Remote Access


- DRAFT -
Peter Shipley
Last month we talked about remote access and the risks of passive attacks such as password sniffing and other dangers such of data interception. This month I would like to comment about modem access.
With the explosive growth if the Internet (and the explosive amounts of hype along with it) traditional security policies and procedures are being ignored and lost in the hype of Firewalls and other Internet security technologies.

One of the more commonly ignored security problem are modems and network dialups onto the corporate Intranet. With the proliferation of personal ``fax'' modems on employee desks it rates near impossible for a support staff to maintain, audit and police thus access methods.
War dialing was popularized by the 1983 hacker-classic movie "War Games," where a young man innocently stumble on to a direct connection with a military computer while looking for new games and BBSs.

A classic technique used by system crackers is wardialing. In days past, hackers would mass-dial tens of thousands of phone numbers to find open systems from which to make further assaults. This is the ancient technique of sequentially searching through a exchanges of phone numbers seeking modem dialups or other ``useful'' numbers such as phone company diagnostic lines.

In the San Francisco / Bay Area over one percent (1%) of phone lines are answered my a modem. Thus the effort of wardialing is some that a computer cracker can scan a exchange in less then a matter of days

Unfortunately to date there has been little written or documented on the results of ``wardialing''.
The Author, Peter Shipley, will be publishing a report and analysis of the data obtained from over a year of wardailing.

The following is a short list of what was discovered to not have any password protection (all parties have already been notified):

The controlling console for many corporate firewalls were also discovered in Silicon Valley so poorly configured that intruders could easily gain full access of the firewall and the network behind it.

It can easily be observed that the risks of unauthorized modem access is a great as unauthorized Internet access.

Other risks include employees setup and installing software on there desk top system to allow themselves unrestricted access to the corporate IntraNet. Reasons for this can be for the use of telecommuting or just stealing for free Internet access via the office LAN.

As with any other remote access method, the selection of good password for authentication is a crucial (this will be a topic of a upcoming article). Given a list of four hundred and thirty (430) of the most common passwords it is possible to try to login to ten (10) most common accounts names in less then eight (8) hours! Even with a five (5) second delay between bad login attempt and automaticly dropping the modem connection after four (4) failed attempts. This is a very important number since this eight hours can happen at night when everyone is at home asleep, thus allowing the intruders to access a system and over their tracks before anyone returns to work in the morning. Recommendations:


About the author: Peter Shipley (<>) lives in Berkeley, Calif., and has 14 years of experience in network security. He specializes in system security auditing and risk assessment, Unix system security and TCP/IP network design and implementation.