It is not uncommon for domain administrators and in general, the IT department of businesses not to know where privileged accounts are being utilised. I couldn’t tell you how often I’ve reported a load of compromised accounts for the client…
Understanding SSH Keys and configuring a system to utilise them for remote access authorisation.
So I’ve been into the bank a few times this week and have noticed they are still running XP on their workstations. The ‘SecuriTeam‘ guys have put together a tally of most critical vulnerabilities associated with Microsoft Windows XP, it…