Hacker Threat Analyzed

moghrabi

House Member
May 25, 2004
4,508
4
38
Canada
Hacker Threat Analyzed

The hacker threat is the most dangerous, and most difficult to protect against, of all threats facing home users and company networks. Unlike with just some code, where you can use its own logic to defeat it, a hacker is a "real" thinking person who will react to your actions and try to circumvent logic based defenses by often behaving illogically.

Whole books have been written on this subject so it's a difficult area to cover in just a few lines. Despite the existence of your firewall you do have to allow some traffic through a firewall and you run applications behind a firewall. Even if this is just browsers running Internet Explorer and browsing web sites then you are still vulnerable to a whole raft of attacks. Also not all risks come from the outside. Inside hacking is also a potential problem.

OK, it is certainly no understatement to suggest that for every line of code ever written there's a potential vulnerability waiting for exploitation. While hackers and crackers are constantly looking for new vulnerabilities, the tools and techniques they employ are almost always variations of previous attacks. Bear in mind that no list of vulnerabilities and exploits is ever complete!

So what are some of the methods used to used to hack and crack your networks?

• IP Spoofing
• FTP attacks
• Flooding and Broadcasting
• Fragmented Packet Attacks
• E-Mail Exploits
• DNS Server exploits
• Password attacks
• Proxy Server attacks
• Remote File System attacks
• Selective Program Insertion
• Port Scanning
• TCP/IP sequence manipulation
• Web Server attacks
• Behind the firewall attacks
• Active X controls

There are any number of methods, as shown above, that can be used to try and gain access to your network and the problem with many networks is that they are integrated on the inside of the firewall. This means that once an attacker can get inside your firewall and see the network the way you see it, well - the rest becomes almost trivial.

What are the hackers' objectives?

Whilst there are as many motives as there are hackers, it is possible to broadly categories them into 5 main typical stereotypes, though this is by no means intended to be an exhaustive list:

1. "White-Hat Hackers" looking for vulnerabilities in systems so that they can gain respect by making the computer community aware of security vulnerabilities. Rarely cause damage but it can be very damaging and embarrassing if they show these vulnerabilities using your set-up.
2. "Thrill-seekers" who gain pleasure from hacking into systems. These can vary widely and may or may not cause damage to systems depending on their specific "thrill".
3. Criminals who seek to extract information for monetary or other gain. These are usually after something quite specific i.e. customer lists, credit card information, etc.
4. Politically motivated hackers. These can include all those who hack for a political motive and can include anarchists, communists and terrorists. They can be very destructive since their ultimate aim may be to destabilize the whole infrastructure of a company, country or region.
5. Industrial spies. Never underestimate the potential that the Internet has brought for competitors to "check-up on" or "check-out" their competition. Most of the time this is legal i.e. reading the information you yourself make public, but the Rubicon into spying can sometimes be crossed - remember, not everyone necessarily shares your business ethics, particularly when hard times strike! Some companies now even advertise industrial espionage services. It is safer to be suspicious and alert to all potential threats.

What can I do to protect myself?

1. Know thy enemy - learn the techniques and think about how you can counter them
2. Regularly scan your network for vulnerabilities - both inside and out
3. Separate your private network from your public servers such as email, proxy servers, web servers, DNS servers, etc. Double firewalling can do this.
4. Use strong passwords including special characters such as £$%@. Your password is often your first and last line of defense. Certainly do not have ANY blank passwords. Password security also applies to network hardware.
5. Do not use the same administrator/root password throughout your organization. It may be convenient for you but it is also convenient for an intruder.
6. Harden the operating system on your critical servers and perhaps even on user workstations.
7. Turn off unnecessary services - minimalism is a good thing!
8. Apply the latest security patches to ALL the applications that run.
9. Deploy good intrusion detection (better still prevention), baseline your configurations so you can detect any changes.
10. Deploy additional perimeter protection against virus in emails, web pages, ftp downloads, etc
11. Do not allow your staff to download Active X controls into their browsers. The Active X technology can give almost total control over a PC and its resources from a remote location and should only be used on Intranets.
12. Do not allow external access to your proxy servers and DNS servers. On DNS servers turn-off recursive lookup.
13. Turn off unnecessary Microsoft and other File and Print sharing services. Allocate specific servers as file sharers and turn-off workstation shares. Consider using Print sharing devices rather than PC's for sharing printers.
14. Have a security standards policy and ensure that compliance against is regularly checked.
15. Be VERY alert at all times and make yourself familiar with all your configurations.
16. Make backups of new server installations immediately after installation. This way you can return to a "clean" installation quite easily.
 

Haggis McBagpipe

Walks on Forum Water
Jun 11, 2004
5,085
7
38
Victoria, B.C.
A question for the computer experts on this forum: I read a long time ago that the majority of viruses and such were aimed at attacking Microsoft products, that the hackers were often disgruntled ex-Microsoft employees hell-bent on revenge. Or is Microsoft more often the target because of the tendency for security holes... or is it really just because most stuff is Microsoft? I would be curious to know.

Why, other than the fact that there are less Mac and Unix users, are so few viruses created to attack those systems?
 

moghrabi

House Member
May 25, 2004
4,508
4
38
Canada
Snooker,

It is the same article, But I got it from an email sent to me. There are a lot of sources that mirror each other. But thank you for the new link. Another one for me to read.
 

moghrabi

House Member
May 25, 2004
4,508
4
38
Canada
Haggis McBagpipe said:
A question for the computer experts on this forum: I read a long time ago that the majority of viruses and such were aimed at attacking Microsoft products, that the hackers were often disgruntled ex-Microsoft employees hell-bent on revenge. Or is Microsoft more often the target because of the tendency for security holes... or is it really just because most stuff is Microsoft? I would be curious to know.

Why, other than the fact that there are less Mac and Unix users, are so few viruses created to attack those systems?

In my opinion, there are a lot of MS systems out there, so the probibility of attacks is higher. Hackers are also not happy with the monopoly MS is playing in the market so they give them a run for their money.

Every system out there connected to the net is vulnerable to same kind of attacks if the hackers wanted to. But MS seems to be the target. The holes you find in MS products are found in a lot of other OS's but we don't hear about them.

Some people might disagree with me, but i can actually hack a Novell network if I put my energy to it.
 

moghrabi

House Member
May 25, 2004
4,508
4
38
Canada
LOL. I'll be fired from my job. But what I said is true considering the number of MS software installed. I really do not have any problems with MS since I follow all of their procedures. You have to be on top of things nowadys no matter which OS you are using.
 

Haggis McBagpipe

Walks on Forum Water
Jun 11, 2004
5,085
7
38
Victoria, B.C.
I'd like to pick your brains a bit more on this. How safe is it to do one's banking online? I do it quickly then delete the browser history and cache immediately afterwards. Is this enough?

Also, how the heck do you 'close ports'??
 

moghrabi

House Member
May 25, 2004
4,508
4
38
Canada
Banking online is very safe as long as you do not have a trojan horse or a keylogger installed in your system. You can download few antittojan programs that are free and do a very good job. I'll give you a list of free ones later. For a very good one and you have to buy is Pest Patrol. It is the most powerful of all and has resident monitor such as antivirus programs that will not allow your system to be compromised.

How to close ports. This is a very technical question. Do you have a firewall such as zone alarm. Zone alarm opens the appropriate ports when needed and then closes them. Tiny firewall does the same. Ports are like doors in your system and needed for many programs. So you should not go about closing ports randomly.

As for clearing the cache after online banking, it is a very good idea.

So install a good firewall, antitrojan and clear your cache. Do not forget to install all patches for your system. After that do your online banking slowly and with no fears.
 

Haggis McBagpipe

Walks on Forum Water
Jun 11, 2004
5,085
7
38
Victoria, B.C.
moghrabi said:
I'll give you a list of free ones later. For a very good one and you have to buy is Pest Patrol.

Do you have a firewall such as zone alarm. Zone alarm opens the appropriate ports when needed and then closes them. Tiny firewall does the same. Ports are like doors in your system and needed for many programs. So you should not go about closing ports randomly.

Hey, thanks Moghrabi! I do have firewall protection, it comes with OS X, and is based on ipfw, but was not sure this was enough. You have helped explain it in a way that I can understand, thank you.

Is Pest Control and others useable with unix-based OS X?