Thursday, 3 January 2013

Hack Tutorial


The computing world is a complex and constantly changing process. To minimize security risks, companies must pay attention to The "5 basic safety principles"


  1.  100% security does not exist
  2.    Security risks are directly proportional to the complexity of software
  3.    Implement layered security
  4.   Do not allow an intrusion is made reused elsewhere, ignoring safety
  5.   Thinking "We are never ready for intruders," the concept of moving to perfection
100% security does not exist

is impossible to guarantee that all programs running on all your systems are free of any type of bug that could be used to break systems. There are many people who simply write many lines of code, checking and checking very little of his work. This is not just the fault of the software developers. Software development is an extremely complex process and an incorrect character (eg a string) in a program with millions of lines of code can create a security hole. Additionally you can not accurately predict the interactions of thousands of different programs may end in a single network together. It is impossible that the code written is perfect, because the creators are also human and are subject to imperfections, so you should make architectural decisions with this fact in mind. Security is a trade-off. Business needs must be balanced with security concerns in much the same way as physical security controls. Security policies should always be done with a risk assessment and cost / benefit. In the end, the degree of 

safety is always a business decision. Security risks are directly proportional to the complexity of software There are two issues here: the complexity of each software program and the total number of software programs that make up your solution or web server / client site. The more code you have, the more bugs are likely to have. Since all software has bugs, it must be assumed that the errors can be exploited as security holes. Firms should only run software they need to be operational.Companies must eliminate sample programs, scripts and documentation that are unnecessary to the operation of a production system, because there is no reason to take the risk when these programs deliver any operational value. Furthermore, most software means more security updates. So for example, if your basic users do not even use the help of Linux, Windows or any other operating system or application, why then install help? Besides saving space, if any intruder discovering a flaw in the Windows help, for example, and you corrected all applications and the Windows operating system thought, "but I think in Windows Help, there would be no possibility of intrusion," there can be great opportunity to fail and the attacker, it also serves to Linux and other systems. simply not install the default configuration. Most software comes in an insecure configuration and to make it as easy as possible in the intrusion. To eliminate unnecessary security risks, you should "shield" the software or operating system installation, which we call Hardening ¹, or rather virtual shield. In particular, the default settings and passwords should be changed, since they are easily available to hackers and other evil beings. Additional steps that a hardening process may include:


  •  Limiting the software installed to that which is intended for the desired function of the system;
  •  Apply and maintain updated patches, both operating system as applications;
  •  Review and modify the permissions of the file systems, in particular as regards the writing and execution;
  • Enhancing login security, enforcing a strong password policy

Finally, the simplest programs are less likely to have security holes when using them. That's why proxies are a good way to protect the border of the network from external attacks. Proxies are simple programs - they understand the application protocol but not implement the functionality. Therefore, they are safer than the servers they protect. Implement layered security theory "onion". Besides having several layers of the onion, it has a "bad smell". Think about it, form a layered security and created a defense system that is distasteful, offensive attackers. As all code has bugs, you never want to rely on any piece of code as their only line of defense. If you apply multiple layers of security, the hacker can not enter as easily as a weakness in one layer can not represent a total breakdown of the system. For example, if the server is running as a privileged user such as "root" or "admin" and there is a bug anywhere within this large and complex piece of code, a hacker might well gain full administrative access to your computer. If your web server runs as a non-privileged user, so even if a bug is found, the exposure can be controlled. A basic example of software-based "onion theory" to me, is the NMAP. When we run NMAP without using the root account, we can sweep services with some options, but with all the options, just using the root account. So what's the trend? EVER run that NMAP USING THE ROOT ACCOUNT and thus also expose our system to a scan or attack. There are more, just the technique we use IP and MAC SPOOFING SPOOFING and fine. In upcoming articles I will demonstrate that gives that swept to locate a host, even with IP / MAC SPOOFING. allow an intrusion not done is reused elsewhere SecuritySeparation function is essential for safety. You need to have separate 



devices for separate functions and different computer networks with different security levels. This is bad for GreenIT (Green IT, how to save energy for the environment, a good example of the advantages is beyond virtualization). For example, a web server communicates with the outside world, while a server database should only communicate with the web server.Each machine must be on a separate network. So if you have a "break" the web server by a hacker may have access to your email server, but your server database, which is physically isolated and protected by firewalls and other. Keep in mind , security is never about any one thing, but the whole set. Further security is as good as a weak link, something that many companies seem to forget. Firewalls are just one piece of the puzzle so you may need more than one firewall. For example, many companies use virtual private networks (VPNs) to allow two offices can communicate on a form "Internet safe". VPNs have a fundamental Achilles heel that could make them undesirable: if you have a home user connected to a corporate network through a VPN, then the entire corporate network is as secure as the security of the home PC. How safe is your home office? Item:  Backtrack-linux.org

0 comments:

Post a Comment