Chapter 9
Network Infrastructure Systems
IN THIS CHAPTER
Selecting tools
Scanning network hosts
Assessing security with a network analyzer
Preventing denial of service and other infrastructure vulnerabilities
To have secure operating systems and applications, you need a secure network. Devices such as routers, firewalls, and even generic network hosts (including servers and workstations) must be assessed as part of the vulnerability and penetration testing process.
Thousands of possible network vulnerabilities exist, along with equally many tools and even more testing techniques. You probably don’t have the time or resources available to test your network infrastructure systems for all possible vulnerabilities using every tool and method imaginable. Instead, you need to focus on tests that produce a good overall assessment of your network. The tests I describe in this chapter produce exactly that.
You can eliminate many well-known, network-related vulnerabilities by simply patching your network hosts with the latest vendor software and firmware updates. Because many network infrastructure ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access