Null or Default Passwords | Leaving administrative passwords blank or using a default
password set by the product vendor. This is most common in
hardware such as routers and firewalls, though some services that
run on Linux can contain default administrator passwords (though
Red Hat Enterprise Linux does not ship with them). | Commonly associated with networking
hardware such as routers, firewalls, VPNs, and network
attached storage (NAS) appliances. | Common in
many legacy operating systems, especially OSes that bundle
services (such as UNIX and Windows.) | Administrators sometimes create privileged user accounts in a
rush and leave the password null, a perfect entrypoint for
malicious users who discover the account. |
|
Default Shared Keys | Secure services sometimes
package default security keys for development or evaluation
testing purposes. If these keys are left unchanged and are placed
in a production environment on the Internet,
all users with the same default keys have
access to that shared-key resource, and any sensitive information
contained in it. | Most common
in wireless access points and preconfigured secure server
appliances. | CIPE (refer to Chapter 6 Virtual Private Networks) contains a sample static key that must be
changed before deployment in a production
environment. |
|
IP Spoofing | A remote machine acts as a node on
your local network, finds vulnerabilities with your servers, and
installs a backdoor program or trojan horse to gain control over your
network resources. | Spoofing is quite difficult as it involves the
attacker predicting TCP/IP SYN-ACK numbers to coordinate a
connection to target systems, but several tools are available to
assist crackers in performing such a vulnerability. | Depends on target system running services (such as
rsh, telnet, FTP and others)
that use source-based authentication
techniques, which are not recommended when compared to PKI or
other forms of encrypted authentication used in
ssh or SSL/TLS. |
|
Eavesdropping | Collecting data that passes between two active nodes on a
network by eavesdropping on the connection between the two
nodes. | This type of attack works mostly with plain text
transmission protocols such as Telnet, FTP, and HTTP
transfers. | Remote attacker must have
access to a compromised system on a LAN in order to perform
such an attack; usually the cracker has used an active attack
(such as IP spoofing or man-in-the-middle) to compromise a
system on the LAN. | Preventive
measures include services with cryptographic key exchange,
one-time passwords, or encrypted authentication to prevent
password snooping; strong encryption during transmission is
also advised. |
|
Service Vulnerabilities | An attacker finds a
flaw or loophole in a service run over the Internet; through this
vulnerability, the attacker compromises the entire system and
any data that it may hold, and could possibly compromise other
systems on the network. | HTTP-based services such as CGI are
vulnerable to remote command execution and even interactive shell
access. Even if the HTTP service runs as a non-privileged user such
as "nobody", information such as configuration files and network
maps can be read, or the attacker can start a denial of service
attack which drains system resources or renders it unavailable to
other users. | Services sometimes can have
vulnerabilities that go unnoticed during development and testing;
these vulnerabilities (such as buffer
overflows, where attackers crash a service using
arbitary values that fill the memory buffer of an application,
giving the attacker an interactive command prompt from which they
may execute arbitrary commands) can give complete administrative
control to an attacker. | Administrators should make
sure that services do not run as the root user, and should stay
vigilant of patches and errata updates for applications from vendors
or security organizations such as CERT and CVE. |
|
Application Vulnerabilities | Attackers find
faults in desktop and workstation applications (such as e-mail
clients) and execute arbitrary code, implant trojan horses for
future compromise, or crash systems. Further exploitation can
occur if the compromised workstation has administrative privileges
on the rest of the network. | Workstations and desktops are more prone to exploitation as
workers do not have the expertise or experience to prevent or
detect a compromise; it is imperative to inform individuals of the
risks they are taking when they install unauthorized software or
open unsolicited email attachments. | Safeguards
can be implemented such that email client software does not
automatically open or execute attachments. Additionally, the
automatic update of workstation software via Red Hat Network or other system
management services can alleviate the burdens of multi-seat
security deployments. |
|
Denial of Service (DoS) Attacks | Attacker or
group of attackers coordinate against an organization's network or
server resources by sending unauthorized packets to the target
host (either server, router, or workstation). This forces the
resource to become unavailable to legitimate users. | The most reported DoS case in
the US occurred in 2000. Several highly-trafficked commercial
and government sites were rendered unavailable by a coordinated
ping flood attack using several compromised systems with high
bandwidth connections acting as zombies, or
redirected broadcast nodes. | Source
packets are usually forged (as well as rebroadcasted), making
investigation as to the true source of the attack difficult. | Advances in ingress filtering (IETF rfc2267)
using iptables and Network IDSes such as
snort assist administrators in tracking down
and preventing distributed DoS
attacks. |
|