+

A Hole in Your Access Control!

June 2, 2011


Articles Redaction Comments Off

A couple of days ago I was called out to a do a security audit on a company’s internal network security and its access control. The audit was asked to be done on a specific day that the company chose.The reason behind that was to ensure I get no interference from their Network/System Administrator. I will not go through the audit process itself but will show and prove to you how even a well-secured network could be brought (hacked) down by a single mistake, and why implementing access controls then auditing them is an important factor to ensure their effectiveness.

by Ali Al-Shemery

Insecure Acces Control [Teaser]Insecure Acces Control [Teaser] – Hakin9 Teasers 6/2011
Insecure Acces Control [Teaser]

Follow the steps below to download the magazine:
  1. Register, accept the Disclaimer and choose subscription option.
    Attention!
    By choosing the Free Account option you will only be able to download the teaser of each issue.
  2. Verify your account using the verification link sent to your email address.
  3. Check the password sent on your email address and use it to log in.
  4. Click the download button to get the issue.


IMPORTANT: the registration on the website includes subscription to our newsletter.

RESTRICTED AREA – FOR SUBSRCIBERS ONLY


 Comments

Tagged with:


IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa