home *** CD-ROM | disk | FTP | other *** search
- A Guide to Internet Security:
- Becoming an Uebercracker and Becoming an
- UeberAdmin to stop Uebercrackers.
-
- Author: Christopher Klaus
- Date: December 5th, 1993.
- Version 1.1
-
- This is a paper will be broken into two parts, one showing 15 easy steps to becoming a uebercracker and the next part
- showing how to become a ueberadmin and how to stop a uebercracker. A uebercracker is a term phrased by Dan Farmer to
- refer to some elite (cr/h)acker that is practically impossible to keep out of the networks.
-
- Here's the steps to becoming a uebercracker.
-
- I.Relax and remain calm. Remember YOU are a Uebercracker.
-
- II.If you know a little Unix, you are way ahead of the crowd and skip past step 3.
-
- III.You may want to buy Unix manual or book to let you know what ls,cd,cat does.
-
- IV.Read Usenet for the following groups: alt.irc, alt.security, comp.security.unix. Subscribe to Phrack@well.sf.ca.us to get
- a background in uebercracker culture.
-
- V.Ask on alt.irc how to get and compile the latest IRC client and connect to IRC.
-
- VI.Once on IRC, join the #hack channel. (Whew, you are half-way there!)
-
- VII.Now, sit on #hack and send messages to everyone in the channel saying "Hi, Whats up?". Be obnoxious to anyone else
- that joins and asks questions like "Why cant I join #warez?"
-
- VIII.(Important Step) Send private messages to everyone asking for new bugs or holes. Here's a good pointer, look around
- your system for binary programs suid root (look in Unix manual from step 3 if confused). After finding a suid root binary,
- (ie. su, chfn, syslog), tell people you have a new bug in that program and you wrote a script for it. If they ask how it
- works, tell them they are "layme". Remember, YOU are a UeberCracker. Ask them to trade for their get-root scripts.
-
- IX.Make them send you some scripts before you send some garbage file (ie. a big core file). Tell them it is encrypted or it
- was messed up and you need to upload your script again.
-
- X.Spend a week grabbing all the scripts you can. (Dont forget to be obnoxious on #hack otherwise people will look down
- on you and not give you anything.)
-
- XI.Hopefully you will now have atleast one or two scripts that get you root on most Unixes. Grab root on your local
- machines, read your admin's mail, or even other user's mail, even rm log files and whatever temps you. (look in Unix
- manual from step 3 if confused).
-
- XII.A good test for true uebercrackerness is to be able to fake mail. Ask other uebercrackers how to fake mail (because
- they have had to pass the same test). Email your admin how "layme" he is and how you got root and how you erased his
- files, and have it appear coming from satan@evil.com.
-
- XIII.Now, to pass into supreme eliteness of uebercrackerness, you brag about your exploits on #hack to everyone. (Make
- up stuff, Remember, YOU are a uebercracker.)
-
- XIV.Wait a few months and have all your notes, etc ready in your room for when the FBI, Secret Service, and other law
- enforcement agencies confinscate your equipment. Call eff.org to complain how you were innocent and how you
- accidently gotten someone else's account and only looked because you were curious. (Whatever else that may help,
- throw at them.)
-
- XV.Now for the true final supreme eliteness of all uebercrackers, you go back to #hack and brag about how you were
- busted. YOU are finally a true Uebercracker.
-
-
-
- Now the next part of the paper is top secret. Please only pass to trusted administrators and friends and even some trusted
- mailing lists, Usenet groups, etc. (Make sure no one who is NOT in the inner circle of security gets this.)
-
- This is broken down on How to Become an UeberAdmin (otherwise know as a security expert) and How to stop
- Uebercrackers.
-
- I.Read Unix manual ( a good idea for admins ).
-
- II.Very Important. chmod 700 rdist; chmod 644 /etc/utmp. Install sendmail 8.6.4. You have probably stopped 60 percent
- of all Uebercrackers now. Rdist scripts is among the favorites for getting root by uebercrackers.
-
- III.Okay, maybe you want to actually secure your machine from the elite Uebercrackers who can break into any site on
- Internet.
-
- IV.Set up your firewall to block rpc/nfs/ip-forwarding/src routing packets. (This only applies to advanced admins who have
- control of the router, but this will stop 90% of all uebercrackers from attempting your site.)
-
- V.Apply all CERT and vendor patches to all of your machines. You have just now killed 95% of all uebercrackers.
-
- VI.Run a good password cracker to find open accounts and close them. Run tripwire after making sure your binaries are
- untouched. Run tcp_wrapper to find if a uebercracker is knocking on your machines. Run ISS to make sure that all your
- machines are reasonably secure as far as remote configuration (ie. your NFS exports and anon FTP site.)
-
- VII.If you have done all of the following, you will have stopped 99% of all uebercrackers. Congrads! (Remember, You are
- the admin.)
-
- VIII.Now there is one percent of uebercrackers that have gained knowledge from reading some security expert's mail
- (probably gained access to his mail via NFS exports or the guest account. You know how it is, like the mechanic that
- always has a broken car, or the plumber that has the broken sink, the security expert usually has an open machine.)
-
- IX.Here is the hard part is to try to convince these security experts that they are not so above the average citizen and that
- by now giving out their unknown (except for the uebercrackers) security bugs, it would be a service to Internet. They do
- not have to post it on Usenet, but share among many other trusted people and hopefully fixes will come about and new
- pressure will be applied to vendors to come out with patches.
-
- X.If you have gained the confidence of enough security experts, you will know be a looked upto as an elite security
- administrator that is able to stop most uebercrackers. The final true test for being a ueberadmin is to compile a IRC
- client, go onto #hack and log all the bragging and help catch the uebercrackers. If a uebercracker does get into your
- system, and he has used a new method you have never seen, you can probably tell your other security admins and get
- half of the replies like - "That bug been known for years, there just isn't any patches for it yet. Here's my fix." and the
- other half of the replies will be like - "Wow. That is very impressive. You have just moved up a big notch in my security
- circle." VERY IMPORTANT HERE: If you see anyone in Usenet's security newsgroups mention anything about that
- security hole, Flame him for discussing it since it could bring down Internet and all Uebercrackers will now have it and
- the million other reasons to keep everything secret about security.
-
-
-
- Well, this paper has shown the finer details of security on Internet. It has shown both sides of the coin. Three points I would
- like to make that would probably clean up most of the security problems on Internet are as the following:
-
- I.Vendors need to make security a little higher than zero in priority. If most vendors shipped their Unixes already secure
- with most known bugs that have been floating around since the Internet Worm (6 years ago) fixed and patched, then
- most uebercrackers would be stuck as new machines get added to Internet. (I believe Uebercracker is german for "lame
- copy-cat that can get root with 3 year old bugs.") An interesting note is that if you probably check the mail alias for
- "security@vendor.com", you will find it points to /dev/null. Maybe with enough mail, it will overfill /dev/null. (Look in
- manual if confused.)
-
- II.Security experts giving up the attitude that they are above the normal Internet user and try to give out information that
- could lead to pressure by other admins to vendors to come out with fixes and patches. Most security experts probably
- don't realize how far their information has already spread.
-
- III.And probably one of the more important points is just following the steps I have outlined for Stopping a Uebercracker.
-
-
-
- Resources for Security
-
- Many security advisories are available from anonymous ftp cert.org. Ask archie to find tcp_wrapper, security programs. For
- more information about ISS (Internet Security Scanner), email cklaus@shadow.net.
-
- Acknowledgements
-
- Thanks to the crew on IRC, Dan Farmer, Wietse Venema, Alec Muffet, Scott Miles, Scott Yelich, and Henri De Valois.
-
- Copyright
-
- This paper is Copyright 1993, 1994. Please distribute to only trusted people. If you modify, alter, disassemble, reassemble,
- re-engineer or have any suggestions or comments, please send them to: cklaus@shadow.net