Imagine an attack that is effective at 99% of organizations throughout the world. Now imagine that attack will yield you credentials and information that could allow you to completely take over and/or shut down an organization. Now imagine there are no solid defenses for such an attack and it goes largely unnoticed. Sounds like something off the fiction shelves, but it’s not. By leveraging one or multiple Man in the Middle attacks, a malicious person could very easily gain the “keys of the kingdom” in almost all organizations worldwide. With that power they can steal vital information, spread malware and even shut down the entire network of an organization.
Eric Milam
Eric Milam is a senior security consultant with Accuvant LABS’s Enterprise
Security practice and has over 14 years of experience in information technology.
Eric performs ongoing enterprise security assessments, perimeter penetration
testing, and application vulnerability assessments.
Eric has performed innumerable consultative engagements including enterprise
security and risk assessments, perimeter penetration testing, vulnerability
assessments, social engineering, physical security testing and has extensive
experience in PCI compliance controls and assessments.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek