From: Marco Ivaldi (raptor@0xdeadbeef.info)
Date: Wed May 17 2006 - 12:08:05 EDT
On Sat, 13 May 2006, James Kelly wrote:
> I'd be curious to find out what the typical scoping is for a pen test
> rules of engagement agreement.
>
> Do folks go with a "anything goes" or "no holds barred" approach? What
> limits on ROE do people normally see in these types of agreements?
Take a look at ISECOM's OSSTMM 2.1 Rules of Engagement:
http://www.isecom.org/projects/rules.shtml
Someone here mentioned Denial of Service testing, speaking of which:
"6. Distributed Denial of Service testing over the Internet is forbidden."
"7. Any form of flood testing where a person, network, system, or service,
is overwhelmed from a larger and stronger source is forbidden."
Cheers,
-- Marco Ivaldi Antifork Research, Inc. http://0xdeadbeef.info/ 3B05 C9C5 A2DE C3D7 4233 0394 EF85 2008 DBFD B707 ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@cenzic.com for details. ------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:58 EDT