Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/19/2007
03:18 AM
50%
50%

Pen Testing Goes Reality TV

New CourtTV documentary 'Tiger Team' will follow real pen testers hired to hack businesses

1:18 PM -- Those of us in the security industry know how exciting and glamorous our work is, while the average person sees it as black magic. (Stop laughing -- I know that’s a stretch.) But a new reality TV show (think documentary, not a contest) will air on CourtTV beginning on December 25 that may dispel the myths about -- and shed some light on -- what we do. The show follows a professional penetration testing team that's hired to compromise businesses through physical, electronic, and social means.

The name of the show is “Tiger Team,” a term rooted in military history as a description of the teams who tested the security of military bases, government buildings, and ally installations. Tiger teams began with physical security, but quickly moved to computer networks as they became more prevalent. The term eventually was replaced by penetration testers or ethical hackers.

I think the show could potentially have a positive influence on how companies view penetration testing, which may lead them to choose pen testing to compliment the basic vulnerability and risk assessments they perform. IT workers who’ve been subjected to audits where they only received a Nessus vulnerability scan printout could finally see that there's more to pen testing than running an automated scanner and fixing the bad stuff it flags.

Coincidentally, the SANS Institute is offering a new course titled Network Penetration Testing and Ethical Hacking which really couldn’t come at a better time. The show could prompt current pen-tester wannabes to seek training. Better yet, it could help companies seeking pen-testing services to know what to look for when they are hiring a pen-testing team -- such as asking for samples of real reports, talking to previous customers, and asking what types of technologies and techniques they employ.

I’m looking forward to the first few episodes of this new show to see how it presents pen testing in a way that interests general viewers. If you tune in, let me know what you think via our message boards.

– John H. Sawyer is a security geek on the IT Security Team at the University of Florida. He enjoys taking long war walks on the beach and riding pwnies. When he's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days
Kelly Sheridan, Staff Editor, Dark Reading,  4/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The dead do not laugh...
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10551
PUBLISHED: 2020-04-09
QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\SYSTEM by writing ...
CVE-2020-10621
PUBLISHED: 2020-04-09
Multiple issues exist that allow files to be uploaded and executed on the WebAccess/NMS (versions prior to 3.0.2).
CVE-2020-11553
PUBLISHED: 2020-04-09
An issue was discovered in Castle Rock SNMPc Online 12.10.10 before 2020-01-28. There is pervasive CSRF.
CVE-2020-11554
PUBLISHED: 2020-04-09
An issue was discovered in Castle Rock SNMPc Online 12.10.10 before 2020-01-28. It allows remote attackers to obtain sensitive information via info.php4.
CVE-2020-11555
PUBLISHED: 2020-04-09
An issue was discovered in Castle Rock SNMPc Online 12.10.10 before 2020-01-28. It allows remote attackers to obtain sensitive credential information from backup files.