Hacking The IT Cube
Hacking The IT Cube
By Douglas Chick
ISBN 0-9744630-3-5
Print 3
Publisher –TheNetworkAdministrator.com
201 W Cottesmore Cir
Longwood FL 32779
www.thenetworkadministrator.com
By Douglas Chick
README.TXT 1
Chapter 2:
Positions in an IT Department
IT Position Introduction 22
Chapter 3:
Chapter 4:
Hack / Anti Hacking Tools and Methods
Hack / Anti Hacking Tools 106
Hiding in Windows Registry
Finding The Hidden Process 108
Fport
PSTools 109
Tlist 110
Tasklist
Process Killers
PsKill.exe
Kill.exe
TaskKill.exe
Network Analyzers 114
Commview
Ethereal 115
EtterCap 115
Snort 116
WinDump / TCPDump
Dsniff
Scanning Tools 117
NMap
Sam Spade 118
NetScanTools Pro
SuperScan
NetCat 119
Wireless Scanners 119
Network Stumbler
Ethereal 120
AirSnort
Networking Tools for the Professional 121
Ping
Trace Route 121
Telnet 122
NSLOOKUP
WhoIS
Netstat
Nbtstat
Vulnerability Assessments / Penetration Testing 123
Nessus
Microsoft Assessment Tools
N-Slalker
GFI LANguard
Password Recovery 124
Command Line Utilities 125
Windows Command 126
Linux Command 127
What to know about viruses 133
Computer and Network “Security” 136
Firewalls 137
Common Attacks 141
Denial-of-Service Buffer Overflows
Data Diddling
E-mail Spoofing
Mail Spamming Worms / Virus Attacks
Logic Bombs
Password Cracking 142
E=mailSpam2 144
Open Relay Exploit
How to test for open relay
Buffer Overflow Spam 145
Advanced Google Searches (Google Hacking) 147
Chapter 5:
Managing Your Network and Server Room
Learning Under Fire or Submersion Learning 154
Know the Server Room 158
The Demarc
CSU /DSU
Routers
Hubs
Switches
Patch Panel
UPS
Know Your Servers 162
Database Servers
File and Print Servers
Time Clock Server
DHCP Server 164
E-mail Servers
DNS Server
Web Servers
FTP Servers
What Server Operating Systems Should I Know 167
Rebooting the Server 168
Passwords 169
What to Do When a Server Crashes 170
Differential
Incremental
Full backup
The Recommended Back Up Strategies 173
Tape backups
Hard drive backups
Monthly backups
Other types of tape rotations
Troubleshooting Tips: 175
Upgrades 177
Chapter 6:
Managing an IT Department
From Tech to Manager 179
Being an IT Manager 180
Manager / Executive
Pagers / Cell Phones / Laptops 181
Company Politics 182
Purchasing Computer Product 184
Specialist and Generalist 185
A Job 24 / 7 187
Over-Clockers 188
IT Ethics 189
Confidential Disclosure Agreement 191
Writing Network and Internet Policy 194
Software Licenses 195
Proprietary Software
Suggesting New Technology 197
Being Good at Prioritizing
The Politics of Getting What You Need 200
The Computer Person before you 203
Working Without Supervision 204
Working in a Team Environment
Training Yourself and Your Staff 206
Communication Skills 208
Chapter 7:
Bitter Facts from Experiences
Keeping a Messy Office 210
A Word about Computer Part Magazines 211
User’s Computer Desk Clutter 213
Cleaning Keyboard and Fans
What You Need to Know About Computer End Users * 215
The Differences Between End-users and 218
African Mountain Gorilla *
Why do end-users call their computers modems? * 220
End-user Soup * 222
Eating Habits of the Office Worker * 225
Computer Users Mating Habits *
Repairing Home Computers 226
Working with Outside Consultants 226
Job Stasis 228
Most Common Mistakes by Computer Department 229
Who has the Power 232
Taking the Emotion out of “IT” 233
Birthday Cake Day 234
The Internet is a Living Body* 235
10 Signs that you might be a Geek * 236
Meetings 237
Performance Anxiety
Appendix A
Cabling 238
Bulk Cable
Different Categories of CAT Cable 238
Unshielded Twisted Pair (UTP) 240
Shielded Twisted Pair (STP)
Screened Twisted Pair 240
Standard Ethernet Patch Cable 241
RJ-45 Connector
Crossover Cable 242
Coaxial Cable 243
Thicknet 244
Thinnet
Fiber Optic 244
Appendix B
Computer Terms and Definitions 246
Hacking the IT Cube
README.TXT
Hacking the Cube is a straightforward and sometimes comical
look into the everyday world of information technology. It
answers questions that many IT professionals and newcomers
ask about the tools and skills needed to survive one of the most
complex career fields in the world. Most computer books deal
with configuring software and do little to help you learn what
you need to know to work in a network office environment.
Most people are unprepared for the social, political, or
psychological aptitude needed to survive in the office
workplace. The majority of computer books are software
proprietary and they do not provide you with the necessary
information on programs commonly found in the field of
computers.
Many of the topics in this book are situations based on
my experience and the experiences of other computer
professionals that you would not typically have access to
without actually having a job in an IT department. Other topics
in this book are questions that have been e-mailed to my
website, www.thenetworkadministrator.com, from people
0H
1
Hacking the IT Cube
2
Hacking the IT Cube
Chapter 1
3
Hacking the IT Cube
4
Hacking the IT Cube
5
Hacking the IT Cube
6
Hacking the IT Cube
7
Hacking the IT Cube
8
Hacking the IT Cube
course, if this sounds like a path you will take, you will
discover other options in the course of your career and being a
CIO will not really matter.
However, I know plenty of people that are self-taught,
self-studied for their certifications, and they are working in the
industry today. You just have to be dedicated and self-
disciplined. If you do not have these two traits, you are going
to have to learn them or lessons will be long and slow for you.
When people ask me how I learned computers or networking, I
like to tell them, “I taught myself. Because I didn’t know much
to begin with, lessons were long and slow and the instructor
wouldn’t stop talking about himself.”
Many employers place a great deal of value in someone
that is self-taught. I know a woman named Ellen that is a good
example of this. She quit her job, dedicated herself to doing
nothing but learning networking, self-studied, and in two
months, she got an MCSE. In her first week, she had five
interviews; four with Microsoft and received four offers. She
chose the job with Cisco Routers on the Microsoft backbone in
Redmond, Washington. Dave, her boss, picked her because of
her drive and determination and her ability to learn. It took her
another five years before she ever looked at a local area
network. I always choose someone with a positive attitude and
the aggressiveness to learn above anyone else. I will always
hire someone eager without experience over someone
lackluster with experience.
When I review a resume, the first thing that I look at is
what software knowledge is listed. There are many instances
when a network manager or an IT Director needs someone with
knowledge that falls just below a certain salary level. The
problem with hiring someone with too much experience is he
or she often comes with higher salary requirements and bad
work habits. Sometimes it is better to hire someone smart and
eager who just needs a break. You will find that most
9
Hacking the IT Cube
10
Hacking the IT Cube
--Anyone that has ever had a job was hired at least one time in
his or her life without some form of job experience.
11
Hacking the IT Cube
Overlooking Inexperience
Product knowledge is the key to overcoming lack of
experience. Computer programs create computer careers.
Software companies create programmers, network
administrators, SQL programmers, and router administrators.
Inexperience is secondary if you know the product. In other
words, product knowledge is an acceptable replacement for
experience. Product knowledge can be described as knowing
an operating system, a programming language, a router OS, or
an SQL language inside and out. While studying C++, I was
talking to a Vice President at Microsoft, and he asked me how
well I knew C++? He needed C++ programmer’s right then. He
knew I had no programming experience but he was willing to
overlook it, if I was eager and knowledgeable enough to use
the product. I was not, and subsequently he did not pursue it
any further.
You can also gain knowledge from self-experience. Self-
experience sounds a lot like what lonely people do, but in this
context, self-experience can be setting up networks and servers
from your home or a lab. Self-experience can be labeled as
writing computer programs on your own. Simply put, self-
experience is when you teach yourself, either from a school or
12
Hacking the IT Cube
13
Hacking the IT Cube
14
Hacking the IT Cube
15
Hacking the IT Cube
Ask yourself how many jobs there are in the world that
starts out with an inexperienced worker at the top, not very
many.
16
Hacking the IT Cube
Certification Resources
The following resources have helpful information regarding
certifications and training.
http://www.Brainbench.com/
http://www.Mcpmag.com/
http://www.Certmag.com/
http://www.CramSession.com/
17
Hacking the IT Cube
IT Tip
Typing Skills
It is an odd thing, but your typing skills may determine your
abilities and experience level as seen by others. Immediately
upon entering the computer field, I noticed that I was looked
down upon because I used the hunt and peck method of typing.
Someone who makes a career on instruments that use a
keyboard as its primary input device should master such a
device. It is like turning your car over to a mechanic who does
not know how to use a wrench properly. To overcome this, I
practiced using a typing program for 30 minutes a night for one
month, and at the end of the month, I could type 60 words a
minute. Computer professionals type, not hunt and peck. Poor
keyboard skills stand out.
18
Hacking the IT Cube
19
Hacking the IT Cube
Salaried Position
Generally, IT positions are salaried. Why is that? Because IT
people often have to work many nights, weekends, and
employers do not want to pay for it, so you must manage your
time wisely. Sometimes, no matter how well you manage your
time, you are just going to have work late. Viruses are probably
the number one cause for your unpaid overtime hours. This is
why so many Network Administrators want to form a vigilante
militia to hunt virus makers and hackers and dole out our own
brand of justice. I am not sure what that is exactly, but it will
be severe. Viruses are not the only reason for unpaid overtime
hours; upgrades, updates, new install, server crashes, and
service packs. There are critical security patches, more security
patches, and even more security patches and do not forget
about those critical security patches, because if you are not up
on those babies, it is back to viruses and hackers.
Years ago, when I had to have stitches in my hand, the
doctor turned towards me with a needle and said, “It is going to
hurt and that’s just the way it is.” I smiled because I thought he
was kidding…filthy animal.
It is the same with being a salaried IT worker; sometimes
it is just going to hurt, but there are so many other benefits in
the computer department that the occasional late night install
does not matter.
20
Hacking the IT Cube
Chapter 2
Positions in an IT Department
Helpdesk Phone Support
Helpdesk Technician
Network Analyst
Network Administrator
Network Engineer
Network Security Administrator
Database Administrators
Webmaster
Programmers
IT Consultants
Director of Information Technology
Chief Information Officer
21
Hacking the IT Cube
IT Positions
IT departments will vary on how they determine the title of a
position, which can cause confusion. Examples of this are the
titles, Helpdesk Technician and Support Technician. Both jobs
perform the same task but have different names. In this
section, I have compiled a list of typically used job titles,
needed education, associated skills, and duties.
22
Hacking the IT Cube
Education
23
Hacking the IT Cube
Associated Skills
Service packs and security updates: Systems that are not up-to-
date on service packs and security updates are not only a threat
to their own normal operations, but to everyone in the
company. Even though updates do not keep out all pests, they
do keep out all known pests. After all, no one wants to fight
yesterday’s fires.
24
Hacking the IT Cube
25
Hacking the IT Cube
From TheNetworkAdministrator.com…
26
Hacking the IT Cube
27
Hacking the IT Cube
28
Hacking the IT Cube
Helpdesk Queue
29
Hacking the IT Cube
Helpdesk Software
• QuickLogs: http://www.quicklogs.com/
3H1
• MagicIT: http://www.remedy.com/solutions/magic/
7H5
• BridgeTrak: http://www.kemma.com/
8H6
Education
30
Hacking the IT Cube
Associated Skills
31
Hacking the IT Cube
Service packs and security updates: Systems that are not up-to-
date on service packs and security updates are not only a threat
to their own normal operations, but to everyone in the
company. Even though updates do not keep out all pests, they
do keep out all known pests. After all, no one wants to fight
yesterday’s fires.
32
Hacking the IT Cube
33
Hacking the IT Cube
Scenario 1.2:
34
Hacking the IT Cube
Helpdesk: “…”
Alice: “Cake?”
Alice: “Oh no…umm, I’ll just reboot and get back to you
later.”
35
Hacking the IT Cube
Alice runs off in a frantic tizzy, thinking she has forgotten her
boss’ birthday and is now rushing into her office to wish her a
happy 50th birthday. Gerald, a seasoned helpdesk tech, avoided
a hostile confrontation that could have potentially gotten him
written up, and instead sent Alice to her boss’ office where she
made a complete and utter fool of herself by wishing her 40-
year- old boss a happy birthday.
36
Hacking the IT Cube
• Backups
• Server service packs and security updates
• Network equipment support
• Network monitoring
• Systems utilization reporting
• Traffic shaping
• Systems and license auditing
• Desktop and network equipment maintenance
• Inventory
Education
37
Hacking the IT Cube
Associated Skills
38
Hacking the IT Cube
Service packs and security updates: Systems that are not up-
to-date on service packs and security updates are not only a
threat to their own normal operations, but to everyone in the
company. Even though updates do not keep out all pests, they
do keep out all known pests. After all, no one wants to fight
yesterday’s fires. Because of this, it is important to make sure
your servers and workstations are up-to-date on their patches.
Most computer systems can be configured to update patches at
a predetermined time without the aid of the IT department
having to update manually every system, everyday. However,
39
Hacking the IT Cube
40
Hacking the IT Cube
41
Hacking the IT Cube
Associated Skills
42
Hacking the IT Cube
Service packs and security updates: Systems that are not up-
to-date on service packs and security updates are not only a
threat to their own normal operations, but to everyone in the
company. Even though updates do not keep out all pests, they
43
Hacking the IT Cube
do keep out all known pests. After all, no one wants to fight
yesterday’s fires. Because of this, it is important to make sure
your servers and workstations are up-to-date on their patches.
Most computer systems can be configured to update patches at
a predetermined time without the aid of the IT department
having to update manually every system, everyday. However,
it is often necessary to check to see if your machines are doing
what they were configured to do.
44
Hacking the IT Cube
45
Hacking the IT Cube
Linux is slowly making its way to the client desktop, but the
system still has interoperability issues in a mixed Microsoft
environment. In companies where the IT department builds
their own PC clones, you might find Linux as the OS,
especially if the Database program is MySQL or Oracle. In the
beginning, there was OS2, Geo Windows and Linux. Linux is
the only desktop that survived. Linux is still struggling to
break into the desktop market. Only those Network
Administrators that have been avid loyalist to the program are
currently implementing it, but based on Linux’s growing trend,
it will not be much longer when it will be a stronger competitor
to the desktop market.
Client E-mail
Outlook, GroupWise, and Lotus Notes are the top three e-mail
clients. It is unlikely that you would have access to all three of
these programs to learn their configuration menus. Google.com
is the computer person’s friend. If you are extremely eager and
want to try to memorize every program that I mention in this
book, you may find all three of these program’s configuration
46
Hacking the IT Cube
ODBC Connection
Microsoft Word and Excel are the two most popular word
processor and spreadsheet programs in the world. Many people
looking for a higher-end network position often make the
mistake of placing Microsoft Office on their resume under
computer software knowledge. It is not a mistake to know
these two programs, just to place them on your resume,
because these are the bare minimum programs that every
Network Administrator should know without having to state it.
47
Hacking the IT Cube
• Network Security
• User Accounts and File Sharing
• Network Switches / Hubs
• Mail Server
• Internet Server
48
Hacking the IT Cube
I know this seems like a lot to know for your first job, and
that is only because it is. Most graduates do not obtain a
Network Administrator position right out of school. Without
experience, you are more likely to find a position as a Network
Analyst, or Help Desk Technician. However, after a year or
two of experience, it is possible to find a job with another
company as a Network Administrator. Many Network
Administrators receive their jobs through battlefield
commissions. (The Network Administrator either quits or
fired.)
49
Hacking the IT Cube
From TheNetworkAdministrator.com…
50
Hacking the IT Cube
A: Network Administrators are very selfish with their free time, days
off and vacations. Many managers do not understand this and they are
often confused by the unwillingness of a Network Administrator to
repair co-worker’s home computers on the weekends. In addition,
many company managers confuse salaried employees with slavery
employees.
51
Hacking the IT Cube
52
Hacking the IT Cube
their duties.
Q: Sadly, you speak the truth; your Network Administrator does not
respect you. Many managers believe themselves to be on a higher level
than a computer genius. If you cannot correctly program your home
VCR to stop flashing 12:00 every time your power goes out, then how
can you really expect your Network Administrator to respect you?
53
Hacking the IT Cube
54
Hacking the IT Cube
55
Hacking the IT Cube
Associated Skills
56
Hacking the IT Cube
57
Hacking the IT Cube
58
Hacking the IT Cube
Associated Skills
• Trace Route
59
Hacking the IT Cube
• Telnet
• SnifferPro
• Ethereal
• Commview
• NSLookup
• NetStat, NBTStat
• Vulnerability Assessments / Penetration Testing
• Nessus
• Microsoft Assessment Tools
• Pstools suite of tools
• Fport
• Tlist
• Kill.exe
• FIRE
60
Hacking the IT Cube
Associated Skills
61
Hacking the IT Cube
62
Hacking the IT Cube
63
Hacking the IT Cube
Associated Skills
64
Hacking the IT Cube
Associated Skills
65
Hacking the IT Cube
66
Hacking the IT Cube
Associated Skills
67
Hacking the IT Cube
68
Hacking the IT Cube
Chapter 3
69
Hacking the IT Cube
70
Hacking the IT Cube
71
Hacking the IT Cube
72
Hacking the IT Cube
Advantages: Disadvantages:
• Hiring incentives • Long hours
• Ground floor opportunity • Always fire fighting
• Career growth • Small or lean budget
• Profit Sharing • Bankruptcy
• Partnerships • No last paycheck
• Stock Options • No severance
73
Hacking the IT Cube
red flag. Employees will often bail from a sinking ship. Adding
employees because a company is growing is less of a concern
than employees jumping ship. You can always research a
company’s financial health.
The Securities and Exchange Commission is a good
resource to see if a company has filed for an IPO.
http://www.sec.gov/edgar/searchedgar/webusers.htm
1H7
74
Hacking the IT Cube
75
Hacking the IT Cube
Temporary Workers
Some companies only hire temporary workers, (temps) and
then hire them as permanent employees later, if they feel they
want to keep them. I was once a temporary network
administrator for a company in Seattle for 6-months, after
which they hired me as a permanent employee. It was one of
the best jobs I ever had.
Job Relocation
Always keep in mind that you might have to relocate to another
city when looking for a job. This might not be a pleasant
thought, particularly because many people do not want to leave
their friends and family and move to an unfamiliar place.
However, because of the way businesses are changing, there
may be a time that you might have to move away to stay in the
76
Hacking the IT Cube
77
Hacking the IT Cube
Resumes
78
Hacking the IT Cube
Cover Letter
79
Hacking the IT Cube
Contact Name
If you can get the contact’s name, use it. It is never advisable
to begin a cover letter with, “Dear Sir or Madame” or “To
Whom it May Concern.” This may show that you are not
applying for a specific position, or you know little or nothing
about the position for which you are applying. When sending a
resume, you should already know the contact name and
position. When presenting your resume, you are trying to make
an impression that will stand out among many other resumes
that are most likely very similar to yours in knowledge and
experience. In my opinion, you should spend as much time in
preparing your cover letter as you have your resume. A person
that would send me a cover letter and resume that is sloppy and
poorly put together, does not impress me as a person that can
be trusted with mission critical data and computer equipment.
80
Hacking the IT Cube
81
Hacking the IT Cube
Your name
Mailing Address
Phone number(s)
E-mail address
(Just one e-mail address will do)
Today’s Date
82
Hacking the IT Cube
Sincerely,
Your Signature
83
Hacking the IT Cube
84
Hacking the IT Cube
85
Hacking the IT Cube
86
Hacking the IT Cube
Name
Mailing Address
Phone Number(s)
E-mail Address
87
Hacking the IT Cube
88
Hacking the IT Cube
89
Hacking the IT Cube
http://www.Techies.com/
http://www.Monster.com/
http://www.Guru.com/
90
Hacking the IT Cube
http://www.Dice.com/
http://www.Computerjobs.com/
http://www.Careerbuilders.com/
These are all great resources for getting your name and
resume where potential employers are likely to be looking for
staff. When seriously looking for a job, you need all the help
you can get.
91
Hacking the IT Cube
six months to find a job. Can you imagine the stress involved
or the bills accumulated in half a year? If I were out of work
for six months, I would be asking questions like:
“How many seconds after someone’s death should I
pounce on his or her former job?”
Information technology jobs are not as abundant as they
were in the 1990’s, and only those who are the most persistent
are going to find one. If you are serious about finding work,
you should exhaust every resource. This means that every day
you need to think up a new and inventive way of finding a job,
and exhaust it.
In my earlier years as a young man, before I became a
computer geek, I was a self-employed ceramic tile setter. My
father passed this trade down to me. I was self-employed
because I was young and no one would hire me. I worked
from job to job. This meant that once a job was finished, I
immediately had to find another. I lived this way for many
years, and during that time, living from job to job did not seem
very unusual. Looking back, I do not know how I did it, but
looking ahead, I used those same skills to find my first
computer job when I had no experience…you can too.
92
Hacking the IT Cube
The Interview
Interview Attire
93
Hacking the IT Cube
than good. The night before should be used to relax and take
your mind off an upcoming interview. There is plenty of time
on the drive to your interview to stress out and have a manic
episode. If you want to review every computer textbook you
own, or at least those areas that you have difficulty
remembering, you should do it two nights before the interview.
Arriving on Time
Always arrive on time for a job interview or a few minutes
early. Arriving late for a job interview is never excusable. I
have seen people show up late for an interview, hired, shown
up late for work, and then fired, all in their first week. Showing
up late for an interview is a clear indication of your work
habits. Of course, you can ignore this rule if you are
interviewing with your mother, someone that owes you a lot of
money and your mother.
Just in case, you are not clear on this subject: Always arrive
on time for a job interview.
94
Hacking the IT Cube
95
Hacking the IT Cube
96
Hacking the IT Cube
used, and where the bloody thing was invented. With every
interview, you gain experience for the next.
Being Positive
Never make disparaging or negative remarks or statements
about your current or former employer. Be as positive and as
uplifting as you can. Every company has a problem case, so try
not to give any indication that it is you. Making comments
about fellow or former co-workers might dissuade the
interviewer from selecting you for the position.
Negative Image
When I speak of a negative image, I am not referring to
photographic film. In fact, in this digital age, I do not even
know what that is anymore. Negative image refers to the
mannerisms you want to avoid when meeting someone for the
first time. Lack of interest or enthusiasm can be a negative
image. Being overbearing, too aggressive, and acting arrogant
are ways to portray a negative image. The inability to express
97
Hacking the IT Cube
98
Hacking the IT Cube
99
Hacking the IT Cube
100
Hacking the IT Cube
101
Hacking the IT Cube
102
Hacking the IT Cube
103
Hacking the IT Cube
that they never really wanted. Several years away from a tech
job for which you have trained, will put you in the back of the
line. Technology changes too quickly to stay out of it for too
long. If you must, take a position below what you want, but
continue searching for a job that meets your qualifications. It is
like running a long marathon, only to give up 100 feet from the
finish line.
Many people have to take jobs for which they are over
qualified. This does not mean that you have to keep them
forever. Look at Albert Einstein; he was not a patent clerk his
entire life. It is better and easier to find a job when you already
have one. Always take what is available for now and
continuing looking for the job that you want.
104
Hacking the IT Cube
Chapter 4
105
Hacking the IT Cube
106
Hacking the IT Cube
HKEY_LOCAL_MACHINE
\Software
\Microsoft
\Windows
\CurrentVersion
\Run
\RunOnce
\RunServices
\RunServicesOnce
HKEY_CURRENT_USER
\Software
\Microsoft
\Windows
\CurrentVersion
\Run
\RunOnce
107
Hacking the IT Cube
HKEY_LOCAL_MACHINE
\System
\ControlSet001
\Services\”Virus.exe”
HKEY_LOCAL_ROOT\exefiles\shell\open\command
HKEY_LOCAL_MACHINE\Software\Classes\exefile\
shell\open\command
Fport – http://www.foundstone.com/
9H
Fport is a great tool that I often use. It reports all open TCP/IP
and UDP ports and maps them to the owning application. This
is the same information you would see using the 'netstat -an'
108
Hacking the IT Cube
PsTools – http://www.sysinternals.com/
10H
109
Hacking the IT Cube
Tasklist – Windows XP
Tasklist is an XP utility that displays a list of applications and
services with their Process ID (OID) for all tasks running on
either a local or a remote computer.
Syntax
110
Hacking the IT Cube
Command Line:
C:\PROGRA~1\Grisoft\AVG6\avgserv.exe
800 cisvc.exe
Command Line: C:\WINNT\system32\cisvc.exe
860 LLSSRV.EXE
Command Line: C:\WINNT\System32\llssrv.exe
1004 sqlservr.exe
Command Line:
d:\MICROS~1\MSSQL\binn\sqlservr.exe
1016 scvhost.exe
Command Line: c:\winnt\system32\scvhost.exe
1044 regsvc.exe
Command Line: C:\WINNT\system32\regsvc.exe
1056 mstask.exe
Command Line: C:\WINNT\system32\MSTask.exe
111
Hacking the IT Cube
PsKill
Installation
Copy PsKill onto your executable path and type pskill with
command-line options defined below.
Usage
Running PsKill with a process ID directs it to kill the process
of that ID on the local computer. If you specify a process name,
PsKill will kill all processes that have that name.
112
Hacking the IT Cube
-p Specifies optional password for user name. If you omit this, you
will be prompted to enter a hidden password.
Process Killers
Programs, alien or not, run as processes. Sometimes Windows
will not allow you to delete a file if it is running as a process,
until you stop it first. Here a few programs that you can use to
kill a process.
TaskKill – Windows XP
113
Hacking the IT Cube
Syntax
Network Analyzers
Network Analyzers / Protocol Analyzers – A protocol
analyzer or sniffer as most people will refer to them, examines
data packets entering and exiting your network. A sniffer can
show you what traffic is dominating your network, from which
computer sources, and if someone is running a port scanner on
any of your systems. Sniffer Pro is a good sniffer program but
it has always been too expensive for me. I like to use two
programs, Ethereal and Commview. Very few computer people
13H
will spend their own money for software, but I did with
Commview, and of course, Ethereal is an open source program.
14H
Commview http://www.tamos.com/products/commview/
15H
114
Hacking the IT Cube
Ethereal http://www.ethereal.com/
16H
EtterCap http://ettercap.sourceforge.net/
17H
115
Hacking the IT Cube
Snort http://www.snort.org/
18H
TCPDump / WinDump
http://www.tcpdump.org/wpcap.html
19H
DSniff http://naughty.monkey.org/~dugsong/dsniff/
20H
116
Hacking the IT Cube
Dsniff:
• Relays and saves SSH traffic redirected by dnsspoof
• Catches SSH access passwords
• Hijacks interactive sessions
Scanning Tools
Nmap http://www.nmap.org
21H
117
Hacking the IT Cube
NetScanTools Pro
http://www.netscantools.com/nstmain.html
23H
SuperScan http://www.foundstone.com/
24H
118
Hacking the IT Cube
NetCat http://netcat.sourceforge.net/
25H
Wireless Scanners
“Parking lot” hackers are those people that sit in their cars
within range of a wireless access-point (or many) and capture
free-floating data packets. With a well-configured laptop, a
strong battery and a little patience, a parking lot hacker can
gain access to almost any wireless network. Even in my own
neighborhood, I have logged over 200 unsecured wireless
networks within a 2-mile drive. Listed in this section are tools
to use against wireless hacker attacks.
119
Hacking the IT Cube
Ethereal – http://www.ethereal.com/
27H
AirSnort – http://airsnort.shmoo.com/
28H
Dsniff – http://naughty.monkey.org/~dugsong/dsniff/
29H
Kismet – http://www.kismetwireless.net/
30H
120
Hacking the IT Cube
http://compnetworking.about.com/cs/pingtools/
31H
you a graphical view of where your target is and will show you
a visual path.
121
Hacking the IT Cube
122
Hacking the IT Cube
Nessus: http://www.nessus.org/download.html
chnet/security/tools/tools.asp
N-Slalker:
http://www.nstalker.com/downloads.php
36H
GFI LANguard:
http://www.webattack.com/Freeware/server/fwserversecurity.s
37H
html
123
Hacking the IT Cube
Password Recovery
Password recovery should not be confused with hacking a
password. A computer professional performs one, while a
computer hacker performs the other. (Although is should be
said that most hackers are also computer professionals.) There
are many reasons why an IT person might need to recover a
password; lost and forgotten passwords, corrupt and damaged
files, and malicious tampering. There are many “programs”
that you can run against your system to expose an unknown
password, but most require that you first be logged on with an
administrator’s account. However, what if you do not know the
administrator’s password? How do you logon to the system
then?
ERD Commander is one of my favorite programs for
accessing a computer. You boot from CD-ROM, the program
accesses the administrator’s account and allows you to change
it. ERD commander also allows you to browse the computer’s
hard drives, obtain network access, and copy files. Admittedly,
this program can be “dangerous” in the wrong hands. ERD
commander can boot through a SCSI hardware RAID and
access almost any Microsoft Windows based program.
ERD Commander
http://www.winternals.com
124
Hacking the IT Cube
Passware Kit
http://www.lostpassword.com/
Elcomsoft.com
http://www.elcomsoft.com/prs.html
NET USE ?
125
Hacking the IT Cube
You can use a * in the place of F: and it will give you the first
available letter and the $ is a hidden administrative share.
Often I will access a server from the command prompt by
using the hidden administrator share. (Note: so do hackers)
Windows Commands
The following are a list of command line utilities inside
the Windows operating system. Most command line
utilities use either /? Or – - help behind the command
for usage.
126
Hacking the IT Cube
Linux Commands
alias creates an alias
39H
cd – changes directory
46H
127
Hacking the IT Cube
dc – desk calculator
62H
128
Hacking the IT Cube
129
Hacking the IT Cube
m4 – Macro processor
120H
pr –
135H convert text files for printing
printcap – Printer capability database
printenv – print environment variables
printf – format and print data
136H
ps – process status
137H
130
Hacking the IT Cube
rm – remove files
147H
131
Hacking the IT Cube
132
Hacking the IT Cube
133
Hacking the IT Cube
will help to keep you up on the latest virus and security threats.
Typically, three or four people in every organization
send and receive a lot of word documents and spreadsheets,
which are often infected with viruses. Spam and personal e-
mail are another source of viruses. If you monitor your e-mail
as I do, you will find that the vast majority of mail is either
personal or spam. Virus makers often embed their creations
inside spam that is more likely to be opened. For example, e-
mail with jokes, words of spiritual inspiration, and mail
warning of viruses that ask you to forward it to your friends,
are all designed to trick you into passing it from one recipient
to another. These viruses are known as missionary viruses
because they travel from place to place with good intention, but
carry deadly viruses for your computer. The worst part about a
virus for a Network Administrator is to explain how a virus
was able to get past you in the first place. Every operating
system and network device is vulnerable to viruses. Viruses
cause a Network Administrator more headaches than rap
music, more aggravation than company executive’s home
computers, and more frustration than spam. Okay, maybe not
spam, but viruses are still pretty darn annoying. Even with
virus protection, your system is always susceptible to viruses.
(Anti-virus programs only protect a system against known
viruses.) Because new viruses crop up everyday, it is easy to
forget to check what the latest and greatest threat is and
suddenly find that your switch has stopped flashing, or your
router is flashing too quickly or a server will not allow anyone
134
Hacking the IT Cube
135
Hacking the IT Cube
136
Hacking the IT Cube
Firewalls
Typically, a firewall will sit as a sentry between your network
and the rest of the world. Firewalls will analyze data packets
and compare requests against a pre-configured security list.
Many Network Administrators configure their routers with
security access-lists to avoid the necessity of a Firewall.
Firewalls can also slow access speeds because it inspects every
packet.
137
Hacking the IT Cube
138
Hacking the IT Cube
139
Hacking the IT Cube
http://www.spitzner.net/honeypots.html
206H
http://www.auditmypc.com/freescan/readingroom/honeypot.as
207H
140
Hacking the IT Cube
Common Attacks
Attacks against IP are the most common method of penetrating
a node because it is the network protocol of the Internet. For
any type of computer equipment to participate on the Internet,
it requires a valid IP address and a hardware address. The
network card manufacturer burns a hardware address on every
network card. This number is unique to every other network
and expressed in a hexadecimal value. An IP address is also
unique and assigned either statically or dynamically by your
Internet provider. An IP address can be tracked to its
origination point where it enters the Internet. This is where
many hackers use some form of IP Spoofing. IP Spoofing is
someone purposely uses a forged IP address so their exploits
cannot be tracked to their computer or location. IP and ARP
(hardware addresses) are commonly spoofed, although these
days, I do not know how effective it is.
141
Hacking the IT Cube
142
Hacking the IT Cube
143
Hacking the IT Cube
E=mailSpam2
E-mail has done for communication what the Internet has done
for pornography; there is more than the mind can ever
comfortably comprehend. Spam has played a particularly large
role in propagating both. There is no question that spam is an
annoyance. Within Spam are unwanted advertisements such as,
diet pills, home refinancing, sexual aids, and porn sites. There
is virus spam, phishing spam (phishing is a pop name for
identity stealing), and there is spam that is used to do nothing
more then cause a buffer overflow on the mail server so it can
send more spam.
144
Hacking the IT Cube
Step 1.
Use telnet on port 25 to telnet into your server:
(Remember to configure your telnet program for “echo;” otherwise, you
will not be able to see what you are typing. Also, typos will error out your
task and you will have to reset the session.)
> ehlo
>mail from:[email protected]
145
Hacking the IT Cube
146
Hacking the IT Cube
filetype:
fletype:
cache:
cache:
The syntax “cache:” will display the version of the web page
that Google has in its cache. For example:
147
Hacking the IT Cube
intext:
intext:
intitle:
intitle:
intitle: examples:
148
Hacking the IT Cube
inurl:
inurl:
149
Hacking the IT Cube
inurl: examples:
inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php
inurl:gov filetype:xls "restricted"
link:
link:
150
Hacking the IT Cube
phonebook:
phonebook:
related:
related:
151
Hacking the IT Cube
site:
site:
152
Hacking the IT Cube
Chapter 5
Managing Your Network and Server Room
153
Hacking the IT Cube
One of the very first things some new computer people must
come to grips with when he or she takes over a position is that
the person who preceded you did not leave behind any
software or documentation.
Most computer people do not take the time to document
the details of the job and instead, keep information about their
job duties stored safely in their heads.
Notation:
This in not typically true of programmers: Programmers are trained to
document their work and add comments in their code to help future
programmers.
154
Hacking the IT Cube
155
Hacking the IT Cube
156
Hacking the IT Cube
157
Hacking the IT Cube
158
Hacking the IT Cube
159
Hacking the IT Cube
160
Hacking the IT Cube
UPS
Of course, the server room would not be complete without a
UPS, (Uninterrupted Power Supply) A UPS is what all the
equipment above is plugged into. In the event of a power surge
or temporary power outage, a UPS can be configured to shut
down your servers safely if the outage is too long and it will
warn your users. A UPS can be rack-mounted or be as large as
a washing machine. It is the device that all of the other devices
plug into.
161
Hacking the IT Cube
If you are just taking over a server room, here are some
tips to help you identify the important machines that you
should note.
Database Servers
Isolate which servers are the database servers, as these are your
company’s most valued systems. Database servers store all the
company’s important data. Write down their names, IP
addresses, and record any ODBC connections in the ODBC
manager. (ODBC Manager is in the Control Panel on a
Microsoft system. Otherwise, your company uses Oracle).
Immediately following the discovery of the database servers,
check how they are backed up and then locate the backups. In a
well-configured database environment, there should be at least
two identical database servers, the actual working server and a
redundant backup for testing or running reports. It is not likely
that you would be expected to administer the company’s
162
Hacking the IT Cube
163
Hacking the IT Cube
DHCP Server
A DHCP (Dynamic Host Control Protocol) server dynamically
assigns IP Addresses to the computers on a network. This
service does not necessarily warrant its own box and this
service is typically on a file server or domain controller. You
will need to record what address range and scopes are being
used. The proper model for applying IP Addresses is by using a
DHCP service. It works is like this:
A computer configured to get its IP address automatically
will send out a message to the network, requesting an IP
164
Hacking the IT Cube
address to any DHCP server that can hear it. A DHCP server
hears the request and supplies the workstation with an IP
address and whatever else is configured in the scope. (Servers
typically do not request IP addresses as they are configured
with static IP addresses.) The scope might have a Default
Gateway, (router) DNS server (Domain Naming Service), and
a WINS server (Windows Internet Naming Server). I once
configured all of my 43 remote offices on a Frame-Relay
network to pass their request for an IP address to my DHCP
server at the corporate office so I could keep an eye on what
computers were up and running.
E-mail Servers
Some companies have two mail servers; one used for Internet
mail and the other for internal uses. Although many e-mail
server models will recommend only one mail server, I do not
like having the internal mail server exposed to the Internet
because a company’s most valued information is passed
internally. I like to keep this mail server isolated on the inside.
Other issues with mail servers are user names. If a hacker can
harvest the names on a mail server, than they have half of the
combinations needed to crack a network. All that remains is a
password. Make note of your mail server’s name and IP
addresses, as you will need to know this later.
DNS Server
A DNS server (or Domain Naming Service) is one of those
servers that do not warrant its own computer but shares with
another server, typically. The best and most recommended
place for a DNS is on the firewall (providing your firewall is a
server). Otherwise, the DNS will reside on your web server.
The DNS service provides a list of names to IP addresses for
the Internet and your internal network. The www is an alias in
a DNS server and is queried by other name servers to resolve
165
Hacking the IT Cube
Web Servers
I would guess that half of all companies house their own web
server. A web server may be either directly exposed to the
Internet side of your router or between a firewall. Your web
services are within Microsoft’s Internet Information Service
(IIS) or Apache. Record the web domain names and directories
for your reference notepad. Many companies expect the
Network Administrator to be the web master as well.
FTP Server
FTP (File Transport Protocol) is generally on the same
machine as your web server, and it is used to allow downloads,
and uploads from the Internet. Depending on your company’s
business model, your customers, your sales staff, or just your
computer department for accessing software and drivers can
use it. Always make note of who has access and who does not
have access to your FTP site. FTP servers can sometimes be an
intrusion point to your network. Hackers will target this service
to install code that executes a remote session; viruses will
target the FTP service to store viruses for retrieval after a
successful penetration. I once discovered a hole that allowed a
file-sharing group to store MP3s for its members. You can see
how an FTP site can be a friend and a foe.
166
Hacking the IT Cube
167
Hacking the IT Cube
what you need to get your foot in the door and have your holy
crusade when you have moved out of your parent’s basement.
Currently, NT Server or Windows 2000 seem to be the most
common Network Servers deployed in a company’s server
room, especially on the Local Area Network (LAN) side. With
respect to Novell’s Netware and Banyan Vines, if you want to
be a Network Administrator, you should pick the operating
system with the most market shares, and learn as much as you
can. Unix and Linux are typically on the Wide Area Network
(WAN) side of the router. These two systems are used as
firewalls, mail servers, intrusion detection, and web servers. If
you can only learn two server operating systems, which is
enough for anyone, make sure you know Windows2000 and
Linux.
168
Hacking the IT Cube
Passwords
Passwords are deployed on computer systems to keep out
intruders. Cap locks are deployed on the computer keyboard to
keep out computer users. Passwords are also great for keeping
out the computer department after calling for help, and then
walking away from your computer.
Years ago, I would sit at my desk in the morning and
monitor the security log, watching the “wrong username or
password” messages scroll down my screen. It was always the
same two to three people, every morning, trying to log in with
their cap locks on. Because I was the first in the office every
morning, the helpdesk phone ringing in the far distance always
interrupted my quiet morning. One morning, I had the brilliant
idea to just change their passwords in uppercase. The event
logs were shorter because of it, the computer users could begin
their days feeling less stupid, and my mornings no longer
began with me mumbling profanities under my breath.
169
Hacking the IT Cube
170
Hacking the IT Cube
171
Hacking the IT Cube
you can do is back up everything that looks like a data file and
bring the head of every department in to show you what they
need backed up. The first drive that crashed on me without a
backup was the marketing department’s Macintosh drive. I did
not see it. I did not know it was there and when it was lost,
there was someone there trying to monopolize on the situation
for my job. So do not leave it up to guesswork. Bring in
someone from every department to help you. Later you will be
thankful that you shared the responsibility. If your company
manager tells you to back up everything, then they are going to
have to invest in the proper equipment and storage space.
Types of Backups
172
Hacking the IT Cube
Monthly Backups
I also recommend that a monthly backup is performed and
archived off-site. We burn a monthly backup to DVD and send
one copy home with the owner and another copy with a
Network Administrator.
173
Hacking the IT Cube
on-site and the Son is a daily backup that is also kept on-site.
This backup scheme requires twenty tapes for a single year.
The Tower of Hanoi scheme is a common alternative to GFS
that is secure and cost-effective but more complex. This
method requires you to perform a full backup on five tapes
labeled A, B, C, D, and E. Tape A is used every other backup
session, tape B every 4 sessions, tape C every 8 sessions, tape
D every 16 sessions, and tape E every 32 sessions, or once a
month. This allows for easy file restorations, because you do
not have to shuffle through partial backups and it is more cost-
effective than GFS because it uses fewer tapes. The Tower of
Hanoi method's chief disadvantages are the need for a large
enough backup window to accommodate daily full backups
and its complexity, which means you should make sure your
backup software can automate tape rotation. It is a bit
confusing, so do not feel stupid if you do not understand it. I
had a difficult time writing it down. I was fortunate in the cases
where two of my drives crashed and I did not have current
backups, in that on two separate occasions, I took the drives to
a company that restores failed drives. I was not fired. It is an
expensive business having the data of a crashed hard drive
recovered—$5000.00 each. This does not mean that you will
have the same luck. Your number one priority as a Network
Administrator is to make sure you have current backups stored
on and off-site. At my company, we do two nightly backups,
one to a tape drive and another to a Snap Server or some other
type of external drive. Backup tapes are only good for off-site
storage but are slow to backup and slow to recover. Having an
additional backup to a hard disk is fast and often more
convenient. Because hard drives have become so inexpensive,
many Network Administrators only backup to hard drive and
burn a monthly off-site storage to DVD.
174
Hacking the IT Cube
Troubleshooting
As documentation is a Network Administrator’s nemesis, the
ability to troubleshoot a problem is his or her best friend. A
Network Administrator’s number one duty is to fix problems
immediately without excuse, hesitation, food, or sleep. In many
cases, one will build his or her troubleshooting skills from
daily experience. It does not take long with a company before
you discover that every server and operating system has its
own unique character. When I say character, what I really
mean is problems. However, in the beginning, you will not
have experience to draw from to help you with your daily, and
I mean daily, troubleshooting issues. So what do you do?
Troubleshooting Tips:
175
Hacking the IT Cube
176
Hacking the IT Cube
Upgrades
Network Administrators are in charge of both hardware and
software upgrades. Why would a company want to spend
money on upgrades? There are a number of reasons.
Companies have to upgrade because they are expanding and
outgrowing their current network and software platforms. An
example of this might be that your company’s accounting
department needs a larger platform as their existing accounting
software is at its limit. This will most definitely mean a new
server, perhaps two, and maybe even a new switch if your
company is still using hubs. Every new addition or change to a
server room has a direct effect on every other thing. In many
cases, you might have to also upgrade to a new server, a new
operating system, newer terminals, a new switch, possibly a
new router if you have a lot of satellite offices, and what about
a database programmer? What happens if the new accounting
system is SQL and a SQL programmer is needed for setup and
reports? Now you are responsible for hiring a database
programmer. There are many instances where the company
makes the Network Administrator learn SQL. Scary, huh? Do
not worry. You will need to learn many programs that you do
not want to through the years.
One of the issues with taking a new Network
Administrator position is the existing third party software; they
are typically old and out of date, there are not any updates, and
its makers are out of business or they will not support it,
because they want you to purchase the latest version.
Stubbornly, your company refuses and expects you to keep it
going just like the person before you. You might even hear,
“Well, what’s his name didn’t have a problem fixing it.” You
reply, “This is probably the reason old what’s his name quit.”
177
Hacking the IT Cube
Chapter 6
Managing a Department
From Tech to Manager
Being an IT Manager
Pagers / Cell Phones / Laptops
Company Politics
Purchasing Computer Product
Specialist and Generalist
The Job 24/7
Over-Clockers
IT Ethics
Confidential Disclosure Agreement
Writing Network and Internet Policy
Software Licenses
Proprietary Software
Suggesting New Technology
Being Good at Prioritizing
The Politics of Getting What You Need
The Computer Person Before You
Working Without Supervision
Training Yourself and Your Staff
Working in a Team Environment
Communication Skills
178
Hacking the IT Cube
Advantage:
I like working with computers, so I assign myself projects that
I want to do.
Disadvantage:
I have to attend meetings where I translate 1 and 0 into
numbers that accountants can understand. Paperwork:
managers have to process many reports that other people put
into piles and never read.
179
Hacking the IT Cube
Advantage:
No matter the condition of a network, a manager can still go to
lunch.
Disadvantage:
Hiring staff is a huge responsibility that takes considerable
time and resources. Companies often ask you to cut high
paying engineers that keep the company running for matters of
budget, but later, when this effect is realized, you must produce
the same level of people at the same pay rate.
Being an IT Manager
Manager / Executive
180
Hacking the IT Cube
181
Hacking the IT Cube
Company Politics
1. Presentation
2. Session
3. Transport
4. Network
5. Data-Link
6. Physical
7. Applications
8. Budget
9. Politics
Budget and Politics are the most widely used layers deployed
by today’s IT department. Finance and Politics are what get
you the equipment you need for the server room, the computers
for the accounting department, and a hike in your wages. The
normal company executives only care about three things: their
stock portfolio, company profit margins, and the company’s
worth. What they do not understand or care about is network
infrastructure, outdated servers, or staff computers. From a
CEO’s viewpoint, these items do not make the company money
and are nothing more than a depreciating asset. Assets are how
a company measures its worth. Typically, computer equipment
depreciates and loses its net worth after five years and no
longer reported as an asset or value to a company’s bottom
line. If anything, computers take away from a company’s value
because they are expensive to procure and maintain and must
182
Hacking the IT Cube
183
Hacking the IT Cube
184
Hacking the IT Cube
185
Hacking the IT Cube
186
Hacking the IT Cube
187
Hacking the IT Cube
Over Clockers
When I use the term over clocker, I am not referring to over
clocking your computer’s CPU. Nor do I speak of cheating on
your time clock punch-in. I am speaking of, none other than the
geek who will not go home. I call these people Over-Clockers.
In the beginning, that is to say, when you get a brand
spanking new computer position, it is common to put many
hours of overtime to learn the systems. However, many
computer people simply do not know when to go home. You
have heard the phrase: Cheaters never prosper. I have one that
says; Over- clockers never prosper. The reason for this is
because you must have adequate time away from the office or
you will go peculiar. Many computer people are already on the
edge.
There are two types of over-clockers. The first is
someone who finds excuses to stay in the office because either
he or she does not have a home life, or they feel more in
control of their lives at work. It is easy to feel this way. At
work, you surround yourself with computers and programs that
you control, but over-clocking can also be a trap. I have seen it
happen to many people—it has happened to me. You must
have a well-defined separation between home and work.
Otherwise, you will not want to go to work either.
Another type of over-clocker is someone who puts in
evenings and weekends, thinking they are scoring points with
their supervisors. What happens in most cases is that your boss
does not take notice or does not care, and you become so
frustrated that no one rewards you for your hard work that you
quit or become disgruntled. Additionally, an over-clocker can
intimidate some bosses out there. I have seen or heard of many
instances where an over-clocker puts in extremely long hours,
nights, and weekends, and then Tom, the laziest man in the
188
Hacking the IT Cube
IT Ethics
Computer people have the responsibility and confidentiality of
guarding their company’s data. This means they have access to
documents, spreadsheets, databases, and e-mails which other
workers are not privy. Surprisingly, most companies do not
have any policy regarding nondisclosure. Furthermore,
universities do not teach their students IT or computer ethics.
It is as if computer people must use their own personal value
systems. (I will tell you, knowing some of my friends that can
be dangerous.)
Because members of an IT department have
administrative privileges and/ or can physically access
sensitive company information, does not mean they have the
189
Hacking the IT Cube
190
Hacking the IT Cube
2. Confidentiality.
191
Hacking the IT Cube
192
Hacking the IT Cube
DISCLOSER (_____________________)
Signed: ______________________________
Print Name: __________________________
Title: ________________________________
Date: ________________________________
RECIPIENT (_____________________)
193
Hacking the IT Cube
Signed:______________________________
Print Name: ___________________________
Title: ________________________________
Date: ________________________________
• Viruses:
Almost all viruses come from the Internet, so it is sometimes
necessary only to grant Internet privileges to those who need
Internet access to perform their jobs.
• Inappropriate Websites:
Access to inappropriate websites can and will cause lawsuits.
You must stress to your computer users that accessing
inappropriate websites will result in disciplinary action and/ or
dismissal.
• Harassing E-mail:
Sexual harassment or cyber stalking by e-mail is a crime
punishable by state and federal laws. Always note to your
computer users that monitoring of e-mail is a standard process,
even if it is not.
194
Hacking the IT Cube
• No floppy disks:
Do not allow users to transfer data from home and work. These
users usually infect the network with viruses. Many employers
also do not allow employees to transfer data back and forth for
security reasons.
Software Licenses
It is a Network Administrator’s responsibility to make sure that
your company is up-to-date on all of their software licenses.
Many computer people out there think it is all right to steal
software from your company. You are not doing yourself or
your company any favors by installing unlicensed software. If
caught by a software vendor, your company will hold you
responsible to avoid a lawsuit, and that entire wink, wink
business behind closed doors will not amount to a hill of beans,
or basket of feted dingo kidneys. While at work, regardless of
your personal feelings for a software vendor, you should
maintain a large degree of professionalism.
Proprietary Software
The problem with proprietary software is that most companies
have it, you have to learn it, and you cannot put it on your
resume because no one else has ever heard of it. You would get
195
Hacking the IT Cube
a larger response listing every Star Trek movie that you ever
have seen on your resume, than you would the proprietary
software that you know. There is a very slim possibility that the
company for which you are applying also has the same old
crappy programs, but I have never seen it happen. Proprietary
software is typically programs or applications written just for
the intended company. In many cases, a programmer or two is
hired, or contracted out to build an application and then let go
once the program is complete. I have also seen where the
programmer holds the company hostage every time there is a
problem. I added this blurb about proprietary software not to
scare you, although if you have made it this far and were not
frightened, I would be concerned about you. However, there is
more than an 80% chance that there will be these types of
proprietary programs at a company. If you run into one, do not
panic. You cannot learn everything over night and no one is
really expecting you to.
196
Hacking the IT Cube
197
Hacking the IT Cube
Company Memorandum:
198
Hacking the IT Cube
199
Hacking the IT Cube
Perceived Value
200
Hacking the IT Cube
Do your homework
201
Hacking the IT Cube
202
Hacking the IT Cube
203
Hacking the IT Cube
204
Hacking the IT Cube
205
Hacking the IT Cube
206
Hacking the IT Cube
207
Hacking the IT Cube
Communication Skills
Because computer people are good with digital
communications does not necessarily mean they are good with
people communications. I used to say that the difference
between an introvert and extrovert computer geek is that an
extrovert will look at your shoes when he or she is talking to
you. As nice, an idea as it is to think that you will only be
working with computers and network gear, the truth is that you
will most probably be communicating with more people than
computers. You will have to give reports to your seniors,
document procedures, and draft corporate-wide e-mails. You
will be in no less than three meetings a week and have to give
opinions and advice on technology issues. Having good
communication skills is as important as good computer and
networking skills. If this scares you, I suggest you try
improving these types of communication skills. As you will
quickly discover from your first job, it would not hurt to take a
few classes in how to deal with special or emotionally
challenged children. You will see.
208
Hacking the IT Cube
Chapter 7
Bitter Facts from Experience
Keeping a Messy Office
A Word about Computer Part Magazines
User’s Computer Desk Clutter
Cleaning Keyboard and Fans
What You Need to Know About Computer End Users *
The Differences Between End-users and African Mountain
Gorillas *
Why do end-users call their computer a hard-drive or
modem?
End-User Soup *
Eating Habits of the Office Worker *
Computer Users Mating Habits *
Repairing Home Computers
Working with Outside Consultants
Job Stasis
Most Common Mistakes Made By The Computer
Department
Who has the Power
Taking the Emotion out of “IT”
Company Birthday Cake Day
The Internet is a Living Body *
Top 10 Signs that you may be a Geek *
209
Hacking the IT Cube
Not that attorneys are known for any special rat spitting
abilities; I just like to associate the two subjects because I think
this would be a fitting sport for attorneys to compete.
210
Hacking the IT Cube
211
Hacking the IT Cube
While ordering products from CDW one time, the sales person
asked;
212
Hacking the IT Cube
213
Hacking the IT Cube
Interesting Fact:
This is also known in the computer business as Squirreling.
Some end-users or computer users in the Northern regions,
unconsciously store food away in their keyboards for the
upcoming winter months. The problem is that they more than
often forget where they have hidden it. A few bits of crumb
here, a few flaky pieces of pastry there, and a lump of soda
splat between a key or two.
214
Hacking the IT Cube
towards the user. Sometimes he will even drop a few items that
he has brought with him. After a well-rehearsed display, Ian
will carefully wrap up the newspaper, tape, label, and date it
with a black marker.
215
Hacking the IT Cube
216
Hacking the IT Cube
217
Hacking the IT Cube
way to legally deal with this computer user has not yet been
discovered. I only mention it as a warning.
From TheNetworkAdministrator.com…
218
Hacking the IT Cube
article begins....
219
Hacking the IT Cube
From TheNetworkAdministrator.com…
220
Hacking the IT Cube
"My modem is not working and it's your fault." Before you
are able to translate what they are trying to say, they further
their statement by saying: "This never happened before you
came to work here." Of course, what they are really saying is,
"Please, please mister computer man; beat me in the head with
a 9 pound ping hammer so they can replace my five dollar an
hour job with an escaped circus monkey with a flagellation
problem."
221
Hacking the IT Cube
From TheNetworkAdministrator.com…
End-User Soup
In the past, I have been hard on end-users in some of my
articles and I am not sure all of them deserve to be bunched in
together. This is why, in my infinite wisdom, I have taken it
upon myself to create end-user categories. Starting with some
of the smarter ones and working our way down to...well, let us
just say those that are a little computer challenged.
Joke Mailers: Joke mailers are those users who are constantly
e-mailing jokes to all of their friends, and searching the
Internet for endearing stories that warm the heart. These people
typically have pictures of their cats and children around their
monitors. Hackers and malicious virus makers depend heavily
on these people spreading their cat stories and virus warnings.
Late one evening, I once had an opportunity to tag one with my
car in the parking lot, but hesitated and lost the opportunity.
222
Hacking the IT Cube
Novice: Novices are those who can perform higher tasks such
as changing the desktop, browsing the network for open shares,
and knowing how to clear their Internet History. Novices are
the most dangerous of the end-users a company can have. They
are constantly screwing up their settings, deleting system files
to make room for more song files, and are always blaming their
latest disaster on Microsoft. Novice users are always reporting
the reason their work is not done is because the IS department
is always on their computer. It is important to identify the
223
Hacking the IT Cube
224
Hacking the IT Cube
From TheNetworkAdministrator.com…
From TheNetworkAdministrator.com…
225
Hacking the IT Cube
226
Hacking the IT Cube
227
Hacking the IT Cube
Job Stasis
Job stasis occurs when you are stuck in the same job, making
the same money, with no sign of advancement in sight. It is
easy to find yourself in this kind of comfort zone. Time has
made your job easy, you have no stress, and days pass quickly.
The problem with job stasis is that if you are not moving
upwards, you are not moving at all. I have heard many horror
stories where people have given in to the path of least
resistance, unchallenged in their job for many years, and
suddenly find they are unemployed and so behind on the latest
technology that they cannot find another job. No job lasts
forever, and in my opinion, you should view your current job
as a launching point to your next one.
Another form of “job stasis” occurs when you want to
learn more and advance to the next level, but there is nowhere
to advance. Some people live in areas where they are fortunate
even to have a job. If you work for a company where no one
quits or fired, and your only hope of advancement is if
someone dies, you might have to move away or consider
another career.
Attrition is an example of moving your way up the company
ladder without your salary moving with you.
What if you are happy with your current situation? There
is nothing wrong with that either. I know a fellow, who came
into an IT department at the bottom. The company made many
changes that did not sit well with the other IT staff and they all
sought jobs elsewhere. With every departure, my friend rose up
one more position until he was the department head. In the
interim, he studied and passed every certification test he could.
With all of the top computer certifications on his resume and a
title, he was able to double his salary and then triple it when he
found a better job. Some jobs make better launching points to
better opportunities than they do actual jobs.
228
Hacking the IT Cube
229
Hacking the IT Cube
ever did as they said they would. The ones that demand
payment in full before their contract is complete are the worst.
I speak of very large nationwide software corporations.
Company Memorandum
• You may not bring your computer from home and ask
the IT Department to repair it.
• You may not bring your computer from home, drop it
off in anyone’s office, and assume that it will be fixed
for you.
• You may not ask a company computer specialist about
problems you are having with your home computer, and
then bring it in the next day to have them look at it.
• You may not bring in your home computer because
someone in the IT department said hello to you, made
eye contact with you, or yelled an obscenity while
walking by you in a supermarket.
• You may not bring your computer in to work at all.
• Under no circumstances are you allowed to bring your
home computer to the IT department and have them fix
230
Hacking the IT Cube
231
Hacking the IT Cube
232
Hacking the IT Cube
same staff positions send the same type of jokes, cat pictures,
and words of inspiration. There are always two or three people
sleeping with each other, and at least two are stealing company
funds. CEOs and VPs know the best times to go to strip clubs
and the poor accounting clerks, who are the hardest workers,
have the most personal problems. Occasionally, someone
might pop their head up from their keyboard to ask, “Does IT
read e-mail?” and you reply, “Yes, yes we do.” They laugh, but
do not really believe it.
233
Hacking the IT Cube
234
Hacking the IT Cube
From TheNetworkAdministrator.com…
The Internet reaches out onto the stars using images from
the Hubble telescope, and uses web cams like microscopes to
investigate itself internally. It is alive with eyes and thinks in
digits. For this moment in time, it must co-exist in a symbiotic
relationship with humans to help reproduce and expand its
reach. Soon, there will come a time that it must expand beyond
its confines and venture forth onto the stars and leave us in
235
Hacking the IT Cube
From TheNetworkAdministrator.com…
Geek Humor
Top 10 Signs that you may be a Geek
1. All of your friends have an @ in the middle of their
names.
2. Your best friend is someone who you chat with online
but have never met.
3. You see a beautiful sunset and take a picture of it with
your digital camera for your computer desktop.
4. When you meet someone from the Internet for the first
time in a restaurant, and before you enter, you wish you
could save game in case you make an ass of yourself.
5. You finally receive high-speed Internet at home and
cancel your phone service.
6. You type "com" after every period when typing.com
7. For emergencies, you have a backup battery supply for
your home computer and Internet router, but no food,
water, or batteries for your flashlights.
8. You pity people that still have modems.
9. You think it is funny to refer to going to the bathroom
as downloading, sex as uploading, and Internet sex as
FTPing.
236
Hacking the IT Cube
Meetings
If you think it is fun, having or taking part in, a company
meeting, you are going to love working in an IT department. I
have been in meetings that have lasted for hours, only to be late
for another. You need to make technical decisions, help explain
technology, or provide critical data or an opinion so your
bosses can plan budgets far into the future. Expect to attend
many meetings. If however, you are as I am, and suffer from
issues of a short attention span and are easily prone to
daydream, meetings might not be your favorite event. You may
have to find methods to help you through these mind sucking,
time wasting proceedings. It is important in the beginning to
control your eyes from the “glaze over.” With time, it will
come as second nature to you, much like pretending that you
are interested when someone is telling how he repaired his
home computer. You will get the hang of it.
Performance Anxiety
When you land your first IT position, you might doubt your
abilities and this is a perfectly natural feeling. The fear of not
being able to do the job and fired for “Gross Incompetence”
looms in the mind of everyone. I can tell you from experience;
this is a perfectly healthy emotion and it will drive you to be
more dedicated in your profession. Those that do not have this
anxiety, are the ones fired for incompetence, because they do
not push themselves to excel.
237
Hacking the IT Cube
Appendix A
Cabling
Network Cabling
Bulk Cable
Bulk cable is right out of the box cable. CAT5 Ethernet and
100BASE-TX Fast Ethernet is the base networking cable used
in most modern networks and any category lower than 5 cannot
support the throughput necessary in today’s high-speed
networks. There are four pairs, (eight wires total) each pair is
twisted with a different turn to help eliminate interference from
the other pairs, and the tighter the twist, the higher the
supported transmission rate. There are seven categories of
UTP:
238
Hacking the IT Cube
CAT1
Category 1, up to 1 Mbps (1MHz) cable. Typically used with analog voice (pots)
Basic rate interface in ISDN. Also used in doorbell wiring.
CAT2
CAT3
Category 3, 16 Mbps, and typically used with voice and data on
10BASET Ethernet.
CAT4
Category 4, 20 Mbps, and typically used in a Token Ring network
CAT5
Cat5 refers to category 5 data cabling, which is a 4 pair cable (8 wires)
100 Mbps cable. Typically used in an Ethernet network.
CAT5e
Category 5e 1000 Mbps, used with ATM Gigabit Ethernet.
CAT6
Category 6 cabling, used in fast broadband networks up to 400 MHz
239
Hacking the IT Cube
CAT6e
CAT7
Category 7, 600-700 MHz. This cable can be used with full-motion video.
240
Hacking the IT Cube
241
Hacking the IT Cube
Straight-through
Crossover Cables
The simplest of LAN wiring is two computers directly
connected to each other using a crossover cable. A crossover
cable is just that; instead of the 4 pairs (8 wires) of wires inside
a standard 100BASE-T cable being straight through from one
end to the other, the wires are crossed over like in the next
example.
242
Hacking the IT Cube
Coaxial Cable
243
Hacking the IT Cube
Thicknet
Thicknet coax is a dated medium, 1 cm thick (50-ohm) and is
known as 10base5. 10base5 Ethernet supports 10 Mb/s
transmission rate over a maximum 500-meter length. The outer
jacket of Thick Ethernet cables is typically a bright color (often
yellow) with black bands at 2.5-meter intervals to mark valid
transceiver placement points. 10Base5 transceivers are attached
through a clamp that makes physical contact with the cable.
These transceivers are also called "transceiver taps" because
they are connected through a process known as "tapping" that
bits a hole in the cable to allow contact. This method of tap is a
non-intrusive connection because the tap can be made on an
active network without disrupting traffic flow. For more
information on Thicknet cabling, go to your local used
bookstore, or other forms of antiquated knowledge that you
will never use.
Thinnet
Thinnet is also 50-ohms, but half that of Thicknet. (5mm)
Thinnet looks like the same medium used as the cable on your
cable box, but has a lower ohms rating. Thinnet is used with
Ethernet 10Base2, and supports 10 Mb/s transmission rate over
185-meter maximum. Thinnet uses BNC connector that
connects to a T-connector. If a T-connector is the last computer
on the network then a 50-ohm end terminator must be attached.
Fiber Optic
Fiber optic cabling is the backbone of the Internet. Fiber
optic cabling is buried beneath every major city, crosses every
continent, and spans across the ocean’s floors. Fiber optics
signaling is modern technology’s Morse code for high-speed
244
Hacking the IT Cube
There are two types of Fiber Optic Cabling: Single Mode Fiber
Optic Cable, and Multimode.
245
Hacking the IT Cube
246
Appendix B
Computer and Networking Terms and
Definitions
A
Access Control – Access Control ensures that resources connections are
only granted to those users who have privilege to them.
Access Control List (ACL) – An access control list (ACL) is a table that
tells a computer operating system which access rights each user has to a
particular system object, such as a file directory or individual file.
Account Harvesting
Account Harvesting is the process of gathering account names on a system.
Spammers typically harvest e-mail addresses from websites and phishing.
Active Content
Embedded code (Java, ActiveX) inside a web page that is downloaded and
executed.
Activity Monitors
Activity monitoring is a process that scans and prevents virus infection. The
process uses known viruses and algorithms to protect a company network
infrastructure.
Alpha
A RISC architecture developed by Digital Equipment Corporation.
Applet
Applets are typically referred to in Java programs. A client’s browser may
execute an applet that might execute a larger program on the server.
ARPANET
Advanced Research Projects Agency Network, of the U.S. Department of
Defense, pioneered packet-switched network, designed and build in the
early 1970s. In June 1990, the ARPANET became today’s Internet.
ASCII
American Standard Code for Information Interchange; is the standard
character-coding scheme used by most computers to display letters, digits
and special characters.. There are 128 standard ASCII codes each of which
can be represented by a 7 digit binary number: 0000000 through 1111111.
ATAPI
ATAPI is the protocol used by CD-ROM drives use to communicate with
the computer.
Auditing
Auditing is the gathering of information to ensure guidelines are meet in
either security or software licensees.
Authentication
The process of identifying an individual, usually based on a username and
password. In security systems, authentication is distinct from authorization ,
which is the process of giving individuals access to system objects based on
their identity. Authentication merely ensures that the individual is who he or
she claims to be, but says nothing about the access rights of the individual.
Authoring Tools
HTML editors, document conversion tools, tools that generate Web content
from databases are all authoring tools
Authorization
Authorization must be met before approval, or permission is granted to
access programs, files or folders on a computer system.
B
Backbone
A central high-speed network that connects smaller, independent networks
to larger networks.
Backdoor
A backdoor is a hidden access path to a computer system. Trojans can open
up a backdoor, as can a rootkit.
Backwards Compatible
A design that continues to work with earlier versions of a language,
program, etc.
Bandwidth
Bandwidth is a term used to describe the capacity of a communication
channel to pass data through in a given amount of time. Expressed in bits
per second.
Basic Authentication
Basic Authentication is the simplest web-based authentication used to pass
username and passwords.
Baud
The number of changes in signal per second. A signal with four voltage
levels may be used to transfer two bits of information for every baud.
Binary
The “0” and “1” numbering system that computers use to communicate
from program to hardware.
BIND
BIND is an acronym for Berkeley Internet Name Domain, an
implementation of DNS. DNS is for domain name to IP address resolution.
BIOS
(BIOS) Basic Input-Output System is a chip (or set of chips) in a computer
that controls how your computer communicates with some of the basic
hardware components in your system, such as the keyboard, floppy drive,
and hard disk.
Bit
The smallest unit of information storage; a contraction of the term "binary
digit;" one of two symbols—"0" (zero) and "1" (one) - that are used to
represent binary numbers.
Boot
Boot is the process or starting your computer
Boot Record
The boot record on a hard drive, or floppy disk, is at the beginning of the
disk. The boot record is on the active or bootable partition and contains the
start up information that boots the operating system.
Boot Record Infector
A boot record infector is a piece of malware that inserts malicious code into
the boot sector of a disk.
Bridge
A device that supports LAN-to-LAN communications. Bridges may be
equipped to provide frame relay support to the LAN devices they serve. A
frame-relay-capable bridge encapsulates LAN frames in frame relay frames
and feeds those frame relay frames to a frame relay switch for transmission
across the network.
Broadcast
To simultaneously send the same message to all nodes on a local segment.
Broadcast Address
An address used to broadcast a datagram to all hosts on a given network
using UDP or ICMP protocol.
Browser
A client computer program that translates and displays HTML code.
Brute Force
A hacking method used to find passwords or encryption keys by trying
every possible combination of characters until the code is broken.
Buffer Overflow
This happens when more data is put into a buffer or holding area, then the
buffer can handle. This is due to a mismatch in processing rates between the
producing and consuming processes. This can result in system crashes or
the creation of a back door leading to system access.
Byte
A set of Bits that represent a single character. Usually there are 8 Bits in a
Byte.
C
Cache
Similar to a buffer. All or part of a file may be read to a cache in RAM, then
used from RAM rather than requiring access from disk. An optional file on
your hard drive where such data also can be stored
Cache Poisoning
Malicious or misleading data from a remote name server is saved [cached]
by another name server. Typically used with DNS cache poisoning attacks.
Caplocks
Caplocks are a key on a standard keyboard that prevents one third of the
worlds computer users from logging onto their computers each morning.
CAT1
Category 1, up to 1 Mbps (1MHz) cable. Typically used with analog voice
(pots) Basic rate interface in ISDN. Also used in door bell wiring.
CAT2
Category 2, 4 Mbps, and typically udes in an IBM Cabling system for
Token Ring Networks.
CAT3
Category 3, 16 Mbps, and typically used with voice and data on 10BASET
Ethernet.
CAT4
Category 4, 20 Mbps, and typically used in a Token Ring network
CAT5
Cat5 refers to category 5 data cabling, which is a 4 pair cable (8 wires) 100
Mbps cable. Typically used in an Ethernet network.
CAT5e
Category 5e 1000 Mbps, used with ATM Gigabit Ethernet.
CAT6
Category 6 cabling, used in fast broadband networks up to 400 MHz
CAT6e
Category 6e supports 10 Gigabit Ethernet
CAT7
Category 7, 600-700 MHz. This cable can be used with full-motion video.
Cell
A cell is a unit of data transmitted over an ATM network.
Certificate-Based Authentication
Certificate-Based Authentication is used to authenticate and encrypt HTTP
traffic, using SSL certificates.
CGI
Common Gateway Interface, an interface that connects the Web with other
software and databases. CGI defines how data is passed from a server to a
CGI program and has nothing to do with the programming language itself.
Hence CGI programs can be written in a variety of languages (such as C,
Pascal, Perl, etc).
Chain of Custody
Chain of Custody is the federal rules that govern the handling of evidence.
Challenge-Handshake Authentication Protocol (CHAP)
An authentication method that can be used when connecting to an Internet
Service Provider. CHAP allows you to login to your provider automatically,
without the need for a terminal screen.
ChRoot
"chroot-ed" is the usual term in the Unix world to say that users are kept in
a confined part of the directory tree. Trying to change to a directory outside
of this limited area will fail.
Checksum
A value that is computed and that depends on the contents of a set of data.
Checksum is used to detect if the data has been altered during transmission
or when being stored and properly retrieved.
Cipher
A cryptographic algorithm for encryption and decryption.
Ciphertext
The result after Plaintext is passed through a Cipher.
Clock Speed
Clock speed is the rate at which a computer processor can complete a
processing cycle.
Clone
The term clone as referred to in computers arose in the mid-80s to describe
a Windows based PC, not manufactured by IBM. Dells, HP, Compaq, were
all considered as clones. These days, clones are no name computers
assembled by hand.
Collision
A collision occurs when multiple systems transmit simultaneously on the
same wire.
CMOS
Originally CMOS was abbreviation for Complementary Metal Oxide
Semiconductor; a semiconductor technology used in integrated circuits.
CMOS is now described as the low-level hardware BIOS setting, and the
computer's clock
Competitive Intelligence
Competitive Intelligence is espionage using legal mean.
Cookie
A cookie is a piece of data that is exchanged between a web server and a
users browser. A cookie may be a text file placed on the client’s computer
with information stored from the last visit.
Cron
Cron is a Unix and Linux application that runs scheduled jobs.
Crossover Cable
A crossover cable reverses the pairs of cables at the other end and can be
used to connect devices directly together.
Connector 1 Pin Connector 2 Pin
Out Out
12345678 3 6 1 Open Open 2
Open Open
Crosstalk
Crosstalk is the coupling of unwanted signals from one pair within the same
cable to another pair.
Cryptanalysis
The mathematical science that deals with analysis of a cryptographic system
in order to gain knowledge needed to break or circumvent the protection
that the system is designed to provide. In other words, convert the cipher
text to plaintext without knowing the key.
Cryptography
Cryptography encrypts data so anyone that intercepts it can not openly read
the message files.
Cut-Through
Cut-Through is a method used in data switching where only the header of a
packet is read before it is forwarded to its destination. Routers and
Switches will use Cut-through.
D
Daemon
A program that runs in the background without supervision. This is
typically associated with Unix and Linux systems.
Database Compression
Storing data in a format that requires less space than usual. Compressing
data is the same as packing data. Data compression is particularly useful in
communications because it enables devices to transmit the same amount of
data in fewer bits (requiring less time). There are a variety of data
compression techniques, but only a few have been standardized.
DBMS
Database Management System
Data Aggregation
The process of redefining data into a summarization based on some rules or
criteria.
Data Mining
The ability to query very large databases in order to satisfy a hypothesis.
Data Owner
A Data Owner is the entity having responsibility and authority for the data.
Data Warehousing
A data warehouse brings together data from multiple transactional systems
and enables users to access and analyze the information at various levels.
Datagram
A data packet used by a connectionless, unsequenced protocol like IP and
UDP. A datagram may be encapsulated in one or more packets passed to the
data link layer.
Decapsulation
Decapsulation is the process of stripping off one layer's headers and passing
the rest of the packet up to the next higher layer on the protocol stack.
Decryption
Decryption is the process of transforming an encrypted message into its
original plaintext.
Denial of Service
(DoS) When a hacker performs a Denial Of Service attack against web
servers, FTP servers, and mail servers. Pinging a server with large ping
packets is a form of DoS.
DHTML
Dynamic HTML, a mixture of standards including HTML, style sheets, the
Document Object Model and scripting. However, there is no World Wide
Web Consortium specification that formally defines DHTML.
Dictionary Attack
An attack that uses a word dictionary to crack a password or key. A
dictionary is typically a text file that contains common words and phrases
used as passwords.
Digital Envelope
A digital envelope is an encrypted message with the encrypted session key.
Disassembly
The process of taking a binary program and extrapolating the source code
from it.
Distance Vector
Distance vector is the measurement or the cost of routes; this determines the
best-known route to send a data packet by the router.
Domain
On the Internet, a domain consists of a set of network addresses. In the
Internet's domain name system, a domain is a name with which name server
records are associated that describe sub-domains or host. In Windows NT
and Windows 2000, a domain is a set of network resources (applications,
printers, and so forth) for a group of users.
Domain Name
A name that identifies one or more IP addresses. For example, the domain
name microsoft.com represents about a dozen IP addresses. Domain names
are used in URLs to identify particular Web pages. For example, in the
URL http://www.microsoft.com/index.html, may be the domain name
Microsoft.com
Download
To copy data from a main source to a local device. The term is often used to
describe the process of copying a file from an Internet server to one's own
computer. Downloading can also refer to copying a file from a network file
server to a computer on the network.
DSL
Digital Subscriber Link technologies, use sophisticated modulation schemes
to pack data onto copper wires. They are sometimes referred to as last-mile
technologies because they are used only for connections from a telephone
switching station to a home or office, not between switching stations.
Dual Boot
A computer configuration with a choice of two operating systems to boot
from.
Due Diligence
Due diligence is the required procedure that organizations must develop and
deploy as a protection plan to prevent fraud, abuse, and additional deploy a
means to detect them if they occur.
DumpSec
DumpSec is a security tool that dumps a information about a system's users,
file system, registry, permissions, password policy, and services.
Dumpster Diving
Dumpster Diving is a practice of rummaging through trash to obtain
passwords from corporate and private dumpsters.
E
Eavesdropping
Eavesdropping is simply listening to a private conversation, which may
reveal information that can provide access to a facility or network.
Echo Reply
An echo reply is the response a machine that has received an echo request
sends over ICMP. Ping is a typical Echo reply response.
Echo Request
The Echo Reply is an ICMP message generated in response to an ICMP
Echo Request message, and is mandatory for all hosts and routers. Ping is a
typical Echo Request response.
Egress Filtering
Filtering outbound traffic.
EIDE
Enhanced Integrated Drive Electronics is a newer version of the IDE
Interface standard.
Encapsulation
The technique used by layered protocols in which a layer adds header
information to the protocol data unit (PDU) from the layer above.
Encryption
Cryptographic transformation of data (called "plaintext") into a form (called
"cipher text") that conceals the data's original meaning to prevent it from
being known or used.
Ephemeral Port
In computing, a port (derived from seaport) is usually an interface through
which data are sent and received. An exception is a software port (derived
from transport), which is software that has been "transported" to another
computer system (see below for details).
Escrow Passwords
Escrow Passwords are passwords written down and stored in a secure
location (like a safe). This allows emergency personnel to access log-ons
when privileged personnel are unavailable.
Ethernet
The most widely installed local area network technology used. Ethernet is a
specified standard, (IEEE 802.3) An Ethernet LAN typically uses Category
5 cable, although in past installations, coax and CAT3 was the standard.
Devices are connected to the cable and compete for access using the
CSMA/CD protocol.
Exposure
Sensitive data directly released to an unauthorized entity. This could be a
security vulnerability from software configurations, or from an inside
source such as a disgruntled employee.
F
FAQ
Frequently Asked Questions, usually associated with Usenet newsgroups
but often featured on Web sites also, the FAQ is a list of questions
commonly asked by users.
False Rejects
False Rejects are when an authentication computer or system fails to
recognize a valid user.
Fdisk
Fdisk is a partition utility that creates, modifies, and deletes partitions.
Filesystem
Filesystems are unique to operating systems and cannot be read between
them. Linux supports multiple filesystems.
Filter
A filter typically refers to a firewall or sniffer method of analyzing and
distributing packets.
Filtering Router
A filtering router may be used as a firewall or part of a firewall. A router
usually receives a packet from a network and decides where to forward it on
a second network
Finger
Finger is an Internet protocol that allows you to check a user's login
information. Finger, originally a Unix protocol, takes an e-mail address and
returns information about the user who owns that e-mail address.
Fingerprinting
Sending queries to a system in order to determine the operating system.
Fingerprinting can also be characterized as a method of determining a
systems naming and operating systems convention.
Firewall
A computer hardware device or software, used to prevent the unauthorized
access to a network.
Flooding
A process of becoming overwhelmed my intrusive and erroneous data to
interrupt or take control of a system.
Formatting
Forest
A forest is a set of Active Directory domains that replicate their databases
with each other.
Fork Bomb
A Fork Bomb, also known as a “logic bomb” works by using the fork() call
to create a new process which is a copy of the original. This is typically an
attack on Unix systems. By doing this repeatedly, all available processes on
the machine can be taken up. It is similar to having a computer make copies
of the same files in a new directory until there is no more space on the hard
drive.
Forward Lookup
Forward lookup uses an Internet domain name to find an IP address by
using DNS.
Fragmentation
Scattering of data over a hard disk caused by successive recording and
deletion operations. Generally this will eventually result in slow data recall.
Frames
Data that is transmitted between network points as a unit complete with
addressing and necessary protocol control information. A frame is usually
transmitted serial bit by bit and contains a header field and a trailer field
that "frame" the data. A frame is also a term used in html code used to
display content inside the same browser without opening a new browser or
changing the existing page.
Full Duplex
The ability of a device or line to transmit data simultaneously in both
directions. Phones with half duplexing sound choppy when both parties try
to talk at once.
gethostbyaddr
The gethostbyaddr DNS query is when the address of a machine is known
and the name is needed.
gethostbyname
The gethostbyname DNS quest is when the name of a machine is known
and the address is needed.
GID
Short for Group ID
Gopher
A system that pre-dates the World Wide Web for organizing and displaying
files on Internet servers. A Gopher server presents its contents as a
hierarchically structured list of files.
GNU
GNU is a Unix-like operating system that comes with source code that can
be copied, modified, and redistributed. The GNU project was started in
1983 by Richard Stallman and others, who formed the Free Software
Foundation.
Gnutella
An Internet file sharing utility. for peer-to-peer sharing of data between
computers (typically MP3 music files).
H
Hacker
Hacker is a slang term for a computer enthusiast. Among professional
programmers, the term hacker implies an amateur or a programmer who
lacks formal training. Depending on how it used, the term can be either
complimentary or derogatory, although it is developing an increasingly
derogatory connotation. The pejorative sense of hacker is becoming more
prominent largely because the popular press has co-opted the term to refer
to individuals who gain unauthorized access to computer systems for the
purpose of stealing and corrupting data. Hackers, themselves, maintain that
the proper term for such individuals is cracker.
Hard Disk
A hard disk contains a rotating magnetic media. Heads float over the
surface of a disk, and read from the disk and write data to it.
Hardening
Hardening is the process of fixing vulnerabilities on a system. Hardening
the system involves changing setting to help ensure the system is secure.
Hash Function
An algorithm that transforms a string of characters into a usually shorter
value of a fixed length or a key that represents the original value.
Header
A header is the extra information in a packet that is needed for the protocol
stack to process the packet.
Hijack Attack
A form of active wiretapping in which the attacker can seize control of a
previously established communication association. Hijack attacks are
similar to the-man-in the middle attack.
Home Page
The main page of a Website. Typically, the home page serves as an index or
table of contents on the main page of a website.
Honeypot
A "honey pot" is a system intentionally place on a network with vulnerable
points to act as a decoy/trap for unsuspecting hackers. The purpose of a
honeypot can be to trap hackers or just to monitor their methods of attack.
Hops
A hop is a count between routers or gateways.
Host
The term “Host” typically refers to a server where websites reside.
HTTP Proxy
An HTTP proxy acts as an interacting service between HTTP clients (Web
browsers) and HTTP served Web sites. These proxies can cache pages for
faster retrieval. The program Squid, is a popular Linux based HTTP Proxy.
www.squid-cache.org/
HTTPS
HTTPS in the URL, specifies that the use of HTTP enhanced by a security
mechanism, which is usually SSL.
Hub
A Hub is a master station through which all communications to, from and
between micro terminals must flow. A Hub typically works in a MESH
network environment. Hubs rebroadcast signals to all ports.
Hyperlink
In hypertext is an informational object (such as a word, or an image) within
a webpage, that points to an area within the website or somewhere else on
the Internet.
I
Incident Handling
Incident Handling is a plan in dealing with intrusions, cyber-theft, denial of
service, fire, floods, and other security-related events. It is comprised of a
six-step process: Preparation, Identification, Containment, Eradication,
Recovery, and Lessons Learned.
Incremental Backups
Incremental backups only backup the files that have been added or modified
since the last backup.
IIS
Short for Internet Information Server, Microsoft's Web server that runs on
Windows NT platforms. IIS comes bundled with Windows Server
programs. Because IIS is tightly integrated with the operating system, it is
relatively easy to administer.
Inetd (xinetd)
Inetd (or Internet Daemon) is an application that controls smaller Internet
services like telnet, ftp, and POP in Unix and Linux systems.
Ingress Filtering
Ingress Filtering is the process of filtering inbound traffic.
Interrupt
An interrupt is a signal from a device that tells the computer that an event
has occurred.
Internet
You’re kidding me, right?
Intranet
A network connecting computers within an organization using standard
Internet protocols, esp. TCP/IP and HTTP.
Intranet
An intranet computer network, usually a private network closed to
outsiders.
Intrusion Detection
Intrusion detection is software used to detect attempted intrusion into a
computer or network.
IP Address
An IP address is a unique 32-bit identifier for a computer or device that
used on a TCP/IP network.
IP Flood
An example of an IP flood is a denial of service attack that sends a host
more echo request ("ping") packets than the protocol implementation can
handle.
IP Forwarding
IP forwarding allows a workstation or server to at as a router, and forward
TCP/IP requests.
IPSec
Short for security, IPSec is a set of protocols developed to support the
secure exchange of packets at the IP layer.
IP Spoofing
IP spoofing is a technique used to falsify the source IP Address of a hacker
or another type of intruder.
ISDN
Integrated Services Digital Network, an international communications
standard that allows ordinary phone lines to transmit digital instead of
analogue signals, allowing data to be transmitted at a much faster rate than
with a traditional modem.
ISO
International Organization for Standardization, a voluntary, non-treaty, non-
government organization, established in 1947, with voting members that are
designated standards bodies of participating nations and non-voting
observer organizations.
ITU-T
International Telecommunications Union, Telecommunication
Standardization Sector (formerly "CCITT"), a United Nations treaty
organization that is composed mainly of postal, telephone, and telegraph
authorities of the member countries and that publishes standards called
"Recommendations."
J
Jabber
A jabbering node is a network device on an Ethernet network that is
continuously sending data. This action is typically associated with a
problem.
Jack
A jack is a female connector. (Should be called a Jane)
Jacket
The outer protective covering of a cable.
Java
An object orientated programming language designed to run on any
computer platform or operating system. Java applets are sent as executable
programs.
JavaScript
A scripting language that is sent as text and compiled on the client before
execution.
Jitter
Jitter is the modification of fields in a database while preserving the
aggregate characteristics.
Jump Drive
A jump drive is a small removable data storage device that uses flash
memory and a USB connector.
Jumper
A jumper is a sleeve that bridges a circuit.
K
Kerberos
The authentication protocol implemented in DCE. Kerberos was developed
at the Massachusetts Institute of Technology. The name comes from
classical mythology, Kerberos was the three-headed dog that guarded the
gates of the underworld.
Kernel
The Kernel is the center of a computer operating system, the core that
provides basic services for all other parts of the operating system. Kernel
and shell are typically terms used more frequently when describing the core
of Unix and Linux.
L
L
Symbol used to designate inductance.
LAN
Local Area Network
LAN Adapter
Also called a Network Interface Card
Laser Printer
A printing device when out of paper, its user continues to print the same
document several more times.
LATA
LATA is a telco term meaning, Local Access and Transport Area.
Leased Line
A dedicated telephone line that is rented for exclusive 24-hours-a-day, 7-
days-a-week use from one location to another.
Least Privilege
Least Privilege is the principle of allowing users or applications the least
amount of permissions necessary to perform their intended function.
Lightweight Directory Access Protocol (LDAP)
Lightweight Directory Access Protocol. A protocol used to access a
directory listing. Generally used in Web browsers and e-mail programs to
enable lookups.
LILO
LILO is a commonly used bootstrap loader for Linux systems based on an
Intel compatible processor.
Linux Torvalds
Creator of Linux while in college in 1991
Linux
A full featured and robust source operating system, similar to Unix.
Link State
Link state refers to route information from all routers linked with a
geographic area,. The router uses this information to create a table of best-
known routes.
Lobe
A lobe is an arm of a Token-ring with extends from a Multistation Access
Unit.
LocalTalk
LocalTalk is Apple Computer’s network scheme. LocalTalk uses a carrier
sense multiple access with collision avoidance (CSMA/CA
Log Clipping
Log clipping is the removal of log entries from a system log to hide a
compromise.
Loopback
A type of diagnostic test in which a transmitted signal is returned to the
sending device after passing through a data communications link or
network.
Loopback Address
The loopback address (127.0.0.1) is a pseudo IP address from a properly
configured network card that always refers back to the local host and are
never sent out onto a network. To test if your local configuration is correct,
it is standard to ping your loop back address.
M
M
Sign for Mutual Inductance
MAC Address
Media Access Control address is a unique physical address burned on each
network device's network interface card.
Malicious Code
A Trojan horse is an example of Malicious Code. In code injected into a
system without the users knowledge can be termed as malicious code.
Malware
Malware is a generic term used to generalize malicious code.
MAN
Metropolitan Area Network
Morris Worm
A worm program written by Robert T. Morris, Jr. that flooded the
ARPANET in November, 2 1988. Morris is now a professor at MIT.
Multi-Cast
Broadcasting from one host to multiple hosts.
Multi-Homed
Multi-homed typically refers to more than one NIC card on a computer, or
can also refer to being directly connected to two or more ISP’s.
Multiplexing
A multiplexed signal is a combined signal that is joined at its source and
must be separated at its destination. Techniques that allow a number of
simultaneous transmissions over a single circuit.
N
Name Space
DNS database structure.
Nerd
A term used to describe persons reading a book like this.
Netmask
Used by the TCP/IP protocol to decide how the network is broken up into
sub-networks. For example, the network mask for a class C IP network is
displayed as 0xffffff00, or 255.255.255.0.
Network Mapping
To compile an inventory of the computer systems and the services on a
network.
Network Taps
Network taps are devices that hook directly onto the network cable and can
capture traffic.
Null Session
Known as Anonymous Logon, it is a way of letting an anonymous user
retrieve information such as user names and shares over the network or
connect without authentication. It is used by applications such as
explorer.exe to enumerate shares on remote servers.
Octet
An octet is an eight-bit byte.
Overload
A method to test a system component by placing excess performance on it.
Packet
Packet" a generic term used to describe unit of data at all levels of the
protocol stack, but it is most correctly used to describe application data
units. Also called a datagram.
Partition
Division of a physical hard disk space.
Password Sniffing
Passive network tapping, (wiretapping) usually on a local area network, to
gain knowledge of passwords. A network card on promiscuous mode can
capture data on the wire and sniff out key words.
Patch
A patch is a bug fix released by a software manufacturer.
Payload
Payload is the actual application data a packet contains.
Penetration
Gaining unauthorized access to sensitive data by circumventing a system's
protections. Also known as third base.
Penetration Testing
Penetration testing is used to test the external security of a remote station.
Permutation
Permutation keeps the same letters but changes the position within a text to
scramble the message.
Personal Firewalls
Personal firewalls are those firewalls installed on individual PCs.
Phishing
“Phishing" is a form of identity theft by the act of sending email messages
that are more or less exact copies of legitimate HTML emails from well-
known companies. These e-mail are typically fake messages from banks,
mortgage companies, or any other company that would ask you to input
your SS number and personal records.
Ping of Death
The use of Ping with a packet size higher than 65,507. This will cause a
denial of service.
Ping Sweep
An attack that sends ICMP echo requests ("pings") to a range of IP
addresses, with the goal of finding hosts that can be probed for
vulnerabilities.
Plaintext
Ordinary text before being encrypted.
Poison Reverse
Split horizon with poisoned reverse is how a routing protocol notifies
neighboring routers that a route is no longer available. Since RIP allows up
to 15 hops to another gateway, setting the hop count to 16 would mean
"infinite."
Polyinstantiation
Polyinstantiation is the ability of a database to maintain multiple records
with the same key.
Polymorphism
Polymorphism is the process by which malicious software changes its
underlying code to avoid detection.
Port
In TCP/IP and UDP networks, a port is an endpoint to a logical connection.
Only one process per machine can listen on the same port number.
Port Scan
A method an attacker uses to enumerate what services are running on your
network. An attacker sends requests on different ports and takes note of
which ports respond in certain way.
Private Addressing
IANA has set aside three address ranges for use by private or non-Internet
connected networks. This is referred to as Private Address Space and is
defined in RFC 1918. The reserved address blocks are: 10.0.0.0 to
10.255.255.255 (10/8 prefix) 172.16.0.0 to 172.31.255.255 (172.16/12
prefix) 192.168.0.0 to 192.168.255.255 (192.168/16 prefix)
Program Policy
A program policy is a high-level policy that sets the overall tone of an
organization's security approach.
Promiscuous Mode
When a machine reads all packets off the network, regardless of who they
are addressed to.
Proprietary Information
Proprietary information is information unique to a company and its ability
to compete.
Protocol
A formal specification for communicating; an IP address the special set of
rules that end points in a telecommunication connection use when they
communicate.
Public Key
A mathematically-derived code provided by a certificate authority.
R
Radiation Monitoring
Radiation monitoring is the process of receiving images, data, or audio from
an unprotected source by listening to radiation signals.
Reconnaissance
Reconnaissance is the phase of an attack where “the” attackers finds new
systems, maps out networks, and probes for specific, exploitable
vulnerabilities.
Registry
The Windows Registry is a database of systems configurations.
Reverse Engineering
The process of analyzing another subject’s product or software, to identify
and recreate it.
Reverse Lookup
A query in which the IP address is used to determine the DNS name for the
computer.
Risk
Risk is the product of the level of threat with the level of vulnerability. It
establishes the likelihood of a successful attack.
Risk Assessment
Risk assessment is the identification and quantification of the risk resulting
from a specific use or occurrence.
Rivest-Shamir-Adleman (RSA)
An algorithm for asymmetric cryptography, invented in 1977 by Ron
Rivest, Adi Shamir, and Leonard Adleman.
Root
Root is the name of the administrator account in Unix / Linux systems.
Rootkit
A collection of programs (and utilities) that a hacker uses to gain access to a
system and obtain administrator-level.
Router
A router is a network appliance that interconnect logical networks by
forwarding information to other networks based upon IP addresses.
Routing Loop
A routing loop is where two or more poorly configured routers repeatedly
exchange redundant packets info.
RPC Scans
RPC scans determine which RPC services are running on a machine.
S
Scavenging
Searching through any accessible data to gain unauthorized knowledge of
sensitive data.
Segment
Segment is another name for TCP packets.
Server
A server is a computer that handles requests for data, email, file transfers,
and other network services from client computers
Session
A session is a virtual connection between two hosts by which network
traffic is passed.
Session Hijacking
A method of attack, which involves a third party intercepting someone
else’s communications.
Session Key
In the context of symmetric encryption, a key that is temporary or is used
for a relatively short period of time.
Shell
A Unix shell, also known as "the command line", provides the traditional
user interface for the Unix and Linux operating systems. This is similar to
Windows DOS prompt.
Sniffer
A sniffer is a tool that monitors network traffic.
Social Engineering
Social engineering is the practice of conning people into revealing sensitive
information regarding computer systems and passwords.
Socket
A socket is a combination of an IP address and port number that uniquely
identifies a network service.
Spam
Electronic junk mail that usually involves penis enlargement and home
refinancing.
Spanning Port
Configures the switch to behave like a hub for a specific port.
Spoofing
Impersonating another person or computer, usually by providing a false
email name, URL or IP address.
SQL Injection
A type of exploit whereby hackers are able to execute SQL statements via
an Internet browser
Stack Mashing
Stack mashing is the technique of using a buffer overflow to trick a
computer into executing arbitrary code.
Static Routing
Static routing means that routing table entries contain information that has
been added manually and does not change.
Stealthing
Stealthing is a term that refers to approaches used by malicious code to
conceal its presence on the infected system.
Steganalysis
Steganalysis is the process of detecting messages hidden using
steganography.
Steganography
The process of hiding data inside other data.
Straight-Through Cable
A straight-through cable is where the pins on one side of the connector are
wired to the same pins on the other end.
Subnet
An interconnected, but independent segment of a network that is identified
by its Internet Protocol (IP) address.
Subnet Mask
32-bit address mask used in IP to indicate the bits of an IP address that are
being used for the subnet address.
Switch
A switch is a networking device, similar to a hub, which keeps track of
MAC addresses attached to each of its ports. In this way data is only
transmitted to the ports of the intended recipient.
Switched Network
A communications network in which each user is connected to with a
unique address, (such as a phone number or IP Address) that allows the
system to connect two points together directly.
SYN Flood
A denial of service attack that sends a host TCP SYN packets that results in
using up a systems resources so it cannot perform any other task.
Syslog
A program used to remotely record device logging.
T1, T3
A digital circuit using TDM (Time-Division Multiplexing).
TCP Fingerprinting
TCP fingerprinting is a method of determining a remote operating system.
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is the basic
communication protocol of the Internet. It can also be used as a
communications protocol in a private network.
TELNET
A TCP-based program on the application-layer of the OSI model used for
connecting to shells on remote network devices.
Threat Assessment
Process of evaluating the degree of threat to an information system and
describing the nature of the threat.
Time to Live
An Internet header field which indicates the upper bound on how long this
Internet datagram may exist.
Token Ring
A token ring network is a local area network in which all computers are
connected in a ring or star topology. A token-passing scheme is used in
order to prevent the collision of data between computers that want to send
messages at the same time.
Topology
The geometric configuration of a computer network, or how the network is
physically laid out. Common topologies are star (centralized), bus
(decentralized), and ring (decentralized).
Trunking
Trunking is connecting switches together with multiple ports to allow more
data to pass.
Unicast
Broadcasting from host to host.
Unix
A popular operating system, developed by AT&T in 1969, that was very
important in the development of the Internet. UNIX allows more than one
user to access a computer system at the same time. An early version of
UNIX, which was used by most colleges and universities, incorporated
TCP/IP and made Internet connections possible.
Unprotected Share
In Windows terminology, a "share" is a mechanism that allows a user to
connect to file systems and printers on other systems. An "unprotected
share" is one that allows anyone to connect to it.
Users
A term used to describe those peoples that live in and around the
Hollywood CA, area. Also a term used for computer users.
Vulnerability
What happens to a network when boredom sets in to the IT department.
WAN
Wide Area Network
War Dialer
A computer program that automatically dials a series of telephone numbers
to find lines connected to computer systems.
War Driving
War driving is the process of driving around searching for wireless access
points that are open.
WHOIS
An IP for finding information about resources on networks.
WIN32
A Window’s application programming interface (API)
Windump
Windump is a freeware protocol analyzer for Windows that monitors
network traffic on a wire.
Wiretapping
Also known as The Man in the Middle, wiretapping is placing a computer
or device on a network to record data.
Worm
A computer program that independently propagates into computer systems.
Wrap
To use cryptography to provide data confidentiality service for a data
object. Also, music that rhymes badly.
XML
Extensible Markup Language, is used to define documents with XML
compatible programs.
Y2K
Year 2000. A term used in 1999, to scare businesses into upgrading their
computer equipment. Also called the Millennium Bug, when the year 2000
rolled over many older programs was not programmed to rollover from
1999 to 2000. Many people predicted doom, nuclear holocaust, and
Armageddon. Those that survived Y2K—everyone—are currently spending
their time on more practical disasters such as meteoric impacts on the earth.
Yottabyte
A yottabyte is 2 to the 80th power, or
1,208,925,819,614,629,174,706,176 bytes
Zettabyte
A zettabyte is 2 to the 70th power, or 1,180,591,620,717,411,303,424 bytes.
ZIP
A zip file is a compressed filed for Windows based computers.