The real world implications of Firewall Evasion, Detection, etc.

Trying to grasp the real world implications of pen testing firewalls (for lack of better wording)

So it’s not necessarily knowing what/any possible means of Evading a Firewall are effective to most firewalls or not, what matters is that you know what ways you can test a firewall.

Right? Like in the real world it’s utilizing the different ways of firewall testing to ensure a firewall meets a clients security needs? (No dns tunneling, fragmentation, blah blah)

submitted by /u/OoooHeABigOlBoi
[link] [comments]

from hacking: security in practice https://ift.tt/mxykOWV

Comments