Penetration Testing mailing list archives
Modem assessment, was: Re: Pentester convicted..
From: Karyn Pichnarczyk <karyn () sandstorm net>
Date: Mon, 15 May 2006 15:20:08 -0400
Each company will have to calculate what their own risk factors are when a modem security assessment is made, however here are some risks/damages associated with telephone audits: 1. Poorly designed wardialers might leave lots of voice mails, which affects each person in the company with a telephone and often elicits many complaints to the department doing the scan. 2. Poorly designed wardialers might also either leave voicemail or give the classic "modem screech" sound to someone answering the phone, which is not normally well-received. 3. Can potentially dial emergency access numbers. This is specifically troublesome if some people in key positions forward their phones to the emergency line if they are away from their desk. 4. If, as part of the modem assessment segment of the telephone scan, a modem is found, IDS's might be alarmed by the "unexpected intruder". 5. It is illegal in many places/states/countries to wardial numbers which you do not control. 6. Other damages that might appear as a result of poorly designed PBX's, modem pools, etc. failing due to the modem scan call volume at unexpected hours. Our company sells a wardialer (PhoneSweep) and we recommend that before a scan is begun that there is some sort of official buy-in with upper management so that if there is any accidental fallout as a result of the scan you are covered. Having a company approved Modem Security Policy also helps. We recommend that a few short scans be done prior to the actual scan, so that any abnormalities in PBX's, VM systems, etc are dealt with prior to the company-wide scan commencing. Karyn Pichnarczyk Mark Teicher wrote:
Here is question, what is the risk factor or actual damage meter read when a security pen-tester conducts a modem security assessment ??
------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- RE: Pentester convicted.., (continued)
- RE: Pentester convicted.. Kluge (May 12)
- RE: Pentester convicted.. Shenk, Jerry A (May 11)
- RE: Pentester convicted.. Pachulski, Keith (May 11)
- Re: Pentester convicted.. nimus396 (May 11)
- RE: Pentester convicted.. Shenk, Jerry A (May 11)
- RE: Pentester convicted.. Levenglick, Jeff (May 11)
- RE: Pentester convicted.. Craig Wright (May 12)
- Re: Pentester convicted.. bofn (May 12)
- Re: Pentester convicted.. Mark Teicher (May 12)
- Re: Pentester convicted.. Mark Teicher (May 15)
- Modem assessment, was: Re: Pentester convicted.. Karyn Pichnarczyk (May 15)