TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Pointless Pentesting S3?

3 点作者 nateguchi大约 10 年前
One of our clients has a policy of Pentesting everything they put their name on.<p>We&#x27;ve just done a project for them involving a static site (HTML + Images) hosted on S3.<p>Despite our assurances, they want to pentest Amazon S3.<p>Is this as insane as I think?

3 条评论

josephkern大约 10 年前
Not at all really. It&#x27;s not about the technology, it&#x27;s about the process. A pentest will (or at least should) determine if you shipped a &quot;secure&quot; product. This company (if it&#x27;s serious about pentesting all their projects) will assign some kind of risk factor to the website you&#x27;ve built. Information Security is all about identifying risk (at all levels) and mitigating or accepting those risks.<p>In the case of a an Amazon S3 bucket, I would think the following items should be enumerated in a pentest:<p><pre><code> 1. Leaking information via DNS 2. Secure hosting for DNS records 3. Secure passwords on your AWS account 4. Proper permissions set on your bucket 5. Multiple AWS availability zones 6. Javascript libraries used are functionally correct 7. No inclusion of any backdoor features by the developers ;-) </code></pre> This is more of an audit than a pentest. But sometimes a company will only have peace of mind if they base their measurements off of an established internal process. Even if the tests don&#x27;t seem to make sense for the technology or implementation they will make sense when it comes to identifying risk metrics across all of their web facing products.
sarciszewski大约 10 年前
&gt; Is this as insane as I think?<p>Yup. But that&#x27;s something they&#x27;ll need to ask Amazon for permission to do before they can legally proceed. Else, CFAA&#x2F;relevant local draconian law can smack them down pretty hard.<p>I do a lot of application security. A friend of mine does front-end design (no Javascript). I don&#x27;t check her work for security holes because it&#x27;s pointless; she can&#x27;t touch the backend code.<p>As the GNY crew might say, &quot;Context, people. Context.&quot;<p><a href="http:&#x2F;&#x2F;www.textfiles.com&#x2F;webfiles&#x2F;ezines&#x2F;GONULLYOURSELF&#x2F;gonullyourself6.txt" rel="nofollow">http:&#x2F;&#x2F;www.textfiles.com&#x2F;webfiles&#x2F;ezines&#x2F;GONULLYOURSELF&#x2F;gonu...</a>
dnet大约 10 年前
I&#x27;ve seen similar projects -- if you told them how pointless spending money on such assessments is, and they still want it, then it shouldn&#x27;t be your problem. Also, there&#x27;s still a chance that they have some backup or privately shared files up there that DirBuster or similar software could find.