zoukankan      html  css  js  c++  java
  • Penetration Test

    Weaknesses in Specialized Systems

    • ICS(Industrial Control Systems)
      • Environment conditions
    • SCADA(Supervisory Control and Data Acquisition) -
      • SCADA is the control system that interfaces with industrial processes
      • SCADA is often a turnkey layered software
      • PLC(Programmable Logic Controllers) - PLCs are the electronic boards(s) that power the manufacturer's processes
    • Mobile - lack of updates, compromised settings, dangerous apps, etc.
      • Rooting/Jailbreak a device makes it open to security breaches
      • Beware of mining activities
    • IoT(Internet of Things) - default (weak) security (wide open)
    • Embedded
    • Point-of-sale system
      • Attractive due to connection to payment devices(cash, readers, etc.)
    • Biometrics -accuracy is still evolving
      • What if primary reader fails to detect?
      • What is the manual process? Pressure and urgency is always an aspect of social engineering.
    • Application constrainers
      • Containers and VMs are not foolproof sandboxes
      • Compromising(breaking out) may allow access to external resources
    • RTOS(Real-time operating system)
      • Designed to provide fast, lightweight services, not security.
    QUICK REVIEW
    • ICS and SCADA systems often lack current security patches

    • Mobile and IoT devices are often configured for convenience over security

    • Any device that handles payments is an attractive target

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    centos 7遇到的问题
    Exceptions&Files
    关于Transtion属性收藏
    游戏主循环知识积累
    display:inline、block、inline-block的区别
    Sublime text 3快捷键收藏
    业务逻辑详解随记
    探究Struts2运行机制,知识积累
    将博客搬至CSDN
    url随记
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13656505.html
Copyright © 2011-2022 走看看