I published the following diary on isc.sans.org: “SNMP Pwn3ge“. Sometimes getting access to company assets is very complicated. Sometimes it is much easier (read: too easy) than expected. If one of the goals of a pentester is to get juicy information about the target, preventing the IT infrastructure to run
[The post [SANS ISC Diary] SNMP Pwn3ge has been first published on /dev/random]
from [SANS ISC Diary] SNMP Pwn3ge
No comments:
Post a Comment