Gathering Penetration Testing Intelligence from Network and Application Platform Configuration

Gathering Penetration Testing Intelligence from Network and Application Platform Configuration
June 1, 2021 No Comments Cyber defense, cybersecurity, Elearning, Online security, Penetration testing, Pentest, System security, Web frameworks admin

Network configuration refers to the process of setting a network’s controls, flow, and operation to support the network infrastructure of an organization or for an individual owner. Components of a computing network include Internet/network protocols, software or application, firewall, routers, and others that perform related tasks. Most network configurations are designed to meet communication objectives. For example, the router is configured with the correct IP addresses and route settings to enable network connection and communication. Software is configured to monitor network-based activities and to detect intrusions to the network.

Tags

Leave a reply

Your email address will not be published. Required fields are marked *