Hacking on the wild, wild web
It’s in the news, you can’t escape it. Hacks. Outages. Exposures. Compromises. Sony, Citibank, Sega, Amazon, the WTO, even the CIA. If the big guys can’t keep their stuff up and secure, is there any hope for the not-as-big guys?
The answer is fortunately yes. I will go into that more at a later date, but to start with I want to talk a little about the nature of the beast, particularly as it relates to WebSight Design and our clients.
For web sites, hackers basically have one or more of the following goals:
1) Site defacement – they want to replace your homepage with a message saying ‘hacked by the hustla’
2) Denial of service – they want to take your site offline so nobody can view it
3) Malicious content insertion – they want to insert links that send your visitors to security scam sites
4) Data theft – they want credit card info, or other info not intended to be available
5) Hijacking of resources – they want somewhere to store and share their pirated media
In order to accomplish their goals, they generally use one or more of four primary avenues of attack:
1) SQL injection – this is one of the most common ways to hack a site. Hackers take advantage of forms on a website that are coded in such a way that they can be used to perform database operations that are not supposed to be allowed, such as inserting malicious links into the database.
2) Application exploits – All websites run on web servers, and typically use either Apache or MS IIS as their web server software. For sites with more dynamic content, they also use an additional application software layer such as PHP, ASP or ColdFusion. All of the above applications have had security bugs in the past that could allow hackers to gain unauthorized access to a site, and while they are constantly being updated to close holes, new holes are always being discovered, and at any given time there may be holes that only a few hackers even know about, also know as ‘zero day’ exploits.
3) Password hacking – Another way hackers can get unauthorized access to a site is by getting ahold of a working username and password, such as FTP login information or a CMS admin login. They can get the login info in a variety of ways, including ‘brute force’ automated guessing, grabbing the info in transit when someone is using an insecure wireless connection, or even via a virus or trojan ‘keylogger’ surreptitiously installed on the computer of the person who uses the login legitimately.
4) Flooding – If a hacker wants to take a site down but doesn’t have any holes in it available to exploit, they can also take the site down, i.e. denial of service, by flooding the site or its network with so many bad requests that the good ones can’t make it through. And as an added bonus to the hackers, sometimes in the heat of a denial of service attack, actions are taken to try and track down and stop the flooding that may actually open up new avenues of attack.
By understanding the hackers goals and means, we can put up the best defense possible against them, as well as take measures to minimize the impact and/or downtime when a hack does occur. Some examples of this are keeping our servers and applications up to date with the latest security updates, coding all of our forms with ‘validation’ to prevent SQL injection, following best practices with regards to things like not storing credit card numbers in databases, and being fastidious about backups.
More to come…
Categorized in: Security
Comments are closed.
WebSight Design is a Bay Area web design and development firm started in 1995. We build and manage websites for large corporations, as well as small and mid-size businesses looking to expand their reach. We specialize in search engine optimization, social media management, hosting, mobile development, and more.
Contact us today to see how WSD can take your business to the next level with our wide range of design, development, and internet marketing services.