RE: What is being a pen tester really like? (fwd)

From: Erin Carroll (amoeba@amoebazone.com)
Date: Wed Aug 02 2006 - 15:41:45 EDT


I don't think the post was a troll at all. People like myself who have been in
the industry a long time have noticed that the sophistication of tools
available today has reached a point where lack of technical knowledge isn't the
unscalable handicap it once was to be a pen-tester. (Notice I didn't say
anything about the *quality* of said pen-tester)

Until relatively recently, in order to be successful as a pen-tester you had to
have some kickass technical abilities. There was no Metasploit or Core Impact,
there was no WebInspect or Appscan or Nessus... hell, with few exceptions not
so long ago (1996-ish?) you had to roll your own tools for just about anything.
Nowadays, you could get by as a pen-tester with something like Core Impact,
Metasploit, or Canvas and a host supporting FOSS tools. Would I recommend it?
No way. Such activity would only get the low-hanngig fruit and miss other huge
vulnerabilities. If it wasn't in an exploit package for their tool, it would be
missed. Do I think that a tool monkey could get by as a pen-tester? Yeah,
probably. I've seen it happen. Do I consider them "pen-testers"? Barely. I
don't think they're *good* (or even moderately competent) pen-testers.

But as you said, if they penetrate...

However, I think the real point behind what was said is that pen-testing has
become commoditized to an extent where communications ability is just as
important as the technical skill. In some cases, communication skills can make
up for a lack in the geek department.

YMMV,

--
Erin Carroll
Moderator - SecurityFocus pen-test list
"Any significantly advanced incompetence
   is indistinguishable from malice"
On Tue, 1 Aug 2006, Arian J. Evans wrote:
> Was this post a successful troll, or is the level of
> technical competence in the pen-testing space so
> commoditized that "nor does it require deep technical
> skill" == 2006 pen testing?
> 
> Wow.
> 
> I struggle regularly to explain the difference between
> a "vulnerability assessment" and a pen test, due to the
> fact that too many folks pimp pen test offerings that
> are just automated VA with a personal touch, like Paul
> described. That, however, is the problem, not the answer.
> 
> It is not pen-testing if there is no penetration.
> 
> </charlatan>
> 
> Forgive me, mom, for that sentence,
> 
> -ae
> 
>> -----Original Message-----
>> From: Paul Melson [mailto:pmelson@gmail.com]
>> Sent: Friday, July 28, 2006 2:28 PM
>> To: rahul.joshi2@googlemail.com
>> Cc: pen-test@securityfocus.com
>> Subject: RE: What is being a pen tester really like?
>> 
>> -----Original Message-----
>> Subject: What is being a pen tester really like?
>> 
>> rahul.joshi2@googlemail.com wrote:
>>> 
>>> I am currently a Java developer but I'm seriously thinking
>> of changing
>> paths to
>>> a career in security and pen testing.
>>> 
>>> What I would like to know is what is being a pen tester really like?
>> 
>> Despite what you may have heard, being a successful
>> pen-tester (meaning, you
>> get hired and make a living at it) is not very hard, nor does
>> it require a
>> lot of very deep technical skill.  What it really requires is
>> good verbal
>> and written communication skills, the ability to work well
>> with clients, and
>> the ability to explain security (even inaccurately) in terms
>> of business
>> value.  Do those things, and you can be successful.
>> 
>> The dirty truth about pen testers is that most of them have a
>> handful of
>> tools and scripts (like Nessus and Retina) and run them with the same
>> configs against every customer and have the same canned
>> recommendations
>> based on the results that their tools spit out.  Hell, most
>> vuln scanners
>> spit out their own remediation recommendations for the pen
>> tester to simply
>> hand over to their customers.  Additionally, for a pen test
>> to have the
>> appearance of being successful, it only needs to find some of the
>> vulnerabilities present on a network or in an application.
>> Unlike being a
>> network engineer or an sysadmin where your work has to stand
>> up to the 24/7
>> scrutiny of a live environment, being a pen tester means only
>> needing to be
>> right more often than you're wrong.
>> 
>> Not to take away from the skills or experience of any
>> individual pen testers
>> out there.  There are some Mario Andretti's out there driving
>> school busses,
>> if I may.
>> 
>> 
>> PaulM
>> 
>> 
>> 
>> --------------------------------------------------------------
>> ----------------
>> This List Sponsored by: Cenzic
>> 
>> Concerned about Web Application Security?
>> Why not go with the #1 solution - Cenzic, the only one to win
>> the Analyst's
>> Choice Award from eWeek. As attacks through web applications
>> continue to rise,
>> you need to proactively protect your applications from
>> hackers. Cenzic has the
>> most comprehensive solutions to meet your application
>> security penetration
>> testing and vulnerability management needs. You have an
>> option to go with a
>> managed service (Cenzic ClickToSecure) or an enterprise software
>> (Cenzic Hailstorm). Download FREE whitepaper on how a managed
>> service can
>> help you: http://www.cenzic.com/news_events/wpappsec.php
>> And, now for a limited time we can do a FREE audit for you to
>> confirm your
>> results from other product. Contact us at request@cenzic.com
>> for details.
>> --------------------------------------------------------------
>> ----------------
> 
>
> 
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
> 
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to 
> rise,
> you need to proactively protect your applications from hackers. Cenzic has 
> the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> 
> ------------------------------------------------------------------------------
> 
>
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:30 EDT