Null or Default Passwords | Leaving administrative passwords blank or using a default
password provided by the application package. This is most common in
hardware such as routers and BIOSes, though some services that run
on Linux can contain default administrator passwords (though Red Hat Linux
does not ship with them) | Commonly associated with networking
hardware such as routers, firewalls, VPNs and network attached
storage (NAS) appliances; | Common in many
legacy operating systems, especially OSes that bundle services
such as UNIX and Windows; | Administrators
sometimes create privileged users in a rush and leave the
password null, a perfect entrypoint for malicious users who
discover the user |
|
Default Shared Keys | Secure services sometimes
package default security keys for development or evaluation testing
purposes. If these keys are left unchanged and placed in a
production environment on the Internet, any
user with the same default keys have access to that shared-key
resource, and any sensitive information contained in it | Most common in wireless APs and
preconfigured secure server appliances | CIPE (refer
to Chapter 6) contains an sample static key that must
be changed before moving to a production
environment |
|
IP Spoofing | A remote machine acts as a node on
your local network, finds vulnerabilities with your servers, and
installs a backdoor program or trojan to gain control over your
network resources. | Spoofing is
quite difficult as it involves the attacker predicting TCP/IP
SYN-ACK numbers to coordinate a connection to target systems, but
several tools are available to assist crackers in performing such a
vulnerability | Depends on target system running
services (such as rsh, telnet,
FTP and others) that use source-based
authentication techniques, which are not usually recommended
compared to PKI or other forms of encryption authentication as used
in ssh or SSL/TLS. |
|
Eavesdropping | Collecting data that passes between two active nodes on a
network by eavesdropping the connection between the two
nodes. | This type of attack works mostly with plain text transmission
protocols such as telnet, FTP, and HTTP transfers. | Remote attacker must have access to a compromised
system on a LAN in order to perform such an attack; usually
the cracker has used an active attack (such as IP spoofing or
Man-in-the-middle) to compromise a system on the LAN | Preventative measures include services with
cryptographic key exchange, one-time passwords, or encrypted
authentication to prevent password snooping; strong encryption
during transmission also advised |
|
Service Vulnerabilities | An attacker finds a
flaw or loophole in a service run over the Internet; through this
vulnerability, the attacker compromises the entire system and and
any data that it may hold and could possibly compromise other
systems on the network. | HTTP-based services such as CGI are
vulnerable to remote command executions and even shell access. Even
if the HTTP service runs as a non-privileged user such as "nobody",
information such as configuration files and network maps can be
read, or the attacker can start a denial of service attack which
drains system resources or renders it unavailable to other
users. | Services sometimes can have vulnerabilities
that go unnoticed during development and testing; these
vulnerabilities (such as buffer overflow,
where attackers gain access by filling addressable memory with a
quantity over what is acceptable by the service, crashing the
service and giving the attacker an interactive command prompt from
which they may execute arbitrary commands. | Administrators should make sure that services do not run
as the root user; stay vigilant of patches and errata updates for
their applications from vendors or security organizations such as
CERT and CVE. |
|
Application Vulnerabilities | Attackers find
faults in desktop and workstation applications such as e-mail
clients and execute arbitrary code, implant trojans for future
compromise, or crash systems. Further exploitation can occur if
the compromised workstation has administrative privileges on the
rest of the network. | Workstations and desktops are more prone to exploitation
because workers do not have the expertise or experience to prevent
or detect a compromise as servers run by an administrator; it is
imperative to inform individuals of the risks they are taking when
they install unauthorized software or open unsolicited
mail | Safeguards can be implemented such that
email client software does not automatically open or execute
attachments. Additionally, the automatic updating of workstation
software via Red Hat Network or other system management service can
alleviate the burdens of multi-seat security
deployments. |
|
Denial of Service (DoS) Attacks | Attacker or
group of attackers coordinate an attack on network or server
resources by sending unauthorized packets to the target machine
(either server, router, or workstation). This forces the resource
to become unavailable to legitimate users. | The most reported DoS case occurred in
2000 when several highly-trafficked sites were rendered
unavailable by a coordinated ping flood attack using several
compromised systems with high bandwidth connections acting as
redirected broadcasters | Source packets are
usually forged (as well as rebroadcasted), making investigation to
the true source of the attack difficult. | Advances
in ingress filtering (IETF rfc2267), and Network IDS technology
assist administrators in tracking down and preventing distributed
DoS attacks. |
|