Women at work

I have a PhD in electrical engineering and have been teaching and doing programming and IT for ... too many years. (specializing in networks and security) I am not going to disclose my age! I am one of very few women of my age who STAYED in the field, since it is super competitive macho field. But here I am! I use my engineering skills for everything I do. In this blog, I will share anything from technical to social comments on technology.

Tuesday, May 30, 2017

To scan or not to scan?



WHERE CAN STUDENTS PRACTICE SECURITY? 

To continue talking about various certifications in the security world…
For example, let’s assume that someone – a student – gets Certified Ethical Hacker certification. To recap, CEH  requires  knowing:
·         ethics and legal issues
·         footprinting
·         scanning
·         enumeration
·         system hacking
·         Trojan programs and backdoors
·         sniffers
·         denial of service
·         social engineering
·         session hijacking
·         hacking web servers
·         web application vulnerabilities
·         web-based password cracking techniques
·         SQL injection
·         hacking wireless networks
·         viruses and worms
·         hacking novell
·         hacking Linux
·         intrusion detection systems, firewalls, honeypots
·         buffer overflows
·         cryptography
Students LOVE the idea of hacking AND they are eager to practice …. but they forget that it has many consequences. School computers cannot be used for hacking purposes. Being caught can expel you from school…. Also, there are state and federal laws. Federal laws exist for hacking into government and financial institutions. Hacking into government sites can carry serious monetary and jail penalties.

Many state laws are designed to address hacking into private individuals’ computers.
There are very fine lines as to what is allowed and what is not allowed, and sometimes it all looks very innocent but is not allowed, or the hacking activity does seem intrusive but the rules for being caught and persecuted are not clear.
For example, let us start from simple hacking tools, such as ping. Ping is always allowed and nobody can say anything about anyone pinging. However, if you start excessively (or even not excessively) pinging a “sensitive” computer, you might get reprimanded. How? The site admin will see your IP address, will do a reverse DNS lookup, and talk to your ISP. 
Then there are other activities such as port scanning. Is port scanning legal? It is a lot more “close and personal” than ping, because it provides a lot more information. You will know which OS the computer is running, what kind of services are running, what kind of software. This knowledge is clearly suitable for attack purposes. There are tools that can port scan for you very quickly, in great quantity. nmap is a classic tool, and is free and easily available. So, should you use nmap to practice port scanning on … your school, your ISP, or any random IP? 
Port scanning seems like a rather innocent thing to do, it is like rattling a door knob to see if anyone is home. There is no theft conducted. Therefore, police should not be able to persecute you. However, at their discretion, police can choose to take action. 
In short, your legal safety when port scanning depends on the location where you are hacking. Some states have laws that consider port scanning an illegal activity. Also, the organization where you are using the computer and your ISP can have rules. The wording can be tricky, for example, doing one port scan is ok but “repeatedly testing for vulnerabilities” is not. This hacker got a rude awakening when FBI charged him for felony for hacking and cyberstalking: https://www.wired.com/2015/02/hacker-claims-feds-hit-44-felonies-refused-fbi-spy/  because he repeatedly scanned a website for vulnerabilities. 

Specifically, University of Hawaii does NOT allow port scanning. https://manoa.hawaii.edu/housing/guide/resnetpolicy Port scanning is treated as a “malicious activity” together with spamming and DOS attacks, and results in expulsion.

In summary: if you are going to practice hacking, find a class with a designated lab, or even some friendly friends that you can play pranks on, and stay away from hacking into “official” resources.
.


0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home