Eicon Networks S92 Uživatelský manuál Strana 6

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 5
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 6
Testscenarios:.........................................................................................150
ScenarioOne: .........................................................................................151
ScenarioTwo: .........................................................................................155
ScenarioThree:.......................................................................................159
ScenarioFour:.........................................................................................162
AssessmentfromanOutsider”perspective.................................................167
ScenarioOne: .........................................................................................168
ScenarioTwo: .........................................................................................172
ScenarioThree:.......................................................................................177
ScenarioFour:.........................................................................................181
AdministrativeSecurityAssessment ...............................................................184
FaultToleranceAssessment ............................................................................184
AuditReport...................................................................................................185
RecommendationOne.............................................................................185
RecommendationTwo.............................................................................186
RecommendationThree ..........................................................................186
RecommendationFour ............................................................................186
RecommendationFive ............................................................................187
RecommendationSix ..............................................................................187
RecommendationSeven..........................................................................187
Assignment4 .........................................................................................................188
AttackTarget..........................................................................................................189
FirewallAttack.......................................................................................................190
InformationGathering:............................................................................190
Attacking–theport259route:................................................................190
Attacking–theTrojanroute:...................................................................191
Attacking–theIPFragmentroute:..........................................................193
DoSattack..............................................................................................................195
TheAmplifiers................................................................................................195
UsingSAR:.............................................................................................196
ToolsfortheAttack ........................................................................................197
UsingTFN:.............................................................................................198
ASimpler Attack ............................................................................................199
AgainstSmurfAttack .....................................................................................200
CompromisingInternalSystems.............................................................................202
Step 1:Researchthetarget. .....................................................................202
Step2:Attack! ........................................................................................202
ForkBombsandViruses.................................................................................203
Zobrazit stránku 5
1 2 3 4 5 6 7 8 9 10 11 ... 208 209

Komentáře k této Příručce

Žádné komentáře