[Dailydave] TNG Pen Test Tool Questions

Dave Aitel dave at immunityinc.com
Fri Oct 25 11:54:43 EDT 2013


The future of penetration testing tools is coming up quickly, and all
the questions have changed on you.

For example, it used to be that you would ask:

o  "How many exploits does it have?"
o "How fast can it scan a class B?"
o "Can it connect back over HTTPS?"
o "Can it bounce from host to host within the internal network?"
o "Can you automatically choose the right client side attack when people
connect to you?"
o etc

But here are some of the ones we're asking the INNUENDO dev team, which
I think are representative of the post FLAME/STUXNET world:
o "Is the local persistence store configurable between the registry and
file system or other covert data storage?"
o "Can I reconfigure the callback protocol on the fly during a file
transfer - and does this automatically happen if my HTTPS callback gets
suddenly blocked or shut down?"
o "How does it handle Citrix?"
o "Is the covert file storage automatically encrypted to C&C or is it
plaintext or what?"
o "Can I store exploit modules encrypted on the machine until the C&C
asks for them to be used?" (http://www.securelist.com/en/blog/208193781/)
o "Does it come with the ability to do raw socket injection on Windows 8
x64?"
o "How do I write a MITM module?"

-dave


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 196 bytes
Desc: OpenPGP digital signature
URL: <https://lists.immunityinc.com/pipermail/dailydave/attachments/20131025/af84bf66/attachment.sig>


More information about the Dailydave mailing list