13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The simple network management protocol (SNMP, see RFC 3413) also has a weakness <strong>in</strong> regard<br />

to enumeration. Many SNMP implementations readily enumerate the users of the host mach<strong>in</strong>e<br />

upon request. For example, the popular Unix NET-SNMP implementation of SNMP provides a<br />

management <strong>in</strong>formation base that is filled with a huge amount of <strong>in</strong>formation concern<strong>in</strong>g the<br />

host OS, the IP, and mission assurance category addresses used by that mach<strong>in</strong>e, the network and<br />

route <strong>in</strong>formation of the mach<strong>in</strong>e’s <strong>in</strong>terfaces, and the active ports it is listen<strong>in</strong>g to. The book<br />

“Hack<strong>in</strong>g L<strong>in</strong>ux Exposed Second Edition” (see page 158 of reference A-9) outl<strong>in</strong>es how a s<strong>in</strong>gle<br />

command “snmpwalk appropriate_DNS_address public” can retrieve all of this valuable<br />

<strong>in</strong>formation.<br />

Another common exploit is to grab the /etc/password file from a target Unix mach<strong>in</strong>e. At this<br />

early stage of crack<strong>in</strong>g preparation, this is usually done by us<strong>in</strong>g the T<strong>FTP</strong> (port UDP/69) to<br />

directly access (and copy) this file conta<strong>in</strong><strong>in</strong>g the list of the OS and user accounts on that<br />

platform.<br />

Unfortunately, virtually all generic OSs have at least one well-known account that is usually<br />

present. Attackers repeatedly leverage this fact. There are many other ways to ga<strong>in</strong> system<br />

permissions on these mach<strong>in</strong>es (see section A.2).<br />

Several ports, <strong>in</strong>clud<strong>in</strong>g ports 111 (Sun RPC) and 32771 (FileNet RMI), also directly provide<br />

enumeration services that are exploited by hacker tools.<br />

A.2 CRACKING DEVICES.<br />

Because Unix devices are generally considered to be among the more difficult of the generic<br />

COTS OSs to crack (i.e., to take over via successful exploits), this section will solely discuss<br />

crack<strong>in</strong>g Unix devices. Similar approaches can be used to crack other generic host OSs devices,<br />

such as Microsoft W<strong>in</strong>dows or Apple Mac<strong>in</strong>tosh systems, as well as the special-purpose OSs<br />

used by routers.<br />

A.2.1 ROOT ACCOUNT.<br />

Most Unix systems have a root account that provides complete access to all functionalities and<br />

services with<strong>in</strong> the OS. Many exploits consist of break<strong>in</strong>g the root password. Once the attacker<br />

has learned the root password, the attacker has effectively taken over that device. For this<br />

reason, most Unix systems have been configured to not permit remote root accesses, but rather<br />

require the adm<strong>in</strong>istrator first log <strong>in</strong>to the system via a user account and then subsequently use<br />

the Unix su command to become root. (This latter practice also enables the log files to identify<br />

the identity of the root user, which otherwise would not be known.) For this reason, many<br />

exploits first seek to break a user account and then break the root account.<br />

A.2.2 USER ACCOUNTS.<br />

Both root and user accounts can be broken through brute force mechanisms, data driven attacks,<br />

back channels, and social eng<strong>in</strong>eer<strong>in</strong>g attacks. Brute force mechanisms exist because weak and<br />

default passwords are historically the easiest mechanism to compromise Unix systems. Brute<br />

A-6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!