Source |
CSO |
Identifiant |
1358711 |
Date de publication |
2019-09-24 07:39:00 (vue: 2019-09-24 19:00:05) |
Titre |
BrandPost: How Telnet Works and Why It\'s a Problem |
Texte |
Your attack surface is made up of every single asset your organization owns that's connected to the Internet. That doesn't just mean hardware and software - it also means IP addresses, domains, and certificates. All of these assets need to be managed just like any other, and exposing them can put your organization at risk.At Expanse, we index the entire global Internet to identify organizations' Internet-connected assets and services and to identify exposures. In the course of this, we frequently find organizations running protocols that are outdated and that never should have been open to the Internet in the first place.One example of this is Telnet, an unencrypted remote access protocol. It's sort of like a screen share (or a remote desktop protocol), but without the desktop interface, using terminal commands instead. It allows you to send text to and from a report server. |
Envoyé |
Oui |
Condensat |
access addresses all allows also any are article asset assets attack been brandpost: but can certificates click commands connected course desktop doesn domains entire every example expanse exposing exposures find first frequently from full global hardware have here how identify index instead interface internet just like made managed mean means need never one open organization organizations other outdated owns place please problem protocol protocols put read remote report risk running screen send server services share should single software sort surface telnet terminal text that them these unencrypted using why without works your |
Tags |
|
Stories |
|
Notes |
|
Move |
|