Reverse Intent the name given to a common hacker technique of flip-flopping a piece of security knowledge to identify a potential weakness. For example, identifying the version of Bind running on a DNS server is used to identify common exploits of that version of software.
It is also the development and adoption of Information Systems Security policies, which by their wording; unintentionally and inadvertently reveal system vulnerabilities and capabilities that can be exploited by attackers. For example: a policy, which states: “System administrators shall not leave modems attached to the server in ‘auto answer’ or ‘auto response’ condition after normal working hours, during weekends and holidays” indicates they are setup that way during normal business hours. Hackers can use the reverse intent to try and compromise the network.
If you own a business, you need to be doing these basic things to protect your sensitive information:
Most of these recommendations are built into CyberHoot. With CyberHoot you can govern, train, assess, and test your employees. Visit CyberHoot.com and sign up for our services today. At the very least continue to learn by enrolling in our monthly Cybersecurity newsletters to stay on top of current cybersecurity updates.
Related Terms: Reverse Engineering
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Spoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...
Read moreAs smart homes get smarter, so do their habits of watching, sensing, and reporting. Enter WiFi Motion Detection, a...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.