home *** CD-ROM | disk | FTP | other *** search
- ___________________________________________________________
-
- GUIDE TO (mostly) HARMLESS HACKING
-
- Vol. 3 No. 5
-
- The Dread GTMHH on Cracking
- ____________________________________________________________
-
- Nowadays if you ask just about anyone what a hacker is, he or she will tell
- you "a person who breaks into computers."
-
- That is partly on account of news stories which make it seem like the only
- thing a hacker does is commit computer crime. But there also is some truth
- to the public view. An obsession with breaking into computers has swept the
- hacker world. In fact, lots of hackers make fun of the kinds of stuff I
- think is fun: forging email and Usenet posts and programming Easter eggs
- into commercial software and creating Win 95 bootup screens that say "Bill
- Gates' mother wears army boots."
-
- But since everyone and his brother has been emailing me pleading for
- instructions on how to break into computers, here it is. The dread GTMHH on
- Cracking. Yes, you, too, can become a genuine computer cracker and make
- everyone quake in his or her boots or slippers or whatever footgear they are
- wearing lately.
-
- "But, but," you say. "This list is for *legal* hacking. Sez right here in
- the welcome message you sent me when I signed up."
-
- Welcome to reality, Bub. Hackers fib sometimes.
-
- ************************************************
- You can go to jail warning: Almost everywhere on the planet, breaking into a
- computer is illegal. The only exceptions are breaking into your own
- computer, or breaking into a computer whose owner has given you permission
- to try to break in. It doesn't matter if you are just quietly sneaking
- around doing no harm. It doesn't matter if you make some stranger's computer
- better. You're still in trouble if you break in without permission.
- ************************************************
-
- Honestly, this Guide really *is* about harmless hacking. You don't have to
- commit a crime to crack into a computer. From time to time hardy souls offer
- up their computers for their friends, or sometimes even the entire world, as
- targets for cracking. If you have permission from the owner of a computer,
- it is most definitely legal to break into it.
-
- In fact, here's a really fun computer that you have permission to break
- into. Damien Sorder invites you to break into his Internet host computer
- obscure.sekurity.org.
-
- But how do you know whether this or any other announcement of a cracker
- welcome mat is legitimate? How do you know I'm not just playing a mean old
- trick on Damien by sending out an invitation to break into his box to the
- 5,000 crazed readers of the Happy Hacker list?
-
- Here's a good way to check the validity of offers to let anyone try to break
- into a computer. Get the domain name of the target computer, in this case
- obscure.sekurity.org. Then add "root@" to the domain name, for example
- root@obscure.sekurity.org. Email the owner of that computer. Ask him if I
- was fibbing about his offer. If he says I made it up, tell him he's just
- chicken, that if he was a real hacker he'd be happy to have thousands of
- clueless newbies running Satan against his box. Just kidding:)
-
- Actually, in this case you may email info@sekurity.org for more details on
- Damien's offer to let one and all try to crack his box. Also, please be good
- guys and attack off hours (Mountain Daylight Savings Time, US) so he can use
- obscure.sekurity.org for other stuff during the day.
-
- Also, Damien requests "If you (or anyone) want to try to hack obscure,
- please mail root@sekurity.org and mention that you are doing it, and what
- domain you are coming from. That way I can distinguish between legit and
- real attacks."
-
- We all owe you thanks, Damien, for providing a legal target for the readers
- of this GTMHH to test their cracking skills.
-
- So let's assume that you have chosen a legitimate target computer to try to
- break into. What? Some guys say it's too hard to break into a fortified box
- like obscure.sekurity.org? They say it's more fun to break into a computer
- when they're breaking the law? They say to be a Real Hacker you must run
- around trashing the boxes of the cringing masses of Internet hosts? Haw,
- haw, sendmail 4.0! What lusers, they say. They sure taught those sendmail
- 4.0 dudes a lesson, right?
-
- I say that those crackers who go searching for vulnerable computers and
- breaking into them are like Lounge Lizard Larry going into a bar and picking
- up the drunkest, ugliest gal (or guy) in the place. Yeah, we all are sure
- impressed.
-
- If you want to be a truly elite cracker, however, you will limit your forays
- to computers whose owners consent to your explorations. This can --
- should!-- include your own computer.
-
- So with this in mind -- that you want more from life than to be the Lounge
- Lizard Larry of the hacker world -- here are some basics of breaking into
- computers.
-
- There are an amazing number of ways to break into computers.
-
- The simplest is to social engineer your way in. This generally involves
- lying. Here's an example.
-
- *********************************************
- From: Oracle Service Humour List <oracle-list-return-@synapse.net>
- Subject: HUM: AOL Hacker Turnaround (***)
-
- Read Newfpyr's masterful turning of the tables on a hacker...
- Certainly one of the best Absurd IMs we've EVER received! Newfpyr's comments
- are in brackets throughout.
-
- Zabu451: Hello from America Online! I'm sorry to inform you that there has
- been an error in the I/O section of your account database, and this server's
- password information has been temporarily destroyed. We need you, the AOL
- user, to hit reply and type in your password. Thank you for your
- help.
-
- Newfpyr: Hello! This is Server Manager #563. I'm sorry to hear that your
- server has lost the password info. I mean, this has been happening too much
- lately. We have developed some solutions to this problem. Have you got the
- mail sent out to all server managers?
-
- Zabu451: no
-
- NewfPyr: Really? Ouch. There's been some problems with the server mailer
- lately. Oh, well. Here's a solution to this problem: try connecting your
- backup database to your main I/O port, then accessing the system restart.
-
- Zabu451: no i still need passwords
-
- NewfPyr: I see. Do you want me to send you the list of all the passwords of
- all the screen names of your server?
-
- Zabu451: ya i want that
-
- NewfPyr: Let me get the server manager to send it...
-
- NewfPyr: He says I need your server manager password. Could you please type
- it in?
-
- Zabu451: i dont have one
-
- NewfPyr: What do you mean? That's the first thing every manager gets!
-
- Zabu451: it got deleted
-
- NewfPyr: Wow! You must be having a lot of trouble. Let me find out what
- server you're using...
-
- [Note: I checked his profile. It said he was from Springfield, Mass.]
-
- NewfPyr: Okay, your number has been tracked to an area in Springfield, Mass.
-
- Zabu451: how did u know?!!!?!?!!?!?!?!?!??!!
-
- NewfPyr: I used Server Tracker 5.0 . Don't you have it?
-
- Zabu451: do you know my address!?!?!?!!?!?
-
- NewfPyr: Of course not.
-
- Zabu451: good
-
- NewfPyr: I only know the number you're calling AOL from, which is from your
- server, right?
-
- Zabu451: yes
-
- NewfPyr: Good. Okay, now that we have your number, we have your address, and
- we are sending a repair team over there.
-
- Zabu451: nonononono dont stop them now
-
- NewfPyr: Why? Isn't your server down?
-
- Zabu451: nonono its working now
-
- NewfPyr: They're still coming, just in case.
-
- Zabu451: STOP THEM NOW
-
- NewfPyr: I can't break AOL Policy.
-
- Zabu451: POEPLE ARE COMING TO MY HOUSE?!?!?!?!??
-
- NewfPyr: No! To your server. You know, where you're calling AOL from.
-
- Zabu451: im calling from my house
-
- NewfPyr: But you said you where calling from the server!
-
- Zabu451: i lied im not reely a server guy
-
- NewfPyr: But you said you were!
-
- Zabu451: i lied i trying to get passwords please make them stop
- NewfPyr: Okay. The repair team isn't coming anymore.
-
- Zabu451: good
-
- NewfPyr: But a team of FBI agents is.
-
- Zabu451: NONONONO
- Zabu451: im sorry
- Zabu451: ill never do it again please make them not come
- Zabu451: PLEASE IL STOP ASKING FOR PASSWORDS FOREVER PLEASE MAKE THEM STOP!!
-
- NewfPyr: I'm sorry, I can't do that. They should be at your house in 5 minutes.
-
- Zabu451: IM SORRY IL DO ANYTHING PLEASE I DONT WANT THEM TO HURT ME
- Zabu451: PLEASE
- Zabu451: PLEEEEEEEEEEEEEEAAAAAAAAASSSSSSSSE
-
- NewfPyr: They won't hurt you! You'll probably only spend a year of prison.
-
- Zabu451: no IM ONLY A KID
-
- NewfPyr: You are? That makes it different. You won't go to prison for a year.
-
- Zabu451: i thout so
-
- NewfPyr: You'll go for two years.
-
- Zabu451: No! IM SORRY
- Zabu451: PLEASE MAKE THEM STOP
- Zabu451: PLEASE
-
- [I thought this was enough. He was probably wetting his pants.]
-
- NewfPyr: Since this was a first time offense, I think I can drop charges.
-
- Zabu451: yea
- Zabu451: thankyouthankyouthankyou
-
- NewfPyr: The FBI agents have been withdrawn. If you ever do it again, we'll
- bump you off.
-
- Zabu451: i wont im sorry goodbye
-
- [He promptly signed off.]
-
- One of the RARE RARE occasions that we've actually felt sorry for the
- hacker. SEVENTY FIVE TOKENS to you, NewfPyr! We're STILL laughing - thanks a
- lot!
-
- Submitted by: Fran C. M. T. @ aol.com
-
- (Want more of this humor in a jugular vein? Check out
- http://www.netforward.com/poboxes/?ablang)
- *****************************************
-
- Maybe you are too embarrassed to act like a typical AOL social engineering
- hacker. OK, then maybe you are ready to try the Trojan Horse. This is a type
- of attack wherein a program that appears to do something legitimate has been
- altered to attack a computer.
-
- For example, on a Unix shell account you might put a Trojan in your home
- directory named "ls." Then you tell tech support that there is something
- funny going on in your home directory. If the tech support guy is
- sufficiently clueless, he may go into you account while he has root
- permission. He then gives the command "ls" to see what's there. According to
- Damien Sorder, "This will only work depending
- on his 'PATH' statement for his shell. If he searches '.' before '/bin',
- then it will work. Else, it won't."
-
- Presuming the sysadmin has been this careless, and if your Trojan is well
- written, it will call the real ls program to display your file info -- while
- also spawning a root shell for your very own use!
-
- ***************************************************
- Newbie note: if you can get into a root shell you can do anything --
- ANYTHING -- to your victim computer. Alas, this means it is surprisingly
- easy to screw up a Unix system while operating as root. A good systems
- administrator will give him or herself root privileges only when absolutely
- necessary to perform a task. Trojans are only one of the many reasons for
- this caution. Before you invite your friends to hack your box, be prepared
- for anything, and I mean ANYTHING, to get messed up even by the most
- well-meaning of friends.
- ***************************************************
-
- Another attack is to install a sniffer program on an Internet host and grab
- passwords. What this means is any time you want to log into a computer from
- another computer by using telnet, your password is at the mercy of any
- sniffer program that may be installed on any computer through which your
- password travels.
-
- However, to set up a sniffer you must be root on the Unix box on which it is
- installed. So this attack is clearly not for the beginner.
-
- To get an idea of how many computers "see" your password when you telnet
- into your remote account, give the command (on a Unix system) of "traceroute
- my.computer" (it's "tracert" in Windows 95) where you substitute the name of
- the computer you were planning to log in on for the "my.computer."
-
- Sometimes you may discover that when you telnet from one computer to another
- even within the city you live in, you may go through a dozen or more
- computers! For example, when I trace a route from an Albuquerque AOL session
- to my favorite Linux box in Albuquerque, I get:
-
- C:\WINDOWS>tracert fubar.com
-
- Tracing route to fubar.com [208.128.xx.61]
- over a maximum of 30 hops:
-
- 1 322 ms 328 ms 329 ms ipt-q1.proxy.aol.com [152.163.205.95]
- 2 467 ms 329 ms 329 ms tot-ta-r5.proxy.aol.com [152.163.205.126]
- 3 467 ms 323 ms 328 ms f4-1.t60-4.Reston.t3.ans.net [207.25.134.69]
- 4 467 ms 329 ms 493 ms h10-1.t56-1.Washington-DC.t3.ans.net [140.223.57
- .25]
- 5 469 ms 382 ms 329 ms 140.222.56.70
- 6 426 ms 548 ms 437 ms core3.Memphis.mci.net [204.70.125.1]
- 7 399 ms 448 ms 461 ms core2-hssi-2.Houston.mci.net [204.70.1.169]
- 8 400 ms 466 ms 512 ms border7-fddi-0.Houston.mci.net [204.70.191.51]
- 9 495 ms 493 ms 492 ms american-comm-svc.Houston.mci.net [204.70.194.86
- ]
- 10 522 ms 989 ms 490 ms webdownlink.foobar.net [208.128.37.98]
- 11 468 ms 493 ms 491 ms 208.128.xx.33
- 12 551 ms 491 ms 492 ms fubar.com [208.128.xx.61]
-
- If someone were to put a sniffer on any computer on that route, they could
- get my password! Now do you want to go telneting around from one of your
- accounts to another?
-
- A solution to this problem is to use Secure Shell. This is a program you can
- download for free from http://escert.upc.es/others/ssh/. According to the
- promotional literature, "Ssh (Secure Shell) is a program to log into another
- computer over a network, to execute commands in a remote machine, and to
- move files from one machine to another. It provides strong authentication
- and secure communications over insecure channels."
-
- If you want to get a password on a computer that you know is being accessed
- remotely by people using Windows 3.X, and if it is using Trumpet Winsock,
- and if you can get physical access to that Windows box, there is a super
- easy way to uncover the password. You can find the details, which are so
- easy they will blow your socks off, in the Bugtraq archives. Look for an
- entry titled "Password problem in Trumpet Winsock." These archives are at
- http://www.netspace.org/lsv-archive/bugtraq.html
-
- Another way to break into a computer is to get the entire password file. Of
- course the password file will be encrypted. But if your target computer
- doesn't run a program to prevent people from picking easy passwords, it is
- easy to decrypt many passwords.
-
- But how do you get password files? A good systems administrator will hide
- them well so even users on the machine that holds them can't easily obtain
- the file.
-
- The simplest way to get a password file is to steal a backup tape from your
- victim. This is one reason that most computer breakins are committed by
- insiders.
-
- But often it is easy to get the entire password file of a LAN remotely from
- across the Internet. Why should this be so? Think about what happens when
- you log in. Even before the computer knows who you are, you must be able to
- command it to compare your user name and password with its password file.
-
- What the computer does is perform its encryption operation on the password
- you enter and then compare it with the encrypted entries in the password
- file. So the entire world must have access somehow to this encrypted
- password file. You job as the would-be cracker is to figure out the name of
- this file and then get your target computer to deliver this file to you.
-
- A tutorial on how to do this, which was published in the ezine K.R.A.C.K
- (produced by od^pheak <butler@tir.com>), follows. Comments in brackets have
- been added to the K.R.A.C.K. text.
-
- *********************************************
- Strategy For Getting Root With a shadowed Passwd
-
- step#1
-
-
- anonymous ftp into the server get passwd
-
- [This step will almost never work, but even the simplest attack may be worth
- a try.]
-
- step #2
-
- To defeat password shadowing on many (but not all) systems, write a program
- that uses successive calls to getpwent() to obtain the password file.
-
- Example:
-
- #include <pwd.h>
- main()
- {
- struct passwd *p;
- while(p=3Dgetpwent())
- printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name,
- p->pw_passwd,
- p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir,
- p->pw_shell);
- }
-
- Or u can Look for the Unshadowed Backup.....
-
- [The following list of likely places to find the unshadowed backup is
- available from the "Hack FAQ" written by Voyager. It may be obtained from
- http://
- www-personal.engin.umich.edu/~jgotts/hack-faq]
-
- Unix Path needed Token
- ----------------------------------------------------------------------
- AIX 3 /etc/security/passwd !
- or /tcb/auth/files/<first letter #
- of username>/<username>
- A/UX 3.0s /tcb/files/auth/?/ *
- BSD4.3-Reno /etc/master.passwd *
- ConvexOS 10 /etc/shadpw *
- ConvexOS 11 /etc/shadow *
- DG/UX /etc/tcb/aa/user/ *
- EP/IX /etc/shadow x
- HP-UX /.secure/etc/passwd *
- IRIX 5 /etc/shadow x
- Linux 1.1 /etc/shadow *
- OSF/1 /etc/passwd[.dir|.pag] *
- SCO Unix #.2.x /tcb/auth/files/<first letter *
- of username>/<username>
- SunOS4.1+c2 /etc/security/passwd.adjunct =
- ##username
- SunOS 5.0 /etc/shadow
- <optional NIS+ private secure
- maps/tables/whatever>
- System V Release 4.0 /etc/shadow x
- System V Release 4.2 /etc/security/* database
- Ultrix 4 /etc/auth[.dir|.pag] *
- UNICOS /etc/udb =20
-
-
-
- Step #3
-
- crack it
-
- [See below for instructions on how to crack a password file.]
-
- **************************************************
-
- So let's say you have managed to get an encrypted password file. How do you
- extract the passwords?
-
- An example of one of the many programs that can crack poorly chosen
- passwords is Unix Password Cracker by Scooter Corp. It is available at
- ftp://ftp.info.bishkek.su/UNIX/crack-2a/crack-2a.tgz
- or http://iukr.bishkek.su/crack/index.html
-
- A good tutorial on some of the issues of cracking Windows NT passwords may
- be found at
- http://ntbugtraq.rc.on.ca/samfaq.htm
-
- One password cracker for Windows NT is L0phtcrack v1.5. It is available for
- FREE from http://www.L0pht.com (that's a ZERO after the 'L', not an 'o'). It
- comes with source so you can build it on just about any platform. Authors
- are mudge@l0pht.com and weld@l0pht.com.
-
- Another Windows NT password cracker is Alec Muffett's
- Crack 5.0 at http://www.sun.rhbnc.ac.uk/~phac107/c50a-nt-0.10.tgz
-
- Even if you crack some passwords, you will still need to correlate passwords
- with user names. One way to do this is to get a list of users by fingering
- your target computer. See the GTMHH Vol.1 No.1 for some ways to finger as
- many users as possible on a system. The verify command in sendmail is
- another way to get user names. A good systems administrator will turn off
- both the finger daemon and the sendmail verify command to make it harder for
- outsiders to break into their computers.
-
- If finger and the verify commands are disabled, there is yet another way to
- get user names. Oftentimes the part of a person's email that comes before
- the "@" will also be a user name.
-
- If password cracking doesn't work, there are many -- way too many -- other
- ways to break into a computer. Following are some suggestions on how to
- learn these techniques.
-
- 1. Learn as much as you can about the computer you have targeted. Find out
- what operating system it runs; whether it is on a local area network; and
- what programs it is running. Of special importance are the ports that are
- open and the daemons running on them.
-
- For example, if you can get physical access to the computer, you can always
- get control of it one way or another. See the GTMHHs on Windows for many
- examples. What this means, of course, is that if you have something on your
- computer you absolutely, positively don't want anyone to read, you had
- better encrypt it with RSA. Not PGP, RSA. Then you should hope no one
- discovers a fast way to factor numbers (the mathematical Achilles Heel of
- RSA and PGP).
-
- If you can't get physical access, your next best bet is if you are on the
- same LAN. In fact, the vast majority of computer breakins are done by people
- who are employees of the company that is running that LAN on which the
- victim computer is attached. The most common mistake of computer security
- professionals is to set up a firewall against the outside world while
- leaving their LAN wide open to insider attack.
-
- Important note: if you have even one Windows 95 box on your LAN, you can't
- even begin to pretend you have a secure network. That is in large part
- because it will run in DOS mode, which allows any user to read, write and
- delete files.
-
- If the computer you have targeted is on the Internet, your next step would
- be to determine how it is connected to the Internet. The most important
- issue here is what TCP/IP ports are open and what daemons run on these ports.
-
- ***************************************************
- Newbie note: TCP/IP ports are actually protocols used to direct data into
- programs called "daemons" that run all the time an Internet host computer is
- turned on and connected to the Net, waiting for incoming or outgoing data to
- spur it into action.
-
- An example of a TCP/IP port is number 25, called SMTP (simple mail transport
- protocol). An example of a daemon that can do interesting things when it
- gets data under SMTP is sendmail. See the GTMHH on forging email for
- examples of fun ways to play *legally* with port 25 on other people's computers.
-
- For a complete list of commonly used TCP/IP ports, see RFC 1700. One place
- you can look this up is http://ds2.internic.net/rfc/rfc1700.txt
- ****************************************************
-
- 2. Understand the operating system of the computer you plan to crack. Sure,
- lots of people who are ignorant on operating systems break into computers by
- using canned programs against pitifully vulnerable boxes. As one teen hacker
- told me after returning from Def Con V, "Many of the guys there didn't even
- know the 'cat' command!"
-
- Anyone can break into some computer somewhere if they have no pride or
- ethics. We assume you are better than that. If the breakin is so easy you
- can do it without having a clue what the command "cat" is, you aren't a
- hacker. You're just a computer vandal.
-
- 3. Study the ways other people have broken into a computer with that
- operating system and software. The best archives of breakin techniques for
- Unix are Bugtraq http://www.netspace.org/lsv-archive/bugtraq.html. For
- Windows NT, check out http://ntbugtraq.rc.on.ca/index.html.
-
- A cheap and easy partial shortcut to this arduous learning process is to run
- a program that scans the ports of your target computer, finds out what
- daemons are running on each port, and then tells you whether there are
- breakin techniques known to exist for those daemons. Satan is a good one,
- and absolutely free. You can download it from
- ftp://ftp.fc.net/pub/defcon/SATAN/ or a bazillion other hacker ftp sites.
-
- Another great port scanner is Internet Security Scanner. It is offered by
- Internet Security Systems of Norcross, Georgia USA, 1-800-776-2362. This
- tool costs lots of money, but is the security scanner of choice of the
- people who want to keep hackers out. You can reach ISS at http://www.iss.net/.
-
- Internet Security Systems also offers some freebie programs. The "Localhost"
- Internet Scanner SAFEsuite is set to only run a security scan on the Unix
- computer on which it is installed (hack your on box!) You can get it from
- http://www.blanket.com/iss.html. You can get a free beta copy of their
- scanner for Win NT at http://www.iss.net/about/whatsnew.html#RS_NT.
-
- In theory ISS programs are set so you can only use them at most to probe
- computer networks that you own. However, a few months ago I got a credible
- report that a giant company that uses ISS to test its boxes on the Internet
- backbone accidentally shut down an ISP in El Paso with an ISS automated syn
- flood attack.
-
- If you want to get a port scanner from a quiet little place, try out
- http://204.188.52.99. This offers the Asmodeus Network Security Scanner for
- Windows NT 4.0.
-
- In most places it is legal to scan the ports of other people's computers.
- Nevertheless, if you run Satan or any other port scanning tool against
- computers that you don't have permission to break into, you may get kicked
- off of your ISP.
-
- For example, recently an Irish hacker was running "security audits" of the
- Emerald Island's ISPs. He was probably doing this in all sincerity. He
- emailed each of his targets a list of the vulnerabilities he found. But when
- this freelance security auditor probed the ISP owned by one of my friends,
- he got that hacker kicked off his ISP.
-
- "But why give him a hard time for just doing security scans? He may have
- woken up an administrator or two," I asked my friend.
-
- "For the same reason they scramble an F-16 for a bogie," he replied.
-
- The way I get around the problem of getting people mad from port scanning is
- to do it by hand using a telnet program. Many of the GTMHHs show examples of
- port scanning by hand. This has the advantage that most systems
- administrators assume you are merely curious.
-
- However, some have a daemon set up so that every time you scan even one port
- of their boxes, it automatically sends an email to the systems administrator
- of the ISP you use complaining that you tried to break in -- and another
- email to you telling you to turn yourself in!
-
- The solution to this is to use IP spoofing. But since I'm sure you are only
- going to try to break into computers where you have permission to do so, you
- don't need to know how to spoof your IP address.
-
- ******************************************************
- You may laugh yourself silly warning: If you port scan by hand against
- obscure.sekurity.org, you may run into some hilarious daemons installed on
- weird high port numbers.
- ******************************************************
-
- 4. Now that you know what vulnerable programs are running on your target
- computer, next you need to decide what program you use to break in.
-
- But aren't hackers brilliant geniuses that discover new ways to break into
- computers? Yes, some are. But the average hacker relies on programs other
- hackers have written to do their deeds. That's why, in the book Takedown,
- some hacker (maybe Kevin Mitnick, maybe not) broke into Tsutomu Shimomura's
- computer to steal a program to turn a Nokia cell phone into a scanner that
- could eavesdrop on other people's cell phone calls.
-
- This is where those zillions of hacker web pages come into play. Do a web
- search for "hacker" and "haxor" and "h4ck3r" etc. You can spend months
- downloading all those programs with promising names like "IP spoofer."
-
- Unfortunately, you may be in for an ugly surprise or two. This may come as a
- total shock to you, but some of the people who write programs that are used
- to break into computers are not exactly Eagle Scouts.
-
- For example, the other day a fellow who shall remain nameless wrote to me "I
- discovered a person has been looting my www dir, where I upload stuff for
- friends so I am gonna leave a nice little surprise for him in a very cool
- looking program ;) (if you know what I mean)"
-
- But let's say you download a program that promises to exploit that security
- hole you just found with a Satan scan. Let's say you aren't going to destroy
- all your files from some nice little surprise. Your next task may be to get
- this exploit program to compile and run.
-
- Most computer breakin programs run on Unix. And there are many different
- flavors of Unix. For each flavor of Unix you can mix or match several
- different shells. (If none of this makes sense to you, see the GTMHHs on how
- to get a good shell account.) The problem is that a program written to run
- in, for example, the csh shell on Solaris Unix may not run from the bash
- shell on Slackware Linux or the tcsh shell on Irix, etc.
-
- It is also possible that the guy who wrote that breakin program may have a
- conscience. He or she may have figured that most people would want to use it
- maliciously. So they made a few little teeny weeny changes to the program,
- for example commenting out some lines. So Mr./Ms. Tender Conscience can
- feel that only people who know how to program will be able to use that
- exploit software. And as we all know, computer programmers would never, ever
- do something mean and horrible to someone else's computer.
-
- So this brings us to the next thing you should know in order to break into
- computers.
-
- 5. Learn how to program! Even if you use other peoples' exploit programs,
- you may need to tweak a thing or two to get them to run. The two most common
- languages for exploit programs are probably C (or C++) and Perl.
-
- ********************************************
- Newbie note: If you can't get that program you just downloaded to run, it
- may be that it is designed to run on the Unix operating system, but you are
- running Windows. A good tip off that this may be your problem is a file name
- that ends with ".gz".
- ********************************************
-
- So, does all this mean that breaking into computers is really, really hard?
- Does all this mean that if you break into someone's computer you have proven
- your digital manhood (or womanhood)?
-
- No. Some computers are ridiculously easy to break into. But if you break
- into a poorly defended computer run by dunces, all you have proven is that
- you lack good taste and like to get into really stupid kinds of trouble.
- However, if you manage to break into a computer that is well managed, and
- that you have permission to test, you are on your way to a high paying
- career in computer security.
-
- Remember this! If you get busted for breaking into a computer, you are in
- trouble big time. Even if you say you did no harm. Even if you say you made
- the computer better while you were prowling around in it. And your chances
- of becoming a computer security professional drop almost to zero. And -- do
- you have any idea of how expensive lawyers are?
-
- I haven't even hinted in this tutorial at how to keep from getting caught.
- It is at least as hard to cover your tracks as it is to break into a
- computer. So if you had to read this to learn how to break into computers,
- you are going to wind up in a world of hurt if you use this to trespass in
- other people's computers.
-
- So, which way do you plan to go? To be known as a good guy, making tons of
- money, and having all the hacker fun you can imagine?
-
- Or are you going to slink around in the dark, compulsively breaking into
- strangers'' computers, poor, afraid, angry? Busted? Staring at astronomical
- legal bills?
-
- If you like the rich and happy alternative, check out back issues of the
- Happy Hacker Digests to see what computers are open to the public to try to
- crack into. We'll also make new announcements as we discover them.
-
- And don't forget to try to crack obscure.sekurity.org. No one has managed to
- break it when attacking from the outside. I don't have a clue of how to get
- inside it, either. You may have to discover a new exploit to breach its
- defenses.
-
- But if you do, you will have experienced a thrill that is far greater than
- breaking into some Lower Slobovian businessman's 386 box running Linux 2.0
- with sendmail 4.whatever. Show some chivalry and please don't beat up on the
- helpless, OK? And stay out of jail or we will all make fun of you when you
- get caught.
-
- Of course this Guide barely scrapes the surface of breaking into computers.
- We haven't even touched on topics such as how to look for back doors that
- other crackers may have hidden on your target computer, or keystroke
- grabbers, or attacks through malicious code you may encounter while browsing
- the Web. (Turn off Java on your browser! Never, ever use Internet Explorer.)
- But maybe some of you ubergenius types reading this could help us out. Hope
- to hear from you!
- ____________________________________________________________
- Warning! Use this information at your own risk. Get busted for trying this
- out on some Lower Slobovian businessman's computer and we will all make fun
- of you, I promise! That goes double for Upper Slobovian boxes!!
- Want to see back issues of Guide to (mostly) Harmless Hacking? See
- http://goodweb.scol.net/hacker/index.html(the official Happy Hacker archive
- site).
- Subscribe to our discussion list by emailing to hacker@techbroker.com with
- message "subscribe"
- Want to share some kewl stuph with the Happy Hacker list? Correct mistakes?
- Send your messages to list@techbroker.com. To send me confidential email
- (please, no discussions of illegal activities) use cmeinel@techbroker.com
- and be sure to state in your message that you want me to keep this
- confidential. If you wish your message posted anonymously, please say so!
- Direct flames to dev/null@techbroker.com. Happy hacking!
- _____________________________________________________
- Copyright 1997 Carolyn P. Meinel. You may forward or post this GUIDE TO
- (mostly) HARMLESS HACKING on your Web site as long as you leave this notice
- at the end.
- ________________________________________________________
- Carolyn Meinel
- M/B Research -- The Technology Brokers
- http://techbroker.com
-