Tuesday, March 7, 2017

Network Pen Testers

To me it seems crazy that in this day and age, there are tons of certified network pentesters holding jobs as pentesters yet they do not know how to use metasploit command line or even modify a script on exploit db to make it run correctly.

I'm not even asking them to be able to modify or even write a custom metasploit module.  Just be able to use the tool.

The amazing thing is there are many self-proclaimed "elite hacking teams" at companies out there who don't even know how to use port forwarding when testing a remote closed network.

Network Vulnerability Scanners

There are many network vulnerability scanners out there.  Many of them are poor quality.  For instance, one particular tool lists hundreds of vulnerabilities for a service running on the network simply based on the fact that version banner states it is a certain version.  These tools do not check for a vulnerability.

That's right.  Many of these tools do not check for a vulnerability.  Instead they look at version the number on an Apache web server or a MySQL server and then list hundreds of false positives.  The version number could be incorrect and/or patches may have been backported.  This is no different than static code analyzers that try to impress users with thousands of findings in fancy demonstrations that are false positives.

These tools are a waste of time and energy.  Get yourself a real tool that actually does a vulnerability check.