Skip to the content


12 Common Vulnerabilities Found During Penetration Testing


In this ebook, we aim to assist you in making a business case for penetration testing and educate you about the types of vulnerabilities that may unknowingly be present on your network. Furthermore, we provide guidance on how to prepare your team for the results your penetration tester may uncover.

The report is divided into two parts. Part 1 covers the most common administrative security vulnerabilities such as unpatched internal systems, legacy systems, use of default credentials, inappropriate privileges, phishing, weak password policy, unlocked workstations, and poor physical security.

In Part 2, we delve deeper into technical vulnerabilities such as null session SMB, turned off SMB signing and LLMNR poisoning/relaying, SQL injection, and cross-site scripting (XSS).

Download eBook 

Free Security Consultation 

Recommended Content

Protect Against Phishing With Engagement and Training

Protect Against Phishing With Engagement and Training

Adam Gleeson, Cyber Security Vendor Alliance Manager, discusses the threat businesses face from phishing and offers advice on how engagement & training can help protect against this threat.

Video: Old Tricks vs New Victims

Video: Old Tricks vs New Victims


Join this panel discussion during which the leaders in the cyber security industry will talk about how to protect your data, systems and people, within your budget.