The Hacker

Document Sample
The Hacker Powered By Docstoc
					12   I   into IT



 You can manage what you know about; it's what you don't
 know about that creeps up and stabs you. For the IT       The hacker
 manager, computer hacking is one such sword of            Technically, a "hacker" is someone who is
                                                           enthusiastic about computer
                                                           programming and all things computer
 Damocles for which sensible preventive                    related, and is motivated by curiosity to
                                                           reverse engineer software and to explore.
 and detective measures have become
 essential. And in common with other
 disasters in waiting, infiltration should
 feature in contingency planning.

 For the benefit of those readers
 unfamiliar with computer
 hacking, N. Nagarajan of the
 Office of the Comptroller
 and Auditor General of
 India gives an overview
 and explains some of
 the terms associated
 with it.




The basics of protecting against computer hacking
                                                                                                                         into IT   I   13




The term "cracker", on the other hand,
describes those who apply hacking skills
                                                 Computer hacking                                the area of fraud. However, other
                                                                                                 motives include espionage (both
to gain unauthorised access to a                 Hacking is in some ways the online              governmental and commercial
computer facility, often with sinister           equivalent to burglary; in other words          secrets) and the obtaining of
motives. But "cracking" never really             breaking into premises against the              personally sensitive information that
caught on, perhaps due to the grey               wishes of the lawful owner - in some            might be used for tracing people,
area that exists between the two                 jurisdictions a crime in itself - from          deception and blackmail;
activities and to the media's widespread         which other criminal acts such as theft     G   alteration or deletion of data
use of "hacking" as a term synonymous            and/or damage generally result.                 and code: most organisations now
with computer crime. I will not
                                                 Computer hacking refers to gaining              depend to some extent on comput-
therefore try to buck the trend in this
                                                 unauthorised access to, and hence some          erised information systems, and any
article.
                                                 measure of control over, a computer             act resulting in significant corruption
                                                 facility, and most countries now have           or deletion of corporate data could
                                                 specific legislation in place to deter          have serious implications on their
                                                 those who might wish to practice this           ability to transact business;
                                                 art and science. In some jurisdictions,     G   degradation or cessation of
                                                 unauthorised access alone constitutes a         service: acts that result in systems
                                                 criminal offence, even if the hacker            being unable to carry their
                                                 attempts nothing further. However, in           workload or that fail altogether,
                                                 practice, hackers generally have a              could also have serious business
                                                 particular target in mind, so their unau-       implications;
                                                 thorised access leads to further acts,
                                                 which national law might also define as     G   use of computer resources:
                                                 criminal activities. These can be               this impact is really inherent in the
                                                 summarised under the headings of                previous three, but it's worth
                                                 unauthorised:                                   mentioning separately because an
                                                                                                 emerging problem is the use by
                                                 G   obtaining of confidential                   hackers of other people's systems
                                                     information: perhaps the major              (extending to home PCs) to store
                                                     growth area in computer crime is            illegally obtained data or to mount
                                                     "identity theft", in other words the        attacks on other systems. There are
                                                     obtaining of personal information           documented cases of systems
                                                     that can then be used to commit             hacked in this way - sometimes
                                                     other serious offences, usually in          referred to as "zombies" because
                                                                                                 they are no longer in the full control
        The Ten Immutable Laws of Security                                                       of their unsuspecting owners -
                                                                                                 being used to store child
        1    If a bad guy can persuade you to run his program on your computer, it's             pornography and material that
             not your computer anymore.                                                          breaches copyright law (e.g.
        2    If a bad guy can alter the operating system on your computer, it's not your         copyrighted music files), to mount
             computer anymore.                                                                   distributed denial of service attacks
        3    If a bad guy has unrestricted physical access to your computer, it's not            on other systems, and to distribute
             your computer anymore.                                                              spam e-mail.
        4    If you allow a bad guy to upload programs to your web site, it's not your       Finally, it's worth emphasising that the
             web site any more.                                                              term "hacker" applies both to outsiders
        5    Weak passwords trump strong security.                                           and to otherwise authorised personnel
        6    A machine is only as secure as the administrator is trustworthy.
                                                                                             who misuse their system privileges, or
                                                                                             who impersonate higher privileged
        7    Encrypted data is only as secure as the decryption key.
                                                                                             users. This sad fact needs to be
        8    An out of date virus scanner is only marginally better than no virus            recognised when formulating corporate
             scanner at all.                                                                 security policy.
        9    Absolute anonymity isn't practical, in real life or on the web.
        10   Technology is not a panacea.
        Source - www.microsoft.com/technet
14   I   into IT




                                                                                                             dential waste can prove fruitful.
 Just another security update for Microsoft Internet Explorer                                                Perhaps the quickest and easiest way to
 Are You on a Network?                                                                                       gain physical access to an organisation's
                                                                                                             computer facilities is to join the
 If your computer is part of a managed network, contact your organization's system
                                                                                                             contract cleaning force, which often
 administrator before making changes to your computer.
                                                                                                             works unsupervised and outside normal
 Why We Are Issuing This Update
                                                                                                             office hours.
 A number of security issues have been identified in Microsoft® Internet Explorer that
                                                                                                             Password attacks: obtain a valid
 could allow an attacker to compromise a Microsoft Windows®-based system and then
                                                                                                             password to the system and you
 take a variety of actions. For example, an attacker could run programs on a computer
                                                                                                             become just another legitimate user.
 used to view the attacker's Web site. This vulnerability affects computers that have
                                                                                                             This is particularly dangerous where
 Internet Explorer installed. (You do not have to be using Internet Explorer as your Web
                                                                                                             the hacked account has special
 browser to be affected by this issue.) You can help protect your computer by installing
                                                                                                             privileges assigned to it that permit
 this update from Microsoft.
                                                                                                             wide-ranging system access and use.
 Source - Microsoft Security Bulletin MS03-032                                                               A successful password attack is both
                                                                                                             difficult to detect and difficult to
Approaches to hacking                            weaknesses) in infrastructure software
                                                 and communications protocols offer
                                                                                                             prevent because password security
                                                                                                             depends largely on the user. Keystroke
There are several basic strategies for           seemingly endless tactical possibilities,                   loggers and social engineering (see
hacking a computer facility: physical            as is evidenced in the never-ending                         terminology below) are methods of
intrusion; password attacks; network             stream of security updates (see                             capturing passwords, while people
access; web server attacks; and e-mail           example).                                                   often share their personal passwords
attacks, but there are a multitude of            Physical intrusion: an attacker's work                      with others, write them on notes that
tactics that can be used to implement            is made easier by gaining physical                          they attach to their terminals, and fail
them. For example, security flaws (or            access to a machine's keyboard or to                        to change them periodically. Password
                             design              network junction boxes. Physical access                     cracking programs perform an
                                                     opens up such possibilities as                          elaborate process of guessing 'weak'
                                                                    installing a keystroke                   passwords by trial and error, using
                                                                        logger1; installing                  combinations of words from different
                                                                         unauthorised                        languages, names (places, people,
                                                                        hardware devices                     characters in books), jargon, slang, and
                                                                       (e.g. linking a                       acronyms. These are tried backwards,
                                                                      modem that                             in two-word combinations, in combina-
                                                                     bypasses the                            tions with numbers substituted for
                                                                   corporate firewalls to                    letters, etc. Vendors often ship infra-
                                                                  the network); tapping                      structure software with the administra-
                                                                 junction boxes through                      tor account passwords set to default
                                                                which network traffic                        values; because these are widely
                                                               might be analysed; gaining                    known in the hacking community, they
                                                              access to system docu-                         provide an easy route into a computer
                                                              mentation, printouts and                       facility if left unchanged.
                                                             to written notes of their                       Network Access and Web Server
                                                             passwords left by reckless                      Attacks: computers forming part of a
                                                            users. Even access to confi-                     local area network that is in turn

                                                             1
                                                                 Hardware or software than captures the user's keystrokes, including their passwords.
                                                                                                                                              into IT   I   15




connected to the Internet are exposed
to a range of potential logical access
                                                                Managing common                                  G   systems administrators occupy
                                                                                                                     positions of extreme trust; it
risks. A network's primary purpose is                           vulnerabilities                                      follows that they should themselves
to permit users to access resources                                                                                  be trustworthy. Be very careful
and exchange information, but hackers                           A compromised system can be a self-                  who you permit to have system
can also use the network for the same                           inflicted injury due simply to the basic             administrator-level access to your
purpose. There are different ways to                            precautions having being ignored:                    network particularly when hiring
achieve unauthorised access under this                          G   ensure that your computer has                    new staff or appointing people to
heading, many being technically sophis-                             good physical security, consistent               cover for absences. Consider
ticated. One set of approaches exploits                             with both its value in terms of                  implementing a policy of "least
features of networking software that                                replacement cost and the conse-                  privilege"3 and review periodically
make it accessible from outside the                                 quences that could stem from its                 the privileges that have been
network. Another set exploits                                       data being disclosed or destroyed.               allocated, to whom and for what
browsers; for example, browsers                                     Secure sensitive areas; manage                   purpose;
maintain or have access to information                              access keys; consider installing             G   infrastructure software - in
about the user and computer that a                                  intruder alarms. Ensure communica-               particular the operating system and
hacker can exploit. A hacker could also                             tions junction boxes are secured                 firewalls - generates logs that
cause a browser to launch an "applet"                               and inspect them periodically for                record who is using (or attempting
(a program that runs in conjunction                                 signs of tampering - network admin-              to use) the system, for what
with the browser) to hack the                                       istration packages can detect unau-              purpose and when. This
computer or network, or to send back                                thorised physical devices connected              information can prove vital in
information that is not normally                                    to the network. Provide a secure                 detecting unauthorised activity - for
accessible from outside. Once access is                             waste disposal service for computer              example, attempted access to par-
gained, "island hopping" through the                                printouts and removable media;                   ticularly sensitive accounts or files -
network is sometimes possible by
                                                                G   formulate a sensible password                    and system use at unusual times.
exploiting trusted relationships
                                                                    policy for authenticating users and              Logs should be reviewed frequently
between interconnected computers -
                                                                    enforce it. Consider the need to                 - it may be necessary to develop or
the fact is that a network of computers
                                                                    strengthen password authentication               purchase a log monitoring and
that trust each other is only as secure as
                                                                    with tokens or biometrics. Disable               analysis package to enable key
its weakest link.
                                                                    unnecessary services and accounts                system messages to be detected
The basic solutions to this family of                               promptly;                                        quickly. An unplanned increase in
security risks are to keep abreast of
vendor security updates - such as the
Microsoft example illustrated - and to                           Autorooter
maintain an effective "firewall"2.                               ...a Trojan horse, potentially spread by e-mail, which exploits a Windows vulnerability to
                                                                 allow a hacker to gain control of infected computers.
Email Attacks: e-mail is a major route
into networked computers. Typically, a                           This DCOM-RPC exploit only affects Windows XP/2000 Pro/NT computers, which can
Trojan horse program is buried within                            use Remote Procedure Call. As the Trojan is incapable of spreading by itself, the file
an innocuous-looking attachment to an                            reaches computers through infected e-mail messages, inside files downloaded from the
e-mail message (see the Autorooter                               Internet or even on floppy disks.
example). The Trojan is launched when                            When run, Autorooter creates files, including RPC.EXE, which exploit the operating
the attachment is opened (or                                     system vulnerability by opening communication port 57005 and logging on with the
sometimes viewed) and covertly passes                            same privileges as the computer's user. It also downloads a file called LOLX.EXE,
control of the computer to the hacker.                           which opens a backdoor in the computer. After that, the infected computer is at the
                                                                 mercy of the hacker who can gain remote control through the port created.
2                                                                Because it doesn't show any messages or warnings that may indicate that it has
    A combination of hardware and software that limits
                                                                 reached the computer, Autorooter is difficult to recognise.
    external access to networked computers and resource.
3
    The least level of privilege consistent with performing a
    particular role.
16   I   into IT




     disc storage, slower than expected                                                   successfully tested) disaster recovery
     network performance and                    It's vital to appreciate that:            arrangements in place may find it com-
     suspicious-looking outbound                G    security consists of both            paratively easy to transfer their key
     connections can be other indicators             technology and policy; that is,      operations to a disaster recovery site
     that you have a cuckoo in the nest;             it's the combination of the          while they thoroughly investigate and
                                                     technology and how you use it        sanitise their home site.
G    make sure that your system files
     (including the Registry) are well               that ultimately determines how       You should consider the extent to
     protected from unauthorised                     secure your systems are;             which you back up your firewall and
     change. Apply the principle of least       G    security is journey, not a           other significant logs. Assuming the vul-
     privilege to limit what users are able          destination. It's not a problem      nerability that gave rise to the attack is
     to do. Implement a change control               that can be "solved" once and for    not apparent, you may need to look
     procedure to ensure at least two                all, but a continual series of       back, perhaps weeks, to identify when
     people are involved in important                moves and countermoves               and how the intrusion occurred
     system changes and that all changes             between the good guys and the        (another plus in favour of frequent log
     are recorded. Periodically audit                bad guys;                            reviews). Furthermore, should events
     your system software for unautho-          G    the key is to ensure that you        finish up in the hands of the police, the
     rised executables;                              have good security awareness,        police are likely to need the evidence
                                                     appropriate security policies        contained in your logs to support a
G    never run or download software
                                                     (that you enforce), and that you     prosecution.
     from an untrusted source (the
     source from which it was obtained               exercise sound judgment.             You will also need to consider who to
     might not be the same as the                                                         inform when you discover the
     developer). If you run a web site,
     you should control closely what
                                              Planning for hacking                        problem. This will involve striking a
                                                                                          balance between those who need to be
     visitors can do; in particular, you      incidents                                   involved in the investigation, top
     should only permit programs on the                                                   management - but only when you have
     site that you obtained from a            So, you discover that your system has       concrete proposals to make to them -
     trusted developer;                       been hacked. What next? Well, first it's    and everyone else, at least until the
                                              necessary to backtrack and consider         evidence has been preserved.
G    typically, a new virus or Trojan does    planning for this possibility. Sit down
     the greatest amount of damage            with colleagues and write down a            Investigation needs to be thorough;
     early in its life when few people are    strategy to guide your response,            focusing on a single vulnerability before
     able to detect it. Thus, an out of       exactly as you would for any other          restoring service might overlook the
     date virus scanner is only marginally    aspect of contingency planning. Who         existence of backdoors that the hacker
     better than no virus scanner. New        will form your incident response team?      has inserted to enable easy re-entry
     viruses and Trojans are created          What are your goals going to be and in      later. A thorough investigation will
     virtually every day, so it's vital to    what order of priority? In most cases       involve advanced networking
     keep your scanner's signature file up    they are likely to be first, to prevent     techniques, adeptness with software
     to date - virtually every vendor         further intrusion, then to identify the     tools, system administration,
     provides a means to obtain free          vulnerabilities that led to the attack,     data/system recovery, technical skills
     updated signature files from their       assess the damage and consider what         that might not be at your immediate
     web site.                                remedial action needs to be taken (e.g.     disposal. Thus, it might be prudent in
When you're satisfied that the basics         what would you do were you to
are both in place and operating, why          suspect identity theft?). Will you assign     The hackers' hit parade
not consider hiring a reputable firm of       resources to identifying the intruder?
                                                                                            Security firm Qualys produces a
security specialists to undertake a           Will you involve the police?
                                                                                            real-time index of the vulnerabilities
"penetration testing" programme to            One of the first points to consider is        that are the current favourites of the
assess the extent to which your               whether to disconnect from your               Internet's computer hacking
scheme of control rests on solid              external networks to limit damage and         community. You can obtain details of
foundations rather than on sand?              prevent further infiltration to other         each vulnerability by clicking on each
                                              trusted networks. Assuming the attack         entry in the 'ID' column of the vulner-
                                              is external, remaining connected may          ability table.
                                              leave the hacker able to observe and          http://www.qualys.com/services/threa
                                              negate the response team's actions.           ts/current.html.
                                              Organisations that have reliable (i.e.
                                                                                                                    into IT   I   17




  Responding to intrusions                  Conclusion                                  Firewall - the online equivalent of the
                                                                                        'man on the door' who, when a visitor
  G    understand the extent and            In the context of computer hacking,         arrives in the foyer, asks for proof of
       source of an intrusion;              knowing what you do not know is             identity, checks the appointments book,
  G    protect sensitive data contained     manageable, hence the importance of         contacts the host, issues a temporary
       on systems;                          good preventive and detective               pass and perhaps inspects the visitor's
                                            measures, such as log review and            baggage before permitting - or denying
  G    protect the systems, the
                                            intrusion detection systems. The less       - entry.
       networks and their ability to
                                            fortunate are those who remain in self-     A network firewall sits at the junction
       continue operating as intended;
                                            inflicted ignorance - maybe for weeks       point or gateway between two
  G    recover systems;
                                            or months - that their system has been      networks - usually a private network
  G    collect information to better        infiltrated and their business is being     and a public network such as the
       understand what happened.            damaged.                                    Internet - its purpose being to reduce
       Without such information, you
                                            Regardless of the strength of your          the risk to networked computers of
       may inadvertently take actions
                                            preventive and detective measures, be       intrusion. It may be a hardware device
       that can further damage your
                                            prepared for hacking incidents, particu-    or software running on a secure host
       systems;
                                            larly if your organisation relies heavily   computer. In either case, a firewall has
  G    support legal investigations.                                                    at least two network interfaces, one for
                                            on networks (the Internet, WANs and
  Source: www.cert.org                      LANs) for its operations and customer       the network it is protecting and one for
                                            services. Should you fall victim, a         the untrusted network to which it is
your planning to identify reputable         thorough investigation of a                 exposed. Because firewalls cannot
security specialists well versed in         compromised system - while                  decide for themselves whether traffic is
penetration testing that might be called    disruptive, time-consuming, expensive,      hostile or benign, they must be
upon to assist with sanitising and          and tedious - is essential. The             programmed with rules (a "security
rebuilding your systems.                    temptation is to give in to pressure to     policy") that govern the types of traffic
                                            resume operations quickly by closing        to allow or deny.
In addition to identifying the system
                                            the obvious vulnerabilities and trusting    In addition to guarding external
vulnerabilities exploited by the hacker,
                                            to luck that the system is clean. That      connections, firewalls are also
a critical review and reconciliation of
                                            could easily be a false economy.            sometimes used internally to provide
activated accounts (particularly those of
guests, supposedly disabled accounts                                                    additional security by segregating sub-
                                                                                        network that give access to highly
and those whose presence can't be
explained) and their associated system
                                            Some terminology                            sensitive applications.
privileges, while tedious, could reveal     Buffer overflows - are due partly to a      Honey Pots - decoy servers or
other unused entry points the hacker        characteristic of some programming          systems designed to gather information
has set up against a rainy day; likewise,   languages, such as C, which poor            about attackers. A honey pot, which is
you should confirm the status of all        programming practices then                  set up to be easier prey for attackers
interconnected 'trusted' systems.           exacerbate. An overflow occurs when a       than genuine production systems,
                                            program attempts to store more data         incorporates modifications that enable
Scan the system for Trojans. These are
                                            in temporary storage area, or "buffer",     intruders' activities to be logged and
typically identified by antivirus
                                            than it can hold. Since buffers are of      traced. The theory is that when an
packages, but their scan engines have
                                            finite size, the extra information          intruder breaks into a system, they will
varying degrees of success, particularly
                                            overflows into adjacent buffers thereby     return. During subsequent visits,
if not up-to-date, so scan using (up-to-
                                            corrupting or overwriting the valid data    additional information can be gathered
date versions of) several packages.
                                            held in them. This would normally           and additional attempts at file, security,
Note: there is more information on          cause a program failure or even a           and system access on the Honey Pot
incident response at...                     system crash, but a skilfully crafted       can be monitored and saved. Most
http://www.cert.org/security-               overflow can also be exploited as a         firewalls can be configured to alert
improvement/modules/m06.html                form of security attack. The attacker       system administrators when they
                                            can gain control by creating an             detect traffic entering or leaving a
                                            overflow containing code designed to        honey pot.
                                            send new instructions to the attacked
                                            computer, hence the relevance of            Identity theft - involves taking over an
                                            buffer overflows to hacking.                individual's identity by stealing critical
                                                                                        private information, such as the Social
                                                                                        Security number, driver's license
18   I   into IT




                                           resources and activities and, using        compromise the system, or be used in
 Example of a buffer overflow              information gathered from these            a social engineering attack. For
 vulnerability                             sources, alerts system administrators      example, a keylogger will reveal the
                                           on identifying possible intrusion.         contents of all e-mail composed by the
 The Phone Book Service that runs on
                                                                                      user. Keylogger programs are
 Internet Information Services (IIS) 5.0   Firewalls (see above) work only at a
                                                                                      commonly included in rootkits and
 has an unchecked buffer (a                network's point of entry with packets
                                                                                      remote administration Trojans. A
 temporary data storage area that has      as they enter and leave the network.
                                                                                      keystroke logger can also take the form
 a limited capacity but no specification   An attacker that has breached the
                                                                                      of a hardware device, independent of
 for the amount of information that can    firewall can roam at will through a
                                                                                      the operating system, which plugs in
 be written into it) in the code that      network - this is where an ID system
                                                                                      between the keyboard and the main
 processes requests for phone book         becomes important.
                                                                                      system (for PCs). They simply record
 updates. A specifically malformed
                                           Intrusion Prevention - systems             what is typed at the keyboard; the
 HTTP request from a malicious user
                                           monitor for suspicious activity with the   hacker can later retrieve the device
 can cause a buffer overflow in the
                                           aim of proactively blocking potential      and examine its contents.
 Phone Book Service, which might
                                           attacks. Typically, an IP system
 allow the malicious user to run unau-                                                Phishing - occurs when a consumer
                                           comprises a software agent that resides
 thorized code on the server, or cause                                                receives a deceptively legitimate
                                           near to the host's operating system
 the service to fail.                                                                 looking e-mail from what appears to be
                                           kernel, which monitors system calls
 Source: extract from a Microsoft                                                     a reputable company (see Spoofing).
                                           before they reach the kernel using a
 security update.                                                                     The e-mail might ask a recipient to, for
                                           rules engine to identify potentially
                                                                                      example, update their credit card
                                           suspicious activity. This can then be
                                                                                      information, and/or provide other
number, address, credit card number,       halted, or the systems administrator
                                                                                      personal details to avoid their account
or bank account number. The identity       alerted. A drawback is that IP systems
                                                                                      being terminated. Another approach is
thief can then use the stolen              can respond to legitimate activities and
                                                                                      for the sender of the message to offer
information to obtain loans or credit      generate false alarms. Defining
                                                                                      a service, for example to protect their
lines to buy goods and services under      exceptions can reduce such false alarms,
                                                                                      credit cards from possible fraud. Those
the stolen name. Identity thieves          but there are pros and cons to this.
                                                                                      stung by phishing are victims of
typically change the consumer's mailing    Keystroke logger (or keylogger) - is       "identity theft" (see above).
address to hide their activities.          a program that runs in the background
Intrusion detection - the art and          recording all keystrokes. Once logged,
science of detecting when a computer       the keystrokes are returned to the
                                           hacker who peruses them carefully to
                                                                                        Attempted identity theft
or network is being used inappropri-
ately or without authority. An ID          identify passwords and other useful          National Australia Bank customers
system monitors system and network         information that could be used to            became targets for an e-mail fraud in
                                                                                        which they were sent (grammatically
                                                                                        incorrect) requests, purportedly from
                                                                                        the bank, requesting them to connect
                                                                                        to the NAB web site.
                                                                                        "Dear valued customer," it read, "Our
                                                                                        new security system will help you to
                                                                                        avoid frequently fraud transactions
                                                                                        and to keep your investments in
                                                                                        safety." The e-mail encouraged
                                                                                        recipients to click a link in the body of
                                                                                        the message, which then connected
                                                                                        them to a site that mimicked the NAB
                                                                                        Web site but that had been set up to
                                                                                        capture their login and password
                                                                                        details.
                                                                                        The scam used a message previously
                                                                                        used to targeted other banks'
                                                                                        customers.
                                                                                                                     into IT   I   19




Rootkit - a collection of tools and          Spoofing - in essence a technique that      Trojan horse - a name derived from
utilities that a hacker can use to hide      depends on forging the identity of          the classic Trojan horse in Homer's
their presence and gather data to help       someone or something else ("mas-            Iliad. After spending many months
them further infiltrate a network.           querading"), the aim being to alter the     unsuccessfully besieging the fortified
Typically, a rootkit includes tools to log   trust relationship between the parties      city of Troy, the Greeks evolved a
keystrokes (see keylogger above),            to a transaction.                           strategy. They departed leaving behind
create secret backdoor entrances to                                                      them as a gift a large wooden horse,
                                             In the online world, there are different
the system, monitor packets on the                                                       which the citizens of Troy brought into
                                             flavours of spoofing. A hacker might
network to gain information, and alter                                                   town. Unknown to them the horse
                                             employ sophisticated e-mail spoofing to
system log files and administrative tools                                                contained Greek warriors, who at night
                                             make it appear that an e-mail requiring
to prevent detection.                                                                    jumped out and opened the city gates
                                             the victim to confirm their account
                                                                                         letting in the Greek army who had
Social engineering - in his book, The        details, including such information as
                                                                                         been in hiding.
Art of Deception: Controlling the Human      their logon ID and password, has been
Element of Security4, arch hacker Kevin      sent by a reputable person or organisa-     In the IT environment - and setting
Mitnick poses the question: why bother       tion (see "phishing" and "social            aside the legitimate use of network
attacking technology when the weakest        engineering" above).                        administration tools - Trojans are
link lies not in the computer hardware                                                   generally considered a class of
                                             IP spoofing is another common form of
or software, but in humans who can be                                                    "malware" that, like their predecessor,
                                             online camouflage, in which a hacker
tricked into giving up their passwords                                                   contain covert functionality. They act as
                                             attempts to gain unauthorised access to
and other secrets? Mitnick goes on to                                                    a means of entering a target computer
                                             a computer or network by making it
state that social engineering "uses                                                      undetected and then allowing a remote
                                             appear that a packet has come from a
influence and persuasion to deceive                                                      hacker unrestricted access and control.
                                             trusted machine by spoofing its unique
people by convincing them that the social                                                They generally
                                             Internet IP address. A countermeasure
engineer is someone he is not, or by                                                     incorporate a rootkit
                                             is to use of a Virtual Private Network
manipulation. The social engineer is able                                                (see above).
                                             (VPN) protocol, a method that involves
to take advantage of people to obtain
                                             encrypting the data in each packet as
information with or without the use of
                                             well as the source address using
technology."
                                             encryption keys that a potential attacker
4                                            doesn't have. The VPN software or
    Wiley, ISBN 0-471-23712-4                firmware decrypts the packet and
                                             source address, and performs a
                                                                                                        About the author
                                             checksum. The packet is discarded if         N. Nagarajan CISA joined the Office
                                              either the data or the source address       of the Comptroller and Auditor
                                                  has been tampered with.                 General of India in 1989, and is
                                                                                          presently employed as Senior Deputy
                                                                                          Accountant General in Mumbai. In
                                                                                          addition to his wide experience in
                                                                                          auditing IT (particularly in the field of
                                                                                          Electronic Data Interchange) and in
                                                                                          training staff in IT audit skills,
                                                                                          Nararajan has also worked as a
                                                                                          developer of pensions systems.
                                                                                          Nagarajan's international work
                                                                                          includes audit assignments at the
                                                                                          United Nations in New York, and a
                                                                                          two year secondment to the Office of
                                                                                          the Auditor General of Mauritius
                                                                                          where he was involved in training
                                                                                          staff and in the audit of EDI systems
                                                                                          operated by the Customs
                                                                                          department. Nagarajan has been
                                                                                          published in a number of international
                                                                                          journals.

				
DOCUMENT INFO
Shared By:
Tags: Hacker
Stats:
views:30
posted:3/19/2012
language:simple
pages:8