Skip to main content

Posts

Showing posts from May, 2022

Network Penetration Testing

 1. Network Basics • TCP/IP Packet Analysis • Overview of Network Security • Port and Protocols Analysis • Windows Lab Setup • Linux Lab Setup • Linux major services and commands • Windows major services and commands 2. Penetration Testing Framework Kali Linux • Virtual Box • VMware • AWS | Google Cloud 3. Analyzing Network Traffic • Importance of Packet Analysis • How to Capture Network Traffic • Promiscuous Mode • Introduction to Wireshark • Filtering and Decoding Traffic • Physical Data-Link Layer • Network Internet Layer • Transport Host-Host Layer • Application Lay  4. Packet Analysis with Tshark • Introduction to Tshark • Capture traffic • Promiscuous mode • Packet count • Spoof IP Scan • Spoof MAC Scan • Data String Scan • Hex String Scan • IP Options Scan • Read and Write in a file • Output formats • Display filter • Endpoints Analysis 5. Detecting Live Systems and Analyzing Results • Detecting Live Systems with ICMP • Detecting Live Systems with TCP • ICMP Packet Anal...

Day :01 Network Penetration Testing

What is Network Penetration Testing? As the global online presence increases in intensity and quality, the number of associated cyber threats also increases in tandem. We are required to constantly supervise network security, web applications, devices, servers, etc, and find better ways to do the same, adapting to more and more dangerous online security issues.  This is where network penetration testing steps in to help you find out such cybersecurity issues before they negatively impact your system, through the process of ‘ethical hacking’ and simulated threats.  In this context, network penetration testing (or, pen-test for short) is a tool of great importance, useful in detecting security misconfigurations and possible exposure of vulnerabilities and threats that can harm any organization’s = networks, websites servers, and other applications when exploited by the hackers.  For easier reference, imagine it to be a mock drill against known cyber threats. So, a...