Skip to Main Content
Managing A Network Vulnerability Assessment
book

Managing A Network Vulnerability Assessment

by Thomas R. Peltier, Justin Peltier, John A. Blackley
July 2017
Intermediate to advanced content levelIntermediate to advanced
312 pages
8h 31m
English
Auerbach Publications
Content preview from Managing A Network Vulnerability Assessment
Project Scoping 27
Exhibit 7. Bottom-Up Scope Questionnaire (continued)
Firewalls
Boundary firewall(s) type: [list]
Number of boundary firewall(s): [x]
Internal firewall(s) type: [list]
Number of internal firewall(s): [x]
Cryptographic Analysis
Client has requested that the test team examine the design of the following cryptosystems:
[List cryptosystems, such as PKI system or IPSec, that have been requested]
Password Cracking
Windows NT
SMB capture passwords: [Yes/No]
Retrieve from domain controller: [Yes/No]
Brute-force standard alphabet: [Yes/No]
Brute-force all characters: [Yes/No]
Time to run: [Hours, up to 24]
Novell NetWare
Brute-force standard alphabet:
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Vulnerability Assessment

Network Vulnerability Assessment

Sagar Rahalkar
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9780203503041