Re: Modem assessment, was: Re: Pentester convicted..

From: Mark Teicher (mht3@earthlink.net)
Date: Tue May 16 2006 - 07:40:21 EDT


So in essence, the risk factor for a particular organization cannot be simply calculated. So if an organization's PBX is taken off-line due to a wardial assessment could be calculated much higher than the wardial software itself. For example, if one were to assess a call center or a managed call center for that matter, and accidently causes disruption in a 24x7 emergency call center, the costs or the number of lives not saved during that time period could be minimal but yet catastrophic?

-----Original Message-----
>From: Karyn Pichnarczyk <karyn@sandstorm.net>
>Sent: May 15, 2006 3:20 PM
>To: Mark Teicher <mht3@earthlink.net>
>Cc: pen-test@securityfocus.com
>Subject: Modem assessment, was: Re: Pentester convicted..
>
>
>Each company will have to calculate what their own risk factors
>are when a modem security assessment is made, however here are
>some risks/damages associated with telephone audits:
>
>1. Poorly designed wardialers might leave lots of voice mails,
>which affects each person in the company with a telephone and
>often elicits many complaints to the department doing the scan.
>
>2. Poorly designed wardialers might also either leave voicemail
>or give the classic "modem screech" sound to someone answering
>the phone, which is not normally well-received.
>
>3. Can potentially dial emergency access numbers. This is
>specifically troublesome if some people in key positions forward
>their phones to the emergency line if they are away from their
>desk.
>
>4. If, as part of the modem assessment segment of the telephone
>scan, a modem is found, IDS's might be alarmed by the "unexpected
>intruder".
>
>5. It is illegal in many places/states/countries to wardial
>numbers which you do not control.
>
>6. Other damages that might appear as a result of poorly designed
>PBX's, modem pools, etc. failing due to the modem scan call
>volume at unexpected hours.
>
>Our company sells a wardialer (PhoneSweep) and we recommend that
>before a scan is begun that there is some sort of official buy-in
>with upper management so that if there is any accidental fallout
>as a result of the scan you are covered. Having a company
>approved Modem Security Policy also helps. We recommend that
>a few short scans be done prior to the actual scan, so that any
>abnormalities in PBX's, VM systems, etc are dealt with prior to
>the company-wide scan commencing.
>
>Karyn Pichnarczyk
>
>Mark Teicher wrote:
>
>> Here is question, what is the risk factor or actual damage
>> meter read when a security pen-tester conducts a modem
>> security assessment ??
>>
>
>
>------------------------------------------------------------------------------
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
>Choice Award from eWeek. As attacks through web applications continue to rise,
>you need to proactively protect your applications from hackers. Cenzic has the
>most comprehensive solutions to meet your application security penetration
>testing and vulnerability management needs. You have an option to go with a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com for details.
>------------------------------------------------------------------------------
>

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:58 EDT