474 lines
25 KiB
Plaintext
474 lines
25 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Two, Issue 22, File 12 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXII/Part 4 PWN
|
|
PWN PWN
|
|
PWN Created by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN Written and Edited by PWN
|
|
PWN Knight Lightning and Taran King PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Networks Of Computers At Risk From Invaders December 3, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By John Markoff (New York Times)
|
|
|
|
Basic security flaws similar to the ones that let intruders gain illegal entry
|
|
to military computer networks in recent weeks are far more common than is
|
|
generally believed, system designers and researchers say.
|
|
|
|
And there is widespread concern that computer networks used for everyday
|
|
activities like making airline reservations and controlling the telephone
|
|
system are highly vulnerable to attacks by invaders considerably less skilled
|
|
than the graduate student whose rogue program jammed a nationwide computer
|
|
network last month.
|
|
|
|
For example, the air traffic control system could be crippled if someone
|
|
deliberately put wrong instructions into the network, effectively blinding
|
|
controllers guiding airplanes.
|
|
|
|
The two recent episodes have involved military computers: One at the Mitre
|
|
Corporation, a company with Pentagon contracts, and the other into Arpanet, a
|
|
Defense Department network with links to colleges. But illegal access to
|
|
computer systems can compromise the privacy of millions of people.
|
|
|
|
In 1984, TRW Inc. acknowledged that a password providing access to 90 million
|
|
credit histories in its files had been stolen and posted on a computerized
|
|
bulletin board system. The company said the password may have been used for as
|
|
long as a month.
|
|
|
|
This year an internal memorandum at Pacific Bell disclosed that sophisticated
|
|
invaders had illegally gained access to telephone network switching equipment
|
|
to enter private company computers and monitor telephone conversations.
|
|
|
|
Computer security flaws have also been exploited to destroy data. In March
|
|
1986 a computer burglar gained access by telephone to the office computer of
|
|
Rep. Ed Zschau of California, destroyed files and caused the computer to break
|
|
down. Four days later, staff workers for Rep. John McCain of Arizona, now a
|
|
senator, told the police they had discovered that someone outside their office
|
|
had reached into McCain's computer and destroyed hundreds of letters and
|
|
mailing addresses.
|
|
|
|
In Australia last year, a skilled saboteur attacked dozens of computers by
|
|
destroying an underground communication switch. The attack cut off thousands
|
|
of telephone lines and rendered dozens of computers, including those at the
|
|
country's largest banks, useless for an entire day.
|
|
|
|
Experts say the vulnerability of commercial computers is often compounded by
|
|
fundamental design flaws that are ignored until they are exposed in a glaring
|
|
incident. "Some vulnerabilities exist in every system," said Peter Neumann, a
|
|
computer scientist at SRI International in Menlo Park, California. "In the
|
|
past, the vendors have not really wanted to recognize this."
|
|
|
|
Design flaws are becoming increasingly important because of the rapidly
|
|
changing nature of computer communications. Most computers were once isolated
|
|
from one another. But in the last decade networks expanded dramatically,
|
|
letting computers exchange information and making virtually all large
|
|
commercial systems accessible from remote places. But computer designers
|
|
seeking to shore up security flaws face a troubling paradox: By openly
|
|
discussing the flaws, they potentially make vulnerabilities more known and thus
|
|
open to sabotage.
|
|
|
|
Dr. Fred Cohen, a computer scientist at the University of Cincinnati, said most
|
|
computer networks were dangerously vulnerable. "The basic problem is that we
|
|
haven't been doing networks long enough to know how to implement protection,"
|
|
Cohen said.
|
|
|
|
The recent rogue program was written by Robert Tappan Morris, a 23-year-old
|
|
Cornell University graduate student in computer science, friends of his have
|
|
said. The program appears to have been designed to copy itself harmlessly from
|
|
computer to computer in a Department of Defense network, the Arpanet. Instead
|
|
a design error caused it to replicate madly out of control, ultimately jamming
|
|
more than 6,000 computers in this country's most serious computer virus attack.
|
|
|
|
For the computer industry, the Arpanet incident has revealed how security flaws
|
|
have generally been ignored. Cohen said most networks, in effect, made
|
|
computers vulnerable by placing entry passwords and other secret information
|
|
inside every machine. In addition, most information passing through networks
|
|
is not secretly coded. While such encryption would solve much of the
|
|
vulnerability problem, it would be costly. It would also slow communication
|
|
between computers and generally make networks much less flexible and
|
|
convenient.
|
|
|
|
Encryption of data is the backbone of security in computers used by military
|
|
and intelligence agencies. The Arpanet network, which links computers at
|
|
colleges, corporate research centers and military bases, is not encrypted.
|
|
|
|
The lack of security for such information underscored the fact that until now
|
|
there has been little concern about protecting data.
|
|
|
|
Most commercial systems give the people who run them broad power over all parts
|
|
of the operation. If an illicit user obtains the privileges held by a system
|
|
manager, all information in the system becomes accessible to tampering.
|
|
|
|
The federal government is pushing for a new class of military and intelligence
|
|
computer in which all information would be divided so that access to one area
|
|
did not easily grant access to others, even if security was breached. The goal
|
|
is to have these compartmentalized security systems in place by 1992.
|
|
|
|
On the other hand, one of the most powerful features of modern computers is
|
|
that they permit many users to share information easily; this is lost when
|
|
security is added.
|
|
|
|
In 1985 the Defense Department designed standards for secure computer systems,
|
|
embodied in the Orange Book, a volume that defines criteria for different
|
|
levels of computer security. The National Computer Security Center, a division
|
|
of the National Security Agency, is now charged with determining if government
|
|
computer systems meet these standards.
|
|
|
|
But academic and private computer systems are not required to meet these
|
|
standards, and there is no federal plan to urge them on the private sector. But
|
|
computer manufacturers who want to sell their machines to the government for
|
|
military or intelligence use must now design them to meet the Pentagon
|
|
standards.
|
|
|
|
Security weaknesses can also be introduced inadvertently by changes in the
|
|
complex programs that control computers, which was the way Morris's program
|
|
entered computers in the Arpanet. These security weaknesses can also be
|
|
secretly left in by programmers for their convenience.
|
|
|
|
One of the most difficult aspects of maintaining adequate computer security
|
|
comes in updating programs that might be running at thousands of places around
|
|
the world once flaws are found.
|
|
|
|
Even after corrective instructions are distributed, many computer sites often
|
|
do not close the loopholes, because the right administrator did not receive the
|
|
new instructions or realize their importance.
|
|
_______________________________________________________________________________
|
|
|
|
Computer Virus Eradication Act of 1988 December 5, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The following is a copy of HR-5061, a new bill being introduced in the House by
|
|
Wally Herger (R-CA) and Robert Carr (D-Mich.).
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
100th Congress 2D Session H.R. 5061
|
|
|
|
To amend title 18, United States Code, to provide penalties for persons
|
|
interfering with the operations of computers through the use of programs
|
|
containing hidden commands that can cause harm, and for other purposes.
|
|
|
|
IN THE HOUSE OF REPRESENTATIVES July 14, 1988
|
|
Mr. Herger (for himself and Mr. Carr) introduced the following bill; which was
|
|
referred to the Committee on the Judiciary
|
|
|
|
A BILL
|
|
To ammend title 18, United States Code, to provide penalties for persons
|
|
interfering with the operations of computers through the use of programs
|
|
containing hidden commands that can cause harm, and for other purposes.
|
|
|
|
- - -
|
|
|
|
Be it enacted by the Senate and House of Representatives of the United States
|
|
of America in Congress assembled,
|
|
|
|
SECTION 1. SHORT TITLE.
|
|
This Act may be cited as the "Computer Virus Eradication Act of
|
|
1988".
|
|
|
|
SECTION 2. TITLE 18 AMENDMENT.
|
|
(A) IN GENERAL.- Chapter 65 (relating to malicious mischief) of
|
|
title 18, United States Code, is amended by adding at the end the
|
|
following:
|
|
|
|
S 1368. Disseminating computer viruses and other harmful computer
|
|
programs
|
|
(a) Whoever knowingly --
|
|
(1) inserts into a program for a computer information or commands,
|
|
knowing or having reason to believe that such information or
|
|
commands will cause loss to users of a computer on which such
|
|
program is run or to those who rely on information processed
|
|
on such computer; and
|
|
(2) provides such a program to others in circumstances in which
|
|
those others do not know of the insertion or its effects; or
|
|
attempts to do so, shall if any such conduct affects
|
|
interstate or foreign commerce, be fined under this title or
|
|
imprisoned not more than 10 years, or both.
|
|
(b) Whoever suffers loss by reason of a violation of subsection (a)
|
|
may, in a civil action against the violator, obtain appropriate
|
|
relief. In a civil action under this section, the court may
|
|
award to the prevailing party a reasonable attorney's fee and
|
|
other litigation expenses.
|
|
|
|
|
|
(B) CLERICAL AMENDMENT.- The table of sections at the begining of
|
|
chapter 65 of title 18, United States Code, is amended by adding at
|
|
the end the following:
|
|
S 1368. Disseminating computer viruses and other harmful computer
|
|
programs.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
NOTE: The above text was typed in by hand from a printed copy of HR5 061.
|
|
There is a possibility that there may be typographical errors which
|
|
could affect the nature of the bill.
|
|
|
|
For an official copy of the bill, please contact:
|
|
|
|
Mr. Doug Riggs
|
|
1108 Longworth Bldg
|
|
Washington D.C. 20515
|
|
|
|
Information Presented by
|
|
Don Alvarez of the MIT Center For Space Research
|
|
_______________________________________________________________________________
|
|
|
|
Virus Conference In Arlington, Virginia December 5, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Entitled "Preventing and Containing Computer Virus Attacks", it takes place
|
|
January 30-31, in Arlington, VA. Speakers include Representative Wally Herger
|
|
(R-CA), a special agent from the FBI, John Landry (ADAPSO virus committee
|
|
chairman), Patricia Sission from NASA, as well as a collection of attorneys and
|
|
business folk. The conference is chaired by Dave Douglass, no information
|
|
provided. It supposedly costs $695.
|
|
|
|
The address provided is:
|
|
|
|
United Communications Group
|
|
4550 Montgomery Avenue
|
|
Suite 700N
|
|
Bethesda, MD 20814-3382
|
|
|
|
|
|
Information Provided By Gregg Tehennepe
|
|
_______________________________________________________________________________
|
|
|
|
New York Times Reviews Novel About Computer Sabotage December 7, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The Sunday, December 4, 1988 issue of the New York Times Book Review (their
|
|
Christmas Books issue) prominently reviews a new novel, 'Trapdoor,' by Bernard
|
|
J. O'Keefe. The premise (from the review by Newgate Callender, NYT's crime
|
|
fiction reviewer):
|
|
|
|
"A brilliant American woman of Lebanese descent has developed the computer code
|
|
that controls the operation of all our nuclear devices. Turned down for the
|
|
job she has sought, convinced male chauvinism is the reason, she is ripe to be
|
|
conned by a Lebanese activist. At his suggestion she inserts a virus into the
|
|
computer system that in a short time will render the entire American nuclear
|
|
arsenal useless. ... The Lebanese President ... demands that Israel withdraw
|
|
from the West Bank, or else he will tell the Russians that the United States
|
|
will lie helpless for a week or so."
|
|
|
|
Callender's review begins with the lead sentence, "November 2, 1988, was the
|
|
day computers in American went mad, thanks to the 'virus' program inserted by
|
|
the now-famous, fun-loving Robert T. Morris, Jr."
|
|
|
|
Some background on the author, also from the review:
|
|
|
|
"Bernard J. O'Keefe (is) chairman of the high-tech company EG&G and of an
|
|
international task force on nuclear terrorism ... (and is) the author
|
|
of a nonfiction book called 'Nuclear Hostages.' O'Keefe says, "I wrote this
|
|
parable to point out the complexity of modern technology and to demonstrate
|
|
how one error, one misjudgment, or one act of sabotage could lead to actions
|
|
that would annihilate civilization.""
|
|
|
|
Callender also says "...the execution is less brilliant than the idea. The
|
|
book has the usual flashbacks, the usual stereotyped characters, the usual
|
|
stiff dialogue."
|
|
|
|
Although the reviewer doesn't say so, the premise of this novel is quite
|
|
similar to a 1985 French thriller, published in the U.S. as 'Softwar.' That
|
|
novel was also based on the idea that a nation's arsenal could be completely
|
|
disabled from a single point of sabotage, although in 'Softwar' it was the
|
|
Soviet Union on the receiving end. Popular reviewers of both books apparently
|
|
find nothing implausible in the premise.
|
|
_______________________________________________________________________________
|
|
|
|
Hacker Enters U.S. Lab's Computers December 10, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Thomas H. Maugh II (Los Angeles Times Service)
|
|
|
|
A computer hacker has entered computers at the government's Lawrence Livermore
|
|
Laboratory in the San Francisco Bay area eight times since last Saturday, but
|
|
has not caused any damage and has not been able to enter computers that contain
|
|
classified information, Livermore officials said Friday. [Do they ever admit
|
|
to anyone gaining access to classified data? -KL]
|
|
|
|
Nuclear weapons and the Star Wars defense system are designed at Livermore, but
|
|
information about those projects is kept in supercomputers that are physically
|
|
and electronically separate from other computers at the laboratory.
|
|
|
|
The hacker, whose identitiy remains unknown, entered the non-classified
|
|
computer system at Livermore through Internet, a nationwide computer network
|
|
that was shut down at the beginning of November by a computer virus. Chuck
|
|
Cole, Livermore's chief of security, said the two incidents apparently are
|
|
unrelated.
|
|
|
|
The hacker entered the computers through an operating system and then through a
|
|
conventional telephone line, he gave himself "super-user" status, providing
|
|
access to virtually all functions of the non-classified computer systems.
|
|
|
|
Officials quickly limited the super-user access, although they left some
|
|
computers vulnerable to entry in the hope of catching the intruder.
|
|
|
|
"There has been no maliciousness so far," Cole said. "He could have destroyed
|
|
data, but he didn't. He just looks through data files, operating records, and
|
|
password files...It seems to be someone doing a joy-riding thing."
|
|
_______________________________________________________________________________
|
|
|
|
Shattering Revelations December 11, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from the RISKS Digest (Edited for this presentation)
|
|
|
|
[Shatter is a hacker based in England, he is currently accused of breaking into
|
|
computers at Massachusetts Institute of Technology. -KL]
|
|
|
|
(In this article, "IT" seems to refer to the computer community as a whole -KL)
|
|
|
|
Some of you may have already heard of me via articles in the Wall Street
|
|
Journal, New York Times, etc, but for those of you who do not have access to
|
|
copies of these newspapers I am a hacker of over 10 years activity who is based
|
|
near Nottingham, England [Rumored to be a false statement]. My specialities
|
|
are the various packet switched networks around the world such as PSS, Telepac,
|
|
Transpac, etc with various forays into UNIX, NOS/VE VMS, VM/SP, CMS, etc.
|
|
|
|
I feel that as a hacker with so much activity and expirience I am qualified to
|
|
make the following points on behalf of the whole hacking community.
|
|
|
|
Hackers are not the vandals and common criminals you all think we are in fact
|
|
most of the "TRUE" hackers around have a genuine respect and love for all forms
|
|
of computers and the data that they contain. We are as a community very
|
|
responsible and dedicated to the whole idea of IT, but we also have a strong
|
|
dislike to the abuse of IT that is perpetrated by various governments and
|
|
organizations either directly or indirectly. There is of course a small
|
|
minority of so called hackers who do cause trouble and crash systems or steal
|
|
money, but these people on the whole are dealt with by other hackers in a way
|
|
that most of you could not even think of and most never repeat their "crimes"
|
|
again.
|
|
|
|
The term "HACKER" is still one to be very proud of and I am sure that in days
|
|
past, anyone with a computer was called a hacker and they were very proud of
|
|
the fact that someone felt that you had a great technical expertise that
|
|
warrented the use of the term. However, all of the accusers out there now
|
|
suffer from the standard problem that nearly all people involved within IT have
|
|
and that is non-communication. You never pass on the information that you pick
|
|
up and teach to others within IT [American Government organizations and
|
|
Educational Institutes are among the greatest offenders] and this allows the
|
|
hacking community [who do communicate] to be at least one step ahead of the
|
|
system administrators when it comes to finding security problems and finding
|
|
the cause and solution for the problem.
|
|
|
|
A case in point is the recent Arpanet Worm and the FTP bug. Both these
|
|
problems have been known for many months if not years but, when talking to
|
|
various system administrators recently, not one of them had been informed about
|
|
them and this left their systems wide open even though they had done all they
|
|
could to secure them with the information they had.
|
|
|
|
An interesting piece of information is that hackers in England knew about
|
|
Morris's Worm at least 12 hours before it became public knowledge and although
|
|
England was not able to be infected due to the hardware in use, we were able to
|
|
inform the relevent people and patrol Internet to Janet gateways to look for
|
|
any occurance of the Worm and therefore we performed a valuble service to the
|
|
computing community in England -- although we did not get any thanks or
|
|
acknowledgement for this service.
|
|
|
|
Hackers should be nurtured and helped to perform what they consider a hobby.
|
|
Some people may do crosswords for intelectual challenge -- I study computers
|
|
and learn about how things interact together to function correctly (or
|
|
incorrectly as the case may be). The use of a group of hackers can perform a
|
|
valuable service and find problems that most of you could not even start to
|
|
think of or would even have the inclination to look for.
|
|
|
|
So please don't treat us like lepers and paupers. Find yourself a "TAME"
|
|
hacker and show him the respect he deserves. He will perform a valuble service
|
|
for you. Above all COMMUNICATE with each other don't keep information to
|
|
yourselves.
|
|
|
|
Bst Rgrds
|
|
Shatter
|
|
_______________________________________________________________________________
|
|
|
|
IBM Sells Rolm To Siemens AG December 14, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
International Business Machines Corp. (IBM) announced on Tuesday that it was
|
|
selling its Rolm telephone equipment subsidiary to West Germany's Siemens AG.
|
|
|
|
Rolm has lost several hundred million dollars since IBM bought it in 1984 for
|
|
$1.5 billion. Rolm was the first, or one of the first companies to market
|
|
digital PBX systems.
|
|
|
|
As most telecom hobbyists already know, the PBX market has been very soft for
|
|
years. It has suffered from little or no growth and very bitter price
|
|
competition.
|
|
|
|
Siemens, a leading PBX supplier in Europe wants to bolster its sales in the
|
|
United States, and believes it can do so by aquiring Rolm's sales and service
|
|
operations. Quite obviously, it will also gain access to some of the lucrative
|
|
IBM customers in Europe.
|
|
|
|
Rolm was an early leader in digital PBX's, but they were surpassed in 1984 by
|
|
AT&T and Northern Telecom Ltd. of Canada. Part of the strategy behind IBM's
|
|
purchase of Rolm was IBM's belief that small personal computers would be linked
|
|
through digital PBX's. Although this has happened, most businesses seem to
|
|
prefer ethernet arrangements; something neither IBM or Rolm had given much
|
|
thought to. IBM was certain the late 1980's would see office computers
|
|
everywhere hooked up through PBX's.
|
|
|
|
IBM made a mistake, and at a recent press conference they admitted it and
|
|
announced that Rolm was going bye-bye, as part of the corporate restructuring
|
|
which has seen IBM divest itself of numerous non-computer related businesses in
|
|
the past several months. From its beginning until 1984, Rolm could not run
|
|
itself very well; now IBM has washed its corporate hands. Time will tell how
|
|
much luck the Europeans have with it.
|
|
|
|
Information Contributed by Patrick Townson
|
|
_______________________________________________________________________________
|
|
|
|
Virus Invades The Soviet Union December 19, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
>From The San Francisco Chronicle (P. A16)
|
|
|
|
(UPI) - The Soviet Union announced on Decemeber 18, 1988 that that so-called
|
|
computer viruses have invaded systems in at least five government-run
|
|
institutions since August, but Soviet scientists say they have developed a way
|
|
to detect known viruses and prevent serious damage.
|
|
|
|
In August 1988, a virus infected 80 computers at the Soviet Academy of Sciences
|
|
before it was brought under control 18 hours later. It was traced to a group
|
|
of Soviet and foreign schoolchildren attending the Institute's summer computer
|
|
studies program, apparently resulting from the copying of game programs.
|
|
|
|
Sergei Abramov of the Soviet Academy of Sciences claims they have developed a
|
|
protective system, PC-shield, that protects Soviet computers against known
|
|
virus strains. It has been tested on IBM computers in the Soviet Union. "This
|
|
protective system has no counterpart in the world," he said (although the
|
|
details remain a state secret).
|
|
_______________________________________________________________________________
|
|
|
|
Phrack World News Quicknotes Issue XXII
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
1. Rumor has it that the infamous John Draper aka Captain Crunch is currently
|
|
running loose on the UUCP network. Recently, it has been said that he has
|
|
opened up some sort of information gateway to Russia, for reasons unknown.
|
|
-------------------------------------------------------------------------------
|
|
2. Information Available For A Price
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
A company called Credit Checker and Nationwide SS says that anyone can;
|
|
o Take a lot of risk out of doing business.
|
|
o Check the credit of anyone, anywhere in the United States
|
|
o Pull Automobile Drivers License information from 49 states
|
|
o Trace people by their Social Security Number
|
|
|
|
By "Using ANY computer with a modem!"
|
|
|
|
To subscribe to this unique 24-hour on-line network call 1-800-255-6643.
|
|
|
|
Can your next door neighbor really afford that new BMW ?
|
|
-------------------------------------------------------------------------------
|
|
3. Reagan Signs Hearing-Aid Compatibility Bill
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
There is new legislation recently passed which requires all new phones to be
|
|
compatible with hearing aids by next August. The law requires a small device
|
|
to be included in new phones to eliminate the loud squeal that wearers of
|
|
hearing aids with telecoils pick up when using certain phones. Importers are
|
|
not exempted from the law. Cellular phones and those manufactured for export
|
|
are exempt.
|
|
_______________________________________________________________________________
|
|
=========================================================================
|
|
|