JMH
Banned
By Jesper M. Johansson.
Link -
How Flash Drives and Social Engineering can Compromise Networks
The technique of island hopping—penetrating a network through a weak link and then hopping around systems within that network—has been around for years. But it continues to take on new dimensions. In today's security-conscious IT environments, people are often the weakest link, and malicious users are
finding ways to use this to their advantage (think phishing and other forms of social engineering). This combination of carbon and silicon can prove fatal to your network.
One of my favorite implementations of leveraging the human element was perpetrated by Steve Stasiukonis of Secure Network Technologies during a penetration test for a customer. He seeded the customer's parking lot with USB flash drives, each of which had a Trojan horse installed on it. When the employees arrived for work in the morning, they were quite excited to find the free gadgets laying around the parking lot. Employees eagerly collected the USB drives and plugged them into the first computers they came across: their own workstations.
Link -
How Flash Drives and Social Engineering can Compromise Networks
My Computer
System One
-
- Manufacturer/Model
- LAPTOP. HP Pavilion dv7-1005TX .
- CPU
- IntelCore [email protected] x2
- Memory
- 4.00 GB installed, max capacity 8 GB.
- Graphics card(s)
- Nvidia GeForce 9600M GT & 512MB DDR2 dedicated graphics mem.
- Monitor(s) Displays
- 17.0" diagonal WXGA + High definition brightview widescreen infinity display.
- Screen Resolution
- 1440 x 900
- Hard Drives
- SPECS. Drive 1. 298.09 GB Fujitzu MHZ2320BH G2 ATA Device Drive 2. [ All as above.] CONFIG. C:\287.65 GB, D:\298.09 GB, E:\10.44 GB.
- Case
- Laptop / notebook.
- Cooling
- Stock.
- Mouse
- Synaptics PS/2 Port touch pad.
- Keyboard
- IBM enhanced
- Internet Speed
- ADSL [ Too slow.]
- Other Info
- Webcam.