Chapter 6

Testing for security flaws using penetration testing

Abstract

Here, we use open source tools to test network topologies and security policies for defense of penetration attacks. We cover practical examples of how to set up and measure defenses. Finally, we present how penetration testing may be used in conjunction with automation.

Keywords

penetration testing
security policy defense
meterprter
Simple DDoS testing is not sufficient to detect security flaws in the network, because sophisticated penetration attacks can blend attacks and data acquired from attacks to break into your system. Networks are dynamic, there is always change over in staff, equipment, network elements, code, firmware, etc. Flaws may be introduced by change, or may ...

Get Network Performance and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.