19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

44<br />

Part I: Building the Foundation for Ethical Hacking<br />

Having said this, if you discover a major hole, I recommend contacting the<br />

right people as soon as possible so that they can begin fixing the issue right<br />

away. The right people may be software developers, product or project managers,<br />

or even CIOs. If you wait a few days or weeks, someone might exploit<br />

the vulnerability and cause damage that could’ve been prevented.<br />

Making silly assumptions<br />

You’ve heard about what you make of yourself when you assume things. Even<br />

so, you make assumptions when you hack a system. Here are some examples<br />

of those assumptions:<br />

✓ Computers, networks, and people are available when you’re testing.<br />

✓ You have all the proper testing tools.<br />

✓ The testing tools you use will minimize the chances of crashing the systems<br />

you test.<br />

✓ You understand the likelihood that existing vulnerabilities were not<br />

found or that you used your testing tools improperly.<br />

✓ You know the risks of your tests.<br />

Document all assumptions and have management or your client sign off on<br />

them as part of your overall approval process.<br />

Selecting Security Assessment Tools<br />

Which security assessment tools you need depend on the tests you’re going<br />

to run. You can perform some ethical hacking tests with a pair of sneakers, a<br />

telephone, and a basic workstation on the network, but comprehensive testing<br />

is easier with hacking tools.<br />

The tools in this book are not malware. The tools and even their websites<br />

may be flagged as such by certain anti-malware and web-filtering software<br />

but they’re not. The tools I cover are legitimate tools that can be used for<br />

legitimate purposes. If you experience trouble downloading, installing, or running<br />

the tools I cover in this book, you may consider configuring your system<br />

to allow them through or otherwise trust their execution. Keep in mind that<br />

I can’t make any promises. Use checksums where possible by comparing<br />

the original MD5 or SHA checksum with the one you get using a tool such as<br />

CheckSum Tool (http://sourceforge.net/projects/checksumtool).<br />

A criminal could always inject malicious code into the actual tools, so there’s<br />

no guarantee of security. You knew that anyway, right?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!