[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <43397BAF.1030804@messagelabs.com>
Date: Tue Sep 27 20:45:45 2005
From: asimmons at messagelabs.com (Andrew Simmons)
Subject: CORE-Impact license bypass
Bernhard Mueller wrote:
> Exibar wrote:
>
>> I didn't mean to imply that the consultants create their own exploits,
>>not many I know could even begin to do that, only a couple are talented
>>enough to do just that. Even for those very few, it's just not feasable
>>from a time perspective. Much quick and cost effective to use what's out
>>there.
>>
>
>
> so what use is a pentest if the consultant isn't even talented enough to
> find / create exploits for unknown vulnerabilities?
> any average admin can install and run an automatic security scanner.
> furthermore, a common nessus report contains 99% useless garbage.
A good pentester will not just hand over a Nessus (or ItsStillShit,
CANVAS,..) report. The results of a Nessus scan (as with Nmap, firewalk,
document grinding, google searches, *plus* the results of all the manual
scouting about that's done) are data that need to be analysed and placed
in context by the pentester.
A pentester who hands over nothing but an automated report, isn't.
A pentester who doesn't bother using Nessus is either extraordinarily
good, has a very small target, or is perhaps doing something slightly
different.
It's important to draw a distinction between an attempt to find *any*
way into the target network / plant a flag file / get root on the target
system, or whatever, versus an attempt to find as many ways onto the
target as possible in the time.
Many pentest customers think they want the latter, but get the former.
Some people would call this a "vulnerability assessment" rather than a
pentest. I guess it depends whether you're joesbaitshop.com or the USAAF
Strategic Air Command (nuclear strike group), who were one of the first
orgs to use pentest / tiger team methods.
\a
--
Andrew Simmons
Technical Security Consultant
MessageLabs
______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________
Powered by blists - more mailing lists