• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Unusual HTTP Plaintext Password

Risk Factors

Web-based applications and servers are often misconfigured to send and receive traffic over HTTP instead of HTTPS. Servers that accept plaintext passwords over HTTP increase the risk of exposing credentials to attackers that capture traffic through network sniffing. Clients that send plaintext passwords over HTTP with Basic authentication (RFC 7617) increase the risk of exposing their credentials to malicious websites. Harden your network environment by enabling the TLS protocol on servers.

The system might change the risk score for this detection.

Kill Chain

Caution

Risk Score

60

Detection diagram
Next in Caution: Unusual LDAP Plaintext Authentication

Attack Background

N/A

Mitigation Options

Establish a security policy that directs users to refrain from connecting to websites over HTTP, especially when submitting credentials to a website
Audit web server configurations to confirm that TLS and HTTP Strict Transport Security (HSTS) are enabled and configured correctly

What else can RevealX do for you?