1. Trang chủ
  2. » Tất cả

LPTv4 module 38 telecommunication and broadband communication penetration testing

41 250 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 41
Dung lượng 1,22 MB

Nội dung

/ ECSA / LPT EC Council M d l XXXVIII EC - Council M o d u l e XXXVIII Telecommunication and Broadband Communication Broadband Communication Penetration Testing Penetration Testing Roadmap Start Here Information Vulnerability External Gathering Analysis Penetration Testing ill Router and Internal F i rewa ll Penetration Testing Router and Switches Penetration Testing Internal Network Penetration Testing IDS Penetration Testing Wireless Network Penetration Testing Denial of Service Penetration Testing Password Cracking Stolen Laptop, PDAs and Cell Phones Social Engineering Application Cont’d EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Penetration Testing Penetration Testin g Penetration Testing Penetration Testing Penetration Testing Roadmap (cont ’ d) (cont d) Cont’d Physical Database VoIP Securit y Penetration Testing Penetration testing Penetration Testin g Vi d Vi rus an d Trojan Detection War Dialing VPN Penetration Testing Log Management Penetration Testing File Integrity Checking Blue Tooth and Hand held Device Penetration Testing Telecommunication And Broadband Cnitin Email Security Penetration Testin g Security Patches Data Leakage Penetration Testing End Here EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited C ommu ni ca ti o n Penetration Testing g Penetration Testing Penetration Testing Broadband Communication E l td t th t d t t k i E mp l oyees connec t e d t o th e corpora t e an d governmen t ne t wor k s v i a broadband communication are a threat. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Risk in Broadband Communication Communication “Always on” broadband connections serve as a medium for attackers to attack home computers and networks attack home computers and networks . Internet connection involves a risk of unauthorized access. For dial-up connections, ISP provides a different IP address for each login. High speed of downloading feature benefits the attacker to download information from the system within minutes. Virus or Trojans are uploaded to the targeted systems at high speed. Malicious software can steal confidential information, and thus launch EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Malicious software can steal confidential information, and thus launch DoS attacks. Steps for Broadband Communication Penetration Testin g g • Check whether the firewall device is installed on the network. 1 Check whether the firewall device is installed on the network. 2 • Check whether web browsers are properly configured. 3 • Check for operating system configuration options. 4 • Check for wireless and other home networking technologies. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited 4 Step 1: Check Whether the Firewall Device is Installed on Network Ch k h th th fi ll i i t ll d th t k t Ch ec k w h e th er th e fi rewa ll i s i ns t a ll e d on th e ne t wor k or no t . All the home networks connected to the corporate network via broadband connection should install the firewall. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Step 1: Check Whether the Firewall Device is Installed on Network ( cont’d ) () • Check whether personal and hardware firewalls are installed. 1.1 Check whether personal and hardware firewalls are installed. Check hether these fire alls pre ent intr ders or detect an 1.2 • Check w hether these fire w alls pre v ent intr u ders or detect an y rogue software. 1.3 • Check whether the logging is enabled on the firewall. 1.4 • Check whether the firewall is in stealth mode. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited 1.4 Step 1.1: Check Whether Personal and Hardware Firewall are Installed A l fi ll i ll d h id i A persona l fi rewa ll i nsta ll e d on t h e system prov id es secur i ty to the user’s system. A hardware firewall placed between the broadband connection and the network provides more security to the network. Check whether personal and hardware firewall are installed or not not . EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Step 1.2: Check Whether These Firewall Prevent Intruders or Detect Any Rogue Software Software Check whether these firewalls p revent intruders or detect the p software sending important data the from the company’s network to an external system. Try to send any known harmless virus or Trojan into the network, and check whether the firewall is active or not. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited [...]... is Enabled Check h th the file d i t Ch k whether th fil and printer sharing option i enabled h i ti is bl d Go to the control panel and check the printer and hardware optionå Printer and Faxeså select any printer, right-click, and select Sharing Try to access the file and printer available in the network EC-Council Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step... Check whether the operating system and application software are of latest version version Use of old and unsecure version may be vulnerable to i b l bl attack EC-Council Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step 3.2: Check Whether the File and g p b Printer Sharing Option is Enabled Check h th the file d i t Ch k whether th fil and printer sharing option i enabled... operating system and application software are updated updated • Check whether the file and printer sharing option is enabled • Check whether the anti-virus program is enabled p g • Check the configuration of anti-virus program g p g • Check whether anti-spyware is enabled py Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step 3.1: Check Whether Operating System and Application... reserved Reproduction is strictly prohibited Step 1.4: Check Whether the Firewall is in Stealth Mode Check h firewall configuration, and see whether the fi Ch k the fi ll fi i d h h h firewall i ll is in stealth mode If it is in stealth mode, the system hides the targeted system and does not respond to the selective port scanning EC-Council Copyright © by EC-Council All Rights reserved Reproduction is strictly... virus program over the system, and check whether the anti-virus is active or not EC-Council Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step 3.4: Check the Configuration of Anti-Virus Program Anti Virus Check the configuration of the anti-virus program anti virus program Configure these software so that they will scan all incoming files and emails d il Send the mail... files and emails d il Send the mail containing the malicious attachment and check whether anti-virus is well configured or not h h i i i ll fi d EC-Council Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step 3.5: Check Whether AntiSpyware are Enabled Send any spyware p g y py program in the system and check y whether anti-spyware is enabled or not EC-Council Copyright... preconfigured with the needs of an organization Check for the policies related to encryption, message authentication code, and selective or total protection EC-Council Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step 4.2: Try for Wiretapping Try to tap the wireless communication Use wiretapping tools such as Wiretapping Professional, Wire Tap Pro Professional Pro, etc EC-Council... Check if the configurations of wireless base station are default ones, if so ones so, attack by: • • • • EC-Council Connecting to the telecommuter’s base station Intercepting and monitoring the traffic Hijacking existing sessions and launching DoS attacks Attacking other wireless clients by bypassing the base station Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step... The image cannot be display ed Your computer may not hav e enough memory to open the image, or the image may hav e been corrupted Restart y our computer, and then open the file again If the red x still appears, y ou may hav e to delete the image and then insert it again Run th NetStumbler tool to h R the N tSt bl t l t showcase the implementation of wireless network It shows whether the network is... Copyright © by EC-Council All Rights reserved Reproduction is strictly prohibited Step 4.3: Try to Perform War Driving Try to perform war driving with different war driving tools such as aerosol, airfart, and airsnarf on the wireless network Search for targeted wireless networks using third-party tools equipped with a computer, laptop, or a PDA EC-Council Copyright © by EC-Council All Rights reserved Reproduction . XXXVIII Telecommunication and Broadband Communication Broadband Communication Penetration Testing Penetration Testing Roadmap Start Here Information Vulnerability External Gathering Analysis Penetration. Penetration Testing ill Router and Internal F i rewa ll Penetration Testing Router and Switches Penetration Testing Internal Network Penetration Testing IDS Penetration Testing Wireless Network Penetration. prohibited Penetration Testing Penetration Testin g Penetration Testing Penetration Testing Penetration Testing Roadmap (cont ’ d) (cont d) Cont’d Physical Database VoIP Securit y Penetration Testing Penetration

Ngày đăng: 14/12/2021, 21:19

TỪ KHÓA LIÊN QUAN