Understanding the potential flaws or security issues within the infrastructure is key to a strong security policy. If these flaws are found by the bad guys, they can attack the infrastructure and render the network inoperable, or worse, use them as a tool to attack others. As penetration testers, it is important that we also look at the complete overall infrastructure to make sure that we find and notify on any issues that may exist.
In this chapter, we will be going through various utilities to check the security posture of the infrastructure. This will include both, the wired and wireless infrastructure. With the onslaught of undefined devices within the enterprise, it is more important than ever to make sure that they are not creating any security issues. We will also touch on the physical security as well, as the company may have all the...