Thanks Ivan, and yes I have to VA and pen test both. Does anyone know if it would be possible to mount the client side drive under Back Tracks (or any linux system) and run a directory attack to crack the password for the preboot, then dd drive?
Thanks in advance for all help and information Take Care and Have Fun --John -------------- Original message ---------------------- From: "Ivan Ezust" <[EMAIL PROTECTED]> > On 7/2/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > > I also have to complete a vulnerability assessment and a pen test during > > the > testing, did anyone try either? I was going to strat with Nessus and Back > Tracks > 2. > > I am guessing you want to perform a VA against the file server that > acts as a networkshare to house the Pointsec for PC (FDE) recovery > keys and policies/profiles. This should be a standard VA / pentest > just like for any other file server in the datacenter. > > I am not sure what a VA against the client side of the Pointsec for PC > would involve, as once the drive is unlocked, i.e. the user has > successfully authenticated to the pre-boot, the HDD acts like any > other non-FDE enabled drive. > _______________________________________________ > FDE mailing list > [email protected] > http://www.xml-dev.com/mailman/listinfo/fde _______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
