12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

STEALING INFORMATION FROM THE U.S. INDUSTRIAL-MILITARY COMPLEX: TITAN RAIN<strong>Cyber</strong> Reconnaissance: Footprinting, Scanning, and Enumeration<strong>Cyber</strong> reconnaissance is often carried out through three basic steps: footprinting, scanning,and enumeration. 28 Footprinting is the process of examining the structure of an organization’scomputer network. The information the hacker wishes <strong>to</strong> determine at this stage pertains <strong>to</strong>the electronic traces users with the targeted organization leave, such as the range of IP addresses,the addresses of key network equipment such as routers, the availability of remoteaccess <strong>to</strong> the network, and the presence of network-level security devices such as intrusiondetection systems and firewalls. If we liken the targeting of information using cyber espionagewith the targeting of a fugitive using conventional means, footprinting would be analogous<strong>to</strong> determining the neighborhood where the fugitive lives. This type of reconnaissancecan be performed with varying levels of intensity. On the low end, reconnaissance can be inthe form of simple lookups of system information—for example, using a domain name server(DNS) <strong>to</strong> identify the IP address associated with a URL. On the other end of the spectrum,specialized software can be used for this step as well.Often, such footprinting can be accomplished without being detected at all. For instance,even on the low end, this task can be accomplished without queries made <strong>to</strong> the targets systems.In particular, queries <strong>to</strong> DNS servers and IP address registries can be made without theknowledge of the targeted organization. More intense footprinting reconnaissance could requireaccessing the target system (i.e., visiting Web pages maintained and written by the organization).However, information about the organization could also be found on Web pagesnot operated by the target institute, i.e., looking for employees talking about the company’snetwork infrastructure on Web forums.Scanning is examining a computer network at the next level of granularity. If we return <strong>to</strong>our analogy with the fugitive, we have identified the neighborhood where the fugitive livesand now wants information on potential hideouts. Likewise, with scanning, using the informationabout the computer network we gained in footprinting, the hacker now examines theindividual systems of interest. Here, the intruder is interested in determining details of thesystems such as what operating system is being used, what are the open ports on the system,and the configuration of the firewall. Earlier, less sophisticated and secure technologyallowed the hacker <strong>to</strong> simply “ping” the targeted system—essentially sending a message<strong>to</strong> the system—<strong>to</strong> see if it was connected <strong>to</strong> the Internet. However, this rudimentary techniquequickly became blocked. Further, hackers are able <strong>to</strong> obtain much more of the desired informationusing specialized pieces of software. This software tends <strong>to</strong> run in an au<strong>to</strong>mated fashion.The hacker normally enters a range of IP addresses and the software runs overnight. Thenext day, the hacker checks the results of the scan, which is presented <strong>to</strong> him in the form of anoutput file from the software. With the proper information of the specific systems identified,the hacker then proceeds <strong>to</strong> the next step of reconnaissance.This next step is called Enumeration and involves the interrogation of specific systems.Returning <strong>to</strong> our fugitive example, we are now examining specific possible hideouts for certainvulnerabilities—i.e., determining the lock used on the door, determining if the fugitivehas a guard dog, etc. With enumeration, the hacker often attempts <strong>to</strong> log in<strong>to</strong> a system withthe goal of finding specific data. The primary goal of this step is <strong>to</strong> determine the vulnerabilitiesof the system that may allow the intruder <strong>to</strong> obtain access. This process can be done manually,but again there are numerous pieces of specialized software that allow the hacker <strong>to</strong>125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!