Тёмный

How to Fix the RC4 Cipher Suites Supported Vulnerability 

Nielsen Networking
Подписаться 30 тыс.
Просмотров 1,7 тыс.
50% 1

RC4 is a stream cipher that is used to encrypt data. However, it has been found to be vulnerable to a number of attacks. In this video, I will show you two techniques to remediate the RC4 Cipher Suites supported vulnerability. The remediation takes less than five minutes, and will get those critical and high vulnerabilities off your network and your vulnerability scan results!
Here's what you'll learn in this video:
What is the RC4 cipher vulnerability?
How can it be exploited by attackers?
How to remediate the RC4 Cipher Suites supported vulnerability
How to check if your network is vulnerable to RC4
Watch this video now to learn how to protect your network from the RC4 cipher vulnerability!
--
Nessus Plugin Description:
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
---
Links From Video:
Nessus Plugin Page - www.tenable.com/plugins/nessu...
IIS Crytpo - www.nartac.com/Products/IISCr...
Manual Remediation - www.namecheap.com/support/kno...
---
Please Like and Subscribe by clicking here: / @nnadmin
Follow me on Twitter: / nielsenntwking

Наука

Опубликовано:

 

18 май 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 3   
@rajdalvi1350
@rajdalvi1350 5 месяцев назад
Saved time .
@NNAdmin
@NNAdmin 5 месяцев назад
Good to hear, I need to put up a few more of these.
@gmhinderaker
@gmhinderaker 9 месяцев назад
Pretty sure the next scan would not show up clean as you have Triple Des 168 still enabled (Sweet32 vuln.)
Далее
The Top 10 Linux Command Line Tools You Need to Know
29:43
Elden Ring DLC - ПОДОЖГЛО ПОПУ!
07:26
Просмотров 459 тыс.
Penetration Testing with Nmap: A Comprehensive Tutorial
38:10
What Is a Prompt Injection Attack?
10:57
Просмотров 145 тыс.
AES: How to Design Secure Encryption
15:37
Просмотров 153 тыс.
How Hackers Hack CCTV Cameras
15:00
Просмотров 757 тыс.
Nmap | Seven Must Know Techniques in Seven Minutes
7:17
Собираем комп за 500 000 рублей!
6:44:35