From: Alvin Oga (alvin.sec@Mail.Linux-Consulting.com)
Date: Sun Jul 20 2003 - 01:59:20 EDT
On Thu, 17 Jul 2003, Paul Vet wrote:
> Except for trying actual exploits, give nmap (http://www.insecure.org/nmap/)
> a shot. It's very powerful on its own, and CPAN has some perl modules
> (http://search.cpan.org/search?query=nmap) to control it if you're feeling
> creative.
>
> You might want to consider Nessus (http://www.nessus.org/) for it's tests,
> it has an exploit scripting engine (I believe).
okay.... i'll bite ... why does everybody/somebody think that "pen-test"
means to run a port scan w/ nmap/nessus .. etc ..
so what if nmap and other port scanner tells you that you have
- port 25 open on your mail server
- port 80 is open on your web server
- port 22 is open on your ssh login server
...
... now what do you do with that info ???
...
-- i say there is a dayz work of patches to apply to most of the generic
linux distro's install and depending on time, budget and paranoia,
that there is a minimum of 1-2 hrs a day to baby sit "each server"
and/or automating your "test farm of updates"to be automatically
updating your "100,500,1000,5,000 production machines"
-- for a tool that tells you a result of the "hackability" of any server
- run "all of the script kiddie" tools ...
it's all free, and have been written and proved to work or not
if the vulnerability exists
- this doesn't require any skill set, other than finding the
scripts that the "kiddies" uses to play with servers on the net
c ya
alvin
---------------------------------------------------------------------------
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:37 EDT