-----Original Message----- From: tony toni [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 12, 2002 2:44 PM To: [EMAIL PROTECTED] Subject: Political Challenges Using Nessus
Folks, I am currently experimenting with Nessus. I also have a spreadsheet of all IP addresses that our company uses (about 10,000) and it has a detailed description of each IP address. As you can appreciate a hacker would love to have this spreadsheet. My situation... I currently work in the Security Group and I *sort of* have approval to run Nessus to perform vulnerability assessments. This is a new responsibility that is being forced upon my director. He assigned me this project but has little interest in what I am doing, is a moron about security issues, and will be the first person to stab me in the back if anything goes wrong. However, he is also putting a lot of pressure on me to do the assessments and produce reports so he can look good to his VP. If he is pressuring you, pressure him for using the tool, tell him you can't produce without using the tool. If you don't have approval (get it in writing) don't do it. My next challenge is the Manager of the Server and Network Group. He is very territorial and is not responding to my requests for partnering with him while I run Nessus. He does not want audits done on his servers/firewall/routers. I think he is either afraid of what I will find out or I will cause some damage. He is also a moron on security issues. Don't Worry about this guy, let him keep his production attitude. Things will happen, you will hit that unpatched 1980's VAX system and it will crash. So be prepared to explain your testing methodology. Another reason for sign off from supervisor. My problem... I am not sure if I can trust either my Director or the Manger of Network/Servers if I start running Nessus. Both have a keen sense of corporate politics and only look out for themselves. My manager want results..but then he offers no support and will *nail* me hard if I make any mistakes. Don't make mistakes and CYA. I have been a *bad boy* of late and have been running Nessus on several production servers without telling anyone. Found lots of security weaknesses. None of the system admins are aware that I have run these tests (must not be looking at their logs). I want to continue running Nessus on switches, routers, firewalls and more servers. I want to really build a case for using Nessus and all of the security problems this company has. Yeah, welcome to security auditing :> Stop running the scans on systems your not responsible for without signoff. This is my question... 1) What are the political risks I may come incur if I run Nessus without formal approval? In other words, running Nessus against any IP address I want and without telling anyone what I am doing? I am afraid that if I list the IP's I want to go against...I will run into a bunch of political road blocks. I want to impress everyone that I can successfully run Nessus and not hurt anything and everyone will say great job. On the other hand...this could back fire on me and I could get *nailed* for doing these audits in the *stealth* mode. Start small... it will be much easier to start small, and you will be able to fix the critical problems. First, test on non-critical systems then move on to the most critical to get larger impact. Your not doing an "audit", your assessing vulnerabilities. people hate audits don't use that term. 2) From a technical viewpoint...can I run Nessus against a switch, router, firewall and not worry about bringing these devices down? Currently, I use the option "disable all dangerous plug-ins"....so I feel I using it safely. %2 OF THE systems might crash, I have see Cisco routers (running an old ios) be brought down by cybercop doing a portscan. Cybercop is a tool similar to nessus. I am sure that others on this list have had the same sort of political challenges. I am impatient...I hate politics ..I know I can pull this off. Problem is management is getting in my way. What is your answers to my questions? Tony Security Project Lead Major Financial Institution on West Coast Matthew F. Caldwell, CISSP Chief Security Officer GuardedNet, Inc. _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.
