NTP enumeration¶
An attacker can enumerate the following information by querying an NTP server.
List of hosts connected to the NTP server
Internal client IP addresses, hostnames and operating system used
Tools¶
Remediation¶
Restrict the usage of NTP and enable the use of NTPSec, where possible.
Filter the traffic with IPTables.
Enable logging for the messages and events.
Last update:
2025-05-12 14:16