The Spy in Your Server Room 120
CorinneI writes "Your business's private information may not be as safe as you think — especially when you take into account how many people pass through your office's revolving door on a daily basis. That's why many companies hire TraceSecurity employees to test the security of their systems — operations that usually involve TraceSecurity personnel talking their way into offices in order to gain access to server rooms and sensitive customer information. PC Magazine was invited along to cover a recent TraceSecurity operation."
Eh? (Score:5, Insightful)
Re: (Score:1, Redundant)
It reads like an Advert. I wonder....
Re: (Score:2)
A city of paranoiacs with a single successful computer-related company...why am I not surprised?
Re: (Score:1)
I wonder if they get extra pay for that...
CmdrTaco (Score:5, Interesting)
Penetration testing is next to useless (Score:3, Insightful)
Re: (Score:2, Insightful)
Which is a good reason for physical penetration testing: to throw management's assumptions in their face.
Re: (Score:2)
Which is a good reason for physical penetration testing: to throw management's assumptions in their face.
Management that demands IT be security jobs will just demand that they be better guards.
Re: (Score:1, Interesting)
Re: (Score:2)
Re: (Score:1)
There were probably fire regulations against something that secure too -- I was in the building late-ish at night a month ago when it caught fire (minor-ish), the four panels that made up each revolving door folded around the next to each other to leave plenty of space to walk out easily.
Re: (Score:2)
Re: (Score:1)
Re:Eh? (Score:5, Funny)
According to TraceSecurity, advertisements on Slashdot often masquerade as articles. That's why many Slashdot members hire TraceSecurity to validate their contents before reading them. This message brought to you by TraceSecurity: Tracing your Security so that you can be secure in the knowledge that your Security is Traced.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Slashvertisement! (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
Cause Im da pimp!
Re:Slashvertisement! (Score:5, Informative)
Re: (Score:3, Interesting)
Re: (Score:3, Interesting)
Server room? (Score:3, Insightful)
OK, bad joke, I know we're talking about the file server here, but why would a spy be in the server room? Wouldn't he be a lot less notcable logging in from an empty office? Or better yet, an empty office whose owner has just left his machine for the rest room?
What do you mean, RTFA? This is slashdot, we don't need no FAs!
-mcgrew
Re: (Score:1)
Re: (Score:2)
Social Engineering (Score:2, Insightful)
Re: (Score:1)
Long ago, when I was a pimply-faced youth working at a somewhat sensitive location, we were trained over and over again to escort one guest per employee and no more, and to BE that person's shadow. We were to keep that person on task or escort them out. If they bolted, you grab anyone's phone and call security ASAP (welcome to the 80's). That way
They must be good (Score:5, Funny)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Too Many Secrets.
From a famous movie.
Involving 'hackers'.
Re: (Score:2)
Sneakers (Score:5, Funny)
Re: (Score:1)
Blech (Score:2)
Waste of kilobytes (Score:2, Insightful)
Re: (Score:1)
Moderated -1 "Blatant advertising" (Score:5, Informative)
Seriously, while it's not an entirely bad article on a penetration test, this is nothing but a shameless plug.
Re:Moderated -1 "Blatant advertising" (Score:5, Funny)
Re: (Score:1)
Re: (Score:2)
#1 cause is underpaid IT staff. (Score:4, Interesting)
All they prove is that IT departments are not only underpaid but under staffed.
the second thing they prove is that the security staff is also underpaid and understaffed. Sorry but my first shot is to ask what company they are from, then google it to find the phone number. I never call the number given by the person or on their badge or paperwork.
There are lots of other ways. also you don't need access to the server room to install a rogue AP and gain a wireless cracking point. one hidden nicely under the a desk on the 2nd floor corner office is a better place.
Re:#1 cause is underpaid IT staff. (Score:4, Interesting)
Would you similarly distrust the number given to you from the email that was sent and appeared to be from management? I know I would assume that if the number differs from the public one on the web, it's because we have a corporate plan and have priority support from them. I -do- distrust anyone who claims to be X and give me the phone number to prove it. WAY too easy to fake.
"There are lots of other ways. also you don't need access to the server room to install a rogue AP and gain a wireless cracking point. one hidden nicely under the a desk on the 2nd floor corner office is a better place."
You do if the network is secured properly. Especially if they bothered to have 2 networks.
Re: (Score:1, Insightful)
You do if the network is secured properly. Especially if they bothered to have 2 networks.
accesspoint running OPEN-WRT clone the executives PC's mac address, now set it up to transparently allow the executive to work just fine open up ports for remote access that the IT guys will probably use. now it looks like the executives PC is online and happy. your computer connected wirelessly looks like it's the executive PC as well. start your escapades... you have remote control over the AP so you can adjust t
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
On the other hand, it wouldn't be too hard for a disgruntled IT worker to set up a WAP for someone to gain access, but I suspect the signal would be a bit hard to pick up through concrete walls and across 500 feet of parking lot...
Re: (Score:1)
Re: (Score:1)
Re: (Score:3, Insightful)
It probably wouldn't be very difficult to setup a rogue website. Since TraceSecurity bothered to prepare for the operation a week in advance, even printing a custom designed magnetic plaque to brand their rented car, there is ample time for
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
You misunderstood my point. They can fake e-mail from anybody, which nobody should care except when they actually come on-site. The first question is "who invited you here?" Then the security guard or receptionist would look up the name from a directory, call the person, confirming that the visitor is here, then hand the responsibility over to the host. The only assumption I make is that the host would be fully accountable for his visitor's action. This includes finding a watch-person if the host is not ava
Re: (Score:2)
Where I work, wireless security is taken very seriously. Sweeps for rogue access points is regular. Access points found are published in employee communications. A much better hack would be some kind of inside server, but it would have to make it's own outgoing connection to a controlled we
Locks! (Score:2)
Re: (Score:3, Insightful)
If it's not one of the 5 people that are allowed in there. Call security and have them meet you at the door.
really simple. but it's money
Re: (Score:2)
Re: (Score:1)
Oh Please (Score:2, Insightful)
Editors: For the sake of credibility, please consider before you post. Unless you would consider my story about a bridge in Brooklyn I have for sale, then I might reconsider my position.
Auto-Hack 2000 (Score:4, Insightful)
So by placing the CD-ROM in a computer, it will automatically hack what ever OS the computer is running and auto install your software? Or are you implying that this company left server consoles logged in as an admin user?
I call major bullshit on this article. There's some real iffy stuff here as pointed out by other
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Who said automatically? They said they COULD have gone a step further. They could have placed a trojan on the computer, which would then contact the TS computer and allow remote access. They are saying that they DO that when the customer requests it, but it was not requested in this case.
By hacking the OS from the login prompt? By standing at the terminal for 20 minutes while they reboot and bypass the OS? By installing software on an unlocked terminal? I still find this whole story fluff.
Re:Auto-Hack 2000 (Score:4, Insightful)
If you can put a CD-ROM in the drive, you have full physical access. At least for a typical PC-type system (which most servers are these days) physical access means you own the box. Reboot, boot from the CD, mount the hard drive, bang.
Re: (Score:2)
For a start anyone worth their salt would have set up the bios correctly and you can't do the exploit you've just cited, hell I can't even do that exploit on any of the desktop work PCs I've used(3 separate companies), never mind one of the servers...
Secondly if you're about to say - swap out the hard drive then you're still wrong - it takes a fair amount of time to swap out a hard drive and I bet that would be noticed. Now maybe they are hot plug drives in the server, but good luck getting a prope
Re: (Score:2)
So far as the server going offline being noticed, I'll bet there are a lot of servers out there that could go down for ten minutes and not exactly have an instant response.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
There is a registry entry you can change to disable autorun, which I highly recommend. Unfortunately, it breaks auto-detection of inserted CDs, which means that if you enable it for the normal employee systems, you'll have some extra training / help desk calls to expla
Re: (Score:1)
Sorry, I couldn't resist.
Re: (Score:2)
I call major bullshit on this article. There's some real iffy stuff here as pointed out by other
Re:What about the low wage rent a cop or jantor wh (Score:1, Insightful)
Heaven forfend!
Re: (Score:1)
Re: (Score:2)
Re:What about the low wage rent a cop or janitor (Score:2)
I suspect that because these people only arrive after office hours no-one in charge ever thinks of them as existing, much less as a security risk.
How exactly did they send an email to the office? (Score:4, Insightful)
Re:How exactly did they send an email to the offic (Score:2)
Re:How exactly did they send an email to the offic (Score:1)
Re:How exactly did they send an email to the offic (Score:2)
Not entirely true for an institution where the public facing servers and administrative intranets are seperate from each other and from the production servers and networks.
Re:How exactly did they send an email to the offic (Score:2)
e.g. sending an email from FIRSTUNI0N.COM to employees of FIRSTUNION.COM
Flame ON! (Score:5, Insightful)
Seriously, even though I know all too well how running something like slashdot is a lot harder than it looks, and how not everyone can be satisfied, and how quality sometimes has to come after candor, even after all that, I know deep down I actually could start something better than this dreck. But frankly, "social links" and blog aggregators are already out there, and I won't pour my money down the hole of recreating reddit, digg, or technorati.
This article shows precisely how slashdot is not only not journalism, it's not even a respectable blog. Slashdot occupies the medium precisely inbetween, known colloquially as "The Worst of Both Worlds." You should be ashamed . But I know you aren't.
Re: (Score:2)
Thankfully.. (Score:1)
Re: (Score:1)
got spy room, need server (Score:1)
Spy Cat (Score:1)
What I want to know is... (Score:3, Funny)
Dariel...THE BEEF!
Re: (Score:2)
Re: (Score:1)
Sleezy (Score:1)
Take the corners (Score:2)
Funny the reactions (Score:2)