Tag Archives: Auditing

SANS’ 20 Critical Security Controls

Source: SANS Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through. With the change in FISMA reporting implemented on… Read More »

Searching “User-Agent” string

Source: Internet Storm Center User Agent 007 Recently, while conducting an audit at a financial services company, I decided to verify their claim that their “desktop build is standardized” and “no other devices are on the network”. The network team provided access to a SPAN port on their Internet uplink, where I attached my pen-test workstation to take… Read More »