19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.86 Manipulation of management parameters<br />

Management systems can also be used for an attack on a local computer<br />

system by deliberately causing incorrect configuration. <strong>The</strong> incorrect<br />

configuration can be caused in various ways. In the process, it is possible to<br />

manipulate both the management platform and the equipment it controls.<br />

Network management systems which use SNMP are particularly susceptible<br />

to attacks in which management parameters are deliberately configured<br />

incorrectly (e.g. through the perpetrator's own SNMP client). Depending on<br />

which parameters can be adjusted, the attacks range from simple "denial-ofservice<br />

attacks" (e.g. by altering IP addresses) to data manipulation (e.g.<br />

following the alteration of access rights).<br />

If network components are controlled through a management system, then all<br />

configuration parameters controlled by the management system should only<br />

be changed through the management system. Depending on the management<br />

system, however, it is also possible to change the configuration parameters of<br />

the components locally. If a PC is controlled through a network management<br />

system, e.g. via SNMP, then local users can alter the settings with a local<br />

SNMP client program (if they know the SNMP password) or using a local<br />

operational control (e.g. on a printer). This may just lead to inconsistencies in<br />

the network management system, but could even be deliberately used to cause<br />

gaps in the security. For example, it could later be made possible for a<br />

Windows NT computer to query records released via SNMP and the network.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!