jennifer.hernandez

/Jennifer Hernandez

About Jennifer Hernandez

This author has not yet filled in any details.
So far Jennifer Hernandez has created 43 blog entries.

Firewall Penetration Testing

HTTPort is a program from HTTHost that creates a transparent tunnel through a proxy server or firewall. Firewall Penetration Testing The Security Analyst Exercises / Firewall Penetration Testing contains the following Exercises: HTTP Tunneling to Bypass Firewalls Using HTTPort The Virtual Private Cloud for this [...]

August 20th, 2014|Categories: Firewall Penetration Testing, Security Analyst Exercises|Comments Off on Firewall Penetration Testing

Internal Network Penetration Testing

Penetration Testing is a method of performing specific tests on a computer, network or web application and check for vulnerabilities that can be made use of for exploitation. User name and user groups Lists of computers, their operating systems, and ports Machine names, network resources, and services Lists of shares on [...]

August 20th, 2014|Categories: Internal Network Penetration Testing, Security Analyst Exercises|Comments Off on Internal Network Penetration Testing

External Penetration Testing

External Penetration Testing simulates the actions of an actual attacker exploiting vulnerabilities in the network security to determine what information is actually exposed to the outside world. Check live systems and open ports Perform banner grabbing and OS fingerprinting Identify network vulnerabilities Draw network diagrams of vulnerable hosts [...]

August 20th, 2014|Categories: External Penetration Testing, Security Analyst Exercises|Comments Off on External Penetration Testing

Vulnerability Analysis

Nessus allows you to remotely audit a network and determine if it has been broken into or misused in some way. It also provides the ability to locally audit a specific machine for vulnerabilities. Use the Nessus tool Scan the network for vulnerabilities [...]

August 20th, 2014|Categories: Security Analyst Exercises, Vulnerability Analysis|Comments Off on Vulnerability Analysis

Information Gathering

Information gathering refers to collecting information about a target company that will help in penetration testing and security auditing of the company. Extract a company'™s information List employees of the company Use search engines to collect the information Search for link popularity of the company's website Gather competitive intelligence List the [...]

August 20th, 2014|Categories: Information Gathering, Security Analyst Exercises|Comments Off on Information Gathering

TCPIP Packet Analysis

As a Security Analyst, you must have a complete mastery over TCP/IP protocol. Packet Analysis is making use of a packet sniffer to capture the packets and analyze the flow of data between two devices communicating on a network. Sniff the network Analyze incoming and outgoing packets Troubleshoot the network for [...]

August 20th, 2014|Categories: Security Analyst Exercises, TCPIP Packet Analysis|Comments Off on TCPIP Packet Analysis

Security Analyst Exercises

Security Analyst Exercises are available as part of the following subscription: Each subscription provides 6 of months access to 15 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Penetration Testing Exercises are designed to give the user [...]

August 20th, 2014|Categories: Uncategorized|Comments Off on Security Analyst Exercises

Windows Forensics

Computer forensics is a broad concept that refers mainly to crimes committed with the use of computers. Various laws have been passed against cybercrime, but it still exists and the guilty parties are difficult to find due to the lack of physical evidence. This challenge can be overcome with the help of computer forensics. [...]

August 14th, 2014|Categories: Computer Forensics Exercises, Windows Forensics|Comments Off on Windows Forensics

Investigative Reports

An investigative report is a forensics report that defines the details of an incident, contains all information required to explain the conclusion, and holds legal inspection. It is used to communicate the results of the forensic investigation. Create an investigation report Add appropriate recommendations Add a concise summary of conclusions [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Investigative Reports|Comments Off on Investigative Reports

Tracking Emails and Investigating Email Crimes

Investigating email crimes is the process of tracing, collecting, analyzing, and investigating digital evidence and cyber trails. Digital evidence and cyber trails can relate to email spamming, mail bombing/mail storms, email spoofing, identity fraud/chain letters, phishing attacks, and email hijacking. Recovering deleted email messages and attachments Recovering message contacts Tracking sender [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Tracking Emails and Investigating Email Crimes|Comments Off on Tracking Emails and Investigating Email Crimes