Advanced Hacking Techniques:: Implications For A Mobile Workforce
Advanced Hacking Techniques:: Implications For A Mobile Workforce
Advanced
Hacking Techniques:
Implications for a
Mobile Workforce
By Daniel V. Hoffman, CISSP, CWNA, CEH
August, 2006
Hack2-CompGde-081706.qxd 8/17/06 4:14 PM Page 2
CONTENTS
Introduction 2
The Changing Threat Landscape 3
Step-by-Step Guide: Hacking the 4
Mobile Workforce
Security Fundamentals: Rethink Your Security 7
Strategy with the Mobile Worker in Mind
Sponsor Perspective: 8
Fiberlink: Simple. Secure. Mobility.
DEMONSTRATION
Click here to view the demonstration:
“Hacking the Mobile Workforce”
DEMONSTRATION
Click here to view the demonstration:
“Hacking the Mobile Workforce”
THE CHANGING THREAT LANDSCAPE Although most enterprises are aware of these sophisticated
Web-based attacks, the threat is as daunting as ever.
When it comes to protecting data and devices, many IT
professionals say that it has become too difficult to keep
up. In other words, staying ahead of the security curve is
More than 59 million cyberassaults originate in
overwhelming, and many feel like they are not leading,
North America alone in an average 24-hour period.4
but rather responding or reacting. Conversely, there are —Consumer Reports, July 2006
others that feel like they have it all covered. Their end-
users aren’t complaining, their executives are happy, they
haven’t experienced any security breaches, and costs are
under control. In our first video analysis, “Real World The Disconnected Threat
Security Threats: The Anatomy of a Hack” (12/2005), In a 2005 FBI Computer Crime Survey, US companies
Dan Hoffman (Systems Engineer) walked through three alone lost an estimated $67 billion due to computer
primary network-based threats: crimes (e.g., viruses, spyware, PC theft and other computer
crimes). This is despite the fact that virtually all of the
1. Credentials and data sniffing organizations surveyed used anti-virus software (98.2%)
2. Malware including viruses, worms, trojans, spyware and personal firewalls (90.7%). These losses are due to
and adware the fact that traditional Internet security solutions are not
3. Direct attacks to computer system or network as a enough to handle sophisticated web-based threats.
result of deliberate action Malicious code can easily navigate open ports, disable a
personal firewall and infect a network long before a
The guide provided a thorough description of each type signature-based anti-virus fix is available, or a software
of threat, and best practices for how to protect your patch can be deployed.
enterprise against that specific form of attack.
One of the greatest challenges that IT faces is the multitude
Gone are the of possible entry points for viruses, worms and other
“The major Internet threat that is on the malware to enter the network – whether their mobile
days of
rise is the financially motivated, targeted users are connected to the network, or not. These
random
internal attacks.”2 include: USB storage devices and iPods®, laptop usage
experimenta-
—John Pescatore, Gartner Research outside the perimeter, non-network based wireless commu-
tion and
information nication (e.g., Bluetooth) or careless acceptance of an End
vandalism for the pure enjoyment of publicity and notoriety. User License Agreement can all expose the corporate
Today’s hackers are more motivated by quick financial network to malicious code and jeopardize the safe-
gain – targeting specific industries or companies and guarding of corporate data.
going after their valued data and information. They are
executing more cleverly than ever before to avoid detection. And who can miss the headlines about the risks associated
Therefore, enterprises need more sophisticated security with the physical theft or loss of laptops? If a laptop is
processes, architectures and strategies to deal with stolen or lost, corporate information and personal
these attacks today, and in the future. information can be compromised at potentially catastrophic
levels - permanently damaging a business reputation and
A recent Gartner study shows that viruses and worms still leaving behind the residue of gross financial repercussions.
top the list of threats that keep IT organizations up at night
– with spyware and phishing in a close tie for second.3
DEMONSTRATION
Click here to view the demonstration:
“Hacking the Mobile Workforce”
Consider the following preventative measures: • Remediate security deficiencies persistently and
• Deploy an intelligent, software-based client on all in real-time by pushing security patches to the endpoint
laptops that has the ability to validate the authenticity anytime it is connected to the Internet. Employing a
of a public Wi-Fi hotspot network. system that supports seamless, real-time remediation
of vulnerabilities prior to VPN connectivity will ensure
• Set policies that require an end-user to enter Wi-Fi your network will not be compromised, and your end-user
authentication credentials into an intelligent will remain productive.
software-based client that encrypts both the user name
and password, versus allowing the user to enter their • Layer security by utilizing an enterprise-grade personal
credentials into whatever HTML page happens to be firewall with IPS (Intrusion Prevention) functionality
presented to them when they connect. that could stop a potential exploit from running on a
mobile system, even if it was not patched.
Consider the following preventative measures: Consider the following preventative measures:
• Control network access by preventing mobile • Layer security by utilizing anti-spyware and a
devices from connecting to Wi-Fi networks unless personal firewall with IPS functionality. Anti-spyware
specifically initiated by the end-user. solutions can catch modifications and installations of
malware that anti-virus systems might miss. Personal
• Layer security by utilizing an enterprise grade personal Firewalls with IPS have similar functionality, with the
firewall with an intrusion prevention system (IPS) on added benefit of prohibiting unwanted connections.
every mobile device. This will prohibit a hacker from Also, the use of two-factor authentication for SSL
exploiting the machine. connectivity is becoming essential. A keylogger that
captures every key an end-user enters will not be able
• Remediate security deficiencies in real-time by to re-use those credentials to login themselves, if
pushing patches to a mobile endpoint anytime it is two-factor authentication, such as RSA tokens,
connected to the Internet. Following this practice will are utilized.
ensure that mobile systems will always have the latest
protection and be less susceptible to exploitation. • Remediate security deficiencies in real-time by
ensuring that anti-virus and anti-spyware applications
are always running and have the latest definition
Hack #4 – Modifying Malware to Invisibly files installed prior to VPN connection back to the
Bypass Anti-Virus Programs corporate network.
Virtually all enterprises have anti-virus software installed
on their mobile systems. Most enterprises, however,
do not have the systems in place to ensure that the
anti-virus program is always running and up-to-date prior US companies alone lost an estimated $67 billion due to
to allowing an endpoint access to the corporate network. computer crimes (e.g., viruses, spyware, PC theft and
Regardless, this hack will demonstrate how malware can other computer crimes.) This is despite the fact that virtually
be modified to invisibly bypass two different anti-virus all of the organizations surveyed used anti-virus software
programs. This hack will also demonstrate how important (98.2%) and personal firewalls (90.7%).
it is to protect all mobile endpoints, even if those —FBI Computer Crime Survey, 2005
endpoints are only connecting to the corporate network
via SSL VPN.
DEMONSTRATION
Click here to view the demonstration:
“Hacking the Mobile Workforce”
• Ensuring that connectivity to Wi-Fi hotspots occurs With the demand for dial services declining and
only when desired and initiated by an end-user. trends towards “free” access, Fiberlink has focused
development on enabling and securing all forms of
• Ensuring that Internet and VPN connectivity only access and offering valued-added services. Fiberlink
occur when a mobile or remote system meets the created the first solution that allows end users to
minimum-security requirements to establish this “bring their own access” but remain protected and
connectivity. connected to the enterprise.
DEMONSTRATION
SOURCES: