Posts

Showing posts with the label device

Network Device System Hardening / Configuration Assessment

Image
SysAdmin Audit Network Security (SANS) Router and Switch Security Policy https://www.sans.org/security-resources/policies/network-security#router-and-switch-security-policy 1. No local user accounts are configured on the router. Routers and switches must use TACACS+ for all user authentication. 2. The enable password on the router or switch must be kept in a secure encrypted form . The router or switch must have the enable password set to the current production router/switch password from the device’s support organization 3. The following services or features must be disabled : a. IP directed broadcasts b. Incoming packets at the router/switch sourced with invalid addresses such as RFC1918 addresses c. TCP small services d. UDP small services e. All source routing and switching f. All web services running on router 7. Use corporate standardized SNMP community strings. Default strings , such as public or private must be removed. SNMP must be configured to u...

Popular posts from this blog

Remote Desktop Protocol (RDP) Security

Penetration Testing - Network

Damn Vulnerable Web Services (DVWS) - Walkthrough

Server Message Block (SMB) Security

Offensive Security Testing Guide

Host Configuration Assessment - Windows

Web Server Hardening - Apache Tomcat

Content Page

Mobile Penetration Testing - Android

Penetration Testing with OWASP Top 10 - 2017 A7 Cross-Site Scripting (XSS)