官术网_书友最值得收藏!

Vulnerable workstations

One of the many questions frequently asked is why we soften machines or use machines that have vulnerabilities. The fact is that a properly patched, properly configured, and properly hardened machine is quite difficult to get into. Penetration testing is not trying to get through to hardened devices but looking specifically for those devices that have vulnerabilities. In a typical engagement, you may find only one or two machines that have vulnerabilities. You can then use these machines to gain a foothold into an environment to compromise other more hardened machines. If you start doing regular engagements as a penetration tester, you will be surprised by just how many machines you may be able to find that have vulnerabilities. This is especially true with the proliferation of low cost Internet of Things (IoT) devices such as internet connected cameras, thermostats, automation systems, and monitoring. These devices often run Linux-type embedded operating systems and are rarely patched and often overlooked. More importantly, they are often riddled with bugs and vulnerabilities that we can use for our purposes.

主站蜘蛛池模板: 维西| 聂荣县| 鹿邑县| 西昌市| 芒康县| 五莲县| 车险| 酉阳| 治县。| 沾化县| 宝坻区| 延川县| 垣曲县| 江永县| 城步| 绥化市| 新田县| 始兴县| 和硕县| 卢湾区| 乐平市| 红原县| 尉犁县| 白水县| 安图县| 留坝县| 尼勒克县| 德惠市| 洛宁县| 射阳县| 安平县| 马关县| 印江| 九台市| 洛浦县| 京山县| 颍上县| 黑龙江省| 静宁县| 什邡市| 全南县|