Device Vulnerabilities facts
Unauthorized SSH connection
securing a switch
vocab
100

 should be changed immediately when hardware or software is turned on

Default account and passwords 

100

how do you find your target 

 a ping sweep

100

how do you access the switch

type in its ip address 

100

a term for entering a system through other ways 

Backdoor 

200

Can be used to remotely control the device at a later date

Backdoors 

200

what is the main way used to get into the account 

brute force the password and username 

200

how can u tell if a switch is secure or not 

if it still has the default username and password 

200

A software vulnerability that is unknown to the vendor that can be exploited by attackers.

Zero day vulnerability 

300

 are blank, too short, dictionary words, or simple.

Weak passwords

300

SSH is configured on what Port Number, by default?

SSH is configured on port 22, by default.

300

what do you do immediately after creating a brand new cisco 

change username and password 

300

A software bug or design flaw in an application that allows an attacker to gain access to system resources or additional privileges that aren't typically available.

Privilege escalation 

500

allows a user to take advantage of a software bug or design flaw in an application to gain access to system resources

Privilege escalation

500

Is it possible to login to SSH server without password? How

Yes! It is possible to login to a remote SSH server without entering password. We need to use ssh-keygen technology to create public and private keys.

500

what is the final step in securing a switch

save the changes to a start up configuration

500

A repository of vulnerabilities hosted by MITRE corporation  (full name)

Common Vulnerabilities and Exposures 

M
e
n
u