466 lines
24 KiB
Text
466 lines
24 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Two, Issue 22, File 11 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXII/Part 3 PWN
|
|
PWN PWN
|
|
PWN Created by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN Written and Edited by PWN
|
|
PWN Knight Lightning and Taran King PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Computer Break-In November 11, 1988
|
|
~~~~~~~~~~~~~~~~~
|
|
>From Intercom, Vol 28, No. 24, Air Force Communications Command Newsletter
|
|
By Special Agent Mike Forche, AFOSI Computer Crime Investigator
|
|
|
|
A computer hacker penetrated an Air Force Sperry 1160 computer system in the
|
|
San Antonio, Texas, area. The hacker was discovered by alert Air Force
|
|
Communications Command computer operators who notified the data base
|
|
administrator than an un-authorized user was in the system. The data base
|
|
administrator was able to identify the terminal, password, and USERID (system
|
|
level) used by the hacker.
|
|
|
|
The data base administrator quickly disabled the USERID/password (which
|
|
belonged to a computer system monitor). The data base administrator then
|
|
observed the hacker trying to get into the system using the old
|
|
USERID/password. He watched as the hacker successfully gained entry into the
|
|
system using another unauthorized USERID/password (which was also a system
|
|
administrator level password).
|
|
|
|
The hacker was an authorized common user in the computer system; however, he
|
|
obtained system administrator access level to the government computer on both
|
|
occasions.
|
|
|
|
Review of the audit trail showed that the hacker had successfully gained
|
|
unauthorized access to the computer every day during the two weeks the audit
|
|
was run. In addition, the hacker got unauthorized access to a pay file and
|
|
instructed the computer floor operator to load a specific magnetic tape (pay
|
|
tape).
|
|
|
|
The hacker was investigated by Air Force Office of Special Investigation
|
|
computer crime investigators for violation of federal crimes (Title 18 US Codes
|
|
1030 computer fraud, and 641 wrongful conversion of government property), Texas
|
|
state crimes (Title 7, Section 33.02 Texas computer crime wrongful access) and
|
|
military crimes (obtaining services under false pretense, Uniform Code of
|
|
Military Justice, Article 134).
|
|
|
|
The computer crime investigators made the following observations:
|
|
|
|
- USERIDs used by the hacker were the same ones he used at his last base when
|
|
he had authorized system access in his job. The use of acronyms and
|
|
abbreviations of job titles will hardly fool anyone; plus the use of
|
|
standard USERID base to base is dangerous.
|
|
|
|
- The passwords the hacker used were the first names of the monitors who
|
|
owned the USERIDs. The use of names, phone numbers, and other common
|
|
easily-guessed items have time and time again been beaten by even the
|
|
unsophisticated hackers.
|
|
|
|
Special Thanks To Major Douglas Hardie
|
|
_______________________________________________________________________________
|
|
|
|
"Big Brotherish" FBI Data Base Assailed November, 21, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
>From Knight-Ridder Newspapers (Columbia Daily Tribune)
|
|
|
|
"Professionals Unite To Halt Expansion Of Files"
|
|
|
|
PALO ALTO, California -- For the first time in more than a decade, civil
|
|
libertarians and computer professionals are banding together to stop what many
|
|
consider a Big Brotherish attempt by the FBI to keep track of people's lives.
|
|
|
|
Computer Professionals for Social Responsibility, based in Palo Alto, has been
|
|
instrumental in preventing the FBI from expanding its data base to include
|
|
information such as credit card transactions, telephone calls, and airline
|
|
passenger lists.
|
|
|
|
"We need computer professionals acting like public interest lawyers to make
|
|
sure the FBI is acting responsibly," said Jerry Berman, chief legislative
|
|
counsel for the American Civil Liberties Union.
|
|
|
|
Berman was part of a panel Saturday at Stanford University that went
|
|
head-to-head with the FBI's assistant director for technical services, William
|
|
Bayse, over expansion of the National Crime Information Center.
|
|
|
|
Law enforcement officials use the NCIC system's 19.4 million files about
|
|
700,000 times a day for routine checks on everyone from traffic violators to
|
|
Peace Corps applicants.
|
|
|
|
"The FBI would like us to believe that they are protecting us from the hick
|
|
Alabama sheriff who wants to misuse the system," said Brian Harvey, a computer
|
|
expert at the University of California-Berkeley. "The FBI is the problem."
|
|
|
|
Not since the fight to pass the Privacy Act of 1974 have computer experts,
|
|
civil libertarians, and legislators come together on the issue of citizen
|
|
rights and access to information.
|
|
|
|
In the early 1970s, the government's efforts to monitor more than 125,000 war
|
|
protesters sparked concerns about privacy. The 1974 law limited the movement
|
|
of information exchanged by federal agencies.
|
|
|
|
But computers were not so sophisticated then, and the privacy act has a number
|
|
of exceptions for law enforcement agencies, Rotenberg said. No laws curtail
|
|
the FBI's data base.
|
|
|
|
Two years ago, the FBI announced its plan to expand the data base and came up
|
|
with 240 features to include, a sort of "wish list" culled from the kinds of
|
|
information law enforcement officials who use the system would like to have.
|
|
|
|
Rep. Don Edwards, D-Calif., balied at moving ahead with the plan without
|
|
suggestions from an independent group, and put together a panel that includes
|
|
members of the Palo Alto computer organization.
|
|
|
|
Working with Bayse, FBI officials eventually agreed to recommend a truncated
|
|
redesign of the data base. It drops the most controversial features, such as
|
|
plans to connect the data base to records of other government agencies -
|
|
including the Securities and Exchange Commission, the IRS, the Immigration and
|
|
Naturalization Service, the Social Security Administration, and the Department
|
|
of State's passport office.
|
|
|
|
But FBI director William Sessions could reject those recommendations and
|
|
include all or part of the wish list in the redesign.
|
|
|
|
The 20-year-old system has 12 main files containing information on stolen
|
|
vehicles, missing people, criminal arrests and convictions, people who are
|
|
suspected of plotting against top-level government officials, and people for
|
|
whom arrest warrents have been issued.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
Big Guns Take Aim At Virus November 21, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken From Government Computer News
|
|
|
|
In the aftermath of the most recent virus infection of the Defense Data Network
|
|
and Arpanet, Defense Department and National Institute of Standards and
|
|
Technology computer security officials are scrambling to head off further
|
|
attacks.
|
|
|
|
Officials of the facilities struck by the virus met this month to discuss its
|
|
nature and impact. The meeting at National Security Agency headquarters in Fort
|
|
Meade, Md., included representatives of NSA and NIST as 'observers,' according
|
|
to NIST computer security chief Stuart Katzke.
|
|
|
|
Two days later, NSA and NIST officials met again to discuss how to avert future
|
|
infections, Katzke said. Katzke, who attended both meetings, said no decisions
|
|
had been reached on how to combat viruses, and NSA and NIST representatives
|
|
will meet again to firm up recommendations.
|
|
|
|
Katzke, however, suggested one solution would be the formation of a federal
|
|
center for anti-virus efforts, operated jointly by NSA's National Computer
|
|
Security Center (NCSC) and NIST.
|
|
|
|
The center would include a clearinghouse that would collect and disseminate
|
|
information about threats, such as flaws in operating systems, and solutions.
|
|
However, funding and personnel for the center is a problem, he said, because
|
|
NIST does not have funds for such a facility.
|
|
|
|
The center also would help organize responses to emergencies by quickly warning
|
|
users of new threats and defenses against them, he said. People with solutions
|
|
to a threat could transmit their answers through the center to threatened
|
|
users, he said. A database of experts would be created to speed response to
|
|
immediate threats.
|
|
|
|
The center would develop means of correcting flaws in software, such as
|
|
trapdoors in operating systems. Vendors would be asked to develop and field
|
|
solutions, he said.
|
|
|
|
NIST would work on unclassified systems and the NCSC would work on secure
|
|
military systems, he said. Information learned about viruses from classified
|
|
systems might be made available to the public through the clearinghouse, Katzke
|
|
said, although classified information would have to be removed first.
|
|
|
|
Although the virus that prompted these meetings did not try to destroy data, it
|
|
made so many copies of itself that networks rapidly became clogged, greatly
|
|
slowing down communications. Across the network, computer systems
|
|
crashed as the virus continuously replicated itself.
|
|
|
|
During a Pentagon press conference on the virus outbreak, Raymond Colladay,
|
|
director of the Defense Advanced Research Projects Agency (DARPA), said the
|
|
virus hit 'several dozen' installations out of 300 on the agency's unclassified
|
|
Arpanet network.
|
|
|
|
Thousands Affected
|
|
|
|
The virus also was found in Milnet, which is the unclassified portion of the
|
|
Defense Data Network. Estimates of how many computers on the network were
|
|
struck varied from 6,000 to 250,000. The virus did not affect any classified
|
|
systems, DOD officials said.
|
|
|
|
The virus hit DARPA computers in Arlington, Va., and the Lawrence Livermore
|
|
Laboratories in California as well as many academic institutions, Colladay
|
|
said. It also affected the Naval Ocean Systems Command in San Diego and the
|
|
Naval Research Laboratory in Maryland, a Navy spokesman said.
|
|
|
|
Written in C and aimed at the UNIX operating system running on Digital
|
|
Equipment Corp. VAX and Sun Microsystems Inc. computers, the virus was released
|
|
November 2, 1988 into Arpanet through a computer at the Massachusetts Institute
|
|
of Technology in Cambridge, Mass.
|
|
|
|
The Virus apparently was intended to demonstrate the threat to networked
|
|
systems. Published reports said the virus was developed and introduced by a
|
|
postgraduate student at Cornell University who specializes in computer
|
|
security. The FBI has interviewed the student.
|
|
|
|
Clifford Stoll, a computer security expert at Harvard University who helped
|
|
identify and neutralize the virus, said the virus was about 40 kilobytes long
|
|
and took 'several weeks' to write. It replicated itself in three ways.
|
|
|
|
Spreading the Virus
|
|
|
|
The first method exploited a little-known trapdoor in the Sendmail
|
|
electronic-mail routine of Berkeley UNIX 4.3, Stoll said. The trapdoor was
|
|
created by a programmer who wanted to remove some bugs, various reports said.
|
|
However, the programmer forgot to remove the trapdoor in the final production
|
|
version. In exploiting this routine, the virus tricked the Sendmail program
|
|
into distributing numerous copies of the virus across the network.
|
|
|
|
Another method used by the virus was an assembly language program that found
|
|
user names and then tried simple variations to crack poorly conceived passwords
|
|
and break into more computers, Stoll said.
|
|
|
|
Yet another replication and transmission method used a widely known bug in the
|
|
Arpanet Finger program, which lets users know the last time a distant user has
|
|
signed onto a network. By sending a lengthy Finger signal, the virus gained
|
|
access to the operating systems of Arpanet hosts.
|
|
|
|
The virus was revealed because its creator underestimated how fast the virus
|
|
would attempt to copy itself. Computers quickly became clogged as the virus
|
|
rapidly copied itself, although it succeeded only once in every 10 copy
|
|
attempts.
|
|
|
|
Users across the country developed patches to block the virus' entrance as soon
|
|
as copies were isolated and analyzed. Many users also used Arpanet to
|
|
disseminate the countermeasures, although transmission was slowed by the
|
|
numerous virus copies in the system.
|
|
|
|
DARPA officials 'knew precisely what the problem was,' Colladay said.
|
|
'Therefore, we knew precisely what the fix was. As soon as we had put that fix
|
|
in place, we could get back online.'
|
|
|
|
Colladay said DARPA will revise security policy on the network and will decide
|
|
whether more security features should be added. The agency began a study of
|
|
the virus threat two days after the virus was released, he said.
|
|
|
|
All observers said the Arpanet virus helped raise awareness of the general
|
|
virus threat. Several experts said it would help promote computer security
|
|
efforts. 'Anytime you have an event like this it heightens awareness and
|
|
sensitivity,' Colladay said.
|
|
|
|
However, Katzke cautioned that viruses are less of a threat than are access
|
|
abusers and poor management practices such as inadequate disaster protection or
|
|
password control. Excellent technical anti-virus defenses are of no use if
|
|
management does not maintain proper control of the system, he said.
|
|
|
|
Congress also is expected to respond to the virus outbreak. The Computer Virus
|
|
Eradication Act of 1988, which lapsed when Congress recessed in October, will
|
|
be reintroduced by Rep. Wally Herger (R-Calif.), according to Doug Griggs, who
|
|
is on Herger's staff.
|
|
_______________________________________________________________________________
|
|
|
|
Congressmen Plan Hearings On Virus November 27, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
>From The Seattle Times (Newhouse News Services)
|
|
|
|
WASHINGTON - The computer virus that raced through a Pentagon data network
|
|
earlier this month is drawing the scrutiny of two congressional committee
|
|
chairmen who say they plan hearings on the issue during the 101st Congress.
|
|
|
|
Democratic Reps. Robert Roe, chairman of the House Science Space and Technology
|
|
Committee, and William Hughes, chairman of the crime subcommittee of the House
|
|
Judiciary Committee, say they want to know more about the self-replicating
|
|
program that invaded thousands of computer systems.
|
|
|
|
The two chairmen, both from New Jersey, say the are concerned about how
|
|
existing federal law applies to the November 2, 1988 incident in which a
|
|
23-year-old computer prodigy created a program that jammed thousands of
|
|
computers at universities, research centers, and the Pentagon.
|
|
|
|
Roe said his committee also will be looking at ways to protect vital federal
|
|
computers from similar viruses.
|
|
|
|
"As we move forward and more and more of our national security is dependent on
|
|
computer systems, we have to think more about the security and safety of those
|
|
systems," Roe said.
|
|
|
|
Hughes, author of the nation's most far-reaching computer crime law, said his
|
|
1986 measure is applicable in the latest case. He said the law, which carries
|
|
criminal penalties for illegally accessing and damaging "federal interest"
|
|
computers, includes language that would cover computer viruses.
|
|
|
|
"There is no question but that the legislation we passed in 1986 covers the
|
|
computer virus episodes,' Hughes said. Hughes noted that the law also includes
|
|
a section creating a misdemeanor offense for illegally entering a
|
|
government-interest computer. The network invaded by the virus, which included
|
|
Pentagon research computers, would certainly meet the definition of a
|
|
government-interest computer, he said.
|
|
|
|
"The 1986 bill attempted to anticipate a whole range of criminal activity
|
|
that could involve computers," he said.
|
|
_______________________________________________________________________________
|
|
|
|
Pentagon Severs Military Computer From Network Jammed By Virus Nov. 30, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By John Markoff (New York Times)
|
|
|
|
NEW YORK - The Pentagon said on Wednesday that it had temporarily severed the
|
|
connections between a nonclassifed military computer network and the nationwide
|
|
academic research and corporate computer network that was jammed last month by
|
|
a computer virus program.
|
|
|
|
Department of Defense officials said technical difficulties led to the move.
|
|
But several computer security experts said they had been told by Pentagon
|
|
officials that the decision to cut off the network was made after an unknown
|
|
intruder illegally gained entry recently to several computers operated by the
|
|
military and defense contractors.
|
|
|
|
Computer specialists said they thought that the Pentagon had broken the
|
|
connections while they tried to eliminate a security flaw in the computers in
|
|
the military network.
|
|
|
|
The Department of Defense apparently acted after a computer at the Mitre
|
|
Corporation, a Bedford, Mass., company with several military contracts, was
|
|
illegally entered several times during the past month. Officials at several
|
|
universities in the United States and Canada said their computers had been used
|
|
by the intruder to reach the Mitre computer.
|
|
|
|
A spokeswoman for Mitre confirmed Wednesday that one of its computers had been
|
|
entered, but said no classified or sensitive information had been handled by
|
|
the computers involved. "The problem was detected and fixed within hours with
|
|
no adverse consequences," Marcia Cohen said.
|
|
|
|
The military computer network, known as Milnet, connects hundreds of computers
|
|
run by the military and businesses around the country and is linked through
|
|
seven gateways to another larger computer network, Arpanet. It was Arpanet
|
|
that was jammed last month when Robert T. Morris, a Cornell University
|
|
graduate student, introduced a rogue program that jammed computers on the
|
|
network.
|
|
|
|
In a brief statement, a spokesman at the Defense Communication Agency said the
|
|
ties between Milnet and Arpanet, known as mail bridges, were severed at 10 p.m.
|
|
Monday and that the connections were expected to be restored by Thursday.
|
|
|
|
"The Defense Communications Agency is taking advantage of the loop back to
|
|
determine what the effects of disabling the mail bridges are," the statement
|
|
said. "The Network Information Center is collecting user statements and
|
|
forwarding them to the Milnet manager."
|
|
|
|
Several computer security experts said they had been told that the network
|
|
connection, which permits military and academic researchers to exchange
|
|
information, had been cut in response to the intruder. "We tried to find out
|
|
what was wrong (Tuesday night) after one of our users complained that he could
|
|
not send mail," said John Rochlis, assistant network manager at the
|
|
Massachusetts Institute of Technology. "Inititally we were given the run
|
|
around, but eventually they unofficially confirmed to us that the shut-off was
|
|
security related."
|
|
|
|
Clifford Stoll, a computer security expert at Harvard University, posted an
|
|
electronic announcement on Arpanet Wednesday that Milnet was apparently
|
|
disconnected as a result of someone breaking into several computers.
|
|
|
|
Several university officials said the intruder had shielded his location by
|
|
routing telephone calls from his computer through several networks.
|
|
|
|
A manager at the Mathematics Faculty Computer Facility at the University of
|
|
Waterloo in Canada said officials there learned that one of their computers had
|
|
been illegally entered after receiving a call from Mitre.
|
|
|
|
He said the attacker had reached the Waterloo computer from several computers,
|
|
including machines located at MIT, Stanford, the University of Washington and
|
|
the University of North Carolina. He said that the attacks began on November 3,
|
|
1988 and that some calls had been routed from England.
|
|
|
|
A spokeswoman for the Defense Communications Agency said that she had no
|
|
information about the break-in.
|
|
|
|
Stoll said the intruder used a well-known computer security flaw to illegally
|
|
enter the Milnet computers. The flaws are similar to those used by Morris'
|
|
rogue program.
|
|
|
|
It involves a utility program called "file transfer protocol (FTP" that is
|
|
intended as a convenience to permit remote users to transfer data files and
|
|
programs over the network. The flaw is found in computers that run the Unix
|
|
operating system.
|
|
|
|
The decision to disconnect the military computers upset a number of computer
|
|
users around the country. Academic computer security experts suggested that
|
|
the military may have used the wrong tactic to attempt to stop the illegal use
|
|
of its machines.
|
|
|
|
"There is a fair amount of grumbling going on," said Donald Alvarez, an MIT
|
|
astrophysicist. "People think that this is an unreasonable approach to be
|
|
taking."
|
|
|
|
He said that the shutting of the mail gateways did not cause the disastrous
|
|
computer shutdown that was created when the rogue program last month stalled as
|
|
many as 6,000 machines around the country.
|
|
|
|
[The hacker suspected of breaking into MIT is none other than Shatter. He
|
|
speaks out about the hacker community in PWN XXII/4. -KL]
|
|
_______________________________________________________________________________
|
|
|
|
MCI's New Fax Network December 1988
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
>From Teleconnect Magazine
|
|
|
|
MCI introduced America's first dedicated fax network. It's available now. The
|
|
circuit-switched network, called MCI FAX, takes a slice of MCI's existing
|
|
bandwidth and configures it with software to handle only fax transmissions.
|
|
Customers - even MCI customers - have to sign up separately for the service,
|
|
though there's currently no fee to join.
|
|
|
|
Users must dedicate a standard local phone line (e.g. 1MB) to each fax machine
|
|
they want on the MCI network (the network doesn't handle voice) and in return
|
|
get guaranteed 9600 baud transmission, and features like management reports,
|
|
customized dialing plans, toll-free fax, cast fax, several security features,
|
|
delivery confirmation and a separate credit card.
|
|
|
|
The system does some protocol conversion, fax messages to PCs, to telex
|
|
machines or from a PC via MCI Mail to fax. The service is compatible with any
|
|
make or model of Group III and below fax machine and will be sold, under a new
|
|
arrangement for MCI, through both a direct sales force and equipment
|
|
manufacturers, distributors and retailers. For more info 1-800-950-4FAX. MCI
|
|
wouldn't release pricing, but it said it would be cheaper.
|
|
_______________________________________________________________________________
|
|
|
|
Military Bans Data Intruder December 2, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Compiled From News Services
|
|
|
|
NEW YORK -- The Pentagon has cut the connections between a military computer
|
|
network (MILNET) and an academic research network (ARPANET) that was jammed
|
|
last month by a "computer virus."
|
|
|
|
The Defense Department acted, not because of the virus, but rather because an
|
|
unknown intruder had illegally gained entry to several computers operated by
|
|
the armed forces and by defense contractors, several computer security experts
|
|
said.
|
|
|
|
The Defense Department apparently acted after a computer at the Mitre
|
|
Corporation of Bedford, Mass., a company with several military contracts, was
|
|
illegally entered several times in the past month.
|
|
|
|
Officials at several universities in the United States and Canada said their
|
|
computers had been used by the intruder to reach the Mitre computer.
|
|
|
|
A spokeswoman for Mitre confirmed Wednesday that one of its computers had been
|
|
entered, but said no classified or sensitive information had been handled by
|
|
the computers involved.
|
|
|
|
"The problem was detected and fixed within hours, with no adverse
|
|
consequences," Marcia Cohen, the spokeswoman said.
|
|
|
|
The military computer network, known as Milnet, connects hundreds of computers
|
|
run by the armed forces and businesses around the country and is linked through
|
|
seven gateways to another larger computer network, Arpanet. Arpanet is the
|
|
network that was jammed last month by Robert T. Morris, a Cornell University
|
|
graduate student.
|
|
_______________________________________________________________________________
|