![]() Inspect and analyze to see if the firewall is being placed in the right location and if the organization needs to have one more firewall at another node (to provide more security). A detailed understanding of each node and function is required. The deployment diagram should cover each detail being deployed in real scenario. Tools: Echo Mirage, Wireshark, Regshot, TCPView, Process Hacker, Strings, CFF Explorer, WinHex, Fiddler, Nmap, Process Monitor and moreĪsk for the network and deployment diagram and have a detailed understanding of the network flow and how the process is getting initiated. Review the deployment diagram and find loopholes in all of the above. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |