RE: Limited vs full blown testing

From: R. DuFresne (dufresne@sysinfo.com)
Date: Thu Jun 24 2004 - 22:13:08 EDT


On Thu, 24 Jun 2004, Wayne Wooley wrote:

> I believe it depends on how far you want to go with your testing. There has
> been some exploits that require a two fold attack. In other words, the DOS
> attack in some systems opens up the possibility to gain root by timing it
> with a different attack.

Yes, I recall the fine work of, wasn't it Liu Die Yu? who put together
wasn't it 4 or was is as many as 5 or 6 minor looking web sploits to come
up with a massive hit in the http arena...yet, required that the victim be
lured into a nasty website if I recall. Whichg at least in this case
mihgt be more accuratly described as social engineering.

>
> But the thing is, a lot of these types of attacks that are currently out are
> not published to the public. So its a good chance you will never see them
> used against your systems. And this all so brings up the point that, no one
> can ever have a completely secure system.

Understood, one of the basic reasons that security is a layered approcah,
we attempt to isolate levels and degrees of risk, and ways to deal with
them. Firewalls fail closed, switches are properly configged, and not the
basis upon which perimiter security is based, and why disaster recovery is
part of the 'security infrastructure', to guard against dataloss, as best
as we can 'guard'.

> As there will always be exploits
> available to select individuals that do not publish their work.
>

One of the base arguements in the full-disclosure debate <smile>...

> In my experience most attacks are from individuals with very little
> knowledge as to what they are doing (kiddie scripts).
>

Which are mostly nits caught in logs or them noisey outward facing IDS's
ment to generate a rational for a security posture <I hate these by the
way>...

Still I'm interested as stated in another reply, how a DOS is defined
specifically different then a DDOS...

Thanks,

Ron DuFresne

>
> -----Original Message-----
> From: R. DuFresne [mailto:dufresne@sysinfo.com]
> Sent: Thursday, June 24, 2004 3:13 PM
> To: Peter Wood
> Cc: pen-test@securityfocus.com
> Subject: Re: Limited vs full blown testing
>
>
>
> [SNIP]
>
> >
> > We accept a brief excluding DoS attacks, as most clients just won't
> support
> > DoS testing. However we include appripriate caveats in our report and
> > continue to suggest they do these tests.
> >
>
> I'm trying to understand the significance of DDOS testing and importance.
> Thing is, if you can spew packets fast enough, or make enough connections
> to consume the resources involved, you can take a site/serice down for at
> least the duration of the attack, even pipes as large as those of
> akami<sp?> were proven to be susceptable in recent days. It's a given
> vector of attack that we live with, a risk level we hope to avoid. But,
> not something that gives away the insides of the network to thugs and
> theives. No root shell and all that, which constitute a real threat, at
> least in my mind. Perhaps I'm missing something that has come up in
> recent years that redefines DDOS as something that is preventable and a
> potential for something other then a blip, however long lasting the
> attack, in service?
>
> Thanks,
>
> Ron DuFresne
>

-- 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        admin & senior security consultant:  sysinfo.com
                        http://sysinfo.com
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation."
                -- Johnny Hart
testing, only testing, and damn good at it too!


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:57 EDT