RE: 3rd party vuln assesment firms

From: Erin Carroll (amoeba@amoebazone.com)
Date: Wed Dec 28 2005 - 01:16:25 EST


> I love it when vendors make claims such as this;
>
> "A Hacker's Eye View of Your Network"
>
> and even better;
>
> "We use the same tools hackers bring to bear against your systems.
> However, instead of exploiting those vulnerabilities, we
> compile vulnerability results with easy to understand
> explanations and links to the needed patches and updates, and
> then deliver the reports to your desktop on a regular basis. "
>
> So in other words they run NMap and/or Nessus.
>
> Yup... h4x0rs eye view. ROFL.

Nmap.. Okay you have a point as it realy only identifies what is open.
Nessus on the other hand is a happy medium where you can poke at the
openings to see what happens. Not all organizations have the in-house
security expertise to perform security audits and Nessus (along with other
similar tools such as the Metasploit framework, Core Impact, etc) is one of
the better tools out there to perform relatively in-depth scans of your
infrastructure. No, it doesn't take a lot of skill to run a tool but
interpreting the results, winnowing out the false positives, and knowing
which of the issues found is relevant and important (and how to address
them) is where the skill and knowledge is important.

Is it truly a hacker's view of your network? Sure... for a certain level of
hacker. Is it Uber l337? No. However, not many businesses need (or can
afford) the kind of in-depth analysis and expertise you'd find at the upper
level of the industry. Code auditing, custom-written NASL exploit packages,
deep understanding of the intricate details of each application... These are
great if you can afford it or absolutely must have it. But past a certain
point you face diminishing returns and you have to decide at which point it
is secure "enough".

The more experience I've gained in security, the more I need to learn.
Looking back I can see how naïve my concept of security was when I started
and I can only imagine what I'll think of my skills now in 10 years. At some
point we were all script kiddies using tools written by others. Eventually
you learn to write your own and use the existing tools out there to their
fullest potential. But the old adage still remains true: The only truly
secure system is one encased in cement and sunk to the botom of the ocean...
And even then I'm making no guarantees. :)

-Erin Carroll
Moderator
SecurityFocus pen-test list

>
> On 12/27/05, Michael Weber <mweber@alliednational.com> wrote:
> > Happy New Year!
> >
> > I have been using both the internal and external vuln. assessment
> > products from NetChecker. They use an array of standard
> tools, along
> > with some custom code and human analysis. I like the product, the
> > price, and the results.
> >
> > www.netchecker.net is their web site.
> >
> > -Michael
> >
> > >>> <rklemaster@hotmail.com> 12/23 11:27 AM >>>
> > I'm looking for a firm to conduct annual 3rd party vulnerability
> > assesments for a nationwide carrier ISP. If anyone has any
> references
> > or stories to share, I'd like to hear about them.
> > thanks!
> >
> >
> >
> >
> > E-MAIL CONFIDENTIALITY NOTICE: This communication and any associated
> > file(s) may contain privileged, confidential or proprietary
> > information or be protected from disclosure under law
> ("Confidential
> > Information"). Any use or disclosure of this Confidential
> > Information, or taking any action in reliance thereon, by any
> > individual/entity other than the intended recipient(s) is strictly
> > prohibited. This Confidential Information is intended
> solely for the
> > use of the
> > individual(s) addressed. If you are not an intended recipient, you
> > have received this Confidential Information in error and have an
> > obligation to promptly inform the sender and permanently
> destroy, in
> > its entirety, this Confidential Information (and all copies
> thereof).
> > E-mail is handled in the strictest of confidence by Allied
> National,
> > however, unless sent encrypted, it is not a secure communication
> > method and may have been intercepted, edited or altered during
> > transmission and therefore is not guaranteed.
> >
> >
> >
> >
> ----------------------------------------------------------------------
> > -------- Audit your website security with Acunetix Web
> Vulnerability
> > Scanner:
> >
> > Hackers are concentrating their efforts on attacking
> applications on
> > your website. Up to 75% of cyber attacks are launched on shopping
> > carts, forms, login pages, dynamic content etc. Firewalls, SSL and
> > locked-down servers are futile against web application
> hacking. Check
> > your website for vulnerabilities to SQL injection, Cross
> site scripting and other web attacks before hackers do!
> > Download Trial at:
> >
> > http://www.securityfocus.com/sponsor/pen-test_050831
> >
> ----------------------------------------------------------------------
> > ---------
> >
> >
>
> --------------------------------------------------------------
> ----------------
> Audit your website security with Acunetix Web Vulnerability Scanner:
>
> Hackers are concentrating their efforts on attacking
> applications on your website. Up to 75% of cyber attacks are
> launched on shopping carts, forms, login pages, dynamic
> content etc. Firewalls, SSL and locked-down servers are
> futile against web application hacking. Check your website
> for vulnerabilities to SQL injection, Cross site scripting
> and other web attacks before hackers do!
> Download Trial at:
>
> http://www.securityfocus.com/sponsor/pen-test_050831
> --------------------------------------------------------------
> -----------------
>
> --
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.1.371 / Virus Database: 267.14.8/215 - Release
> Date: 12/27/2005
>
>

-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.371 / Virus Database: 267.14.8/215 - Release Date: 12/27/2005
 
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 
Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:18 EDT