Sunday, August 21, 2011

Enterprise hacking

Today we will think about enterprise hacking.


I really think most of companies had ever paid for hacking another ones.
Even more, there are some companies that have contracted some white-hat hackers to hack it self.

There are a huge amount of histories  about companies hacking other companies, governments hacking governments...

I think many people will recognize the history and the company:

--------------------------------------------------------------------------------------------------------------------------------
Some years ago, there was a company that had a problem, somebody was filtering strategic information out of the company (that was a very famous technological north american company)


The company paid some white-hat hackers to get all the information needed to hack itself, in order to get information needed to discover the "traitor".


They should do all needed in order to get the truth.


Those hacker attacked some personal email accounts, bank accounts, telephonic information... a lots of information to discover who was filtering data out of company.


Finally, the company was able to found the traitor, but he denounced to the company to breaking into his personal data and accounts. 


At the end, the company president and some directives were arrested about piracy issues.
BUT, those authorized hackers were arrested too.
--------------------------------------------------------------------------------------------------------------------------------

This controversial history didn't end with a fair finish, specially for the hackers, who are working as security computer experts.
They are not  breaking into another company to get some advantage from one to another.

We are surrounded of managers who only can think about money and numbers, keep out of them because you could be affected about their decisions.

If you are a computer expert, feel free to learn and improve. Feel free to work as a computer expert.
Most of hackers are cool, they rules!  :)

"We are legion"
Next Post: "AnonPlus is comming"

Sunday, August 14, 2011

How easy is to hack a server? (Part 2 out of 2)


Today we will talk about the second type of hacking.

From my point of view, this is the most powerful hacking type due to directly attacks the weakest point in every system, people.

There lots of ways to perform social attacks, sometimes we will get some information to directly exploit and access the target system, other times we will get some information in order to access other information, and using the second one, get access to the target system.

It depends on the system strength, we will need more or less information to obtain this access.

I will tell a history based on phishing to get access to a enterprise server in a short way:


We will suppose we know that we have access to the company "X", "X" is a big company with lots of manager hierarchies, most of the company employees could use "Linkedin"; scanning the company profiles we can find a guy who is fan of old stamps.


We must think that a big company employee probably access his email at working time.


Now we will build a website that looks serious about old stamps, like an antiquarian shop where buys and sells old stamps. At this website we will place a malicious frame in order to execute a web-client exploit.


Then we will send him an email full of stamp discounts related to a very exclusive stamp collection.
And.... "voilà": full access to the company network from the manager PC.



This is a very simple and short history in order to explain an example about how easy could be to hack an enterprise server.

We can get three steps in social hacking:
1) Get information
2) Preparing our trap
3) Exploit and access


We must know that time spent in the first step will improve our second step effectiveness
We must know that time spent in the second step will improve our third step effectiveness.

Between steps 2 and 3 can take a while, due to the company manager could be on holiday or very busy.

Now we can ask our question: How easy is to hack a enterprise server?

Very much.


"We are legion"
Next Post: "Enterprise Hacking"

Tuesday, August 9, 2011

How easy is to hack a server? (Part 1 out of 2)

Today we will think about how easy could be to hack a server.

When I say "server", I mean an enterprise server, not your home ftp server to upload two files a week.

If you have minimal knowledge about servers and hacking servers you will know that there are two major paths to hack a server.



Non social hacking and social hacking.

The main difference between them is the path which follows the first connection between the hacker and the objective. The first one, the hacker is trying to access the server; in the second one, the objective opens the communication with the hacker without knowing it.

Today we will talk a little about "traditional" hacking (non-social), this means using scripts: brute forze scripting, dictionary attacks, using critical exploits with security holes...


Any way that lets you a server console without interacting without hacking any person (without "social" hacking and/or social hacking, like pishing)

Nowadays, I think from my point of view that this way is really deprecated because there are faster, more powerful and easier ways.

This is hacking type has the easiest way to protect your systems: try to keep updated your SO, try to use encrypted transmissions like https, to connect by VPNs, to use firewalls, DNSSec and/or IPSec...



From the point of view from the IT personal of a company, it would be so easy to protect systems to this type of hacking.



Keep this in your mind: "If a hacker is trespassing the door is due to you forgot to close it"



Will be easy to protect to the brand new hacking? Will see in the next post.


"We are legion"
Next Post: "How easy is to hack a server part 2"

Thursday, August 4, 2011

The weakest node in a system

Today we have lots of security mechanisms which provides us a big computer security.

https, ssl, tls, dnssec, vpn, ipsec, firewall, antivirus... there are enormous amounts of security protocols thought to keep secured our systems.

Then, why we are experiencing a wave of computer attacks?

Because, most of hackers discovered the weakest point in all systems:
Humans.

Nowadays, we are the weakest point of whichever network or system.

If a security hole was found at a OS, just in a while, we got a patch to the system.

If a person has a poor knowledge about computer security, he/she is the biggest security hole in the system.

This person must assist to security courses, have to learn a lot about security; that's expensive and slow.

Due to that, now we have words like pishing, trojan horses, malware... all of them attacks the weakest point, humans.

There are enormous amounts of information about everybody in the internet, forums, chats, social webs (like facebook)...

This information is used to "exploit" us and get the chance to attack.

Are the hackers breaking into our systems?

Are we letting them to access in a very easy way?



What do you think about? Keep your eyes open!


"We are legion"
Next Post: "How easy is to hack a server part 1"

Popular Posts