Vulnerability Assessment - Internet Perimeter Profiling

Description

The key objectives for this testing is the discovery and identification of Internet-accessible systems and services within perimeter network environments.

The testing includes the following methodology and test cases:

  • Enumerate systems that respond to Internet based network traffic
  • Enumerate Internet accessible services hosted on discovered systems
  • Attempt to identify system and service types based on network signatures and service behaviour
  • Basic DNS enumeration utilising the domain names provided as input
  • Services
  • Profiling