Previous | Table of Contents | Next |
Overview of the Methodology
To perform a useful SHA, the different types of hackers must be identified and understood. The stereotype of a hacker as a brilliant computer science graduate sitting in a laboratory in a remote part of the world is a dangerous misconception. Although such hackers exist, the majority of security breaches are performed by staff members of the breached organization. Hackers can be categorized into four types:
The objective of the SHA is to use any conceivable method to compromise system security. Each of the four hacker types must be considered to assess fully all potential security exposures.
POPULAR HACKER TECHNIQUES
The following sections describe the techniques most commonly used by hackers to gain access to various corporate systems. Each section discusses a hacker technique and proposes basic controls that can be implemented to help mitigate these risks. The network administrator should attempt each of these techniques and should tailor the procedures to suit the organizations specific environment.
Accessing the Log-In Prompt
One method of gaining illegal access to a computer system is through the log-in prompt. This situation may occur when the hacker is physically within the facility or is attempting to access the system through a dial-in connection.
Physical Access
An important step in securing corporate information systems is to ensure that physical access to computer resources is adequately restricted. Any internal or external person who gains physical access to a terminal is given the opportunity to attempt to sign on at the log-in prompt.
To reduce the potential for unauthorized system access by way of a terminal within the organizations facility, the network administrator should ensure that:
Dial-in Access
Another method of accessing the log-in prompt is to dial in to the host. Many daemon dialers are readily available on the Internet. These programs, when given a range of numbers to dial, can identify valid modem numbers. Once a hacker discovers an organizations modem number, he or she can dial in and, in most cases, immediately gain access to the log-in prompt.
To minimize the potential for security violations by way of dial-in network access, the network administrator should ensure that:
Obtaining Passwords
Once the hacker has gained access to an organizations log-in prompt, he or she can attempt to sign on to the system. This procedure requires a valid user ID and password combination.
Brute Force Attacks
Brute force attacks involve manual or automated attempts to guess valid passwords. A simple password guessing program can be written in approximately 60 lines of C code or 40 lines of PERL. Many password guessing programs are available on the Internet. Most hackers have a password hit list, which is a collection of default passwords automatically assigned to various system accounts whenever they are installed. For example, the default password for the guest account in most UNIX systems is guest.
To protect the network from unauthorized access, the network administrator should ensure that:
Previous | Table of Contents | Next |