You should have a look at the Pentest Standards page, it was created
by some very skilled Pen Testers how are trying to create a minimum
standard for all tests and reporting.

http://www.pentest-standard.org/index.php/Main_Page

Also you should just have to give them your external net-block
allocation that is in scope unless it is a more forced test and not a
general external test.

On 5 June 2012 20:48, Brett Watson <br...@the-watsons.org> wrote:
>
> On Jun 5, 2012, at 9:52 AM, Peter Kristolaitis wrote:
>
>>
>> As far as horror stories... yeah.   My most memorable experience was a guy 
>> (with a CISSP designation, working for a company who came highly 
>> recommended) who:
>>    - Spent a day trying to get his Backtrack CD to "work properly".  When I 
>> looked at it, it was just a color depth issue in X that took about 45 
>> seconds from "why is this broken?" to "hey look, I fixed it!".
>>    - Completely missed the honeypot machine I set up for the test.  I had 
>> logs from the machine showing that his scanning had hit the machine and had 
>> found several of the vulnerabilities, but the entire machine was absent from 
>> the report.
>>    - Called us complaining that a certain behavior that "he'd never seen 
>> before" was happening when he tried to nmap our network.  The "certain 
>> behavior" was a firewall with some IPS functionality, along with him not 
>> knowing how to read nmap output.
>>    - Completely messed up the report -- three times.  His report had the 
>> wrong ports & vulnerabilities listed on the wrong IPs, so according to the 
>> report, we apparently had FreeBSD boxes running IOS or MS SQL...
>>    - Stopped taking our calls when we asked why the honeypot machine was 
>> completely missing from the report.
>>
>> In general, my experience with most "pen testers" is a severe 
>> disappointment, and isn't anything that couldn't be done in-house by taking 
>> the person in your department who has the most ingrained hacker/geek 
>> personality, giving them Nessus/Metasploit/nmap/etc, pizza and a big ass pot 
>> of coffee, and saying "Find stuff we don't know about. Go.".   There is the 
>> occasional pen tester who is absolutely phenomenal and does the job properly 
>> (i.e. the guys who actually write their own shellcode, etc), but the vast 
>> majority of "pen testers" just use automated tools and call it a day.  Like 
>> everything else in IT, security has been "commercialized" to the point where 
>> finding really good vendors/people is hard, because everyone and their mom 
>> has CEH, CISSP, and whatever other alphabet soup certifications you can 
>> imagine.
>
> I agree with a lot of what you've said, but there are absolutely good 
> security guys (pen tester, vulnerability assessors, etc) that use both open 
> source and commercial automated tools, but still do a fantastic job because 
> they understand the underlying technologies and protocols.
>
> I used to do a lot of this in the past, had lots of automated tools, and only 
> occasionally wrote some assessment modules or exploit code if necessary.
>
> But again, a person in that position has to understand technology 
> holistically (network, systems, software, protocols, etc).
>
> -b



-- 
BaconZombie

LOAD "*",8,1

Reply via email to