19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

268<br />

Part V: Hacking Applications<br />

Operating guidelines<br />

Some simple operating rules can keep your walls high and the attackers out<br />

of your e-mail systems:<br />

✓ Put your e-mail server behind a firewall on a different network segment<br />

from the Internet and from your internal LAN — ideally in a demilitarized<br />

zone (DMZ).<br />

✓ Harden by disabling unused protocols and services on your e-mail<br />

server.<br />

✓ Run your e-mail server and malware scanning on dedicated servers if<br />

possible (potentially even separating inbound and outbound messages).<br />

Doing so can keep malicious attacks out of other servers and information<br />

in the event the e-mail server is hacked.<br />

✓ Log all transactions with the server in case you need to investigate malicious<br />

use. Be sure to monitor these logs as well! If you cannot justify<br />

monitoring, consider outsourcing this function to a managed security<br />

services provider.<br />

✓ If your server doesn’t need certain e-mail services running (SMTP, POP3,<br />

and IMAP), disable them — immediately.<br />

✓ For web-based e-mail, such as Microsoft’s Outlook Web Access (OWA),<br />

properly test and secure your web server application and operating<br />

system by using the testing techniques and hardening resources I mention<br />

throughout this book.<br />

✓ Require strong passwords. Be it standalone accounts or domain-level<br />

Exchange or similar accounts, any password weaknesses on the network<br />

will trickle over to e-mail and surely be exploited by someone via<br />

Outlook Web Access or POP3. I cover password hacking in Chapter 7.<br />

✓ If you’re running sendmail — especially an older version — consider<br />

running a secure alternative, such as Postfix (www.postfix.org) or<br />

qmail (www.qmail.org).<br />

Understanding Voice over IP<br />

One of the hottest technologies blowing through town these days is undoubtedly<br />

Voice over IP (VoIP). Whether it’s in-house VoIP systems or systems<br />

for remote users, VoIP servers, soft phones, and other related components<br />

have a slew of vulnerabilities. Like most things security-related, many people

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!