19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

314<br />

Part V: Hacking Applications<br />

Figure 15-4:<br />

Using<br />

Identity<br />

Finder to<br />

uncover<br />

hundreds<br />

of sensitive<br />

records<br />

on an<br />

unprotected<br />

storage<br />

device.<br />

To speed the process, you can use Identity Finder, a really neat tool designed<br />

for the very purpose of scanning storage devices for sensitive, personally<br />

identifiable information. It can also search inside binary files such as PDFs.<br />

Figure 15-4 shows what such a tool can find in just a matter of minutes.<br />

Identity Finder has an Enterprise edition that you can use to search network<br />

systems and even databases for sensitive information.<br />

For a second round of testing, you could perform your searches logged in<br />

as an administrator. You’re likely to find a lot of sensitive information scattered<br />

about. It seems worthless at first; however, this can highlight sensitive<br />

information stored in places it shouldn’t be or that the network administrator<br />

shouldn’t have access to.<br />

Testing is highly dependent on timing, searching for the right keywords, and<br />

looking at the right systems on the network. You likely won’t root out every<br />

single bit of sensitive information, but this effort will show you where certain<br />

problems are, which will help you to justify the need for stronger access controls<br />

and better IT and security management processes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!