here is adriel from netragard spouting about his lame company that uses
nessusd for all their testing... notice his signature has multiple emails
and phone numbers because his is incapable of passing his cissp

On Nov 1, 2007 9:31 AM, Adriel Desautels <[EMAIL PROTECTED]> wrote:

> We rely on manual testing for everything. Our philosophy is that
> automation is not nearly as effective as human talent. Human talent
> produces high quality reports.
>
> What is the name of your company?
>
>
>
> Regards,
>        Adriel T. Desautels
>        Chief Technology Officer
>        Netragard, LLC.
>        Office : 617-934-0269
>        Mobile : 617-633-3821
>        http://www.linkedin.com/pub/1/118/a45
>
> ---------------------------------------------------------------
> Netragard, LLC - http://www.netragard.com  -  "We make IT Safe"
> Penetration Testing, Vulnerability Assessments, Website Security
> reepex wrote:
> > I work at a less known security company that bans use of any automated
> > tools unless under extreme circumstances. These include times such as
> > when have 1000s of ip addresses all alive and running random windows
> > versions so we use mass scans to find any unpatched machines. We
> > strictly do not allow 'web scanners' no matter how large the size
> > because they are all crap and its quicker to find the bugs yourself
> > then verify all the false positives any web app scanner creates.
> >
> > How does your company handle these things?
> >
> > On 10/31/07, Simon Smith <[EMAIL PROTECTED]> wrote:
> > Reepex,
> >         What company are you with? I'm actually interested in finding
> infosec
> > companies that perform real work as opposed to doing everything
> > automated. Nice to hear that you're a real tester.
> >
> >         With respect to your question, doesn't msf3 have some of that
> > functionality already built into it? Have you already hit all their
> > web-apps?
> >
> > reepex wrote:
> >>>> resulting to se in a pen test cuz you cant break any of the actual
> machines?
> >>>>
> >>>> lulz
> >>>>
> >>>> On 10/31/07, Joshua Tagnore <[EMAIL PROTECTED]> wrote:
> >>>>> List,
> >>>>>
> >>>>>     Some time ago I remember that someone posted a PoC of a small
> site that
> >>>>> had a really nice looking flash animation that "performed a virus
> scan" and
> >>>>> after the "virus scan" was finished, the user was prompted for a
> "Download
> >>>>> virus fix?" question. After that, of course, a file is sent to the
> user and
> >>>>> he got infected with some malware. Right now I'm performing a
> penetration
> >>>>> test, and I would like to target some of the users of the corporate
> LAN, so
> >>>>> I think this approach is the best in order to penetrate to the LAN.
> >>>>>
> >>>>>     I searched google but failed to find the URL, could someone send
> it to
> >>>>> me ? Thanks!
> >>>>>
> >>>>> Cheers,
> >>>>> --
> >>>>> Joshua Tagnore
> >>>>> _______________________________________________
> >>>>> Full-Disclosure - We believe in it.
> >>>>> Charter:
> >>>>> http://lists.grok.org.uk/full-disclosure-charter.html
> >>>>> Hosted and sponsored by Secunia - http://secunia.com/
> >>>>>
> >>>> _______________________________________________
> >>>> Full-Disclosure - We believe in it.
> >>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >>>> Hosted and sponsored by Secunia - http://secunia.com/
> >
> >>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to