Table of contentsAssessing your Network for Vulnerabilities
Agenda
Why Assess your Network?
Why Assess your Network? (Cont.)
Define Assessment goals
Assessment Methodology
SPA = External, Dial, Internal Analysis
Dial Methodology
Dial Methodology(Cont.)
Dial Methodology(Cont.)
Network Assessment
Network Mapping
Network Mapping (Cont.)
Network Mapping (Cont.)
Targeting
Exploitation
Break
Common Vulnerabilities
Common vulnerabilities
Passwords
Passwords
Password Recommendations
Passwords Recommendations (Cont.)
Dial-up
Dial-up Recommendations
Network Infrastructure
Network Infrastructure
Network Infrastructure: Recommendations
Network Infrastructure: Recommendations (Cont.)
Host based
Windows
Windows (Cont.)
Windows Recommendations
Windows Recommendations (Cont.)
Unix
Unix (Cont.)
Unix Recommendations
Unix Recommendations (Cont.)
Unix Recommendations (Cont.)
Novell
Novell (Cont.)
Novell Recommendations
Novell Recommendations (Cont.)
Common Service Vulnerabilities
HTTP Vulnerabilities
SMTP Vulnerabilities
FTP Vulnerabilities
Recent Vulnerabilities
Recent Vulnerabilities (Cont.)
Questions
Slide 51
|