Just how easy is it to break into your company's networks? Hire a hacker, then sit tight.
Ryan Breed is a hacker. He's honed his skills since his undergraduate days at the University of Rochester, where a cryptography course piqued his interest in network security. Breed, 28, enjoys the analysis of computer systems and "decomposing systems and figuring out how they work."
As a security consultant for Unisys, hacker Breed tests his mettle against company security systems, pointing out weak spots.
Photo of Ryan Breed by Ken Schles
He's gearing up to do his thing. But this evening's hack is sanctioned, commissioned, and paid for by the targeted company. Breed is an ethical hacker, a security consultant for Unisys, and tonight he's conducting a penetration test on an international business-consulting firm with 10 servers and more than 150 desktops. The name of the company and information that would disclose its identity have been withheld at the company's request.
The scene is the third-floor conference room of a building in a suburban office park. It's a hot and humid July night. Seated around the wood-grained conference table, opposite Breed, are three people: the financial officer of the company, a director, and the company's IT manager. Breed's black Dell notebook is hooked up to a projector that displays what's happening on his screen on the wall.
Breed likes his work. You can see it in his eyes as he readies his PC on the table. The notebook holds a few hints of his personality, such as a copy of the shoot-'em-up game Quake III, as well as the tools of his trade, such as a network-protocol analyzer named Ethereal and a tool called NetStumbler, an app that's used to find wireless networks. "That's standard issue," he says. "It's a must-have." You get the impression Breed carries around plenty of these "standard-issue" tools.
Surprisingly, the first tool Breed employs is Google.com. "Google is great for researching a company," he explains. "You can often catch information about the corporate domains and find interesting things that reference other sites that the company may be connected to."
Another of Breed's favorite places for preattack recon, he says, is a company's help-wanted ads for IT jobs. "You'll find out what kind of software and systems they run from the skills and experience they're seeking in their IT job listings," he says. Another tactic is scanning Internet message boards on financial sites such as Yahoo and seeking out sites set up by ex-employees. "There's lots of information about any corporation; it's all over and easily found if you just go and look for it."
The hacker-for-hire doesn't find much of interest in his Google search. He then looks up the company's domain name to see what he can find at Whois.net. "I'm looking for targets," he says. The Whois search reveals a contact name and a pair of domain servers.
"Why is that information available?" asks the company's director, surprised that domain-server information is so easily accessible. The IT manager explains that such information is commonly available on the Net.
As Breed clicks away on his notebook, he lets an occasional grin surface, lifts his eyebrows, and crinkles his forehead. After jotting down the domain addresses, he takes an educated guess at what may be the block of network addresses on the company's system. He launches Nmap, or Network Mapper, and begins sweeping to see what his guess may turn over. Nmap uses IP packets to see what operating systems the network is running, what servers are connected to it, what services and ports are available, even whether packet filters and firewalls are in place.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.