Tip

Hack your storage to test your security

What you will solve with this tip: In this tip, information security expert Kevin Beaver outlines various security tests you can perform, along with tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discovered otherwise.

It used to be that storage systems existed on small, trusted networks with minimal access. Now, with the never-ending expansion of storage systems, multiple administrators, management software "feature bloat" and the co-mingling of non-sensitive and sensitive information on the same storage systems, storage systems have taken on complexities of their own and are proving to be more and more vulnerable to security breaches.

Requires Free Membership to View

Related information

You knew it had to happen sooner or later

Data leaks and losses abound

When it comes to testing for vulnerabilities in storage systems (DAS, NAS, and SANs), it's easy to overlook weaknesses that may be obvious to a malicious insider or other attacker. From perimeter security weaknesses to insider advantages, such as knowing just where sensitive storage devices are located, these kinds of hit-or-miss issues will get you every time.

Any storage system that supports typical network protocols and file systems (HTTP, FTP, CIFS, NFS, etc.) will also inherit any vulnerabilities associated with those protocols; likewise for operating system configuration weaknesses, software exploits, password problems, Web applications and more. At a minimum, you should perform the following security tests (a.k.a. ethical hacks) on your storage system to find holes and fix them before someone exploits them. Keep in mind that certain tests will vary (or not apply) depending upon the type of storage system you have and its underlying operating system (OS), as well as the type of network and/or physical access obtained.

  1. Scan the system to discover open ports, listening services, banner pages, missing patches, Web application and/or database concerns and exploitable weaknesses. Tools you can use for this include:

  2. Enumerate the system to find available shares, exports, users, security policies and more. Tools and OS commands you can use for this include:
  3. Attempt to exploit weaknesses discovered in steps 1 and 2 above. Metasploit and its commercial equivalents are great for this. For Web and database vulnerabilities, consider using a href=" http://www.spidynamics.com/products/webinspect/index.html">WebInspect and AppDetective, respectively -- two very powerful commercial tools you can use to dig in deep.
  4. Go for anonymous access to see if a connection can be made (surprisingly this is all too common on network shares). Commands and tools you can use for this include:
    • mount for UNIX/NFS-based systems (i.e., mount –o anon IP:/volume k:)
    • net use for Windows/CIFS-based systems (i.e., net use k: \\ip_address\share_name "/u:""")
  5. Test for ARP spoofing weaknesses to determine if the network switch can be "disabled" and full network visibility can be obtained. Ettercap is a great tool for this.
  6. Sniff network traffic to discover clear-text usernames and passwords that can be used to further penetrate storage devices. For SAN environments, Fibre Channel, switch and management information can be discovered in clear-text traffic. Tools you can use for this include Ethereal and EtherPeek.
  7. Modify the World Wide Name (WWN) using the host bus adapter's device driver configuration software to see if WWN zoning controls for SANs can be bypassed.

Given all the variables, the list of available storage hacks could go on and on indefinitely. These should be on your short list, though. Don't forget about physical security either; if you can justify it, it'll likely behoove you to hire someone to perform physical security penetration and social engineering tests to see how your data center can be compromised. It's important not to overlook these weaknesses because once an attacker has physical access to your storage systems, all bets are off.

Also, during your testing or at least once you're done, check the logs of your network and storage-centric security controls such as firewalls, IDSs and access logs to see if anything was discovered and highlighted as a possible security event. Look for port scans, malformed network traffic, intruder lockouts that were tripped, privilege escalations and other security-related issues. This is a time and a good way to verify your security controls are doing what they're supposed to be doing.


About the author: Kevin Beaver is an independent information security consultant, author and speaker with Atlanta-based Principle Logic, LLC. He has more than 18 years of experience in IT and specializes in performing information security assessments. Kevin has written five books including Hacking For Dummies (Wiley), Hacking Wireless Networks For Dummies, and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He can be reached at kbeaver @ principlelogic.com.


This was first published in March 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.