Eicon Networks S92 Bedienungsanleitung Seite 143

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 142
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 143
comprehensivereportofeachscan.”(fromwww.eEye.com
37
)
Retinaisusedinourprojectastheprimaryscanningtool.Thereasonsare:
1,Retinasupportsanextensivesetofaudits,including:
n Accounts
n CGIScripts
n CHAM
n Commerce
n DnsServices
n DoS
n FTPServers
n IPServices
n MailServers
n Miscellaneous
n NetBIOS
n Registry
n RemoteAccess
n RpcServices
n ServiceControl
n SNMPServers
n SSHServers
n WebServers
(http://www.eeye.com/html/Support/Retina/RTHs/index.html)
2,RetinasupportstheuseofArtificialIntelligencetechnologyforsimulatingreal
worldhackingprocesses:
“CHAM (CommonHackingAttackMethods):
Thisgroundbreakingfeatureisthefirstofitskind.CHAMemploysAItechnologyin
ordertosimulatethe thoughtprocessofahackerorsecurityanalystinfindingholes
innetworksandsoftwarepackages.CHAMenablesRetinatogobeyondlookingfor
knownvulnerabilities.Bysimulatingtheapproachandthoughtprocessofahacker,
CHAMisabletoidentifyunknownvulnerabilitiesinnetworks.Setitlooseonyour
webserver,oroncustomapplicationbeingdevelopedbyyourengineers.eEyeuses
37
http://www.eeye.com/html/Products/Retina/index.html
Seitenansicht 142
1 2 ... 138 139 140 141 142 143 144 145 146 147 148 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare