How Hacks Happen: and how to protect yourself by Wolfe Holly & Cracker Brad & Germanos Mark

How Hacks Happen: and how to protect yourself by Wolfe Holly & Cracker Brad & Germanos Mark

Author:Wolfe, Holly & Cracker, Brad & Germanos, Mark [Wolfe, Holly]
Language: eng
Format: epub
Published: 2020-11-27T16:00:00+00:00


What the target’s Windows logs report

Maybe you use Microsoft’s Remote Desktop feature to connect to your workstation at work from…anywhere. Remote Desktop has been in Windows for 20 years at no extra cost. The network administrator at my target reviews the workstation’s logs through Windows’ Event Viewer. This screenshot is from my research honeypot. [iv]

The unlucky soul who has to read these logs finds login attempts are international. My perusal shows login attempts from five IP addresses:

Assuming it is one hacker who either employed a botnet (a series of computers simultaneously tasked with a large task) or is running multiple VPN connections; he will eventually succeed. He is trying to login with user accounts Administrator , win and userid60307 . He will eventually succeed when:

Administrator , win or userid60307 use one of the simple passwords from page 17.

The hacker stumbles across the correct password in his wordlist.

Assuming Daphne Prancer uses this workstation, the hacker tries logging in as Daphne with the password 2018Prius .



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.