Return-Path: <sentto-279987-3916-1006666329-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 24 Nov 2001 21:35:07 -0800 (PST) Received: (qmail 17003 invoked by uid 510); 25 Nov 2001 05:30:41 -0000 Received: from n23.groups.yahoo.com (216.115.96.73) by all.net with SMTP; 25 Nov 2001 05:30:41 -0000 X-eGroups-Return: sentto-279987-3916-1006666329-fc=all.net@returns.groups.yahoo.com Received: from [10.1.4.53] by n23.groups.yahoo.com with NNFMP; 25 Nov 2001 05:32:10 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 25 Nov 2001 05:32:09 -0000 Received: (qmail 49550 invoked from network); 25 Nov 2001 05:32:09 -0000 Received: from unknown (216.115.97.171) by m9.grp.snv.yahoo.com with QMQP; 25 Nov 2001 05:32:09 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 25 Nov 2001 05:32:10 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAP5XgP15710 for iwar@onelist.com; Sat, 24 Nov 2001 21:33:42 -0800 Message-Id: <200111250533.fAP5XgP15710@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 24 Nov 2001 21:33:42 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:'Drive-by'.hacking.a.real.threat] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit 'Drive-by' hacking a real threat Nicole Bellamy, ZDNet Australia, 11/16/2001 <a href="http://news.zdnet.co.uk/story/0,,t269-s2099348,00.html">http://news.zdnet.co.uk/story/0,,t269-s2099348,00.html> Wireless networks are vulnerable to hacking - layers of security may be the best defence X-Force -- an Internet Security Systems anti-hacking team -- takes its job very seriously, even taking to the streets of Sydney for security threat analysis in the form of 'drive-by hacking'. A recent analysis conducted by the X-Force team in Australia tested the security of wireless networks operating within Pitt St, Sydney -- a major retail and business centre. The team discovered 12 wireless networks that were easily accessible and vulnerable to hacking. According to Duffy, this type of test is a regular one for the X-Force team, and known in security circles as 'drive-by hacking'. Armed with the appropriate knowledge, tools of the trade and access to technologies, it is quite easy to hack into certain wireless networks without leaving the comfort of your vehicle. "You can wander along the street, see a target and try to penetrate their network, all without leaving your car," said Duffy. 'Drive by hacking' is just one form of threat analysis conducted by X-Force for companies within Australia, and around the world. Based in Atlanta, and working with organisations such as the FBI and Interpol, as well as Queensland-based Australian Computer Emergency Response Team (AusCERT), X-Force is designed to expose vulnerabilities and security flaws before hackers have a chance to exploit, or expose these. X-Force offers two main types of threat analysis and security testing; Vulnerability assessment: Reviews procedures already in place, from policy level through to enactment Penetration testing: The next level, which exposes weaknesses and potential areas of malicious penetration A recent KMPG survey outlined the need for organisations to develop, and install, security solutions. According to the survey, 41 percent of 500 executives within multinational companies believe their company is susceptible to a serious security breach. Of this number, 60 percent believe that it can be solved with technology. Duffy believes that businesses continue to underestimate security as an issue for businesses working in the online space. While larger organisations are beginning to spend more money on ensuring the security of networks and systems, according to Duffy, they are not always successful. "We have seen some terrible (cases of poor security)," said Duffy. "There are some organisations where at administrator level, they still have their passwords set at 'password' (the system default)." This often happens at the "engine room level", because the technical staff believe "they are in control and therefore, they are safe", said Duffy. Another common belief in organisations is that one type, or level, of security is enough. "Some of these organisations are of the view (that) you just put in a firewall and you are safe," claimed Duffy. "But a firewall is like having a front gate but not having a fence." Layering security for maximum defence Duffy believes effective security involves layers of defence and offers the following layers as an example of a secure system. First level is the perimeter defence which should involve a firewall and/or authentication system. The second level involves intrusion detection, allowing administrators to recognise and track intruders. The third level relates to server security and involves scanning devices, active blocking and the like. Duffy added that PC-protection or desktop security -- in the form of authentication, scanning devices, and antivirus software -- is another element which should not be ignored. According to Duffy, another "area of defence" involves e-business. Organisations communicating or transacting over the Internet are exposed to the vulnerabilities present in the networks of their business partners. "You can have the best security system in place, but the minute you work with another company, you are vulnerable to their security measures...a chain is only as strong as the weakest link," said Duffy. The emergence of security auditing and certification is assisting in business partnerships by easing these concerns. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Universal Inkjet Refill Kit $29.95 Refill any ink cartridge for less! Includes black and color ink. http://us.click.yahoo.com/r9F0cB/MkNDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST