
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 6
Testscenarios:.........................................................................................150
ScenarioOne: .........................................................................................151
ScenarioTwo: .........................................................................................155
ScenarioThree:.......................................................................................159
ScenarioFour:.........................................................................................162
Assessmentfroman“Outsider”perspective.................................................167
ScenarioOne: .........................................................................................168
ScenarioTwo: .........................................................................................172
ScenarioThree:.......................................................................................177
ScenarioFour:.........................................................................................181
AdministrativeSecurityAssessment ...............................................................184
FaultToleranceAssessment ............................................................................184
AuditReport...................................................................................................185
RecommendationOne.............................................................................185
RecommendationTwo.............................................................................186
RecommendationThree ..........................................................................186
RecommendationFour ............................................................................186
RecommendationFive ............................................................................187
RecommendationSix ..............................................................................187
RecommendationSeven..........................................................................187
Assignment4 .........................................................................................................188
AttackTarget..........................................................................................................189
FirewallAttack.......................................................................................................190
InformationGathering:............................................................................190
Attacking–theport259route:................................................................190
Attacking–theTrojanroute:...................................................................191
Attacking–theIPFragmentroute:..........................................................193
DoSattack..............................................................................................................195
TheAmplifiers................................................................................................195
UsingSAR:.............................................................................................196
ToolsfortheAttack ........................................................................................197
UsingTFN:.............................................................................................198
ASimpler Attack ............................................................................................199
AgainstSmurfAttack .....................................................................................200
CompromisingInternalSystems.............................................................................202
Step 1:Researchthetarget. .....................................................................202
Step2:Attack! ........................................................................................202
ForkBombsandViruses.................................................................................203
Komentáře k této Příručce