<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,Are you trying to do pen in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759722#M178863</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Are you trying to do pen test on the ASA to find what configuration is missing in order to&amp;nbsp; secure your network or; do you want to do pen test on machines located on your test network?&lt;/P&gt;&lt;P&gt;Based on your requirement you will get different results. If you try to perform pen test on the public IP then ASA being a security device will block the attacks.&lt;/P&gt;&lt;P&gt;But if you try to find out vulnerabilities in devices present in the test network then you should arrange some pen testing tool on your test network.&lt;/P&gt;&lt;P&gt;In case you have a trusted external pen testing tool and you know the public IP then you can try allowing traffic from that IP to the internal test network for pen testing.&lt;/P&gt;&lt;P&gt;But how you would like to proceed will all depend on your network requirement and your company security norms.&lt;/P&gt;&lt;P&gt;I think this isn't a correct forum as the ASA being a firewall will identify the attack and block it.&lt;/P&gt;&lt;P&gt;Hope it answers your question.&lt;/P&gt;</description>
    <pubDate>Mon, 14 Sep 2015 17:49:07 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-09-14T17:49:07Z</dc:date>
    <item>
      <title>How to run a penetration test in my network ?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759721#M178862</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a small test network separated by the public internet from a cisco ASA 5506 firewall ( Completely different network from the corporate network with own ISP) There are few test workstations and servers on this test network. I would like to run a penetration test on this network. I am new to security and not sure what is the most reliable way to do this. Do I have to run internal and external pen test? If so, How do I do this. Basically, I would like to know someone from outside can have access to the &amp;nbsp;this test network. I would be really appreciated if someone could give me step by step details. Lets assume the attacker already know my public ip address.&lt;/P&gt;&lt;P&gt;Thank &amp;nbsp;very much.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:35:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759721#M178862</guid>
      <dc:creator>gihansvn24</dc:creator>
      <dc:date>2019-03-12T06:35:43Z</dc:date>
    </item>
    <item>
      <title>Hi,Are you trying to do pen</title>
      <link>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759722#M178863</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Are you trying to do pen test on the ASA to find what configuration is missing in order to&amp;nbsp; secure your network or; do you want to do pen test on machines located on your test network?&lt;/P&gt;&lt;P&gt;Based on your requirement you will get different results. If you try to perform pen test on the public IP then ASA being a security device will block the attacks.&lt;/P&gt;&lt;P&gt;But if you try to find out vulnerabilities in devices present in the test network then you should arrange some pen testing tool on your test network.&lt;/P&gt;&lt;P&gt;In case you have a trusted external pen testing tool and you know the public IP then you can try allowing traffic from that IP to the internal test network for pen testing.&lt;/P&gt;&lt;P&gt;But how you would like to proceed will all depend on your network requirement and your company security norms.&lt;/P&gt;&lt;P&gt;I think this isn't a correct forum as the ASA being a firewall will identify the attack and block it.&lt;/P&gt;&lt;P&gt;Hope it answers your question.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2015 17:49:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759722#M178863</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-09-14T17:49:07Z</dc:date>
    </item>
    <item>
      <title>Risseth,Thank your for your</title>
      <link>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759723#M178864</link>
      <description>&lt;P&gt;Risseth,&lt;/P&gt;&lt;P&gt;Thank your for your respond. I would like to perform the pen test using the public IP address. Assuming the attacker already knows my public ip address. From the attacker's&amp;nbsp;prospective, how do I perform this test ? &amp;nbsp;If I can get in to the internal network via &amp;nbsp;the ASA firewall then I would know my firewall rules are secure enough. I have done some research&amp;nbsp;and found this Nmap tool, but it wasn't very descriptive about how to perform the test.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2015 18:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759723#M178864</guid>
      <dc:creator>gihansvn24</dc:creator>
      <dc:date>2015-09-14T18:07:21Z</dc:date>
    </item>
    <item>
      <title>You are on the correct path</title>
      <link>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759724#M178865</link>
      <description>&lt;P&gt;You are on the correct path keep exploring more pen testing tools.&lt;/P&gt;&lt;P&gt;NMAP is a good tool you can also use Kali linux but this is something you will have to learn and perform pen test. You can also search for some online tools.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Don't forget to mark a correct answer!!!&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2015 18:26:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759724#M178865</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-09-14T18:26:23Z</dc:date>
    </item>
    <item>
      <title>Hello gihansvn24, Seems like</title>
      <link>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759725#M178866</link>
      <description>&lt;P&gt;Hello gihansvn24,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems like you have a neat project at hand.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In terms on having a comprehensive security analysis, running both an internal and external pen test will give perspective of vulnerabilities from outside your network and within your network (disgruntled employee, access limitations/privileges, endpoint protection, etc). Here's an article (&lt;A href="http://www.csoonline.com/article/2943524/data-protection/8-penetration-testing-tools-that-will-do-the-job.htm"&gt;http://www.csoonline.com/article/2943524/data-protection/8-penetration-testing-tools-that-will-do-the-job.htm&lt;/A&gt;l)&amp;nbsp; which lists some useful pen-testing tools which should prove some usefulness at your task.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you have any other questions!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2015 20:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759725#M178866</guid>
      <dc:creator>pepiscop</dc:creator>
      <dc:date>2015-09-28T20:57:26Z</dc:date>
    </item>
    <item>
      <title>PENTESTON is a simple and</title>
      <link>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759726#M178867</link>
      <description>&lt;P style="line-height: 1.44; margin-top: 0pt; margin-bottom: 0pt;"&gt;PENTESTON is a simple and easy to use security assessment tool. No need for a special IT guy, just test and examine your online weaknesses.Take a Test-Drive Today at http://www.penteston.com/&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 11:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-run-a-penetration-test-in-my-network/m-p/2759726#M178867</guid>
      <dc:creator>janicean11</dc:creator>
      <dc:date>2017-06-06T11:12:56Z</dc:date>
    </item>
  </channel>
</rss>

