Palo Alto. Αρχική παραμετροποίηση, λειτουργία και σενάρια
View/ Open
Keywords
Palo Alto ; Security ; Σενάρια προστασίας ; Επίθεση σε δίκτυο ; Kali LinuxAbstract
This paper is a guide for the tutor and accompanies powerpoint presentations. In this paper we have used the capabilities of a Palo Alto firewall in a virtual environment. We firstly created a network that included Palo Alto. We have modified policies aimed at the requirements of a hypothetical organization. We have created policies that allow or deny users access to the Internet. We have also created policies based on the security needs of the organization. On the next step we have integrated Palo Alto into a Windows Domain environment with Active Directory so that it works harmoniously, with the goal of being part of the infrastructure and not as a separate tool. Finally, we have tried two configurations, one unsecure and one secure, to launch a remote code execution attack on one of the workstations. For this purpose, we have used tools from Kali Linux and Metasploit to produce malware that could help us recover credit domain users.