Penetration Test

I am searching for what areas are tested for a regular penetration test done by a consultant. We are thinking about doing that by ourselves Info Security Team and would like to have a comprehensive listing of the scope. Any links are appreciated.

Reply to
Sherman H.
Loading thread data ...

You can start out with checking information about firewall security, like on

formatting link
The holes first checked for however aught to be responses from known trojans, a port scan to ensure closed/stealthed ports and connectivity to system services. Also, tests should be made to make sure that trojans (or a home-written piece of code as a test agent) cannot penetrate the firewall simply by using a trusted application acting as its traffic courier. This of course requires the firewall to have the capapbility to restrict outbound access from programs on the system/network itself. /Mike

Reply to
Mikael

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.