19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110<br />

Part II: Putting Ethical Hacking in Motion<br />

Keystroke logging<br />

One of the best techniques for capturing passwords is remote keystroke<br />

logging — the use of software or hardware to record keystrokes as they’re<br />

typed into the computer.<br />

Be careful with keystroke logging. Even with good intentions, monitoring<br />

employees raises various legal issues if it’s not done correctly. Discuss<br />

with your legal counsel what you’ll be doing, ask for their guidance, and get<br />

approval from upper management.<br />

Logging tools<br />

With keystroke-logging tools, you can assess the log files of your application<br />

to see what passwords people are using:<br />

✓ Keystroke-logging applications can be installed on the monitored computer.<br />

I recommend that you check out eBlaster and Spector Pro by<br />

SpectorSoft (www.spectorsoft.com). Another popular tool is Invisible<br />

KeyLogger Stealth, available at www.amecisco.com/iks.htm. Dozens<br />

of other such tools are available on the Internet.<br />

✓ Hardware-based tools, such as KeyGhost (www.keyghost.com), fit<br />

between the keyboard and the computer or replace the keyboard<br />

altogether.<br />

A keystroke-logging tool installed on a shared computer can capture the passwords<br />

of every user who logs in.<br />

Countermeasures<br />

The best defense against the installation of keystroke-logging software on<br />

your systems is to use an anti-malware program or similar endpoint protection<br />

software that monitors the local host. It’s not foolproof but can help. As<br />

for physical keyloggers, you’ll need to visually inspect each system.<br />

The potential for hackers to install keystroke-logging software is another<br />

reason to ensure that your users aren’t downloading and installing random<br />

shareware or opening attachments in unsolicited e-mails. Consider locking<br />

down your desktops by setting the appropriate user rights through local or<br />

group security policy in Windows. Alternatively, you could use a commercial<br />

lockdown program, such as Fortres 101 (www.fortresgrand.com) for<br />

Windows or Deep Freeze Enterprise (www.faronics.com/products/deepfreeze/enterprise)<br />

for Windows, Linux, and Mac OS X.<br />

Weak password storage<br />

Many legacy and standalone applications, such as e-mail, dial-up network<br />

connections, and accounting software, store passwords locally, making them<br />

vulnerable to password hacking. By performing a basic text search, I’ve found<br />

passwords stored in cleartext on the local hard drives of machines. You can<br />

automate the process even further by using a program called Identity Finder

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!