background image

11

 

 

What is the company’s response if any of the claims are falsified?  Are there legal 
obligations for customer notifications?  For product replacement?  For liability? 

 

Are there clear indications the product is working and doing its job properly? Are their 

indications when the product is not doing its job properly?  Are there diagnostics that can be 

run to test the product out periodically?  

 

Okay - why are we talking about something so specific when this whitepaper is about security as a 

holistic enterprise?  To ensure that everyone understands that security technology has to deal with the 

Verification Problem in much the same way as scientific theories do.  There may come a day when an 

announcement is made that the security technology you rely on isn’t as secure as you originally 
thought when you deployed it (i.e., “What do you mean that the world isn’t really flat?”).  Such an 

announcement may result in a “cold prickly” feeling rather than a “warm fuzzy” feeling, especially if 

you relied solely on that technology without regard to the people around it.  

 
The good news is that more than likely your security won’t be compromised by the techniques listed in 

this section. The bad news is there are much easier ways of compromising your security.  The really 

bad news is when Security is not viewed as a Holistic Enterprise, these ways are almost trivial.   Let’s 

look at a few exploits of an imaginary unethical hacker. 
  

Confessions of an Unethical Hacker – Part 1

 

 

It was hard for the last few weeks to wake up on a Friday morning and hit the bar, but that is where a 
person that I will call X and his peers came in after work.  They worked the late shift as a clean up 
crew for Company Y – Sunday night from 11pm to 4am through Thursday night.  Friday morning, 
they always stopped in for a few drinks.  I had got to know X and decided the time was right to show 
him my fake business card – “Certified Ethical Hacker and Licensed Penetration Tester”.  That 
always got a laugh.  You see, I told X, the company that employs you hired me to break into their 
network.  If I can, they’ll give me a bonus.  I’m willing to give you that bonus if you help me.  If you 
are caught, it is okay as I’ll simply say that you work for me, and they’ve promised me that nothing 
will happen – after all, they are paying me to do this.  X seemed skeptical, but after I told him how 
much the bonus was and showed him my fake contract, he was all for it.  It is really simple, I told X, 
just go by each printer and MFP they have, get the documents that are in the “to be picked up” pile – 
you know, the documents that people have printed and have forgotten to pick up, place them in an 
MFP, send them to this email address, and then put them back were they were before.  That is it – 
you don’t need to take anything or even do anything illegal.  Do this once a week, preferably on 
Friday, for a month and the bonus is yours!  I even showed him a video on my laptop of exactly what 
he needed to do on the control panel of the MFP – basically put papers in the scanner, press the 
“email” button, type in the email address, and then hit “start”.  A month later, I had a lot of 
information for that company’s competitor – quite amazing what employees print out and don’t ever 
pick up.  

 
 

Confessions of an Unethical Hacker – Part 2

 

 

I love Halloween.  Company Y has a few buildings, a few hundred people, and they always have a 
Halloween get together where everyone dresses up.  The day is pretty easy – not much real work 
getting done – and the vast majority of people don’t actually know each other.  People bring their 
kids in, have some fun, play some games, and rarely are ever at their cubes.  I always show up a bit 
early dressed up like the Headless Horseman – we’ll, with a pumpkin as a head – since I don’t want 
anyone to know who I am.  I’m carrying a lot of trays filled with cookies – not because I’m a sweet 
guy, but because I need someone to open the door for me.  I have an employee badge – not a real 
one, but a fake one.  It doesn’t work on the card control, but I have it hanging around my neck 
anyway.  They are so easy to fake with modern color printers and most employees will leave them on 
the dashboard of their car while at the gas station or local grocery store – so I know just what they 
look like.  Just have the “badge” hanging around your neck and have your hands full and the door 
will get opened for you.  Everyone is so helpful.  Once inside, I just walk around – check out the 
organizational charts posted everywhere and find where the managers are sitting.  I plant a few 

Содержание Jetdirect 310x - Print Server For Fast Ethernet

Страница 1: ...owing how easy it is to exploit various vulnerabilities The intention is to scare you into performing the steps outlined by the whitepaper or buy the technology the whitepaper promotes We are not going to do that here This introduction to security endeavors to step back and look at security more generally and apply some basic philosophical concepts to help understand security in a more meaningful ...

Страница 2: ...y mistake is when a tour of a university is given to a new student The tour guide takes the new student around the various buildings the school of engineering the library and so on After the tour is over the new student says something to the effect of that was all very nice but where is the university The new student has made a category mistake they assumed the university was a building micro rath...

Страница 3: ...he least amount of assumptions everything else being equal This principle lends itself well to security considerations as it tends to show how flexibility and complexity can be viewed as untested assumptions For instance there are a wide variety of ways to secure a communication session For a given level of security that is desired these various ways can be compared in terms of their flexibility a...

Страница 4: ... horrible breach of security so Example User decides to do some research into the Internet Book Store and the Internet Jewelry Store and found out the following The servers used to store account information are located in a highly secure building more security than his company s buildings The servers used to handle account information meet higher security standards than his company s servers The s...

Страница 5: ...t Enterprise Admin and writing down the passwords for personal accounts that probably use credit cards with fraud protection anyway Simply protect them with the same care as your credit cards and you should be fine Alternatively a file can be created with the passwords and then the file would be encrypted with a pass phrase This procedure allows for the passwords to be managed and stored on the co...

Страница 6: ...setup is outsourced but none of these settings really undermines my network security so I don t mind providing them to my outsourcer So the device has determined it is talking to a trusted management station how does the management station know that it is talking to a trusted device SD We use a proprietary Web Service and keep our Web Services Device Language secret PC Well that is okay I guess as...

Страница 7: ... It is very important to understand what needs to be configured in order to establish these trust anchors for the security of a given solution Also not only what needs to be configured but also who is going to be configuring these items on the device in question What are some of the trust anchors in the previous solution A secure Public Key Infrastructure PKI Easily the most overlooked and hardest...

Страница 8: ... team of engineers that designed it had and then develop a service plan An alternative is to make the assumption that things that break down are usually the moving parts Instead of studying the entire automobile we can now simply study the moving parts and develop a service plan around that This would be an example of using reductionism as a technique to help simplify problems of course they could...

Страница 9: ...nt may in fact be stored by email servers along the way and perhaps deleted as well Note These electronic copies are available on servers that are probably not covered by your security policy There is probably a deleted copy of the PDF on the outsourcer s hard drive when it was viewed via email There is probably a deleted copy of the spool file on the outsourcer s hard drive when it was printed In...

Страница 10: ...ach drive but they kept track of the actual value and correlated it with the serial number A disgruntled employee of the company had posted this serial number to key database to the underground hacking community The customer was upset at what he saw as horrible implementations of security He immediately went and looked at the manufacturer s warranty statements Dismayed he saw that the hard drives ...

Страница 11: ...aught it is okay as I ll simply say that you work for me and they ve promised me that nothing will happen after all they are paying me to do this X seemed skeptical but after I told him how much the bonus was and showed him my fake contract he was all for it It is really simple I told X just go by each printer and MFP they have get the documents that are in the to be picked up pile you know the do...

Страница 12: ... main site I stopped by after disconnecting the outside cable line Networking problems dispatch told me to check it out luckily I was right next door Cool Can it get to your networking equipment Yep right over here In a small wiring closet I connected my access point to a mirrored port on the switch I configured I verified I could connect securely I don t want anyone else to do that and went back ...

Страница 13: ...olutions people solutions are hard There is only one problem the technology solution of requiring domain credentials to digital send doesn t actually solve anything First let s argue with the technology focused solution on its own terms It is never a good idea to supply your domain credentials to a computer that isn t a member of your domain remember our Ockham s Razor example In fact it isn t a g...

Страница 14: ...esses in the United States have a lot of festive things going on at work During these times employees tend to be more helpful and friendlier Halloween even offers the opportunity to disguise your identity and you are usually encouraged to do so Many employees are not thinking about security when they are walking into work Instead they are talking with teammates thinking about a problem they have t...

Страница 15: ...loyees with badges but not really a lot It may take them a few seconds longer to enter the building We haven t achieved the security of Fort Knox I mean someone can just hop over the turnstiles but we weren t trying to deploy the technology of Fort Knox What we are trying to do is allow people to be people but use technology in such a way that it helps them make good security decisions Given an em...

Страница 16: ... through induced stress or through using the helpfulness of people against them This isn t to say that they don t use technology to exploit vulnerabilities it is to say that some of the most devastating attacks may not involve cracking the technology at all Putting people in a position to be successful under such conditions requires a lot of work in itself How Security Technology Can Help People A...

Страница 17: ...All of their laptops and servers have encrypting storage systems and their backups are encrypted and securely stored About 15 of these employees are working on a next generation product that is critical to the success of the business All computers and MFPs are managed by an internal IT team staffed with employees of the company The IT department believes it is a good idea to protect company s inte...

Страница 18: ... at the bottom to see what is being used Have I actually verified the site s certificate when presented with the opportunity to do so An unethical hacker could use technology to direct a user to a false web site when they are thinking they are going to a trusted website The Internet Explorer 6 experience when an untrusted digital certificate is a pop up dialog like this In many cases a user may ju...

Страница 19: ...his is a lot different notice the symbols and explanatory text The way the information is now presented it will grab your attention If we click the Continue to this website not recommended link we get this ...

Страница 20: ... come full circle Summary Many books have been written about security in regards to technology such as how to secure your networking equipment how to test for vulnerabilities in technologies how do deploy patches across the enterprise and so on These are all important topics and require dedicated people to implement and maintain This whitepaper took the approach of stepping back and looking at sec...

Отзывы: