2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet860/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   856   857   858   859   860   861   862   863   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Sendmail Debug Mode 
Then-current versions of the popular Sendmail software pack-
age used to route electronic mail messages across the internet contained a security 
vulnerability. This vulnerability allowed the worm to spread itself by sending a specially 
crafted email message that contained the worm’s code to the Sendmail program on a 
remote system. When the remote system processed the message, it became infected.
Password Attack 
The worm also used a dictionary attack to attempt to gain access 
to remote systems by utilizing the username and password of a valid system user (see 
“Dictionary Attacks” later in this chapter).


Malicious Code 
927
Finger Vulnerability 
Finger, a popular internet utility, allowed users to determine 
who was logged on to a remote system. Then-current versions of the Finger software 
contained a buffer-overflow vulnerability that allowed the worm to spread (see “Buffer 
Overflows” later in this chapter). The Finger program has since been removed from most 
internet-connected systems.
Trust Relationships 
After the worm infected a system, it analyzed any existing trust 
relationships with other systems on the network and attempted to spread itself to those 
systems through the trusted path.
This multipronged approach made the internet worm extremely dangerous. Fortunately, 
the (then-small) computer security community quickly put together a crack team of 
investigators who disarmed the worm and patched the affected systems. Their efforts 
were facilitated by several inefficient routines in the worm’s code that limited the rate of 
its spread.
Because of the lack of experience among law enforcement authorities and the court 
system in dealing with computer crimes, along with a lack of relevant laws, Morris 
received only a slap on the wrist for his transgression. He was sentenced to three years’ 
probation, 400 hours of community service, and a $10,000 fine under the Computer Fraud 
and Abuse Act of 1986. Ironically, Morris’s father, Robert Morris, was serving as the 
director of the National Security Agency’s National Computer Security Center (NCSC) at 
the time of the incident.
Stuxnet
In mid-2010, a worm named Stuxnet surfaced on the internet. This highly sophisticated 
worm uses a variety of advanced techniques to spread, including multiple previously undoc-
umented vulnerabilities. Stuxnet uses the following propagation techniques:

Searching for unprotected administrative shares of systems on the local network

Exploiting zero-day vulnerabilities in the Windows Server service and Windows Print 
Spooler service

Connecting to systems using a default database password

Spreading by the use of shared infected USB drives
While Stuxnet spread from system to system with impunity, it was actually searching 
for a very specific type of system—one using a controller manufactured by Siemens and 
allegedly used in the production of material for nuclear weapons. When it found such a sys-
tem, it executed a series of actions designed to destroy centrifuges attached to the Siemens 
controller.
Stuxnet appeared to begin its spread in the Middle East, specifically on systems located 
in Iran. It is alleged to have been designed by Western nations with the intent of disrupting 
an Iranian nuclear weapons program. According to a story in the 
New York Times
, a facil-
ity in Israel contained equipment used to test the worm. The story stated, “Israel has spun 


928
Chapter 21 

Malicious Code and Application Attacks
nuclear centrifuges nearly identical to Iran’s” and went on to say that “the operations there, 
as well as related efforts in the United States, are . . . clues that the virus was designed as an 
American-Israeli project to sabotage the Iranian program.” 
If these allegations are true, Stuxnet marks two major evolutions in the world of mali-
cious code: the use of a worm to cause major physical damage to a facility and the use of 
malicious code in warfare between nations.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   856   857   858   859   860   861   862   863   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish