Page 242 - DCAP408_WEB_PROGRAMMING
P. 242

Web Programming




                    Notes            Yet another suspicion is that the timing given might just be to divert attention and that the
                                     actual hacking might take place some time before or after the so-called scheduled time
                                     when companies might be less on their guard.
                                     The contest,  referred  to  as ‘Defacers  Challenge’  has  been  put  up on  the Web  site
                                     www.defacers-challenge.com, by “Eleonara (67)” who claims the “help of some groups
                                     from underground”
                                     Everyone who can notify a defacement is entitled to participate, says the challenge. It will
                                     check zone-h.org for statistics, “due to its notorious independency”. (This site tracks daily
                                     hackings server and operation-system-wise).
                                     The contest targets 6,000 sites worldwide, participants have to penetrate as many Web
                                     servers as possible and deface the Web sites within the six hours given to them.
                                     The contest follows a point-system, awarding one point for a Windows server, 5 for an
                                     HP-UX or Macintosh server. The winners have been promised free Web space, hosting
                                     services, a free domain name, and the like.
                                     Captain Raghu Raman, Global Practice Head, Mahindra Consulting Special Services Group
                                     (information security company), says the context seems to be more  of a hoax since  so
                                     many Web sites cannot be hacked in the space of just six hours. “It is extremely impossible
                                     since most commercial Web sites are hosted on single servers and  have mirrored sites
                                     which take over in the case of a single site faces any problem.”

                                     He feels that the interest generated in the contest could attract many “kiddish” amateurs
                                     whose simultaneous activity during those hours could create major bandwidth issues.
                                     But he too advises precautionary actions. “Companies should look to strengthen  their
                                     systems and guard against any vulnerabilities. They should lock down their servers and
                                     public domains, create awareness amongst internal  security teams  and remember that
                                     hackers do not have to wait for the specified date to start. They can commence anytime.”
                                     The  most reliable  indicator of whether an organisation’s Web  site will be defaced or
                                     otherwise compromised is if the organisation’s Web server is not appropriately secured,
                                     or if it exhibits known vulnerabilities, which can be exploited, he says.
                                     According to him, the following technical guidelines may be followed; making sure that
                                     default passwords are changed. This should include Web servers and any other servers
                                     that the Web server has a trusted relationship with; removing sample applications that are
                                     not being used, such as CGI scripts and Active Server Pages, from Web servers; locking
                                     down Microsoft Front Page Extensions (by default, those extensions are  installed in a
                                     manner that gives every user the ability to author Web pages, even through proxy servers).
                                     The other measures recommended are turning the Web server logging on. Logs are essential
                                     to determining how a defacement was accomplished so a recurrence can be prevented. Use
                                     of the extended log format is recommended; and having a current backup of one’s Web
                                     server. In the event of  a defacement, a good backup is essential to quickly restore the
                                     server to its original look.
                                     Lastly, he recommends application of the latest security patches to one’s Web server and
                                     the underlying operating system after appropriate testing.
                                     Over the last six months, he says, nearly 571 Indian sites have been hacked. This is twice
                                     the number of sites hacked in 2002. Most of the hackings have been claimed by Pakistani
                                     hacker groups.







          236                               LOVELY PROFESSIONAL UNIVERSITY
   237   238   239   240   241   242   243   244   245   246   247