Perform Network Penetration Testing for
976

Posted: 4 years ago In IT & Programming » Other
48  

0 Sold
0 Feedback
0.0
will deliver in
15 days
Be the first! Buy Now »

What you will get

Very
experienced developer / software engineer with 30+ years of
experience. Confidentiality guaranteed.



I
perform: 

Network
testing.
White
hat penetration testing.

Network
exploitation testing.


Social
engineering tests.
Information
gathering.
DNS
Analysis.
IDS
/ IPS identification.
Network
assessment.
Database
exploitation tests.
Netwrk
spoofing.
Network
stress
testing.

VoIP
stress
testing.

Web
stress
testing.





Lab
or Test Accounts:
 How many lab
or test accounts exist in your environment? How many of these
accounts are in the local Administrators group? Care to guess what
the password for such accounts might be? It could be test, or, on
systems with no password policy enforcement, it could even be NULL.
To make matters worse, these accounts— even admin accounts—can
set passwords that never expire. It is not uncommon to find systems
with passwords set months or even years ago—even brute-forcing can
be valuable for cracking stronger passwords within such an
environment.






User
Accounts with Juicy Info in the Comment Field:
 I've actually seen passwords written in the Comment field in plaintext,
ripe for the plucking via enumeration. Sometimes hints to the
password can be found in the Comment field to aid those hapless users
who just can’t seem to remember their own passwords.






Administrators
or Domain Admins Groups:
 These accounts are often targeted
because of their all-encompassing power over local systems or
domains. Also, the local Administrator account cannot be locked out
using default tools from Microsoft, and they make ripe targets for
perpetual password guessing. The account has been renamed or disabled
on later versions of Microsoft Windows.






Local
administrator accounts:
 might also use the same password for
multiple systems, especially if the systems have been installed from
one (and the same) golden image. This gives the advantage to the
attacker who can use the same local account to compromise all the
accounts on the network.






Privileged
Backup Application Service Accounts:
 Many commercial backup
software applications create user accounts that are granted a high
degree of privilege on a system, or that at least can read almost all
of the files to provide a comprehensive backup of the system. 






Shared
Group Accounts:
 Organisations large and small have a
propensity to reuse account credentials that grant access to a high
percentage of the systems in a given environment. Account names such
as backup or admin are examples. 

What the Seller needs to start the work

Confidentiality agreement. Permission to test a network

About the Seller

Profile Picture of Rob M

Rob M

(0)
Contact

100% Secure

Job is done or money back
  • You pay only the listed price without any hidden costs.
  • We keep your money until you are happy with the delivered work.
  • The job will be done or your money will be returned.

Tags & Skills

Your Job Feed