copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AU-2003.008 -- AusCERT Update - Media Reports on the "DEFACEMENT CHALLENGE"

Date: 03 July 2003

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----

AusCERT Update AU-2003.008 - Media Reports on the "DEFACEMENT CHALLENGE"
03 July 2003

AusCERT has observed an increase in the number of media reports regarding
the "defacement challenge". This is a loosely arranged competition where
contestant attackers attempt to deface as many web sites in the shortest
possible time. The competition is scheduled to occur on July 6, 2003.

AusCERT assesses that there is only a negligible increase in the threat
arising from this challenge.  This does not mean the threat from web site
defacement itself is negligible; this threat is pre-existing and is
assessed to be medium to high under most circumstances.  One of the most
common malicious scanning activities undertaken by attackers includes
conducting scans of broad IP address ranges to identify vulnerabilities
in web servers which can enable an attacker to deface or gain privileged
access to web server data and possibly other network systems.

Web site defacements around the globe, including within Australia and New
Zealand, are a common occurrence for these reasons.  The most reliable
indicator of whether an organisation's web site will be defaced or
otherwise compromised is if the organisation's web server is not
appropriately secured or if it exhibits known vulnerabilities which can
be exploited.

It has been reported that the rules of the competition state that credit
will be given on the basis of each website defacement, not single IP
address.  Therefore, organisations that host multiple sites from a single
IP, such as web hosting organisations, will be considered more attractive
targets.

AusCERT reminds network security and systems administrators of best
practices for minimising the chances of defacement:

        o Ensure system and server software is kept up to date to avoid
          previously identified vulnerabilities.

        o Disable unnecessary network services and ports.

Also, AusCERT anticipates that most servers will be compromised prior to
the date but defaced during the competition. Therefore, it may be prudent
for administrators to check their systems for signs of compromise by:

        o Searching for any new or suspicious user accounts and/or system
          processes.

        o Examining network traffic for anomalies.

        o Utilise vulnerability scanners and/or security checking software.


REFERENCES:


Media Reports:

http://www.zone-h.org/en/news/read/id=2986/
http://www.informationweek.com/story/showArticle.jhtml?articleID=10818007
http://www.eweek.com/article2/0,3959,1175877,00.asp
http://customwire.ap.org/dynamic/stories/H/HACKER_WARNINGS?SITE=DCTMS&SECTION=HOME&TEMPLATE=DEFAULT


AusCERT Checklists:

Steps for Recovering from a UNIX or NT System Compromise:
http://www.auscert.org.au/1974

UNIX Security Checklist v2.0:
http://www.auscert.org.au/1935

Steps for Recovering from a UNIX or NT System Compromise:
http://www.auscert.org.au/1974


System Hardening Resources (Windows):

Microsoft TechNet Security Website
http://www.microsoft.com/technet/security
(Primarily the Tools and Checklists on the left sidebar, but lots more info)

NSA Security Recommendation Guides for Windows XP/2000/NT and Cisco Routers
http://www.nsa.gov/snac/index.html

Windows Server 2003 Security Guide
http://microsoft.com/downloads/details.aspx?FamilyId=8A2643C1-0685-4D89-B655-521EA6C7B4DB&displaylang=en

Threats and Countermeasures: Security Settings in Windows Server 2003 and XP
http://microsoft.com/downloads/details.aspx?FamilyID=1b6acf93-147a-4481-9346-f93a4081eea8&DisplayLang=en

Microsoft Windows 2000 Security Hardening Guide
http://www.microsoft.com/technet/security/prodtech/windows/win2khg.asp

Improving Web Application Security: Threats and Countermeasures
http://www.microsoft.com/downloads/details.aspx?FamilyID=e9c4bfaa-af88-4aa5-88d4-0dea898c31b9&DisplayLang=en

LabMice.net - Windows 2000/XP Security Checklists
http://www.labmice.net/articles/


System Hardening Resources (UNIX and Linux):

http://etherlabs.net/m.werneburg/pro/sysadmin/security/hardening.php
http://dir.securepoint.com/Hardening/Linux/
http://www.linuxsecurity.com/


IDS and security checking software:

http://www.networkintrusion.co.uk/
http://www.snort.org/
http://www.chkrootkit.org/

Regards,

The AusCERT Team

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBPwTKyih9+71yA2DNAQHSsgQAkBJ9zBrnGGEGjdp+19SeNU8px757IQaD
346X5RQgJLcFC0UxYol4j1pFbLfBI6v8+M/4zePEHasZW7VWChmRGJhNyZwJDfMG
0uaUOshdD3Jzj8zuuxwjJvtDIcvHrzdn3zFKqBF4U3nQTWtEa7lZiC8z73rq8dZG
CB1XoUa9Kto=
=UnQ7
-----END PGP SIGNATURE-----