RE: CRIME Microsoft Windows XP question

From: Rosenquist, Matthew (matthew.rosenquist@private)
Date: Thu Jan 09 2003 - 08:37:56 PST

  • Next message: Elaine Scheller: "CRIME Arabic email?"

    Zot, et al,
    
    I do agree the poster was asking how to better secure a Windows machine.  I
    took the liberty of looking deeper into the issue at the root cause (and
    admittedly, in doing so possibly making some inaccurate assumptions).  In my
    experience, many times what people ask for, is not necessarily what they
    need to solve the root problem.  
    
    So the root of the problem, as I interpreted it, is how does the Poster aid
    his client in securing a system in such particular circumstances.  As the
    thread evolved through locking the case, installing biometrics, removing
    local drives, changing OS's, protecting against keystroke capture devices,
    etc., I found humor in some of the recommendations, given the circumstances
    detailed in the original message.
    
    From a look-down perspective, I find may security engineers tackle problems
    with tools, configurations, or technical solutions, believing that strong
    castle walls will provide the protection they desire.  It is the nature of
    an Engineer to find or build a tool or structure to solve a problem.  It is
    my belief that 'hardening' is only one aspect to a proper and effective
    Defense-in-Depth strategy.  It definitely has its place, however a good
    strategist will look at his enemy and find the balance of tactics which will
    lead to victory.  In this case, a normal amount hardening and a strong dose
    of deterrence is the best combination to provide the expected level of
    security against the specified threat.
    
    I know I am rambling.  So one last personal thought:  Several basic aspects
    exist to defeat any given attack.  I look at it this way:
    1. Interdict the Attacker (remove or deter the person driving the attack)
    2. Render the attacker's Methods ineffective (typically Hardening, patching,
    etc. which denies the attacker a path to success)
    3. Deny the Objective (remove the motivation for conducting the attack)
    
    Cheers,
    
    Matthew Rosenquist
    
    
    -----Original Message-----
    From: Zot O'Connor [mailto:zot@private] 
    Sent: Thursday, January 09, 2003 2:34 AM
    To: CRIME List
    Subject: RE: CRIME Microsoft Windows XP question
    
    
    > From: Rosenquist, Matthew [mailto:matthew.rosenquist@private] 
    
    
    > Following this thread has been quite entertaining.  I have witnessed a
    > group of technologists attempting to derive technical solutions,
    > essentially barriers, to help one father protect his PC from his
    > daughter.  Very creative, complex, and expensive ideas have surfaced,
    > been torpedoed, and subsequently raised again in a different
    > incarnation.  Yet, we miss the obvious.  
    > 
    
    No you forget the questions from the original post:
    
            Here are my questions:
            1. How is it possible to login to Windows XP without knowing the
            password?
            2. What can I do about it?
    
    Nothing here says "How do I stop his daughter from breaking in?"  She
    did an obvious attack, and I am sure that he and her dad had words.  If
    she is arrogant enough the father has since apologized  :)
    
    He asked a technical question, and is getting technical answers.  To
    some extent he is getting the answer "Physical Security is crucial"
    
    However there are assumptions to what level the attack is willing to
    go.  People have poo poo'ed some concepts "because a counter exists."
    
    Physical access for 5-10 minutes is much much different than having a
    weekend with the machine.  5-10 minutes on machine with no
    floppy/cdrom/USB, password protected BIOS with the HD as the only boot
    device will stop most attackers cold.  Yes an attacker can have a screw
    gun ready, and the exact MB memorized, and the flash pins done in 5
    minutes, but this is not Mission Impossible III.
    
    All security is Partial Security, it just raises the Bar.
    
    So most of the suggestions are good one.  The init -> USB key is another
    great layer.  Add all of this together and I am now protected against
    all but the really sophisticated attackers, or the ones with a lot of
    free time with the machine.  Don't bother to tell me how fast you can
    open the PC, add a drive, etc., that requires sophistication.
    
    
    > Tell the
    > daughter, if she does it again, she will not be allowed to obtain a
    > drivers license until she is 18 years of age 
    
    Which begs two questions:  How old is she (if she's 19 this will not
    work), and is she looking for work?  If not, she is getting a degree in
    this?  What were her grades before seeing War Games?
    
    On Fri, 2003-01-03 at 11:08, Andrew Plato wrote: 
    
    > However, its seems to me Dad should be happy his daughter is hacking
    > PCs. She could be rotting her brain out on reality television and
    > Britney Spears. 
    
    Andrew, Andrew, Andrew don't you read the news?
    
    http://www.cnn.com/2002/TECH/internet/12/13/lycos.search/index.html
    
    Tattoos, Britney top Web search list
    ...
    Lycos lists music-trading service Kazaa at No. 2, tattoos at No. 3, pop
    idol Britney Spears was No. 4, the NFL (National Football League) at No.
    6, and Christmas at No. 9. 
    ...
    
    What do you think she was doing on-line anyway?
    
    
    
    -- 
    Zot O'Connor
    
    http://www.ZotConsulting.com
    http://www.WhiteKnightHackers.com
    



    This archive was generated by hypermail 2b30 : Thu Jan 09 2003 - 13:33:09 PST