Re: Trust Relationship Analysis

From: William Hancock (bill.hancock@isthmusgroup.com)
Date: Fri Mar 24 2006 - 09:58:04 EST


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
Defining trusts is really going to be more of a manual process then
leaning on any kind of tool set. While some tools are great for
determining basic access, there are none to my knowledge that will
discern if that access is granted via 'good ol fashion' trust v.
simple inclusion type access. If I had this task ahead of me, I'd
start with an up to date topology map, identify the servers that have
the ability to lean on a trust relationship (MS Domain, NIS Cloud,
etc) and then visit each host to review if there are any relationships
set up, from there identify the machines that fall under the control
of those 'master' servers. At that point you'll have a pretty
accurate view of relationships in your network.

Beyond that you'll be doing a ton of scanning with vary suspect
results, and because a port opens on a target from some source doesn't
mean there is a trust established.

Bill Hancock
www.exactconsutling.com

Roman Tomazi wrote:
> As part of a VA and Pen Test my company has been tasked to do, we have
> been asked to carry out a review of host and network trust
> relationships within the clients environment. Are there any best
> practices and/or tools used to facilitate this kind of analysis?
>
> Any advice would be appreciated.
>
> Thanks
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
iD8DBQFEJAj8oShIrIREThQRArADAKCZMgLX3/tH7/lTs0BnMdfHtNdfQQCgkoH4
8r1IA/K1+Nt96CcnVlDar9s=
=8ngy
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:43 EDT