NameSilo

Hacking contest threatens websites

Spaceship Spaceship
Watch

RJ

Domain BuyerTop Member
Impact
3,028
Check the tips at the end of the article to make sure your web server is secure. There will be lots of hacking going on this week.

A hacking contest slated for this weekend could produce a rash of Web-site defacements worldwide, according to a warning issued Wednesday by security companies and government Internet security groups.

advertisement


The hacker defacement contest is expected to kick off on Sunday. The contest supposedly will award free hosting services, Web mail, unlimited email forwarding, and a domain name of choice for the triumphant hackers, according to a Web site promoting the contest.


Web-site defacement points will be awarded based on the type of operating system running the Web site. Defacement of Web sites running Windows will only win a single point, while sites running Linux, Unix, and BSD are each worth three points. Sites running AIX, IBM's version of Unix, are worth three points, while sites running HP-UX, Hewlett-Packard's version of Unix, and Macintosh, Apple's operating system, are worth up to five points, according to the contest Web site.


Internet Security Systems, which operates a cyberthreat early-warning network called the Information Technology Information Sharing and Analysis Center, is urging Web-site administrators to review their Web-site security before they head home for the US holiday weekend. ISS's X-Force research group says they've received credible information that hacker groups are scanning Web sites to discover vulnerable systems. But X-Force doesn't expect any major activity until Sunday.


While there's been a recent increase in Web-site scanning activity, there's also been a noticeable decrease in Web-site defacements, said Chris Rouland, director of ISS X-Force. "The hackers are sandbagging," he said. "We've seen this before. Hackers will break in before the event and conduct the actual defacement during the contest."


The exact time the contest will start is not yet known, but the contest rules say it will be limited to six hours. X-Force is trying to determine whether the contest is being run by hacking groups from Brazil or Hong Kong, both known for active Web-defacing activity.


The contest also may be a recruiting effort, Rouland says. "This is one way to learn who are the best defacers out there" and to find out which hackers have figured out new ways to break in and deface sites, he says.


The New York Office of Cyber Security and Critical Infrastructure Coordination also issued an advisory about the contest and is asking Web-site administrators to take steps to improve security. Among the recommendations:


• Make sure that default passwords are changed. This should include Web servers and any other servers that the Web server has a trusted relationship with.


• Remove sample applications that aren't being used, such as CGI scripts and Active Server Pages, from Web servers.


• Lock down Microsoft Front Page Extensions. By default, those extensions are installed in a manner that gives every user the ability to author Web pages, even through proxy servers. This recommendation also applies to Front Page Extensions installed on Unix platforms.


• Turn Web server logging on. Logs are essential to determining how a defacement was accomplished so a recurrence can be prevented. Use of the extended log format is recommended.


• Have a current backup of your Web server. In the event of a defacement, a good backup is essential to quickly restore the server to its original look.


• Apply the latest security patches to your Web server and underlying operating system after appropriate testing.


The New York Office of Cyber Security is also guiding Web-site owners to the following resources:


Guidelines on Securing Public Web Servers


http://msdn.microsoft.com/security/downloads/tools/default.aspx


Center for Internet Security, Security Benchmarks


Free vulnerability scan

Story from
http://www.itnews.com.au/storycontent.cfm?ID=9&Art_ID=12315
 
0
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
0
•••
0
•••
It has funny graphic tho :D
 
0
•••
i got a better one :)

its tux bending over with the devil behind him :o
 
0
•••
Larry: You might be surprised. Defacing is not a kids thing these days. It can often be done by very good hackers who have a message to send out. I have known some very talented ones. Some of the sites they have rooted include: Compaq, HP, AltaVista, Gateway and Intel and a lot more. These are not script kiddies playing with little toys, these are very knowledgeable hackers breaking into the largest names on the internet. A quote from one of them was "I enjoy the rush of defacing." It is this rush that some experienced hackers enjoy. Your misconception of it being all children is wrong. Punishing parents wont do it, in this day and age parents cannot watch their children 24/7. The smart ones will find ways around, public libraries, internet cafes, etc. Besides many of the people are outside of the United States. What then? It is good for security, hacking is inevitable. People have been breaking into things and circumventing things for ages. We exploit things. It is a common military action. What if China and the US went to war? Wouldnt you expect chinese hackers to be breaking down the US's internet commerce? There is wide open borders in the online world. Did that occur to you? Security is something that must be kept high at all times and tested rigorously and constantly. If you never got hacked, when someone really wanted vengeance on your company and your server was not patched against exploits they could easily ruin you. Hackers will do what they do, but it helps everyone else because once hacked you can figure out vulnerabilities.
 
0
•••
oohh scary :(

The p headpage for the competiton is now down, their host took it down so..

hope its fake
 
0
•••
I agree with kohashi .. security is a continous process.. I've been in security field for almost ten years now ... doing all stuff in security.

Security is a broad definition, one is minimizing risk...

Cheers and have a secure environment.
TheWatcher.
 
0
•••
0
•••
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back