[Research] Under the Hoodie, 2019 Edition: Lessons Learned from 180 Penetration Tests

[Research] Under the Hoodie, 2019 Edition: Lessons Learned from 180 Penetration Tests

It's Summer 2019! (whoops, did I just dox your password?), which means it’s time for another edition of our wildly fun and informative survey of the art and esoterica of penetration testing, Under the Hoodie. This report covers the measurable results of about 180 penetration tests conducted by Rapid7’s crack penetration testing team, then analyzed and examined by Data Scientist Kwan Lin and me, Research Director Tod Beardsley.



Read the full Under the Hoodie Report today


Get Started

Not only is this a fun report to read, but it was fun to write, too. For example, I learned that about 50% of the time we’re on an internal engagement, we uncover at least one target Windows machine that’s vulnerable to the now-rather-ancient MS08-067 and the starting-to-get-old MS17-010.


The good news here is that MS08-067 is slowly but surely disappearing from corporate LANs around the world. The bad news—aside from this 50/50 shot at a total remote code execution exploit—is that the patches for MS17-010 are not only already two years old, but are also connected to THE most talked-about widespread exploitation the world has ever seen, WannaCry.



Are you vulnerable to these common vulnerabilities? Scan your environment today with InsightVM.


Scan Now

Of cou ..

Support the originator by clicking the read the rest link below.