I published the following diary on isc.sans.org: “SNMP Pwn3ge“.
Sometimes getting access to company assets is very complicated. Sometimes it is much easier (read: too easy) than expected. If one of the goals of a pentester is to get juicy information about the target, preventing the IT infrastructure to run efficiently (deny of service) is also a “winâ€. Indeed, in some business fields, if the infrastructure is not running, the business is impacted and the company may lose a lot of money. Think about traders… [Read more]
RT @xme: [/dev/random] [SANS ISC Diary] SNMP Pwn3ge https://t.co/vfs3HG5mQx
RT @xme: [/dev/random] [SANS ISC Diary] SNMP Pwn3ge https://t.co/vfs3HG5mQx
RT @xme: [/dev/random] [SANS ISC Diary] SNMP Pwn3ge https://t.co/vfs3HG5mQx
RT @xme: [/dev/random] [SANS ISC Diary] SNMP Pwn3ge https://t.co/vfs3HG5mQx