The digi­tal infra­struc­tu­re — the IT net­work — is the basis for dai­ly work in com­pa­nies and enter­tain­ment at home. As long as ever­y­thing works, not­hing is usual­ly questioned.

But when pro­blems occur, it is long too late. Despi­te seve­ral deca­des of deve­lo­p­ment in sys­tem admi­nis­tra­ti­on and infor­ma­ti­on secu­ri­ty, secu­ri­ty tests still find weak points that are often overlooked.

Whe­re do you start when an anten­na or cable threa­tens your network?

Most offices have mul­ti­ple doors and walls. Grown or tra­di­tio­nal­ly plan­ned net­works each have only one door and one wall. Often, near­ly all devices are con­nec­ted for no reason. In recent months, web­cams, ref­ri­ge­ra­tors, cof­fee makers and other modern-day con­ve­ni­en­ces have been making the head­lines becau­se they could be used as step­ping stones for serious attacks. That’s not all: net­works don’t always behave the same way!

Cli­ents on net­works are con­stant­ly chan­ging their capa­bi­li­ties. As a result, you sud­den­ly find the new IPv6 pro­to­col (alre­a­dy stan­dar­di­zed and rea­dy for deploy­ment in 1998), even though the net­work was never desi­gned for it. The search in an IPv6 net­work is par­ti­cu­lar­ly com­plex, whe­re even the iden­ti­fi­ca­ti­on of IP devices in a small IPv6 seg­ment can take seve­ral days and weeks.

Espe­ci­al­ly the ope­ra­ting sys­tem of infra­struc­tu­re devices is usual­ly only updated if the devices do not work cor­rect­ly or new func­tions are requi­red. At the latest sin­ce the use of Chi­ne­se cheap web­cams — now an IoT — for tar­ge­ted DDoS attacks against an Aus­tri­an cor­po­ra­ti­on, among others, com­pa­nies need a bet­ter view of their own net­work­ed systems.

The­se are just a few examp­les of important con­fi­gu­ra­ti­ons that are never ques­tio­ned when ever­y­thing is working.

Pro­fes­sio­nal search for thre­ats and ent­ry gates

SEC4YOU’s experts have always found pro­to­cols, devices or appli­ca­ti­ons during secu­ri­ty tests that should not exist or should not be available to guests. Few admi­nis­tra­tors open the cable chan­nels and check the occu­p­ied ports. Even fewer net­work mana­gers exami­ne the packets trans­por­ted in the local net­work for con­tent, ori­gin and vul­nerabi­li­ties. It is pre­cis­e­ly the­se unche­cked points of attack that hackers or soft­ware such as ran­som­wa­re exploit to gain con­trol of devices and the network.

If you don’t have the time to per­form a pene­tra­ti­on test, we can help.
Link quo­te, request and pri­ce: Pro­fes­sio­nal SEC4YOU Pene­tra­ti­on Tests

Aut­hor: René Pfeif­fer for SEC4YOU