- File Level: CIFS (SMB) and NFS file Systems over a network connection
- Błock Level: The actually drive (not the file system) over a network
- Simplistic example: A file system versus an entire hard drive
- Authentication - CHAP (weak)
- Authorization - Initiator Node Names (spoof-able)
- Encryption - IPSec shared secret (deployment challenges)
• Why should we care?
- A compromise of a single iSCSI device equates to the compromise of several (10 to 100) operating systems at once!
• Who cares about admin, root, or system accounts when the entire data storę can be compromised?
iSEC
PAR.TNER.S