Eicon Networks S92 Manuel d'utilisateur Page 202

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 201
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 202
CompromisingInternalSys tems
WhenIreviewthedifferentpostedpracticalassignments,Ifoundthatmostsecurity
architectures(includingtheoneunderfirehere)aretargetedtowardsprotectingthe
servers(webserversinparticular)withlittleemphasisonprotectingtheendusers.
Imaginethefollowingscenarios:
Scenario1:Johndownloadedafilefromtheinternet.Whenherunsit,theprogram
quicklyeraseseverydocumentfilesonhisdriveandatthesametimesendsout
broadcaststohalthislocalsegment.
Scenario2:MaryreceivedawordfilewhichcomeswithMacrovirusviaemail.Upon
openingthefile,thevirusgetstriggeredandeventuallychangesallthenumbersinside
Mary’sFinancialStatementsfiletorandomvalues.
Theattacksintheabovescenariosarepossiblewithjuniorlevelprogrammingskill.
Thestepstotakearedescribedbelow:
Step1:Researchthetarget.
ByvisitingGIAC’swebsite,wecanfindoutwhatbusinessGIACisin.GIACis
makingfortunecookiesandissellingthemworldwidethroughmanydifferent
channels.Wemaylocatedifferentcontactemailaddresses.Wemayevenretrievealist
ofGIAC’ssuppliersandpartners.
Step2:Attack!
Viatheemailroute:
Programamacrovirus.AttachittoaWordfile.Markthisfileasabusiness
informationrelatedfile.SendittothecontactpeopleinGIAC,withasenderaddress
of anyoneof itssuppliersandpartners.Chancesarethattheofficestaffswillopenany
fileoriginatedfromtheir“trustedpartners”.
Vue de la page 201

Commentaires sur ces manuels

Pas de commentaire