Trying to grasp the real world implications of pen testing firewalls (for lack of better wording)
So it’s not necessarily knowing what/any possible means of Evading a Firewall are effective to most firewalls or not, what matters is that you know what ways you can test a firewall.
Right? Like in the real world it’s utilizing the different ways of firewall testing to ensure a firewall meets a clients security needs? (No dns tunneling, fragmentation, blah blah)
[link] [comments]
from hacking: security in practice https://ift.tt/mxykOWV
Comments
Post a Comment