seebs
God Made Me A Skeptic
- Apr 9, 2002
- 31,917
- 1,530
- 20
- Faith
- Seeker
- Marital Status
- Married
- Politics
- US-Republican
Light in the Darkness said:seebsNope. The average high-school sophomore isn't gifted with such responsibility.
Fair enough. Well, I would ask, then, that you at least give serious consideration to my claim that any break-in causes real damage.
And now, you may enlighten me a little as to what damages are done. I'm always open to new information. (Though I heavily suspect that you're simply going to throw some vicious remark my way and be done with me.)
That wouldn't be very charitable, now would it?
Okay, let's imagine, for a moment, a commercial system. We can reasonably assume that this system has at least some fairly significant confidential data on it; even something as naive as "the logs for the web server" is probably of some importance, let alone something like credit card numbers or whatever.
Now... The instant anyone breaks in, you have to deal with the real possibility that these confidential files have been leaked. You can say "well, we're assuming they haven't"... but while we, the people in the ivory tower speculating about abstract damages, can make that assumption, the people with the database can't. They have to take the risk into account.
No amount of contact from the "white hat" can reassure them; after all, if you were going to break into a computer and steal stuff, announcing that you didn't steal anything would be a great cover, and might lull people into not warning their customers that their credit cards have been stolen. So... You have to take precautions as though the break-in was hostile.
If nothing else, you have to spend a fair bit of time trying to verify the belief that the break-in was non-hostile. If you are somehow able to "prove" this (which is unlikely), you've still spent a fair amount of time trying to figure out exactly what happened. Even if only one system was obviously affected, you have to check everything else. Every desktop in your organization needs a fresh new virus scan, and you probably need to shut down your whole network while you're doing this, so you can be sure there isn't a virus just bopping around. (This last bit doesn't affect Unix folks, but...)
So, you basically get to spend at least a full day scanning everything. Good rootkits will replace common system utilities, and very good ones will also replace the programs which people use to run checksums on system utilities. That means a lot of work to verify the tools you'd use to verify that nothing is broken. And, of course, you still run the risk that something you don't know about was broken; that means you get to run port scans on your whole network.
That's assuming that absolutely nothing got touched. This is the response to a single break-in, with no observable changes other than whatever logs reveal that there was a break-in. At typical sysadmin wages, you're talking a couple thousand dollars for a smallish (say, 30-50 person) organization. If you don't have your own sysadmin, and you have to hire consultants, double everything in sight.
In some cases, your best bet is clean new installs and restoring from the last backups that you're pretty sure are before the breach, and re-applying any patches; all of this has to be done from inside a firewall, and you have to make sure any questionable machines are shut down or incommunicado while it happens.
If you have confidential data, you may well have to spend twenty thousand dollars or more notifying customers of the potential breach. That's to say nothing of the long-term loss of business as word gets out.
This, by the way, all has nothing to do with the question of whether or not such activities are "hacking" or the people who perform them are "hackers". Breaking and entering is script kiddie stuff; it's got nothing to do with what normally gets people recognition as "hackers". You want a reputation as a hacker? Win the IOCCC or something.
(Yes, there's a bit of bitterness here; I've never won the IOCCC.)
Upvote
0