Penetration Testing mailing list archives

Re: distributed computing project for pen-testing?


From: "Jerome Athias" <jerome.athias () free fr>
Date: Wed, 29 Mar 2006 10:00:46 +0200

Hey Craig,

what about having each port of the target(s) machine(s) scanned by a
different IP (proxy)?
it will be more difficult to detect a port scan with good parameters in this
situation ;-)

----- Original Message ----- 
From: "Craig Wright" <cwright () bdosyd com au>
To: <joel () firstlegion net>; <pen-test () securityfocus com>
Sent: Tuesday, March 28, 2006 11:28 PM
Subject: RE: distributed computing project for pen-testing?



2 hosts scanning a C class

First scan 1-128 2nd 129-256

Brute force - split the keys/passwords etc.

I am missing something here as I do not see how you could possibly
require grid computing to do anything other than brute forcing (and this
is available already and has been for over a decade)

What is so difficult about splitting the processes?

Craig

-----Original Message-----
From: Joel Jose [mailto:joel () firstlegion net]
Sent: 28 March 2006 10:26
To: pen-test () securityfocus com
Subject: distributed computing project for pen-testing?

does anyone have any idea or know of any current project that uses
distributed computing power to work tools like nessus, nmap.. etc? wont
it be feasible? Biologist have them to cure the latest disease, isnt it
time we made use of it to cut time and costs? Many of my "thorough"
testing is not possible because of time constraints.. i would be one of
the happiest person in the world if such a thing ever existed!!..



thanx,
joel.


------------------------------------------------------------------------


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: