Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Recent trends in IT Security, as well as actual security incidents and "close calls" at UCI, have highlighted the need to get more proactively aggressive about finding vulnerabilities on our network before the real hackers do.  Because of the enormity of our network and limited set of resources, OIT Security Team will employ periodic scans on all hosts connected to the UCI network looking for the lowest of the low hanging fruit, the most exploited and easiest to fix vulnerabilities hackers attempt to attack us with every day.  In a way we can be seen as "white hat" or "good" hackers, looking for obvious problems and alerting the owners of those systems so that they can be fixed before a "black hat" or "evil" hacker finds the problem and causes real damage to our University.  These scans will emulate some of the same tools and methods hackers use to find vulnerabilities to exploit.  An analogy is that of a fire department performing a "controlled burn" of a forest or field in a controlled and safe environment, reducing the risk and damage of an out-of-control wildfire in the future.

What we periodically look for:

  • Open systems with empty or weak passwords, including Windows, SSH, and various database types.
  • Public web sites and web applications that allow anonymous (no login required) access to pages with SQL Injection or Cross-Site Scripting vulnerabilities.

What you may notice:

  • Your log files (hopefully you are keeping audit logging turned on) may show attempts to login from strange addresses or multiple failures in a row that you don't expect.  Web access logs may show many requests from the same IP including strange URLs.
  • If you allow anonymous updates to your websites (i.e. no login required), junk data or what looks like spam may be inserted into your application's database or email forms.

What you should do:

  • If notified by OIT Security about a potential vulnerability, act quickly to respond and correct the problem or work with them to think of possible mitigating controls until a fix can be produced.
  • Configure audit logging and retention at an appropriate level such that a scan will not completely wipe out prior recent log data, not just for these scans but also for the inevitable time when a real hacker will attempt to attack your system.  Audit logging retention settings will vary depending on system.  
  • Don't panic but treat these scans like you would any other possible attack, we will intentionally not publish the times and sources of these scans.
  • Don't specifically block IPs of scans in a blacklist manner, because the real hackers will use different IPs and methods each attack.  Instead if you can limit access, do it in a comprehensive way only allowing a whitelist of IPs and users that should have legitimate access.

If you have any questions or concerns, please email security@uci.edu

  • No labels