Главная
Study mode:
on
1
Introduction
2
About me
3
Projects
4
Agenda
5
How many people have ever made a web app
6
Two ways to store data
7
What should you use
8
The problem
9
Sensitive data is exposed
10
What kind of data is exposed
11
Shoten and Binary Edge
12
Exposed Data
13
Memcache
14
Redis
15
Demo
16
Sensitive Information
17
SemiSensitive Information
18
Free Space
19
Cloud Storage
20
Systems
21
Systems Available
22
Elastic Search Vulnerability
23
Elastic Honey
24
Fake Ransomware
25
Memcached Vulnerability
26
The Landscape
27
Default Configurations
28
Things are getting better
29
Protected mode
30
Security hygiene
31
Resources
Description:
Explore the results of comprehensive IPv4 scans revealing the extent of exposed data and vulnerabilities in popular databases and key value stores. Delve into the security risks associated with Redis, MongoDB, Elasticsearch, Memcached, Cassandra, and more. Discover the types of sensitive information accessible due to insecure configurations, from data theft to remote code execution. Examine real-world examples of exposed data, including cloud storage systems and fake ransomware. Learn about the evolving landscape of database security, default configurations, and improvements in protected modes. Gain insights into best practices for security hygiene and access valuable resources to enhance your understanding of database vulnerabilities and protection measures.

Scanning IPv4 for Exposed Data and Vulnerable Databases

LASCON
Add to list
0:00 / 0:00