Nt1310 Unit 3 Process Analysis

Words: 828
Pages: 4

Do you know how you can determine if your network is secure? To determine if your network is secure you have to perform a penetration test(pen test). Kali Linux is an operating system (OS) that gives you all the tools you will need to determine if the network is secure. Kali Linux is funded by the Offensive Security Ltd and the core developers are Mati Aharoni, Devon Kearns and Raphaƫl Hertzog. Kali Linux is a useful OS for penetration testing(pen testing). Some useful Kali Linux tools are Nmap (Network Mapper), Wireshark and Nikto. In order to do pen testing, there are four phases.
The four phases of penetration testing include planning, discovery, attack and reporting. The planning phase is where you define the scope and make the rules of engagement. The scope is where the client tells you what networks to test and the goals and objective of the pen test. The next phase is called the discovery phase also sometimes called the information gathering phase. This is where you want to gather as much information as possible that are in scope with the rules of engagement. The attack phase is where you try to find the weakness you try to find a weakness in the networks. In the last phase, you report your finding. One
…show more content…
To capture Data Packets follow these steps. First, lunch Wireshark you will see different type of connection types: Bluetooth Network Connection, Ethernet, VirtualBox Host-Only Network, and Wi-Fi. On the right of the live traffic select one or more of these networks with your mouse. Then, click on capture from the main menu, located towards the top of the Wireshark interface. When the drop-down menu appears, select the Start option. To capture packets you have to double-click on its name. After using Wireshark I have learned more about where my network traffic is going. This is a great tool to that will help me find out what is happening on my