'resume'에 해당되는 글 2건

  1. 2008.12.13 BCE plans big share buyback in wake of failed deal by CEOinIRVINE
  2. 2008.12.04 Penetration Tester by CEOinIRVINE

BCE Inc. said Friday that it plans to buy back up to 5 percent of its common shares and resume paying dividends following the collapse of the deal to take Canada's largest telecom company private in what would have been the biggest leveraged buyout in history.

The parent company of Bell Canada said it will repurchase up to 40 million outstanding common shares and will reinstate its quarterly dividend at 36.5 Canadian cents per share.

"A share buyback is the most efficient method of distributing capital to our shareholders, particularly given the current valuation metrics of the company," said chief financial officer Siim Vanaselja.

The buyback would cost BCE about 840.8 million Canadian dollars ($677 million) at its price at midday Friday.

BCE said earlier this week that it would restore the dividend and buy back stock following the collapse of the proposed $35 billion buyout by an investor group led by the Ontario Teachers' Pension Plan and several U.S. partners. The investors group had expected to complete its deal for BCE on Dec. 11.

But the deal fell through after a review by accounting firm KPMG found it would have left the company in violation of solvency tests of the privatization agreement, partly due to the amount of debt involved in the transaction and current market conditions.

There were also arguments over a breakup fee. The buyers group had said that no breakup fee will be paid, but BCE said in a separate statement it will demand payment of 1.2 billion Canadian dollars ($970 million).

Bell Canada issued a statement Friday saying that it will continue to move forward as a re-energized company and is supportive of BCE's buyback plans.

"Given this steadily improving business trajectory, we view the dividend and share buyback initiatives announced by BCE today as very attractive to our shareholders now and going forward," said George Cope, president and CEO of Bell and BCE.

BCE said the first new dividend payment will be made Jan. 15 to shareholders of record on Dec. 23. BCE also scheduled its annual meeting of shareholders on Feb. 17 in Montreal.

The dividend yields 6.95 percent at Friday morning's share price of 21.02 Canadian dollars, down CA$1.01 in trading in Toronto.

That share price is down from CA$38.35 just before it became apparent on Nov. 26 that Teachers' cash bid of CA$42.75 a share would not proceed.

The Toronto-based Ontario Teachers' Pension Plan -- with assets of CA$108 billion ($87 billion) in 2007 -- invests and administers the retirement funds for Ontario's 353,000 active, inactive, and retired teachers. U.S.-based Providence Equity Partners and Madison Dearborn Partners LLC are also involved in the proposed buyout.

BCE, which has more than 54,000 employees, had annual revenue of CA$17.8 billion ($14.4 billion) in 2007. It had 5.8 million wireless subscribers, 8.64 million phone lines, 1.94 million Internet subscribers and 1.82 million satellite television subscribers in 2006. It is Canada's largest communications company.


Posted by CEOinIRVINE
l

Penetration Tester

Business 2008. 12. 4. 12:37

1) LOOK at the resume - closely.
Penetration testing isn't just being able to run some tools, exploit some systems, and charge the client for coffee and pizza (although that last item is essential, especially for late night work).

They must be able to:
* write clearly
* spell properly
* convey meaning

These traits are ESSENTIAL in explaining problems and recommending remediation steps in a way that is easily understandable by the client.

Biggest turn-off: All too often I see resumes full of run-on sentences or non-assertive phrases.

2) READ the resume - how do they think?
You might be tempted to skip over the majority of the resume and look for certain keywords like the names of familiar tools like nessus, nikto, webinspect, nmap, etc. While familiarity with these tools is important, you need to know their approach or methodology.

Some common (and quite good) methodologies:

The Open Source Security Testing Methodology Manual (OSSTMM) is:
"…a peer-reviewed methodology for performing security tests and metrics. The OSSTMM test cases are divided into five channels which collectively test: information and data controls, personnel security awareness levels, fraud and social engineering control levels, computer and telecommunications networks, wireless devices, mobile devices, physical security access controls, security processes, and physical locations such as buildings, perimeters, and military bases.

The OSSTMM focuses on the technical details of exactly which items need to be tested, what to do before, during, and after a security test, and how to measure the results. OSSTMM is also known for its Rules of Engagement which define for both the tester and the client how the test needs to properly run starting from denying false advertising from testers to how the client can expect to receive the report. New tests for international best practices, laws, regulations, and ethical concerns are regularly added and updated.
"


The Information Systems Security Assessment Framework (ISSAF) was developed by the Open Information Systems Security Group, and is defined as "…a peer reviewed structured framework that categorizes information system security assessment into various domains & details specific evaluation or testing criteria for each of these domains. It aims to provide field inputs on security assessment that reflect real life scenarios. ISSAF should primarily be used to fulfill an organization's security assessment requirements and may additionally be used as a reference for meeting other information security needs. ISSAF includes the crucial facet of security processes and their assessment and hardening to get a complete picture of the vulnerabilities that might exist."

(Note: Of the two methodologies listed, the OSSTMM is more mature.)

Familiarity with the Guidelines on Network Security Testing from NIST (The National Institute of Standards and Technology) is an excellent baseline. These guidelines are published in Special Publication 800-42, and are a bit less comprehensive that the OSSTMM model. Testers familiar with 800-42 are typically more knowledgeable about working with regulatory agencies and their specific testing and auditing requirements.

3) Certifications listed on resume - what matters?

CEH (Certified Ethical Hacker):
We have discussed this certification at length in articles here and here. My current opinion is that the certification program gives testers an exposure to tools, and prepares them to pass the required examination. That's about it.

National Security Agency IAM (Information Assessment Methodology) and IEM (Information Evaluation Methodology):
Both of these certifications cover the excellent IEM/IAM methodologies in grueling detail. The certifications involve classroom training, group activities, presentations to peers on assessments (think intelligence briefings), and written exams. These certifications form an impressive foundation for risk assessment skills.

Certified Security Professional (CSTP) and Certified Security Testing Associate (CSTA) are accredited by the University of Glamorgan. The certification coursework is excellent as seen in this PDF file.

Operating System Specific Certifications such as a MCSE, RHCE, etc. and vendor-specific certifications like CCNA, CCIE are very desirable. The more a candidate knows about the operating systems, devices and applications they are testing, the better.

ISACA has two great certifications that show knowledge of information systems management (CISM Certified Information Systems Manager and CISA Certified Information Systems Auditor).

My comments on the CISSP can be found in this entry.



4) What box(es) do they think in and out of?

Candidates may list their engagement experience as being either white box or black box. Knowledge in both types of testing environments is essential.

White box testing is testing an environment with prior knowledge of the infrastructure, systems, applications, policies, procedures, etc. In this situation, the tester has an 'edge', can spend less time doing reconnaissance work and more time testing and exploiting.

Black box testing is also known as 'cold testing'. In other words, the tester has no previous knowledge of the environment to be testing and must perform extensive research and reconnaissance on the target(s). Black box testers are usually intimately familiar with social engineering techniques and knowledge acquisition methods (like dumpster diving).

Focusing on the 'boxes' in interviews is a great way of judging a candidates true level of experience. Ask the candidate for specific examples of their work. Do they freely give previous clients' names? If so, this may be a sign that the candidate doesn't respect Non-Disclosure Agreements.

Most importantly, look for 'out of the box' thinking. Candidates that are able to think on their own and come up with unique solutions to problems are in high demand. (For an example, look at how Scrap & I penetrated the headquarters building of Allison Technologies in Case Of The Tepid Tipster.)

5) Personality, Business and Legal Skills

Your candidate is going to interface with your customer at many levels. Some important things to consider while reading the resume and during the interview:

• Do they have good people skills?
• Do they understand the value of the service they provide to the customer?
• Are they conversational?
• Do they comprehend how important it is to make the customer feel 'at ease' with their presence and service?
• Do they understand the legalities involved in testing?
• Do they have a 'John Wayne' attitude that could get you in trouble? (example: testing outside the scope of the engagement is a no-no!)

6) References, References, References

Ask the candidate for professional (and if possible) client references.


7) What's In Their Toolkit?

Candidates will have their own preference for toolkits, as there are many tools that perform the exact same function. The candidate should have an understanding of tools, and experience using toolkits like Auditor.

Auditor has one of the best (if not the best) selection of tools around. The candidate should have knowledge of at least a few of the tools listed in each category below (taken from the Auditor toolkit):

Footprinting

* Greenwhich
* Whois
* Gnetutil (Network Utilities)
* Itrace (ICMP traceroute)
* Tctrace (TCP traceroute)
* Traceroute
* DNSwalk (DNS verification)
* Dig (DNS lookup)
* Host (DNS lookup)
* NSTXCD (IP over DNS client)
* NSTXD (IP over DNS server)
* Oxyman (DNS tunnel)
* Curl (URL transfer)
* Elinks (Console web browser)
* Konqueror (Web browser)
* Socat (Socket Cat)
* Stunnel (Universal SSL tunnel)
* Arpfetch (SNMP ARP/IP fetcher)
* SNMPWalk (SNMP tree walk)
* TKMib (Mib browser)
* GQ (LDAP browser)
* Komba2 (KDE SMB browser)
* LinNeighborhood (Graphical SMB browser)
* Net utils (NET utilities)
* SMBClient (SMB client)
* SMBGet (SMB downloader)
* Smb4K (SMB share browser)
* Xsmbrowser (Graphical SMB browser)
* nmblookup (Netbios name lookup)
* smbdumpusers (User browser)
* smbgetserverinfo (Get server info)
* Cheops (Network neighborhood)
* NTP-fingerprint (Detection based on ntp fingerprint)
* Nmap (Network scanner)
* NmapFE (Graphical network scanner)
* P0f (Passive OS fingerprinting)
* Queso (OS detection)
* XProbe2 (OS detection)


Scanning

* Cisco global exploiter (Cisco scanner)
* Cisco torch (Cisco oriented scanner)
* ExploitTree search (ExploitTree collection)
* Metasploit (Metasploit commandline)
* Metasploit (Metasploit console GUI)
* Metasploit (Metasploit web interface)
* Nessus (Security Scanner)
* Raccess (Remote scanner)
* Httprint (Webserver fingerprinting)
* Nikto (Webserer scanner)
* Stunnel (Universal SSL tunnel)
* Cheops (Network neighborhood)
* GTK-Knocker (Simple GUI portscanner)
* IKE-Scan (IKE scanner)
* Knocker (Simple portscanner)
* Netenum (Pingsweep)
* Netmask (Requests netmask)
* Nmap (Network scanner)
* NmapFE (Graphical network scanner)
* Proxychains (Proxifier)
* Scanrand (Stateless scanner)
* Timestamp (Requests timestamp)
* Unicornscan (Fast port scanner)
* Isrscan (Source routed packets scanner)
* Amap (Application identification)
* Bed.pl (Application fuzzer)
* SNMP-Fuzzer (SNMP protocol fuzzer)
* ScanSSH (SSH identification)
* Nbtscan (Netbios scanner)
* SMB-Nat (SMB access scanner)
* Ozyman (DNS tunnel)
* Ass (Autonomous system scanner)
* Protos (Protocol identification)

Analyzer

* AIM-SNIFF (AIM sniffer)
* Driftnet (Image sniffer)
* Mailsnarf (Mail sniffer)
* Paros (HTTP interception proxy)
* URLsnarf (URL sniffer)
* smbspy (SMB sniffer)
* Etherape (Network monitor)
* Ethereal (Network analyzer)
* Ettercap (Sniffer/Interceptor/Logger)
* Hunt (Sniffer/Interceptor)
* IPTraf (Traffic monitor)
* NGrep (Network grep)
* NetSed (Network edit)
* SSLDump (SSLv3/TLS analyzer)
* Sniffit (Sniffer)
* TcPick (Packet stream editor)
* Dsniff (Password sniffer)

Spoofing

* Arpspoof (ARP spoofer)
* Macof (ARP spoofer/generator)
* Nemesis-ARP (ARP packet generator)
* Nemesis-Ethernet (Ethernet packet generator)
* CDP (CDP generator)
* DNSSpoof (DNS spoofer)
* Nemesis-DNS (DNS packet generator)
* DHCPX (DHCP flooder)
* Hping2 (Packet generator)
* ICMPRedirect (ICMP redirect packet generator)
* ICMPUSH (ICMP packet generator)
* Nemesis-ICMP (ICMP packet generator)
* Packit (Traffic inject/modify)
* TcPick (Packet stream editor)
* Yersinia (Layer 2 protocol injector)
* Fragroute (Egress rewrite)
* HSRP (HSRP generator)
* IGRP (IGRP injector)
* IRDP (IRDP generator)
* IRDPresponder (IRDP response generator)
* Nemesis-IGMP (IGMP generator)
* Nemesis-RIP (RIP generator)
* File2Cable (Traffic replay)
* Fragrouter (IDS evasion toolkit)
* Nemesis-IP (IP packet generator)
* Nemesis-TCP (TCP packet generator)
* Nemesis-UDP (UDP traffic generator)
* SendIP (IP packet generator)
* TCPReplay (Traffic replay
* Etherwake (Generate wake-on-LAN)



Bluetooth

* BTScanner (Bluetooth scanner)
* Bluesnarfer (Bluesnarf attack)
* Ghettotooth (Bluetooth scanner)
* Kandy (Mobile phone tool)
* Obexftp (Obexftp client)
* Phone manager
* RFComm (Bluetooth serial)
* RedFang (Bluetooth bruteforce)
* USSP-Push (Obex-push)
* XMinicom (Terminal)


Wireless

* apmode.sh (Act as accesspoint)
* Airpwn (Client penetration)
* Hotspotter (Client penetration)
* GpsDrive
* start-gps-daemon (GPS daemon)
* stop-gps-daemon (GPS daemon)
* ASLeap (LEAP/PPTP cracker)
* Genkeys (Hash generator for ASLeap)
* Airforge
* File2air (Packet injector)
* Void11
* Void11-Hopper (Channel hopper)
* GKismet (Graphical wireless scanner)
* GPSMAP (wireless mapping)
* KLV (Kismet Log Viewer)
* Kismet (Ncurses wireless scanner)
* Wellenreiter (Graphical Wireless scanner)
* 802ether (Dumpfile format convertor)
* airodump (Traffic recorder)
* aircrack (Modern WEP cracker)
* Aireplay (Wireless packet injector)
* Wep_Crack (Wep Cracker)
* Wep_Decrypt (Decrypt dump files)
* Airsnort (GUI based WEP cracker)
* ChopChop (Active WEP attack)
* DWEPCrack (WEP cracker)
* Decrypt (Dump file decrypter)
* WEPAttack (Dictionary attack)
* WEPlab (Modern WEP cracker)
* Cowpatty (WPA PSK bruteforcer)
* changemac.sh (MAC address changer)


Bruteforce

* ADMsnmp (SNMP bruteforce)
* Guess-who (SSH bruteforc)
* Hydra (Multi purpose bruteforce)
* K0ldS (LDAP bruteforce)
* Obiwan III (HTTP bruteforce)
* SMB-Nat (SMB access scanner)
* TFTP-bruteforce
* VNCrack (VNC bruteforce)
* Xhydra (Graphical bruteforcer


Password cracker

* BKHive (SAM recovery)
* Fcrackzip (Zip password cracker)
* John (Multi-purpose password cracker)
* Default password list
* Nasty (GPG secret key cracker)
* Rainbowcrack (Hash cracker)
* Samdump2 (SAM file dumper)
* Wordlists (Collection of wordlists)


Forensics

* Autopsy (Forensic GUI)
* Recover (Ext2 file recovery)
* Testdisk (Partition scanner)
* Wipe (Securely delete files)


Honeypot

* IMAP
* POP3
* Honeyd (Honeypot)
* IISEmulator (Honeypot)
* Tinyhoneypot (Simple honeypot)
Posted by CEOinIRVINE
l