Tagged articles
11 articles
Page 1 of 1
Black & White Path
Black & White Path
May 12, 2026 · Information Security

From an External Weak Password to Full Internal Access: A School Network Penetration Walkthrough

The article details a step‑by‑step penetration test of an educational network, starting with a weak external credential on a virtual teaching lab, harvesting teacher IDs, exploiting default webvpn and SSLVPN logins, and ultimately reaching an internal WebLogic server, highlighting the danger of weak passwords in schools.

SSLVPNWebLogiceducation network
0 likes · 3 min read
From an External Weak Password to Full Internal Access: A School Network Penetration Walkthrough
Black & White Path
Black & White Path
Apr 21, 2026 · Information Security

A Full-Scale Penetration Test Walkthrough: From MSSQL Weak Passwords to Nacos N‑Day Exploits

This article documents a complete penetration test on a newly deployed environment, detailing how weak credentials, unauthenticated services, and misconfigurations in MSSQL, Nacos, Oracle, Telnet, OA, NC, Redis, Spring, and frontend assets were systematically discovered and exploited, with step‑by‑step screenshots illustrating each compromise.

MSSQLNacosOracle
0 likes · 6 min read
A Full-Scale Penetration Test Walkthrough: From MSSQL Weak Passwords to Nacos N‑Day Exploits
MaGe Linux Operations
MaGe Linux Operations
Dec 13, 2024 · Information Security

Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms

This guide explains how to use nmap scripts to discover SNMP weak passwords, demonstrates various exploitation commands, and provides step‑by‑step hardening procedures for Windows, Linux, AIX, Solaris, and Cisco devices, including community string changes, whitelist configuration, and service management.

SNMPnetwork securitynmap
0 likes · 6 min read
Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms
21CTO
21CTO
Feb 17, 2021 · Information Security

Why "123456" Still Tops the Worst Password List and How to Protect Yourself

The 2020 NordPass survey reveals that simple numeric passwords like "123456" remain the most common weak passwords, highlighting new risky entries and offering practical advice for creating stronger, more secure credentials.

NordPass surveybest practicesinformation security
0 likes · 4 min read
Why "123456" Still Tops the Worst Password List and How to Protect Yourself
Efficient Ops
Efficient Ops
Mar 23, 2017 · Information Security

Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks

The article examines common security risks such as weak passwords, GitHub credential leaks, and misconfigurations in DevOps pipelines, illustrating how attackers exploit these flaws and offering practical mitigation strategies like access control, least‑privilege policies, robust password rules, and vulnerability tracking.

Password policygit securityinformation security
0 likes · 10 min read
Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks
Efficient Ops
Efficient Ops
May 30, 2016 · Information Security

Why Weak Passwords and Unpatched Redis Threaten Operational Security

The article explains how weak passwords, misconfigured services like Redis, careless port changes, and leaked data enable attackers to compromise servers and internal networks, illustrating each risk with real‑world case studies and offering practical mitigation advice for robust ops security.

Redis vulnerabilitydata breachincident response
0 likes · 11 min read
Why Weak Passwords and Unpatched Redis Threaten Operational Security