Access over 35 million academic & study documents

Network Security Assessment

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/5
Name
Course
Tutor
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
Running Head: NETWORK SECURITY ASSESSMENT 2
Network Security Assessment
Tools to use in conduction the assessment
Various footprinting tools can be used in performing network security assessment. It is highly
advisable to be very careful when using these tools for safety purposes (Curphey, 2010).
Sam Spade it is used as graphical tool that allows one to do DNS interrogation and many other
tasks. Sam Spade has couple of features that makes it a key security tool. They include,
Zone transfer request the DNS server for everything it knows regarding a particular
domain
Advanced DNS DIG tool asks for all the DNS records for domain or host
SMTP Relay Check a useful feature that checks and verifies whether a mail server
allows for a third party relaying
Craw Web site it is a key feature that searches a website checking for email address, off
site links and/ to download a web site
Scam Address it scans a range of IP computer addresses looking for any if open ports
IP block search it finds the IP block an organization
It is important to note that Sam Spade also performs traceroute, whois, dns and finger lookup.
Pinger A tool is very fast ping sweeper. After obtaining the IP block of the targeted
organization, one uses pinger to check number of active hosts.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Name Course Tutor Date Running Head: NETWORK SECURITY ASSESSMENT Network Security Assessment Tools to use in conduction the assessment Various footprinting tools can be used in performing network security assessment. It is highly advisable to be very careful when using these tools for safety purposes (Curphey, 2010). Sam Spade – it is used as graphical tool that allows one to do DNS interrogation and many other tasks. Sam Spade has couple of features that makes it a key security tool. They include, ➢ Zone transfer – request the DNS server for everything it knows regarding a particular domain ➢ Advanced DNS – DIG tool asks for all the DNS records for domain or host ➢ SMTP Relay Check – a useful feature that checks and verifies whether a mail server allows for a third party relaying ➢ Craw Web site – it is a key feature that searches a website checking for email address, off site links and/ to download a web site ➢ Scam Address – it scans a range of IP computer addresses looking for any if open ports ➢ IP block search – it finds the IP block an organization It is important to note that Sam Spade also performs traceroute, whois, dns and finger lookup. Pinger – A tool is very fast ping sweeper. After obtaining the IP block of the targeted organization, one uses pinger to check number of active hosts. 2 Running Head: NETWORK SECURITY ASSESSMENT SuperScan – This network security tool enables one to scan a range of number of IP addresses and thu ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Really useful study material!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4