First page Back Continue Last page Graphics
Directory Enumeration
Vulnerabilities:
- Protocols provide unauthenticated functionality
- Protocols respond differently to valid vs. invalid usernames
- Protocols are unencrypted on the wire
Attack:
- Active: Send specially crafted protocol messages which elicit a telling response from the server
- Passive: Watch network traffic for device registration messages
Effect:
- Valid usernames are disclosed and may be used in a more targeted attack such as pass-phrase cracking.