Read The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Online

Authors: Kevin D. Mitnick,William L. Simon

Tags: #Computer Hackers, #Computer Security, #Computers, #General, #Security

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (11 page)

BOOK: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
5.35Mb size Format: txt, pdf, ePub
ads

He says, "One of the members told my mom, `I got more mail from him than my six kids combined.'" It worked: He kept it up for almost a year and on his next appearance before the board, they signed him out. Danny, on a shorter sentence, was released about the same time.

Since leaving prison, both William and Danny live fiercely determined to stay out of trouble, working computer-related jobs with skills gained during their years "inside." While each took college-level tech courses in prison, both believe their hands-on experience, perilous though it was, gave them the advanced skills they now depend on for their living. Chapter 3 The Texas Prison Hack 61

Danny earned 64 college credit hours in prison, and though he fell short of earning any professional certifications, now works with high- powered, critical applications including Access and SAP.

Before prison, William completed his freshman year in college and was a sophomore, with his parents supporting him. Once he got out, he was able to continue his education. "I applied for financial aid and got it and went to school. I got straight A's and also worked in the school's com- puter center."

He now has two associate's degrees -- in liberal arts and network com- puter maintenance -- both paid for by financial aid. Despite the two degrees, William didn't have quite the luck of Danny in landing a com- puter job. So he took what he could find, accepting a position involving physical labor. Credit his determination and his employer's open-minded attitude: As soon as the firm recognized his computer skills, he was pulled off the physical tasks and set to work at a job that makes better use of his technical qualifications. It's routine business computing, not the network designing he'd rather be doing, but he satisfies that urge by spending time on weekends figuring out low-cost ways of networking the com- puter systems for two Houston-area churches, as a volunteer.

These two men stand as exceptions. In one of the most pressing and least-discussed challenges of contemporary American society, most felons released from prison face a near-impossible hurdle of finding work, espe- cially any job that pays enough to support a family That's not hard to understand: How many employers can be confident about the idea of hir- ing a murderer, an armed robber, a rapist? In many states they are ineli- gible for welfare, leaving few ways of supporting themselves while continuing the near-hopeless search for work. Their options are severely limited -- and then we wonder why so many quickly return to prison, and assume it must be that they lack the will to live by the rules.

Today, William has some solid advice for young people and their parents:

I don't think there's any one thing you can say to a youngster to

make them change, other than to have value in themselves, you

know, and never take the short road, 'cause the long road always

seems to be the most rewarding in the end. And you know, never

sit stagnant because you don't feel you're worthy enough to do

what you need to do.

Danny would no doubt also agree with these words of William's:

I wouldn't trade my life now for nothin' on earth. I've come to

believe that I can gain my way in life by my own merit and not 62 The Art of Intrusion

take shortcuts. Over the years I learned that I could have people

respect me on my own merit. That's what I try to live by today.

INSIGHT This story makes clear that many computer attacks can't be protected against just by securing the perimeter. When the villain isn't some teen hacker or computer-skilled thief but an insider -- a disgruntled employee, a bitter former worker recently fired, or, as in this case, some other type of insiders like William and Danny.

Insiders often pose a greater threat than the attackers we read about in the newspapers. While the majority of security controls are focused on protecting the perimeter against the outside attacker, it's the insider who has access to physical and electronic equipment, cabling, telephone clos- ets, workstations, and network jacks. They also know who in the organi- zation handles sensitive information and what computer systems the information is stored on, as well as how to bypass any checks put in place to reduce theft and fraud.

Another aspect of their story reminds me of the movie Shawshank Redemption. In it, a prisoner named Andy is a CPA. Some of the guards have him prepare their tax returns and he gives them advice on the best ways of structuring their finances to limit their tax liability. Andy's abili- ties become widely known among the prison staff; leading to more book- keeping work at higher levels in the prison, until eventually he's able to expose the Warden, who has been "cooking" the books. Not just in a prison but everywhere, we all need to be careful and discreet about whom we give sensitive information to.

In my own case, the United States Marshal Service created a high level of paranoia about my capabilities. They placed a warning in my file cau- tioning prison officials not to disclose any personal information to me -- not even giving me their names, since they believed a wild rumor that I could tap into the government's plethora of secret databases and erase the identity of anyone, even a Federal Marshal. I think they had watched "The Net" one too many times.

COUNTERMEASURES Among the most significant security controls that can be effective in pre- venting and detecting insider abuse are these:

Accountability. Two common practices raise accountability issues: the

use of so-called role-based accounts -- accounts shared by multiple

users; and the practice of sharing account information or passwords Chapter 3 The Texas Prison Hack 63

to permit access when an employee is out of the office or unavail-

able. Both create an environment of plausible deniability when

things go seriously wrong.

Very simply, sharing account information should be discouraged if

not altogether prohibited. This includes allowing one worker to

use his/her workstation when this requires providing sign-on

information. Target-rich environment. In most businesses, an attacker who can

find a way of getting into the work areas of the facility can easily

find a way to gain access to systems. Few workers lock their com-

puters when leaving their work area or use screensaver or start-up

passwords. It only takes seconds for a malicious person to install

stealth monitoring software on an unprotected workstation. In a

bank, tellers always lock their cash drawer before walking away.

Unfortunately, it's rare to see this practice being used at other

types of institutions.

Consider implementing a policy that requires the use of a screen-

saver password or other program to electronically lock the

machine. Ensure that the IT department enforces this policy

through configuration management. Password management. My girlfriend was recently employed by a

Fortune 50 company that uses a predictable pattern in assigning

passwords for outside web-based intranet access: the user's name

followed by a random three-digit number. This password is set

when the person is hired and cannot ever be changed by the

employee. This makes it possible for any employee to write a

simple script that can determine the password in no more than

1,000 tries -- a matter of a few seconds.

Employee passwords, whether set by the company or selected by

the employees, must not have a pattern that makes them easily

predictable. Physical access. Knowledgeable employees familiar with the com-

pany's network can easily use their physical access to compromise

systems when no one is around. At one point I was an employee

of GTE of California, the telecommunications company. Having

physical access to the building was like having the keys to the

kingdom -- everything was wide open. Anyone could walk up to

a workstation in an employee's cubicle or office and gain access

to sensitive systems.

If employees would properly secure their desktops, workstations,

laptops, and PDA devices, by using secure BIOS passwords and

logging out, or locking their computer, the bad guy on the inside

will need more time to accomplish his objectives. 64 The Art of Intrusion

Train employees to feel comfortable challenging people whose

identity is uncertain, especially in sensitive areas. Use physical secu-

rity controls like cameras and/or badge access systems to control

entry, surveillance, and movement within the facility. Consider

periodically auditing physical entry and exit logs to identify unusual

patterns of behavior, especially when a security incident arises. "Dead" cubicles and other access points. When an employee

leaves the company or is transferred to a different position, leaving

a cubicle empty, a malicious insider can connect via the live net-

work jacks in the cubicle to probe the network while protecting

his/her identity. Or worse, a workstation often remains behind in

the cubicle, plugged into the network ready for anyone to use,

including the malicious insider (and, as well, any unauthorized

visitor who discovers the abandoned cubicle).

Other access points in places like conference rooms also offer easy

access to the insider bent on doing damage.

Consider disabling all unused network jacks to prevent anonymous

or unauthorized access. Ensure that any computer systems in

vacant cubicles are secured against unauthorized access. Exiting personnel. Any worker who has given notice of termination

should be considered a potential risk. Such employees should be

monitored for any access to confidential business information,

especially copying or downloading a significant amount of data.

With tiny USB flash drives now readily available that can hold a

gigabyte or more of data, it can be a matter of minutes to load

up large amounts of sensitive information and walk out the door

with it.

It should be routine practice to put restrictions on an employee's

access prior to his/her being notified of a termination, demotion,

or undesirable transfer. Also, consider monitoring the employee's

computer usage to determine any unauthorized or potentially

harmful activities. Installation of unauthorized hardware. The malicious insider can

easily access another employee's cubicle and install a hardware or

software keystroke logger to capture passwords and other confiden-

tial information. Again, a flash drive makes stealing data easy. A

security policy that prohibits any introduction of hardware devices

without written permission, while justified in some circumstances,

is admittedly difficult to police; benign employees will be inconve-

nienced, while the malicious have no incentive for paying attention

to the rule. Chapter 3 The Texas Prison Hack 65

In certain organizations that work with extremely sensitive infor-

mation, removing or disabling the USB port on workstations may

be a necessary control.

Walk-around inspections should be conducted regularly. In particular,

these inspections should verify that the machines have not had unau-

thorized wireless devices, hardware keystroke loggers, or modems

attached, and that no software has been installed except as authorized.

Security or IT personnel can check for unauthorized wireless access

points in the immediate vicinity by using a PDA that supports

802.11, or even a laptop equipped with Microsoft XP and a wire-

less card. Microsoft XP has a built in zero-configuration utility that

pops up a dialogue box when it detects a wireless access point in

the immediate vicinity. Circumventing processes. As employees learn about critical business

processes within the organization, they're in a good position to

identify any weaknesses with the checks and balances used to detect

fraud or theft. A dishonest worker is in a position to steal or cause

other significant harm based on their knowledge of how the business

operates. Insiders usually have unfettered access to offices, file cabi-

nets, internal mailing systems, and have knowledge of the day-to-

day business procedures.

Consider analyzing sensitive and critical business processes to iden-

tify any weaknesses so countermeasures can be implemented. In

certain situations, developing separation of duties requirement in

the process, where a sensitive operation performed by one person is

checked independently by another, can reduce the security risk. On-site visitor policies. Establish a security policy for outside visi-

tors, including workers from other office locations. An effective

security control is to require visitors to present State-issued

identification prior to being allowed into the facility, and recording

the information in a security log. If a security incident should arise,

it may be possible to identify the perpetrator. Software inventory and auditing. Maintain an inventory of all

authorized software installed or licensed for each system and peri-

odically audit these systems for compliance. This inventory process

not only ensures legal compliance with software licensing regulations,

but also may be used to identify any unauthorized software installa-

tions that could negatively affect security.

Unauthorized installation of malicious software like keystroke log-

gers, adware, or others type of spyware are hard to detect, depend-

ing on how clever the developers were at hiding the program

within the operating system. 66 The Art of Intrusion

Consider using third-party commercial software to identify these

BOOK: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
5.35Mb size Format: txt, pdf, ePub
ads

Other books

The Limit by Kristen Landon
Forever Girl by M. M. Crow
Weaponized by Nicholas Mennuti, David Guggenheim
La torre de la golondrina by Andrzej Sapkowski
The Lighter Side by Keith Laumer, Eric Flint