From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Protocol analysis

Protocol analysis

- In this lesson, we're going to discuss some different types of protocol analysis tools that you might use during your assessments. These include wireless vulnerability scanners, protocol analyzers, network traffic analyzers, port scanners, and HTTP interceptors. The first type of protocol analysis tool we have is a wireless vulnerability scanner. A wireless vulnerability scanner is going to be used to identify the configuration and signal coverage of a given organization's wireless network. Once identified, the assessor can determine if the network is using the proper encryption and authentication methods. If weak encryption is being used, for example, like WPA or WEP, the assessor might attempt to crack the wireless network key using brute force or dictionary attack. If a hardware is going to be vulnerable to an attack like KRACK, Reaver, or Pixie dust, then those vulnerabilities could be exploited as part of your penetration test, too. If you're conducting a physical security…

Contents