Beautynetkorea

Sunday, August 23, 2009

The Years Biggest Security Breach

 ana05     August 23, 2009     Hacking     No comments   

At last i am back,
here, i just i get this news recent on yahoo,about this years biggest data breach,its totally cool you should check it out.

the hacker used WARDRIVIND  to for primary breach,
and then used  SQL injection 
After reading i was totaly impressed about that hacker,

you must read

"Taylor Buley, Forbes.com



The U.S. Department of Justice's indictment of Albert Gonzalez on Monday seems to have all the elements of a Hollywood crime drama: A hacker gains access to millions of credit and debit card numbers and has the power to take down a nation. Too bad for Tinseltown, the attack itself was about as sexy and a pile of routers.

According to the indictment, Gonzalez, 28, gained a foothold into the systems of credit card processors such as Heartland Payment Systems and retailers like OfficeMax, Barnes & Noble and TJX Cos. using an amateur hacking technique called "wardriving," which uses wireless access points to find vulnerable networks from which to launch attacks. Once connected to those private networks, Gonzalez used a well-known technique called "SQL injection" to trick Web applications into forking over private information that gave him deeper access into networks. Even though it sounds complicated, techies liken this kind of hack to simply turning the front doorknob to get into a house.
In the seven-layer Open System Interconnection model, a popular reference guide for securing a network software stack, the application layer is at the top. SQL injection is a Web-based attack that happens on this surface level. Securing the application layer is entry-level security stuff, which raises the question of why so many credit card handlers were vulnerable in the first place.


They certainly shouldn't have been vulnerable, says Kurt Roemer, chief security strategist of Citrix Systems. Citrix is on the board of advisers for the Payment Card Industry (PCI) security standards council, an industry effort for hardening the security systems of businesses that handle credit cards.



Roemer says businesses need to use either a Web application scanner or Web application firewall to guard against


SQL injections. A Web application scanner likely would have likely caught the SQL injection vulnerabilities Gonzalez exploited. If it didn't, an application firewall probably would have isolated the attacker from gaining access to other parts of the compromised networks.
"PCI specifically calls this out," Roemer says. "The way these guys got hacked there's no way they would have
satisfied" those standards.
The PCI rules also try to mitigate the threats of wardriving. Earlier this year, the PCI standards body called for the
phase-out of any wireless networks using WEP encryption, a digital lock that takes only a couple of minutes to break.
Though the way Gonzalez broke into systems is hardly the work of a criminal mastermind, Roemer says he's impressed by how Gonzalez and his co-conspirators were able to use relatively simple means to gain powerfully damaging access.
"The criminals would rather have something that's pretty easy and gets them the maximum amount of data," he says. "I'm just amazed at how they profiled all these companies and actually had a complete attack methodology."
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • Some Delights Of Yahoo! Open Hack Day – Indonesia 2009Nearly a week ago Yahoo! Open hack day – south Asia took place in Indonesia. Unfortunately i wasn't there but still the hack days are awesome i am a f… Read More
  • How To Create Autorun.inf For Your Pendrive – Autoplay Your ToolsWhen you plug-in your pen drive then its really useful to run an Autorun software it can consist of anything from hacking software to any music player… Read More
  • Httpry : Specialized Packet Sniffer And LoggerHttpry This is a specialized packet sniffer designed for displaying and logging HTTP traffic. Its a C scripts that actually lets you powerfully org… Read More
  • Darren Kitchen On Hackers Vs Cyber Criminals [Video]Darren Kitchen is Hacker and Host of a hackers show Hack5. He is well know hacker and is been in computer for a long time. well hack5 is video podcast… Read More
  • Reversing JavaScript Shellcode: A Step By Step Tutorial By Paul MelsonPaul Melson is a well known computer security specialist, in this tutorial he talks about the reverse JavaScript shell code which is pretty hard to pr… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment



Popular Posts

  • Weekend Wrap-Up
    THIS WEEK: So, this week was exhausting! I spent most of my time wiping running noses, soothing coughs, waking up in the middle of the nigh...
  • Max Factor Radiant Lift Foundation
    Radiant Lift is Max Factor's latest foundation that promises a radiant finish and all day hydration. I was sent two of the darkest shade...
  • How To Download as premium on all premium hosting !
    There have been a very long discussion on how to download on premium websites such as Rapidshare.com , MegaUpload.com , Megarotic.com and S...
  • MISSHA LINE FRIENDS EDITION: NEW PRODUCTS
    Because one release is never enough. Not too long ago, MISSHA released a load of cute products in collaboration with LINE . This is the seco...
  • New in #80 - Hair Care Edition
     JOICO K-Pak Deep Penetrating Reconstructor I used to have this product many years ago when I had highlights and then dyed my hair red and b...
  • FARMASI Matte Liquid Lipsticks
    Od siječnja stižu upiti u inbox na Facebooku o Farmasi tekućim mat ruževima. Svi su se zanimali za njih, nitko se nije mogao dokopati ruževa...
  • The Beauty Products Going VIRAL On TikTok
    via Giphy If a product goes viral on TikTok it usually means one of two things: it’s either super affordable and/ or gives the most amazing...

Copyright © 2025 Beautynetkorea | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates