Eicon Networks S92 Manual de usuario Pagina 202

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 201
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 202
CompromisingInternalSys tems
WhenIreviewthedifferentpostedpracticalassignments,Ifoundthatmostsecurity
architectures(includingtheoneunderfirehere)aretargetedtowardsprotectingthe
servers(webserversinparticular)withlittleemphasisonprotectingtheendusers.
Imaginethefollowingscenarios:
Scenario1:Johndownloadedafilefromtheinternet.Whenherunsit,theprogram
quicklyeraseseverydocumentfilesonhisdriveandatthesametimesendsout
broadcaststohalthislocalsegment.
Scenario2:MaryreceivedawordfilewhichcomeswithMacrovirusviaemail.Upon
openingthefile,thevirusgetstriggeredandeventuallychangesallthenumbersinside
Mary’sFinancialStatementsfiletorandomvalues.
Theattacksintheabovescenariosarepossiblewithjuniorlevelprogrammingskill.
Thestepstotakearedescribedbelow:
Step1:Researchthetarget.
ByvisitingGIAC’swebsite,wecanfindoutwhatbusinessGIACisin.GIACis
makingfortunecookiesandissellingthemworldwidethroughmanydifferent
channels.Wemaylocatedifferentcontactemailaddresses.Wemayevenretrievealist
ofGIAC’ssuppliersandpartners.
Step2:Attack!
Viatheemailroute:
Programamacrovirus.AttachittoaWordfile.Markthisfileasabusiness
informationrelatedfile.SendittothecontactpeopleinGIAC,withasenderaddress
of anyoneof itssuppliersandpartners.Chancesarethattheofficestaffswillopenany
fileoriginatedfromtheir“trustedpartners”.
Vista de pagina 201

Comentarios a estos manuales

Sin comentarios