Sometimes when you are deep in the forest looking at one branch of one tree, trying to reduce false negative rates for detecting a specific class of software vulnerability, it is useful to step back and look at the forest of what is going on in criminal hacking.
Today we were throwing some ideas around the office about hacking techniques we had seen reported. This got the discussion flowing towards extrapolating and using techniques in new areas. The following is a list of old and new.
Gaining network access
Popping open the TNI box outside someone’s house and running a phone cable from the test plug at their house to another location to steal their phone line when it’s not in use.
Cloning ESNs on analog cell phones to steal cell phone access (Oki 900)
Getting a job somewhere just to explore and use the computer and phone system. (Local Phone Co Central Office, Data Entry jobs, janitor),
Piggybacking behind someone with a badge
Printing your own visitors badge (with Bold Unescorted label)
Getting tours of facilities to learn more about their computers and phones
RFID skimming to get into a facility
Walking onto college campuses to use open labs
Hooking up a wireless access point onto someone else’s network while inside their building, or paying someone else to do it
Bouncing/proxying traffic through multiple countries and jurisdictions
Free wireless hotspots!
Compromising Machines for Identity theft
Parking lot wireless attacks (TJX)
Access point spoofing, commonly in airports, conferences, or other public areas
ATMs with hacked circuit boards that transmit track data over 802.11 or GSM
Jump on IRC and pay someone to set up a phishing attack
Using USB keys to load remote access and keystroke loggers on computers you have physical access to at retail stores, schools, doctor's office, etc.
What old hacker tricks have you seen and how would you apply the old to the new?
Chris Wysopal, co-founder and CTO of Veracode, is recognized as an expert and a well-known speaker in the information security field. He has given keynotes at computer security events and has testified on Capitol Hill on the subjects of government computer security and how vulnerabilities are discovered in software. His opinions on Internet security are highly sought after and most major print and media outlets have featured stories on Mr. Wysopal and his work. At Veracode, Mr. Wysopal is responsible for the security analysis capabilities of Veracode technology.
Love to learn about Application Security?
Get all the latest news, tips and articles delivered right to your inbox.
Veracode is a leading provider of enterprise-class application security, seamlessly integrating agile security solutions for organizations around the globe. In addition to application security services and secure devops services, Veracode provides a full security assessment to ensure your website and applications are secure, and ensures full enterprise data protection. Application protection services from Veracode include white box testing, and mobile application security testing, with customized solutions that eliminate vulnerabilities at all points along the development life cycle.
*Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates.
**Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.