Once an intrusion is successful this is how hackers spread their control

Study: Trustwave 2012 Global Security Report
Date: February 9 2012

After achieving an initial point of compromise, commonly referred to as a 'foothold' or a 'beachhead,' attackers work to identify additional targets on the compromised network, and propagate the intrusion. In 2011 the top three methods of propagation were:
  • 80%
  • Use of weak administrative credentials
  • 15%
  • Default hidden administrative shares
  • 5%
  • Remote access solution credential caching




    <-- Back to Authentication Statistic Index





    [Home] [About Us] [News] [Research]

    Copyright © 2017 PasswordResearch.com