Eicon Networks S92 Manuale Utente Pagina 202

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 209
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 201
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 202
CompromisingInternalSys tems
WhenIreviewthedifferentpostedpracticalassignments,Ifoundthatmostsecurity
architectures(includingtheoneunderfirehere)aretargetedtowardsprotectingthe
servers(webserversinparticular)withlittleemphasisonprotectingtheendusers.
Imaginethefollowingscenarios:
Scenario1:Johndownloadedafilefromtheinternet.Whenherunsit,theprogram
quicklyeraseseverydocumentfilesonhisdriveandatthesametimesendsout
broadcaststohalthislocalsegment.
Scenario2:MaryreceivedawordfilewhichcomeswithMacrovirusviaemail.Upon
openingthefile,thevirusgetstriggeredandeventuallychangesallthenumbersinside
Mary’sFinancialStatementsfiletorandomvalues.
Theattacksintheabovescenariosarepossiblewithjuniorlevelprogrammingskill.
Thestepstotakearedescribedbelow:
Step1:Researchthetarget.
ByvisitingGIAC’swebsite,wecanfindoutwhatbusinessGIACisin.GIACis
makingfortunecookiesandissellingthemworldwidethroughmanydifferent
channels.Wemaylocatedifferentcontactemailaddresses.Wemayevenretrievealist
ofGIAC’ssuppliersandpartners.
Step2:Attack!
Viatheemailroute:
Programamacrovirus.AttachittoaWordfile.Markthisfileasabusiness
informationrelatedfile.SendittothecontactpeopleinGIAC,withasenderaddress
of anyoneof itssuppliersandpartners.Chancesarethattheofficestaffswillopenany
fileoriginatedfromtheir“trustedpartners”.
Vedere la pagina 201

Commenti su questo manuale

Nessun commento