The Spy in Your Server Room 120
CorinneI writes "Your business's private information may not be as safe as you think — especially when you take into account how many people pass through your office's revolving door on a daily basis. That's why many companies hire TraceSecurity employees to test the security of their systems — operations that usually involve TraceSecurity personnel talking their way into offices in order to gain access to server rooms and sensitive customer information. PC Magazine was invited along to cover a recent TraceSecurity operation."
Eh? (Score:5, Insightful)
Slashvertisement! (Score:5, Insightful)
Server room? (Score:3, Insightful)
OK, bad joke, I know we're talking about the file server here, but why would a spy be in the server room? Wouldn't he be a lot less notcable logging in from an empty office? Or better yet, an empty office whose owner has just left his machine for the rest room?
What do you mean, RTFA? This is slashdot, we don't need no FAs!
-mcgrew
Social Engineering (Score:2, Insightful)
Waste of kilobytes (Score:2, Insightful)
Oh Please (Score:2, Insightful)
Editors: For the sake of credibility, please consider before you post. Unless you would consider my story about a bridge in Brooklyn I have for sale, then I might reconsider my position.
Re:Locks! (Score:3, Insightful)
If it's not one of the 5 people that are allowed in there. Call security and have them meet you at the door.
really simple. but it's money spent that is better spent on an executives custom desk or office remodel.
Auto-Hack 2000 (Score:4, Insightful)
So by placing the CD-ROM in a computer, it will automatically hack what ever OS the computer is running and auto install your software? Or are you implying that this company left server consoles logged in as an admin user?
I call major bullshit on this article. There's some real iffy stuff here as pointed out by other
Re:#1 cause is underpaid IT staff. (Score:1, Insightful)
You do if the network is secured properly. Especially if they bothered to have 2 networks.
accesspoint running OPEN-WRT clone the executives PC's mac address, now set it up to transparently allow the executive to work just fine open up ports for remote access that the IT guys will probably use. now it looks like the executives PC is online and happy. your computer connected wirelessly looks like it's the executive PC as well. start your escapades... you have remote control over the AP so you can adjust things at will.
Even if you have it tight as a drum, whatever that executive has access to the intruder does as well. hell he can even set it to sniff all traffic and snag the executives data to snif out the username and password easily. Look all the financial records are wide open as well as business plans etc....
You cant "protect" from that short of regular security sweeps.
How exactly did they send an email to the office? (Score:4, Insightful)
Flame ON! (Score:5, Insightful)
Seriously, even though I know all too well how running something like slashdot is a lot harder than it looks, and how not everyone can be satisfied, and how quality sometimes has to come after candor, even after all that, I know deep down I actually could start something better than this dreck. But frankly, "social links" and blog aggregators are already out there, and I won't pour my money down the hole of recreating reddit, digg, or technorati.
This article shows precisely how slashdot is not only not journalism, it's not even a respectable blog. Slashdot occupies the medium precisely inbetween, known colloquially as "The Worst of Both Worlds." You should be ashamed . But I know you aren't.
Re:Auto-Hack 2000 (Score:4, Insightful)
If you can put a CD-ROM in the drive, you have full physical access. At least for a typical PC-type system (which most servers are these days) physical access means you own the box. Reboot, boot from the CD, mount the hard drive, bang.
Re:What about the low wage rent a cop or jantor wh (Score:1, Insightful)
Heaven forfend!
Penetration testing is next to useless (Score:3, Insightful)
Re:Penetration testing is next to useless (Score:2, Insightful)
Which is a good reason for physical penetration testing: to throw management's assumptions in their face.
Re:#1 cause is underpaid IT staff. (Score:3, Insightful)
It probably wouldn't be very difficult to setup a rogue website. Since TraceSecurity bothered to prepare for the operation a week in advance, even printing a custom designed magnetic plaque to brand their rented car, there is ample time for Google to pick up the website. It doesn't have to be the highest page ranked for pest control because you'll be searching for the company's name.
Visitors should never be left unattended, but it is often impractical to deposit an employee for watching whenever there is a visitor. Notice there is a difference when the visit is solicited: there is someone inside the company who initiated the visit, so let him be responsible. In the case of a legitimate visit by pest control, someone inside the company must have called them over, so it is also his job to attend the pest control or at least appoint someone to attend them. There should be some way inside the company to figure out who is the host of a visitor, then make the host accountable.