Tools and Technologies-Auditing Networking Equipment


Note 

Automated tools can be quite harmful to production environments. Exercise care, and design the test in a manner that will not affect production systems.

These tools can be quite helpful and guide you toward parts of your configuration file that might need further review. A strong case could be made that new configuration files should be tested with good peer reviews and tools such as those listed below. Many general vulnerability scanners also test commonly exploited vulnerabilities for networking platforms.

  • Router Audit Tool (RAT): http://www.cisecurity.org

  • Firemon: http://www.securepassage.com

  • Wireshark (formally Ethereal): http://www.wireshark.org

  • Nmap: http://www.insecure.org

  • TeraTerm Pro: http://www.hp.vector.co.jp/authors/VA002416/teraterm.html

  • Top 100 Security Tools: http://www.sectools.org



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net