etc? wont
it be feasible? Biologist have them to cure the latest disease, isnt it
time we made use of it to cut time and costs? Many of my "thorough"
testing is not possible because of time constraints.. i would be one of
the happiest person in the world if such a thing ever existed!!..



thanx,
joel.


------------------------------------------------------------------------
------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively protect your applications from hackers. Cenzic has the most
comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go
with a managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm
your results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------
------


Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you 
must not use or disclose the information. If you have received this email in error, please inform us promptly by reply 
email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy. 

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice 
unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by 
a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, 
interception, corruption or unauthorised access.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: