Jump to content

Checking Security On ....


Chris B.

Recommended Posts

I am just trying to test the security of my home computers. i was wondering if anyone would know how i could "hack" into one of my computers on my LAN. Just so i could see the files. Im pretty sure i have it pretty secure. but there is always a back door to everything!!

Also...

I would be using windows to do the attack.

thanks for the help,

Chris B. :blink:

Link to comment
Share on other sites

  • 3 weeks later...
  • 2 weeks later...

Yep, just give us your ip address, then I could brute force your router, and make my way into your home computers.

Link to comment
Share on other sites

Boot Ubuntu (or similar) live disk, now you have access to all the files.

Physical access = all bets are off.

if this guy is smart, he would have set up a bios password, set his boot setting to boot off hdd first, which means even if you put in a cd, the hdd will boot first and it will require a password, then again if its a desktop, you can remove the cmos battery to reset bios, so this guy could then have encrypted his hdd which means you are still at a loss, so i'd say even with physical access all bets still are not off

Yep, just give us your ip address, then I could brute force your router, and make my way into your home computers.

you realise hacking a home pc is actually kind of hard especially considering most users have no ports open to the net, only locally,also who says his router is set to allow remote management, also router access != lan access

so yeah you are wrong there

edit: also OP, why are you concerned about your lan?

check what ports/if any are open to the internet itself, check your wireless security settings and make sure you have a good <20 if you can remember it alpha-numeric password set on wpa2 and if your router supports it make a radius server which is even more secure(i noticed no one really talks about them much..)

Edited by Burning Aces
Link to comment
Share on other sites

if this guy is smart, he would have set up a bios password, set his boot setting to boot off hdd first, which means even if you put in a cd, the hdd will boot first and it will require a password, then again if its a desktop, you can remove the cmos battery to reset bios, so this guy could then have encrypted his hdd which means you are still at a loss, so i'd say even with physical access all bets still are not off

you realise hacking a home pc is actually kind of hard especially considering most users have no ports open to the net, only locally,also who says his router is set to allow remote management, also router access != lan access

so yeah you are wrong there

edit: also OP, why are you concerned about your lan?

check what ports/if any are open to the internet itself, check your wireless security settings and make sure you have a good <20 if you can remember it alpha-numeric password set on wpa2 and if your router supports it make a radius server which is even more secure(i noticed no one really talks about them much..)

You think so, I could scan your system for vulnerabilities. And if I find any I could exploit them and that way I could gain access to your system. I mean there are always ways to access a system, no matter how secure your system is, there will always be a flaw.

So what do you say.

Edited by Infiltrator
Link to comment
Share on other sites

You think so, I could scan your system for vulnerabilities. And if I find any I could exploit them and that way I could gain access to your system. I mean there are always ways to access a system, no matter how secure your system is, there will always be a flaw.

So what do you say.

want me to pm you my IP then? i welcome you to gain access to my system

Link to comment
Share on other sites

want me to pm you my IP then? i welcome you to gain access to my system

Don't challenge me dude. What do I get if I win?

Link to comment
Share on other sites

Yeah dude. What you're describing is vague. But here's my recommendations:

1. Run Microsoft's Baseline Security Analyzer on all windows PCs. This will display any missing patches and show weak passwords.

2. Run a port scanner to look for open ports. Close un-necessary ports. Shutoff un-necessary services.

3. Make sure AV is installed and updated.

4. Check for a software firewall on PCs. Windows comes with one.

5. Review router/firewall for open ports.

6. Take away local admin rights from accounts that don't need it. I personally recommend creating a regular user and escalating priveleges using the admin account when needed.

7. If you're paranoid, take out any wireless devices. If not, at the very least, secure it using WPA2 and a strong passphrase.

8. BIOS passwords.

9. Consider physical security. Computer locks, locked doors, mantraps, etc.

10. Whole disk encryption. Truecrypt is free. Use it.

11. Extra credit - Intrusion Detection/Prevention Systems for hosts and network.

Link to comment
Share on other sites

Guest Deleted_Account
access to my system quite clearly

haha Burning Aces is quite right i must add considering that not only would the user have to be stupid and have open ports to the world but also a static ip address. Consider if you got access to his computer tomorrow hell have a different ip address and youll be at square on its not like it used to be where as soon as you had the modem number you had access :P Also to prove you wrong (again) if you say physical access means all bets are off then beat this rig:

OS: Ubuntu 10.04 and 9.10

HDD: FULLY ENCRYPTED

Passwords: >20 alpha-numeric passwords with spaces and punctuation

Firewall: Bastille and GUFW (for emergencies) and Alpha Shield and a comp running pfense on my LAN/WLAN and my routers fire wall too :) (all ports are stealthed btw)

Security: Bastille Hardening Tool (Yes Root logins are disabled DoS attacks wont work either) PSAD to stop packet forging and ClamAV, chrootkit, etc. also note that all uneeded services are stopped too like FTP and SSH and TELNET :) etc.

BIOS: HDD lock and Bios passwords

Lock: laptop lock :)

IP: Dynamic IP address oh almost forgot to mention my isp blocks most port scans on their clients IP's too by the way :)

ROUTER: WPA2 with 63 char. alpha numeric password with spaces and such again :)

Private files: Truecrypt Volume using Serpent-TwoFISH-AES in XTS mode each being 256-bit and needing a >20 char. password and 6 key files stored in separated locations :)

Now lets see you access a file by hacking into my computer the file is called IWIN.txt which is stored in that TC volume... oh and good luck :)

EDIT: if you could get that file i would give you $400 mainly because it would not be possible for you to do so :) especially the last part that would give 99.9% of the world problems :)

Edited by x942
Link to comment
Share on other sites

Yeah dude. What you're describing is vague. But here's my recommendations:

1. Run Microsoft's Baseline Security Analyzer on all windows PCs. This will display any missing patches and show weak passwords.

2. Run a port scanner to look for open ports. Close un-necessary ports. Shutoff un-necessary services.

3. Make sure AV is installed and updated.

4. Check for a software firewall on PCs. Windows comes with one.

5. Review router/firewall for open ports.

6. Take away local admin rights from accounts that don't need it. I personally recommend creating a regular user and escalating priveleges using the admin account when needed.

7. If you're paranoid, take out any wireless devices. If not, at the very least, secure it using WPA2 and a strong passphrase.

8. BIOS passwords.

9. Consider physical security. Computer locks, locked doors, mantraps, etc.

10. Whole disk encryption. Truecrypt is free. Use it.

11. Extra credit - Intrusion Detection/Prevention Systems for hosts and network.

Just a few suggestions:

5. Review router/firewall for open ports.

As well as check for firmware updates

4. Check for a software firewall on PCs. Windows comes with one.

Comodo Free Personal Firewall, Cnet recommends and its a lot more secure than the windows built in.

7. If you're paranoid, take out any wireless devices. If not, at the very least, secure it using WPA2 and a strong passphrase.

Or if you are extremely paranoid, use a radius authentication server.

That's all I can think off.

Link to comment
Share on other sites

Just a few suggestions:

5. Review router/firewall for open ports.

As well as check for firmware updates

4. Check for a software firewall on PCs. Windows comes with one.

Comodo Free Personal Firewall, Cnet recommends and its a lot more secure than the windows built in.

7. If you're paranoid, take out any wireless devices. If not, at the very least, secure it using WPA2 and a strong passphrase.

Or if you are extremely paranoid, use a radius authentication server.

That's all I can think off.

now everyone talks about radius auth servers :|

Link to comment
Share on other sites

now everyone talks about radius auth servers :|

Radius authentication server, that's what corporates around the world uses for securing their wireless network. I am pretty sure there are other ways for securing it, but implementing a radius server seems to be the most effective method for securing a wireless network.

Edited by Infiltrator
Link to comment
Share on other sites

Guest Deleted_Account
Radius authentication server, that's what corporates around the world uses for securing their wireless network. I am pretty sure there are other ways for securing it, but implementing a radius server seems to be the most effective method for securing a wireless network.

I used to use a radius server in my office however using WPA2 + 63 char password is strong enough for us we also tunnel every thing through a VPN at our home office in vancouver so even if someone could get in everything is encrypted too

Link to comment
Share on other sites

I used to use a radius server in my office however using WPA2 + 63 char password is strong enough for us we also tunnel every thing through a VPN at our home office in vancouver so even if someone could get in everything is encrypted too

That's the idea always implementing security measures in place and above all use of strong encryption.

Link to comment
Share on other sites

Guest Deleted_Account
That's the idea always implementing security measures in place and above all use of strong encryption.

Exactly, also a good idea to isolate WLAN from LAN so in the event wireless gets compromised their will be no access to our core systems only laptops and a couple of servers (which of course are protected but still :P)

Link to comment
Share on other sites

Radius authentication server, that's what corporates around the world uses for securing their wireless network. I am pretty sure there are other ways for securing it, but implementing a radius server seems to be the most effective method for securing a wireless network.

it is the most effective way really

Exactly, also a good idea to isolate WLAN from LAN so in the event wireless gets compromised their will be no access to our core systems only laptops and a couple of servers (which of course are protected but still :P)

eg having 2 subnets and having all your main desktops on 1 and yeah what you just said :D

Link to comment
Share on other sites

Guest Deleted_Account
it is the most effective way really

eg having 2 subnets and having all your main desktops on 1 and yeah what you just said :D

haha :P exactly :P thats how i do it radius isnt practical for our small office we only have 30 or so computers + 2 servers and several laptops so this isolation + VPN + WPA2 is great just wish we could use AES mode but a few devices dont like it too much :P

Link to comment
Share on other sites

Exactly, also a good idea to isolate WLAN from LAN so in the event wireless gets compromised their will be no access to our core systems only laptops and a couple of servers (which of course are protected but still :P)

"Isolate" by that you mean, using a Vlan switch. And then segmenting your network into small vlan groups and applying the necessary policies.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...