mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
477 lines
20 KiB
Text
477 lines
20 KiB
Text
![]() |
-------[ Phrack Magazine --- Vol. 9 | Issue 55 --- 09.09.99 --- 17 of 19 ]
|
||
|
|
||
|
|
||
|
-------------------------[ P H R A C K W O R L D N E W S ]
|
||
|
|
||
|
|
||
|
--------[ disorder <jericho@attrition.org> ]
|
||
|
|
||
|
Like I said in Phrack 54, the increase of news on the net, security,
|
||
|
hackers and other PWN topics, it is getting more difficult to keep Phrack
|
||
|
readers informed of everything. To combat this problem, PWN will include
|
||
|
more articles, but only relevant portions (or the parts I want to make
|
||
|
smart ass remarks about). If you would like to read the full article,
|
||
|
look through the ISN (InfoSec News) archives located at:
|
||
|
|
||
|
http://www.landfield.com/isn/
|
||
|
|
||
|
If you would like timely news delivered with less smart ass remarks, you
|
||
|
can always subscribe to ISN by mailing listserv@securityfocus.com with
|
||
|
|
||
|
'subscribe isn firstname lastname'
|
||
|
|
||
|
in the body of your mail. Another excellent source of daily news is the
|
||
|
Hacker News Network (HNN @ www.hackernews.com).
|
||
|
|
||
|
The news included in here are events that occured since the previous
|
||
|
edition of Phrack World News (Phrack Magazine V. 8, #54, Dec 25th, 1998.
|
||
|
ISSN 1068-1035).
|
||
|
|
||
|
If you feel the need to send me love letters, please cc:
|
||
|
mcintyre@attrition.org and tell him to "get jiggy on your wiggy". If you
|
||
|
would like to mail my cat, don't, he hates you because you are pathetic.
|
||
|
Meow.
|
||
|
|
||
|
This installment of PWN is dedicated to Federal Agents of Diminished
|
||
|
Mental Capacity, stupid little kids running canned scripts for lack of
|
||
|
real skill .. err 'hackers', and blatant stupidity. This issue was brought
|
||
|
to you by the letters F, U, C, K, O and F.
|
||
|
|
||
|
--------[ Issue 55
|
||
|
|
||
|
0x01: State of Defacements
|
||
|
0x02: L.A. district attorney drops Mitnick case
|
||
|
0x03: Mitnick sentenced, ordered to pay $4,125
|
||
|
0x04: Clinton forms security panel
|
||
|
0x05: Bill reopens encryption access debate
|
||
|
0x06: The Hacker Hoax
|
||
|
0x07: Israeli Teen Finds Web Full of Security Holes
|
||
|
0x08: Hotmail Hackers: 'We Did It'
|
||
|
0x09: Scientists crack Net security code
|
||
|
0x0a: NSA Lures Hackers
|
||
|
0x0b: Army to offer 'information survival' training
|
||
|
0x0c: Clinton To Use hackers Against Yugoslav leader
|
||
|
0x0d: Hack attack knocks out FBI site
|
||
|
0x0e: White House threatens to punish hackers
|
||
|
0x0f: MS Refutes Windows 'Spy Key'
|
||
|
0x10: Teens plead innocent in hacking case
|
||
|
|
||
|
0x01>-------------------------------------------------------------------------
|
||
|
|
||
|
State of Defacements
|
||
|
Attrition
|
||
|
09.01.99
|
||
|
|
||
|
As of 09.01.99, the following statistics and information has been
|
||
|
generated based on the mirrors of defaced web sites kept at
|
||
|
www.attrition.org/mirror/attrition/
|
||
|
|
||
|
The word 'fuck' occured 1269 times in 584 out of 2145 mirrors dating back
|
||
|
to 95.06.12. 337 defaced pages have linked to or greeted 'attrition', the
|
||
|
largest mirror of defacements. Shortly after the Columbine shooting, 37
|
||
|
defacements made reference to the incident. To date, 31 defacements have
|
||
|
made reference to Serbia.
|
||
|
|
||
|
Average number of website defacements per day since 99.01.01: 3.0.
|
||
|
Average number of website defacements per day since 99.02.01: 2.5.
|
||
|
Average number of website defacements per day since 99.03.01: 4.0.
|
||
|
Average number of website defacements per day since 99.04.01: 8.9.
|
||
|
Average number of website defacements per day since 99.05.01: 12.7.
|
||
|
Average number of website defacements per day since 99.06.01: 10.4.
|
||
|
Average number of website defacements per day since 99.07.01: 10.6.
|
||
|
Average number of website defacements per day since 99.08.01: 10.3.
|
||
|
|
||
|
Total website defacements in 1995: 4
|
||
|
Total website defacements in 1996: 18
|
||
|
Total website defacements in 1997: 39
|
||
|
Total website defacements in 1998: 194
|
||
|
Total website defacements in 1999: 1905
|
||
|
|
||
|
Since 08.01.99
|
||
|
# of BSDi : 13 # of FreeBSD : 9
|
||
|
# of HP/UX : 1 # of IRIX : 11
|
||
|
# of Linux : 71 # of OSF1 : 3
|
||
|
# of SCO : 2 # of Solaris : 78
|
||
|
# of Win-NT : 109
|
||
|
|
||
|
Since 95.06.12
|
||
|
com: 1052 net: 124
|
||
|
org: 140 mil: 52
|
||
|
gov: 121
|
||
|
|
||
|
The past year has seen many high profile sites defaced. Among them:
|
||
|
C-Span (www.c-span.org), EBay (www.ebay.com), ABC News (www.abc.com),
|
||
|
Symantec (www.symantec.com), The White House (www.whitehouse.gov), The
|
||
|
Senate (www.senate.gov), GreenPeace (www.greenpeace.org), US Information
|
||
|
Agency (www.usia.gov), MacWeek (www.macweek.com), HotBot (www.hotbot.com),
|
||
|
Wired (www.wired.com), and more. Among the armed forces, all branches
|
||
|
including the Coast Guard have experienced at least one defacement.
|
||
|
|
||
|
0x02>-------------------------------------------------------------------------
|
||
|
|
||
|
L.A. district attorney drops Mitnick case
|
||
|
http://www.zdnet.com/zdnn/stories/news/0,4586,2310792,00.html?chkpt=hpqs014
|
||
|
August 6, 1999
|
||
|
|
||
|
Deputy district attorney says state case was 'mischarged' -- clears way
|
||
|
for Mitnick halfway house plea.
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
In 1993, the district attorney charged Mitnick with one count of illegally
|
||
|
accessing a Department of Motor Vehicles computer and retrieving
|
||
|
confidential information. The problem with that charge is that Mitnick,
|
||
|
posing as a Welfare Fraud investigator, simply picked up a telephone on
|
||
|
Dec. 24, 1992, and duped an employee accessing the DMV computer for him.
|
||
|
|
||
|
"Since Mitnick did not personally connect to the DMV computer, but either
|
||
|
he or someone else communicated with the DMV technician via a telephone
|
||
|
conversation," Bershin wrote in his motion to dismiss the case, "it would
|
||
|
be difficult to prove that Mitnick gained entry to the DMV computer, or
|
||
|
that he instructed or communicated with the logical, arithmetical or
|
||
|
memory function resources of the DMV computer."
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x03>-------------------------------------------------------------------------
|
||
|
|
||
|
Mitnick sentenced, ordered to pay $4,125
|
||
|
August 10, 1999 11:55 AM ET
|
||
|
http://www.zdnet.com/pcweek/stories/news/0,4153,1015902,00.html
|
||
|
|
||
|
LOS ANGELES -- Four years, five months and 22 days after it began, The
|
||
|
United States vs. Kevin Mitnick ended Monday when U.S. District Court
|
||
|
Judge Marianna Pfaelzer sentenced the hacker to 46 months in prison.
|
||
|
Mitnick was also ordered to pay $4,125 in restitution -- a fraction of the
|
||
|
$1.5 million federal prosecutors sought.
|
||
|
|
||
|
With credit for good behavior, Mitnick could be free by January 2000. Once
|
||
|
released, the hacker is ordered not to touch a computer or cellular
|
||
|
telephone without the written approval of his probation officer.
|
||
|
|
||
|
Mitnick is also immediately eligible for release to a halfway house at the
|
||
|
discretion of the Bureau of Prisons, although the judge recommended he
|
||
|
serve the remainder of his sentence in prison.
|
||
|
|
||
|
Mitnick pleaded guilty on March 26 to seven felonies, and admitted to
|
||
|
cracking computers at cellular telephone companies, software
|
||
|
manufacturers, ISPs and universities, as well as illegally downloading
|
||
|
proprietary software from some of the victim companies.
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x04>-------------------------------------------------------------------------
|
||
|
|
||
|
Clinton forms security panel
|
||
|
AUGUST 2, 1999
|
||
|
http://www.fcw.com/pubs/fcw/1999/0802/fcw-polsecurity-08-2-99.html
|
||
|
|
||
|
President Clinton last month signed an executive order to create the
|
||
|
National Infrastructure Assurance Council, the final organization to be
|
||
|
established as part of an overall structure to protect the critical
|
||
|
infrastructure of the United States against cyberterrorism and other
|
||
|
attacks.
|
||
|
|
||
|
[Very timely...]
|
||
|
|
||
|
The council will be made up of 30 people from federal, state and local
|
||
|
governments, as well as the private sector. As outlined in the May 1998
|
||
|
Presidential Decision Directive 63, its main purpose is to enhance and
|
||
|
continue to develop the partnership between the public and private sector
|
||
|
on initiatives already in place. This includes the Information Sharing and
|
||
|
Analysis Centers (ISACs) that are being set up across the country to
|
||
|
exchange information about vulnerabilities, cyberattacks and intrusions.
|
||
|
|
||
|
[So by the time this council is created, people elected, everything
|
||
|
setup.. This is slightly amusing considering the vice-president created
|
||
|
the Internet. *smirk*]
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x05>-------------------------------------------------------------------------
|
||
|
|
||
|
Bill reopens encryption access debate
|
||
|
AUGUST 16, 1999
|
||
|
http://www.fcw.com/pubs/fcw/1999/0816/fcw-newsencrypt-08-16-99.html
|
||
|
|
||
|
Renewing efforts to allow law enforcement agencies to access and read
|
||
|
suspected criminals' encrypted electronic files, the Clinton
|
||
|
administration has drafted a bill that would give those agencies access to
|
||
|
the electronic "keys" held by third parties.
|
||
|
|
||
|
The Cyberspace Electronic Security Act, the drafting of which is being led
|
||
|
by the Office and Management and Budget and the Justice Department,
|
||
|
"updates law enforcement and privacy rules for our emerging world of
|
||
|
widespread cryptography," according to an analysis accompanying the bill
|
||
|
obtained by Federal Computer Week.
|
||
|
|
||
|
[Oh yeah, this is them figuring a way to keep our best interests in mind!
|
||
|
Let law enforcement have access to everything, because they are always
|
||
|
good and honorable.]
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x06>-------------------------------------------------------------------------
|
||
|
|
||
|
The Hacker Hoax
|
||
|
August 18, 1999
|
||
|
http://www.currents.net/newstoday/99/08/18/news3.html
|
||
|
|
||
|
The world's press might have been fooled into believing that a Chinese
|
||
|
hacker group plans to bring down the country's information infrastructure.
|
||
|
According to stories that began circulating in July last year, the rogue
|
||
|
group, the Hong Kong Blondes, is made up of dissidents both overseas and
|
||
|
within the Chinese Government.
|
||
|
|
||
|
The rumours began when an interview with the group's leader was published
|
||
|
by US hacking group the Cult of the Dead Cow (CDC) at
|
||
|
http://www.cultdeadcow.com . In the interview, illusive Hong Kong Blondes
|
||
|
director Blondie Wong said that he had formed an organization named the
|
||
|
Yellow Pages, which would use information warfare to attack China's
|
||
|
information infrastructure.
|
||
|
|
||
|
The group threatened to attack both Chinese state organizations and
|
||
|
Western companies investing in the country. For their part, the CDC
|
||
|
claimed that they would train the Hong Kong Blondes in encryption and
|
||
|
intrusion techniques.
|
||
|
|
||
|
One year after the group's supposed launch, there is no evidence that the
|
||
|
Hong Kong Blondes ever existed. In fact, all evidence appears to indicate
|
||
|
that the Hong Kong Blondes report was a highly successful hoax.
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x07>-------------------------------------------------------------------------
|
||
|
|
||
|
Israeli Teen Finds Web Full of Security Holes
|
||
|
August 17, 1999
|
||
|
http://www.internetnews.com/intl-news/print/0,1089,6_184381,00.html
|
||
|
|
||
|
[Westport, CT] An independent consultant in Israel has released the
|
||
|
results of one of the first exhaustive surveys of Internet security,
|
||
|
hoping to provide a wake-up call for Internet companies.
|
||
|
|
||
|
With the help of a piece of homemade scanning software, Liraz Siri probed
|
||
|
nearly 36 million Internet hosts worldwide over a period of eight months.
|
||
|
Siri and his program, the Bulk Auditing Security Scanner or BASS, went
|
||
|
looking specifically for UNIX systems that were vulnerable to 18 widely
|
||
|
known security vulnerabilities -- holes for which vendors have already
|
||
|
released patches and other fixes.
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x08>-------------------------------------------------------------------------
|
||
|
|
||
|
Hotmail Hackers: 'We Did It'
|
||
|
4:00 p.m. 30.Aug.99.PDT
|
||
|
http://www.wired.com/news/news/technology/story/21503.html
|
||
|
|
||
|
A previously unknown group known as Hackers Unite has claimed
|
||
|
responsibility for publicizing Hotmail's security breach, which Microsoft
|
||
|
vehemently denied was the result of a backdoor oversight.
|
||
|
|
||
|
The group of eight hackers said Monday through a spokesman that they
|
||
|
announced the hole to the Swedish media to draw attention to what they say
|
||
|
is Microsoft's spotty security reputation.
|
||
|
|
||
|
The stunt exposed every Hotmail email account, estimated to number as many
|
||
|
as 50 million, to anyone with access to a Web browser.
|
||
|
|
||
|
[snip..]
|
||
|
|
||
|
Microsoft vehemently denied the backdoor suggestions, and instead
|
||
|
described the problem as "an unknown security issue."
|
||
|
|
||
|
"There is nothing to these allegations [of a backdoor in Hotmail]," said
|
||
|
MSN marketing director Rob Bennett. "It is not true. Microsoft values the
|
||
|
security and privacy of our users above all."
|
||
|
|
||
|
[I think if you sub the "." in that last statement with the word "that",
|
||
|
it is much more accurate.]
|
||
|
|
||
|
0x09>-------------------------------------------------------------------------
|
||
|
|
||
|
Scientists crack Net security code
|
||
|
Aug. 27
|
||
|
http://www.msnbc.com/news/305553.asp
|
||
|
|
||
|
A group of scientists claimed Friday to have broken an international
|
||
|
security code used to protect millions of daily Internet transactions,
|
||
|
exposing a potentially serious security failure in electronic commerce.
|
||
|
Researchers working for the National Research Institute for Mathematics
|
||
|
and Computer Science (CWI) in Amsterdam said consumers and some businesses
|
||
|
could fall victim to computer hackers if they get their hands on the right
|
||
|
tools.However, not every computer whiz has access to the equipment, worth
|
||
|
several million dollars, and no related Internet crimes have yet been
|
||
|
uncovered, the experts said.
|
||
|
|
||
|
The scientists used a Cray 900-16 supercomputer, 300 personal computers
|
||
|
and specially designed number-crunching software to break the RSA-155 code
|
||
|
the backbone of encryption codes designed to protect e-mail messages and
|
||
|
credit-card transactions.
|
||
|
|
||
|
THE SCIENTISTS USED a Cray 900-16 supercomputer, 300 personal computers
|
||
|
and specially designed number-crunching software to break the so-called
|
||
|
RSA-155 code the backbone of encryption codes designed to protect e-mail
|
||
|
messages and credit-card transactions.
|
||
|
|
||
|
Your everyday hacker wont be able to do this, said project director
|
||
|
Herman te Reile. You have to have extensive capacity, the money, and the
|
||
|
know-how, but we did it.
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x0a>-------------------------------------------------------------------------
|
||
|
|
||
|
NSA Lures Hackers
|
||
|
27 August 1999
|
||
|
http://www.currents.net/clickit/printout/news/28074924000990080.html
|
||
|
|
||
|
There's a future in the National Security Agency for young techies and
|
||
|
hackers, showing that maybe the Clinton administration is a little
|
||
|
off-base in its efforts to turn children away from the so-called dark side
|
||
|
of computer obsession.
|
||
|
|
||
|
According to a page on the NSA Website, last updated in December 1998, the
|
||
|
agency is looking for a few good teen-aged hacker-types, promising them
|
||
|
free college tuition, room and board if they come to work for the agency
|
||
|
for at least five years upon college graduation.
|
||
|
|
||
|
The NSA program is not exactly restricted to the dean's list cream of the
|
||
|
crop, however, requiring only a minimum SAT score of 1200 (or composite
|
||
|
Act score of 27), a 3.0 grade point average or higher, "demonstration of
|
||
|
leadership abilities" and US citizenship.
|
||
|
|
||
|
[snip...]
|
||
|
|
||
|
0x0b>-------------------------------------------------------------------------
|
||
|
|
||
|
Army to offer 'information survival' training
|
||
|
MAY 5, 1999
|
||
|
http://www.fcw.com/pubs/fcw/1999/0503/web-army-5-5-99.html
|
||
|
|
||
|
The Army this fall plans to offer an online graduate-level training course
|
||
|
on information systems survivability, teaching engineers to develop
|
||
|
systems capable of surviving any kind of technical glitch and network
|
||
|
attack.
|
||
|
|
||
|
[Define 'irony'. The army training anyone about security. Lets have a quick
|
||
|
look at some public validation for the army and security!
|
||
|
|
||
|
Date Web page defaced
|
||
|
------ ----------------
|
||
|
99.01.25 wwwjtuav.redstone.army.mil
|
||
|
99.03.02 www.bweb.wes.army.mil
|
||
|
99.03.07 wrair-www.army.mil
|
||
|
99.04.11 mdw-www.army.mil
|
||
|
99.04.19 www-anad.army.mil
|
||
|
99.05.01 www.rsc.stuttgart.army.mil
|
||
|
99.05.03 www.ett.redstone.army.mil
|
||
|
99.06.04 cenwo.nwo.usace.army.mil
|
||
|
99.06.24 www.monmouth.army.mil
|
||
|
99.06.27 www.army.mil
|
||
|
99.07.16 www.ado.army.mil
|
||
|
99.08.03 akamai.tamc.amedd.army.mil
|
||
|
99.08.29 www.cmtc.7atc.army.mil
|
||
|
|
||
|
Oh yes, sign me up please.]
|
||
|
|
||
|
0x0c>-------------------------------------------------------------------------
|
||
|
|
||
|
Clinton To Use hackers Against Yugoslav leader
|
||
|
http://www.attrition.org/errata/www/art.0109.html
|
||
|
|
||
|
President Clinton has approved a top-secret plan to destabilize Yugoslav
|
||
|
leader Slobodan Milosevic, using computer hackers to attack his foreign
|
||
|
bank accounts and a sabotage campaign to erode his public support,
|
||
|
|
||
|
[Yes, sneaky me. The URL above is part of the Errata page. Why? Because
|
||
|
several news outlets blindly reported this as the truth, when it is
|
||
|
highly likely it is not. Sensationalism at its finest.]
|
||
|
|
||
|
0x0d>-------------------------------------------------------------------------
|
||
|
|
||
|
Hack attack knocks out FBI site
|
||
|
May 26, 1999 6:44 PM PT
|
||
|
|
||
|
A skirmish between the FBI and a well-known hacker group seemingly erupted
|
||
|
Wednesday.
|
||
|
|
||
|
Not long after federal agents served search warrants on members of hacker
|
||
|
group Global Hell (gH), probably in connection with recent attacks on U.S.
|
||
|
government computers, the FBI's own Web site was attacked and is currently
|
||
|
offline.
|
||
|
|
||
|
Earlier on Wednesday, MSNBC was told by a member of gH that the FBI had
|
||
|
served search warrants on several members of the hacker group. Last week,
|
||
|
gH member Eric Burns (who also goes by the name Zyklon), was arrested in
|
||
|
connection with three separate attacks on U.S. government computers,
|
||
|
including systems at the U.S. Information Agency.
|
||
|
|
||
|
[Pay attention journalists. Dozens of you misread this to say the FBI web
|
||
|
page was defaced. It clearly says they were victim of a Denial of Service
|
||
|
attack.]
|
||
|
|
||
|
0x0e>-------------------------------------------------------------------------
|
||
|
|
||
|
White House threatens to punish hackers
|
||
|
June 1, 1999, 3:35 p.m. PT
|
||
|
http://www.news.com/News/Item/0,4,37257,00.html
|
||
|
|
||
|
Annoyed by a recent wave of attacks against official U.S. government Web
|
||
|
sites, the White House today warned hackers who target federal Web sites
|
||
|
that they will be caught and punished.
|
||
|
|
||
|
"There's a government-wide effort to make sure that our computer systems
|
||
|
remain secure," White House Press Secretary Joe Lockhart said in a
|
||
|
briefing. "For those who think that this is some sort of sport, I think
|
||
|
[it will be] less fun when the authorities do catch up with them...and
|
||
|
these people are prosecuted," he said.
|
||
|
|
||
|
[Busting the people that have already violated your security will
|
||
|
not make you secure in the future. Talk about blind to the world.]
|
||
|
|
||
|
0x0f>-------------------------------------------------------------------------
|
||
|
|
||
|
MS Refutes Windows 'Spy Key'
|
||
|
10:20 a.m. 3.Sep.99.PDT
|
||
|
http://www.wired.com/news/news/technology/story/21577.html
|
||
|
|
||
|
Microsoft is vehemently denying allegations by a leading cryptographer
|
||
|
that its Windows platform contains a backdoor designed to give a US
|
||
|
intelligence agency access to personal computers.
|
||
|
|
||
|
Andrew Fernandes, chief scientist for security software company Cryptonym
|
||
|
in North Carolina, claimed on his Web site early Friday that the National
|
||
|
Security Agency may have access to the core security of most major Windows
|
||
|
operating systems.
|
||
|
|
||
|
"By adding the NSA's key, they have made it easier -- not easy, but easier
|
||
|
-- for the NSA to install security components on your computer without
|
||
|
your authorization or approval," Fernandes said.
|
||
|
|
||
|
But Microsoft denied that the NSA has anything to do with the key.
|
||
|
|
||
|
[Yeah. The NSA isn't bright enough to change the name of a 'backdoor'
|
||
|
key from "_NSAKEY" to something a little less glaring.]
|
||
|
|
||
|
0x10>-------------------------------------------------------------------------
|
||
|
|
||
|
Teens plead innocent in hacking case
|
||
|
09/02/99- Updated 01:34 PM ET
|
||
|
http://www.usatoday.com/life/cyber/tech/ctg016.htm
|
||
|
|
||
|
JERUSALEM (AP) - Four teen-agers charged with hacking into the computer
|
||
|
systems of the Pentagon, NASA and the Israeli parliament pleaded innocent
|
||
|
Thursday, the lawyer for the alleged ringleader said. Shmuel Tzang said
|
||
|
his client, Ehud Tenenbaum, 19, broke no law when he penetrated the
|
||
|
Internet sites of American and Israeli institutions because there was no
|
||
|
notice on the sites declaring them off-limits.
|
||
|
|
||
|
[This is patently stupid. Because the systems didn't say "breaking in
|
||
|
is illegal", they didn't break the law? This level of stupidity is
|
||
|
indicative of the level they showed to get busted.]
|
||
|
|
||
|
|
||
|
----[ EOF
|