To continue with the good performance of the year, we have carried out a second punctual monitoring campaign on the perimeter of our clients, this time on connection protocols.
This process is harmless to the client since it is carried out remotely and non-intrusively, using proprietary and/or third-party technology.
For this time, we wanted to carry out a campaign combining known vulnerabilities, such as insecure access, with our LEET benchmark. To do this, we have focused on the TCP ports that support the different protocols considered insecure:
FTP -port 21
Telnet - port 23
SMTPv1 and v2 - port 25
HTTP – port 80
POP3 - port 110
IMAP - port 143
The objective of this campaign is that all services, protocols and ports are secure, and in case of using it, have a record of the business justification. Additionally, additional security features will ...