New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 987
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image ntwrk: Honeypots: Network honeypots nab surprises image
Networks
Network honeypots nab surprises
By Andy McCue
Silicon.com
September 26, 2003

Holes in company networks are being exploited by hackers and fraudulent employees to store and distribute illegal pornography, media files and pirated software.

A honeypot network set up purely to attract and monitor the level and type of hacking activity on the Internet has found hackers are routinely scanning for misconfigured file transfer protocol (FTP) servers that allow them to upload and store material secretly on company networks for later download.

The Irish Honeynet was set up by Espion, Deloitte & Touche and Data Electronics last year to mimic a typical corporate Internet infrastructure but with the ability to detect and monitor all activity to and from the system.

In a recent test, Espion deliberately misconfigured the FTP server–-a regular occurrence for many firms--which allows for the transfer of files to and from hosts on the Internet. The FTP server was configured to allow anonymous uploads and the creation of directories, while preventing anyone from downloading any files.

This allows for anonymous uploads and hackers exploit these holes to use the system as a storage depository for the illegal distribution of software, music and pornography. After just two days the Honeynet FTP upload directory contained many new files and directories, including hacker tools and files to test the amount of storage space and download speed available.

Espion's advice is for companies to only allow anonymous logins on an FTP server where there is a genuine business need and to limit the size of an upload and the size of the FTP directory.

Mark Morris, head of forensics, intelligence and security at LogicaCMG, warned that the threat can also come from inside, with employees surreptitiously using the corporate network to run their own businesses or store illegal content.

At one firm where we investigated an outsourced IT helpdesk we found a sub-network that the company did not know about that was running an escort agency Web site and a counterfeit software operation, he said.

The warnings echo findings from a study by PSINet and PanSec last week, which monitored two mock banking sites--one with security and one without. The results showed a frightening level of hacking activity that could cripple firms who still leave security to chance.

ZDN
Posted on Monday, 29 September 2003 @ 05:25:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Intel
· HotScripts
· W3 Consortium
· ZDNet News
· More about Networks
· News by phoenix22


Most read story about Networks:
D-Link DSL-300G/DSL-300G+ Default Password Vulnerability

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register