Wednesday morning, someone tried hacking into my website. (Not the first 
time, won't be the last) Didn't look like they made it. I can't be 
surprised. I have a controversial article about hacking plus I offer a 
security script. The fun part is there's nothing of value up there (my 
shopping site doesn't store credit card info or anything like that). But of 
course, they don't know that, and sometimes, they don't care.

Since we just had a discussion about security, I figured I'd relate some 
details and observations for the sake of information. Perhaps this will help 
some people improve their security. (I'm assuming it's a "he" for ease of 
writing so don't get all sexist on me.)

Some non-important details have been left out to protect my butt, but you'll 
get the full idea.

(hack attempt)

The first thing the guy did was try to use a well known IIS hole to look at 
my application.cfm. Didn't work. Then he tried the same IIS hole to look at 
my cart.cfm page. No luck there either.

Then I received about 100 calls in about 2 minutes, each one aiming for 
locations of known scripts. It searched for known FrontPage extensions, 
locations of standard DLL files, well known CGI scripts, EXE files, standard 
Cold Fusion files, stock shopping cart files, the works. He even looked for 
scandisk logs and other known items. It tried a few locations for the same 
item, but not very much. Mostly it tried specific known holes.

When that failed, he seemed to leave.

(/hack attempt)

OBSERVATIONS:

This seems to have been what many people refer to as a "script kiddie". Some 
young (in terms of computer skill) person with knowledge of a few holes and 
a hacking program.

First, he poked around to see if he could get information on my sites layout 
and vital statistics. Looking at the application.cfm and cart.cfm were the 
best bets for finding out important info, so kudos to the hacker for having 
some intelligence.

Once he realized he wasn't going to get anywhere that way, he launched his 
"hack weapon of death".

He has a program that runs through a list of known security holes. It 
systematically tries each one and alerts him to open doors.

This has become a very standard way of attempting hacks. The days of some 
computer nerd exploiting one unknown hole is over. With so many systems and 
possible security holes, the usual attack is a shotgun attack, trying every 
known hole as quickly as possible.

One thing I've noticed is that this shotgun method relies on one thing: 
Standard layouts.

Every single hole he tried attempted to find a specific file in a specific 
location (or locations). These locations are known because programs install 
the same way every time. For example, when installing FrontPage in the 
default way (the way 99.9% of people install software), the same extensions 
are placed in the same location every time. Since the locations are known, 
the attack aims at those specific locations. The same is true about certain 
settings. Since programs install with certain settings (or default 
passwords) these are also scanned for.

In other words these attacks aren't like a "find" program that looks all 
over your system for a particular file, they're more like a "run" program 
that expects something to be in a standard location. Since the file it wants 
isn't where it should be, nothing runs, and the hack is unsuccessful.

However, since nothing on my system is in "default locations", this attempt 
doesn't seem to work. A more personal touch is required to enter my site and 
this guy didn't want to spend the time when other sites will probably fall 
victim to his shotgun technique.

The important thing to remember about this kind of attack is that it isn't 
personal. These hackers are going "door-to-door" knocking and checking the 
handle to see if it's unlocked. When they find an entrance they head on in. 
They don't know who you are and they don't care.

This guy didn't have a personal vendetta against me or my site. If he did, 
he would have poked around a little closer, searched the internet for 
personal info about me, made phone calls, bribed employees and friends for 
info and found out as much as he could about me and my sites layout so he 
could find a way to break in.

That didn't happen. He couldn't find an easy entrance so he moved on to the 
next poor sucker. I got lucky this time.

LESSONS:

So what can we learn from this?

Change all default settings on ALL programs:

If you use Cold Fusion (which of course we all do), or anything else on your 
servers, place it in a  non-standard location. Change the install from
C:\Program Files\Allaire\ColdFusion Studio x.x or C:\CFUSION
to something like
C:\MY FILES ARE\SAFERHERE\Allaire\ColdFusion Studio x.x
Place your websites in a non-standard location, so they can't jump to 
something else via url hacking.

If you use a stock shopping cart, or stock CGI script, or anything like 
that, Place it in a non-standard location like 
www.website.com/cgi-bin/realscriptshere/sendmail.cgi. Make sure nobody 
looking at your HTML can tell where your scripts are located.

Example: If you use AHP Shopping Cart, or CartEase or AbleCommerce etc. 
Chances are that your files are right where hackers want them to be.

IMPORTANT: Many of the attacks are looking for a hole relative to the 
website. For example they hunt for "../_vti_pvt/scripthole.dll" or 
"../../_vti_pvt/scripthole.dll" since it's usually placed one or two folders 
away from your website. (God I love picking on FrontPage)

Change standard passwords and default settings:

When you install something (in a non-default location), always go through it 
and change potentially dangerous default settings. Look for default 
passwords and change them.

A little fact to drive the point home: A well known car company got into big 
trouble because they only made about 53 different keys for all the cars they 
made. If someone has a collection of those keys, they have access to every 
single car made by that company. This means your car unless you go through 
the trouble to have the car rekeyed with a custom key. Websites are just 
like this.

I am by no means a security expert. I'm just throwing out some things I've 
noticed for the sake of discussion. If this helps great. If you have some 
tips of your own, please share.

================================
Josh - [EMAIL PROTECTED]
================================


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp

FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to