Tony

I have a similar situation.  The guy I am working for, has no idea about
security and calls himself the Security Manager.  And yet, wants everything
tied up.

If I was you, I would
a) Go above them if possible, sort of offline, in a conversation, see if
direction/approval can come from further up the corporate ladder.
b) Run it against a sample number of "hosts" show the kind of report you can
develop, get it impressive, and then point out that this is only a sample,
and that the whole thing should be done regularly and thoroughly.
c) Run it against external facing hosts, maybe these are more "vulnerable"
because they are visible to the outside world.

I would not do this without letting as many people as possible know, that
way if the shit does hit the fan, you did give as much notice as possible.

By doing a passive scan you are only seeking possible vulnerabilities, not
actually exploiting them so you should hopefully not cause any damage.

Try Langaurd, http://www.languard.com, a free W32 scanner that checks for
ports/services etc in passive only mode.  I find it invaluable..

Good Luck


James




 -----Original Message-----
From:   tony toni [mailto:[EMAIL PROTECTED]]
Sent:   12 March 2002 19:44
To:     [EMAIL PROTECTED]
Subject:        Political Challenges Using Nessus

Folks,

I am currently experimenting with Nessus.  I also have a spreadsheet of all
IP addresses that our company uses (about 10,000) and it has a detailed
description of each IP address.  As you can appreciate a hacker would love
to have this spreadsheet.

My situation...
I currently work in the Security Group and I *sort of* have approval to run
Nessus to perform vulnerability assessments. This is a new responsibility
that is being forced upon my director. He assigned me this project but has
little interest in what I am doing, is a moron about security issues, and
will be the first person to stab me in the back if anything goes wrong.
However, he is also putting a lot of pressure on me to do the assessments
and produce reports so he can look good to his VP.

My next challenge is the Manager of the Server and Network Group. He  is
very territorial and is not responding to my requests for partnering with
him while I run Nessus.  He does not want audits done on his
servers/firewall/routers.  I think he is either afraid of what I will find
out or I will cause some damage.  He is also a moron on security issues.

My problem...
I am not sure if I can trust either my Director or the Manger of
Network/Servers if I start running Nessus.  Both have a keen sense of
corporate politics and only look out for themselves. My manager want
results..but then he offers no support and will *nail* me hard if I make any
mistakes.

I have been a *bad boy* of late and have been running Nessus on several
production servers without telling anyone.  Found lots of security
weaknesses.  None of the system admins are aware that I have run these tests
(must not be looking at their logs).  I want to continue running Nessus on
switches, routers, firewalls and more servers.  I want to really build a
case for using Nessus and all of the security problems this company has.

This is my question...
1)  What are the political risks I may come incur if I run Nessus without
formal approval?  In other words, running Nessus against any IP address I
want and without telling anyone what I am doing?   I am afraid that if I
list the IP's I want to go against...I will run into a bunch of political
road
blocks.  I want to impress everyone that I can successfully run Nessus and
not hurt anything and everyone will say great job.  On the other hand...this
could back fire on me and I could get *nailed* for doing these audits in the
*stealth* mode.

2)  From a technical viewpoint...can I run Nessus against a switch, router,
firewall and not worry about bringing these devices down?  Currently, I use
the option "disable all dangerous plug-ins"....so I feel I using it safely.

I am sure that others on this list have had the same sort of political
challenges.  I am impatient...I hate politics ..I know I can pull this off.
Problem is management is getting in my way.   What is your answers to my
questions?

Tony
Security Project Lead
Major Financial Institution on West Coast





_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.

---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.336 / Virus Database: 188 - Release Date: 11/03/2002

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.336 / Virus Database: 188 - Release Date: 11/03/2002

Reply via email to