Hack in Progress - InformationWeek
Hardware & Infrastructure
04:10 PM
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

Hack in Progress

Just how easy is it to break into your company's networks? Hire a hacker, then sit tight.

The SetUp
Ryan Breed is a hacker. He's honed his skills since his undergraduate days at the University of Rochester, where a cryptography course piqued his interest in network security. Breed, 28, enjoys the analysis of computer systems and "decomposing systems and figuring out how they work."

Ryan Breed -- Photo by Ken Schles

As a security consultant for Unisys, hacker Breed tests his mettle against company security systems, pointing out weak spots.

Photo of Ryan Breed by Ken Schles
He's gearing up to do his thing. But this evening's hack is sanctioned, commissioned, and paid for by the targeted company. Breed is an ethical hacker, a security consultant for Unisys, and tonight he's conducting a penetration test on an international business-consulting firm with 10 servers and more than 150 desktops. The name of the company and information that would disclose its identity have been withheld at the company's request.

The scene is the third-floor conference room of a building in a suburban office park. It's a hot and humid July night. Seated around the wood-grained conference table, opposite Breed, are three people: the financial officer of the company, a director, and the company's IT manager. Breed's black Dell notebook is hooked up to a projector that displays what's happening on his screen on the wall.

The Hack
Breed likes his work. You can see it in his eyes as he readies his PC on the table. The notebook holds a few hints of his personality, such as a copy of the shoot-'em-up game Quake III, as well as the tools of his trade, such as a network-protocol analyzer named Ethereal and a tool called NetStumbler, an app that's used to find wireless networks. "That's standard issue," he says. "It's a must-have." You get the impression Breed carries around plenty of these "standard-issue" tools.

Surprisingly, the first tool Breed employs is Google.com. "Google is great for researching a company," he explains. "You can often catch information about the corporate domains and find interesting things that reference other sites that the company may be connected to."

Another of Breed's favorite places for preattack recon, he says, is a company's help-wanted ads for IT jobs. "You'll find out what kind of software and systems they run from the skills and experience they're seeking in their IT job listings," he says. Another tactic is scanning Internet message boards on financial sites such as Yahoo and seeking out sites set up by ex-employees. "There's lots of information about any corporation; it's all over and easily found if you just go and look for it."

The hacker-for-hire doesn't find much of interest in his Google search. He then looks up the company's domain name to see what he can find at Whois.net. "I'm looking for targets," he says. The Whois search reveals a contact name and a pair of domain servers.

"Why is that information available?" asks the company's director, surprised that domain-server information is so easily accessible. The IT manager explains that such information is commonly available on the Net.

As Breed clicks away on his notebook, he lets an occasional grin surface, lifts his eyebrows, and crinkles his forehead. After jotting down the domain addresses, he takes an educated guess at what may be the block of network addresses on the company's system. He launches Nmap, or Network Mapper, and begins sweeping to see what his guess may turn over. Nmap uses IP packets to see what operating systems the network is running, what servers are connected to it, what services and ports are available, even whether packet filters and firewalls are in place.

1 of 3
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll