From: Jamie Riden (jamie.riden@gmail.com)
Date: Tue Jun 12 2007 - 08:36:00 EDT
On 11/06/07, Harold Castro <b0ydaem0n@yahoo.com> wrote:
> Hi,
..
> Since I'm doing an external black box pentest, I have
> to rely on some tools for OS fingerprinting. Nmap
> guesses it to be either Nokia IPSO 4.0 or 4.1Build19.
> Now I tried googling for that particular appliance
> (IP650) and I found out that the appliance is too old
> as its existence dates back as early as 1999. I'm
> having a hard time trying to find anything
> that can be useful for this
Usually the next stage would be to try to exploit it - providing that
is allowed for by your penetration-testing contract. (It should be,
otherwise it's more of an audit rather than a pen-test.)
> If all else fails, do you tell the customer that it is
> safe to ignore those warnings and vulnerabilities
> because you, on a hacker's perspective, was not able
> to penetrate the network by making use of those
> vulnerabilities found, that the hacker might have a
> hard time as well and eventually opt for another
> target?
I don't like to. If you aren't able to break it, just say so. As a
pen-tester, you haven't got enough information to say if it's safe.
Obviously, if you break it, it's not safe, otherwise you don't know.
cheers,
Jamie
-- Jamie Riden, CISSP / jamesr@europe.com / jamie@honeynet.org.uk UK Honeynet Project: http://www.ukhoneynet.org/ ------------------------------------------------------------------------ This List Sponsored by: Cenzic Are you using SPI, Watchfire or WhiteHat? Consider getting clear vision with Cenzic See HOW Now with our 20/20 program! http://www.cenzic.com/c/2020 ------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:52 EDT