Powered by Blogger.
Home » » Module 07: Network Penetration Testing Methodology-Perimeter Devices

Module 07: Network Penetration Testing Methodology-Perimeter Devices

Written By AKADEMY on Wednesday, July 3, 2019 | 11:21 AM

Module 07: Network Penetration Testing Methodology-Perimeter Devices

Objective

This lab will show you how to bypass Firewalls by using tools such as HTTPort, and HPING3.

Scenario

Attackers are constantly searching for vulnerable clients to penetrate their network through IP spoofing to damage or steal data. The attackers can access packets through a firewall by spoofing the IP address. If attackers are able to capture network traffic, as explained in the previous lab, they can perform Trojan attacks, registry attacks, password hijacking attacks, etc., which can be disastrous for an organization’s network. Attackers use a network probe to capture raw packet data and later use this raw packet data to retrieve packet information such as source and destination IP address, source and destination ports, flags, header length, checksum, Time to Live (TTL), and protocol type.
Share this article :

0 comments:

 
Trung Tâm Đào Tạo An Toàn Thông Tin Học Hacker Mũ Xám Online | Học An Ninh Mạng Trực Tuyến | CEH VIỆT NAM
Copyright © 2013. HACKER MŨ XÁM - All Rights Reserved
Web Master @ Võ Sĩ Máy Tính
Contact @ Đông Dương ICT