Penetration Testing mailing list archives

Re: Vulnerability Assessment of VLAN


From: Tate Hansen <tate () kingtoday net>
Date: Thu, 13 Jan 2011 23:01:21 -0700

For #1, check out:
"What Are the Possible Attacks in a VLAN-Based Network?" found in:
http://www.cisco.com/en/US/products/hw/switches/ps708/products_white_paper0
9186a008013159f.shtml


On 1/12/11 2:16 AM, "informationhacker08" <informationhacker08 () gmail com>
wrote:


1)Conducting Vulnerability assessment of a server that exist in a
different
VLAN and the your machine is located on other Vlan (No Trunk)

2)Any Good Paper on Firewall Auditing. I have deep interest in Auditing.
Any
well known paper that describes how to properly Audit a Firewall. What
things should we check in Firewall Auditing.

Regards

Informationhacker08


-- 
View this message in context:
http://old.nabble.com/Vulnerability-Assessment-of-VLAN-tp30631414p30631414
.html
Sent from the Penetration Testing mailing list archive at Nabble.com.


------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review
Board

Prove to peers and potential employers without a doubt that you can
actually do a proper penetration test. IACRB CPT and CEPT certs require a
full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------





------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 

http://www.iacertification.org
------------------------------------------------------------------------


Current thread: