An Introduction to the Back Orifice 2000 Backdoor Program

Total Page:16

File Type:pdf, Size:1020Kb

An Introduction to the Back Orifice 2000 Backdoor Program 84-02-02 DATA SECURITY MANAGEMENT AN INTRODUCTION TO THE BACK ORIFICE 2000 BACKDOOR PROGRAM Christopher Klaus INSIDE General Information on Backdoor Programs; Installation Procedure; Using BO2K; Server Commands; Protecting Against BO2K Back Orifice 2000 (BO2K) is a backdoor program designed for misuse and attack. It was released in July 1999 at DefCon VII, a computer hacker convention held in Las Vegas, Nevada. Credit for developing and releas- ing BO2K was claimed by a computer hacker organization that calls itself The Cult of the Dead Cow. BO2K is a refinement of an earlier program with a similar name. BO2K takes the form of a client/server application that remotely controls an information processing application with a fixed IP (Internet Protocol) address without the knowledge of either the re- sponsible system administrators or the affected end users. Once it has been installed, BO2K gathers information, performs system commands, reconfigures machines, and redirects network traffic without authorized access for any of these services. BO2K can be used as a simple monitoring tool, but its main purpose is to maintain unauthorized control over another machine for reconfigu- ration and data collection. These features, plus the invisibility of BO2K, make this backdoor program especially dangerous for both the adminis- trators and the end users in a networked environment. Unlike a conventional computer virus, BO2K is not self-replicating. It PAYOFF IDEA must deceive an individual user into Back Orifice 2000 (BO2K) is a backdoor program installing the program. Once it has designed for misuse and attack. While it can be been installed, BO2K easily performs used as a simple monitoring tool, its main pur- pose is to maintain unauthorized control over an- unauthorized actions without the other machine for reconfiguration and data col- knowledge of the user. lection. This article describes backdoor programs in general, BO2K in particular, and pro- vides suggestions for protecting against it. Auerbach Publications © 2000 CRC Press LLC GENERAL INFORMATION ON BACKDOOR PROGRAMS Backdoor programs are significantly more dangerous than conventional computer viruses. This particular type of program can be used by an in- truder to take control of a microcomputer or a workstation and potential- ly to gain broad network access. Until now, the most widely distributed backdoor programs have been Netbus and the first version of Back Ori- fice. These programs are commonly referred to as Trojan horses, due to the fact that they pretend to do something other than their actual func- tion. Typically, backdoor programs are sent as attachments to electronic mail messages with innocent-looking file names. Also, BO2K has a plug- in architecture that enables it to disguise itself once it has been installed. Many authors of backdoor programs claim that they have not written them to be intrusion tools. Rather, the authors claim that their programs are remote-control utilities that demonstrate weaknesses in already in- stalled operating systems. However, the actual use of these programs, as demonstrated by their past activity, indicates that these Trojan horses are frequently used to gain unauthorized access to and the use of an infor- mation processing application, although a significant vulnerability cannot be identified in the operating systems that they impact. Netbus is available in versions for Windows 95, Windows 98, and Windows NT. The first version of Back Orifice, initially released in July 1998, was available for Windows 95 and Windows 98. With the release of BO2K, Windows NT is impacted, making this version especially dan- gerous for organizational networked environments. INSTALLATION PROCEDURE Installing BO2K involves two separate operations: client installation and server installation. BO2K installs on the server machine using a simple process. The server application is executed, and BO2K is installed. This executable, originally named bo2k.exe, possibly can be renamed. The name that is being used for the executable will be specified in either the client installation or, as illustrated in Exhibit 1, in the BO2K Configura- tion Wizard. This Wizard steps through various configuration settings, including the server file (which is the executable), the network protocol (either TCP [Terminal Control Protocol] or UDP [User Datagram Protocol]), the port number, and the data encryption and password use administration mech- anisms in use. Once this process is complete, running bo2kgui.exe exe- cutes the graphical user interface (GUI) for BO2K, which is depicted in Exhibit 2. The BO2K Configuration Wizard is designed to allow for the quick setup and immediate use, assuming some defaults, of the program on a specified server. However, many options can be set manually through the Configuration utility. These options are mainly used to reduce the Auerbach Publications © 2000 CRC Press LLC EXHIBIT 1 — The BO2K Configuration Wizard chance that BO2K will be detected by the system administrator or some application user. The Configuration Wizard steps through these settings: • Server File • Network Protocol (UDP or TCP) • Port Number • Encryption (XOR or 3DES [Triple Data Encryption Standard]) • Password-Encryption Key Once the Configuration Wizard completes this activity, the Server Configuration utility screen is displayed, as shown in Exhibit 3. This util- ity allows increasingly granular control over how BO2K is run, including the client/server telecommunications settings, and the methods for pre- venting the program from being detected. The option variables provided by this utility and their descriptions are discussed in Exhibit 4. USING BO2K bo2kgui.exe executes the BO2K Workspace (depicted in Exhibit 2), which contains a list of the servers that have been compromised and that Auerbach Publications © 2000 CRC Press LLC The Graphical Interface of BO2K EXHIBIT 2 — Auerbach Publications © 2000 CRC Press LLC EXHIBIT 3 — The Server Configuration Utility Screen has been saved from a previous use of this program. These servers must be defined for BO2K to connect to any system and to begin using the program. Each of the named servers must be described by its name, IP address, and connection information. Exhibit 5 depicts the screen for ed- iting the server settings. When a server has been defined, the Server Command Client is dis- played, as illustrated in Exhibit 6. This window enables access to BO2K’s commands. When the user of BO2K clicks on a category, BO2K displays individual functions. Some of these functions require that additional pa- rameters such as filenames and port numbers be provided. SERVER COMMANDS Over 70 commands are contained within BO2K. These commands gather information and send various instructions to the server. After a connec- tion is made between the two machines, a command is selected, the ap- plicable parameters are entered, and the Send Command button runs the command on the chosen server. Responses from the server will be dis- played in the Server Response window, which is depicted in Exhibit 7. The server commands and their descriptions are discussed in Exhibit 8. Auerbach Publications © 2000 CRC Press LLC EXHIBIT 4 — Server Configuration Utility Option Variables Option Description File Transfer File Xfer Net Type Lists and changes the network protocol for communication File Xfer Bind Str File transfer bind string where RANDOM is the default File Xfer Encryption Lists and changes the current encryption method File Xfer Auth File transfer authentication whose default is NULLAUTH TCPIO Default Port Displays and changes the port that is being used for TCP communication UDPIO Default Port Displays and changes the port that is being used for UDP communication Built-in Load XOR Encryption Enables or disables XOR encryption, which is weaker than Triple DES Load NULLAUTH Enables or disables NULLAUTH authentication Authentication Load UDPIO Module Enables or disables UDP communication Load TCPIO Module Enables or disables TCP communication XOR XOR Key Lists and changes the password for XOR authentication Startup Init Cmd Net Type Displays and changes the network protocol for startup Init Cmd Encryption Displays current value for encryption at startup Init Cmd Auth Displays and changes current authentication for startup Idle Timeout (Ms) Can change the time in milliseconds for the server timeout and disconnect Stealth Operation Run At Startup Enable or disable BO2K to be run at computer startup Delete Original File Can delete original exe file (the choice is to Enable or Disable) Runtime Pathname Changes the value for the runtime pathname Hide Process Enable or disable the process from being hidden Host Process Name (NT) Changes the process name on the host machine; the default is BO2K Service Name (NT) Changes the service name from Remote Administration Service to another name that is specified in the utility PROTECTING AGAINST BO2K Once BO2K is installed, its highly configurable nature makes it very dif- ficult to detect. Typically, backdoor programs are complex, and several detection methods are recommended to achieve maximum awareness of BO2K installations and protection for any machine or series of machines on a network. By default, BO2K installs itself in a Windows system direc- tory as a file called fileUMGR32.EXE. If Windows NT is running, it will in- stall a service that is listed as Remote Administration Service. This is a default name, and can be changed. Auerbach Publications © 2000 CRC Press LLC EXHIBIT 5 — The Screen for Editing Server Settings Host-based vulnerability
Recommended publications
  • Case Study PRO
    GoToMyPC™ case study PRO SUMMARY AdministGoToMyPC Pro TopsTion pcAnywhere The Enterprise Rapattoni Corporation provides for Easy Network Administration management information software "GoToMyPC Pro simply works better than pcAnywhere" is the for real estate associations. reason Chris Edgar gives for his company's switch to GoToMyPC Pro.As network support manager for Rapattoni Corporation, his The Challenge team uses GoToMyPC Pro to administer and support custom Network Support Manager Chris software implementations. Edgar requires reliable access to customer computers to remotely Rapattoni Corporation remotely manages its customized SQL database product for administer his company's custom more than 250 real estate associations.The company had previously used pcAnywhere software implementation.The and other packaged products for remote administration, but found implementation and company was using pcAnywhere configuration to be difficult, especially when working with customers who had limited and other remote-access software, computer experience. Rapattoni now uses GoToMyPC Pro to easily administer but found it to be unreliable and customer networks. Edgar believes that GoToMyPC Pro is faster and more reliable than difficult to use pcAnywhere. "GoToMyPC Pro is very non-intrusive and fast," he says. "Our customers love it." The GoToMyPC Solution GoToMyPC Pro can be easily “Their mouths drop and they ask implemented within minutes on customer networks, even for where they can get GoToMyPC Pro.” customers with limited computer experience.There is virtually no GoToMyPC Pro has been a real money saver for Rapattoni because administrators can configuration with GoToMyPC resolve issues without a customer's intervention. "We probably save two or three phone Pro, allowing company calls per incident with GoToMyPC," says Edgar.
    [Show full text]
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • PC Magazine Fighting Spyware Viruses And
    01_577697 ffirs.qxd 12/7/04 11:49 PM Page i PC Magazine® Fighting Spyware, Viruses, and Malware Ed Tittel TEAM LinG - Live, Informative, Non-cost and Genuine ! 01_577697 ffirs.qxd 12/7/04 11:49 PM Page ii PC Magazine® Fighting Spyware, Viruses, and Malware Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256-5774 www.wiley.com Copyright © 2005 by Wiley Publishing Published simultaneously in Canada ISBN: 0-7645-7769-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/RW/RS/QU/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, e-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials.
    [Show full text]
  • Netcat and Trojans/Backdoors
    Netcat and Trojans/Backdoors ECE4883 – Internetwork Security 1 Agenda Overview • Netcat • Trojans/Backdoors ECE 4883 - Internetwork Security 2 Agenda Netcat • Netcat ! Overview ! Major Features ! Installation and Configuration ! Possible Uses • Netcat Defenses • Summary ECE 4883 - Internetwork Security 3 Netcat – TCP/IP Swiss Army Knife • Reads and Writes data across the network using TCP/UDP connections • Feature-rich network debugging and exploration tool • Part of the Red Hat Power Tools collection and comes standard on SuSE Linux, Debian Linux, NetBSD and OpenBSD distributions. • UNIX and Windows versions available at: http://www.atstake.com/research/tools/network_utilities/ ECE 4883 - Internetwork Security 4 Netcat • Designed to be a reliable “back-end” tool – to be used directly or easily driven by other programs/scripts • Very powerful in combination with scripting languages (eg. Perl) “If you were on a desert island, Netcat would be your tool of choice!” - Ed Skoudis ECE 4883 - Internetwork Security 5 Netcat – Major Features • Outbound or inbound connections • TCP or UDP, to or from any ports • Full DNS forward/reverse checking, with appropriate warnings • Ability to use any local source port • Ability to use any locally-configured network source address • Built-in port-scanning capabilities, with randomizer ECE 4883 - Internetwork Security 6 Netcat – Major Features (contd) • Built-in loose source-routing capability • Can read command line arguments from standard input • Slow-send mode, one line every N seconds • Hex dump of transmitted and received data • Optional ability to let another program service established connections • Optional telnet-options responder ECE 4883 - Internetwork Security 7 Netcat (called ‘nc’) • Can run in client/server mode • Default mode – client • Same executable for both modes • client mode nc [dest] [port_no_to_connect_to] • listen mode (-l option) nc –l –p [port_no_to_connect_to] ECE 4883 - Internetwork Security 8 Netcat – Client mode Computer with netcat in Client mode 1.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • Chapter 3 Composite Default Screen Blind Folio 3:61
    Color profile: GenericORACLE CMYK printerTips & Techniques profile 8 / Oracle9i for Windows 2000 Tips & Techniques / Jesse, Sale, Hart / 9462-6 / Chapter 3 Composite Default screen Blind Folio 3:61 CHAPTER 3 Configuring Windows 2000 P:\010Comp\OracTip8\462-6\ch03.vp Wednesday, November 14, 2001 3:20:31 PM Color profile: GenericORACLE CMYK printerTips & Techniques profile 8 / Oracle9i for Windows 2000 Tips & Techniques / Jesse, Sale, Hart / 9462-6 / Chapter 3 Composite Default screen Blind Folio 3:62 62 Oracle9i for Windows 2000 Tips & Techniques here are three basic configurations of Oracle on Windows 2000: as T a management platform, as an Oracle client, and as a database server. The first configuration is the platform from which you will manage Oracle installations across various machines on various operating systems. Most system and database administrators are given a desktop PC to perform day-to-day tasks that are not DBA specific (such as reading e-mail). From this desktop, you can also manage Oracle components installed on other operating systems (for example, Solaris, Linux, and HP-UX). Even so, you will want to configure Windows 2000 to make your system and database administrative tasks quick and easy. The Oracle client software configuration is used in more configurations than you might first suspect: ■ Web applications that connect to an Oracle database: ■ IIS 5 ASPs that use ADO to connect to an Oracle database ■ Perl DBI application running on Apache that connects to an Oracle database ■ Any J2EE application server that uses the thick JDBC driver ■ Client/server applications: ■ Desktop Visual Basic application that uses OLEDB or ODBC to connect to an Oracle Database ■ Desktop Java application that uses the thick JDBC to connect to Oracle In any of these configurations, at least an Oracle client installation is required.
    [Show full text]
  • Major Qualifying Project
    Network Anomaly Detection Utilizing Robust Principal Component Analysis Major Qualifying Project Advisors: PROFESSORS LANE HARRISON,RANDY PAFFENROTH Written By: AURA VELARDE RAMIREZ ERIK SOLA PLEITEZ A Major Qualifying Project WORCESTER POLYTECHNIC INSTITUTE Submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor of Science in Computer Science. AUGUST 24, 2017 - MARCH 2, 2018 ABSTRACT n this Major Qualifying Project, we focus on the development of a visualization-enabled anomaly detection system. We examine the 2011 VAST dataset challenge to efficiently Igenerate meaningful features and apply Robust Principal Component Analysis (RPCA) to detect any data points estimated to be anomalous. This is done through an infrastructure that promotes the closing of the loop from feature generation to anomaly detection through RPCA. We enable our user to choose subsets of the data through a web application and learn through visualization systems where problems are within their chosen local data slice. In this report, we explore both feature engineering techniques along with optimizing RPCA which ultimately lead to a generalized approach for detecting anomalies within a defined network architecture. i TABLE OF CONTENTS Page List of Tables v List of Figures vii 1 Introduction 1 1.1 Introduction .......................................... 1 2 VAST Dataset Challenge3 2.1 2011 VAST Dataset...................................... 3 2.2 Attacks in the VAST Dataset ................................ 6 2.3 Avoiding Data Snooping ................................... 7 2.4 Previous Work......................................... 8 3 Anomalies in Cyber Security9 3.1 Anomaly detection methods................................. 9 4 Feature Engineering 12 4.1 Feature Engineering Process ................................ 12 4.2 Feature Selection For a Dataset..............................
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Ncircle IP360
    VULNERABILITY MANAGEMENT TECHNOLOGY REPORT nCircle IP360 OCTOBER 2006 www.westcoastlabs.org 2 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT CONTENTS nCircle IP360 nCircle, 101 Second Street, Suite 400, San Francisco, CA 94105 Phone: +1 (415) 625 5900 • Fax: +1 (415) 625 5982 Test Environment and Network ................................................................3 Test Reports and Assessments ................................................................4 Checkmark Certification – Standard and Premium ....................................5 Vulnerabilities..........................................................................................6 West Coast Labs Vulnerabilities Classification ..........................................7 The Product ............................................................................................8 Developments in the IP360 Technology ....................................................9 Test Report ............................................................................................10 Test Results ............................................................................................17 West Coast Labs Conclusion....................................................................18 Security Features Buyers Guide ..............................................................19 West Coast Labs, William Knox House, Britannic Way, Llandarcy, Swansea, SA10 6EL, UK. Tel : +44 1792 324000, Fax : +44 1792 324001. www.westcoastlabs.org VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 3 TEST ENVIRONMENT
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • Remote Administration
    Remote Administration Contents Preparing The Server 2 Firewall Considerations 3 Performing Remote Administration 4 Additional Notes 5 Mobile Application Administration 6 Managing Users In The iPhone App 9 © Maxum Development Corp. Remote Administration Rumpus allows you to add users, check server status, review logs, and generally administer your server from your own desktop Mac, rather than having to go to the server to perform these tasks. Setting up Rumpus for remote administration is fairly straightforward, though some effort needs to be expended making sure your Rumpus settings remain secure, even when you make them accessible to remote Macs. Not all administrative tasks can be performed remotely. In particular, server installation, the setup assistants, and automatic diagnostics must be performed on the server itself. Almost all Rumpus control features needed for long-term server maintenance are accessible remotely, but before enabling remote access, you will need to install and perform basic setup of the server. In fact, we recommend that your server be functional and that you at least test the ability to log in to the server before attempting to remotely administer it. Preparing The Server Once basic operation of the server has been established, you are ready to enable remote administration. Open the “Network Settings” window and flip to the “Remote Admin” tab, shown below. ! Setup of remote administration from a desktop Mac Maxum Development Corp. "2 Remote Administration Maintaining security over remote administration is extremely important, so start by specifying an administration password and a list of client IP addresses that will be allowed to administer the server.
    [Show full text]