How Will Your Network Be Compromised?


Every time I attend a "Security Guru's" meeting, I'm amazed by how much time and effort is spent on discussing complex hacking and computer compromise of computer networks and systems.
One person is going on about the latest "heap corruption" vulnerability and another is discussing man-in-the-middle techniques for compromising remote access systems. Most of these vulnerabilities are very difficult to successfully exploit.
Some of them require specific host platforms, special tools, in-depth knowledge of many programming languages, and a lot of luck. I'm not saying there are not tons of vulnerabilities and exploits like these, it's just that they are not always easy to take advantage of, and therefore, may not present themselves as high risk events for most organizations.
It's The Little Things The Will Get You Every Time During security assessments, there are times when I am able to successfully exploit a "technical" vulnerability to gain system or internal network access. For instance; during a recent assessment, I identified a web application server that appeared to be vulnerable to an IIS / ASP vulnerability that would allow an attacker to dump all .ASP code on the server.
After some effort and a little C/C++ code, I was able to take advantage of this exploit. After perusing through the .ASP code on the server, I was able to gain important information that resulted in the comprise of an internal system.
However, the reality is it is the simple things that are the biggest problem. Most times, internal network compromise is the result of one or more of the following: The installation of a web support application that has little to no security features to begin with; The installation of support software that has a well-known default password for the admin account.
And, the person installing the software never bothers to change the password; Improperly configured communications devices such as routers and switches; Important, and sometimes critical documents left on web servers. Information that only internal or technical people should have access to; Poor password and authentication policy.
Users using weak passwords to access accounts, especially remote access devices that are present on the Internet; Test servers that the have been forgotten about and are still present on the Internet; Poor network border architecture For instance; installing a firewall and forgetting that there are other network that need to be protected or should be placed behind the firewall. The above is just a handful of "Little Things" that get overlooked and can result in the undoing of your networks security measures.
As an example; Many organizations provide their internal and external customers with a public FTP service. Most times, this is done to allow people to easily post "non-critical" or public information and share it with other associates.
Recently, I identified just such an FTP server. The server allowed anonymous logons, however it contained sub-directories that were secured.
These secure directories were only accessible by the people who owned the account. It was obvious to me that I was not going to easily compromise these accounts.
On the other hand, sitting right in the anonymous "root" directory was a .zip file that was rather large. I downloaded the file, which took quite a while, unzipped it on my desktop, and guess what it contained? It was a compressed file of the entire FTP server, including the secure directories.
I would bore you with what I found within these directories. The bottom line is, I should have never had access to the information they contained.
Conclusion The bottom line is this; it really is the little things that will come back to haunt you when it comes to computer security. No system should ever be rushed into production.
This is one of the most common causes for poorly secured systems. The team in charge of implementing new technology needs to be educated on how to securely deploy new systems.
And if you are installing support software from outside vendors, make sure you thoroughly review their products security features. Also, make sure they fully disclose any known bugs or improperly functioning features.
Article Tags: Little Things Source: Free Articles from ArticlesFactory.com .

Top blog stories

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

AO.co: Online Shopping Made Simple

AO.co is a trusted expert in TVs, washing machines, clothes dryers and other household appliances. AO.com is one of the largest retailers in the UK and it specializes in electronics, clothes and home furniture.

see post

For our people.

At Three, we believe phones are good. They just make life better. Easier. And more fun. But we all need to find a balance that works for us. Our mission is to help our customers use their phones to live their best lives.

see post

We make your life easier

We make your life easier Since 1992, we’ve been helping customers get the best deal on their dream phone. We firmly believe in giving you the highest quality, for the lowest price. That’s why we work with three of the UK’s leading networks to do all the haggling for you,...

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Halfords - Quicker, Easier, and Convenient.

At Halfords, we're all about the journey. With more than 700 stores with over 10,000 colleagues, we're the UK's leading retailer of automotive and cycling products. We are also the leading operator in MOT, tyres, car servicing and car repairs - pleasing more than 750,000 customers every year.

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Sky - Epic. Endless. Entertainment.

It's important to us that everyone gets great customer service and can enjoy our products, no matter their level of sight. So, if you're blind, partially sighted or struggle to see or read the screen, we’ve a range of features to help you get the most from our products and...

see post

Nasty Gal - We exist for the “girl in progress”.

Look iconic, without the hassle— using Nasty Gal discount codes, you can shop your favorite pieces for way less by simply entering one of our promotional codes (of your choice) at the checkout. From delivery offers, to promo deals, we keep ‘em coming, so you always have the offer you...

see post

Digital Publishing From Past to Now

The Covid-19 has caused the school and universities to shut down around the world creating a major issue in Learning and Education. As this virus spreads through the interaction and if social distanci... The Covid-19 has caused the school and universities to shut down around the world creating a major...

see post

Why it’s Important to Manage Your Holiday Calendars?

A printable calendar 2021 is a prominent online platform where you download printable calendars of your choice. These calendars can be customized as per our client requirement with photo, text, logo, or any other image. If you are thinking of planning a dream vacation tour with family and kids but...

see post

Teenagers and Social Media- Guide for Parents


More than 90% of teenagers use social media and 71% of them have more than one account in these apps. It’s easy to see why social media is popular, but what are the effects or even risks of using social media on the teenager’s brain. A study done at UCLA...

6 Dirty Habits That Are Actually Healthy


There are truckloads of unconventional habits that you should be participating in. If you wanna know about them, curb your desire to puke and sit tight! Do you secretly indulge in questionable habits? You’d be lying if you said no to this! Come on, we all have our fair share...

Migrate Microsoft Teams from one Tenant to another


Planning to Migrate Microsoft Teams from one tenant to another? Know the alternate processes to tackle all your MS Teams migration worries. Planning an MS Teams migration from one tenant to another? Let us help you out with few alternate processes to tackle all your migration worries.   Microsoft Teams: The...

Interviews on lifestyle news - An Overview


Update Needed to Enjoy the media you need to either update your browser to your modern version or update your Flash plugin. Looking at and expecting specific filler term alternatives will probably be challenging as it's subtle. Pals may be additional prone to note a change in how you converse...

Bringing Your Clients the Power of Positive Thinking


Norman Vincent Peale, author of the book The Power of Positive Thinking once said, “Change your thoughts and you can change your world.” Many of us, when we face challenges in life, aren’t interested in people telling us to “look on the bright side” or to keep a positive attitude....

Psychological problems and the treatments within you


Psychological problems and the treatment is within you   Why isn’t pulling your hair considered a socially acceptable way of dealing with distress while smoking is?  The worst case scenarios ... Psychological problems and the treatment is within you   Why isn’t pulling your hair considered a socially acceptable way of dealing...

Latest Politics News | Current Politics News In India


This has led towards the rise of political functions with agendas catering to one or a mix of these teams. Events in India also concentrate on people who find themselves not in favour of other functions and use them as an asset. The president is shifting his messaging within the...

PMUY: Pradhan Mantri Ujjwala Yojana Recommendations


Three boundaries drive a maximum of the low uptake of PMUY refills: Affordability – because of the excessive powerful price of the top off, that's INR 150–250 (USD 2.3–3.8). This value is better than the actual refill rate once misplaced wages and transportation fees are factored in. The inconvenience of...

PMSBY: Features of Pradhan Mantri Suraksha Bima Yojana


PM Narendra Modi in 2015 launched Pradhan Mantri Suraksha Bima Yojana (PMSBY) in Kolkata, West Bengal. It is an Accident Insurance Scheme (AIS) supplying demise and incapacity cover as a result of an accident.Insurance isn't a newer concept to India; however, its attain is still tons limited. In spite of...

Pradhan Mantri Jan Dhan Yojana


The Government of India has regularized specific saving schemes for the welfare of citizens. These schemes are added into movement with one common objective- a guide to all individuals. One such scheme is Pradhan Mantri Jan Dhan Yojana introduced by means of the Prime Minister of India on 15 August...

Search topic

Pradhan Mantri Jan Dhan Yojana

The Government of India has regularized specific saving schemes for the welfare of citizens. These schemes are added into movement with one common objective- a guide to all individuals. One such scheme is Pradhan Mantri Jan Dhan Yojana introduced by means of the Prime Minister of India on 15 August...

Learn more