home *** CD-ROM | disk | FTP | other *** search
Text File | 2002-05-27 | 58.3 KB | 1,224 lines |
- Default newsletter Issue #5
- http://default.net-security.org
- 14.09.1999 Help Net Security
- http://www.net-security.org
-
-
-
- TABLE OF CONTENTS
- -----------------
-
- I. Editorial
- II. Mirrors
- III. Defaced pages
- IV. Hit2000 report
- V. Interview with v00d00
- VI. Want secure and encrypted e-mails?
- VII. Security audit with our Mac Part-2/2
- VIII. More from the ACPO front
- IX. Infection and vaccination
- X. Watch out for documents you publish on The Internet
- XI. Freedom of speech - related incidents
- XII. Y2K survey for 72 countries
- XIII. Journalism
-
-
-
- I. Editorial
- ---------------------
-
- Ok Issue 5 of Default newsletter is in front of you. We have some interesting
- articles in it: deepquest wrote interesting article on how could you get in
- big troubles if you publish MS Word or Excel files on The Internet, Lisa Pellegrin
- from International Y2K Cooperation Center did an survey on Y2K preparedness in 72
- countries, Berislav Kucan talked to Leo Sheiner from Global Market Ltd, the company
- which was lately in the news because of their "Self destructing" e-mails service,
- Xander Teunissen talked to well known hacker v00d00 etc.
- We have more and more people subscribing to the newsletter, so we conclude that
- we are getting better all the time. With only 4 issues behind, Default has now
- 8 mirrors. And for the end just to note that Default is open newsletter, so if
- you have a topic you want to write about do mail us.
-
- For the HNS and HNS Default Crew:
-
- Berislav Kucan
- aka BHZ, webmaster Help Net Security
- bhz@net-security.org
-
- Xander Teunissen
- aka Thejian, co-webmaster Help Net Security
- thejian@net-security.org
-
-
- Subscribing information:
- mail majordono@net-security.org with a message in the body "subscribe news youremail"
-
- II. Default mirrors
- ---------------------
-
- http://www.nwo.net/default
- http://www.403-security.org/default
- http://www.monitor.hr/security/default
- http://www.attrition.org/~modify/texts/zines/default
- http://www.projectgamma.com/archives/zines/default
- http://www.dark-e.com/default
- http://ech0.zort.org/default
- http://www.deepquest.pf/default
-
- If you mirror Default, please inform us, so we could add you to the list.
-
-
- III. Defaced pages
- -------------------
-
- Site: NASA JPL Quality Assurance Engineering (qa-web.jpl.nasa.gov)
- Mirror: http://default.net-security.org/5/qa-web.jpl.nasa.gov.htm
-
- Site: US Embassy in China (Chinese Server) (www.usembassy-china.org.cn)
- Mirror: http://default.net-security.org/5/www.usembassy-china.org.cn.htm
-
- Site: MTV Asia (mtvasia.com)
- Mirror: http://default.net-security.org/5/www.mtvasia.com.htm
-
- Site: Government of Brazil (www.brasil.gov.br)
- Mirror: http://default.net-security.org/5/www.brasil.gov.br
-
- Site: Ministry of Civil Service, Republic of China (www.mocs.gov.tw)
- Mirror: http://default.net-security.org/5/www.mndm.gov.on.ca.htm
-
- Site: Scottish Executive's Web site (www.scotland.gov.uk)
- Mirror: http://default.net-security.org/5/www.mocs.gov.tw.htm
-
- Site: The Open University (www.open.ac.uk)
- Mirror: http://default.net-security.org/5/www.open.ac.uk.htm
-
- Site: The Drudge Report (www.drudgereport.com)
- Mirror: http://default.net-security.org/5/www.drudgereport.com.htm
-
-
-
-
- IV. Hit2000 report
- --------------------
-
-
- "And yes it is true that hackers and people like that living all day behind
- a computer do dress weird and yes they are pale (is it summer again?),
- but that is no fact it's like in real life, they come in all shapes and sizes."
-
-
- Hacking into 2000: You want stereotypes to go with that sir?
-
- Last weekend (3, 4 and 5 September 1999) it was that time again, convention
- time! In Haarlem, The Netherlands, a large group of security enthusiasts
- gathered for the HIT2000 security convention. We've had some nice cons over here in the past
- and hopes (or at least mine) were up high for this one. Unfortunately there were some
- problems, nothing big, but still noticeable enough. Did that take points of HIT2000's
- success? Read on.
-
- On day one, Friday the 3rd of September 1999, all the fun started. My
- friend Nazgul and I arrived on scene with an attitude of as the song goes "Here we are
- now, entertain us!" , although we were forewarned by the conventions official web site
- (http://www.hit2000.org) stating that we shouldn't expect to be kept busy
- 24/7 and that it was mostly our own responsibility to gather some actual info during and
- besides the speeches.
-
- -- Kicking off
-
- Especially the first day, this was pretty big a truth. Because of it
- kicking off on a Friday, a lot of people didn't show up on day one yet due to work or
- school. In order to keep up with that and don't let those people miss anything, the
- organization had decided to keep the amount of speeches etc that day down to a minimum. Add
- the not so large amount of people there yet at that moment and you have not a lot more
- than a club-day of the alt.hack.nl newsgroup. But the atmosphere was good and it
- turned out that it didn't even come close to being a problem. Something else pulled a
- whole lot more of attention to itself later on that day.
-
- One hour later actually. After some initial network problems (which would
- keep occurring all the way through the weekend), someone decided it to be funny to start
- flooding to outside the network. The provider and it's upstream provider didn't take to
- that all that well, which caused a lot of problems at their end and effectively
- shutting HIT's internet connection down. If it weren't for a bit of smooth talking and
- social engineering from the organizations side, that would have been the case for
- the rest of the weekend. Thank god it wasn't, but the tone was set.
-
- -- Day 2
-
- Ending up behind our boxes and on the network early that morning, the day
- started off with some (getting all to familiar) networking problems. After checking
- the UTP cables and switches which joined together in the room on large tables which
- were almost fulltime manned by people staring fixated to their screen, we discovered to
- be sharing our row of tables with one of the machines of the Hackme project.
- This was called into life with three donated boxes and a challenge to the convention
- visitors to hack them. The AIX box with which we shared a switch seems to have been
- taking up a lot of resources (yeah sure, blame it on the box.. sorry but I have to find
- me some excuse :) , because as soon as we relocated we didn't have a problem with
- our connection anymore, at the moments that other people didn't have problems that is, the
- network still tended to be a bit unstable.
-
- -- The speeches
-
- But now we had stuff to do. Add to that the fact that there were finally
- some speeches kicking off, and you'll see we turned pretty hopeful. And with reason too,
- because some of the speeches were pretty informative. Of course it wasn't all the
- same quality nor did you need any experience for some while others did demand at least
- some level of knowledge, but I believe diversity is one of the tools of the trade and
- I enjoyed the speeches on version 6 of the IP protocol, the linux kernel and hiding
- in the same kernel to name but a few. This as to where others might have enjoyed
- those on the workings on GSM or Information Security in Europe more, anyway there
- WAS diversity.
-
- -- The press
-
- A lot of "hackers" etc gathering in one place is, with the current media
- focus on events in the security scene, bound to draw some press attention. Those of you who
- know me, know of my whining on how the vision people have of hackers is distorted
- because of all the press coverage which looks more at what sells then what actually is
- happening. Well surprise surprise, we got the worst of it again.
-
- In an attempt to give us all the opportunity to look more important then we
- were, photographs were only allowed to be taken when the convention visitors were
- made aware of them by the speaker. Not that anyone seemed to care much about
- that, but o, if we had known before.. a slick little guy with a press-card dangling around
- his neck immediately threw himself onto the people in the areas where photographing
- was allowed. But hey, let's face it, in the "money-hungry" way of thinking mentioned
- above, average Joes like you and me don't interest readers, whether you can disassemble a
- server blindfolded with your hands on your back or not, you have to look a lot
- more "underground" and "elite" than just jeans and a shirt sitting in front of a screen. But
- our photographer friend (note the sarcasm) had a solution for that. All he had
- to do was bring alcohol and druglike substances into the picture and tadaa.. you were
- a lot more interesting. So it happened that someone who didn't even drink beer ended
- up on a picture with a crate of beer next to his box in an effort to capture one of these
- "underground punks who sit behind their screen all night while trying to impress their
- friends on the Internet in the meantime being intoxicated by everything the bible
- forbids." That's us for those of you who didn't know.
-
- -- Day 3
-
- There were no extensive plans on as to what would be done the last day.
- There was at least one speech planned, as well as the release of a package called
- "Phear". This turned out to be quite a drag, being nothing more then a collection of some
- common DoS attacks etc. The speech never surfaced.
-
- -- The total picture
-
- So what's the verdict on this years Dutch hacker gathering? Well, I tend
- to complain a bit, but I actually had a good time. With things like this, it's mostly
- what you make of it yourself and I think I had a nice try at that. Directly after
- HIT2000, some complaints surfaced from the so-called Dutch scene on the level of
- experience of the visitors and the technical level of the speeches. This isn't something
- currently only happening at HIT though. All those people out there who think they're so
- "elite" should think about how they got that way. Events like this are for the sharing of
- information, for people to learn new things, to obtain new knowledge. Of course everyone
- is on a different level at that, but we all started out at the same point and
- instead of whining about the lack of "skill" of newbies, you might try helping them,
- improving that skill. For if you didn't know, that's what hacking is truly about.
-
- -- Belgian DNS server hacked
-
- Besides that, I think some knowledge attending the conference is evident.
- Of course there were some defacements made from there with things for which you had
- to have skills equaling "Cold Fushion hackers", but 2 out of 3 of the Hackme-boxes
- got eventually compromised through some nicely tried attacks and what to think
- of the hack of the maintainer of the Belgian .BE domain? The idea for this hack
- is said to have originated at the Chaos Computer Camp a month earlier and in short
- intercepted ip-requests to the Belgian DNS server. Those requests were transferred
- through a webserver before reaching the actual domain name server and by intercepting and
- responding to the requests when they passed the webserver, the hackers were able to
- return their own fabricated information, thus redirecting the ip-requesting source to
- any site they wanted.
-
- -- Final conclusion
-
- HIT2000 started from a good idea. As the organization announced at the
- beginning of the convention, they didn't work too much on the actual organizing, it was
- the thought that counted and everyone should decide for themselves what to do with the
- things offered. This was nicely demonstrated by some not scheduled speeches.
- Someone decided he could tell something about changing identities using the Net, so he did.
- This spirits something that is needed in the scene more than anything nowadays and I
- personally enjoyed it a lot. There also were some problems though, which we can't
- forget that easily. I think this is where the organization thing should have come in.
- With a bit more of that and with what we already got for our money combined, I'll be
- back next year. And so should you.
-
- Xander Teunissen
- Thejian, Help Net Security
-
-
-
-
- V. Interview with v00d00
- ----------------------------
-
-
- For this issue of Default I spoke to the hacker known as v00d00, who had
- some interesting views on exploits, hacking and law enforcement and the scene in general.
- Read on below.
-
- Thejian: Who is v00d00?
-
- v00d00: v00d00 is a hacker who tries to do what he does for a reason.
-
- Thejian: What's your vision of what a hacker is and does?
-
- v00d00: A hacker is someone who finds new security holes and codes his own
- exploits and helps admins explaining vulnerabilities to them rather than
- making him/her look like a complete fool.
-
- Thejian: Where does defacing come into that?
-
- v00d00: Defacing isn't true hacking, cracking is maybe a better term for it.
-
- Thejian: The discussion on that is endless.. "hacking"/"cracking".. Aren't it
- just all stereotypes?
-
- v00d00: Probably. Called into life to be able to finger something.
-
- Thejian: Looking through your "work" you see a somewhat of "maturing", from simple
- statements as "v00d00 was here" and some greets to "What is your purpose?
- to prove security wrong eh? Oh yeah, you could easily just leave the
- admin a note explaining how you got in and where to get a patch for the
- hole rather than making him/her look like a complete fool." What caused
- this change of mind?
-
- v00d00: Well, I heared of this group defiance and did some defacements for them
- then I helped ne0h on his f0rpaxe dis but then i looked at some of
- the older political hacks and so it came to be.
-
- Thejian: At a certain point you even stated you decided to do something and that
- you were going to stop defacing. It seems you've changed your mind on
- that as well. Why?
-
- v00d00: I now only deface when i think it's needed or when i need to get a point
- through, make something heard.
-
- Thejian: How did the "hacker" stereotype get so distorted in the media?
-
- v00d00: They need something that's interesting to their readers, a lot of hackers
- do it for the publicity, even go to the media themselves, the so-called
- "mediawhores".
-
- Thejian: Is it all sensationalism?
-
- v00d00: A lot of it is.
-
- Thejian: What do you think of the US government reaction when it comes to this?
-
- v00d00: They read about hacking in the media and have to take a stand so they grab.
-
- Thejian: Isn't it a bit overkill?
-
- v00d00: Yes.
-
- Thejian: What's a script kiddie?
-
- v00d00: Someone who uses other people's exploits to make a name for himself defacing.
-
- Thejian: I don't think there are any hackers/crackers who always use exploits
- they coded themselves. Doesn't that make them and maybe even you a "script
- kiddie" as well?
-
- v00d00: I don't see myself as a great hacker.. people could call me that, I
- dislike the term but..
-
- Thejian: Should it be illegal to exploit a system? exploiting as in "hacking/cracking"
-
- v00d00: I don't think so... if the companies are too stupid to check their
- software before releasing it than it deserves to be dissed.
-
- Thejian: So hacking a site would be legal when the admin is too
- stupid/unknowledgable/lazy/whatever to upgrade?
-
- v00d00: Yes, the admin should respect his own box, or else he shouldn't have the
- job.
-
- Thejian: Why is it they don't have this respect do you think? (at least it doesn't
- seem like it when you browse the attrition defacement mirror)
-
- v00d00: It's obvious that admins don't visit security sites very often... most of
- them probaby don't even know how to use the OS they are admin'ing. Seems
- so anyways. They probably read something like "learn to admin in 22 days".
- On the other hand... let me add this: I do respect admins, because i would
- like to be one, I just think they could pay more attention to whats going
- on.
-
- Thejian: So hacking/cracking is more of a service then a crime?
-
- v00d00: Yes, because if one person doesnt do it, someone else will. Some sites
- are still vulnerable a year later after being hacked, if you let them know
- how you did it anyways..
-
- Thejian: So what can you do against those admins who just don't care? How can we
- ensure the users' whom use that box 's security and privacy?
-
- v00d00: You can't.
-
- Thejian: So insecurity will always be a fact for some?
-
- v00d00: There is no such thing as "100% security", this will always be a fact for
- everyone. Boxes change software alot and when they do, there are new holes.
-
- Thejian: What's better then in your opinion? More different systems (with all their
- specific holes) or one monopoly-like system (with its holes)?
-
- v00d00: I'd have to say, different systems. Hacking is also a challenge btw, it's
- like a game. People like challenges, hacking is the ultimate challenge
- comp-wise.
-
- Thejian: Why? Doesn't that create more different holes (especially in more
- combinations of systems)?
-
- v00d00: Well, let me put it this way, what 2 OS's do you see the most hacked? If
- someones running digital unix they usually don't worry about security.
-
- Thejian: Ok, that's true, others learn from their mistakes too.. but they do have
- their own specific holes again.. even when they're not discovered.. again,
- there's no such thing as 100% security.
-
- v00d00: Yep, but people tend to go after solaris/nt.
-
- Thejian: Heh there are a lot of those though it's not that hard.
-
- v00d00: Exactly... people like 'easy'. So they don't hack like dgux and openbsd.
-
- Thejian: Which makes a lot of them "script kiddies" again.. (sorry for the term :)
- How does Canadian law look onto this subject (hacking)?
-
- v00d00: Well... Canada looks into hacking the same way america does, just
- doesn't take it to such extremities. If a major canadian site was defaced, the
- RMCP would be after the culprate in no time.
-
- Thejian: No Canadian Kevin Mitnicks yet though?
-
- v00d00: Nope, ne0h and devil-c are the only canadian hackers i know.
-
- Thejian: Speaking of him, you expressed some pro-Mitnick views on
- defacements.. why do you think there are so much anti-Mitnick feelings?
-
- v00d00: Again, the media. Because 5 years without a trial is bullshit.
-
- Thejian: But in the scene itself ?
-
- v00d00: Well, alot of people worship 2600 so they follow the movement. 2600's
- Emmanuel Goldstein has been noted to be a very close friend of Mitnicks.
-
- Thejian: But 2600 is pro-Mitnick. Where did things as "Burn Kevin" come from?
- Jealousy?
-
- v00d00: No, because people are mad that Mitnick is getting publicity and a lot
- like to cause ruckus.
-
- Thejian: So the "mediawhore"-types are the ones against him?
-
- v00d00: A lot of them yes. I have no disrespect for any hackers or
- crackers though, even if they dis me.
-
- Thejian: I've read some stuff against you too.. you hold no grudge on that
- field whatsoever?
-
- v00d00: Nope... me and ALOC have resolved problems. I never put anyone
- down, so I don't know why people would dislike me anyways
-
- Thejian: Where does this feeling of competition in the "underground" come
- from anyways? We're all here for the same thing right?
-
- v00d00: Pretty much, but some are just here to make a name, some are here
- to spread a word, everyone has their own inidividual purpose. Competition is like
- always, jealousy. Like in real life, if your good at a sport, and someone
- comes along and is better, you want to prove that you are still "the king".
-
- Thejian: But is there anyone in this scene truly the king? In my opinion
- no-one has all the answers nor all the knowledge, just can't be with the speed IT
- developes.
-
- v00d00: There is no "best", there is good, bad, normal and average.
-
- Thejian: Who would you put in the good category?
-
- v00d00: Ne0h, mozy, keebler, stonehenge, and a few others. There are only
- 3 people that are above good. In my opinion the best groups of all time
- have been: code zero, HFG and h4g1s.
-
- Thejian: Do you think this "group"-thing, hackers grouping together, is a
- good or a bad thing?
-
- v00d00: It all depends on their ability to get along and how much trust
- they have in each other.
-
- Thejian: Shouldn't everyone ideally get together in one big group?
-
- v00d00: No, there would be too many disagreements, there would be more fighting
- than hacking involved.
-
- Thejian: Should companies be held responsible for flaws in their products?
-
- v00d00: Yes, the designers should.
-
- Thejian: In what way?
-
- v00d00: The beta testers are oviously not very intelligent because they are
- releasing faulty software, which is not a smart business choice.
-
- Thejian: How should such responsibility be enforced by the government?
-
- v00d00: The government shouldn't have to watch over companies, it's not their job.
-
- Thejian: Then whose is?
-
- v00d00: The owners.
-
- Thejian: Of the company?
-
- v00d00: Yep, they should ask more questions to the employees about what they are
- releasing, put it trough hardcore testings.
-
- Thejian: Do you think they care?
-
- v00d00: Nope, the only care about money, as with everyone else in the world.
-
- Thejian: So nothing we can do unless keep pointing the problems out to them?
-
- v00d00: Absolutely nothing.
-
- Thejian: Hmm kind of sad when you think about it..
-
- v00d00: Totally.
-
- Thejian: I'm drawing to a close here, anything you might want to add?
-
- v00d00: Yep, go to NET-SECURITY.org for the best underground news around :; )
-
- Thejian: Hehe thanx man :) and thanks for your time :)
-
- v00d00: No problem.
-
-
-
- VI. Want secure and crypted e-mails? 1on1lite offers that service
- -----------------------------------------------------------------
-
- Two weeks ago, one company called Global Market Ltd, released 1on1lite program,
- which could provide secure, encrypted e-mail messages. As written on their page:
- "1on1mail uses 448 bit blowfish encryption and the keys are 2048 bit RSA. We believe
- that this encryption is unbreakable within any reasonable period even with virtually
- unlimited computing capacity. Therefore we offer this challenge: We will pay whoever
- can prove they can break this encryption $50,000 (fifty thousand US dollars)".
- I talked to Leo Sheiner from Global Market Ltd about their software:
-
- What team is behind 1on1lite?
-
- 1on1Lite and all related technology is developed in house at Global Market
- Ltd. The project team for software development is (currently) six strong.
- Global Market Ltd. was established in 1995, has other products, is profitable
- and is entirely self-funding.
-
- Where did you get the idea for it?
-
- I append below a post I had published in Isales yesterday in answer to that
- question.
-
- // -- FEATURED POST -- //
-
- From: Leo Sheiner <leo@netcomuk.co.uk>
- Subject: Internet Research - Voodoo and Black Magic
-
- There has been some interesting discussion on Trendmuncher about the
- efficacy of statistical reasearch in a fast moving environment like the
- Internet. I wanted to share my thoughts on this with the Isales list since
- that is where I got much of my original input before deciding to create
- 1on1Lite.
-
- My response was elicited from this small snippet with which I disagreed.
-
- <snip>
-
- >We have real decisions to make that will determine the success of >our
- enterprises and we cannot rely on surface answers and is >interpretation.
- As I say to my clients, the purpose of research is to >reduce the risk of
- failure. You cant' do that cheaply or cursory.
-
- <snip>
-
- I do not really agree with David from my own vantage point. On the Internet
- a surface answer is generally all you need.
-
- I follow all the statistical results with great interest. These certainly
- show trends but as an Internet Entrepreneur very often my decisions are
- based upon an inverse assessment of the available research.
-
- Let me explain. The Internet is a very fast moving market. What that means
- is that there are new disruptive technologies introduced constantly. These
- may at first address only a small niche but they can grow and eventually
- overthrow older technologies. Everything on the net is moving at a frenetic
- pace. In a fast moving market, statistics are to a large degree an autopsy.
- You are looking at a corpse. What is needed is an anticipation of a birth.
-
- In a very serious sense, if there is a statistic available to prove there
- is a demand for a product you are probably already too late to bring
- something to market to address that need. You need to anticipate a
- requirement when there is in fact no demand for it. Then you need to build
- a solution that has no problem. Then you launch your solution and build it
- slowly to converge with the eventual demand created by the eventual change
- of perception and consequent recognition of the problem. It is a bit risky
- and you can get it wrong but in a fast moving market, it is the only way to
- get to market first. And firstcomers on the web have a very great market
- advantage.
-
- Let me give you an example. A year ago, I ran a number of articles on the
- subject of privacy on the web and in particular asked on various lists
- (populated mainly by early adopters) whether they would be interested to
- receive a free copy of email software that was completely secure. The
- response was far from overwhelming. A trickle of half-hearted interest
- showed me quite clearly there was no demand whatsoever for that product. So
- I promptly committed a million dollars to the effort to create that
- product. You may ask Why?
-
- My assessment was quite simple. I believe that Commerce can only flourish
- on the Internet if there is security and confidentiality. My view was then
- and remains that commerce is coming. The fact is whatever commerce is being
- transacted now is only a tiny fraction of what will be there will be one
- day. Businesses will want to communicate securely. There is an immense
- payoff if you can replace courier, mail, Fax and even telephone with email.
- All of those are less effective than email and far more costly. But before
- the launch of 1on1Lite there was no product that made privacy easy, certain
- and transparent for the business user nor were there any facilities needed
- by business people like tracking and automatic deletion available for
- email. We built a better mousetrap before anyone knew there were any mice.
-
- A month ago when we launched at http://1on1mail.com there was a modest
- growth in our Free downloads but nothing to get excited about. It confirmed
- my view on the lack of any real demand (yet).
-
- That to me was perfect timing. Then we had the hotmail fiasco that suddenly
- brought the issue of privacy into the headlines. People are beginning to
- think, hey there is a problem here. I could see the inexorable rise in the
- rate of registrations. That is just the beginning. I believe two years from
- now, virtually everyone will use a secure form of communication by default.
- Why use email that everyone can read when you can make your communication
- secure for no extra effort or cost? I hope and expect that our product will
- be among the leaders at that time. To conclude, statistics are very
- important but it depends on how you use them, and a gut feel can be more
- important than all the statistics in the world.
-
-
- What are the characteristics of 1on1 lite which divides it from the normal e-mail?
-
- * Guarantees delivery and receipt of email
- * Tracks and reports the delivery and opening of each message you send
- * Guarantees complete confidentiality, with 2048 bit encryption ($50,000 offered to
- anyone who can break it)
- * Encrypts messages with military spec encryption
- * Encrypts all attachments with the same military spec encryption
- * Uses the same compatible encryption anywhere in the world (no export restrictions)
- * Is not web based so you can work offline until you are ready to send and receive
- * Is not web based so sensitive address books and messages are not kept on someone
- else's server
- * Has completely effective Anti-Spam features
- * Has the smoothest transparent migration from ordinary email to encrypted email
- * Has a simple to use interface
-
-
-
- What is your privacy statement?
-
- It is published in our terms and conditions when registering. I cannot
- remember the exact words but the drift is that no information provided
- will be passed to anyone under any circumstances and will only be
- used internally.
-
-
- What about spam and your software?
-
- It is impossible to receive Spam on our secure channel
-
-
- You offered $50k for cracking your algorithm, is it just a media stunt
- for promoting 1on1mail or you are so sure in quality of your 2048 bit encryption?
-
- Both. The offer is good, but we do not expect to have to pay.
-
-
- Did you get any feedback on this cracking contest?
-
- About thirty applications so far.
-
-
- How much customers do you have now?
-
- We have about 6,000 downloads since we launched a month ago
-
-
- What are the plans for 1on1 lite?
-
- Continued evolution, the partner version to be released imminently
- also http://1on1mail.com/Partners.html
- and a number of payment by usage facilities (no I cannot tell you what)
- will be introduced around the core technology over the net twelve months.
-
-
- Berislav Kucan
- aka BHZ
- bhz@net-security.org
- http://net-security.org
-
-
- VII. Security audit with our Mac Part-2/2
- ------------------------------------------
-
- The DMZ, Demilitarized Zone, is supposed to be the safest place on the network you
- auditing. When I mean safest, it not only safe from logical access but also physical
- access. It's the barrier between the company's network and the outside wildwild world
- of Internet. Just to remind to people who didn't rode part 1 we will work only from a
- mac with virtual pc, linuxppc and of course MacOs.
- In the dmz part you could spend weeks just to try to get into the Lan or any of its
- ressources (mail server, database, ftp etc....) because there're a bunch of things to check.
- On this part we will use more Linuxppc than previously.
- First of all get clear list off all active element in the dmz.From routers to switch, servers.
- We call use nmap or a queso like to get all this but that's a waste of time. Let's suppose
- you'll have a IIS webserver, with a firewall-1 and a database server linked to IIS.
- First question: what can access and what to?
- Let's check which version of OS and softwares are used in the DMZ.Get a details about
- past 10 months issues in mailinglist like bugtraq (I mean remote exploits). And check
- if the systems as been patched against those.The other thing is took a closer look of what
- we can do from the outside world?
- -Denial of Service Attack
- -Errors in settings of the server, or routers.
- For this 2 posssibilities your company has enought money to afford a 55,000$ toy like ISS.
- Or just use white hat hacker toys from "underground" sites.Internet Security Suite, or
- Cybercop are nice toys but you know... paying for a software where you put a ip or ip's
- and press "scan" after selecting types of attack is not that much constructive. Even drunk
- you could use that!There are bunch of free tools to work with.First what can you see from
- the outside?Get a scanner with OS fingerprinting features like queso, or Nmap ( current
- version v2beta5 get a copy and man here http://www.insecure.org/nmap/nmap_manpage.html).
- The problem with certain security toys on Linux, is that they won't be usable (or hardly)
- on Linuxppc.Some librairies are not working properly on ppc.Most of them are focused on
- X86 computers.Anyway many of them can be used on Linuxppc, I tested Nmap on ppc it's
- exactly the same, just use basic options like -F -sS or even use decoy mode but you
- don't have to be that stealth cause that's only a basic test.I just had more troubles
- to use Kmap, a KDE interfaced version of nmap.You won't have that much problems to compile
- source code, well hopefully! So you're now able to deternime what, ports are open.
- Now what can you do, whith those.Try to browser advisories website to determine if those
- port can be harmfull to the integrety of the remote server unless you so smart you know
- all 6 months past issues by heart.
- Make sure you don't find things like port: 23,137, 138, 139, 1352, 2301 etc...get a
- full list of ports with transport layer and description here:
- http://www.deepquest.pf/portlist.txt. You might think to find those ports open but
- just a little experience I had few month ago, I was auditing a range of ip ( the domain
- is in south of europe, can't tell you more!), I just typed a wrong ip range before
- the scan and I found really funny stuff.There was telnet, http it doesn't seems very
- serious.So I point my browser to the ip.... Hpjetadmin tools with no restriction.I
- telnet on it no password and I jump right into the conf menu.What can you do with
- this access? Not that much except: hijacking *.ps sent to the printer.Intercept
- and redirect.What if there were confidential datas?I mail the admin and waited few
- weeks, they did nothing.I just used their printer once sending a file to print:
- "adjust settings or all printed documents could be 0Wned.".Just for the information
- the company was an IT certified Micro$oft, Lotus...For the dmz try to use several
- protocol and operation systems, the ports opened has to necessary.
- The other thing you can test is the snmp part.It provids usefull informations on
- active elements computers from network configuration, to logical status, cpu load
- and a bunch of info a intruder could use.There two kinds of communities: public and
- private.Private are defined by the admin with a password.But as you know everything
- haveing a loging and password can be break with remote brut force attack.
- You can try tools like snmpscan 0.05 (http://www.phunc.com/tools/snmpscan) that will
- check weakness of your community password.
-
- There're 1000's of things you can do to audit a dmz, but before starting anything
- don't test what you're to allowed to test people in "corporate" environement doesn't
- like that at all.Make sure you warn of possible disturbance in the information services.
- Using hackin' tools instead of commercial products, you'll learn more with them.
- Don't try to use word to word dos or exploits, but think.Think small, fast but
- always think of combinaisons of possible problems. First time I said to my boss I wanted
- to work with a mac, he just laught! After the repports I gave him after several security
- audit, he stilled laught, but this time it was nevervous...I'm not an "Integrist", or
- payed each time I say "Apple" but I know this platorm from the 80's and no other platforms
- offered me such level of security, of integration in mixed environnement, and allowed me
- to run so many other OS on one computer.
-
- Deepquest
- deepquest@default.net-security.org
-
- All rights not reserved- Serving since 1994
- http://www.deepquest.pf
-
-
- VIII. More from the ACPO front
- ----------------------------
-
- More updates from antichildporn.org. First off, thanks again to
- net-security.org for allowing us this forum. We're still forging ahead here,
- learning as we go. It seems that we are taking a slightly different direction
- than was our original intent. Apparently we are entertaining two distinct
- groups of people. Our original followers, the techno wizzs. And a much
- larger, uneducated group of people that have no computer skills, or very few.
-
- We believe we have found an easy solution to a possibly difficult problem.
- The original antichildporn.org will remain the same, headed up by cylent1 and
- his crew. Please mail cylent1 (mailto:cylent1@hotmail.com) if you have any
- constructive suggestions for the existing site, as he has plans to revamp and
- update the site.
-
- We are now in the process of purchasing another domain, a gift from one of our
- liaisons. This site's intention is to have a lighter, more child-friendly
- appeal to the general public., as we are now in the process of contacting
- other resources that tend to look unfavorably upon any sort of "dark ops".
- Two completely different people who will be named at a later date will head up
- the new site. Both sites will be the same organization, but serve two
- different groups of people. They will also link to each other.
-
- We have three trips planned before the first of the year: The Training Co
- (http://www.thetrainingco.com) has graciously offered admittance to the
- conference for some of our members, pro bono. Please check out their website
- for who will be speaking there. It's quite an impressive group. We will also
- have a table set up at the conference to answer questions about our
- organization and try to enlist help from legal resources on how to approach
- the problem of child porn. The second trip planned is to New York City the
- week September 20, one or more of us will be meeting with the founder of Cyber
- Angels (http://www.cyberangels.com) and hopefully an appointment with the UN.
- We're still working out the details for my Euro trip, we'll let you know more
- shortly.
-
- As always, we thank you for your support. Mail me if you have any questions.
-
- Natasha Grigori
- Founder of Anti Child Porn Organization
- natasha@infovlad.net
- http://www.antichildporn.org
-
-
-
- XI. Infection and vaccination
- -------------------------------
-
- What is a trojan horse and which are the functions of the trojan
-
- A trojan horse is:
- An unauthorized program contained within a legitimate program. This
- unauthorized program performs functions unknown (and probably unwanted) by the user.
-
- A legitimate program that has been altered by the placement of unauthorized code within
- it; this code performs functions unknown (and probably unwanted) by the user.
-
- Any program that appears to perform a desirable and necessary function but that
- (because of unauthorized code within it that is unknown to the user) performs
- functions unknown (and probably unwanted) by the user.
- A trojan horse program can be a program that does something useful, or merely something
- interesting. It always does something unexpected, like steal passwords or copy files
- without your knowledge.
- Trojans are discovered often enough that they are a major security concern. What makes
- trojans so insidious is that even after they are discovered, their influence is still
- felt. Trojans are similar to sniffers in that respect. No one can be sure exactly how
- deep into the system the compromise may have reached. There are different kinds of
- trojans on the net here is a little text explaining all kinds of the trojans:
-
- Remote Access Trojans
-
- These trojans are the most popular trojans now.Everyone wants to have such trojan
- because he or she want to have access to their victim's hard drive.The RAT'S
- (remote access trojans)are very simple to use.Just make someone run the server
- and you get the victim's IP and you have FULL access to his or her computer. They
- you can almost everything it depends of the trojan you use. But the RAT'S have the
- common remote access trojan functions like: keylogger,upload and download function,
- make a screenshot and so on.Some people use the trojans for malicious purposes.
- They want just to delete and delete.This is lame.But a have a guide about the best
- way to use a trojan.You should read it. There are many programs out there that detects
- the most common trojans,but new trojans are coming every day and these programs are
- not the maximum deffence. The trojans do always the same things.If the trojan restart
- every time Windows is loaded that means it put something in the registry or in win.ini
- or in other system file so the trojan can restart. Also the trojans create some file
- in the WINDOWS\SYSTEM directory.The file is always looking to be something that the
- victim will think is a normal WINDOWS executable.Most trojans hide from the Alt+Ctrl+Del
- menu.This is not good because there are people who
- use only this way to see which process are running.There are programs that will tell
- me exactly the process and the file from where it comes.Yeah but some trojans as
- I told you use fake names and it's a little hard for some people to understand which
- process should they kill.The remote access trojans opens a port on your computer letting
- everyone to connect.Some trojans has options like change the port and put a password so
- only the guy that infect you will be able to use
- the computer.The change port option is very good because I'm sure you don't want your
- victim to see that port 31337 is open on their computer.Remote access trojans are
- appearing every day and they will continue to appear.
-
- Password Sending Trojans
-
- The purpose of these trojans is to rip all cached passwords and send them to specified
- e-mail without letting the victim about the e-mail.Most of these trojans don't
- restart every time Windows is loaded and most of them use port 25 to send the e-mail.T
- here are such trojans that e-mail other information too like ICQ number computer info
- and so on.These trojans are dangerous if you have any passwords cached anywhere on your
- computer.
-
-
- Keyloggers
-
- These trojans are very simple.The only one thing they do is to log the keys that the
- victim is pressing and then check for passwords in the log file.In the most cases these
- trojans restart every time Windows is loaded.They have options like online and offline
- recording.In the online recording they know that the victim is online and they record
- everything.But in the offline recording everything writen after Windows start is recorded
- and saved on the victims disk waiting for to be transfered.
-
- Desctructive
- The only one fuction of these trojans is to destroy and delete files.This makes them
- very simple and easy to use.They can automatically delete all your .dll or .ini or
- .exe files on your computer. These are very dangerous trojans and once you're infected
- be sure if you don't desinfect your computer information will no longer exist.
-
-
- FTP trojans
- These trojans open port 21 on your computer letting EVERYONE that has a
- FTP client to connect
- to your computer without password and will full upload and download
- options.
-
-
- News:
-
- .jpeg trojan
-
- A trojan horse looking like .jpeg image has been send over the net for
- some time.The purpose of the trojan is to steal the ICQ password of the
- infected users. There has been reported only 200 incidents out of the estimated 40
- million subscribers. Steve Gossett an ICQ user in Temple City, California said that:
- "This is sort of like losing your own phone number that you've had for years and
- years," Over the last month, ICQ users have receive an email message containing
- an attached file disguised as a JPEG. When users opened the attached file, instead
- of opening a JPEG image, the attachment loaded a small malicious program.
- The program emailed the user's IC password back to the sender.
-
-
- Dancho
- dancho@mbox.digsys.bg
-
-
-
- X. Watch out for documents you publish on The Internet, you might get in trouble
- ---------------------------------------------------------------------------------
-
- Note: following article was written in ironic way, just to people to see, what
- could some file types published on The Internet cause:
-
- ./conspiracy -revangeon myenemy -feds arresthimsoon
-
- my enemy that I hate more than anything in world publish M$ office documents on the
- web: *.doc, *.ppt, *.xls I'll anything to cause him troubles, and what if the feds
- arrest him? humm sounds to me. get the source or the file itself of an infected file
- with a macro virus, a melissa like.Modify a little bit the code to prevent its
- detection by present virus definition.
- Open the document you downloaded from your enemy's site with a basic txt editor
- (mac:bbedit, win9*-nt:notepad). ctrl-F: _PID_GUID (if he paid he's been registered to
- M$ databases without knowning (ref:http://www.hackernews.com/arch.html?031299)
- copy paste _PID_GUID <*****-*******....> from enemy's documents and paste to the
- infected file. Cross post attachement to many usenet porn channels with a suggestive title...
- Wait 1 week. Post your file to antivirus companies and say that you noticed suspicious
- network activities when opening this simple office document. They make a new a-v signature,
- feds are interested in this that cause so many disorder in mail systems. They investigate,
- few days after (they're very slow sometimes) they notice the _PID_GUID (software registered
- to your enemy and based on your enemy's mac address).
- Day-13 feds knock knock your enemy's door.Arrested and charged for interrupting public
- communication, wrongful access to computer systems
-
- solution:
- 1-Use another office suite
- 2-Erase GUID mac: http://www.deepquest.pf/billblocker01.sit.hqx
- win: http://www.vecdev.com/guideon.html
-
-
- ps -aux
- kill conspiracy all
-
- Now you can sleep well and rest your dark spirit, it was pure imagination...reality is wilder.
-
- Deepquest
- deepquest@default.net-security.org
-
-
-
- XI. Freedom of speech - related incidents
- ------------------------------------------
-
- *******************************************************************
- So. Let our debates be heated, that they may illuminate.
- Let our positions be polarized, so that matters may be confronted.
- And let us drop the lazy idea that any midpoint is the superior
- position of vantage. The truth cannot lie, but if it could, I have no
- doubt that it would lie somewhere in between.
-
- ---Christopher Hitchens
-
- *******************************************************************
-
- Every day the battle between freedom and repression rages through the global ether.
-
- Here are this week's links highlights from NewsTrolls(http://www.newstrolls.com):
-
- Thursday, September 2:
-
- China calls for crackdown on
- <http://www.insidechina.com/news.php3?id=89340>
- internet dissent...
-
- "A circular issued by the Public Security Bureau on Monday called for an all-out
- war on anti-government and anti-communist articles on the internet, a source said.
- "Recently a hostile organization overseas have used our intra-net to wantonly
- propagate anti- government views and repeatedly publish reactionary articles,"
- a copy of the circular said. The circular was issued after exiled Chinese dissidents
- attacked a chat site run by the leading People's Daily and ridiculed the Chinese
- government, the source said."
-
- Are Monsanto's genetically Round-up Ready Terminator seeds
- <http://www.enn.com/features/1999/09/090199/seeds_5385.asp>
- strangling small farmers?
- --------------------------------------------------------------------------
-
- Long Weekend, September 3-6
-
- Qi Yanchen arrested for
- <http://www.insidechina.com/news.php3?id=89868>
- alleged Internet crime...
-
- Mexican government likened to
- <http://asia.yahoo.com/headlines/030999/world/936346980-90903082310.newsworld.html>
- Stalin's dictatorship...
-
- "The punishment meted out for any disloyalty or dissent depended on the rank of the culprit.
- In the case of a middle or high-ranking military figure, they could be jailed without
- being told the reason, and then may simply disappear. For the 60 percent of Mexicans
- classed as poor, torture was routinely used, and they might "suddenly disappear" or
- have property confiscated, he said. For more senior figures, trumped-up allegations of
- tax fraud or other crimes may be made. "One of the most common is through tax fraud,
- because the tax laws are basically incomprehensible," he said. "The minister of the
- Treasury said he was incapable of filling out his own tax returns, so that absolutely
- anything at all can be tax fraud.""
-
- Created in reaction to WalkerB's (George Bush, Jr.) desire to limit freedom of speech
- on the Internet, sign the online petition
- <http://www.gwbush.com/petition.htm>
- against political web sites having to register with the government
-
- ----------------------------------------------------------------------------
-
- Tuesday, September 7
-
- Waco and the
- <http://search.washingtonpost.com/wp-srv/WAPO/19990906/V000352-090699-idx.html>
- price of lies...
-
-
- Is medical info in the US
- <http://www.yomiuri.co.jp/newse/0907so17.htm>
- moving too freely?
-
- I don't care if the ignoramus does own most of the world's media:
- <http://www.telegraph.co.uk/et?ac=000271261842766&rtmo=3qA8wHBM&atmo=ggggg3qK&pg=/
- et/99/9/7/wmur07.html>
- Rupert Murdoch (NWS) is the lapdog of the Chinese Communist Party...
-
- "Mr Murdoch, who hopes to expand his business interests in China, said of the leader of
- Tibetan Buddhism: "I have heard cynics who say he's a very political old monk shuffling
- around in Gucci shoes." Mr Murdoch, 68, who recently married a 31-year-old Chinese woman,
- Wendi Deng, also excuses China's disregard for human rights on the ground that the average
- Chinese person cares more about "his next bowl of rice" than democracy...Mr Murdoch
- expresses his support for China's forced occupation of Tibet by asking whether Tibet's
- own culture was ever worth preserving: "It was a pretty terrible old autocratic
- society out of the Middle Ages. Maybe I'm falling for their propaganda," he says
- of the Chinese government, "but it was an authoritarian, medieval society without
- any basic services." In his ambition to expand his Star satellite television business
- in China, Mr Murdoch has already been accused of placing his commercial interests above
- freedom of speech. In 1994, he dropped the BBC from Star after it was critical of
- Chinese leaders and of the Tiananmen Square killings. Last year, he ordered his
- publishing company HarperCollins to abandon publication of Chris Patten's recollections
- of his time as Governor of Hong Kong because they too were critical of the Chinese
- government."
-
-
- Call for release of
- <http://www.africanews.org/central/congo-kinshasa/stories/19990903_feat5.html>
- Congolese scholar
-
-
- -------------------------------------------------------------------------------
-
- Wednesday, September 8
-
- South African Communications Minister heralds the Internet as
- <http://www.africanews.org/south/southafrica/stories/19990906_feat20.html>
- antidote to bribery and media gatekeeping...
-
- "She said people could expect in future to be able to access and print out
- important government data, such as tender forms, as well as any other forms
- required from officials at public terminals at the Post Office. This would
- curtail the ability of officials to force members of the public to pay bribes
- to get free official forms or information."
-
- US is allowing
- <http://asia.yahoo.com/headlines/080999/world/936804480-90908152801.newsworld.html>
- genocide in East Timor...
-
- "The World Bank and the IMF must also stop all funds going into Indonesia, which receives
- some 1.8 billion dollars in US aid, the activist said. Amnesty International's Asia director
- T. Kumar warned that hundreds were dying by the hour in East Timor but that the scale of
- the violence was difficult to gauge as most foreigners and journalists had fled. "We are
- shocked to report to you that even we are helpless today," Kumar, who also attended the
- press conference. A US observer who just returned from monitoring the vote also faulted
- the United States for allowing the crisis. "The US did not put the pressure on Jakarta
- it needed to," he said, adding that the world could stop the violence within two hours
- if it took action."
-
- From East Timor Action Network (ETAN), here are more links to help you
- <http://etan.org/action/urgntMnu.htm>
- take action in support of East Timor independence...
-
- More info on the massacres taking place
- <http://www.sjmercury.com/breaking/docs/011850.htm>
- as you read this...
-
- "``The man that we encountered was sliced numerous times on either arm and on his stomach.
- He was literally covered in blood but was walking,'' said Sexton after fleeing to Darwin on
- Wednesday from the East Timorese town of Suai...East Timorese Maria Bernardino said she had
- been told by a friend who had fled Dili for Kupang, the capital of West Timor, that militias
- on Tuesday attacked a church in Suai, killing an estimated 40 people. ``The last time he
- looked there were about 40 people on the floor, he assumed they were dead. There was blood
- everywhere, people had been macheted and shot,'' Bernardino told Reuters. ``He saw a priest
- on his knees begging and screaming for people's lives, saying `please have mercy','' she said.
- An Australian Catholic brother, who fled Dili on Tuesday, told Australian radio on Wednesday
- that an East Timorese child was cut to pieces by militias on the streets of Dili. The
- Catholic brother, who asked not to be named, said a local U.N. security officer witnessed
- the child's murder, which occurred when East Timorese were trying to flee to the safety
- of the U.N. compound in Dili. ``The child was actually being cut up. He was chopped up and
- parts of his body were actually thrown about in Dili outside the UNAMET compound,'' he
- told Australian Broadcasting Corporation radio from Kupang in West Timor. "
-
-
- In just one week...
-
- diva aka Pasty Drone
- CEO
- NewsTrolls, Inc.
- "Free Minds...Free Speech...NewsTrolls"
- http://www.newstrolls.com
- pastydrone@newstrolls.com
-
-
- XII. Y2K survey for 72 countries
- -------------------------------
-
-
- The International Y2K Cooperation Center (IY2KCC), a United
- Nations backed group funded by the World Bank, today released its first survey of
- Y2K readiness in 72 nations, as reported by national Y2K coordinators representing
- each government.
- "This is the unfiltered information straight from the people who have been working
- on the Y2K problem in each nation," said Bruce McConnell, director of the International
- Y2K Cooperation Center. "We encourage the many organizations currently making
- evaluations of country readiness to use this first-hand information to supplement
- their opinion surveys. It is imperative that analysts learn from the people actually
- doing the work before making judgments that have serious consequences."
- "This principle applies equally to private consultants and to national governments that
- contemplate issuing travel advice to their citizens," said McConnell. In an Open Letter
- to Y2K Analysts, McConnell said, "All third party evaluations should reflect direct
- consultations with each affected country's Y2K coordinator. These coordinators can be
- located via the Center's web page."
- "We also urge those countries that have not yet made their readiness information public
- to do so as soon as possible," said McConnell. "Full public disclosure of Y2K preparation
- activities is essential to maintain public confidence in the international marketplace."
- The IY2KCC surveys were completed in August 1999 by Y2K coordinators appointed by their
- national governments. Y2K coordinators reported the month implementation was expected to
- be 90 percent completed. Status statements were provided for nine sectors: Energy,
- Communications, Finance, Transportation (Air, Sea, Land), Health, Government Services
- and Customs.
- The 72 survey responses are posted on the website of the International Y2K Cooperation
- Center at www.iy2kcc.org, under Country Information. With this publication, 33 countries
- have for the first time provided information on the World Wide Web in English. Another
- 56 countries have shared information with the center but have not yet indicated their
- preference to share it with the public. Finally, 67 countries have not yet responded to
- the Center's request for information either via the survey or web site. The survey results
- will be updated periodically as additional countries respond.
- Y2K refers to possible computer and automated control system malfunctions when the year
- changes from 1999 to 2000. Until recently, many computers and automated systems were
- programmed to handle only two-digit year formats, and could make mistakes when they
- encounter "00" in the date field.
- The IY2KCC was established in February 1999 under United Nations auspices with World Bank
- funding in response to the need to coordinate efforts to update computer and automated
- control systems around the world to smoothly transition to the year 2000.
-
- Explanation of Posted Survey Results
- Based on the responses from National Y2K Coordinators to a Y2K Readiness Survey (PDF),
- the International Y2K Cooperation Center has developed regional sector readiness charts.
- These charts provide countries with a way to tell their own stories about their Y2K
- preparations. We hope that this information will promote a more realistic understanding
- of global Y2K readiness, strengthen efforts to address critical areas in each country,
- and help direct available resources appropriately.
- The charts depict sector readiness by country. The number in each block indicates the
- month in which the country reports it will be 90 percent complete with its Y2K
- implementation in that sector. The color indicates the level of dependence on information
- technology in that sector.
- Continuity/contingency planning and emergency response information for each sector can
- be found by clicking on the cell for the particular country and sector. Reported
- challenges and concerns for each sector are also detailed.
- In many cases, a country's national Y2K web site provides detailed information on
- sector status and contingency planning.
- Additional country readiness information will be added as soon as it is received from
- reporting national coordinators.
-
- Asia
- (http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=Asia
- Central America and the Caribbean
- (http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=LAC
- Eastern Europe and Central Asia
- http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=EE
- Middle East and North Africa
- http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=MENA
- North America
- http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=NA
- South America
- http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=SA
- Sub Saharan Africa
- http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=Africa
- Western Europe
- http://www2.iy2kcc.org/SectorStatus/Default.cfm?WhichRegion=WE
-
-
-
- Lisa Pellegrin
- Telephone: (202) 466-5464, ext. 11
- Fax: (202) 466-5451
- E-mail: pellegrin@iy2kcc.org
- Web: www.iy2kcc.org
-
-
- XIII. Journalism
- ----------------
-
- Just a brief article, because I really must react.
-
- Yesterday in Croatia, 16 year old Denis Perisa was caught for using Back Orifice
- for entering the computer and snatching the password from a known politician over
- here. The main problem in all of this isn't he being caught, but how media
- could create a super-hacker from a just ordinary trojan user. The article was
- published in a Croatian daily newspapers Vecernji list - on Croatian language
- (http://www.vecernji-list.hr/Pages/DUPN.html). When you read the article you
- could see that the author of it has a little knowledge of The Internet and its
- services. Denis told them several very idiotic and untrue sentences like:
- "I could get in any bank system with just 2 of my friends and a good computer",
- "I have my own newsgroup on Usenet"... He didn't have any knowledge at all. His
- group could only "hack" Tripod websites (guess how - by using trojans ofcourse).
- "We don't need disclaimer because HACKING is NOT illegal in CROATIA!!!n So we can put
- here our full names here and nobody can do us a fucki'n thing :) SO take your laptop,
- sit in a plane, come to Croatia and (fuck) HACK THE PLANET :)" - that was written
- on their page (lame isn't it?).
- The main problem is in journalists, who don't have a clue about what they are writing.
- Croatia is a small country (about 4.8 millions of citizens), and we don't have a
- "hacker" scene, at least as I know. Every time someone is caught in relation with
- computer crime, newspapers see profit in it, and they make terrible articles about
- it. Couple of years ago, one Croatian hacker penetrated to one of the Pentagon
- servers (using Imap exploit), and several newspapers and magazines created a
- super hero from him. After that he said that he didn't knew how to unzip some files:)
- If you know Croatian do read this article written by me for
- Croatian security news site (column comments all facts that were written in
- article about Denis) - http://www.monitor.hr/security/clanci/denis.htm
-
- Berislav Kucan
- aka BHZ
- bhz@net-security.org
- http://net-security.org
-