Maybe I'm pointing out something said many times before, but I guess that comes with 
newcomers. :)

-*- Henry O. Farad <[EMAIL PROTECTED]> [ 2003-06-24 23:36 ]:
> 1) On pen-testing and honeypots:
> 
> This is the question I asked, rather than the one that I meant to
> ask. In many cases, the customer will say "Don't bother attacking
> these systems, they are honeypots". In this case the pen tester will
> end up testing the security of the "production machines" without
> wasting time on the honeypots. However, this will not test the system
> as a whole, since the honeypots are part of the complete security
> scenario.

Some point on situations where you have little as no information up front on the 
target.

The client will probably want to know how easily identifiable his honeypots are, 
before access has been gained on the honypot.  If a decoy is a part of the security 
measures, it should be working.

Then again, the client might have gotten the idea to disguise a productional system as 
a honeypot to distract intruders... so I guess you'll have to perform the pentest 
anyway. ;)  Although, as most intruders would, save it 'til the end.

For different client requests (like Acl Proxy mentioned), this obviously does not 
apply.


On a side note, Michael Boman brought up an interesting point:
"There is a viable scenario for this. Let's say ACME Inc. wants to do their own 
pen-tests because they [...] want to steal their tools and techniques".

A questioncrossed my mind yesterday that's related to this -- "Do pentesters have 
clauses in their contracts regarding the client re-using the methods used by 
pentesters" -- that is for knowledge gained by the client from information 
not-in-the-report, but through devices tested.


-- 
Tolli
[EMAIL PROTECTED]

---------------------------------------------------------------------------
Latest attack techniques.

You're a pen tester, but is google.com still your R&D team? Now you can get 
trustworthy commercial-grade exploits and the latest techniques from a 
world-class research group.

Visit us at: www.coresecurity.com/promos/sf_ept1 
or call 617-399-6980
----------------------------------------------------------------------------

Reply via email to