Penetration Testing mailing list archives

Re: Using 0days as part of pen-test?


From: Pete Herzog <lists () isecom org>
Date: Tue, 13 Jan 2009 16:42:18 +0100

Hi,

I think you don't have any problems except if you performed actions outside the statement of work, the contract, or the scope or live in France. As I can see it:

1. By penetrating in you were able to see more of the infrastructure and make a better analysis of what is there and what its limitations are so you did a good thing. Not to mention by saving time with that you had time to be much more thorough, test from various vectors, and give a real value for the test.

2. You researched and used a flaw which is your information now and you are free to use it to make money as long as you did not sign a contract with the service owner preventing you from investigating nor testing the software - or are in France. If the FTP service owner does not have you on the payroll to do their Q&A then you owe them nothing.

3. Others are free to research that FTP service as well and find the bug as well. Don't be sure you are the only one with it.

4. Report to the client your complete security test audit report showing what they have and the limitations. You can use your attack as proof that they are running a service without controls and what you can do with it. Such proof is good to push quick action but the rest of your report showing the lack of controls will be what really helps them lock down.

5. That you did what a Blackhat might do is not a problem because you were under contract and really, there are many types of Blackhats and your modus operandi just follows one type. (see the Hacker Profiling Project from ISECOM).

6. If you are in France, well, be happy because many other people are trying to get there as well and you're already there. So forget the pen test and live it up like a tourist in France!

Sincerely,
-pete.


ArcSighter Elite wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi list.
I'm rather new to responsible disclosure, so experts may found silly my
question, but I've founded pretty interesting, so please keep reading.

A few days ago, I've identified a vulnerability in some closed-source
vendor's ftp server.
Then, days later I was requested to do pen-test against a company. While
I was information gathering, I've managed to identify that third-party
ftp daemon in one of the company's external hosts.
I wasn't pretty sure how to proceed in such a situation, but I've fal to
the temptation and exploited the flaw. That led to a 20-mins entire
network compromise, and of course proved that the network was vulnerable.
After doing that, and thinking about what I've done; I wasn't that happy
about my results.
First, I got the issue of how to report this vulnerability to the
company, without breaking the -intermediary- vendor contact and
agreement; because the vulnerability exists and its exploitable as I've
proved, but it wasn't general public knowledge the flaw is present.

I know I've braked a lot of phases of any pen-test framework, but IMHO a
blackhat will proceed exactly this way: they'll exploit the network
through its weakest link, and is my task to protect the company from the
blackhat, not from pen-testers (at least not the evil ones).

Secondly, the flaw provided me with enough information that otherwise
will take me a lot longer to achieve; so I felt the audit process has
been somehow compromised.

I think I've been clear enough, if I haven't just ask for more info.

What's the most ethical way to proceed in such a situation?

Sincerely.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFJa0ZSH+KgkfcIQ8cRArj7AKD7hZCFOk+GBdkQ+v271wckKA8ECACgjWqR
U1rhxUzEw6Z+Q7P7Vxwe9mc=
=5m9Z
-----END PGP SIGNATURE-----








Current thread: