david d'heilly on Tue, 16 Mar 1999 17:48:46 +0100 (CET) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> [jitof:341] KNOW WHAT HACKERS KNOW ABOUT YOU |
forwarded message ******************** Date: Sat, 13 Mar 1999 11:32:40 +0900 From: Chris Case <r-anima@qb3.so-net.ne.jp> Subject: [jitof:341] KNOW WHAT HACKERS KNOW ABOUT YOU The cracker's screwdriver has become more of a Swiss Army knife, his F-16 more of a stealth bomber. With awe and alarm, security analysts have observed the capabilities of Nmap, a network-scanning program that crackers are now using to plot increasingly cunning attacks. "Just before Christmas, we detected a new [network] scanning pattern we'd never seen before," said John Green, a security expert on the "Shadow" intrusion- detection team at the US Navy's Naval Surface Warfare Center. "Other sites have seen the same activity. The problem was, no one knew what was causing it." Green made the remarks in an online briefing hosted by the SANS Institute, a nonprofit network-security research and education organization. The group held the briefing to alert network administrators of the alarming increase in the strategies of network attacks. The culprit software prowling outside the doors of networks participating in the study is Nmap, an existing software utility used by administrators to analyze networks. In the hands of intruders, security analysts discovered, Nmap is a potent tool for sniffing out holes and network services that are ripe for attack. The analysts didn't look for actual damage that was carried out. Instead, they silently watched as various networks were scanned by untraceable Nmap users. "The intelligence that can be garnered using Nmap is extensive," Green said. "Everything that the wily hacker needs to know about your system is there." Rather than feel in the dark to penetrate network "ports" at random, Nmap allows intruders to perform much more precise assaults. The implications are a bit unnerving for the network community. The tool makes planning network intrusions more effective, while simultaneously bringing this sophistication to a wider audience of crackers. "It takes a lot of the brute force out of hacking," said Green. "It allows [intruders] to map hosts and target systems that might be vulnerable." And that should result in a higher success rate for attempted intrusions. "I think we're going to see more coordinated attacks. You can slowly map an entire network, while not setting off your detection system," said software developer H. D. Moore, who debriefed network analysts at the conference. But Moore is part of the solution. He authored Nlog, software that automatically logs activity at a network's ports and parlays it to a database. Weekly checks of the database enable the user to tell if someone is performing an Nmap analysis. Nlog serves as a companion tool to Nmap. Just like intruders, administrators can use Nmap to detect their own network weaknesses, then plug the holes. Prevention is the only defense, Green and Moore said. There is no other known way to combat an Nmap-planned network attack. "Right now it's basically a suffer-along scenario," Green said. But, at least, Nmap lets administrators "know what the hackers know about you." http://www.nswc.navy.mil/ . . . . . . . . . . . . . . . . . . . . . . . --- # distributed via nettime-l : no commercial use without permission # <nettime> is a closed moderated mailinglist for net criticism, # collaborative text filtering and cultural politics of the nets # more info: majordomo@desk.nl and "info nettime-l" in the msg body # URL: http://www.desk.nl/~nettime/ contact: nettime-owner@desk.nl