Global Information Assurance Certification Paper - GIAC Certifications

 
CONTINUE READING
Global Information Assurance Certification Paper

                           Copyright SANS Institute
                           Author Retains Full Rights
  This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.

Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
Nicolas-Loïc Fortin
           Version 1.2f
           Original submission

           Who is the intruder?

                                                                                               s.
                                                                                            ht
           Once upon a time, burglars and bandits were easily identifiable bad guys. Nowadays, with
           telecommunications and computers appears a new kind of criminals: the hackers. Actually, the

                                                                                        rig
           word « hacker » refers to any curious person who possesses computer related abilities and a great
           interest for information technologies. The vast media coverage of various computer attacks, these

                                                                                    ull
           last few years, has not only helped to popularize the word « hacker » but also, often, to define its

                                                                                    f
           meaning. The hackers' community is becoming one of computer passionate capable and likely to

                                                                                 ns
           attack
               Keybusinesses
                     fingerprintand governments
                                 = AF19         computer
                                         FA27 2F94 998D networks.
                                                         FDB5 DE3D F8B5 06E4 A169 4E46

                                                                              tai
           The lack of uniformity in the definition of the word « hacker » does not help to the

                                                                           re
           comprehension of this highly diversified community. The hackers have various motivations,
           different knowledge and goals, complicating our understanding of their community. Such a

                                                                       or
           matrix inevitably takes on a social character. The behavioural rules in a virtual world are not

                                                                    th
           different then the fundamental ones in the real world.
                                                                Au
           In an effort to present the «hackers' community» in the best manner possible, I have consulted
           some of the contributions made to help create these definitions. The main sources used are some
                                                             2,
           texts by Mr Marc Rogers, from Deloitte & Touche, documentation produced by Shaw, Post &
                                                         00

           Ruby as well as the community itself. In addition, I have participated in various discussions on
           Internet sites and forums.
                                                      -2

           I have found these contributions of the utmost interest because of their respective point of view.
                                                  00

           Shaw, Post & Ruby propose an enterprise oriented approach; Mr. Rogers, an individual oriented
           approach while the community suggests its own view on its composition. A table showing some
                                               20

           of the types is presented in the appendix.
                                            te

           Therefore, I hereby wish to present a summary of the hackers' community typology, inspired by
                                         tu

           the various sources I have consulted. As well, I will propose a few comments for each group in a
                                      sti

           computer security perspective.
                                   In

           The hackers' community: who are they ?
                               NS

           The hackers' community can be divided in three main groups, according to their computer
                           SA

           knowledge: first, the script kiddies (low level of technical knowledge), then the crackers (low to
           regular level of technical knowledge) and finally, the elite hackers (high level of technical
                        ©

           knowledge).
           The script kiddy is often at the beginning of his teenage years and his main motivation is easy
           glory. He can be characterized by weak technical knowledge and his need to vandalize
           (glorification). Quickly, he goes from one target to another, looking for easy kills, without
               Key fingerprint
           targeting           = AF19
                      any specific     FA27 2F94
                                   organization    998D FDB5
                                                in particular.   DE3D
                                                               Thus, theF8B5
                                                                         script06E4
                                                                                kiddyA169 4E46simply looking
                                                                                      is often
           for the respect he hopes to get from the elite hackers, gaining somewhat of a status inside the
           community.

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                   Author retains full rights.
The cracker is usually in the middle of his teenage years or so. His technical knowledge is not
           impressive, if he has any at all. His main motivations are, as for the script kiddy, glory and
           vandalism. On the other hand, the cracker has or gives the impression of being also motivated by

                                                                                                s.
           a certain social justice (without understanding its range). Therefore, often, he will justify his

                                                                                             ht
           actions by Robin Hood's principle, robbing the rich to give to the poor. Contrary to the script

                                                                                         rig
           kiddy, the cracker will not limit his targets to easy ones. As a matter of fact, he will often try to
           hit well renown companies or military and/or governmental sites. In so doing, he boosts his ego

                                                                                     ull
           and prestige.

                                                                                     f
           As for the elite hacker, he is often an adult with a regular job. His level of technical knowledge is

                                                                                  ns
           much higher, usually working in a highly technical environment. His motivations vary depending
               Key fingerprint
           on what             = AF19
                    "side" he has        FA27
                                    chosen.  It 2F94 998Dsecurity
                                                goes from  FDB5 DE3D
                                                                   officerF8B5  06E4
                                                                            (white hatA169   4E46
                                                                                        hacker) to industrial spy

                                                                               tai
           (black hat hacker) or any other possibility in between (grey hat hacker).

                                                                            re
                                                                        or
           The groups in the community : history and recognition

                                                                     th
           q   Script kiddies
                                                                 Au
           The script kiddies' group is the most recent of the three in the hackers' community. On the level
                                                              2,

           of technical knowledge, this group is on the lower rung of the ladder. Mainly constituted of
                                                          00

           beginners, they expect to become part of the elite, eventually.
                                                       -2

           We could compare this group to teenagers responsible for vandalism and graffiti, acting in such a
           manner to feel extreme sensations and hoping to impress the hackers' community in general. One
                                                   00

           very good example of this is Mafiaboy, a young man right in the middle of an identity crisis.
                                                20

           The media coverage of the feat of arms claimed by the script kiddies has attracted the attention
                                             te

           of the general public on the hackers' community capacity to access information databases of
                                          tu

           various nature (personal, financial, scientific, etc.) or to vandalize, to disturb the regular
           functioning of electronic systems. Such coverage, sometimes extending to sensationalism, also
                                       sti

           has the effect of minimizing the meaning of what hackers are, therefore contributing to the
                                    In

           problem of understanding the structure of their community, who they are. As well, the group of
           elite hackers does not appreciate them very much, finding them too "visible" in the media's eye,
                                NS

           asking for too much attention to be brought on the community in general by their need for
           recognition and easy/fast glory.
                            SA

           It is my opinion that by increasing the public's awareness in regards to the rules and laws
                        ©

           applicable as well as by working in prevention with internal operations policies and control, the
           number of such illegal and frivolous acts would decrease, the script kiddies becoming more and
           more discouraged to even try these operations. In fact, such an education would have an impact
           on the whole hackers' community activities.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

           q     Crackers

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
The crackers are forming one of the well defined groups of the hackers' community. "Born" in
           the 1980's, they were the script kiddies of the time, on the level of technical knowledge as well as
           for the motivations. In the same fashion as the script kiddies, the crackers were motivated by the
           hope of, some day, becoming a member of the presumed elite. Their way of operating would be
           what separates them from the script kiddies. The latter work in solo, the former often groups,

                                                                                                s.
           seaming more structured in their operations.

                                                                                             ht
           Their level of technical knowledge is roughly similar to the one of the script kiddies though a bit

                                                                                         rig
           refined. The crackers are often mistaken for hackers because of their average level of exploits.
           One of their main activities is software piracy (softwares, music, films, etc). They are the

                                                                                     ull
           creators of warez sites, responsible for the propagation of illegal copies of softwares or movies.

                                                                                     f
           They are pleased when having broken the anticopy protection of softwares like Windows XP, for

                                                                                  ns
           example, and will even distribute it to the members of their community and to the script kiddies.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                               tai
           Another activity they like to participate in is the creation of modern viruses, demanding more
           programming then before, since the elite hackers have increased their "level of difficulty". They

                                                                            re
           are often the authors of scripts found on the Internet to help use more sophisticated tools. Seldom

                                                                        or
           they possess the necessary knowledge to create tools or solve problems.
           The limit between crackers and black hat hackers (see section below), as far as their motivations

                                                                     th
           are concerned, is quite thin. Generally speaking, the crackers are younger and possess more
                                                                 Au
           restricted technical capabilities. Therefore, the possibility of them participating to economic or
           military crimes is lesser, by far, than it is for the black hat hackers. As a matter of fact, most of
                                                              2,

           the time, the crackers simply borrow principles established by the "elite" without truly
                                                          00

           understanding the economic and/or social aspect of their actions.
                                                       -2

           q   Elite hackers
                                                   00

           The group of elite hackers is the oldest group of this particular community. Generally older in
                                                20

           age, they are also more experienced and technically knowledgeable than the script kiddies and
           the crackers. Their motivations are more complex in nature and this group can be divided in
                                            te

           three sub-groups according to their value and morals, by using three explicit colours: white,
                                          tu

           black and grey.
                                      sti
                                    In

               •   First sub-group : "white hat hackers"
                               NS

           A white hat hacker is quite enthusiastic over technology, being fundamentally very curious and
                           SA

           doing all he can to satisfy his interest. Some members of this group are responsible for the birth
           of the Internet and form the club of those who took pleasure in studying the phone system. The
                        ©

           white hat hacker tries to get into the system for the shear challenge it presents. For him,
           bypassing a system or find its weaknesses is part of the pleasure he is looking.
           The most noteworthy type of this group is the one we could qualify "samurai", as much because
           of their method as for their code of honour. The samurai hackers are often called upon by the
           police
               Keyforces to help= catch
                    fingerprint   AF19aFA27
                                        hacker with998D
                                            2F94    less noble
                                                         FDB5intentions.
                                                               DE3D F8B5 According  to Shaw,
                                                                            06E4 A169   4E46 Post & Ruby,
           we could include in this group every curious person interested by computers. In an enterprise,
           they would be the colleague looking into the network or giving the most hip command to use.

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                   Author retains full rights.
•   Second sub-group : “black hat hackers”
           The black hat hackers are members of the elite who have been seduced by the darker side of the
           Force, to make an analogy with the famous Darth Vader in Star Wars. They often hold positions
           as spies, industrial spies, cyberterrorists or criminals working for some mafia organization.
           Many insider dealings are committed by them. They are not different from the conventional

                                                                                                s.
                                                                                             ht
           criminals except for the tools they use to perpetrate their crimes. The black hat hackers are
           motivated by the lure of a reward, vengeance or are simply attacking with a Robin hood

                                                                                         rig
           philosophy. This type of action is often called hacktivism, a form of pressuring measure used to
           see modifications applied.

                                                                                     ull
           In today's generally computerized environment of organizations and processes, these kind of

                                                                                     f
           people are to be feared. More and more, enterprises depend upon computers and for many of

                                                                                  ns
           them, a failure
               Key           extending
                    fingerprint  = AF19over a long
                                         FA27  2F94period
                                                    998Dof   time DE3D
                                                           FDB5   (more F8B5
                                                                        than 48 hours)
                                                                              06E4 A169can4E46
                                                                                           be fatal. In such a

                                                                               tai
           context, it is strongly recommended to be protected against such people as black hat hackers are
           always in advance on their knowledge of the conventional market of computer security, therefore

                                                                            re
           presenting a serious threat to enterprises in such a weak condition.

                                                                        or
           Not enough computer professionals take this kind of person (black hat hackers) into

                                                                     th
           consideration in their daily operations. As a matter of fact, there is a rather curious paradox to be
                                                                 Au
           made when comparing computer security to the security of your home, for instance. It seems
           quite obvious that you should install an anti-burglar system to protect your habitation but such a
                                                              2,
           reasoning does not seem to apply to the virtual world.
                                                          00

           As it can be stated from the events of September 11th, the terrorists have a strong proclivity to do
           damage to the vital centres of the Occident and such a potential threat should be feared. As a
                                                       -2

           matter of fact, it has often happened that crackers have entered sensible systems in the United
                                                   00

           States, controlling the electricity systems for example (California power grid).
                                                20

           Another great problem faced by big corporations is industrial espionage. In today's world of
           telecommunications and electronic computer systems, it becomes easier, for a competitor, to gain
                                            te

           access to strategic information or even to attack the reputation of its opponent by modifying web
                                          tu

           sites or the integrity of the networks. There is no more need of a face mask, a gun and to risk
                                      sti

           your life to rob. The simple use of a PC and an Internet connection are enough to embezzle a
           bank or an enterprise. Many insider dealings have been done with the help of computers, for
                                    In

           example by modifying accounting systems or payroll systems, a problem unfortunately
           becoming more and more common within enterprises.
                               NS

           We are also noticing an increase of unhappy and/or frustrated employees who are forming the
                           SA

           greatest plague a company could suffer of. These « black hat hackers » are employees who
           believe they are important in the organization and, feeling aggravated, wish to get vengeance.
                        ©

           The company's hardware is often their target, presenting a minimum risk if the protection against
           such acts is low, if present at all. When an employee is terminated, it is often forgotten to lock
           the key after his leave. Such an omission could prove to be a bigger mistake if the employee in
           question has a very good knowledge of the technological infrastructure and is able to damage it
           anonymously.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

               •   Third sub-group : "grey hat hackers"

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                   Author retains full rights.
The grey hat hackers are characterized by their ambiguity and pragmatism. In a certain way, they
           are at the intersection of the choices to be made: which side of the Force will it be ? Therefore,
           they are hard to track. They could just as well follow the noble principles of the « white hat
           hackers » but will practice on commercial web sites, as would « black hat hackers », but without
           criminal intentions.

                                                                                              s.
                                                                                           ht
           These hackers form the most populous of the elite hackers' groups. Usually crackers in the first
           place, they are often in their twenties, students in college or at the university or even young

                                                                                       rig
           workers with a tight budget. Actually, it is often at this stage that they become pragmatic.
           Without looking for personal growth like the « black hat hackers », they will have a tendency to

                                                                                   ull
           profit from the basic commodities and, to some extent, from a certain luxury. For example, they

                                                                                    f
           will begin to copy softwares, when lacking money, but will not try to make long term profit from

                                                                                 ns
           the activity.
                Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                              tai
           Excellent experts in the world of computer security might even be ex-grey hat hackers. Although
           it is quite controversial, their experience of many behaviours related to black hat hackers helps

                                                                           re
           them to understand their methods and, in so knowing, propose and/or apply appropriate security

                                                                       or
           measure to help protect from possible attacks.

                                                                    th
           Conclusion
                                                                Au
                                                             2,
           By using the generic term “hacker” to define any person able to use the advanced functions on a
           computer, it is hard to understand the motivations and the means characterizing the various
                                                         00

           categories of hackers. The better we understand each group's motivations, the more we will be
                                                      -2

           able to understand their acts.
                                                  00

           If we comprehend the place we have to give each group, we will be able to focus our efforts
           more accurately, by using white hat hackers to help secure our technological infrastructures for
                                               20

           instance. As well, coercive actions and a better education will help in reducing the growth of the
           script kiddies, grey hat hackers and crackers groups. The implementation of laws and an increase
                                            te

           in the presence of police force will help to catch the black hat hackers. By understanding that the
                                         tu

           virtual world is nothing but a reflexion of the real world, it will become possible to adapt our
                                      sti

           systems according to these new concepts. Nevertheless, a robber, be it virtual or real, will always
                                   In

           be nothing but a robber.
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                  Author retains full rights.
s.
                                                                                      ht
                                                                                  rig
                                                                              ull
                                                                               f
                                                                            ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                         tai
                                                                      re
                                                                  or
                                                               th
                                                Appendix   Au
                                                        2,
                                                    00
                                                 -2
                                             00
                                          20
                                       te
                                     tu
                                    sti
                                In
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002          As part of GIAC practical repository.              Author retains full rights.
Analogy by the author Actual names in the According to Mr Accor
           with the reality      community           Marc Rogers     & Rub
           Teenagers vandal, punk                 Script Kiddies                   Newbie/tool kit

                                                                                            s.
           Old fashion bank robber                Cracker                          Cyber-punk                       Hackers

                                                                                         ht
                                                                                     rig
                                                                                                                    Explorer
           Nerd                                   White hat hacker                 Old guard hackers

                                                                                 ull
                                                                                                                    Good Sa

                                                                                  f
                                                                               ns
                                                Grey hat hacker
              Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                            tai
           Spy                                                            Professional criminals                    Career th

                                                                         re
           Terrorism                                                               Cyber-terrorists                 Moles

                                                                     or
                                                                   th
                                                  Black hat hacker                                                  Exceptio

           White collar criminal
                                                              Au                   Internals                        Machiav
                                                            2,

                                                                                                                    Avenger
                                                       00
                                                    -2
                                                00
                                              20
                                         te
                                         tu
                                     sti
                                    In
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002             As part of GIAC practical repository.                 Author retains full rights.
References
           Inside the mind of the insider
           http://www.securitymanagement.com/library/000762.html
           (Shaw, Post & Ruby)

                                                                                            s.
                                                                                         ht
           Psychological Theories of Crime and “Hacking”

                                                                                     rig
           http://www.escape.ca/~mkr/crime_doc.pdf
           (Marc Rogers)

                                                                                 ull
           A New Hacker Taxonomy

                                                                                  f
                                                                               ns
           http://www.escape.ca/~mkr/hacker_doc.pdf
               Key
           (Marc   fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                  Rogers)

                                                                            tai
                                                                         re
           Modern-day Robin Hood or Moral Disengagement: Understanding the Justification for Criminal
           Computer Activity

                                                                     or
           http://www.escape.ca/~mkr/moral_doc.pdf

                                                                  th
           (Marc Rogers)

           The new hacker’s dictionary
                                                              Au
           http://www.tuxedo.org/~esr/jargon/jargon.html
                                                           2,

           (communauté)
                                                       00
                                                    -2

           Hacker, 15, charged in Web attack
           http://www.freep.com/news/nw/cyber20_20000420.htm
                                                00

           (mafiaboy)
                                             20

           Poking Holes in Microsoft's Copy Protection
                                          te

           http://www.pcworld.com/news/article/0,aid,69203,00.asp
                                       tu

           (Windows XP)
                                    sti

           FBI Issues Cyberthreat Advisory
                                  In

           http://www.pcworld.com/news/article/0,aid,61764,00.asp
           (cyber-terrorisme post 11 septembre)
                               NS
                           SA

           California hack points to possible IT surveillance threat
           http://www.infoworld.com/articles/hn/xml/01/06/13/010613hnprobe.xml
           (California power grid hack)
                        ©

           Cybercrime Skyrockets, Say Security Reports
           http://www.pcworld.com/news/article/0,aid,54591,00.asp
           (white collar crime)
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
           Introduction to Hacktivism
           http://www.collusion.org/Article.cfm?ID=109
           (Hacktivism)

© SANS Institute 2000 - 2002             As part of GIAC practical repository.              Author retains full rights.
Last Updated: May 25th, 2019

       Upcoming Training

SANS Atlanta 2019                                              Atlanta, GA            May 28, 2019 - Jun 02, 2019         Live Event

SANS San Antonio 2019                                          San Antonio, TX        May 28, 2019 - Jun 02, 2019         Live Event

Mentor Session @work - SEC401                                  Birmingham, AL         Jun 03, 2019 - Jul 08, 2019            Mentor

SANS Kansas City 2019                                          Kansas City, MO        Jun 10, 2019 - Jun 15, 2019         Live Event

SANSFIRE 2019                                                  Washington, DC         Jun 15, 2019 - Jun 22, 2019         Live Event

SANSFIRE 2019 - SEC401: Security Essentials Bootcamp Style     Washington, DC         Jun 17, 2019 - Jun 22, 2019             vLive

SANS Cyber Defence Canberra 2019                               Canberra, Australia    Jun 24, 2019 - Jul 13, 2019         Live Event

SANS Cyber Defence Japan 2019                                  Tokyo, Japan            Jul 01, 2019 - Jul 13, 2019        Live Event

SANS Charlotte 2019                                            Charlotte, NC           Jul 08, 2019 - Jul 13, 2019        Live Event

Community SANS Ottawa SEC401                                   Ottawa, ON              Jul 08, 2019 - Jul 13, 2019   Community SANS

SANS Cyber Defence Singapore 2019                              Singapore, Singapore    Jul 08, 2019 - Jul 20, 2019        Live Event

Community SANS Philadelphia SEC401                             Philadelphia, PA        Jul 08, 2019 - Jul 13, 2019   Community SANS

SANS London July 2019                                          London, United          Jul 08, 2019 - Jul 13, 2019        Live Event
                                                               Kingdom
Pittsburgh 2019 - SEC401: Security Essentials Bootcamp Style   Pittsburgh, PA          Jul 08, 2019 - Jul 13, 2019            vLive

SANS Pittsburgh 2019                                           Pittsburgh, PA          Jul 08, 2019 - Jul 13, 2019        Live Event

SANS Columbia 2019                                             Columbia, MD            Jul 15, 2019 - Jul 20, 2019        Live Event

SANS Rocky Mountain 2019                                       Denver, CO              Jul 15, 2019 - Jul 20, 2019        Live Event

SANS San Francisco Summer 2019                                 San Francisco, CA       Jul 22, 2019 - Jul 27, 2019        Live Event

Mentor Session - SEC401                                        Seattle, WA            Jul 25, 2019 - Aug 29, 2019            Mentor

SANS Boston Summer 2019                                        Boston, MA             Jul 29, 2019 - Aug 03, 2019         Live Event

SANS London August 2019                                        London, United         Aug 05, 2019 - Aug 10, 2019         Live Event
                                                               Kingdom
SANS Crystal City 2019                                         Arlington, VA          Aug 05, 2019 - Aug 10, 2019         Live Event

SANS Melbourne 2019                                            Melbourne, Australia   Aug 05, 2019 - Aug 10, 2019         Live Event

Minneapolis 2019 - SEC401: Security Essentials Bootcamp Style Minneapolis, MN         Aug 12, 2019 - Aug 17, 2019             vLive

SANS San Jose 2019                                             San Jose, CA           Aug 12, 2019 - Aug 17, 2019         Live Event

Community SANS Raleigh SEC401                                  Raleigh, NC            Aug 12, 2019 - Aug 17, 2019 Community SANS

SANS Minneapolis 2019                                          Minneapolis, MN        Aug 12, 2019 - Aug 17, 2019         Live Event

SANS Chicago 2019                                              Chicago, IL            Aug 19, 2019 - Aug 24, 2019         Live Event

SANS Virginia Beach 2019                                       Virginia Beach, VA     Aug 19, 2019 - Aug 30, 2019         Live Event

SANS New York City 2019                                        New York, NY           Aug 25, 2019 - Aug 30, 2019         Live Event

SANS Tampa-Clearwater 2019                                     Clearwater, FL         Aug 25, 2019 - Aug 30, 2019         Live Event
You can also read