<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Audit and Pen-testing of PIX and Net-Ranger site in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/audit-and-pen-testing-of-pix-and-net-ranger-site/m-p/7973#M697954</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are some good books out there like &amp;#147;Maximum Security&amp;#148; that will give you a good basis for what to look for in your network.  Unfortunately, the methodologies of hacking are so dynamic that by the time something is written, software vendors patch those holes and hackers develop new methods.  It would be best to look for a company that does security audits and stays current on the technology to come in and independently check your network and make recommendations.  Just make sure they are not a product reseller so they can give you a true analysis.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Jun 2001 20:09:46 GMT</pubDate>
    <dc:creator>thomas.chen</dc:creator>
    <dc:date>2001-06-12T20:09:46Z</dc:date>
    <item>
      <title>Audit and Pen-testing of PIX and Net-Ranger site</title>
      <link>https://community.cisco.com/t5/network-security/audit-and-pen-testing-of-pix-and-net-ranger-site/m-p/7972#M697933</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to conduct a security audit on our&lt;/P&gt;&lt;P&gt;infrastrcuture based on PIX and Cisco Secure Intrusion&lt;/P&gt;&lt;P&gt;Detection System.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does someone know where I can find some usefull&lt;/P&gt;&lt;P&gt;information to test and try to pen-test this kind of&lt;/P&gt;&lt;P&gt;components.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want first to check and validate the configuration&lt;/P&gt;&lt;P&gt;in place and second to try to penetrate my site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;steve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-and-pen-testing-of-pix-and-net-ranger-site/m-p/7972#M697933</guid>
      <dc:creator>cbo5020</dc:creator>
      <dc:date>2020-02-21T05:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Audit and Pen-testing of PIX and Net-Ranger site</title>
      <link>https://community.cisco.com/t5/network-security/audit-and-pen-testing-of-pix-and-net-ranger-site/m-p/7973#M697954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are some good books out there like &amp;#147;Maximum Security&amp;#148; that will give you a good basis for what to look for in your network.  Unfortunately, the methodologies of hacking are so dynamic that by the time something is written, software vendors patch those holes and hackers develop new methods.  It would be best to look for a company that does security audits and stays current on the technology to come in and independently check your network and make recommendations.  Just make sure they are not a product reseller so they can give you a true analysis.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2001 20:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-and-pen-testing-of-pix-and-net-ranger-site/m-p/7973#M697954</guid>
      <dc:creator>thomas.chen</dc:creator>
      <dc:date>2001-06-12T20:09:46Z</dc:date>
    </item>
  </channel>
</rss>

