[iwar] [fc:'Drive-by'.hacking.a.real.threat]

From: Fred Cohen (fc@all.net)
Date: 2001-11-24 21:33:42


Return-Path: <sentto-279987-3916-1006666329-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 24 Nov 2001 21:35:07 -0800 (PST)
Received: (qmail 17003 invoked by uid 510); 25 Nov 2001 05:30:41 -0000
Received: from n23.groups.yahoo.com (216.115.96.73) by all.net with SMTP; 25 Nov 2001 05:30:41 -0000
X-eGroups-Return: sentto-279987-3916-1006666329-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.53] by n23.groups.yahoo.com with NNFMP; 25 Nov 2001 05:32:10 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 25 Nov 2001 05:32:09 -0000
Received: (qmail 49550 invoked from network); 25 Nov 2001 05:32:09 -0000
Received: from unknown (216.115.97.171) by m9.grp.snv.yahoo.com with QMQP; 25 Nov 2001 05:32:09 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 25 Nov 2001 05:32:10 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAP5XgP15710 for iwar@onelist.com; Sat, 24 Nov 2001 21:33:42 -0800
Message-Id: <200111250533.fAP5XgP15710@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 24 Nov 2001 21:33:42 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:'Drive-by'.hacking.a.real.threat]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

'Drive-by' hacking a real threat

Nicole Bellamy, ZDNet Australia, 11/16/2001
<a href="http://news.zdnet.co.uk/story/0,,t269-s2099348,00.html">http://news.zdnet.co.uk/story/0,,t269-s2099348,00.html>

Wireless networks are vulnerable to hacking - layers of security may be
the best defence 
X-Force -- an Internet Security Systems anti-hacking team -- takes its
job very seriously, even taking to the streets of Sydney for security
threat analysis in the form of 'drive-by hacking'. 
A recent analysis conducted by the X-Force team in Australia tested the
security of wireless networks operating within Pitt St, Sydney -- a
major retail and business centre. 
The team discovered 12 wireless networks that were easily accessible and
vulnerable to hacking. 
According to Duffy, this type of test is a regular one for the X-Force
team, and known in security circles as 'drive-by hacking'. 
Armed with the appropriate knowledge, tools of the trade and access to
technologies, it is quite easy to hack into certain wireless networks
without leaving the comfort of your vehicle. 
"You can wander along the street, see a target and try to penetrate
their network, all without leaving your car," said Duffy. 
'Drive by hacking' is just one form of threat analysis conducted by
X-Force for companies within Australia, and around the world. 
Based in Atlanta, and working with organisations such as the FBI and
Interpol, as well as Queensland-based Australian Computer Emergency
Response Team (AusCERT), X-Force is designed to expose vulnerabilities
and security flaws before hackers have a chance to exploit, or expose
these. 
X-Force offers two main types of threat analysis and security testing; 
Vulnerability assessment: Reviews procedures already in place, from
policy level through to enactment 
Penetration testing: The next level, which exposes weaknesses and
potential areas of malicious penetration 
A recent KMPG survey outlined the need for organisations to develop, and
install, security solutions. According to the survey, 41 percent of 500
executives within multinational companies believe their company is
susceptible to a serious security breach. Of this number, 60 percent
believe that it can be solved with technology. 
Duffy believes that businesses continue to underestimate security as an
issue for businesses working in the online space. While larger
organisations are beginning to spend more money on ensuring the security
of networks and systems, according to Duffy, they are not always
successful. 
"We have seen some terrible (cases of poor security)," said Duffy.
"There are some organisations where at administrator level, they still
have their passwords set at 'password' (the system default)." 
This often happens at the "engine room level", because the technical
staff believe "they are in control and therefore, they are safe", said
Duffy. 
Another common belief in organisations is that one type, or level, of
security is enough. 
"Some of these organisations are of the view (that) you just put in a
firewall and you are safe," claimed Duffy. "But a firewall is like
having a front gate but not having a fence." 
Layering security for maximum defence Duffy believes effective security
involves layers of defence and offers the following layers as an example
of a secure system. 
First level is the perimeter defence which should involve a firewall
and/or authentication system. 
The second level involves intrusion detection, allowing administrators
to recognise and track intruders. 
The third level relates to server security and involves scanning
devices, active blocking and the like. 
Duffy added that PC-protection or desktop security -- in the form of
authentication, scanning devices, and antivirus software -- is another
element which should not be ignored. 
According to Duffy, another "area of defence" involves e-business.
Organisations communicating or transacting over the Internet are exposed
to the vulnerabilities present in the networks of their business
partners. 
"You can have the best security system in place, but the minute you work
with another company, you are vulnerable to their security measures...a
chain is only as strong as the weakest link," said Duffy. 
The emergence of security auditing and certification is assisting in
business partnerships by easing these concerns.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Universal Inkjet Refill Kit $29.95
Refill any ink cartridge for less!
Includes black and color ink.
http://us.click.yahoo.com/r9F0cB/MkNDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST