Module 07: Network Penetration Testing Methodology-Perimeter Devices
Objective
This lab will show you how to bypass Firewalls by using tools such as HTTPort, and HPING3.
Scenario
Attackers are constantly searching for vulnerable clients to penetrate their network through IP spoofing to damage or steal data. The attackers can access packets through a firewall by spoofing the IP address. If attackers are able to capture network traffic, as explained in the previous lab, they can perform Trojan attacks, registry attacks, password hijacking attacks, etc., which can be disastrous for an organization’s network. Attackers use a network probe to capture raw packet data and later use this raw packet data to retrieve packet information such as source and destination IP address, source and destination ports, flags, header length, checksum, Time to Live (TTL), and protocol type.
0 comments:
Post a Comment