19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

312<br />

Part V: Hacking Applications<br />

Finding storage systems on the network<br />

To seek out storage-related vulnerabilities, you have to figure out what information<br />

is where. The best way to get rolling is to use a port scanner and, ideally,<br />

an all-in-one vulnerability scanner, such as QualysGuard or LanGuard.<br />

Also, given that many storage servers have web servers built in, you can<br />

use such tools as Acunetix Web Vulnerability Scanner and WebInspect to<br />

uncover web-based flaws. You can use these vulnerability scanners to gain<br />

good insight into areas that need further inspection, such as weak authentication,<br />

DNS server name pollution, unpatched operating systems, unprotected<br />

web servers, and so on.<br />

A commonly overlooked storage vulnerability is that many storage systems<br />

can be accessed from both the de-militarized zone (DMZ) segment and the<br />

internal network segment(s). This vulnerability poses risks to both sides of<br />

the network. Be sure to manually assess whether you can reach the DMZ from<br />

the internal network and vice versa.<br />

You can also perform basic file permission and share scans (as outlined in<br />

Chapter 11) in conjunction with a text search tool to uncover sensitive information<br />

that everyone on the network should not have access to.<br />

Rooting out sensitive text in network files<br />

An important authenticated test to run on your storage systems is to scan<br />

for sensitive information stored in readily accessible text files. It’s as simple<br />

as using a text search utility, such as FileLocator Pro or Effective File Search<br />

(www.sowsoft.com/search.htm). Alternatively, you can use Windows<br />

Explorer to scan for sensitive information, but it’s just too slow and cumbersome<br />

for my liking.<br />

You’ll be amazed at what you come across stored insecurely on users’<br />

Windows desktops, server shares, and more, such as<br />

✓ Employee health records<br />

✓ Customer credit card numbers<br />

✓ Corporate financial reports<br />

Such sensitive information should not only be protected by good business<br />

practices, but is also governed by state, federal, and international regulations.<br />

Do your searches for sensitive text while you’re logged in to the local system<br />

or domain as a regular user — not as an administrator. This will give you a<br />

better view of regular users who have unauthorized access to sensitive files<br />

and shares that you thought were otherwise secure. When using a basic text<br />

search tool, such as FileLocator Pro, look for the following text strings:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!