zoukankan      html  css  js  c++  java
  • Penetration Test

    Mitigation strategies

    RECOMMEND MITIGATION STRATEGIES
    • Nearly every pen test will discover multiple vulnerabilities.
    • A pen test report should contain recommendations to mitigate each vulnerability
    • Solutions vary, depending on the vulnerability
    MITIGATION STRATEGY CATEGORIES
    • People - behavior changes
      • Social engineering
      • Passwords
    • Process - how things are done
      • Backup media handling
      • ID management
    • Technology
      • Controls based on hardware and/or software
    COMMON FINDINGS
    • Shared local administrator credentials
      • Randomize credentials/LAPS
    • Weak password complexity
      • Minimum password requirements/password filters
    • Plain text passwords
      • Encrypt the passwords
    • No multifactor authentication
      • Implement multifactor authentication
    • SQL injection
      • Sanitize user input/parameterize queries
    • Unnecessary open services
      • Disable or remove unneeded services(system hardening)
    QUICK REVIEW
    • Recommend mitigation activities for each identified vulnerability
    • Suggest different classes of mitigations(technical, administrative, etc.)
    • Know common findings and mitigations for the PenTest.
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    java字符串实现正序和倒序输出
    暑假前挑战赛1—— A,B题解
    深搜
    poj 1200 Crazy Search
    poj 1840 Eqs (hash)
    Choose the best route
    一个人的旅行
    畅通工程续
    最短路基础算法
    完全背包问题
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/14152185.html
Copyright © 2011-2022 走看看