Information Security Student Assessment of Exploits 1 Below is a list of attempts to open a session based on defaults of the system. Sometimes the passwords are easy to guess, and other times they have no passwords (i.e. guest; attempts to hit defaults; dictionary attacks running through a list of common words. This approach might work when passwords are not changed from defaults, making it sometimes easy to break into a system. If you look below, there are some users like FTP, Oracle, Tomcat, ID Linux, Internet, etc which usually indicate server names that connect to other servers. These names are the ID’s that defaulted by many systems (like Oracle’s Database) that connect to a main server, and the password provided could be a default to try to break in. Apr 9 14:32:12 vm-ljsst8 sshd[17365]: Illegal user info from 125.248.144.98 Apr 9 14:32:14 vm-ljsst8 sshd[17367]: Illegal user ftp from 125.248.144.98 Apr 9 14:32:16 vm-ljsst8 sshd[17369]: Illegal user httpd from 125.248.144.98 Apr 9 14:32:18 vm-ljsst8 sshd[17371]: Illegal user dany from 125.248.144.98 Apr 9 14:32:20 vm-ljsst8 sshd[17373]: Illegal user susan from 125.248.144.98 Apr 9 14:32:22 vm-ljsst8 sshd[17375]: Illegal user oracle from 125.248.144.98 Apr 9 14:32:24 vm-ljsst8 sshd[17377]: Illegal user tomcat from 125.248.144.98 Apr 9 14:32:28 vm-ljsst8 sshd[17381]: Illegal user id from 125.248.144.98 Apr 9 14:32:30 vm-ljsst8 sshd[17383]: Illegal user sgi from 125.248.144.98 Apr 9 14:32:32 vm-ljsst8 sshd[17385]: Illegal user postgres from 125.248.144.98 Apr 9 14:32:34 vm-ljsst8 sshd[17387]: Illegal user flowers from 125.248.144.98 Apr 9 14:32:36 vm-ljsst8 sshd[17389]: Illegal user linux from 125.248.144.98 Apr 9 14:32:37 vm-ljsst8 sshd[17391]: Illegal user internet from 125.248.144.98 Apr 9 14:32:39 vm-ljsst8 sshd[17393]: Illegal user server from 125.248.144.98 Apr 9 14:32:41 vm-ljsst8 sshd[17395]: Illegal user nokia from 125.248.144.98 11
Using Interview Results To Construct Personas Step 2: Map interview subjects to behavioral variables User 8 Place each interviewee variable’s range of values. User 7 within each User User 3 Variable 1: Frequency of photo-taking (in photos/month) User 5 0 Variable 2: Frequency of photo- Never viewing Variable 3: User 9 Frequency of photoNever sharing 1 2 3 4 User User 4 10 7 User 2 User Rarely User 8 User 1 Rarely Variable 4: Photo User 8 User 4 CS 321 organization Lesson Six strategy Unorganized Date Only Personas Page 7 User 6 User 9 10 1 User 4 User User 6 Occasionally User 3 User 2 Occasionally User 7 User 2 User 1 Date & Site 5 User 2 6 User 8 User 3 User 1 7 User 9 Frequently User 7 User 5 User 4 8+ Daily User User 10 6 Frequently Daily User User 10 3 User 9 User 6 User 5 Date & Person All 3
Using Interview Results To Construct Personas Step 3: Identify significant behavior patterns Look for sets of subjects who cluster in several Users 1, 4, & 7 variables. User take few User User pictures and are Variable 1: User User User User User 7 10 Frequency of pretty average 9 5 4 1 6 photo-taking in viewing, 0 1 2 3 4 5 6 7 (in sharing, and User photos/mont Users 5&6 organizing. User User User 8 h) share photos 10 User 4 User User User 3 rather heavily Variable 7 2 6 1 and want 2: Rarel Occasionall Frequentl maximum Frequency Never y y Usery organization. of photoUsers 2 & 3 are User User User User 7 viewing User heavy photo 3 5 Variable User User User User 8 10 9 takers, but only 3: 1 2 4 6 average when it Frequency Never Rarel Occasionall Frequentl comes to of photoy y y User viewing, sharing User 7 User Variable 4: sharing, and User User User 2 User 10 Photo CS 321 organizing. 4 1 3 organizatio 8 Lesson Six Personas n strategyUnorganize Date Only Date & Site Date & Page 8 d Person User 8 User 3 2 8 + User 9 Daily Daily User User 9 User 6 5 All 3