From: Philippe Dumont (philippe.dumont@abovesecurity.com)
Date: Mon Sep 25 2006 - 16:44:58 EDT
I use Core Impact and I have to say... it is a tool and a good one. But it won't exploit every possible vulnerabilities. Sometimes you can reach root access thru escalation, which is the coolest way of all.
Myself and my collegue once found a backup script that divulged the root password... the script was found via a anonymous FTP server :-) (And this was in a Scada environment)
Core impact won't do that for you! Catch my drift?
________________________________
From: jackal_pf0@lycos.com [mailto:jackal_pf0@lycos.com]
Sent: Thu 8/31/2006 2:55 AM
To: pen-test@securityfocus.com
Subject: Core Impact Vs Manual Pen Test
Dear Members,
I've been doing Pen test for a quite while. I have used both Open source and Commercial tools for the activity. Now because of automated tools such as core Impact, Canvas, Qualys most of the clients are coming up with the Question of Whether to go fo Core Impact or hire some consultants to do the activity. These clients are not worried bout paying huge money to buy these tools.
Since I have not used Core Impact, I cant figure out the differences. I believe you guys can help me out.
Any comments appreciated.
Regds,
J
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------
AVERTISSEMENT CONCERNANT LA CONFIDENTIALITÉ
Le présent message est à l'usage exclusif du ou des destinataires mentionnés ci-dessus. Son contenu est confidentiel et peut être assujetti au secret professionnel. Si vous avez reçu le présent message par erreur, veuillez nous en aviser immédiatement et le détruire en vous abstenant d'en faire une copie, d'en divulguer le contenu ou d'y donner suite.
CONFIDENTIALITY NOTICE
This communication is intended for the exclusive use of the addressee identified above. Its content is confidential and may contain privileged information. If you have received this communication by error, please notify the sender and delete the message without copying or disclosing it.
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:01 EDT