Overview of the Methodology To perform a useful SHA, the different types of hackers must be identified and understood. The stereotype of a hacker as a brilliant computer science graduate sitting in a laboratory in a remote part of the world is a dangerous misconception. Although such hackers exist, the majority of security breaches are performed by staff members of the breached organization. Hackers can be categorized into four types:
The objective of the SHA is to use any conceivable method to compromise system security. Each of the four hacker types must be considered to assess fully all potential security exposures. POPULAR HACKER TECHNIQUES The following sections describe the techniques most commonly used by hackers to gain access to various corporate systems. Each section discusses a hacker technique and proposes basic controls that can be implemented to help mitigate these risks. The network administrator should attempt each of these techniques and should tailor the procedures to suit the organizations specific environment. Accessing the Log-In Prompt One method of gaining illegal access to a computer system is through the log-in prompt. This situation may occur when the hacker is physically within the facility or is attempting to access the system through a dial-in connection. Physical Access An important step in securing corporate information systems is to ensure that physical access to computer resources is adequately restricted. Any internal or external person who gains physical access to a terminal is given the opportunity to attempt to sign on at the log-in prompt. To reduce the potential for unauthorized system access by way of a terminal within the organizations facility, the network administrator should ensure that:
Dial-in Access Another method of accessing the log-in prompt is to dial in to the host. Many daemon dialers are readily available on the Internet. These programs, when given a range of numbers to dial, can identify valid modem numbers. Once a hacker discovers an organizations modem number, he or she can dial in and, in most cases, immediately gain access to the log-in prompt. To minimize the potential for security violations by way of dial-in network access, the network administrator should ensure that:
Obtaining Passwords Once the hacker has gained access to an organizations log-in prompt, he or she can attempt to sign on to the system. This procedure requires a valid user ID and password combination. Brute Force Attacks Brute force attacks involve manual or automated attempts to guess valid passwords. A simple password guessing program can be written in approximately 60 lines of C code or 40 lines of PERL. Many password guessing programs are available on the Internet. Most hackers have a password hit list, which is a collection of default passwords automatically assigned to various system accounts whenever they are installed. For example, the default password for the guest account in most UNIX systems is guest. To protect the network from unauthorized access, the network administrator should ensure that:
|
We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.