
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 202
CompromisingInternalSys tems
WhenIreviewthedifferentpostedpracticalassignments,Ifoundthatmostsecurity
architectures(includingtheoneunderfirehere)aretargetedtowardsprotectingthe
servers(webserversinparticular)withlittleemphasisonprotectingtheendusers.
Imaginethefollowingscenarios:
Scenario1:Johndownloadedafilefromtheinternet.Whenherunsit,theprogram
quicklyeraseseverydocumentfilesonhisdriveandatthesametimesendsout
broadcaststohalthislocalsegment.
Scenario2:MaryreceivedawordfilewhichcomeswithMacrovirusviaemail.Upon
openingthefile,thevirusgetstriggeredandeventuallychangesallthenumbersinside
Mary’sFinancialStatementsfiletorandomvalues.
Theattacksintheabovescenariosarepossiblewithjuniorlevelprogrammingskill.
Thestepstotakearedescribedbelow:
Step1:Researchthetarget.
ByvisitingGIAC’swebsite,wecanfindoutwhatbusinessGIACisin.GIACis
makingfortunecookiesandissellingthemworldwidethroughmanydifferent
channels.Wemaylocatedifferentcontactemailaddresses.Wemayevenretrievealist
ofGIAC’ssuppliersandpartners.
Step2:Attack!
Viatheemailroute:
Programamacrovirus.AttachittoaWordfile.Markthisfileasabusiness
informationrelatedfile.SendittothecontactpeopleinGIAC,withasenderaddress
of anyoneof itssuppliersandpartners.Chancesarethattheofficestaffswillopenany
fileoriginatedfromtheir“trustedpartners”.
Comentários a estes Manuais