mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
70 lines
3.2 KiB
Text
70 lines
3.2 KiB
Text
![]() |
#### PHRACK PRESENTS ISSUE 16 ####
|
||
|
^*^*^*^Phrack World News, Part 1^*^*^*^
|
||
|
**** File 8 of 12 ****
|
||
|
|
||
|
|
||
|
>From the 9/16 San Francisco Chronicle, page A19:
|
||
|
|
||
|
GERMAN HACKERS BREAK INTO NASA NETWORK (excerpted)
|
||
|
|
||
|
Bonn
|
||
|
A group of West German computer hobbyists broke into an international
|
||
|
computer network of the National Aeronautics and Space Administration and
|
||
|
rummaged freely among the data for at least three months before they were
|
||
|
discovered, computer enthusiasts and network users said yesterday.
|
||
|
|
||
|
An organization in Hamburg called the Chaos Computer Club, which
|
||
|
claimed to be speaking for an anonymous group that broke into the network,
|
||
|
said the illicit users managed to install a "Trojan horse," and gain entry
|
||
|
into 135 computers on the European network.
|
||
|
|
||
|
A "Trojan Horse" is a term for a permanent program that enables
|
||
|
amateur computer enthusiasts [as opposed to professionals?], or "hackers,"
|
||
|
to use a password to bypass all the security procedures of a system and gain
|
||
|
access to all the data in a target computer.
|
||
|
|
||
|
[Actually, this type of program is a 'back door' or a 'trap door.' The group
|
||
|
may very well have *used* a Trojan horse to enable them to create the back
|
||
|
door, but it probably wasn't a Trojan horse per se. A Trojan horse is a
|
||
|
program that does something illicit and unknown to the user in addition to its
|
||
|
expected task. See Phrack xx-x, "Unix Trojan Horses," for info on how to
|
||
|
create a Trojan horse which in turn creates a trap door into someone's
|
||
|
account.]
|
||
|
|
||
|
The NASA network that was broken into is called the Space Physics
|
||
|
Analysis Network [ooh!] and is chiefly designed to provide authorized
|
||
|
scientists and organizations with access to NASA data. The security system in
|
||
|
the network was supplied by an American company, the Digital Equipment Corp.
|
||
|
[Probably DECNET. Serves them right.] Users said the network is widely used
|
||
|
by scientists in the United States, Britain, West Germany, Japan and five
|
||
|
other countries and does not carry classified information.
|
||
|
|
||
|
A Chaos club spokesman, Wau Holland, denied that any data had been
|
||
|
changed. This, he said, went against "hacker ethics."
|
||
|
|
||
|
West German television reports said that computer piracy carries a
|
||
|
penalty of three years in prison in West Germany. The government has not said
|
||
|
what it plans to do.
|
||
|
|
||
|
The Chaos club clearly views its break-in as a major coup. Holland,
|
||
|
reached by telephone in Hamburg, said it was "the most successful running of a
|
||
|
Trojan horse" to his knowledge, and the club sent a lengthy telex message to
|
||
|
news organizations.
|
||
|
|
||
|
It said the "Trojan horse" was spotted by a user in August, and the
|
||
|
infiltrating group then decided to go public because "they feared that they
|
||
|
had entered the dangerous field of industry espionage, economic crime, East-
|
||
|
West conflict...and the legitimate security interests of high-tech
|
||
|
institutions."
|
||
|
|
||
|
The weekly magazine Stern carried an interview with several anonymous
|
||
|
hobbyists who showed how they gained access to the network. One described his
|
||
|
excitement when for the first time he saw on his screen, "Welcome to the NASA
|
||
|
headquarters VAX installation."
|
||
|
|
||
|
According to Chaos, the hobbyists discovered a gap in the Digital VAX
|
||
|
systems 4.4 and 4.5 and used it to install their "Trojan Horse."
|
||
|
|
||
|
[Excerpted and Typed by Shooting Shark. Comments by same.]
|
||
|
|