How to Fix the RC4 Cipher Suites Supported Vulnerability

แชร์
ฝัง
  • เผยแพร่เมื่อ 24 ก.ย. 2024
  • RC4 is a stream cipher that is used to encrypt data. However, it has been found to be vulnerable to a number of attacks. In this video, I will show you two techniques to remediate the RC4 Cipher Suites supported vulnerability. The remediation takes less than five minutes, and will get those critical and high vulnerabilities off your network and your vulnerability scan results!
    Here's what you'll learn in this video:
    What is the RC4 cipher vulnerability?
    How can it be exploited by attackers?
    How to remediate the RC4 Cipher Suites supported vulnerability
    How to check if your network is vulnerable to RC4
    Watch this video now to learn how to protect your network from the RC4 cipher vulnerability!
    --
    Nessus Plugin Description:
    The remote host supports the use of RC4 in one or more cipher suites.
    The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.
    If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
    ---
    Links From Video:
    Nessus Plugin Page - www.tenable.co...
    IIS Crytpo - www.nartac.com...
    Manual Remediation - www.namecheap....
    ---
    Please Like and Subscribe by clicking here: / @nnadmin
    Follow me on Twitter: / nielsenntwking

ความคิดเห็น • 3

  • @rajdalvi1350
    @rajdalvi1350 7 หลายเดือนก่อน +1

    Saved time .

    • @NNAdmin
      @NNAdmin  7 หลายเดือนก่อน

      Good to hear, I need to put up a few more of these.

  • @gmhinderaker
    @gmhinderaker 11 หลายเดือนก่อน +1

    Pretty sure the next scan would not show up clean as you have Triple Des 168 still enabled (Sweet32 vuln.)