Case Study

Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked

Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked

Pages 20 Pages

Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked 1 Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked WHITE PAPER2 Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked WHITE PAPER Table of Contents 3 Executive Summary 3 1. Weak Database Credentials 4 Ease of attack and impact 6 Defense 6 2. LM Hash and Broadcast Requests 7 Ease of attack and impact 10 Defense 10 3. Open Shares 10 Ease of attack and impact 12 Defense 12 4. Default/Weak Credentials on Sensitive Resources 12 Ease of attack and impact 13 Misconfigured Apache Tomcat with default credentials 15 VNC 16 DRAC 16 Defense 17 5. Vulnerabilities with Public Exploits 17 Ease of attack and impact 18 Defense 18 Summary 18 Acknowledgements 19 About The Author 19 About McAfee

Join for free to read