A White Hat Hacker Penetration Test
A dated, yet interesting article from a White Hat Hacker testing security for one of his clients.
I’ve always believed in strong external security, but also added internal security too. So if someone does break in to your network, they’ll still have a job on their hands doing anything of note.
Microsoft have made this scenario easier to implement with Windows XP SP2 and Windows Firewall, but I can imagine their are numerous companies out there who don’t bother patching or keeping internal security tight simply because they think they’ve got a kick-ass firewall that will keep anybody and everybody out…
I’ve always believed in strong external security, but also added internal security too. So if someone does break in to your network, they’ll still have a job on their hands doing anything of note.
Microsoft have made this scenario easier to implement with Windows XP SP2 and Windows Firewall, but I can imagine their are numerous companies out there who don’t bother patching or keeping internal security tight simply because they think they’ve got a kick-ass firewall that will keep anybody and everybody out…
Comments
1 thought on A White Hat Hacker Penetration Test
MIKE
31ST OCTOBER 2005 21:52:16
You can lead a customer to security but you can't make them drink (or something like that). The Americans developed a defense strategy in Vietnam (which wasn't so good) and still use it today in Iraq. It's called strength in depth and is based on the premise that attackers might break through one wall of defence but it takes time. If they do they have a second wall of defence and that takes time. If they are successful there's a third. All these things take time and increase the likelihood of being discovered so more countermeasures can be taken. It's the same principle for IT. Layers behind layers behind layers and each layer is different from the rest.Windows Xp SP2 helps a lot but customers are slow to introduce it because they're afraid that some apps won't work afterwards (mainly because they use security holes that SP2 closes). What's worse? An app that breaks and needs rework or a network (and all the sensitive data on it) being compromised. Sadly, many customers apply SP2 AFTER they have been compromised and not before.Keep up the good work - I read the blog a few times a week.Mike