Reverse Intent the name given to a common hacker technique of flip-flopping a piece of security knowledge to identify a potential weakness. For example, identifying the version of Bind running on a DNS server is used to identify common exploits of that version of software.
It is also the development and adoption of Information Systems Security policies, which by their wording; unintentionally and inadvertently reveal system vulnerabilities and capabilities that can be exploited by attackers. For example: a policy, which states: “System administrators shall not leave modems attached to the server in ‘auto answer’ or ‘auto response’ condition after normal working hours, during weekends and holidays” indicates they are setup that way during normal business hours. Hackers can use the reverse intent to try and compromise the network.
If you own a business, you need to be doing these basic things to protect your sensitive information:
Most of these recommendations are built into CyberHoot. With CyberHoot you can govern, train, assess, and test your employees. Visit CyberHoot.com and sign up for our services today. At the very least continue to learn by enrolling in our monthly Cybersecurity newsletters to stay on top of current cybersecurity updates.
Related Terms: Reverse Engineering
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....
Read more
Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...
Read more
If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
