Skip to the content

Whitepaper 

12 Common Vulnerabilities Found During Penetration Testing Report

Read 12 Common Vulnerabilities
Found During Penetration Testing to:

 

  • Help you make a business case for penetration testing.
  • Learn more about the sorts of vulnerabilities that you might unknowingly be allowing on your network.
  • Prepare your team for the sorts of results your penetration tester might uncover.

Part 1 of the report covers the most common administrative security vulnerabilities: unpatched internal systems, legacy systems, use of default credentials, inappropriate privileges, phishing, weak password policy, unlocked workstations and poor physical security.

Part 2 covers more in-depth technical vulnerabilities: null session SMB, turned off SMB signing and LLMNR poisoning/relaying, SQL injection and cross-site scripting (XSS).

Download Report 

Useful Resources

Data Sheet

Cybersecurity Pen Testing

Webinar

Securing Remote Workers

Guide

Remote Access Penetration Tests