Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 06/13/10 in Posts

  1. Cine vrea PM . Primul venit primul servit!
    1 point
  2. Scanning tools can help detect vulnerabilities, but they shouldn't be the only tools on your belt. Here's a look at three areas where scanners fall short Excerpted from "Scanning Reality: Limits of Automated Vulnerability Scanners," a new report posted today in Dark Reading's Vulnerability Management Tech Center. In some enterprises, the term "vulnerability management" begins and ends with scanning tools. For these enterprises, improving vulnerability management simply means bringing in more scanners to ensure a broad view. But are network-based vulnerability scanners and Web application scanning tools enough to ensure that your organization will identify and remediate its security vulnerabilities -- before they are exploited by the bad guys? We submit that most IT organizations have a limited understanding of what these tools can do -- and where they fall short. There are three key limitations of vulnerability scanners. Some of the risks around these problems can be mitigated by incorporating additional technologies into your vulnerability management program, while others are beyond the scope of any automated technology. Whatever mitigation strategy is used to fill the gap left by these scanners, the first step is to understand their shortcomings. The first problem area is authentication. Network-based vulnerability scanners are imperfect tools at best. Even when they are properly configured, they detect only vulnerabilities for which they have signatures. While anonymous (unauthenticated) scanning can provide some benefit, failure to leverage authenticated scanning dramatically reduces scanner effectiveness. A second key problem is the scanner's inability to work with custom applications. CVE-based, known vulnerabilities are only a small subset of most organizations' overall attack surfaces. Security checks may exist for the most popular applications and operating systems hosted within your network, but what about the custom applications you have written in-house or outsourced to third parties? There are no CVEs for custom apps. Finally, most vulnerability scanning tools can identify points of weakness, but they can't anticipate complex attack schemes. While vulnerability scanners typically identify and report on issues that can be utilized as the initial point of entry, they are limited in identifying the complex avenues an attacker could take to compromise your network. Automated vulnerability scanners play a critical role in helping you manage and understand the security risks that may exist within your environment. However, like any tool, the capabilities and results of these tools need to be fully understood and their limitations noted. To get details on these key limitations, and some recommendations on how to address them, download the full report.
    -1 points
  3. Salut, ca idee, am dat peste o asa-zisa vulnerabilitate a userilor clicknet care ipotetic ar permite modificarea dns-ului fiecarui utilizator cu toate implicatiile. Problema nu este una de securitate, ci mai mult de proasta informare a clientiilor si sta in felul urmator: Orice client clicknet primeste un kit de instalare care contine un modem, cabluri si un manual de instalare. Toate bune si frumoase doar ca... modemurile cu porturi UTP/wireless (exceptie cele usb) vin din fabrica cu un user si o parola standard si cu o bresa majora de securitate - accesul la administrare online. In manualul de instalare (care a fost scris de maimute) nu numai ca nu sunt explicati corect pasii de instalare, ci sunt prezentate niste aberatii, dar niciunde nu scrie "Bai prostule schimba parola routerului sau dezactiveaza accesul online" astfel incat oricine acceseaza un ip de forma 89.120.xxx.xxx care este online are acces la toate setarile modemului ADSL inclusiv la schimbarea DNS-ului. Ce frumos ar pica companiei condusa de turci atunci cand de-o data toti clientii lor cand acceseaza www.google.com sunt redirectionati pe www.adultfriendfinder.com sau dumnezeu stie ce alta destinatie dubioasa. Nu de alta, dar este la indemana oricui sa scrie un script care acceseaza si modifica toate modemurile. Mai grav este ca utilizatorii nici n-au cea mai mica idee despre pericolul la care sunt expusi, eu afland asta cu stupoare dupa ce am instalat un server de p2p de proba iar cand am accesat ip-ul SURPRIZA!!! Mai grav este ca multe institutii de stat au internet de la clicknet .. sa vez atunci distractie si procese pe capul celor de la Romtelefon (personal sunt sigur ca cei de la consiliul local Arad au injurat mult acum cateva zile ). Cam atat... ah da.. si niste poze ca altfel nu se poate http://www.testeweb.com/rst/romtelefon/89.120.221.111.jpg http://www.testeweb.com/rst/romtelefon/89.120.221.140.jpg http://www.testeweb.com/rst/romtelefon/89.120.221.19.jpg http://www.testeweb.com/rst/romtelefon/89.120.221.3.jpg http://www.testeweb.com/rst/romtelefon/89.120.221.40.jpg http://www.testeweb.com/rst/romtelefon/89.120.221.49.jpg din 200 de ip-uri testate, DOAR 12 aveau parola schimbata intre timp am mai uploadat niste poze plus cateva "surprize" pentru cine e curios http://www.testeweb.com/rst/romtelefon/
    -1 points
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...