Re: rules of engagement scope

From: Hylton Conacher(ZR1HPC) (hylton@conacher.co.za)
Date: Sun May 21 2006 - 03:45:16 EDT


Marco Ivaldi wrote:
> On Sat, 13 May 2006, James Kelly wrote:
>
>> I'd be curious to find out what the typical scoping is for a pen test
>> rules of engagement agreement.
>>
>> Do folks go with a "anything goes" or "no holds barred" approach? What
>> limits on ROE do people normally see in these types of agreements?
>
>
> Take a look at ISECOM's OSSTMM 2.1 Rules of Engagement:
>
> http://www.isecom.org/projects/rules.shtml
>
> Someone here mentioned Denial of Service testing, speaking of which:
>
> "6. Distributed Denial of Service testing over the Internet is
> forbidden." "7. Any form of flood testing where a person, network,
> system, or service, is overwhelmed from a larger and stronger source is
> forbidden."
>
> Cheers,
I understand that rules of engagment are/should be required if only a
specific item/prorocol is being tested, as with any software testing
plan, but for a general penetration test I cannot understand why rules
are set for engagement. since when do blackhat hackers and crackers
abide by rules?

If you want a physical item checked, you call in the
agents/manufacturers and ask them to prove their security claims. Once
you have satisfied yourself that you are safe, you assume that that same
device would protect you from unauthorized entry ie from a burglar.

When a burglar does decide to visit you for some asset relocation, he is
not only going to try and get in via the door that you have just had
tested. He needs to penetrate the security in whatever manner he can so
as to get what he wants.

In conclusion you hope that the various test that you have done on as
many of the components as possible, will withstand a rogue attack. If
they don't then it is time to have a rules of engagement created/updated
to protect against that particular event.

Remember the old analogy that NO system is fully secure as security is
defined differently by different people.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:59 EDT