The document outlines a security test performed on the terminal server of the xpunlimited.lt company, detailing break-in attacks, network vulnerabilities, and recommended security controls. It describes specific exploitation methods, including a man-in-the-middle attack and denial of service tactics, while identifying potential threats from human negligence and outdated systems. Control recommendations emphasize the importance of system updates, proper security configurations, and anti-virus implementation to mitigate risks and protect sensitive data.
Related topics: