Thanks Ivan, and yes I have to VA and pen test both.

Does anyone know if it would be possible to mount the client side drive under 
Back Tracks (or any linux system) and run a directory attack to crack the 
password for the preboot, then dd drive?

Thanks in advance for all help and information

Take Care and Have Fun --John

 -------------- Original message ----------------------
From: "Ivan Ezust" <[EMAIL PROTECTED]>
> On 7/2/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> > I also have to complete a vulnerability assessment and a pen test during 
> > the 
> testing, did anyone try either? I was going to strat with Nessus and Back 
> Tracks 
> 2.
> 
> I am guessing you want to perform a VA against the file server that
> acts as a networkshare to house the Pointsec for PC (FDE) recovery
> keys and policies/profiles. This should be a standard VA / pentest
> just like for any other file server in the datacenter.
> 
> I am not sure what a VA against the client side of the Pointsec for PC
> would involve, as once the drive is unlocked, i.e. the user has
> successfully authenticated to the pre-boot, the HDD acts like any
> other non-FDE enabled drive.
> _______________________________________________
> FDE mailing list
> [email protected]
> http://www.xml-dev.com/mailman/listinfo/fde

_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to