home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.hackers
- Path: sparky!uunet!ferkel.ucsb.edu!taco!rock!stanford.edu!agate!linus!linus.mitre.org!crawford
- From: crawford@boole.mitre.org (Randy Crawford)
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Message-ID: <1992Nov13.192040.10906@linus.mitre.org>
- Originator: crawford@boole.mitre.org
- Sender: crawford@boole (Randy Crawford)
- Nntp-Posting-Host: boole.mitre.org
- Organization: The MITRE Corporation, McLean, VA
- References: <wa-hackersU2NA550pp@clarinet.com> <6pq1n6h@rpi.edu> <1992Nov13.034403.4191@tc.cornell.edu>
- Date: Fri, 13 Nov 1992 19:20:40 GMT
- Approved: ?
- Lines: 46
-
-
- In article <1992Nov13.034403.4191@tc.cornell.edu>, mdw@theory.TC.Cornell.EDU (Matt Welsh) writes:
- > The following was found in comp.security.misc. My question is this: how'd
- > they decrypt the passwords (as the following claims)? Perhaps the encryption
- > was less secure than our trusty DNS...
- >
- > >If anybody out there has any technical information about this, please
- > >comment. The UPI story uses the terms "root" which suggests that a
- > >unix operating system may have been involved.
-
- That's my bet. It also refers to a publicly readable "password file" which
- also sounds like Unix.
-
- >
- > >Does anybody know what operating systems were involved, and in general
- > >terms, what methods were used to break in?
- > >
- > >UPI writes:
- [...]
- > >> ``Once the system was accessed, Anderson copied the file containing
- > >>the passwords controlling access to the computer system,'' an affidavit
- > >>filed with the charges stated. ``He then transferred the password file
- > >>to a Boeing Company computer, where he decrypted the passwords.''
- > >> That process gave Anderson the ``root'' password, which allowed him
- > >>to have unrestricted access to the computer system at the courthouse,
- > >>the affidavit said.
- [...]
-
- These two were 19 and 20 years old, right? It's highly unlikely that they'd
- broken the standard Unix non-DES crypt(3), since no closed form decrypt has
- been openly reported. It's MUCH more likely that the sysadmin on that system
- was incompetent enough to choose a root password which is found in an on-line
- wordlist (like /usr/lib/spell or /usr/dict). It's pretty trivial to generate-
- and-test for such passwords.
-
- Without a doubt, the U.S. District Court and the EPA are partly to blame for
- the violation.
-
- --
- Randy
- crawford@mitre.org
- --
-
- | Randy Crawford crawford@mitre.org The MITRE Corporation
- | 7525 Colshire Dr., MS Z421
- | N=1 -> P=NP 703 883-7940 McLean, VA 22102
-