| ||
Assessing open TCP ports in a full port range
Assessing TCP port forwarding rules
Assessing TCP ingress/egress filtering
Determining the firewall type and testing TCP filtering rules and their efficiency
Assessing TCP sequence numbers predictability and vulnerability to man-in-the-middle and traffic replay attacks
Assessing handling oversized, fragmented , and incorrect checksum TCP packets
Assessing the maximum number of connections handled
Assessing the resilience to SYN flooding and other common TCP- related DoS attacks
Assessing open UDP ports in a full port range
Assessing UDP port forwarding rules
Assessing UDP ingress/egress filtering
Determining the firewall type and testing UDP filtering rules and their efficiency
Assessing handling oversized, fragmented, and incorrect checksum UDP packets
Assessing the resilience to UDP port flooding and other UDP-based DoS attacks
| ||