Workstations and home PCs may not be as prone to attack as networks or
servers, but since they often contain sensitive data, such as credit
card information, they are targeted by system crackers. Workstations can
also be co-opted without the user's knowledge and used by attackers as
"slave" machines in coordinated attacks. For these reasons, knowing the
vulnerabilities of a workstation can save users the headache of
reinstalling the operating system, or worse, recovering from data theft.
Bad passwords are one of the easiest ways for an attacker to gain
access to a system. For more on how to avoid common pitfalls when
creating a password, refer to Section 4.3 Password Security.
Although an administrator may have a fully secure and patched server,
that does not mean remote users are secure when accessing it. For
instance, if the server offers Telnet or FTP services over a public
network, an attacker can capture the plain text usernames and
passwords as they pass over the network, and then use the account
information to access the remote user's workstation.
Even when using secure protocols, such as SSH, a remote user may be
vulnerable to certain attacks if they do not keep their client
applications updated. For instance, v.1 SSH clients are vulnerable to
an X-forwarding attack from malicious SSH servers. Once connected to
the server, the attacker can quietly capture any keystrokes and mouse
clicks made by the client over the network. This problem was fixed in
the v.2 SSH protocol, but it is up to the user to keep track of what
applications have such vulnerabilities and update them as necessary.
Chapter 4 Workstation Security discusses in more detail what steps administrators
and home users should take to limit the vulnerability of computer
workstations.