Eicon Networks S92 Bedienungsanleitung Seite 202

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 201
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 202
CompromisingInternalSys tems
WhenIreviewthedifferentpostedpracticalassignments,Ifoundthatmostsecurity
architectures(includingtheoneunderfirehere)aretargetedtowardsprotectingthe
servers(webserversinparticular)withlittleemphasisonprotectingtheendusers.
Imaginethefollowingscenarios:
Scenario1:Johndownloadedafilefromtheinternet.Whenherunsit,theprogram
quicklyeraseseverydocumentfilesonhisdriveandatthesametimesendsout
broadcaststohalthislocalsegment.
Scenario2:MaryreceivedawordfilewhichcomeswithMacrovirusviaemail.Upon
openingthefile,thevirusgetstriggeredandeventuallychangesallthenumbersinside
Mary’sFinancialStatementsfiletorandomvalues.
Theattacksintheabovescenariosarepossiblewithjuniorlevelprogrammingskill.
Thestepstotakearedescribedbelow:
Step1:Researchthetarget.
ByvisitingGIAC’swebsite,wecanfindoutwhatbusinessGIACisin.GIACis
makingfortunecookiesandissellingthemworldwidethroughmanydifferent
channels.Wemaylocatedifferentcontactemailaddresses.Wemayevenretrievealist
ofGIAC’ssuppliersandpartners.
Step2:Attack!
Viatheemailroute:
Programamacrovirus.AttachittoaWordfile.Markthisfileasabusiness
informationrelatedfile.SendittothecontactpeopleinGIAC,withasenderaddress
of anyoneof itssuppliersandpartners.Chancesarethattheofficestaffswillopenany
fileoriginatedfromtheir“trustedpartners”.
Seitenansicht 201

Kommentare zu diesen Handbüchern

Keine Kommentare