Penetration testing tools
- By MBA
- CompTIA PenTest+
- 8 Replies
You can use the open-source phishing framework, GoPhish, getgophish.com.
To expand on Trevor's answer about looking at the logs; investigate the routing issue by determining the scope of the problem. Expand on this by using ping and traceroute. Can users connect to some networks (sites) but not others? Statics are often used in two scenarios. #1 when the network is really simple and the architect wants to dictate the traffic path (think about a simple home /office router or a network with one ISP connection). Another use case is when the network is more complex and multiple paths (multiple ISPs) exist between two networks. In this case you might want to override or backup the route discovered via a routing protocol. And this is where route weighting comes in to the discussion.My explanation begins by having students to look at the logs on the router!
@Rick Butler thank for calling my intention to this I think I going to reduce it . Trust me adjustment is going to be done immediately.What's with all of the serial posting? Looks pretty excessive to me...
@Rick Butler I know you are not at the content. But somehow I know you are very supportive. I relise my mistake by credit you . I am sorry.I ask myself that same question, Trevor. ?
I ask myself that same question, Trevor. ?Why is Rick Butler being extended any credit here???????