波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

III. Exploitations on Data Centre Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
Vulnerabilities of data centres are found in their physical security, systems / devices hosted and management procedures implemented. Several common exploitation techniques are illustrated below:
 

1.   Back Door

Data centre procedures developed by the IT staff that may have flaws that can create back door vulnerabilities. Exploitation on such weakness can inadvertently introduce security breaches and result in financial loss or repartition damage to universities.

A backup operation provides a good example of how data centre management can be exploited by insecure backup process. IT staff usually overlook the security of tape backup infrastructures, which may contain vulnerabilities and can be exploited to create disastrous consequences. Since the execution of the backup task that usually requires escalated system privileges at the operating systems, network, data repository and application system levels. Malicious parties can take advantage of this security weakness through penetrating flawed backup infrastructure to gain access to universities' sensitive data.

2.  Attacks on Remote Access to Data Centre Management

Exploitations on remote access technologies used for data centre management are in many forms. Known attacking techniques include:

  • Use of Virtual Private Network (VPN) access of terminated staff to gain access to data centre systems or management tools
  • Offline password cracking through decrypting the hash data received from VPN servers with Internet Key Exchange (IKE) Aggressive Mode Shared Secret Hash Leakage Weakness
  • Denial of Service (DoS) attack on Secure Sockets Layer (SSL) -based VPN can be achieved by using hidden attack packets, which was undetectable by Intruder Detection Systems (IDS). For example, disguise malformed Internet Security Association and Key Management Protocol (ISAKMP) headers as standard IKE headers
  • Login guess attack on Windows Remote Desktop by hackers

 3.  Social Engineering Social Engineering

As of today, social engineering still remains as the biggest cyber threats to information security. As opposed to DoS and other remote hacking techniques, social engineering involves obtaining physical or logical access to data centre assets via manipulating IT staff relevant to data centre management, rather than by breaking in or using technical cracking approaches. Some social engineering techniques frequently used by hackers include piggybacking, penetrating data centre by getting a job within the data centre management team, and disguising as vendor support personnel for performing maintenance services inside data centres.

 

References:

http://www.computereconomics.com/article.cfm?id=1112

http://www.ncp-e.com/fileadmin/pdf/techpapers/NCP-Attack-Vectors-WP.pdf

http://www.ee.co.za/wp-content/uploads/legacy/Securing%20remote%20data.pdf

http://www.nta-monitor.com/posts/2005/01/VPN-Flaws-Whitepaper.pdf

http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html

[Previous section][<Next section]

?

百家乐里什么叫洗码| 西游记百家乐娱乐城| 百家乐注册赠金| 世界顶级赌场酒店| 百家乐官网官方网站| 锦江国际娱乐| 百家乐明灯| 玩百家乐官网优博娱乐城| 百家乐全部规则| 风水罗盘24方位| 乐百家乐官网彩娱乐城| 澳门百家乐战法| 博盈百家乐官网游戏| 大发888优惠| 百家乐视频台球游戏| 365体育在线投注| 巴黎百家乐地址| 百家乐官网高级技巧| 大发888 娱乐| 娱乐网百家乐补丁| 百家乐官网合作| 赌博百家乐官网经验| 360博彩通| 世界顶级赌场酒店| 百家乐大西洋城| 豪享博百家乐官网的玩法技巧和规则 | 太子娱乐城网址| 百家乐永利娱乐| 24葬书-葬法| 百家乐官网赌博代理| 必博百家乐官网游戏| 亲朋棋牌捕鱼辅助| 红宝石百家乐的玩法技巧和规则| 聚宝盆百家乐游戏| 百家乐官网赌博策略论坛| 泾川县| 大世界娱乐| 大发888充值500| 百家乐棋牌游| 至尊百家乐节目单| 百家乐视频打麻将|