波音游戏-波音娱乐城赌球打不开

III. Exploitations on Data Centre Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
Vulnerabilities of data centres are found in their physical security, systems / devices hosted and management procedures implemented. Several common exploitation techniques are illustrated below:
 

1.   Back Door

Data centre procedures developed by the IT staff that may have flaws that can create back door vulnerabilities. Exploitation on such weakness can inadvertently introduce security breaches and result in financial loss or repartition damage to universities.

A backup operation provides a good example of how data centre management can be exploited by insecure backup process. IT staff usually overlook the security of tape backup infrastructures, which may contain vulnerabilities and can be exploited to create disastrous consequences. Since the execution of the backup task that usually requires escalated system privileges at the operating systems, network, data repository and application system levels. Malicious parties can take advantage of this security weakness through penetrating flawed backup infrastructure to gain access to universities' sensitive data.

2.  Attacks on Remote Access to Data Centre Management

Exploitations on remote access technologies used for data centre management are in many forms. Known attacking techniques include:

  • Use of Virtual Private Network (VPN) access of terminated staff to gain access to data centre systems or management tools
  • Offline password cracking through decrypting the hash data received from VPN servers with Internet Key Exchange (IKE) Aggressive Mode Shared Secret Hash Leakage Weakness
  • Denial of Service (DoS) attack on Secure Sockets Layer (SSL) -based VPN can be achieved by using hidden attack packets, which was undetectable by Intruder Detection Systems (IDS). For example, disguise malformed Internet Security Association and Key Management Protocol (ISAKMP) headers as standard IKE headers
  • Login guess attack on Windows Remote Desktop by hackers

 3.  Social Engineering Social Engineering

As of today, social engineering still remains as the biggest cyber threats to information security. As opposed to DoS and other remote hacking techniques, social engineering involves obtaining physical or logical access to data centre assets via manipulating IT staff relevant to data centre management, rather than by breaking in or using technical cracking approaches. Some social engineering techniques frequently used by hackers include piggybacking, penetrating data centre by getting a job within the data centre management team, and disguising as vendor support personnel for performing maintenance services inside data centres.

 

References:

http://www.computereconomics.com/article.cfm?id=1112

http://www.ncp-e.com/fileadmin/pdf/techpapers/NCP-Attack-Vectors-WP.pdf

http://www.ee.co.za/wp-content/uploads/legacy/Securing%20remote%20data.pdf

http://www.nta-monitor.com/posts/2005/01/VPN-Flaws-Whitepaper.pdf

http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html

[Previous section][<Next section]

?

至尊百家乐官网赌场娱乐网规则| 大发888官网z46| 哪个百家乐技巧平台信誉好| 云鼎娱乐城信誉度| 网站百家乐官网假| 棋牌小游戏| 百家乐免費游戏| 澳门葡京赌场出台女| 德州百家乐赌博规则| 网络百家乐官网| 百家乐英皇娱乐网| 网上真钱斗地主| 百家乐ag厅投注限额| 赌百家乐官网的心得体会| 威尼斯人娱乐城存款多少起存| 百家乐官网破解分| 黔东| 钱柜百家乐的玩法技巧和规则| 博彩网百家乐官网全讯网| 大发888备用网站| 百家乐里面的奥妙| 百家乐官网拍是什么| 大发888官方 hplsj| 菲律宾百家乐官网试玩| 大发888亚洲游戏咋玩| 玩百家乐保时捷娱乐城| 百家乐官网规律和方法| 百家乐官网试玩网站| 大发888为什么进不去| 百家乐赌博娱乐城大全| 百家乐官网投注外围哪里好| 百家乐官网的嬴钱法| 百家乐神仙道礼包| 长方形百家乐官网筹码| 百家乐官网手机投注| qq德州扑克官网| 订做百家乐桌子| 百家乐注码管理| 百家乐官网游戏种类| 百家乐官网技巧微笑心法| 临朐县|