From: s-williams@nyc.rr.com
Date: Thu Oct 05 2006 - 07:08:29 EDT
I think by now after the 20th post on this he might have gotten the idea. Now to answer your question, usually the webmaster like someone else mentioned, or asking to speak to the someone in the IT department is the way to go.
In most casesn unless something happen those holes are still going to be there, so don't worry about it.
Sent via BlackBerry from T-Mobile
-----Original Message-----
From: pand0ra <pand0ra.usa@gmail.com>
Date: Wed, 04 Oct 2006 17:30:59
To:pen-test@securityfocus.com
Subject: Re: Informing Companies about security vulnerabilities...
"You can try to set them an ultimatum pretending to disclose the holes
to the public. Perhaps they are more willing to react if they are forced
to do so."
Ethically, that is bad. You should never force (or threaten) anyone
into doing something they don't want to. I agree completely with Jay
and Dan.
Joseph,
1. Never test a system unless you have written authorization (also
known as the "get out of jail free" card). Period.
2. I know it is your responsability to teach your students how to
identify an attack but you also have to show them what is ethical as
well. By teaching them to attack another company's web application
without permission is promoting behavior that could land your students
in jail. What happens after the student is arrested when they tell the
media that they learned how to do what they did in your class?
3. It's good that you notified the newspaper of the problem but you
should not have been there in the first place.
The suggestion for using hackme bank is perfect and won't land you in
prison/jail/fines.
On 10/4/06, Andreas Putzo <putzoa@gmx.de> wrote:
> On Oct 04, Joseph McCray wrote:
> > Usually when we do this we only find a few simple things (XXS for
> > example) - no big deal right. With this particular website we just kept
> > finding another, after another and on and on. Over 600 instances of XXS,
> > over 200 SQL Injection - this was bad. After a while it started to get
> > boring there was so many....
> >
> > So I drafted a letter to the editor as well as several other prominent
> > people at the newspaper. It detailed my finding and recommended some
> > possible mitigation strategies. After emailing this I didn't hear
> > anything for a few days, so I emailed it again and followed up with a
> > phone call. After getting no response to the second email and then
> > having been bounced around from department to department when I called I
> > just said forget it.
>
> You can try to set them an ultimatum pretending to disclose the holes
> to the public. Perhaps they are more willing to react if they are forced
> to do so.
> Depending on the information you can get through the website (customer
> data anywhere?) and the laws in your country (IANAL, btw.)
> you may go to the intrigued publicity, indeed. They gotta have to do something if
> someone defaced their website actually.
>
>
> --
> regards,
> Andreas Putzo
>
>
>
>
> ------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Need to secure your web apps?
> Cenzic Hailstorm finds vulnerabilities fast.
> Click the link to buy it, try it or download Hailstorm for FREE.
> http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
> ------------------------------------------------------------------------
------------------------------------------------------------------------
This List Sponsored by: Cenzic
Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:06 EDT