Re: rose fragmentation attack

From: Jay (jay.tomas@infosecguru.com)
Date: Wed Jun 27 2007 - 15:14:25 EDT


Installing malware is by no means similar to sending enough syn packets to overwelm a server.

A boilerplate or framework is just that a framework. It can and should be altered to serve the best needs of the client.

Thats is why its beneficial to think through and develop your open approach vs. downloading someone else's and following it line by line.

Penetration testing is an art and a science and requires an open mind not rigid structure

Jay

----- Original Message -----
From: Justin Ferguson [mailto:jnferguson@gmail.com]
To: jay.tomas@infosecguru.com
Cc: pen-test@securityfocus.com
Sent: Wed, 27 Jun 2007 11:55:40 -0700
Subject: Re: rose fragmentation attack

Yes it could be part of a pen-test, just like popping the internal
webserver and putting up mpack to own the workstations could be,
however my point being that I've never been involved in one where DoS
was in scope (in fact every boilerplate that ive seen has specifically
included language to strictly prohibit it).

On 6/27/07, Jay <jay.tomas@infosecguru.com> wrote:
> DoS could very well be part of a penetration test. It just depends on whether you have permission from the client.
>
> It is important to understand every vector that may be used to attack the infrastructure.
>
> Customarily this would be a test environment that mirrors production that would not impact their clients if it was taken offline.
>
> Its better they know they are susceptable to DoS in a penetration test vs. when their site is offline for hours/days when a botnet comes a knocking.
>
> Jay
>
> ----- Original Message -----
> From: Justin Ferguson [mailto:jnferguson@gmail.com]
> To: pen-test@securityfocus.com
> Sent: Wed, 27 Jun 2007 08:25:31 -0700
> Subject: Re: rose fragmentation attack
>
> i apologize to everyone whose time i wasted with their helping me, but
> i was curious, The rose attack was a DoS, and I cannot recall a single
> penetration test where DoS was in scope, which should make one
> question the legitimacy of my request, however that didn't happen (i
> got a lot of pretty helpful replies)
>
> So really, whats the difference between what I asked and what this guy asked?
>
> > --- Nikolaj <lorddoskias@gmail.com> wrote:
> >
> > > Anyone has some first-hand info about this exploitation toolkit? Or
> > > any info where it can be bought?
> >
> >
> >
> > Kishore
> > Penetration Tester
> > Smart Security
> > T.Nagar , Chennai
> > Phone: 91 98841 80767
> >
>
> ------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Are you using SPI, Watchfire or WhiteHat?
> Consider getting clear vision with Cenzic
> See HOW Now with our 20/20 program!
>
> http://www.cenzic.com/c/2020
> ------------------------------------------------------------------------
>
>


------------------------------------------------------------------------
This List Sponsored by: Cenzic

Swap Out your SPI or Watchfire app sec solution for
Cenzic's robust, accurate risk assessment and management
solution FREE - limited Time Offer

http://www.cenzic.com/wf-spi
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:54 EDT