This article gives an overview of the 10 most commonly encountered vulnerabilities during our audits, with case studies attached. It is therefore an accurate feedback from the ITrust’s technical teams over the last 5 years. During our aduits or incident interventions, we observed that 99% of information systems had been compromised by at least one of these 10 breaches. Correcting these 10 main vulnerabilities would heighten the security level of an organization.
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
ITrust Whitepaper: Top 10 vulnerabilities
1. ITrust experts
found that
10
security
breaches
represent
Written by ITrust November 2013, based on the audits conducted over
the past 5 years by our penetration testing team.
of the total security breaches
companies are faced with
99%
« ITRUST » WHITE PAPER
2. 2 WHITE PAPER Top 10 vulnerabilities by ITrust
It doesn’t come as a big surprise that last year’s headlines still talked about cybercrime. This issue is
now one of the major challenges governments are dealing with. We all still remember how mediatized the
Elysée hacking was [1].
75% of companies were hacked within the last two years, according to a Cenzic study [2]. That number rose
to 90% according to our calculations. This statementis based on what theITrustteam has dilligently observed
These tests are realized both internally and externally (to test DMZ
customer services or even on websites).
You can find below our test distribution.
Introduction
AUDITS DISTRIBUTION PER YEAR :
Total: 104 audits
Distribution by type of audit conducted
web 12 %
internal 50 %
external 38 %
The year 2013 is only based on
number
of audits
Over the past 5 year, our consultants intervened over a hundred times to perform penetration tests for
our customers.
during its pentest missions.
3. 3 WHITE PAPER Top 10 vulnerabilities by ITrust
The stats in this white paper are recovered from the data sample we are dealing with to provide an objective view.
This article gives an overview of the 10 most commonly encountered vulnerabilities during our audits,
with case studies attached. It is therefore an accurate feedback from the ITrust’s technical teams over the last 5
years. During our aduits or incident interventions, we observed that 99% of information systems had been
compromised by at least one of these 10 breaches. Correcting these 10 main vulnerabilities would heighten
the security level of an organization.
Distribution of our customers by number of employees
Thus, we provide information concerning the business structure:
over 500 (38%) Service (19%)
Bank (19%)
less 500 (12%) Industry (15%)
Host (6%)
less 100 (15%) Public (4%)
Hotel (4%)
less 20 (35%) health/agro
(25%)
Aerospace (8%)
Distribution of our customers by field of activity
And the field of activity of our customers:
4. 10
4 WHITE PAPER Top 10 vulnerabilities by ITrust
DNS Servers
DNS is an essential useful service, which insures the smooth functioning of application
services such as browsing and messaging. Most of the time, doors are opened
in the whole network.
Then, hackers use the DNS zone transfer to list all the assets within the domain.
department (R&D, Accounts).
Wordy domain controllers
Domains that are too wordy give attackers critical information to organize their attacks.
Through LDAP or Samba connections, they often get relevant information such as
for them, the domain users list.
It is possible to obtain in the same way, for each machine, the connected users.
Feedback:
Top 10 vulnerabilities encountered
Fixing these
vulnerabilities would
raise the level of security
of an organization
LOGGING TOO VERBOSE
« the network tea room »
Case study: enumerating user accounts on a domain
Using rpcclient command under windows :
# > rpcclient 192.168.1.1 -p 139 -U% -c enumdomusers
session request to 192.168.0.4 failed (Called name not present)
user:[Admin] rid:[0x1f4]
user:[Guest] rid:[0x1f5]
user:[Accounting] rid:[0x476]
user:[Commercial] rid:[0x4c3]
Using rpcclient to enumerate domain administrator
# > rpcclient 192.168.0.4 -p 139 -U% -c ‘querygroupmem 0x200’
session request to 192.168.0.4 failed (Called name not present)
rid:[0x1f4] attr:[0x7]
This vulnerability is not exactly a real one, but is often the first step during penetration
tests. Even though this flaw cannot directly compromise a system, it allows useful
information to be collected – especially finding out relevant targets.
In the talkative group, we find the 2 main servers:
Thus, they can quickly find out the interesting targets – by responsibility or
the domain name, the operating system version (fingerprint) and even more useful
5. 5 WHITE PAPER Top 10 vulnerabilities by ITrust
Within a UNIX environment, remote login programs (rlogin et rsh) use a poor
authentication system which also allows them to set up a trust based relationship
compromised, the hacker has easy access to the whole system of trusted machines.
In most cases, these applications are forbidden with the security policy requirements
in favour of more secured tools as SSH. But experience reveals that a bounce back is
possible because of the lack of private key protection. The related public key can
often be used on a wide range of servers. That allows the attacker to connect onto
them.
Active Directory domains. In that situation, the user directory is replicated between
the trusted domains. If an attacker can obtain an account on a « weaker » domain,
then he will have the entire access to all the domains within the account.
Need-to-know is one of the most important security concepts used to ensure the
Case study: trusted insider test - trainee example
In the most active directory architectures, users are
assigned to several groups and shared contents are opened
to some groups.
in most cases, it also points to information about user accounts
that can be used to become a server administrator.
Employees are the weakest link for IT security. They
represent 50% of security risks. « Insiders are the biggest
threat »
9
betweenthemachines(via.rhostsorhosts.equivfile).Thisway,ifamachineis
8
protectionofconfidentialdata.Accessrightsandpermissionsmanagementoften
hasitsweaknesses:accessrestrictionsthataretooweakorevennon-existentallow
therecoveryofstrategicandconfidentialinformation.
A trainee is added to the group of his supervisor(s).
The test consists in finding what information can be obtained.
At the end of the test, the experience highlights that the
person has at least obtained confidential data. Moreover,
Within a Windows environment, it is possible to define trust relationships between
TRUST-BASED RELATIONSHIP:
spreading compromise
ACCESS RIGHT MANAGEMENT:
need-to-know
6. 6 WHITE PAPER Top 10 vulnerabilities by ITrust
Case study: ERP - a perfect target
For this case, the company used to let salespersons have an ERP instance on their
computer in order to use it when they are on-site contact with customers. As the database
could get the company clients list and its associated offers. This would be a real treasure for
Even in companies where security is considered on users’ posts and servers, some
kinds of equipment are regularly forgotten, whether it’s active network elements
such as switches, routers or printers, security - these are often overlooked. Thus, default
administration passwords are rarely changed and if they are, default enabled
administration protocols remain on that kind of device.
The presence of insecure protocols used to pass unencrypted passwords is a very
important source of attacks. For instance: FTP, Telnet…
Databases are chosen targets because of the important information they detain.
When default passwords are changed, database webmasters (who manage lots of
servers) often use weak passwords depending on the name of the server. More than the
you can easily crack the password. Then, these accounts can be used to carry on the
network attack.
Nowadays, database hacking is 14% of security
threats.
http://buff.ly/11umuYS
Gamigo’s database was pirated in 2012.
Although production equipment and the printer
represent only 1% of security threats, they often
are too neglected.
Case study: SNMP on a router agency
This happened during one of our audits. A VPN router of one of our client agencies has a
SNMP service activated listening on the Internet. The setup by default allows us to read
and write MIB’s information. The setup scenario consisted in redirecting DNS requests to
Then, we can collect all the forwarded messages.
Case study:
Production stopped
SNMP is not the only one open ad-
ministration protocol. Let’s take the
example of an inverter on a client’s
production lines. This inverter is on
just have to log on to the admin web
server with the default accounts in
order to turn off all the production
services.
25 %
20 %
15 %
10 %
5 %
0 %
21% 20%
13%
12%
10%
4% 3%
1% 1%
laptopsw
orkstations
netw
ork
m
obile
data
tablets,com
putersdatacenters
production
equipm
ents
standardsofguidlines
printers
7
one of our servers and to review the statistics. After this convincing first step, the
6
confidential information they contain, these databases include users lists on which
attackers to find and re-sell.
ADMINISTRATION PROTOCOLS:
the devil is in details
DATABASES
7. 7 WHITE PAPER Top 10 vulnerabilities by ITrust
communication protocols (FTP, NFS, SMB…). Generally, restrictions about these
shares are weak or non-existent. Whether it is an anonymous FTP access allowed or
an access restriction to the company network for the network shares (SMB or NFS),
During our audits, we found that a hardware or software inventory is almost never
done within information systems. During an audit, when we discover not
maintained and highly vulnerable test servers or abandoned servers, administrators
are surprised as they were not even aware of these items on the network. These
servers are easy to exploit and can still detain valid and usable information. Moreover,
they are used as relay to attack more relevant targets.
Case study: management’s printer
By default, the latest printers have some shares activated to receipt scans or fax received.
management’s photocopies, scans and fax.
http://buff.ly/ZWQ2Mv
Some researchers from the Univertsity of Columbia claim
that could impact millions of companies, consumers and
governmental organisms.
Printers can be remotely controlled online by computer
criminals.
Many systems have file sharing. Shares may be managed via various
an attacker has the possibility to obtain a lot of confidential information. When an
attacker chooses to use the scorched earth tactic and to delete all the files (backup,
financial data…), the damage caused is extremely high.
4
5 FILE SHARING
ABANDONED SERVERS
8. 8 WHITE PAPER Top 10 vulnerabilities by ITrust
This category could be a whole article as it is a very wide subject. In our case and
according to our sample, Web vulnerabilities do not represent the majority of
encountered vulnerabilities. However, very often, especially during the auditing of
a website, it is possible to monitor some applications’ vulnerabilities.
If we confront the 10 top web vulnerabilities given by OWASP, this is what we can
We can place the vulnerabilities we’re faced with into 2 categories:
Phase 1: Entry points
• Not updated systems
This vulnerability category is a whole top 10 paragraph:
• SQL injections
• XSS attacks
• Sessions management
Phase 2: Operation
This vulnerabilities category allows on the second hand to operate the information
• Sensitive data exposure
• Lack of restricted privileges
rightly managed, it is possible to access the server and obtain all rights. According
to the hacker’s nuisance potential, the operation can go to a website break down, to
some data loss (potentially sensible like banking data), to the creation of a zombie and,
worst case, scenario to a data deletion.
Case study: working session Hijacked / Video surveillance systems
an online access. Session cookies are not protected and allow repla ys. Thus, all users can
guess the cookies format and access another company’s video surveillance system. The
issue could be limited to a clients’ disclosure issue if passwords were not that weak. But
robbery.
Case study: Unprotected PHP functions
Websites offer the possibility to update some
contents (like images for instance) and use PHP
upload functionalities. If strict controls of these functio-
nalities are not in place, it is possible to
upload a web shell and to obtain information
such as condensed passwords. This allows to access the
conclude given our field experience:
These vulnerabilities allow a first system assessment and give information.
By frequency order, we find:
collected in phase 1. In this category we find:
• Lack of secure configuration
As soon as an operating vulnerability is identified on the website, if privileges are not
3 WEBVULNERABILITY
9. 9 WHITE PAPER Top 10 vulnerabilities by ITrust
96% of our customers’ audits. A trainee would be able to reach it. ThIS is an issue for
users in a company whose awareness is the most high – and it is still one of the attack
vectors the most used and the easiest to do so.
FEEDBACK:
Top 3 of the most weaknesses passwords encountered:
- Account without password
- Same login and password
- Generic password from created accounts
And let us not forget the user name password, name of the user’s kids or a word from
dictionary…
This should be the most occasional problem and is paradoxically the easiest and the
most automated to exploit. Common security vulnerabilities are known and, once
issued, the editors give patches. To be protected against risks, systems just need to be
updated. However, these vulnerabilities are the biggest attacks vector for information
systems.
We remember the hacking of the Sony’s PlayStation network. This hacking was
possible through a known vulnerability with an available update.
3 others vulnerabilities
can be added to the top
10, increasing the total
to 13 vulnerabilities.
This top 13 shows
us all exploitable
vulnerabilities of an
information system.
PASSWORDS COMMON SECURITY RISKS
> Human Vulnerabilities
For instance: An employee gives his
password to a fake system administrator-
via phone or mail.
Case study: Blackberry server
To illustrate this issue, we return to the case
of a Windows server with the administrator’s
password of the database left by default. With
this access we can create a new user within
the system and we can see that the BlackBerry
obtained.
A default or common password gives access to confidential resources, observed in
;
The latest news involved systems not updated for many years.
> Application Flaws
> Unknown Vulnerabilities
1010
In addition
to the
vulnerabilities
2 1
10. 10 WHITE PAPER Top 10 vulnerabilities by ITrust
Conclusion
During an audit, we penetrate an information system more than 9 out of ten
times. We do so starting with the common security breaches (in the top 10), through
a simple internet connection. If we can make it, so can the hackers or
malwares.
Then, what do we do?
We often meet customers who pile up on security tools instead of eliminating the
10 main breaches that would increase their security level exponentially . This is the
reason why it is necessary to set up permanent controls to check these points.
This year, a Verizon report showed that 97% of the data violations could have been
avoided through basic controls. [4].
I am a security expert for 15 years.
I have been the BNP’s trading room security director.
I am an ISS cloud expert in the National Assembly.
I am the CEO of ITrust founded 7 years ago.
incalculable number of tools, viruses, methods, schools which use their own process
or protocols.
It is a young activity, (practised for) only 20 years.
With the new threats arising, especially APTs and the cloud, our clients remain
expectant. Few of them understand why, still after 20 years, we have to keep
them. They realise that many of us lied to them promising the end of their troubles
with new tools.
We are currently at a turning point in our activity. Attacking technologies prevail
over defencing ones. The gap between the hackers and engineers is widening. The
technology, for instance), we wanted to explain to our clients and to our CISOs,
that there is another complementary way to classic medicine - through ITrust. An
alternative, but a complementary one, based on better practices and good hygiene. A
kind of “Chinese medicine” that prevents rather than cures.
Even though all problems could be avoided with very simple controls, each year
For example, did you know that 98% of the companies we checked use default
passwords?
attacks or intrusions and they don’t even know it.
attacks. We have been told for years that we must protect ourselves, but the
security principles are not respected. We remain as vulnerable as before and it is
your infrastructure.
Our activity is complex. You can find a lot of standards and methods. You can find an
improving systems with new methods and new tools. They find with surprise
and incredulity that firewalls and antiviruses are no longer efficient enough to protect
systemsareextraordinarilyvulnerableandtheefficienttechnologiesarerare.
Similarlytomedicine,currentantibioticsarenotthatefficient.
Byfillingthegapbetweentheswordandtheshield(withabehavioralanalysis
more companies are suffering serious incidents related to cyber security.
Youthinkyouarenotfacingsecurityproblems?Ofcourse:8companiesoutof10sufferfrom
Youhavefirewallsandprotectionsystemsbutyouarestillsufferingfrommalicious
analysis remains terrible. Despite all the tools and significant security budgets, basic
easy even for an intern to get confidential information off the networks. Or even for
a Korean student to get your ERP rate base or to launch a significant DDOS attack on
11. 11 WHITE PAPER Top 10 vulnerabilities by ITrust
To convince you,
a story that deserves a conference:
Simple solutions and controlled procedures have mostly avoided major disasters:
• BP oilrig:
Valve security system was disabled due to the generation of a large amount
of false positives.
• Société Générale - Kerviel case:
The trader was also the designer of the trading tool.
• Fukushima:
Engineers were convinced that the cooling pump was open.
• Stuxnet virus:
Using the default password of Siemens devices.
• Hesel disaster:
Due to a lack of controls, too many spectators without tickets, attend the
match.
Most security incidents could have been easily avoided.
Did you know that the largest cyber attack (Stuxnet) could have been avoided by changing
the default password of Siemens devices?
Respecting what is known as common-sense security practices: simple and smart controls.
Security is something simple.
To avoid being sick, you wash your hands, you have good hygiene and eat healthy...
That is similar for the information system security; but thisspeech is hard to take in
given that for the last 20 years we kept on hearing that drugs were the only solution to
solve our problems.
BEST PRACTICES
« .
Maintain a good security policy in real time by avoiding default
best practice for SMEs.»
Hervé Schauer, security consultant expert
Leadingexpertsandstudiesconfirmwhatwesay.
The antivirus is not more effective in responding to new threats.
passwords and overseeing the flaws of security remains the current
Youaregratefulnottobestuffedwithdrugseverymorning.