Xelerance
 
 
about   services   software   support   training   engagements   founders   contact
 
 
 

Penetration Testing/Vulnerability Assessments

Xelerance provides consulting services for vulnerability testing. If needed, we can also provide guidance as to what to do after our report, or we can do only the report as a verification of another organization's work.

There are several kinds of vulnerability assessments that can be done. This process is sometimes called penetration testing, although that is only one type/aspect of an assessment.

There are two extremes: at one side is what is sometimes called BlackHat or BlackBox penetration testing. At the other end is directed per-application/product assessment, which is a form of WhiteBox testing.


Types of vulnerability assessments:


BlackBox Penetration Testing and Response Testing

This is done without the knowledge of the end client customer/user. Often only the CEO or CIO of the client is aware of the effort. The consulting is provided with a "get out of jail free" letter. The consultant team attempts to comprise the clients' security, with the goal of causing some reaction from the customer. The goal is not just to compromise a system, but to elicit a response from the client, and possibly a response from a law enforcement agency.

In such a test it is acceptable for the consultant to compromise one server in order to continue gathering information, and/or attacking other systems.


Blackbox Penetration Resting

This is a more traditional "scan" - it is done with the knowledge of the client's IT department. The IP address range(s) involved are provided up front, or possibly only a single server, with all other information discovered by the consultant during the course of the "scan".

When a potential vulnerability is found, it is exploited if possible, but no further damage is done. If a critical system is found to be vulnerable, then the consultant will stop and notify the client of this immediately.

The client must then provide the consultant with the access which they would have gotten by a destructive attack on the system, so that they may continue to determine what other systems may become vulnerable, given that "beachhead".

The consultant is engaged for a period of time, and at the end of that period, the consultant writes a report, detailing what information was gathered, and what systems were compromised.

Multiple types of attacks may be used, especially including social engineering.


Vulnerability Scanning

In this version, the scan is done, and version information is used to determine if some particular applications might be vulnerable to an attack.

The attacks are not done, these are passive scans. A report is generated based on what applications & potential vulnerabilities were found by the scans.


WhiteBox Penetration Testing

The consultant is provided with a map of the network, a list of servers, and a list of relationships. The consultant is asked to then exploit these relationships. If additional information is needed, it is simply asked for.

WhiteBox testing is not about defending against a total stranger, but rather against an insider, a disgruntled former employee, as well as against a very knowledgeable outsider.


Application Testing

In the end, all successful penetrations involve exploiting flaws or mis-features in the design or deployment of application software. Application testing is about testing specific applications for specific kinds of faults.

It is typically done by suppliers of software as part of the Quality Assurance phase, however the Xelerance team can act as a 3rd Party QA team for those customers concerned about critical systems.


For more information on any of these services, please email info@xelerance.com.

Images of technology or
collage of high tech imagery
 
     
One Unix to rule them all, One Resolver to find them, One IP to bring them all, and in the zone, bind them.
| about | services | software | support | training | engagements | founders | contact |

All content & images © 2004 Xelerance Inc. All rights reserved.
Website design by Painted Red Productions