home *** CD-ROM | disk | FTP | other *** search
- A Guide to Internet Security:
- Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers.
-
- Author: Christopher Klaus
-
- Date: December 5th, 1993.
-
- Version 1.1
-
- This is a paper will be broken into two parts, one showing 15 easy steps to
- becoming a uebercracker and the next part showing how to become a
- ueberadmin and how to stop a uebercracker. A uebercracker is a term phrased
- by Dan Farmer to refer to some elite (cr/h)acker that is practically
- impossible to keep out of the networks.
-
- Here's the steps to becoming a uebercracker.
-
- I. Relax and remain calm. Remember YOU are a Uebercracker.
- II. If you know a little Unix, you are way ahead of the crowd and skip
- past step 3.
- III. You may want to buy Unix manual or book to let you know what ls,cd,cat
- does.
- IV. Read Usenet for the following groups: alt.irc, alt.security,
- comp.security.unix. Subscribe to Phrack@well.sf.ca.us to get a
- background in uebercracker culture.
- V. Ask on alt.irc how to get and compile the latest IRC client and
- connect to IRC.
- VI. Once on IRC, join the #hack channel. (Whew, you are half-way there!)
- VII. Now, sit on #hack and send messages to everyone in the channel saying
- "Hi, Whats up?". Be obnoxious to anyone else that joins and asks
- questions like "Why cant I join #warez?"
- VIII.(Important Step) Send private messages to everyone asking for new bugs
- or holes. Here's a good pointer, look around your system for binary
- programs suid root (look in Unix manual from step 3 if confused).
- After finding a suid root binary, (ie. su, chfn, syslog), tell people
- you have a new bug in that program and you wrote a script for it. If
- they ask how it works, tell them they are "layme". Remember, YOU are a
- UeberCracker. Ask them to trade for their get-root scripts.
- IX. Make them send you some scripts before you send some garbage file (ie.
- a big core file). Tell them it is encrypted or it was messed up and
- you need to upload your script again.
- X. Spend a week grabbing all the scripts you can. (Dont forget to be
- obnoxious on #hack otherwise people will look down on you and not give
- you anything.)
- XI. Hopefully you will now have atleast one or two scripts that get you
- root on most Unixes. Grab root on your local machines, read your
- admin's mail, or even other user's mail, even rm log files and
- whatever temps you. (look in Unix manual from step 3 if confused).
- XII. A good test for true uebercrackerness is to be able to fake mail. Ask
- other uebercrackers how to fake mail (because they have had to pass
- the same test). Email your admin how "layme" he is and how you got
- root and how you erased his files, and have it appear coming from
- satan@evil.com.
- XIII.Now, to pass into supreme eliteness of uebercrackerness, you brag
- about your exploits on #hack to everyone. (Make up stuff, Remember,
- YOU are a uebercracker.)
- XIV. Wait a few months and have all your notes, etc ready in your room for
- when the FBI, Secret Service, and other law enforcement agencies
- confinscate your equipment. Call eff.org to complain how you were
- innocent and how you accidently gotten someone else's account and only
- looked because you were curious. (Whatever else that may help, throw
- at them.)
- XV. Now for the true final supreme eliteness of all uebercrackers, you go
- back to #hack and brag about how you were busted. YOU are finally a
- true Uebercracker.
-
- ---------------------------------------------------------------------------
-
- Now the next part of the paper is top secret. Please only pass to trusted
- administrators and friends and even some trusted mailing lists, Usenet
- groups, etc. (Make sure no one who is NOT in the inner circle of security
- gets this.)
-
- This is broken down on How to Become an UeberAdmin (otherwise know as a
- security expert) and How to stop Uebercrackers.
-
- I. Read Unix manual ( a good idea for admins ).
- II. Very Important. chmod 700 rdist; chmod 644 /etc/utmp. Install sendmail
- 8.6.4. You have probably stopped 60 percent of all Uebercrackers now.
- Rdist scripts is among the favorites for getting root by
- uebercrackers.
- III. Okay, maybe you want to actually secure your machine from the elite
- Uebercrackers who can break into any site on Internet.
- IV. Set up your firewall to block rpc/nfs/ip-forwarding/src routing
- packets. (This only applies to advanced admins who have control of the
- router, but this will stop 90% of all uebercrackers from attempting
- your site.)
- V. Apply all CERT and vendor patches to all of your machines. You have
- just now killed 95% of all uebercrackers.
- VI. Run a good password cracker to find open accounts and close them. Run
- tripwire after making sure your binaries are untouched. Run
- tcp_wrapper to find if a uebercracker is knocking on your machines.
- Run ISS to make sure that all your machines are reasonably secure as
- far as remote configuration (ie. your NFS exports and anon FTP site.)
- VII. If you have done all of the following, you will have stopped 99% of
- all uebercrackers. Congrads! (Remember, You are the admin.)
- VIII.Now there is one percent of uebercrackers that have gained knowledge
- from reading some security expert's mail (probably gained access to
- his mail via NFS exports or the guest account. You know how it is,
- like the mechanic that always has a broken car, or the plumber that
- has the broken sink, the security expert usually has an open machine.)
- IX. Here is the hard part is to try to convince these security experts
- that they are not so above the average citizen and that by now giving
- out their unknown (except for the uebercrackers) security bugs, it
- would be a service to Internet. They do not have to post it on Usenet,
- but share among many other trusted people and hopefully fixes will
- come about and new pressure will be applied to vendors to come out
- with patches.
- X. If you have gained the confidence of enough security experts, you will
- know be a looked upto as an elite security administrator that is able
- to stop most uebercrackers. The final true test for being a ueberadmin
- is to compile a IRC client, go onto #hack and log all the bragging and
- help catch the uebercrackers. If a uebercracker does get into your
- system, and he has used a new method you have never seen, you can
- probably tell your other security admins and get half of the replies
- like - "That bug been known for years, there just isn't any patches
- for it yet. Here's my fix." and the other half of the replies will be
- like - "Wow. That is very impressive. You have just moved up a big
- notch in my security circle." VERY IMPORTANT HERE: If you see anyone
- in Usenet's security newsgroups mention anything about that security
- hole, Flame him for discussing it since it could bring down Internet
- and all Uebercrackers will now have it and the million other reasons
- to keep everything secret about security.
-
- ---------------------------------------------------------------------------
-
- Well, this paper has shown the finer details of security on Internet. It
- has shown both sides of the coin. Three points I would like to make that
- would probably clean up most of the security problems on Internet are as
- the following:
-
- I. Vendors need to make security a little higher than zero in priority.
- If most vendors shipped their Unixes already secure with most known
- bugs that have been floating around since the Internet Worm (6 years
- ago) fixed and patched, then most uebercrackers would be stuck as new
- machines get added to Internet. (I believe Uebercracker is german for
- "lame copy-cat that can get root with 3 year old bugs.") An
- interesting note is that if you probably check the mail alias for
- "security@vendor.com", you will find it points to /dev/null. Maybe
- with enough mail, it will overfill /dev/null. (Look in manual if
- confused.)
- II. Security experts giving up the attitude that they are above the normal
- Internet user and try to give out information that could lead to
- pressure by other admins to vendors to come out with fixes and
- patches. Most security experts probably don't realize how far their
- information has already spread.
- III. And probably one of the more important points is just following the
- steps I have outlined for Stopping a Uebercracker.
-
- ---------------------------------------------------------------------------
-
- Resources for Security
-
- Many security advisories are available from anonymous ftp cert.org. Ask
- archie to find tcp_wrapper, security programs. For more information about
- ISS (Internet Security Scanner), email cklaus@shadow.net.
-
- Acknowledgements
-
- Thanks to the crew on IRC, Dan Farmer, Wietse Venema, Alec Muffet, Scott
- Miles, Scott Yelich, and Henri De Valois.
-
- Copyright
-
- This paper is Copyright 1993, 1994. Please distribute to only trusted
- people. If you modify, alter, disassemble, reassemble, re-engineer or have
- any suggestions or comments, please send them to: cklaus@shadow.net
-