How Will Your Network Be Compromised?


Every time I attend a "Security Guru's" meeting, I'm amazed by how much time and effort is spent on discussing complex hacking and computer compromise of computer networks and systems.
One person is going on about the latest "heap corruption" vulnerability and another is discussing man-in-the-middle techniques for compromising remote access systems. Most of these vulnerabilities are very difficult to successfully exploit.
Some of them require specific host platforms, special tools, in-depth knowledge of many programming languages, and a lot of luck. I'm not saying there are not tons of vulnerabilities and exploits like these, it's just that they are not always easy to take advantage of, and therefore, may not present themselves as high risk events for most organizations.
It's The Little Things The Will Get You Every Time During security assessments, there are times when I am able to successfully exploit a "technical" vulnerability to gain system or internal network access. For instance; during a recent assessment, I identified a web application server that appeared to be vulnerable to an IIS / ASP vulnerability that would allow an attacker to dump all .ASP code on the server.
After some effort and a little C/C++ code, I was able to take advantage of this exploit. After perusing through the .ASP code on the server, I was able to gain important information that resulted in the comprise of an internal system.
However, the reality is it is the simple things that are the biggest problem. Most times, internal network compromise is the result of one or more of the following: The installation of a web support application that has little to no security features to begin with; The installation of support software that has a well-known default password for the admin account.
And, the person installing the software never bothers to change the password; Improperly configured communications devices such as routers and switches; Important, and sometimes critical documents left on web servers. Information that only internal or technical people should have access to; Poor password and authentication policy.
Users using weak passwords to access accounts, especially remote access devices that are present on the Internet; Test servers that the have been forgotten about and are still present on the Internet; Poor network border architecture For instance; installing a firewall and forgetting that there are other network that need to be protected or should be placed behind the firewall. The above is just a handful of "Little Things" that get overlooked and can result in the undoing of your networks security measures.
As an example; Many organizations provide their internal and external customers with a public FTP service. Most times, this is done to allow people to easily post "non-critical" or public information and share it with other associates.
Recently, I identified just such an FTP server. The server allowed anonymous logons, however it contained sub-directories that were secured.
These secure directories were only accessible by the people who owned the account. It was obvious to me that I was not going to easily compromise these accounts.
On the other hand, sitting right in the anonymous "root" directory was a .zip file that was rather large. I downloaded the file, which took quite a while, unzipped it on my desktop, and guess what it contained? It was a compressed file of the entire FTP server, including the secure directories.
I would bore you with what I found within these directories. The bottom line is, I should have never had access to the information they contained.
Conclusion The bottom line is this; it really is the little things that will come back to haunt you when it comes to computer security. No system should ever be rushed into production.
This is one of the most common causes for poorly secured systems. The team in charge of implementing new technology needs to be educated on how to securely deploy new systems.
And if you are installing support software from outside vendors, make sure you thoroughly review their products security features. Also, make sure they fully disclose any known bugs or improperly functioning features.
Article Tags: Little Things Source: Free Articles from ArticlesFactory.com .

Top blog stories

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

AO.co: Online Shopping Made Simple

AO.co is a trusted expert in TVs, washing machines, clothes dryers and other household appliances. AO.com is one of the largest retailers in the UK and it specializes in electronics, clothes and home furniture.

see post

For our people.

At Three, we believe phones are good. They just make life better. Easier. And more fun. But we all need to find a balance that works for us. Our mission is to help our customers use their phones to live their best lives.

see post

We make your life easier

We make your life easier Since 1992, we’ve been helping customers get the best deal on their dream phone. We firmly believe in giving you the highest quality, for the lowest price. That’s why we work with three of the UK’s leading networks to do all the haggling for you,...

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Halfords - Quicker, Easier, and Convenient.

At Halfords, we're all about the journey. With more than 700 stores with over 10,000 colleagues, we're the UK's leading retailer of automotive and cycling products. We are also the leading operator in MOT, tyres, car servicing and car repairs - pleasing more than 750,000 customers every year.

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Sky - Epic. Endless. Entertainment.

It's important to us that everyone gets great customer service and can enjoy our products, no matter their level of sight. So, if you're blind, partially sighted or struggle to see or read the screen, we’ve a range of features to help you get the most from our products and...

see post

Nasty Gal - We exist for the “girl in progress”.

Look iconic, without the hassle— using Nasty Gal discount codes, you can shop your favorite pieces for way less by simply entering one of our promotional codes (of your choice) at the checkout. From delivery offers, to promo deals, we keep ‘em coming, so you always have the offer you...

see post

Digital Publishing From Past to Now

The Covid-19 has caused the school and universities to shut down around the world creating a major issue in Learning and Education. As this virus spreads through the interaction and if social distanci... The Covid-19 has caused the school and universities to shut down around the world creating a major...

see post

Why it’s Important to Manage Your Holiday Calendars?

A printable calendar 2021 is a prominent online platform where you download printable calendars of your choice. These calendars can be customized as per our client requirement with photo, text, logo, or any other image. If you are thinking of planning a dream vacation tour with family and kids but...

see post

How To Pick A Women's Robe


A ladies sleepwear basic, the women's robe is an essential lingerie style. The majority of women have at least a couple of robes in their wardrobe. But there is so much more to this favorite lingerie style than velour or cotton robes. The women’s robe has become a must have...

How Do I?


0 false 18 pt 18 pt 0 0 false false false /* Style Definitions */ ... HOW DO I? By Jr Davis [email protected]`   How Do I?  Almost everyday of my life, not soon after waking up this is the first question I ask myself. How do I get everything done...

When to Divorce a Narcissistic Man -- The Fastest Divorce is Never the Easiest Divorce


"How will I know when to divorce and finally find freedom for myself and the kids?" you ask yourself again and again.  "How can I get this nightmare behind me and just get the fastest divorce possible... Source: Free Articles from ArticlesFactory.com

The Handy And Cost Effective Solutions For Not Smiling


Have you stopped smiling due to the poor discolouration of your teeth, uneven length or wide gaps in your mouth? If this is you, shout with joy as you no longer need to suffer with these problems now that Dental Veneers are available. Discover the advances and cost savings now...

Do Not Lose Your Domain Name to a Shady Web Design Firm


This article is addressing one simple but very important question to ask; who will own my domain name? Registering a domain name is one of the very first steps in the web design process and it is one of the most common services that is taken for granted. Part of...

Teeth Whitening - Is it Enough?


Teeth Whitening is the big buzz at the moment but is it good for you? After treatment some people suffer from Sensitive Teeth and Gum irritations. Did you also know that if you have Crowns or Veneers they will not change colour like your natural teeth? There is a better...

Search topic

Teeth Whitening - Is it Enough?

Teeth Whitening is the big buzz at the moment but is it good for you? After treatment some people suffer from Sensitive Teeth and Gum irritations. Did you also know that if you have Crowns or Veneers they will not change colour like your natural teeth? There is a better...

Learn more