Unit 3 Assignment 3.1: Network Assessments

Great Essays
3. Scope
The penetration test can be performed on a wide range of objects, which can be divided into three main categories.
3.1 Network Penetration Test
Network penetration test aims at identifying vulnerabilities in networks, network devices and hosts which can be exploited by hackers. These vulnerabilities can come from the flaws in design, operation or implementation of the network systems. For example, if the router of the company is hacked, the hacker may be able to access all the data being sent to and from the company’s network and even altered the content of these data. Therefore, it can lead to incorrect business information. The consequences will be even worse if the information being transmitted or received is meant to be confidential.
…show more content…
Network assessments have appeared almost as long as host assessments, starting with the Security Administrator Tool for Analyzing Networks (SATAN), released by Dan Farmer and Wietse Venema in 1995. SATAN provided a new perspective to administrators who were used to hosting assessment and hardening tools. Instead of analyzing the local system for problems, it allowed you to look for common problems on any system connected to the network. This expands the use of network-based assessment systems. A network vulnerability assessment firstly locates all live systems on a network, determines what network services are in use, and then analyzes those services for potential vulnerabilities. Unlike the host assessment solutions, this process does not require any configuration changes on the systems being assessed, which largely improve the efficiency. Although network assessments are very effective for identifying vulnerabilities, they do suffer from certain limitations, like not being able to detect certain types of backdoors, complications with firewalls, and the inability to test for certain vulnerabilities because of danger. Additionally, many vulnerabilities are exploitable by an authorized but unprivileged user account and cannot be identified through a network

Related Documents

  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. 3 e. How many options are there? How many of these are required?…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Investigating threats, once a laborious task involving multiple devices, was now a simple and straight forward process of filtering logs and viewing reports. According to Chris, “not knowing which applications were running on the network is a big hole—particularly when it is at a remote site where there is typically less control. With the Palo Alto Networks firewall, we are able to identify the exact application running on the network, all the way down to the user identity. And as needed, we can implement policy controls to protect the network.” Chris concludes, “we have deployed a single security appliance where we had originally planned on using multiple disparate devices and that has reduced the management complexity significantly, without compromising our…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    List the classification of network in detail according to the area covered. Also explain each classification of network in detail with its application. LAN – (Local Area Network) A LAN is a network that covers a relatively small area. It is a network that mostly links computers within a single building.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Low tech, sometimes high reward tool Port Scanning Tool. Port scanning tool will review and reveal any open ports NMAP – is just one of many port scanning tools. NMAP capabilities: Scans all ports, but can be selected scan only certain ports to reduce excess traffic Determines what operating systems is being used on Nessus – another popular scanner. Nessus has a large library of vulnerabilities and tests to identify Like NMAP, Nessus can scan all ports and can detect what OS the system is using.…

    • 460 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hacker access, activist access, an insider attack. Hacker access involves an outside entity gaining access to the network via unpatched systems, vulnerability, or by any other technical means. Activist access consists of a hacker affecting the network maliciously with a political or moral agenda in mind. Insider attack can be the most dangerous of the three. This involves someone within the organization do harm to the network using the credential or access they were granted to perform their regular duties.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    There are two major components to the MPLS architecture and they are control panel and data panel. The control panel has a complex function and is used to exchange the layer 3 routing information (RIP, OSPF, EIGRP, and IGRP) and labels (Label Distribution Protocol (LDP)). The data plane is used to forward the packets based on the destination address or labels. The routers that are capable of routing and switching in the MPLS domain are called LSR (Label Switch Routers).…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    1) Network traffic analysis shows that a single host is opening hundreds of SSH sessions to a single host every minute. a. The large number of attempted connections each minute suggests this is an attempted denial of service attack. This type of attack attempts to overload network resources with illegitimate traffic to deny service to legitimate users or business needs. IDS and IPS devices can detect all of this traffic, and the IPS can drop (or have border network devices such as firewalls drop) these packets to prevent the attack from succeeding.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    The DNS is a worldwide distributed directory service, and as such, is an indispensable part of the functioning internet (Hurter, 2011). The final tool we covered was traceroute, used for computer network diagnostics by displaying the path taken and measuring transit delays in packets across an IP network. Traceroute can be used to help identify incorrect routing table definitions or a firewall which may be blocking ICMP traffic, or high port UDP. It is also used by penetration testers to gather information about network infrastructure and IP ranges around a given host (Mahajan, Spring, Wetherall, & Anderson,…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Discipline Investigation: Network System Analyst Introduction Information system is the most popular technology in the past two decades, but I have decided to get into the field is not because of the popularity. I have chosen network analyst as my future path because my mom used to restrict my internet usage. The reason sounds unique but that is why I initiate my interest on this “forbidden thing”. However, I never learn anything about it until I took a class in my high school, call Network Administration. The teacher has explored a new world in the class, and I have realized that my interest can be my future career choice.…

    • 1954 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    We will begin by defining what a network is. To define a computer network it is a collection of interconnected devices capable of sharing meaningful information and resources with one another. On this network computers can communicate with other computers on the network. Computers can be very powerful when they 're connected to one another in a data network that allows them to share data even it will allows the computer to be connected to the outside so that they will be able to share data geographically wide areas. A network usually has several computers on the network and they are usually connected by a communication device such as a router or a switch these are also known as Network devices.…

    • 722 Words
    • 3 Pages
    Improved Essays