![]() ![]() ![]() Inspect and analyze to see if the firewall is being placed in the right location and if the organization needs to have one more firewall at another node (to provide more security). A detailed understanding of each node and function is required. The deployment diagram should cover each detail being deployed in real scenario. Tools: Echo Mirage, Wireshark, Regshot, TCPView, Process Hacker, Strings, CFF Explorer, WinHex, Fiddler, Nmap, Process Monitor and moreĪsk for the network and deployment diagram and have a detailed understanding of the network flow and how the process is getting initiated. Review the deployment diagram and find loopholes in all of the above.Analyze memory and CPU performance during the running phase of an application.Analyze if an application is creating or storing any sensitive information in the parent directory, logs, config files and so on.Inspect the entry in Registries (before, during and after the running phase of an application).Some of the following measures and controls that must be a part of this assessment are as follow: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |