19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

72<br />

Part II: Putting Ethical Hacking in Motion<br />

Shredding documents is effective only if the paper is cross-shredded into tiny<br />

pieces of confetti. Inexpensive shredders that shred documents only in long<br />

strips are basically worthless against a determined social engineer. With a<br />

little time and tape, a social engineer can piece a document back together if<br />

that’s what he’s determined to do.<br />

Hackers often gather confidential personal and business information from<br />

others by listening in on conversations held in restaurants, coffee shops, and<br />

airports. People who speak loudly when talking on their cellphones are also a<br />

great source of sensitive information for social engineers. (Poetic justice, perhaps?)<br />

While I’m out and about in public places, I hear others divulge amazing<br />

information even if I’m not actively trying to listen.<br />

The bad guys also look in the trash for CD-ROMs and DVDs, old computer<br />

cases (especially those with hard drives still intact), and backup tapes.<br />

See Chapter 6 for more on trash and other physical security issues, including<br />

countermeasures for protecting against dumpster divers.<br />

Phone systems<br />

Attackers can obtain information by using the dial-by-name feature built in to<br />

most voicemail systems. To access this feature, you usually just press 0 after<br />

calling the company’s main number or after you enter someone’s voice mailbox.<br />

This trick works best after hours to ensure no one answers.<br />

Attackers can protect their identities if they can hide where they call from.<br />

Here are some ways they can hide their locations:<br />

✓ Residential phones sometimes can hide their numbers from caller ID by<br />

dialing *67 before the phone number.<br />

This feature isn’t effective when calling toll-free numbers (800, 888, 877,<br />

866) or 911.<br />

✓ Business phones in an office using a phone switch are more difficult<br />

to spoof. However, all the attacker usually needs is the user guide and<br />

administrator password for the phone switch software. In many switches,<br />

the attacker can enter the source number — including a falsified number,<br />

such as the victim’s home phone number. Voice over Internet Protocol<br />

(VoIP) phone systems are making this a non-issue, however.<br />

✓ VoIP Servers such as the open source Asterisk (www.asterisk.org)<br />

can be used and configured to send any number they want.<br />

Phishing e-mails<br />

The latest criminal hacking craze is phishing — criminals sending bogus<br />

e-mails to potential victims in an attempt to get them to divulge sensitive<br />

information or click malicious links. Phishing has actually been around for

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!