TCOM Information Assurance Management Software Hacking
TCOM Software Hacking Remote Control Software –Essential for a globally connected economy. –Support personnel rarely on site. –Indispensable for administrators… – misconfigured and filled with security weaknesses.
TCOM Software Hacking Weaknesses –Cleartext user names and passwords –Weak passwords –Revealed passwords pulled from the GUI (remote or locally) –Uploading profiles
TCOM Software Hacking Countermeasures –Enable passwords –Enforce strong passwords –Force alternate authentication –Password protect profile and setup files –Logoff user with call completion
TCOM Software Hacking Countermeasures –Encrypt session traffic –Limit login attempts –Log failed attempts –Lockout failed users
TCOM Web Hacking HTML source page Low hanging fruit… Common, well publicized vulnerabilities