| Null or Default Passwords | Leaving administrative passwords blank or using a default
	      password set by the product vendor. This is most common in
	      hardware such as routers and BIOSes, though some services that run
	      on Linux can contain default administrator passwords (though
	      Red Hat Enterprise Linux does not ship with them). | | Commonly associated with
		  networking hardware such as routers, firewalls, VPNs, and
		  network attached storage (NAS) appliances. |  | Common in many legacy operating systems, especially
		  OSes that bundle services such as UNIX and Windows. |  | Administrators sometimes create privileged users in a
		  rush and leave the password null, a perfect entrypoint for
		  malicious users who discover the user. | 
 | 
| Default Shared Keys | Secure services sometimes
	      package default security keys for development or evaluation
	      testing purposes. If these keys are left unchanged and are placed
	      in a production environment on the Internet,
	      any user with the same default keys have
	      access to that shared-key resource, and any sensitive information
	      contained in it. | | Most common
	      in wireless access points and preconfigured secure server
	      appliances. |  | CIPE (refer to Chapter 6 Virtual Private Networks) contains a sample static key that must be
	      changed before deployment in a production
	      environment. | 
 | 
| IP Spoofing | A remote machine acts as a node on
	    your local network, finds vulnerabilities with your servers, and
	    installs a backdoor program or trojan to gain control over your
	    network resources. | | Spoofing is quite difficult as it involves the
	    attacker predicting TCP/IP SYN-ACK numbers to coordinate a
	    connection to target systems, but several tools are available to
	    assist crackers in performing such a vulnerability. |  | Depends on target system running services (such as
	    rsh, telnet, FTP and others)
	    that use source-based authentication
	    techniques, which are not recommended when compared to PKI or
	    other forms of encrypted authentication used in
	    ssh or SSL/TLS. | 
 | 
| Eavesdropping | Collecting data that passes between two active nodes on a
	    network by eavesdropping on the connection between the two
	    nodes. | | This type of attack works mostly with plain text
		  transmission protocols such as Telnet, FTP, and HTTP
		  transfers. |  | Remote attacker must have
		  access to a compromised system on a LAN in order to perform
		  such an attack; usually the cracker has used an active attack
		  (such as IP spoofing or Man-in-the-middle) to compromise a
		  system on the LAN. |  | Preventative
		  measures include services with cryptographic key exchange,
		  one-time passwords, or encrypted authentication to prevent
		  password snooping; strong encryption during transmission is
		  also advised. | 
 | 
| Service Vulnerabilities | An attacker finds a
	    flaw or loophole in a service run over the Internet; through this
	    vulnerability, the attacker compromises the entire system and
	    any data that it may hold, and could possibly compromise other
	    systems on the network. | | HTTP-based services such as CGI
	    are vulnerable to remote command executions and even interactive
	    shell access. Even if the HTTP service runs as a non-privileged user
	    such as "nobody", information such as configuration files and
	    network maps can be read, or the attacker can start a denial of
	    service attack which drains system resources or renders it
	    unavailable to other users. |  | Services
	    sometimes can have vulnerabilities that go unnoticed during
	    development and testing; these vulnerabilities (such as
	    buffer overflows, where attackers gain access
	    by filling addressable memory with a quantity over that which is
	    acceptable by the service, crashing the service and giving the
	    attacker an interactive command prompt from which they may execute
	    arbitrary commands) can give complete administrative control to an
	    attacker. |  | Administrators should make sure
	    that services do not run as the root user, and should stay vigilant of patches
	    and errata updates for applications from vendors or security
	    organizations such as CERT and CVE. | 
 | 
| Application Vulnerabilities | Attackers find
	      faults in desktop and workstation applications such as e-mail
	      clients and execute arbitrary code, implant trojans for future
	      compromise, or crash systems. Further exploitation can occur if
	      the compromised workstation has administrative privileges on the
	      rest of the network. | | Workstations and desktops are more prone to exploitation as
	      workers do not have the expertise or experience to prevent or
	      detect a compromise; it is imperative to inform individuals of the
	      risks they are taking when they install unauthorized software or
	      open unsolicited email attachments. |  | Safeguards
	      can be implemented such that email client software does not
	      automatically open or execute attachments. Additionally, the
	      automatic update of workstation software via Red Hat Network or other
	      system management services can alleviate the burdens of multi-seat
	      security deployments. | 
 | 
| Denial of Service (DoS) Attacks | Attacker or
	      group of attackers coordinate against an organization's network or
	      server resources by sending unauthorized packets to the target
	      host (either server, router, or workstation). This forces the
	      resource to become unavailable to legitimate users. | | The most reported DoS case in
	      the US occurred in 2000. Several highly-trafficked commercial
	      and government sites were rendered unavailable by a coordinated
	      ping flood attack using several compromised systems with high
	      bandwidth connections acting as zombies, or
	      redirected broadcast nodes. |  | Source
	      packets are usually forged (as well as rebroadcasted), making
	      investigation to the true source of the attack difficult. |  | Advances in ingress filtering (IETF rfc2267)
	      using iptables and Network IDSes such as
	      snort assist administrators in tracking down
	      and preventing distributed DoS
	      attacks. | 
 |