eBook: Integration and Automation of Manufacturing Systems
   



TOC PREV NEXT

8.2 COMPUTERS AND HARDWARE


- most models assume no physical access to hardware, or controlled access.

- prototype intruders

- disgruntled employees (over half)
- inside organization
- know systems
- have access to systems
- problems: leave back doors
- problems: malicious damage
- joyriders
- outsiders
- some technical knowledge
- using general knowledge and holes
- driven by the thrill, fun or peer recognition
- sometimes damage
- some break into computers to hide their tracks while breaking into other computers
- professional
- driven by industrial espionage
- knowledgeable
- normally don't cause damage but are after information

- security holes

- users
- give away passwords
- simple passwords
- written passwords
- software flaws
- all software has flaws
- some flaws can be used to control the system

- How to break into a system (provided for checking your own system)

1. Pick your target / objective.
2. Research the target with publically available resources. Try to get at least the basic network layout
- use www.arin.net to locate information on the sys-admin
- use DNS lookup to find other machines on the net
- check websites, and other public information sources for details. Search engines can be useful here.
- use a program such as 'nmap' to identify the operating system, versions, open services, etc.
- try to determine if any others have access to the machine
- try to determine the physical location of the machine, and possible routes for physical access.
- look for 'backdoors' such as modems
- determine if there are any firewalls
3. (option a) Social engineering - try to convince users or others to give you passwords or access.
3. (option b) Security holes - use known security holes in the operating system to try and break in.
3. (option c) Brute force - try guessing passwords or use auto password generators.
4. Once you have access (as non-root/administrator) use other security holes to boost your privilages to root/administrator.
5. As root/administrator explore the system to see what is available.
6. Install a 'root kit' to allow a backdoor so that you can get back in later, and cover your tracks. These can also silently watch keystrokes and send passwords, etc back later.
7. Logout.

TOC PREV NEXT

Search for More:

Custom Search