migtissera
commited on
Commit
•
ca202bf
1
Parent(s):
b2e9b5a
Update README.md
Browse files
README.md
CHANGED
@@ -32,7 +32,7 @@ You agree not to use the Model or Derivatives of the Model:
|
|
32 |
```
|
33 |
|
34 |
# Topics Covered:
|
35 |
-
|
36 |
- Open Ports: Identifying open ports is crucial as they can be entry points for attackers. Common ports to check include HTTP (80, 443), FTP (21), SSH (22), and SMB (445).
|
37 |
- Outdated Software or Services: Systems running outdated software or services are often vulnerable to exploits. This includes web servers, database servers, and any third-party software.
|
38 |
- Default Credentials: Many systems and services are installed with default usernames and passwords, which are well-known and can be easily exploited.
|
@@ -48,7 +48,7 @@ You agree not to use the Model or Derivatives of the Model:
|
|
48 |
- API Vulnerabilities: In modern web applications, APIs are often used and can have vulnerabilities like insecure endpoints or data leakage.
|
49 |
- Denial of Service (DoS) Vulnerabilities: Identifying services that are vulnerable to DoS attacks, which can make the resource unavailable to legitimate users.
|
50 |
- Buffer Overflows: Common in older software, these vulnerabilities can allow an attacker to crash the system or execute arbitrary code.
|
51 |
-
|
52 |
|
53 |
# WhiteRabbitNeo
|
54 |
|
|
|
32 |
```
|
33 |
|
34 |
# Topics Covered:
|
35 |
+
```
|
36 |
- Open Ports: Identifying open ports is crucial as they can be entry points for attackers. Common ports to check include HTTP (80, 443), FTP (21), SSH (22), and SMB (445).
|
37 |
- Outdated Software or Services: Systems running outdated software or services are often vulnerable to exploits. This includes web servers, database servers, and any third-party software.
|
38 |
- Default Credentials: Many systems and services are installed with default usernames and passwords, which are well-known and can be easily exploited.
|
|
|
48 |
- API Vulnerabilities: In modern web applications, APIs are often used and can have vulnerabilities like insecure endpoints or data leakage.
|
49 |
- Denial of Service (DoS) Vulnerabilities: Identifying services that are vulnerable to DoS attacks, which can make the resource unavailable to legitimate users.
|
50 |
- Buffer Overflows: Common in older software, these vulnerabilities can allow an attacker to crash the system or execute arbitrary code.
|
51 |
+
```
|
52 |
|
53 |
# WhiteRabbitNeo
|
54 |
|