Security Watch - Island Hopping: The Infectious Allure of Vendor Swag.

JMH

Banned
By Jesper M. Johansson.
The technique of island hopping—penetrating a network through a weak link and then hopping around systems within that network—has been around for years. But it continues to take on new dimensions. In today's security-conscious IT environments, people are often the weakest link, and malicious users are
finding ways to use this to their advantage (think phishing and other forms of social engineering). This combination of carbon and silicon can prove fatal to your network.
One of my favorite implementations of leveraging the human element was perpetrated by Steve Stasiukonis of Secure Network Technologies during a penetration test for a customer. He seeded the customer's parking lot with USB flash drives, each of which had a Trojan horse installed on it. When the employees arrived for work in the morning, they were quite excited to find the free gadgets laying around the parking lot. Employees eagerly collected the USB drives and plugged them into the first computers they came across: their own workstations.

Link -
How Flash Drives and Social Engineering can Compromise Networks
 

My Computer

System One

  • Manufacturer/Model
    LAPTOP. HP Pavilion dv7-1005TX .
    CPU
    IntelCore [email protected] x2
    Memory
    4.00 GB installed, max capacity 8 GB.
    Graphics Card(s)
    Nvidia GeForce 9600M GT & 512MB DDR2 dedicated graphics mem.
    Monitor(s) Displays
    17.0" diagonal WXGA + High definition brightview widescreen infinity display.
    Screen Resolution
    1440 x 900
    Hard Drives
    SPECS.
    Drive 1. 298.09 GB Fujitzu MHZ2320BH G2 ATA Device
    Drive 2. [ All as above.]

    CONFIG. C:\287.65 GB, D:\298.09 GB, E:\10.44 GB.
    Case
    Laptop / notebook.
    Cooling
    Stock.
    Keyboard
    IBM enhanced
    Mouse
    Synaptics PS/2 Port touch pad.
    Internet Speed
    ADSL [ Too slow.]
    Other Info
    Webcam.
Back
Top