Re: Pentester convicted..

From: Mark Teicher (mht3@earthlink.net)
Date: Fri May 12 2006 - 15:01:06 EDT


That is one of the many versions that spawned from the Intel vs Randal Schwartz story. The real story had a lot more interesting tidbits of information that led that the contractor under question demonstrated patterns of behavior that violated Intel's contractor policies. I was in a very similiar situation with my previous employer but it had to do with transferring from one business unit from one company into another business unit in the same company, thus the statement was made to me is that they frowned upon "cowboy" like behavior when in fact no one in the second group took any initiative at all, they were afraid of their own shadow. Et Tu Cesar is all I can say..

-----Original Message-----
>From: Dotzero <dotzero@gmail.com>
>Sent: May 11, 2006 8:51 PM
>To: pen-test@securityfocus.com
>Subject: Re: Pentester convicted..
>
>I'm surprised that there are people who claim to be pen-testers that
>are even surprised that he has been charged under the circumstances.
>Anyone remember Randal Schwartz, Intel and Randals felony conviction?
>And remember, Randal was employed at Intel. His defense was (surprise)
>that he was being a good samaritan showing the flaws in their
>security.
>
>You can agree or disagree with whether these sorts of prosecutions
>make sense but to be surprised that they occur defies belief. The
>bottom line is that you generally don't test other peoples systems
>without permission and expect not to have bad things happen to you.
>
>I'm by no means advocating security through obscurity. I cannot
>condone random individuals actively attacking a websites security
>under the guise of helping. What would your position be if his
>activity had been identified and he had been arrested and charged
>before emailing Securityfocus?
>
>Just a few thoughts.
>
>------------------------------------------------------------------------------
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
>Choice Award from eWeek. As attacks through web applications continue to rise,
>you need to proactively protect your applications from hackers. Cenzic has the
>most comprehensive solutions to meet your application security penetration
>testing and vulnerability management needs. You have an option to go with a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com for details.
>------------------------------------------------------------------------------
>

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:57 EDT