Assessing your Network for Vulnerabilities


Click here to start

Back to the Main Page

Table of contents

Assessing your Network for Vulnerabilities

Agenda

Why Assess your Network?

Why Assess your Network? (Cont.)

Define Assessment goals

Assessment Methodology

SPA = External, Dial, Internal Analysis

Dial Methodology

Dial Methodology(Cont.)

Dial Methodology(Cont.)

Network Assessment

Network Mapping

Network Mapping (Cont.)

Network Mapping (Cont.)

Targeting

Exploitation

Break

Common Vulnerabilities

Common vulnerabilities

Passwords

Passwords

Password Recommendations

Passwords Recommendations (Cont.)

Dial-up

Dial-up Recommendations

Network Infrastructure

Network Infrastructure

Network Infrastructure: Recommendations

Network Infrastructure: Recommendations (Cont.)

Host based

Windows

Windows (Cont.)

Windows Recommendations

Windows Recommendations (Cont.)

Unix

Unix (Cont.)

Unix Recommendations

Unix Recommendations (Cont.)

Unix Recommendations (Cont.)

Novell

Novell (Cont.)

Novell Recommendations

Novell Recommendations (Cont.)

Common Service Vulnerabilities

HTTP Vulnerabilities

SMTP Vulnerabilities

FTP Vulnerabilities

Recent Vulnerabilities

Recent Vulnerabilities (Cont.)

Questions

Slide 51



Back to the Main Page