Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Podcast - Episode 27

Welcome to the Tenable Network Security Podcast - Episode 27

Announcements

Stories

  • Password Lists - Can't Get Enough - While this blog focuses on comparing some larger password lists, mostly taken from leaked accounts as a result of data breaches, its a good resource. The author links to several different passwords lists, including one called "The 500 worst passwords" (Warning: This list contains some foul language).
  • Client Side Web Application Attacks - Malware authors continue to show their creative side with these attacks. The malware manipulates web pages and inserts extra fields, such as password or account numbers, into web page transactions.
  • DNS Tunneling - 3 Part Series - DNS tunneling is one of those techniques that has evolved greatly over time. The initial theory was presented some time ago, and tools have been created and improved on over the years. It is now a viable option to send traffic out of a network. The DNS tunneling technique has even been packaged as an exploit payload as demonstrated by Ron Bowes.
  • Finding Malware on your network via cached DNS entries - Excellent article that demonstrates use of a Perl script to find "evil" cached DNS entries. Basically, it takes a list of known malware domains, then queries your DNS servers to resolve them. If the entry comes back as cached, then someone else has already queried for that domain and you have a host that is infected.
  • WMI Enabled Plugins Enumerate Anti-Virus, Anti-Spyware, and Firewalls - Tenable has released three new plugins that use WMI to enumerate software and firewall configurations on remote hosts:

Download Tenable Podcast Episode 27

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.