Null or Default Passwords |
Leaving administrative passwords blank or using a default
password set by the product vendor. This is most common in hardware
such as routers and firewalls, though some services that run on
Linux can contain default administrator passwords (though Red Hat
Enterprise Linux does not ship with them). |
Commonly associated with networking hardware such as routers,
firewalls, VPNs, and network attached storage (NAS)
appliances. |
Common in many legacy operating systems, especially OSes that
bundle services (such as UNIX and Windows.) |
Administrators sometimes create privileged user accounts in a
rush and leave the password null, a perfect entrypoint for
malicious users who discover the account. |
|
Default Shared Keys |
Secure services sometimes package default security keys for
development or evaluation testing purposes. If these keys are left
unchanged and are placed in a production environment on the
Internet, all users with the same default
keys have access to that shared-key resource, and any sensitive
information contained in it. |
Most common in wireless access points and preconfigured secure
server appliances. |
CIPE (refer to Chapter 6 Virtual
Private Networks) contains a sample static key that must be
changed before deployment in a production environment. |
|
IP Spoofing |
A remote machine acts as a node on your local network, finds
vulnerabilities with your servers, and installs a backdoor program
or trojan horse to gain control over your network resources. |
Spoofing is quite difficult as it involves the attacker
predicting TCP/IP SYN-ACK numbers to coordinate a connection to
target systems, but several tools are available to assist crackers
in performing such a vulnerability. |
Depends on target system running services (such as rsh, telnet, FTP and
others) that use source-based
authentication techniques, which are not recommended when compared
to PKI or other forms of encrypted authentication used in
ssh or SSL/TLS. |
|
Eavesdropping |
Collecting data that passes between two active nodes on a
network by eavesdropping on the connection between the two
nodes. |
This type of attack works mostly with plain text transmission
protocols such as Telnet, FTP, and HTTP transfers. |
Remote attacker must have access to a compromised system on a
LAN in order to perform such an attack; usually the cracker has
used an active attack (such as IP spoofing or man-in-the-middle) to
compromise a system on the LAN. |
Preventive measures include services with cryptographic key
exchange, one-time passwords, or encrypted authentication to
prevent password snooping; strong encryption during transmission is
also advised. |
|
Service Vulnerabilities |
An attacker finds a flaw or loophole in a service run over the
Internet; through this vulnerability, the attacker compromises the
entire system and any data that it may hold, and could possibly
compromise other systems on the network. |
HTTP-based services such as CGI are vulnerable to remote
command execution and even interactive shell access. Even if the
HTTP service runs as a non-privileged user such as "nobody",
information such as configuration files and network maps can be
read, or the attacker can start a denial of service attack which
drains system resources or renders it unavailable to other
users. |
Services sometimes can have vulnerabilities that go unnoticed
during development and testing; these vulnerabilities (such as
buffer overflows, where attackers crash a
service using arbitary values that fill the memory buffer of an
application, giving the attacker an interactive command prompt from
which they may execute arbitrary commands) can give complete
administrative control to an attacker. |
Administrators should make sure that services do not run as the
root user, and should stay vigilant of patches and errata updates
for applications from vendors or security organizations such as
CERT and CVE. |
|
Application Vulnerabilities |
Attackers find faults in desktop and workstation applications
(such as e-mail clients) and execute arbitrary code, implant trojan
horses for future compromise, or crash systems. Further
exploitation can occur if the compromised workstation has
administrative privileges on the rest of the network. |
Workstations and desktops are more prone to exploitation as
workers do not have the expertise or experience to prevent or
detect a compromise; it is imperative to inform individuals of the
risks they are taking when they install unauthorized software or
open unsolicited email attachments. |
Safeguards can be implemented such that email client software
does not automatically open or execute attachments. Additionally,
the automatic update of workstation software via Red Hat Network or
other system management services can alleviate the burdens of
multi-seat security deployments. |
|
Denial of Service (DoS) Attacks |
Attacker or group of attackers coordinate against an
organization's network or server resources by sending unauthorized
packets to the target host (either server, router, or workstation).
This forces the resource to become unavailable to legitimate
users. |
The most reported DoS case in the US occurred in 2000. Several
highly-trafficked commercial and government sites were rendered
unavailable by a coordinated ping flood attack using several
compromised systems with high bandwidth connections acting as
zombies, or redirected broadcast
nodes. |
Source packets are usually forged (as well as rebroadcasted),
making investigation as to the true source of the attack
difficult. |
Advances in ingress filtering (IETF rfc2267) using iptables and Network IDSes such as snort assist administrators in tracking down and
preventing distributed DoS attacks. |
|