From: Harper, Patrick (patrick.harper@phns.com)
Date: Mon Sep 27 2004 - 11:39:33 EDT
Juan,
Is this going to take you as long to get as it took you to get
stuff working on the snort list?
You start by telling your manager that you have security concerns and
that you would like to perform a vulnerability analysis and provide a
remediation plan for the network. This should be happening on a regular
basis anyways.
If he says no then keep all the e-mails and correspondence so you can
prove to anyone who asks later that you had these concerns. If you feel
very strongly take it to whomever is above your manager.
-----Original Message-----
From: DokFLeed [mailto:dokfleed@dokfleed.net]
Sent: Monday, September 27, 2004 9:10 AM
To: pen-test@securityfocus.com
Subject: Re: snmp
Jaun,
I have no idea how you got the "Mcse Ccna Ccsa Scsa"
tailing your name,
first of all you are not authorized to do this, in a decent company you
should get fired, second, you had just exposed your company by posting
the phone number third, LEARN first what SNMP , then pen-test it .
I ran to security bizness coz I got sick of new IT comers, and for a
while I though none of them will dare to join the security bizness
unless they feel they are competitive. It took me 16 years before I can
say yes I know something about Security..
when you fix all of that you might be able to pen-test anything, I hope
u got my point
=========================
----- Original Message -----
From: "R. DuFresne" <dufresne@sysinfo.com>
To: "Juan B" <juanbabi@yahoo.com>
Cc: <pen-test@securityfocus.com>
Sent: Saturday, September 25, 2004 12:39 AM
Subject: Re: snmp
>
> You start by getting yer "get out of jail free card" from mgt. If you
> lack that, you are likely to get fired and then prosecuted.
>
> thanks,
>
> Ron DuFresne
>
> On Wed, 22 Sep 2004, Juan B wrote:
>
>> HI,
>>
>>
>>
>> I am responsible of the security in my company.
>>
>>
>>
>> One of the sysadmins told me that they use in one of
>> the networks Snmp and that the community is public.
>>
>>
>>
>> I want to pen test this issue meaning that I want to
>> find ways to retrieve from the devices info, and show
>> the IT manager that he must change the community.
>>
>>
>>
>> The reason that I want to do It my self is that I
>> don't believe in the way that is just going to him and
>> tell him..." its written in the internet that we must
>> change public community to something else.
>>
>>
>>
>> So how or from where do I start ?
>>
>>
>>
>> Thanks
>>
>>
>>
>> juan
>>
>> =====
>> Juan Fernandez.
>>
>> Security Engineer
>>
>> Tel: +972-52-4306781
>> Mcse Ccna Ccsa Scsa
>>
>>
>>
>>
>> __________________________________
>> Do you Yahoo!?
>> New and Improved Yahoo! Mail - 100MB free storage!
>> http://promotions.yahoo.com/new_mail
>>
>>
------------------------------------------------------------------------
------
>> Ethical Hacking at the InfoSec Institute. All of our class sizes are
>> guaranteed to be 12 students or less to facilitate one-on-one
interaction
>> with one of our expert instructors. Check out our Advanced Hacking
>> course,
>> learn to write exploits and attack security infrastructure. Attend a
>> course
>> taught by an expert instructor with years of in-the-field pen testing
>> experience in our state of the art hacking lab. Master the skills of
an
>> Ethical Hacker to better assess the security of your organization.
>>
>> http://www.infosecinstitute.com/courses/ethical_hacking_training.html
>>
------------------------------------------------------------------------
-------
>>
>
> --
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> admin & senior security consultant: sysinfo.com
> http://sysinfo.com
>
> "Cutting the space budget really restores my faith in humanity. It
> eliminates dreams, goals, and ideals and lets us get straight to the
> business of hate, debauchery, and self-annihilation."
> -- Johnny Hart
>
> testing, only testing, and damn good at it too!
>
>
>
------------------------------------------------------------------------
------
> Ethical Hacking at the InfoSec Institute. All of our class sizes are
> guaranteed to be 12 students or less to facilitate one-on-one
interaction
> with one of our expert instructors. Check out our Advanced Hacking
course,
> learn to write exploits and attack security infrastructure. Attend a
> course
> taught by an expert instructor with years of in-the-field pen testing
> experience in our state of the art hacking lab. Master the skills of
an
> Ethical Hacker to better assess the security of your organization.
>
> http://www.infosecinstitute.com/courses/ethical_hacking_training.html
>
------------------------------------------------------------------------
-------
>
>
>
------------------------------------------------------------------------
------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one
interaction
with one of our expert instructors. Check out our Advanced Hacking
course,
learn to write exploits and attack security infrastructure. Attend a
course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------
-------
Disclaimer:
This electronic message, including any attachments, is confidential and intended solely for use of the intended recipient(s). This message may contain information that is privileged or otherwise protected from disclosure by applicable law. Any unauthorized disclosure, dissemination, use or reproduction is strictly prohibited. If you have received this message in error, please delete it and notify the sender immediately.
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:07 EDT