On Mon, Oct 28, 2002 at 04:34:38PM -0500, Paul Smith wrote:
> %% Dave Sherohman <[EMAIL PROTECTED]> writes:
>   ds> Quick and easy way to convince them: "Really?  How's about I stand
>   ds> here and watch you exploit it."  Shouldn't take more than 5-10
>   ds> minutes of banging their head against your server to realize that
>   ds> no, it's not vulnerable.
> 
> You obviously don't understand the corporate IT mindset :)--it's not up
> to them to prove your system is vulnerable, it's up to _you_ to prove
> that it isn't.
> 
> If they think it's vulnerable or don't believe you they'll just
> blacklist it from the network and you're SOL.  They have all the power,
> because they control the network (routers/switches/firewalls/etc.)

No, I just missed that it was the IS department claiming to have
found a vulnerability and assumed it was an outside vendor.  ("You
want me to buy your services to fix the problem?  OK, but first prove
that there is a problem to fix.")  I agree that this technique
wouldn't work in the case you're talking about.

-- 
When we reduce our own liberties to stop terrorism, the terrorists
have already won. - reverius

Innocence is no protection when governments go bad. - Tom Swiss


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to