Results 1 to 7 of 7

Thread: Firewall penetration testing

  1. #1
    Join Date
    Apr 2010
    Posts
    74

    Firewall penetration testing

    Hello,
    I want to know about how to fight and defend against attempts to penetrate your machine. I have also heard that penetration testing can be also used against an Ethical Hackers. I am very desperate for an information about the Firewall penetration testing. Last time your replies were proved beneficial for me, so thought to take some more help from you guys.!!

  2. #2
    Join Date
    Feb 2008
    Posts
    2,635

    Re: Firewall penetration testing

    You should first understand the concepts of the firewall testing. Firewall testing is one of the most useful of a set of alternatives for evaluating the security effectiveness of a firewall. You can get number of tools to test the security of our applications. However penetrating into computer networks are sometimes bottleneck because of firewalls. There are several approaches in the fight against pirates and against all forms of intrusions and extrusions unsolicited to and from our computers. The firewall software, free or commercial, meet the financial requirements of the particular standard, the other (hardware firewall) are the professional sector.

  3. #3
    Join Date
    Jan 2006
    Posts
    3,792

    Re: Firewall penetration testing

    You can practice Penetration Testing On-line. Series of online tests, free, accessible to individuals. If these tests are "bright" for the individual and serve, incidentally, to sell the firewall (firewall), they are totally insignificant to the IT department of a company. Large structures will focus on professional tools like Core Impact or hire of the world (former super-hacker, for example). You will find all the same, on this page penetration testing on-line testing of Space Security is a free Web service professionals open to individuals.

  4. #4
    Join Date
    Jan 2006
    Posts
    4,221

    Re: Firewall penetration testing

    A penetration test is a method for evaluating the security of a system or computer network. The method generally involves simulating an attack by a malicious user or malicious software. It then analyzes the potential risks due to improper configuration of a system, a lack of programming or a vulnerability in the tested solution. During a penetration test, we find ourselves in the position of the potential attacker. The main purpose of this maneuver is to find vulnerabilities exploited to propose a plan of action to improve the security of a system.

  5. #5
    Join Date
    Apr 2008
    Posts
    3,339

    Re: Firewall penetration testing

    The analysis of Penetration test can be achieved in three ways :
    1. The tester is in the skin of a potential attacker , and has no information;
    2. The tester has a limited amount of information;
    3. The tester has the information he needs.

    After finding the active programs that communicate with another network, find a flaw in these applications can lead to corrupt a whole system in a short time.

  6. #6
    Join Date
    Oct 2008
    Posts
    137

    Re: Firewall penetration testing

    This test is to simulate the attack by a malicious user or a malware. Risks are then analyzed potentials due to a misconfiguration of a system, a lack of programming or of a vulnerability in this solution in the target computer system. During a penetration test, we therefore find in the position of the potential attacker. The main purpose of this maneuver is to find exploitable vulnerabilities in order to propose an action plan to improve system security.

  7. #7
    Join Date
    Oct 2008
    Posts
    119

    Re: Firewall penetration testing

    For penetration testing, the tester has several tools :
    • The web : it may seem insignificant but it can become a veritable mine of information (email addresses, street addresses, phone numbers ...) on a given target (natural or legal entity) this practice becomes commonplace with social networks and search engines.
    • The service DNS using nslookup and dig tools to query the servers DNS to obtain either the IP address based on a domain , or vice versa, or the domain name servers through which emails . Furthermore, the DNS records often provide useful information.
    • The service whois that, even if its data are not always up to date, to retrieve various information about an IP address or domain name .

Similar Threads

  1. Kali Linux the new OS for advance penetration testing
    By cech in forum Operating Systems
    Replies: 3
    Last Post: 02-04-2013, 10:49 AM
  2. Need some good testing utility for software testing
    By Madri in forum Software Development
    Replies: 6
    Last Post: 12-07-2012, 06:28 PM
  3. Replies: 6
    Last Post: 27-08-2009, 09:56 AM
  4. Growing Internet Penetration in India
    By Ninad23 in forum India BroadBand
    Replies: 2
    Last Post: 28-11-2008, 12:34 PM
  5. Replies: 6
    Last Post: 07-10-2008, 03:27 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,714,233,677.47479 seconds with 17 queries