Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
96 Vulnerability ManageMent
a password to “password” on a conventional host. Some scanners also
have the ability to cycle through the default community strings used
on a variety of devices. ey will also sometimes have the ability to try
other community strings specified by the user. You could consider this
approach a brute-force attack on the SNMP configuration.
Using a hierarchical structure known as a management informa-
tion base (MIB), information about the target is requested. All kinds
of information can be requested, some of it unique to a vendor. Many
installations have SNMP enabled by default, and therefore accept
requests and expose information. e more common community strings
are “public,” “private,” and “secret.” ere are also ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512