官术网_书友最值得收藏!

Vulnerable workstations

One of the many questions frequently asked is why we soften machines or use machines that have vulnerabilities. The fact is that a properly patched, properly configured, and properly hardened machine is quite difficult to get into. Penetration testing is not trying to get through to hardened devices but looking specifically for those devices that have vulnerabilities. In a typical engagement, you may find only one or two machines that have vulnerabilities. You can then use these machines to gain a foothold into an environment to compromise other more hardened machines. If you start doing regular engagements as a penetration tester, you will be surprised by just how many machines you may be able to find that have vulnerabilities. This is especially true with the proliferation of low cost Internet of Things (IoT) devices such as internet connected cameras, thermostats, automation systems, and monitoring. These devices often run Linux-type embedded operating systems and are rarely patched and often overlooked. More importantly, they are often riddled with bugs and vulnerabilities that we can use for our purposes.

主站蜘蛛池模板: 云安县| 新源县| 卢龙县| 黑龙江省| 池州市| 共和县| 工布江达县| 贵州省| 宜阳县| 吉安市| 清水河县| 阜康市| 项城市| 灌云县| 理塘县| 林甸县| 印江| 韶山市| 当雄县| 上栗县| 霍林郭勒市| 垫江县| 玉龙| 开鲁县| 三门县| 临湘市| 稻城县| 定安县| 德阳市| 庄浪县| 灵寿县| 桦南县| 黄山市| 武川县| 乌审旗| 石河子市| 鄄城县| 晋江市| 正蓝旗| 宝鸡市| 陆川县|