home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.hackers
- Path: sparky!uunet!ulowell!news.bbn.com!usc!rpi!batcomputer!theory.TC.Cornell.EDU!mdw
- From: mdw@theory.TC.Cornell.EDU (Matt Welsh)
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Message-ID: <1992Nov13.034403.4191@tc.cornell.edu>
- Sender: news@tc.cornell.edu
- Nntp-Posting-Host: theory.tc.cornell.edu
- Organization: Cornell Theory Center
- References: <wa-hackersU2NA550pp@clarinet.com> <6pq1n6h@rpi.edu>
- Date: Fri, 13 Nov 1992 03:44:03 GMT
- Approved: god@nowhere
- Lines: 49
-
- The following was found in comp.security.misc. My question is this: how'd
- they decrypt the passwords (as the following claims)? Perhaps the encryption
- was less secure than our trusty DNS...
-
- >If anybody out there has any technical information about this, please
- >comment. The UPI story uses the terms "root" which suggests that a
- >unix operating system may have been involved.
- >
- >Does anybody know what operating systems were involved, and in general
- >terms, what methods were used to break in?
- >
- >UPI writes:
- >>
- >> SEATTLE (UPI) -- U.S. attorneys late Tuesday arrested and charged two
- >>young men with ``hacking'' their way into computer systems operated by
- >>Boeing, the U.S. District Court and the Environmental Protection Agency
- >>offices in Seattle.
- >> Arrested were Charles M. Anderson, 19, a University of Washington
- >>student, and Costa George Katsaniotis, 21, of Seattle. Both were charged
- >>with fraud against the government, which carries a maximum penalty of a
- >>$10,000 fine and and five years in prison. The two were ordered to
- >>appear before a U.S. magistrate on Monday.
- >> FBI Special Agent said espionage was not behind the unauthorized
- >>systems entries. Rather, he said, the two were motivated by the
- >>challenge or thrill factor involved, known among hackers as ``network
- >>navigating.''
- >> A complaint filed in federal court charges that Anderrson and
- >>Katsaniotis gained access to the District Court computer by using a home
- >>computer to scan for telephone modem numbers. Modems are used to send
- >>data from one computer to another over telephone lines.
- >> ``Once the system was accessed, Anderson copied the file containing
- >>the passwords controlling access to the computer system,'' an affidavit
- >>filed with the charges stated. ``He then transferred the password file
- >>to a Boeing Company computer, where he decrypted the passwords.''
- >> That process gave Anderson the ``root'' password, which allowed him
- >>to have unrestricted access to the computer system at the courthouse,
- >>the affidavit said. Once inside, it said, ``the hackers were able to
- >>view numerous confidential records, including some grand jury material.''
- >> Following the arrests, Boeing issued a statement saying it ``fully
- >>supports'' the FBI's investigation. Boeing alerted the FBI after the
- >>company determined someone had gained unauthorized access, then aided
- >>the investigation.
- >> ``Intrusion was limited due to effective security systems being in
- >>place, and no government-classified systems were entered,'' Boeing said.
- >> Boeing also said that, based on its preliminary investigation, no
- >>company systems or data were damaged by the unauthorized access.
-
- mdw
-
-