Blog Posts Tagged with "Root Accounts"

69dafe8b58066478aea48f3d0f384820

Symantec's Analysis of the ZTE Android Backdoor Vulnerability

May 24, 2012 Added by:Headlines

"The worst-case scenario here is an attacker who tricks the user into installing a malicious application that takes advantage of this privilege escalation flaw. Once the application has full access to the device, the attacker can install, delete, monitor, and modify the device..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Metasploitable: Gaining Root on a Vulnerable Linux System

May 22, 2012 Added by:Dan Dieterle

Metasploitable is a great platform to practice and develop your penetration testing skills. In this tutorial, I will show you how to scan the system, find one of the vulnerable services, and then exploit the service to gain root access...

Comments  (1)

E973b16363b3de77b360563237df7e32

Where Are Your Default Admin Passwords?

June 24, 2011 Added by:Bozidar Spirovski

The passwords should be constructed in two parts, each part entered by different person, which increases the complexity significantly and reduces the possibility of using social knowledge of a single person to attack the password. Also, no one single person knows the password...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Tips for Taking Charge of a SysAdmin Team

January 16, 2011 Added by:Jamie Adams

When I enter the organization, I don't immediately request access to the systems but rather I begin going over architectural diagrams, operational procedures, and peering over the shoulders of the system administrators. If the aforementioned documents are not present, then we have a problem...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

Root Accounts - The Root of All Evil?

September 30, 2010 Added by:Jamie Adams

Too often administrators jump to the root level to perform routine tasks — this is when mistakes occur. The administrator is in a hurry and enters one wrong space, is in the wrong directory, or types an incorrect parameter - all can result in evil things when the ENTER key is pressed...

Comments  (15)