<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Defence In Depth Penetration Testing</title>
	<atom:link href="https://www.exploresecurity.com/defence-in-depth-penetration-testing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.exploresecurity.com/defence-in-depth-penetration-testing/</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Sun, 07 Sep 2025 03:12:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
	<item>
		<title>By: Jerome</title>
		<link>https://www.exploresecurity.com/defence-in-depth-penetration-testing/#comment-237</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Mon, 18 Nov 2013 23:11:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=95#comment-237</guid>
		<description><![CDATA[Thanks for the comments. I agree with you that pen-tests should be just one element in an overall process but I&#039;d add that pen-tests aren&#039;t meant to find systemic flaws in a comprehensive fashion - that should be the job of architecture reviews, etc. Some organisations see pen-tests as validating their entire set-up, which is of course unrealistic. In the relatively short period of time a pen-tester is given, that&#039;s just impossible, which is why a pen-test has a scope, with a well-defined target area. I agree that a good pen-test report should take the wider view and pick up on architectural weaknesses where the test results have proven such a flaw. That&#039;s the difference between a customised report and a copy-and-paste job from the output of [insert_tool_of_choice].]]></description>
		<content:encoded><![CDATA[<p>Thanks for the comments. I agree with you that pen-tests should be just one element in an overall process but I&#8217;d add that pen-tests aren&#8217;t meant to find systemic flaws in a comprehensive fashion &#8211; that should be the job of architecture reviews, etc. Some organisations see pen-tests as validating their entire set-up, which is of course unrealistic. In the relatively short period of time a pen-tester is given, that&#8217;s just impossible, which is why a pen-test has a scope, with a well-defined target area. I agree that a good pen-test report should take the wider view and pick up on architectural weaknesses where the test results have proven such a flaw. That&#8217;s the difference between a customised report and a copy-and-paste job from the output of [insert_tool_of_choice].</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: 2cents</title>
		<link>https://www.exploresecurity.com/defence-in-depth-penetration-testing/#comment-227</link>
		<dc:creator>2cents</dc:creator>
		<pubDate>Fri, 15 Nov 2013 13:53:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=95#comment-227</guid>
		<description><![CDATA[My 2 cents:

Pen tests (in the way they are typically handled) are useless. Vulnerabilities are dealt with on a case by case basis rather than highlighting the systemic flaws within a system/network.

Consider the scenario:
Web facing box compromised via Tomcat, jump to backed db box, elevate privilege with default sa account, gain access to system with xp_cmdshell, steal domain creds, compromise domain.

Report:
Patch tomcat, disable sa account, turn off xp_cmd shell, done.

This is one attack path taken care of but the systemic flaws in the network still remain. Next pentest, similar report comes out again. 

The actual &quot;fixes&quot; to the systemic issues require effort, explanation and time - insufficient patching procedures, no DMZ, different domain/trusts between DMZ domain/internal domain, Insufficient domain password policies, etc. None of which most pen testers can offer or have the skills to offer these days. 

Pen tests only make up a small offering in the overall scheme of things IMHO.]]></description>
		<content:encoded><![CDATA[<p>My 2 cents:</p>
<p>Pen tests (in the way they are typically handled) are useless. Vulnerabilities are dealt with on a case by case basis rather than highlighting the systemic flaws within a system/network.</p>
<p>Consider the scenario:<br />
Web facing box compromised via Tomcat, jump to backed db box, elevate privilege with default sa account, gain access to system with xp_cmdshell, steal domain creds, compromise domain.</p>
<p>Report:<br />
Patch tomcat, disable sa account, turn off xp_cmd shell, done.</p>
<p>This is one attack path taken care of but the systemic flaws in the network still remain. Next pentest, similar report comes out again. </p>
<p>The actual &#8220;fixes&#8221; to the systemic issues require effort, explanation and time &#8211; insufficient patching procedures, no DMZ, different domain/trusts between DMZ domain/internal domain, Insufficient domain password policies, etc. None of which most pen testers can offer or have the skills to offer these days. </p>
<p>Pen tests only make up a small offering in the overall scheme of things IMHO.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
