Hot Downloads

×

Notice

The forum is in read only mode.
Welcome, Guest
Username: Password: Remember me
  • Page:
  • 1

TOPIC: Being penetration tester

Being penetration tester 14 years 2 months ago #5126

  • c0lin
  • c0lin's Avatar Topic Author
  • Offline
  • New Member
  • New Member
  • Posts: 6
  • Thank you received: 0
You have to accomplish the following task:
- You have to check what security holes can be exploited on your dedicated firewall machine
and
- You have to make a report about that.

And here come my questions:
- What tools would you use to check if your firewall (and your LAN) is configured properly?
- How would you write the report?


Here are the tools that i would use: nmap, hping, nc, sing, icmpenum, Languard Network Scanner (GFI), Retina (eEye).

What about you?

Re: Being penetration tester 14 years 2 months ago #5134

Under the Security and Firewalls topic in the forum, Sahirh wrote an article called "Penetration Testing - Tools Of The Trade," it tells you the popular tools used, how to write the reports, and some other helpful stuff, here's the link:
firewall.cx/modules.php?name=Forums&...=viewtopic&t=356
if you decide to take the long way, it's the 2nd page in that topic


hope that helps

Re: Being penetration tester 14 years 2 months ago #5138

  • c0lin
  • c0lin's Avatar Topic Author
  • Offline
  • New Member
  • New Member
  • Posts: 6
  • Thank you received: 0

Under the Security and Firewalls topic in the forum, Sahirh wrote an article called "Penetration Testing - Tools Of The Trade," it tells you the popular tools used, how to write the reports, and some other helpful stuff, here's the link:
firewall.cx/modules.php?name=Forums&...=viewtopic&t=356
if you decide to take the long way, it's the 2nd page in that topic


hope that helps



I have to apologize because i havent searched very well between threads.
Basically this is what i was looking for:
www.firewall.cx/articles-network-security-intro-7.php

Re: Being penetration tester 14 years 1 month ago #5173

Don't forget firewalk, I don't know if I mentioned it there (yes you can use hping, but there is more scope for a small mistake).

Check out hping3.. the scriptability is incredible (ok so I haven't got it figured out much yet, but from what I've seen in the examples etc.. its just too awesome).

Cheers,
Sahir Hidayatullah.
Firewall.cx Staff - Associate Editor & Security Advisor
tftfotw.blogspot.com
  • Page:
  • 1
Time to create page: 0.188 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup