home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 4 of 14
-
- Prelude to a Kiss
-
- - Lessons Unlearned Are Doomed To Bring Misery Ad-Infinitum -
-
-
- The following is an article I wrote for a mainstream computer security
- periodical called ISPNews. At the time, I had been discussing the idea
- of a bi-monthly column with the editor at that time, Len Spitz. (Now the
- editor is Michael Alexander, ex-of Computerworld)
-
- The following article, although very, very tame by my standards, and
- admittedly lacking in enough hardcore information to help security
- professionals to apply a quick fix to their many problems, caused quite
- a stir among the folks at ISPNews.
-
- Since this article was from me, a self-proclaimed hacker, it
- underwent an extraordinary amount of scrutiny. Rather than be
- accepted or denied by the editor, my article got the dubious honor of
- being sent before an editorial advisory board. I checked every back
- issue of ISPNews and could find no mention of such an entity until the
- November/December 1991 issue, the issue immediately following an length
- interview with none other than myself.
-
- When I questioned Len Spitz about this rather odd fact, he maintained
- that this committee had indeed existed, but stammered his way through my
- question to name any other article that they had convened to judge in
- the past, and to explain the duties of such a group. He could not give
- me any answers.
-
- The group itself was obviously geared to be a type of kangaroo-court.
- It consisted of:
-
- William J. Cook -- The man who less than two years prior had ordered my
- privacy and civil rights violated by the Secret
- Service solely on the basis of two bulletin board
- posts and my association with members of the Legion
- of Doom and the Phrack Magazine staff.
-
- William H. Murray -- A senior consultant with Deloitte & Touche who had
- two weeks prior stood up before my presentation to
- the MIS Training Institute's 11th Annual Conference
- and said loudly "I can't take this any more, I'm leaving,"
- to the astounded audience. The man who went on to
- state in his own column in ISPNews, "Can we lie
- down with dogs and get up without fleas?" and "Ask
- yourself if you wish to work in a profession
- populated by rogues. Ask yourself if you want your
- reputation mixed with theirs."
-
- Winn Schwartau -- A security consultant with a broad view and an open
- mind, undoubtedly resulting from his background in the
- music industry, as opposed to the bean-counting world
- of MIS.
-
- David J. Stang -- Director of research, NCSA. Noted virus specialist.
-
- This was the group. Here is what they said about my article:
-
- Bill Cook -- "It's very well-written and informative, but shouldn't be
- published for legal reasons." (What those reasons might have been were
- not stated, nor did Mr. Cook return my call to his office.)
-
- Bill Murray -- Was not even given the file to read, as his response was
- deemed to predictable.
-
- Winn Schwartau -- "Publish it. This is valuable information."
-
- David Stang -- Was not given the file because, according to Len Spitz
- "David is just a virus expert, and this isn't in his arena, so we gave
- it to Ray Kaplan."
-
- Ray Kaplan -- Did not want to comment on it because he said, "It's
- not my expertise, so I gave it to a friend." I believe Ray did not
- want to get involved with anything having to do with hackers after
- the reactionary attitudes of the DECUS attendees towards his defense
- of Kevin Mitnik that nearly left him in bankruptcy. I cannot blame
- him at all. (Hell, I like the guy...he's certainly more brazen with
- attitude these days, I mean, he went to HoHoCon for God's-sake!)
-
- Ray's Friend -- "This is of absolutely no use to the information
- security professional, but of great use to the hacker community."
- I still do not know who Ray's "friend" was. I hope his
- Alzeheimer's has subsided since this comment.
-
- Needless to say, the article went unpublished.
-
- Shortly thereafter I received a letter from Robert Fox, an assistant
- vice-president at Sprint. Somehow my little article had snaked its
- way over to Kansas City. It's amazing how one faxed copy of an article
- could have reached so many people in such a short period of time.
- Mr. Fox had the following to say:
-
- ------------------------------------------------------------------------
-
- United Telecom/US Sprint
- 9221 Ward Parkway
- Kansas City, Missouri 64114
- 816-822-6262
-
- Robert F. Fox January 13, 1992
- Assistant Vice President
- Corporate Security
-
-
- VIA AIRBORNE EXPRESS
-
- Mr. Chris Goggans
- COMSEC
- Suite 1470
- 7322 Southwest Freeway
- Houston, TX 77074
-
- Re: Your Article "Packet-switched Networks
- Security Begins With Configuration"
-
- Dear Mr. Goggans:
-
- A copy of the referenced unpublished article, which is
- enclosed with this letter, has come to our attention. After
- review, we believe the article is inaccurate and libelous. If
- published the contents of the article could cause damage to Sprint
- customers, Sprint and our reputation, and we request that you not
- publish or otherwise disseminate it.
-
- In addition, we believe some of the information contained in
- the article has been obtained through violation of the property
- rights of Sprint and/or our customers and we demand that you cease
- any efforts or attempts to violate or otherwise compromise our
- property whether or not for you personal financial gain.
-
- Sincerely,
-
- Robert F. Fox
-
-
- Enclosure
-
-
- ------------------------------------------------------------------------
-
-
- Regardless of how Mr. Fox came into possession of this article, i have to
- question his letter based on his comments. First he states that
- the information is almost criminally incorrect and could cause harm to
- Sprint's reputation. Then he states that information in the article has
- come to be known through the violation of the security of Sprintnet and/or
- clients of Sprintnet. In effect, I am both a thief and a liar according
- to Mr. Fox. Well, if I were a thief the information could not possibly
- be inaccurate if it were obtained from Sprintnet or its clients. If I
- was a liar, why would they think the information came from themselves
- and/or their clients? Mr. Fox's thinly veiled threat caused me great
- amusement.
-
- I then decided no mainstream publication would touch this article. I
- don't know why everyone is so scared of the truth. Perhaps if the truth
- were known people would have to work, and perhaps if the truth were
- known some people would be out of work. None of this is of concern to
- me anymore. I am here to speak the truth and to provide uncensored
- information gathered from a variety of sources to provide readers of
- this magazine the facts they need to quench their thirst for knowledge.
-
- This article is included as a prelude to a series of articles all based
- on packet switched networks as related to information merely alluded to
- in my harmless little article. To our readers, "enjoy." To the cowering
- so-called security experts, "kiss my ass."
-
- ------------------------------------------------------------------------
-
- Packet-switched Networks
-
- Security Begins with Configuration
-
-
- For many companies the use of packet-switched networks has
- allowed for increased interconnectivity of systems and easy
- remote access. Connection to a major public packet-switched
- network brings increased access points with local dialups in
- many cities around the nation as well as access
- points from foreign countries.
-
- With the many obvious benefits provided by this service,
- improper configuration of either the host's connection to the
- network or of the network itself can lead to extreme security
- problems.
-
- The very connection to a public packet-switched network
- immediately increases the exposure of that particular system.
- America's two major commercial networks, BT-Tymnet and
- Sprintnet, are probably the most popular US targets for hackers
- around the world. The wealth of systems available on
- these two networks has provided hackers with a seemly endless
- supply of sites on which to sharpen their skills. The ease of use
- inherent in both networks makes them popular for legitimate
- users as well as illegitimate users.
-
- The Telenet software utilized in the Sprintnet network allows
- users to enter a network user address (NUA) in the standard
- format as outlined in the X.121 numbering standard:
-
- DDDDAAAHHHHHPP
-
- Where D = the four digit data network identifier code (DNIC)
- A = the three digit area code corresponding to the host
- H = the host address
- P = the port or (sub) address
-
- On domestic calls the DNIC for Sprintnet (3110) is stored in
- all Sprintnet equipment and is used as the default. By
- merely picking an area code, most often corresponding to the standard
- area codes of the North American Numbering Plan, and an
- additional one to five digits a would-be intruder can
- connect to any number of systems while looking for targets.
-
- In the past many software packages have been written to
- automate this process, and large scans of the network have
- been published in a variety of underground media.
-
- The Tymnet II software utilized in BT's Tymnet
- prompts the user for a mnemonic which corresponds to a host
- or number of hosts. The mnemonic, or username, is referenced
- to a fixed host address in the network's Master User
- Directory (MUD). This username may allow the caller to
- connect to a variety of sites, as opposed to merely one, by
- entering additional information in separate fields after the username.
- It may also correspond to a network gateway thereby allowing
- the user to enter a number in the X.121 format and connect to that
- specific site.
-
- This particular network, with its primary use of words as
- opposed to numbers, has been compromised by intruders who
- guess common words or names in their attempts to connect to
- remote sites.
-
- Each network has its own particular set of problems but
- solutions to these problems are both simple and quick in
- implementation.
-
- SPRINTNET
-
- The first deterrence in securing a host on this
- network is to restrict access to the site. This can be
- accomplished in a number of ways. The most obvious is to
- have the site refuse collect calls. All calls on Sprintnet
- are reverse-billed, unless the site has specifically asked
- that they not be billed for incoming calls. This makes the
- site accessible only through the use of a Network User
- Identifier (NUI).
-
- Another method of restricting access from intruders is to
- place the host in a closed user group (CUG). By electing to
- have the host in a CUG, the administrator can allow only
- certain NUIs to connect, and can also restrict the actual
- addresses from which access is allowed. For example: A site
- is placed in a CUG that will allow only calls from the
- company's remote branch in Dallas to access the host and only
- with the NUI created specifically for that branch. All
- attempts to access the site from an address outside the 214
- area will result in an error message indicating an invalid
- source address. All attempts to connect with an invalid NUI
- will result in an error indicating an invalid ID. This
- information is maintained in the networks main TAMS (TP
- Access Management System) database, and is not subject to
- manipulation under normal circumstances.
-
- Many sites on the Sprintnet network have specific
- subaddresses connecting to a debug port. This is usually at
- subaddress 99. All connections to debug ports should be
- restricted. Allowing users access to this port will allow
- them the ability to load and display memory registers of the
- Sprintnet equipment connected to the port, and even reset
- as well as enable or disable the host. Most debug ports are
- equipped with preset passwords from the vendor, but should be
- changed. These ports should also restrict connection from
- all addresses except those specified by the company.
-
- An additional measure that may foil intruders relying on
- software programs to find all addresses in a given area code
- is to request that the host be given an address above 10000.
- The time involved in scanning the network is extensive and
- most casual intruders will not look past the 10000 range. In
- fact, many will not venture past 2000.
-
- BT-TYMNET
-
- Any company having a host on the Tymnet network should choose
- a username that is not easily associated with the company or
- one that is not a common word or name. If an intruder is aware that
- XYZ Inc. has a UNIX based system on TYMNET he or she would
- begin attempts to find this system with the obvious
- usernames: XYZ, XYZINC, XYZNET, XYZ1, XYZUNIX, UNIX, etc.
-
- BT-Tymnet allows for these usernames to have additional
- password security as well. All hosts should have this option
- enabled, and passwords should be changed frequently.
- The password should always be a minimum of six
- digits, should include letters, numbers and at least one symbol
- character, and should not be associated in any way with the
- corresponding username.
-
- Many clients of BT-Tymnet have purchased the Tymnet II
- software and have individual sub-networks that are linked to
- the public network through gateways. Each subnet is
- personally configured and maintained through the use of a
- package of utilities provided by Tymnet. These utilities
- each perform a specific task and are highly important to the
- smooth operation of the network. These utilities may be
- accessed either directly from the host-end or remotely
- through the network by entering a corresponding username.
- Some of these utilities are:
-
- XRAY : a monitoring utility
- DDT : a debugging utility
- NETVAL : a database of username to host correspondence
- PROBE : a monitoring utility
- TMCS : a monitoring utility
-
- Under NO CIRCUMSTANCES should these utilities be left
- without a password on the company's subnet. These utilities should
- also never be named similarly to their given name. Should an
- intruder gain access to any of these utilities the integrity
- of your network will be at risk.
-
- For example:
-
- Allowing an outsider access to the XRAY utility, would give
- he or she the ability to monitor both incoming and outgoing
- data from the host using the "TA" command (display trace data
- table in ASCII). Use of certain XRAY commands are restricted
- by a security function that allows only certain usernames to
- execute commands on the basis of their existence in a
- "Goodguy" list, which can be displayed by any XRAY user.
- Should a user be of the highest privilege, (2), he or she can
- add or delete from the "Goodguy" list, reset connections, and
- display trace data on channels other than the default
- channel.
-
- Allowing a user access to DDT can result in complete
- disruption of the network. DDT allows the user the ability
- to write directly to the network controller "node code" and
- alter its configuration.
-
- Allowing a user access to NETVAL will allow the user to
- display all usernames active on the network and the
- corresponding host addresses.
-
- OTHER PROBLEMS
-
- EXAMPLE ONE
-
- On many networks users have the ability to connect to the
- packet assembler/disassembler (PAD) of the network dial-ups.
- This has led to significant problems in the past.
-
- In the mid-1980's two American hackers were exploring the
- German packet network DATEX-P. One connected to a host in
- Berlin and was immediately disconnected by the remote site.
- Before the hacker could react, the German host connected to
- the NUA corresponding to his Sprintnet PAD and sent him a
- login prompt. This alarmed the hacker greatly, as he assumed
- that the proprietors of the German host had somehow noticed
- his attempt to access their system. He contacted his partner
- and told him of the occurrence. The two concluded that since
- the NUA of the origination point is sent in the packet-header,
- the remote site must have been programed to recognize the NUA and
- then return the call. The fact that it had returned a call to a
- public PAD was intriguing to the pair, so they decided to
- attempt to recreate the event by calling each other. Both
- individuals connected to the network and one entered the NUA
- corresponding to the others PAD. A connection resulted and
- the two were able to interact with one another. They then
- decided that they would periodically meet in this fashion and
- discuss their findings from Germany. At the time of the next
- meeting, the connection did not occur as planned. One hacker
- quickly received a telephone call from the second who
- exclaimed rather excitedly that he had attempted to connect
- to his partner as planned, but accidentally connected to
- another PAD and intercepted a legitimate user typing his NUI.
- Further investigation proved that one could connect to public
- PADs during the idle period when the user was in network
- mode, prior to making a connection to a remote site. This
- discovery was intended to remain secret, because of its
- extremely dangerous applications. Nevertheless, word of this
- discovery soon reached the entire hacker community and what
- came to be known as "PAD to PAD" was born.
-
- The "PAD to PAD" technique became so wide-spread that hackers
- were soon writing software to intercept data and emulate
- hosts and capture login names and passwords from unsuspecting
- network users. Hackers were intercepting thousands of calls
- every day from users connecting to systems ranging from
- banking and credit to the Fortune 500 to government sites.
-
- After nearly two years of "PAD to PAD" Sprintnet became
- alerted to the crisis and disallowed all connections to
- public PADs. When Sprintnet expanded its service overseas
- they once again left access to the overseas PADs
- unrestricted. The problem went unnoticed again until
- their attention was brought to it by a hacker who called
- Sprintnet security and told them that they ought to fix it
- quickly before it became as wide-spread as before.
- The problem was resolved much quicker this time.
-
- This particular technique was not limited to Sprintnet. All
- networks using the Telenet software are at risk to this type
- of manipulation. This type of network manipulation was
- integral in the recent compromise of a large Bell Company's packet
- network in a much-publicized case. Certain foreign
- networks in countries such as Israel, England, Chile, Panama,
- Peru and Brazil are also at risk.
-
- EXAMPLE TWO
-
- In the late 1980's hackers stumbled onto a packet network
- owned and maintained by a large facilities maintenance
- company. This particular network had a huge flaw in its
- setup. It connected all calls placed through it as if they
- were placed with an NUI. This allowed hackers to place calls
- to addresses that refused collect connections on networks
- around the world. This became a popular method for hackers
- to access underground chat systems in Europe. Additionally,
- this network contained a score of computers belonging to a
- major automobile manufacturer. Most of these systems were
- highly insecure. The network also allowed unrestricted
- access to network debug ports. This particular network also
- had a toll-free number on an MCI exchange. At the time, MCI
- was having some difficulty getting their equipment to accept
- the ANI information to provide customers with a full call-
- detail report on their monthly statement. The hackers were
- well aware of this fact and made frequent use of the network
- with no fear of prosecution. Eventually MCI was able to fix
- their translation problem and were able to provide their
- clients with full call-detail reports. When this was
- learned, many hackers abandoned use of the network, but
- several others were later prosecuted for its usage when their
- number turned up on the bill.
-
- EXAMPLE THREE
-
- Until quite recently intimate knowledge of the utilities
- driving various packet-switched networks were known by an
- exclusive few. While investigating a network owned by an
- extremely large Cleveland-based conglomerate hackers came
- across a system where documentation on the usage of every
- utility was kept online. The hackers quickly downloaded all
- the information and it soon became somewhat wide-spread among
- the underground community. With less-skilled and more
- unscrupulous individuals in possession of this information
- many networks began experiencing disruptions and system
- integrity was quickly lost as hackers began monitoring data
- traffic.
-
- No information on the usage of packet networks or their
- utilities should ever be kept online. Hard copies should be
- kept in the possession of the network administrator, and when
- updated, obsolete versions must be destroyed.
-
- WHAT TO DO
-
- When a security violation stemming from a connection through
- the packet network is noticed, Network Security should be
- notified. Clients of BT-Tymnet should notify Steve Matthews
- at 408-922-7384. Clients of Sprintnet should notify
- Pat Sisson at 703-689-6913.
-
- Once changes have been enacted in the network to prevent
- further break-ins, the host computer should be checked
- thoroughly for any changes or damages, and all individual
- account passwords should be changed.
-
- CONCLUSION
-
- It is critical that the packet network be configured properly
- and that all measures are taken to ensure its security. Even
- the most secure host computer can be easily compromised if it
- is connected to an insecure packet network.
- ----------------------------------------------------------------------
-