RE: External Pentests Obsolete?



I think in a way, that's quite valid. If the external pen-test is just
running a scan, then there's not much to it...especially if that web
application is off-limits. Why would that be out of scope? Gartner
says (oooohhhh...) that 75% of attacks come through web applications.
How they come up with that and what that really means, I'm really not
interested in arguing but web applications are a HUGE security risk.
I'm not sure I'd be too quick to discount the Citrix and terminal server
access either. They can be locked down pretty well but they are also a
HUGE hole if they get compromised. I've seen admin accounts with no
password or a weak password that was accessible through terminal
services. I also think that part of a pen-test should include how the
"helpdesk/security center/whatever" responds to an attempted
attack....generally, they don't respond at all 'cuz they never look at
the logs.

Also, how are you defining external? How about sending e-mail to
internal clients that "phone home" in one way or another? How about
wireless....is that external? I think one of these tests can be a huge
eye-opener if done right. If it's just a portscan and running some
automated tool....well, that's of limited value.

-----Original Message-----
From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx]
On Behalf Of Yiannis Koukouras
Sent: Thursday, August 09, 2007 3:19 AM
To: pen-test@xxxxxxxxxxxxxxxxx
Subject: External Pentests Obsolete?

Hi all,

Do you think that an external infrastructure pentest is nowadays
obsolete?

What I want to say is that, most of the serious companies nowadays will
only have a few servers on their DMZ (web server, mail server, SSL
concentrator, terminal server, citrix) and will only allow access to one
or two ports for each of them. The rest of the infrastructure (excluding
the internet facing router and firewall) will be completely
inaccessible.

Thus, if web application testing is out of scope, there isn't much to
test, is it? Only half a dozen of services to check vulnerabilities and
misconfiguration, check if mail rely is on, make a password bruteforce
attack(?), check that the DNS can't be poison and VOILA! You have
finished!

Do you think that it is ethical to consult our clients to "buy" an
external pentest anymore?

P.S. If I am wrong, PLEASE prove me wrong!

--
Ioannis Koukouras
CISSP
MSc in Computer Systems Security
BEng in Electronic Engineering
http://www.linkedin.com/in/ikoukouras

=
Cruise Value Center - Mexico Cruises
Cruise Value Center is one of America's leading discount brokers on
Mexican cruises. Let our experts help you choose the cruise vacation
package that will meet your budget and lifestyle.
http://a8-asy.a8ww.net/a8-ads/adftrclick?redirectid=83149e4a674877039cb5
c210b2445439


--
Powered by Outblaze

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



**DISCLAIMER
This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the message. If you have received this communication in error, please notify the sender and delete this e-mail message. The contents do not represent the opinion of D&E except to the extent that it relates to their official business.


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



Relevant Pages