In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-09-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
For the boss of the enterprise or the technical personnel of the information department, anti-virus software, firewall, IDS, and IPS may be the most familiar means of security protection. Today, by the way, we will talk about those pits in an enterprise that has established an in-depth defense system with security protection equipment such as anti-virus software, firewall, IDS, IPS, Internet behavior management system, and so on.
1. Ubiquitous applications such as passwords and default passwords
For a more mature enterprise, there are generally OA, ERP, ITMS, sales support system, office resource request system and so on, at least five or six, more than a dozen application systems. Due to the large number of systems and low frequency of use, it is impossible to enable password complexity detection, which causes many employees to use weak passwords such as 1,123,123456, which brings great security risks to enterprises.
(* Detection methods and tools: 1. Nmap scans the server segment to find out relevant intranet applications 2, collect employee usernames (usually employee work numbers or domain accounts can be collected through cain) 3, make weak password dictionary 4, scan with burpsuite)
Second, the disclosure of domain account password caused by other systems synchronizing domain account
For an intranet that has established domain control, in order to establish the organizational structure and authentication system conveniently and quickly, many systems synchronize the domain account system or call the domain control interface, and most of the intranet system login process is plaintext transmission, so the account password can be easily sniffed, and the leakage of a domain account can often lead to a series of security problems.
(case encountered: I am deeply convinced of the online behavior management system, and the online authentication uses domain account authentication, so when I arrive at the company with a cain early before going to work in the morning, I can wait for the account password to appear when other users authenticate online.)
Weak passwords for network equipment, middleware, database, FTP, etc.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
The market share of Chrome browser on the desktop has exceeded 70%, and users are complaining about
The world's first 2nm mobile chip: Samsung Exynos 2600 is ready for mass production.According to a r
A US federal judge has ruled that Google can keep its Chrome browser, but it will be prohibited from
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
About us Contact us Product review car news thenatureplanet
More Form oMedia: AutoTimes. Bestcoffee. SL News. Jarebook. Coffee Hunters. Sundaily. Modezone. NNB. Coffee. Game News. FrontStreet. GGAMEN
© 2024 shulou.com SLNews company. All rights reserved.