Skip to Main Content
Managing A Network Vulnerability Assessment
book

Managing A Network Vulnerability Assessment

by Thomas R. Peltier, Justin Peltier, John A. Blackley
July 2017
Intermediate to advanced content levelIntermediate to advanced
312 pages
8h 31m
English
Auerbach Publications
Content preview from Managing A Network Vulnerability Assessment
Technical (Bottom-Up) Methodology 107
Do backdoors or inappropriate chains of trust exist? There are a number
of different ways that this could be happening. Is an end user running
pcAnywhere as a means of getting around the corporate virtual private
network (VPN)? Another inappropriate chain of trust could exist inside
UNIX systems in the /etc/rhosts and the /etc/hosts.equiv files.
Is there evidence of intrusion? Keep your eyes open when performing the
tests. If you see results that really make you believe that an intrusion has
occurred, stop your testing and alert the responsible party immediately.
Any further security testing that you do at this point could overwrite the
forensic evidence of how the system was compromised.
Are detection measur ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Vulnerability Assessment

Network Vulnerability Assessment

Sagar Rahalkar
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9780203503041