9
R-C-D
5y

A bit confused !
Must prepare an article about network pentest and defense .
Since its a very wide topic and I've been told not to just mention tools , I'm confused about categorizing these tests !
Also the footprinting stage is not likely to have any defense !(no attack is lunched yet :) )

So... Any idea?

Comments
  • 2
    You can start by talking about nmap, you know what it does
    You can configure the services such that it's not susceptible to banner grabbing and that unwanted services are disabled
  • 2
    Make sure your dns servers are configured properly so zone transfers could be avoided
  • 2
    You can also write about blocking port scans using your firewalls
  • 2
    I'd add a comment as I recall something, sorry 😅
  • 1
  • 2
    I saw this rant in the feed and my idea was to comment "ask @R1100 ".
  • 1
    @justasithlord what risk do you think is imposed if you don’t allow zone transfers but do allow AXFR from :: ?
  • 0
    @xalys aren't zone transfers and AXFR queries the same? I think they're the same

    So if you allow it to be done from everywhere then that'd be like giving away your internal network structure away to whoever requests for it
Add Comment