How Will Your Network Be Compromised?


Every time I attend a "Security Guru's" meeting, I'm amazed by how much time and effort is spent on discussing complex hacking and computer compromise of computer networks and systems.
One person is going on about the latest "heap corruption" vulnerability and another is discussing man-in-the-middle techniques for compromising remote access systems. Most of these vulnerabilities are very difficult to successfully exploit.
Some of them require specific host platforms, special tools, in-depth knowledge of many programming languages, and a lot of luck. I'm not saying there are not tons of vulnerabilities and exploits like these, it's just that they are not always easy to take advantage of, and therefore, may not present themselves as high risk events for most organizations.
It's The Little Things The Will Get You Every Time During security assessments, there are times when I am able to successfully exploit a "technical" vulnerability to gain system or internal network access. For instance; during a recent assessment, I identified a web application server that appeared to be vulnerable to an IIS / ASP vulnerability that would allow an attacker to dump all .ASP code on the server.
After some effort and a little C/C++ code, I was able to take advantage of this exploit. After perusing through the .ASP code on the server, I was able to gain important information that resulted in the comprise of an internal system.
However, the reality is it is the simple things that are the biggest problem. Most times, internal network compromise is the result of one or more of the following: The installation of a web support application that has little to no security features to begin with; The installation of support software that has a well-known default password for the admin account.
And, the person installing the software never bothers to change the password; Improperly configured communications devices such as routers and switches; Important, and sometimes critical documents left on web servers. Information that only internal or technical people should have access to; Poor password and authentication policy.
Users using weak passwords to access accounts, especially remote access devices that are present on the Internet; Test servers that the have been forgotten about and are still present on the Internet; Poor network border architecture For instance; installing a firewall and forgetting that there are other network that need to be protected or should be placed behind the firewall. The above is just a handful of "Little Things" that get overlooked and can result in the undoing of your networks security measures.
As an example; Many organizations provide their internal and external customers with a public FTP service. Most times, this is done to allow people to easily post "non-critical" or public information and share it with other associates.
Recently, I identified just such an FTP server. The server allowed anonymous logons, however it contained sub-directories that were secured.
These secure directories were only accessible by the people who owned the account. It was obvious to me that I was not going to easily compromise these accounts.
On the other hand, sitting right in the anonymous "root" directory was a .zip file that was rather large. I downloaded the file, which took quite a while, unzipped it on my desktop, and guess what it contained? It was a compressed file of the entire FTP server, including the secure directories.
I would bore you with what I found within these directories. The bottom line is, I should have never had access to the information they contained.
Conclusion The bottom line is this; it really is the little things that will come back to haunt you when it comes to computer security. No system should ever be rushed into production.
This is one of the most common causes for poorly secured systems. The team in charge of implementing new technology needs to be educated on how to securely deploy new systems.
And if you are installing support software from outside vendors, make sure you thoroughly review their products security features. Also, make sure they fully disclose any known bugs or improperly functioning features.
Article Tags: Little Things Source: Free Articles from ArticlesFactory.com .

Top blog stories

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

AO.co: Online Shopping Made Simple

AO.co is a trusted expert in TVs, washing machines, clothes dryers and other household appliances. AO.com is one of the largest retailers in the UK and it specializes in electronics, clothes and home furniture.

see post

For our people.

At Three, we believe phones are good. They just make life better. Easier. And more fun. But we all need to find a balance that works for us. Our mission is to help our customers use their phones to live their best lives.

see post

We make your life easier

We make your life easier Since 1992, we’ve been helping customers get the best deal on their dream phone. We firmly believe in giving you the highest quality, for the lowest price. That’s why we work with three of the UK’s leading networks to do all the haggling for you,...

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Halfords - Quicker, Easier, and Convenient.

At Halfords, we're all about the journey. With more than 700 stores with over 10,000 colleagues, we're the UK's leading retailer of automotive and cycling products. We are also the leading operator in MOT, tyres, car servicing and car repairs - pleasing more than 750,000 customers every year.

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Sky - Epic. Endless. Entertainment.

It's important to us that everyone gets great customer service and can enjoy our products, no matter their level of sight. So, if you're blind, partially sighted or struggle to see or read the screen, we’ve a range of features to help you get the most from our products and...

see post

Nasty Gal - We exist for the “girl in progress”.

Look iconic, without the hassle— using Nasty Gal discount codes, you can shop your favorite pieces for way less by simply entering one of our promotional codes (of your choice) at the checkout. From delivery offers, to promo deals, we keep ‘em coming, so you always have the offer you...

see post

Digital Publishing From Past to Now

The Covid-19 has caused the school and universities to shut down around the world creating a major issue in Learning and Education. As this virus spreads through the interaction and if social distanci... The Covid-19 has caused the school and universities to shut down around the world creating a major...

see post

Why it’s Important to Manage Your Holiday Calendars?

A printable calendar 2021 is a prominent online platform where you download printable calendars of your choice. These calendars can be customized as per our client requirement with photo, text, logo, or any other image. If you are thinking of planning a dream vacation tour with family and kids but...

see post

Make in India Campaign Objectives & Advantages


Make in India marketing campaign released via Prime Minister Narendra Modi in September 2014. It is an initiative to make India’s name on the top business investors list all over the globe. It is a large opportunity for all the traders to create their enterprise in any field anywhere inside...

Swachh Bharat Mission Impact In India


The Swachh Bharat Mission Program is an initiative of the national government and is coordinated with the aid of the MDWS. However, responsibility for its implementation is with the state and rural local governments.  The Swachh Bharat Mission Program is an initiative of the national government and is coordinated with...

PMKVY: Jobs For Indian Citizens


The government of India introduces many programs to enhance the lifestyles and living requirements of the Indians. Pradhan Mantri Kaushal Vikas Yojna (PMKVY) is one of the Applications the Government of India The government of India introduces many programs to enhance the lifestyles and living requirements of the Indians. Pradhan...

Website for Digital India Programme


Digital India is an ambitious challenge for the Government of India to digitally empowered inside the area of the era. This task was launched on 1 July 2015 by means of Shri. Narendra Modi. Digital India is an ambitious challenge for the Government of India to digitally empowered inside the...

Digi Locker


DigiLocker gives a committed private storage space, linked to each resident’s Aadhaar number. DigiLocker may be used to soundly save e-files as well as keep Uniform Resource Identifier (URI) hyperlink of e-files issued by using diverse company departments. The e-Sign facility provided as a part of the DigiLocker machine can...

Latest Politics News | Politics News Online


Liberals Latest Politics news are checking out regulations in  which drive tech giants like Facebook and Google to share promotion dollars with community media to Restrict the spread of coronavirus. ‘It was so thick’: B.C. girl’s huge spider Image horrifies, but professionals say to not fear 4075 Read One of...

Pradhan Mantri Atal Pension Yojana


The interim price range has introduced much good news for the loads and for folkss who belong to the weaker sections of the society along with folks that really want welfare schemes. One such welfare scheme commenced through the contemporary government is Atal Pension Yojana. Atal Pension Yojana is top-notch...

US -China fight over Covid 19


In current scenario ,US -China relations have become worse than even before.This article is analysis of trade sanctions between US -China,Covid -19 effect on US and upcoming presidential election in US. The Trump administration and the Chinese government are going head to head   over the Coronavirus. Xi Jinping and Donald...

Hunter S. Thompson: the top 5 adventures


Hunter S. Thompson made a life's work from pursuing the American dream. Read on as we explore a handful of his greatest adventures.  From politics to literature, to getting lost in the wilds of Las Vegas, nobody has used their allotted time on the planet quite like Hunter S. Thompson. ...

Standard of Living Essay


The Standard of living is the level of material goods, wealth, necessities, and comfort available to a particular socioeconomic group, mostly a nation. It includes factors like poverty rate, income, employment availability, and quality, Gross Domestic Product, political and economic stability, national economic growth, house affordability and quality, the expectancy...

Search topic

Standard of Living Essay

The Standard of living is the level of material goods, wealth, necessities, and comfort available to a particular socioeconomic group, mostly a nation. It includes factors like poverty rate, income, employment availability, and quality, Gross Domestic Product, political and economic stability, national economic growth, house affordability and quality, the expectancy...

Learn more