If we are talking about only hashes, then the service can be
vulnerable to replay attacks.
>
>
> So please be careful where you are giving your passowrd. Another technique
> is to create a virus that keeps track of your keyboard and then sends it to
rootkits also are gaining popularity (which are effectively the same).
I would also like to stress that users should be more careful.
>
> 2. Regarding network based vulnerabilities, they are common to all lan based
> networks. CSC ppl do keep track of lan attacks. (i can't disclose them in
> public). But i know ppl being punished for these kind of things. There are
> very few options (improvements ) that can be done to add to security of the
> Network in IIT-D .
On the contrary, there is scope for many improvements. Changes would
be required in H/W (and new installations) and software used.
>
>
> @Narendra: Chill man . its not completely the fault of CSC ppl.
>
Agreed.
Sharad
Using a different password for various accounts. I have seen people
use the same password for their yahoo/gmail/local computer passwords
the same as their CSC passwords. CSC passwords (for telnet and related
services) are not secure.
> Hey Naresh, I generally do not logoff my gmail id , I think this will also
> add the security because password hacking on LAN is done by the software
> which analyze initial packet sent by user for password, (I think so, )
Yes, this was demonstrated this year at BlackHat.
>
> @Debashish -- even password is sent over over SSL but still there are
> software which capture the packets and decrypt them. Decryption may takes a
> time on normal PCs but not on super computer, Other user can explain this
> better.
>
They usually require capturing some certificate or something to do the
"decryption". Cracking is also a way.
BTW, one supercomputer IS available to all of us :)
I am not an expert in this area so it would be best if a qualified
person addresses this issue (instead of us going ahead and making
claims to people at CSC). A few things that come to my mind (which are
not only about security) are -
1. For the hostel network, disallowing broadcasts
2. Hostel networks in many universities (I know about some foreign
universities only) have strict requirements and conditions for
connecting any PC to the network. E.g.s would include that a machine
is allowed to connect only if it has certain versions of certain OS
with certain SPs and certain firewall etc software. BTW, there are
conditions on Linux too. Students should also be made aware of risks
and good practices. See for example
http://www.housing.uwaterloo.ca/resnet/incoming/index.html .
3. Making it mandatory for users to register their MAC addresses to
connect (start collecting information from the hostel in a distributed
fashion). Any unregistered MAC from anywhere inside IIT should not be
allowed except for specific geographical locations (use a well
segregated network for that then).
4. For the telnet accounts, switching from NIS to LDAP (or some other
secure technology). I was doing a test on this with Ms. Akhila Sinha
when she was in IIT. The project was scrapped when she left.
5. use of encrytion (GPG etc) for webmails? -- Ms. Akhila Sinha was
also trying to take care of this (this is about 2 years back).
6. For public machines (labs/CSC), there is no really secure way.
Installing Linux will not necessarily fix the problem. It requires
pro-active measures from admins.
7. Using IPS/IDS actively for networks.
8. As personal measures, people should also know that viruses/worms
etc propagate through spam and chain-letters as well. (I hate
forwards). https://security.berkeley.edu/tutorial/text.txt (read slide
16) . I am diverging from what you asked me but I will also add that
one should also not post his/her password on websites at the pretense
of getting passwords of your friends/for promoting a certain service
to all your friends on your address book etc.
Can't think of anything else right now.
Sharad
Sharad
Shouldn't we also blame google and yahoo (and other services for
this)? Do I dare say that an advisory should be posted regarding use
of these and other Internet services (how much can we trust
Orkut/Facebook/Onlinesbi to name a few) :)
Sharad
Sharad
As I said earlier, once you give a shell (or worst still, physical
access), it becomes very difficult to keep a machine secure. You need
highly qualified people to manage this. Even the guys at CSC should
understand that the only way they can "truly" implement safe services
for us users is by denying us services and that there is really very
little they can do about users running scripts and doing restricted
activities as long as they provide even some services to us.
>
> Infact as per my view, CSC has tried to apply so security on us by blocking
> port n hostel wise access that It got result in degraded performance of
> whole network.
How does restricting ports and hostel wise access degraded in
performance of whole network?
Sharad
furthermore as many students in specialized labs have their own
computers which they will like to access from their hostel but
CSC/hostel management effectively puts a denial-of-service on them by
blocking even the basic 22 port.
its understandable to block ports like 21 445 135 which are for
netbios and other unsecured protocol but by blocking port 22 you make
secured tunneling impossible, my suggestion is that access to port 22
outbound should be allowed to all machine from hostels to encourage
use of secured tunnels for which attacks based on sniffing/ man in the
middle is more difficult.
On Wed, May 7, 2008 at 1:40 PM, Sharad Birmiwal
<sharadb...@gmail.com> wrote:
>
--
Ankit Raizada
WC-4 Zanskaar Hostel
IIT-Delhi
Hauz Khas
New Delhi - 110016
Email: mcs0...@cse.iitd.ac.in
araiz...@yahoo.com
ankit....@gmail.com
--- On Tue, May 6, 2008 at 10:49 AM, narendra sisodiya
<narendra...@gmail.com> wrote:
| hacked by Gmail
| ...
| password hacking is such a illegal crime
\--
Terminology please.
Hacking is the art of programming. Hackers are programmers who pursue
programming as an artistic passion, who are eager to solve challenging
computer problems.
People who break into systems, crack passwords, cause DoS, DDoS
attacks are called crackers.
SK
--
Shakthi Kannan
http://www.shakthimaan.com
Hi,
--- On Tue, May 6, 2008 at 10:49 AM, narendra sisodiya
<narendra...@gmail.com> wrote:| hacked by Gmail
| ...
| password hacking is such a illegal crime\--
Terminology please.
Hacking is the art of programming. Hackers are programmers who pursue
programming as an artistic passion, who are eager to solve challenging
computer problems.
People who break into systems, crack passwords, cause DoS, DDoS
attacks are called crackers.
SK
--
Shakthi Kannan
http://www.shakthimaan.com
I cannot tell all vulnerability publically, It is not my duty. but passowrd hacking is a proof of such vulnerabilities.
Hi,I cannot tell all vulnerability publically, It is not my duty. but password hacking is a proof of such vulnerabilities.
I don't think that's enough of a proof. There are many simple ways to get into people's account. In most cases it is because of your own carelessness. I know a lot of people who leave there accounts logged in at CSC and leave. And most of these people are girls :) Sorry for sounding sexist but I go by statistics.
Regards,
Ishan
On Tue, May 6, 2008 at 4:31 PM, ajit singh <ajitsi...@gmail.com> wrote:
> Ok.
> So let's just say that somebody is not so desperate that he will go to some
> website for a gmail password. Then too, saving passwords in Mozilla Firefox
> wallet is a bad habit. Anybody can see the passwords in plain text if the
> victim have not enabled Master security password and have saved some
pidgin also does the same.