Cisco Cisco NSS030 Smart Storage External Power Adapter Libro bianco
Security Considerations White Paper for Cisco Smart Storage
7
White Paper
Figure 5 An Example of Hydra at Work (Hacking Password for FTP)
A typical network hack includes a user running a network scanning tool such as
nmap to determine the open TCP/UDP ports. After the open TCP or UDP ports are
identified, the hacker then runs the THC Hydra tool, using a list of known
passwords or dictionary attacks method to determine the password. A more
sophisticated hacker can utilize a tool such as “winfo” that can quickly scan the list
of user accounts on the system (
) based on guest access. After
determining the open ports and a list of user accounts, the hacker then customizes
the attacks based on this information (i.e. brute force attacks or dictionary attacks
to determine the passwords). It is almost impossible to prevent all of the possible
attacks and make the system usable. However, by employing some of the security
considerations outlined in
, these
vulnerabilities are minimized.
Security Best Practices and Considerations
Security Best Practices
The following is a list of best practices that help to safeguard the NAS from
hackers. Some of these are deployment model specific. Please see
for more information.