Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 9. Switches, Routers, and Firewalls > 9.8 Case Study: Ann’s Coffee Ring

9.8 Case Study: Ann’s Coffee Ring


The Case: Ann is on the move again, looking to poach secret recipes. She’s discovered that she can walk into the main lobby of the International Chaos Cookie Company (ICCC), and that if she walks through as though she has somewhere to be and knows where she’s going, she can breeze past the receptionist who is busy with other concerns.

After wandering around purposefully for a while, Ann chooses an out-of-the-way and unused conference room, sits down, jacks in to an Ethernet panel, and begins looking for the database server she discovered during some previous reconnaissance . . .

Meanwhile . . . Ann has forgotten that she configured her laptop to maintain a persistent connection to an IRC channel where she chats with other data thieves. When she jacks into the ICCC’s internal network her laptop (192.168.30.105) tries to make the outbound IRC connection (destination port 6667/TCP), which is prohibited by policy. Local security staff are alerted. Presuming a compromised system on the network, they try to locate it and track the port to the conference room. Realizing that there shouldn’t even be a computer in that room, security staff rush over, but when they get there it is empty. A seat is still warm, though, and there is a coffee mug ring on the table, still wet.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint