Pages

Friday, June 3, 2011

Network Security Material

In this chance, I want to tells about something that I get from the material this afternoon. Me and my friends are invited to learn about network security in our campus.
Network security is very important, but many of us underestimate about it.
In this case we are required to think as a striker because of an attacker we can find holes or weaknesses and fix them for cover or reduce the gap of our network security.
There are several stages or steps that we can do to guide us in network security :
-         Information gathering
In this section we can collect the information from our target like OS that used the target, server, port, etc.
-         Configurating management testing
-         Authentication testing
-         Session management
-         Authorization testing
-         Data validation testing
-         And so on.

From the above steps, we can use hacking tactics below :
-         social enginering
-         scanning, probing
-         sniffing
-         exploiting
-         fuzzing
-         injection
-         keylogging
-         etc

No comments:

Post a Comment