You are on page 1of 13

PENETRATION TESTING PLANNING 1

Penetration Testing Planning

Capella University

IAS5220 – Network Security Controls and Testing.

March 8, 2019
PENETRATION TESTING PLANNING 2

Abstract

With the advancement of technology make it possible for the internet of things actions send

over routers and switches whiles it is going to a final location, these internet of thing packets are

destiny to any destination they susceptible to be gathered and examined from location to location

this is call packet sniffing. And troubleshooting any organization network system issues is time

intensity requirement and stressful that is why is the expectation for every organization to have

resiliency information system to run their services which is dependent on the internet and internet

network system connections for their daily needs.

This paper will examine the “tools which existing to aid network administrators in packet

capture and examination. Mull over the paper is the specific tools which can be used for packet

capturing and examination. This paper will evaluate the access and usage controls which essential

from the operations of packet capture and analysis tool are well used appropriately” (Capella, 2019,

21-23).

Keywords: digital or network forensic investigations, network system security controls,

incident response, digital forensics.


PENETRATION TESTING PLANNING 3

Table of Content

 Cover Page,

 Abstract.

 Table of Content.

 Introduction/ Body

 Conclusion

 References
PENETRATION TESTING PLANNING 4

U07V1 Toolwire Lab 4

Unit 08 Tool wire Lab 4 beginning

Beginning
PENETRATION TESTING PLANNING 5

Mid Way Lab


PENETRATION TESTING PLANNING 6
PENETRATION TESTING PLANNING 7

Ending Lab Test


PENETRATION TESTING PLANNING 8

Introduction

Part of the organization information system procedures for the network system security

control management is the monitoring of the system which is fundamental processes of the

network system infrastructure administration, this process examines the network behavior, the user

usage and abuse, workloads and balancing, from the packet present and usage in the network

system and any issues which had an impact on the network system. John (2019) said that there are

applications which can use for retentive control over the security of network system packet

capturing and evaluation what is the cause of the heavier workload on the network system devices.

As it is increasingly stressful, and meeting demands of advanced network system infrastructure for

network administrators, since the advance routers of today have inbuilt services for packet

monitoring and examination such as SNMP, RMON, NetFlow. These services functions have aid

network administrators to have active and passive processes and methods for network system
PENETRATION TESTING PLANNING 9

security control management (John, 2019, p22-27).

The passive and active network system management, with active methods, is a proactive

and automated network system security with the disadvantage of the active methods in the network

system management limitation of interference which have an impact in the network system devices

function to capture packet and examined it. Passive methods don’t have such limitation it offers

offline process with the disadvantage of not able to give real-time reports. The packet sniffing can?

 Able to gather data on packet examination for any predictive ways in the real-time.

 These packet sniffers can handle large volume data from different sources to show the

peaks network system traffic highlight.

 Also, Packet Sniffers can decide the gridlocked high can breakdown and any other network

system application that defines more traffic.

There are various tools which use for today packet examination for packet sniffing for

the monitoring of network system traffic from the server, routers, switch and or application/

OS.

 “SolarWinds Packet 2018

 Wireshark

 Packet Capture

 TCP dump

 EtherApe

 PRTG network Monitoring” (Jon, 2018. P 21- 25).

Since packet capture is configuring to seek and find from network system for the local fire,

remote, MAC address capture, radio filtering and analysis of the TCP packets. Administrator uses
PENETRATION TESTING PLANNING 10

specific tools to examine packet capture to find congesting link, also find any application and

operating system that producing most traffic. Also, the gathered data from the information system

for any predictive evaluation and what cause the peaking in the network system traffic. They are

effectively ability to do that by an understanding of the promiscuous mode, network system traffic

types, enterprise and hacking tools for the packet capturing and analysis of better knowledge of

how the NIC of the network system works when a packet of data is trans missed over the network

system. Also, the network system traffics types is from the ARP and DHCP network traffic is. By

this specific enterprise tools to understand the overall corporate analysis of any traffic from the

enterprise network system traffic and hacking tools like the wiretappers to aid in packet capturing

and analysis, (Jon, 2019. Para 15- 19).

SolarWinds tools are able to provide deep packet analysis by showing meaningful packet

capturing data examination and these same as the PRTG tool which runs network segmentation

utility analysis task from the performance monitor, status of network system devices and the

network system bandwidth examination (John, 2019, para 31-37).


PENETRATION TESTING PLANNING 11

References

Capella University, 2019, Course room, unit 8, Packet Capture and Analysis, Date retrieved

02/28/2019,

https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?course_id=_

162482_1&content_id=_7268977_1&mode=reset

JON WATSON, (2019), Comparitech, 9 Best Packet Analyzers / Packet Sniffers for 2019, Date

retrieved 02/28/2019, https://www.comparitech.com/net-admin/packet-sniffer-network-

analyzers/

JON WATSON, (2018), Comparitech, What is packet sniffing and how can you avoid it? , Date
PENETRATION TESTING PLANNING 12

retrieved 02/28/2019, https://www.comparitech.com/blog/information-security/what-is-

packet-sniffing/

John Cox, (2019), iTTsystems, Best Packet Sniffers Tools & Software for Network & Bandwidth

Analysis, Date retrieved 02/28/2019, https://www.ittsystems.com/packet-sniffing-tools/


PENETRATION TESTING PLANNING 13

You might also like