Eicon Networks S92 Instrukcja Użytkownika Strona 6

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 209
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 5
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 6
Testscenarios:.........................................................................................150
ScenarioOne: .........................................................................................151
ScenarioTwo: .........................................................................................155
ScenarioThree:.......................................................................................159
ScenarioFour:.........................................................................................162
AssessmentfromanOutsider”perspective.................................................167
ScenarioOne: .........................................................................................168
ScenarioTwo: .........................................................................................172
ScenarioThree:.......................................................................................177
ScenarioFour:.........................................................................................181
AdministrativeSecurityAssessment ...............................................................184
FaultToleranceAssessment ............................................................................184
AuditReport...................................................................................................185
RecommendationOne.............................................................................185
RecommendationTwo.............................................................................186
RecommendationThree ..........................................................................186
RecommendationFour ............................................................................186
RecommendationFive ............................................................................187
RecommendationSix ..............................................................................187
RecommendationSeven..........................................................................187
Assignment4 .........................................................................................................188
AttackTarget..........................................................................................................189
FirewallAttack.......................................................................................................190
InformationGathering:............................................................................190
Attacking–theport259route:................................................................190
Attacking–theTrojanroute:...................................................................191
Attacking–theIPFragmentroute:..........................................................193
DoSattack..............................................................................................................195
TheAmplifiers................................................................................................195
UsingSAR:.............................................................................................196
ToolsfortheAttack ........................................................................................197
UsingTFN:.............................................................................................198
ASimpler Attack ............................................................................................199
AgainstSmurfAttack .....................................................................................200
CompromisingInternalSystems.............................................................................202
Step 1:Researchthetarget. .....................................................................202
Step2:Attack! ........................................................................................202
ForkBombsandViruses.................................................................................203
Przeglądanie stron 5
1 2 3 4 5 6 7 8 9 10 11 ... 208 209

Komentarze do niniejszej Instrukcji

Brak uwag