Hacking Techniques
Hacking Techniques
Hacking Techniques
01 Jun 2009
Before exploring the methods for doing this, let's first peer into
the mind of the attacker and learn why they might want access to your
network and systems.
Methods of attack
Dictionary attack
A simple dictionary attack is by far the fastest way to break into a
machine. A dictionary file (a text file full of dictionary words) is
loaded into a cracking application (such as L0phtCrack), which is run
against user accounts located by the application. Because the
majority of passwords are often simplistic, running a dictionary
attack is often sufficient to to the job.
Hybrid attack
Another well-known form of attack is the hybrid attack. A hybrid
attack will add numbers or symbols to the filename to successfully
crack a password. Many people change their passwords by simply adding
a number to the end of their current password. The pattern usually
takes this form: first month password is "cat"; second month password
is "cat1"; third month password is "cat2"; and so on.
Brute force attack
A brute force attack is the most comprehensive form of attack, though
it may often take a long time to work depending on the complexity of
the password. Some brute force attacks can take a week depending on
the complexity of the password. L0phtcrack can also be used in a
brute force attack.
Next, take a look at some of the tools attackers use to break into a
system.
Tools of the trade
Let's take a look at a few scenarios and examine how attackers launch
their attacks and how they might be stopped or prevented. I'll first
describe a couple of scenarios involving internal attacks (that is,
attacks that originate within an organization), and then take a look
at a couple of scenarios involving external attacks.
Internal attacks
Jane has been working on the job for six months now and is a rising
star. She comes in early, stays late and has asked to transfer to
another department within the company. One problem: there are no open
positions at the time. During the last month you (security analyst)
have noticed a dramatic increase in the number of attempts at Cisco
router and UNIX Server logins. You have CiscoSecure ACS implemented
so you can audit the attempts and you see that most of them occur at
3 a.m.
Next, I'll give an example of an old (but still widely used) attack,
which involves sniffing passwords right off the network. You can see
how a network supervisor had his Cisco routers and switches cracked
by a help desk technician within the company.
Tommy is hired for the position of help desk technician to work with
the after hours help desk crew. The after hours help desk staff is
made up of roughly 10 technicians who provide coverage for eight
remote sites that the company needs to support during off hours.
Tommy always brings his laptop with him to work. When questioned
about the laptop by his manager, Tommy explains that he is using his
break time to prepare for a certification test. This seems harmless
and is approved, even though there is a company-wide security policy
in place about bringing machines from the outside into the corporate
network without corporate security looking the device over.
The company's security manager, Erika, sees the report filed by the
guards responsible for the physical security of the building. She
wonders what Tommy was doing in that closet and is not satisfied with
the answer he gave to the help desk manager. Upon searching the
closet, she finds an unplugged patch cable hanging from one of the
patch panels and an empty hub port. When she plugs the cable back in,
the link light does not come back on suggesting that this is a dead
port. Cable management Velcro straps neatly hold all the other cables
together. With Erika's years of experience and keen sense of security
exploitation, she knows exactly what happened.
Erika assumes that Tommy has brought his laptop in the wiring closet
unseen. He most likely looked for a dead port on the hub and plugged
his laptop in with a packet sniffer installed on it, which
promiscuously picks up traffic on a network segment. He returns later
to pick up the laptop, which is caught on the surveillance camera, to
take home for analysis after saving the capture file.
Using the company's security policy, she confronts Tommy and explains
that all personal property, such as laptops and palm pilots, are
subject to search if on the premises illegally. Since Tommy never
should have had his laptop there in the first place, he hands it over
to Erika. Upon careful examination, Erika finds the following trace
decode as seen in Figure 1.
External attacks
The onsite administrator escorts Jon to the data center not even
checking his ID. Once inside, the administrator wisely sticks around,
so Jon starts his test. After a few minutes, Jon informs the
administrator that he will have to call his office and have them run
some more tests so he can loop off the Smart Jack and try to
troubleshoot. Jon lets the administrator know that this will take
about 45 minutes, so the administrator gives Jon his pager number and
asks that he page him when he is done to let him out. Jon has now
successfully eliminated the only obstacle between him and the 30
servers all lined up in racks along the back wall of the data center.
Summary