[prev in list] [next in list] [prev in thread] [next in thread] 

List:       isn
Subject:    [ISN] 5 Protocols That Should Be Closely Watched
From:       InfoSec News <alerts () infosecnews ! org>
Date:       2013-12-18 9:48:20
Message-ID: alpine.DEB.2.02.1312180948060.19080 () infosecnews ! org
[Download RAW message or body]

http://www.darkreading.com/monitoring/5-protocols-that-should-be-closely-watch/240164357

By Robert Lemos
Dark Reading
November 30, 2013

For decades, opportunistic attackers have scanned the Internet for open 
ports through which they can compromise vulnerable applications.

Such scanning has only gotten easier: The Shodan search engine regularly 
scans the Internet and stores the results for anyone to search; 
researchers from the University of Michigan have refined techniques to 
allow for fast, comprehensive scans of a single port across the Internet; 
and programs, such as NMap, allow anyone to scan for open, and potentially 
vulnerable, ports.

While the most commonly attacked ports are those used by Secure Shell 
(SSH), the file transfer protocol (FTP), the remote desktop protocol 
(RDP), and Web servers (HTTP), companies need to monitor network activity 
aimed at less common protocols and ports, say security experts. Attackers 
will likely increasingly look for vulnerabilities in less common ports, 
says HD Moore, chief research officer for vulnerability-management firm 
Rapid7, which has made a name for itself scanning the Internet for just 
those ports.

"This stuff is not in the top bucket, in terms of priority, but it tends 
to bite people because they are not keeping an eye on it," he says.

[...]



--
Find the best InfoSec talent without breaking your
IT recruiting budget! Save 50 percent off our normal
rate by using the discount code - XMAS2013
Hot InfoSec Jobs - http://www.hotinfosecjobs.com/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic