First page Back Continue Last page Summary Graphics
Final Testing (cont.)
Attack first from within. Use portscanners, such as nmap, sscan, mscan, netcat etc. to identify listening ports, then decide whether or not they are needed.
Use vulnerability scanners (e.g. Nessus, ISS' System Scanner, and Internet Scanner, and ARC's TARA and SARA). Again, find, identify and correct any vulnerabilities the scanner detects.
Sniffers include ethereal, sniffit and dsniff.
Scan from inside and from all interfaces. If a firewall, make sure to scan from outside of the firewall interface.
Scan with and without defenses. Don't forget to reenable them.
Notes: