How Will Your Network Be Compromised?


Every time I attend a "Security Guru's" meeting, I'm amazed by how much time and effort is spent on discussing complex hacking and computer compromise of computer networks and systems.
One person is going on about the latest "heap corruption" vulnerability and another is discussing man-in-the-middle techniques for compromising remote access systems. Most of these vulnerabilities are very difficult to successfully exploit.
Some of them require specific host platforms, special tools, in-depth knowledge of many programming languages, and a lot of luck. I'm not saying there are not tons of vulnerabilities and exploits like these, it's just that they are not always easy to take advantage of, and therefore, may not present themselves as high risk events for most organizations.
It's The Little Things The Will Get You Every Time During security assessments, there are times when I am able to successfully exploit a "technical" vulnerability to gain system or internal network access. For instance; during a recent assessment, I identified a web application server that appeared to be vulnerable to an IIS / ASP vulnerability that would allow an attacker to dump all .ASP code on the server.
After some effort and a little C/C++ code, I was able to take advantage of this exploit. After perusing through the .ASP code on the server, I was able to gain important information that resulted in the comprise of an internal system.
However, the reality is it is the simple things that are the biggest problem. Most times, internal network compromise is the result of one or more of the following: The installation of a web support application that has little to no security features to begin with; The installation of support software that has a well-known default password for the admin account.
And, the person installing the software never bothers to change the password; Improperly configured communications devices such as routers and switches; Important, and sometimes critical documents left on web servers. Information that only internal or technical people should have access to; Poor password and authentication policy.
Users using weak passwords to access accounts, especially remote access devices that are present on the Internet; Test servers that the have been forgotten about and are still present on the Internet; Poor network border architecture For instance; installing a firewall and forgetting that there are other network that need to be protected or should be placed behind the firewall. The above is just a handful of "Little Things" that get overlooked and can result in the undoing of your networks security measures.
As an example; Many organizations provide their internal and external customers with a public FTP service. Most times, this is done to allow people to easily post "non-critical" or public information and share it with other associates.
Recently, I identified just such an FTP server. The server allowed anonymous logons, however it contained sub-directories that were secured.
These secure directories were only accessible by the people who owned the account. It was obvious to me that I was not going to easily compromise these accounts.
On the other hand, sitting right in the anonymous "root" directory was a .zip file that was rather large. I downloaded the file, which took quite a while, unzipped it on my desktop, and guess what it contained? It was a compressed file of the entire FTP server, including the secure directories.
I would bore you with what I found within these directories. The bottom line is, I should have never had access to the information they contained.
Conclusion The bottom line is this; it really is the little things that will come back to haunt you when it comes to computer security. No system should ever be rushed into production.
This is one of the most common causes for poorly secured systems. The team in charge of implementing new technology needs to be educated on how to securely deploy new systems.
And if you are installing support software from outside vendors, make sure you thoroughly review their products security features. Also, make sure they fully disclose any known bugs or improperly functioning features.
Article Tags: Little Things Source: Free Articles from ArticlesFactory.com .

Top blog stories

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

AO.co: Online Shopping Made Simple

AO.co is a trusted expert in TVs, washing machines, clothes dryers and other household appliances. AO.com is one of the largest retailers in the UK and it specializes in electronics, clothes and home furniture.

see post

For our people.

At Three, we believe phones are good. They just make life better. Easier. And more fun. But we all need to find a balance that works for us. Our mission is to help our customers use their phones to live their best lives.

see post

We make your life easier

We make your life easier Since 1992, we’ve been helping customers get the best deal on their dream phone. We firmly believe in giving you the highest quality, for the lowest price. That’s why we work with three of the UK’s leading networks to do all the haggling for you,...

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Halfords - Quicker, Easier, and Convenient.

At Halfords, we're all about the journey. With more than 700 stores with over 10,000 colleagues, we're the UK's leading retailer of automotive and cycling products. We are also the leading operator in MOT, tyres, car servicing and car repairs - pleasing more than 750,000 customers every year.

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Sky - Epic. Endless. Entertainment.

It's important to us that everyone gets great customer service and can enjoy our products, no matter their level of sight. So, if you're blind, partially sighted or struggle to see or read the screen, we’ve a range of features to help you get the most from our products and...

see post

Nasty Gal - We exist for the “girl in progress”.

Look iconic, without the hassle— using Nasty Gal discount codes, you can shop your favorite pieces for way less by simply entering one of our promotional codes (of your choice) at the checkout. From delivery offers, to promo deals, we keep ‘em coming, so you always have the offer you...

see post

Digital Publishing From Past to Now

The Covid-19 has caused the school and universities to shut down around the world creating a major issue in Learning and Education. As this virus spreads through the interaction and if social distanci... The Covid-19 has caused the school and universities to shut down around the world creating a major...

see post

Why it’s Important to Manage Your Holiday Calendars?

A printable calendar 2021 is a prominent online platform where you download printable calendars of your choice. These calendars can be customized as per our client requirement with photo, text, logo, or any other image. If you are thinking of planning a dream vacation tour with family and kids but...

see post

How To Throw The Most Amazing Birthday Party For Your Pet?


Birthdays are very special because they come only once a year, and it’s even more special when it’s the birthday of any of your family member, including your pet. That’s correct; celebrating your pet’s birthday is just as special and exciting, especially if you remember their birth date. And even...

How Should I Start to Train my Dog


This article seeks to give a simple overview of how should i start to train my dog. It differentiates between training a new born puppy and older dogs. With regards to how should I start to train my dog, it depends whether you have gotten a newly born puppy or...

10 Smartest Dogs


All dogs are intelligent and have equal emotional needs and equal anatomy. However few dogs are a notch better than others in the intelligence of understanding commands, adapatability etc. I have collated top 10 dogs who are smartest of all. Does your dog ever flabbergast you by her capacity to...

How are Army Dogs Trained?


Army dog training is different from pet training as these dogs are trained under harsh conditions to do tough jobs. To train an army dog, you need to set the standards high, not just for the dog, but also for yourself as a trainer. This article highlights some of the...

Training Is a Must for Puppies to Reach Their Ultimate Potential


Opting to train your puppy is recommended in order to avoid a variety of issues down the road. There are several details that you should take into account prior to embarking in this type of training with your puppy, so that you can ensure everything goes according to plan.  At...

7 Tips On Camping With Your Dog For The First Time


Camping is not merely about outdoor adventure, but it also enables you to rejuvenating your mind amidst the natural environment. You can boost this experience of yours when you plan this expedition with friends. Camping is not merely about outdoor adventure, but it also enables you to rejuvenate your mind...

List of 7 Most Common Dog Health Issues & Treatments


A canine is a heap of adoration, blessing enveloped by hide. On the off chance that you are a fledgling pet parent or have embraced a puppy since years, the basic medical problems can be an obstacle to your pooch's prosperity is a significant concern. At times, even your canine...

Summer Reassurance for Your Pooch — Nexgard Tasty Chews


Various treatments are available for the prevention of fleas on the dogs and protects them from the flea and tick infestations. Here we will learn in depth about the product Nexgard.   Everyone must have heard of the song Summer of ’69, wow that song must have brought out the memories...

Three Aspect That Changes Dog’s Personality


Different life events and habits tend to influence the personalities of different people. Surprisingly, dog’s personalities tend to change in a similar manner as they age. Although personalities may vary from species to the other, most dogs will become less active and less curious over time. Dogs can change significantly...

Dog's Diet


A well-balanced, nutritious diet is vital in keeping your dog healthy and happy. However, with many available diets, selecting the right diet for your dog can present a significant challenge. Domesticated dogs are primarily carnivores, but they tend to be omnivores in dieting. However, when deciding on what diet to...

Search topic

Dog's Diet

A well-balanced, nutritious diet is vital in keeping your dog healthy and happy. However, with many available diets, selecting the right diet for your dog can present a significant challenge. Domesticated dogs are primarily carnivores, but they tend to be omnivores in dieting. However, when deciding on what diet to...

Learn more