Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Several pits in the security of enterprise intranet

2025-01-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

For the boss of the enterprise or the technical personnel of the information department, anti-virus software, firewall, IDS, and IPS may be the most familiar means of security protection. Today, by the way, we will talk about those pits in an enterprise that has established an in-depth defense system with security protection equipment such as anti-virus software, firewall, IDS, IPS, Internet behavior management system, and so on.

1. Ubiquitous applications such as passwords and default passwords

For a more mature enterprise, there are generally OA, ERP, ITMS, sales support system, office resource request system and so on, at least five or six, more than a dozen application systems. Due to the large number of systems and low frequency of use, it is impossible to enable password complexity detection, which causes many employees to use weak passwords such as 1,123,123456, which brings great security risks to enterprises.

(* Detection methods and tools: 1. Nmap scans the server segment to find out relevant intranet applications 2, collect employee usernames (usually employee work numbers or domain accounts can be collected through cain) 3, make weak password dictionary 4, scan with burpsuite)

Second, the disclosure of domain account password caused by other systems synchronizing domain account

For an intranet that has established domain control, in order to establish the organizational structure and authentication system conveniently and quickly, many systems synchronize the domain account system or call the domain control interface, and most of the intranet system login process is plaintext transmission, so the account password can be easily sniffed, and the leakage of a domain account can often lead to a series of security problems.

(case encountered: I am deeply convinced of the online behavior management system, and the online authentication uses domain account authentication, so when I arrive at the company with a cain early before going to work in the morning, I can wait for the account password to appear when other users authenticate online.)

Weak passwords for network equipment, middleware, database, FTP, etc.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report