19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

88<br />

Part II: Putting Ethical Hacking in Motion<br />

✓ A receptionist or a security guard who monitors people coming and<br />

going. This is the most critical countermeasure. This person can ensure<br />

that every visitor signs in and that all new or untrusted visitors are<br />

always escorted.<br />

Make it policy and procedure for all employees to question strangers<br />

and report strange behavior in the building.<br />

Employees Only or Authorized Personnel Only signs show the bad guys<br />

where they should go instead of deterring them from entering. It’s security<br />

by obscurity, but not calling attention to the critical areas may be<br />

the best approach.<br />

✓ Single entry and exit points to a data center.<br />

✓ Secure areas for dumpsters.<br />

✓ CCTV or IP-based video cameras for monitoring critical areas, including<br />

dumpsters.<br />

✓ Cross-cut shredders or secure recycling bins for hard-copy documents.<br />

✓ Limited numbers of keys and passcode combinations.<br />

Make keys and passcodes unique for each person whenever possible<br />

or, better yet, don’t use them at all. Use electronic badges that can be<br />

better controlled and monitored instead.<br />

✓ Biometrics identification systems can be very effective, but they can<br />

also be expensive and difficult to manage.<br />

Network components and computers<br />

After hackers obtain physical access to a building, they look for the computer<br />

room and other easily accessible computer and network devices.<br />

Attack points<br />

The keys to the kingdom are often as close as someone’s desktop computer<br />

and not much farther than an unsecured computer room or wiring closet.<br />

Malicious intruders can do the following:<br />

✓ Obtain network access and send malicious e-mails as a logged-in user.<br />

✓ Crack and obtain passwords directly from the computer by booting it<br />

with a tool such as the ophcrack LiveCD (http://ophcrack.source<br />

forge.net). I cover this tool and more password hacks in Chapter 7.<br />

✓ Place penetration drop boxes such as those made by Pwnie Express<br />

(http://pwnieexpress.com) in a standard power outlet. These<br />

devices allow a malicious intruder to connect back into the system via

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!