Hacker Secrets Revealed White Paper


Hacker Secrets Revealed

5 Lessons learned from security assessments

Every year, Motorola Solutions conducts hundreds of cybersecurity assessments, including penetration testing, for a wide range of commercial and public sector clients. Many of these organizations share similar weaknesses in their people, processes and technology. But each assessment also presents new technical challenges for us to solve.

As we share our top five technical findings and lessons learned from external assessments, we’ll reveal weaknesses our testers exploited and offer vendor-neutral solutions for resolving each of these issues. Topics discussed include:

  • Phishing
  • Kerberoasting
  • Administrative passwords on file shares
  • Misconfigured local administrative privileges

Download White Paper

Please complete the form below to receive an instant download of the white paper

AUTOFILL WITH LINKEDIN

Hacker Secrets Revealed White Paper

5 Lessons learned from security assessments

Every year, Motorola Solutions conducts hundreds of cybersecurity assessments, including penetration testing, for a wide range of commercial and public sector clients. Many of these organizations share similar weaknesses in their people, processes and technology. But each assessment also presents new technical challenges for us to solve.

In this white paper, we discuss our findings from external pen tests against enterprise clients, identity access management controls, restricted administrative privileges and spam filtering. We’ll also reveal weaknesses our testers exploited and offer vendor-neutral solutions for resolving each of these issues. Topics discussed include:

  • Phishing
  • Kerberoasting
  • Administrative passwords on file shares
  • Misconfigured local administrative privileges