526 lines
25 KiB
Plaintext
526 lines
25 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 29, File #11 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXIX/Part 2 PWN
|
|
PWN PWN
|
|
PWN November 17, 1989 PWN
|
|
PWN PWN
|
|
PWN Created, Written, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Offensive Message Flashes At Busy City Corner October 25, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Linda Wheeler (Washington Post)
|
|
|
|
An offensive message that mystified the owners of an electronic information
|
|
board was flashed Monday, October 23 at Connecticut Avenue and L Street NW, one
|
|
of the city's (Washington DC) busiest intersections.
|
|
|
|
A Georgetown University law student, Craig Dean, said he saw the message;
|
|
|
|
"HELP STAMP OUT A.I.D.S. NOW: KILL ALL QUEERS AND JUNKIES"
|
|
|
|
It flashed five times in 25 minutes. Minutes after seeing the message, he
|
|
called the city Human Rights Office and the Washington Blade, a gay community
|
|
newspaper.
|
|
|
|
Doug Hinckle, a staff photographer for the Blade, saw the message flash once
|
|
and photographed it.
|
|
|
|
Judith Miller, president of Miller Companies, which own the building at 1101
|
|
Connecticut Avenue NW and the message board, said she did not know how the
|
|
statement got onto the board. She refused to believe it had appeared until she
|
|
was shown of the photographs.
|
|
|
|
Her company has complete control of the board and does not accept any paid
|
|
messages or advertisements, Miller said. "I would never do anything like
|
|
that," she said. "There is no way I would allow such a statement to appear."
|
|
|
|
Yesterday, Keller, a five-year employee of the Miller Companies, said he did
|
|
not write the statement and does now know how it became part of the normal flow
|
|
of headline news.
|
|
|
|
Miller said she believes her computer system may have a "virus" and will have
|
|
experts search to find where the unauthorized statement originated. "How
|
|
absolutely awful," she said of the message.
|
|
_______________________________________________________________________________
|
|
|
|
"WANK" Worm On SPAN Network October 17, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
>From The Computer Emergency Response Team
|
|
|
|
On October 16, the CERT received word from SPAN network control that a worm was
|
|
attacking SPAN VAX/VMS systems. This worm affects only DEC VMS systems and is
|
|
propagated via DECnet protocols, not TCP/IP protocols. If a VMS system had
|
|
other network connections, the worm was not programmed to take advantage of
|
|
those connections. The worm is very similar to last year's HI.COM (or Father
|
|
Christmas) worm.
|
|
|
|
This is NOT A PRANK. Serious security holes are left open by this worm. The
|
|
worm takes advantage of poor password management, modifies .com files, creates
|
|
a new account, and spreads to other systems via DECnet.
|
|
|
|
It is also important to understand that someone in the future could launch this
|
|
worm on any DECnet based network. Many copies of the virus have been mailed
|
|
around. Anyone running a DECnet network should be warned.
|
|
|
|
R. Kevin Oberman from Lawrence Livermore National Labs reports:
|
|
|
|
"This is a mean bug to kill and could have done a lot of damage.
|
|
Since it notifies (by mail) someone of each successful penetration
|
|
and leaves a trapdoor (the FIELD account), just killing the bug is
|
|
not adequate. You must go in an make sure all accounts have
|
|
passwords and that the passwords are not the same as the account
|
|
name."
|
|
|
|
The CERT/CC also suggests checking every .com file on the system. The worm
|
|
appends code to .com files which will reopen a security hole everytime the
|
|
program is executed.
|
|
|
|
An analysis of the worm appears below and is provided by R. Kevin Oberman of
|
|
Lawrence Livermore National Laboratory. Included with the analysis is a DCL
|
|
program that will block the current version of the worm. At least two versions
|
|
of this worm exist and more may be created. This program should give you
|
|
enough time to close up obvious security holes.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Report on the W.COM worm.
|
|
R. Kevin Oberman
|
|
Engineering Department
|
|
Lawrence Livermore National Laboratory
|
|
October 16, 1989
|
|
|
|
The following describes the action of the W.COM worm (currently based on the
|
|
examination of the first two incarnations). The replication technique causes
|
|
the code to be modified slightly which indicates the source of the attack and
|
|
learned information.
|
|
|
|
All analysis was done with more haste than I care for, but I believe I have all
|
|
of the basic facts correct.
|
|
|
|
Here is a description of the program:
|
|
|
|
1. The program assures that it is working in a directory to which the owner
|
|
(itself) has full access (Read, Write,Execute, and Delete).
|
|
|
|
2. The program checks to see if another copy is still running. It looks for a
|
|
process with the first 5 characters of "NETW_". If such is found, it
|
|
deletes itself (the file) and stops its process.
|
|
|
|
Note: A quick check for infection is to look for a process name starting
|
|
with "NETW_". This may be done with a SHOW PROCESS command.
|
|
|
|
3. The program then changes the default DECNET account password to a random
|
|
string of at least 12 characters.
|
|
|
|
4. Information on the password used to access the system is mailed to the user
|
|
GEMPAK on SPAN node 6.59. Some versions may have a different address.
|
|
|
|
5. The process changes its name to "NETW_" followed by a random number.
|
|
|
|
6. It then checks to see if it has SYSNAM priv. If so, it defines the system
|
|
announcement message to be the banner in the program:
|
|
|
|
W O R M S A G A I N S T N U C L E A R K I L L E R S
|
|
_______________________________________________________________
|
|
\__ ____________ _____ ________ ____ ____ __ _____/
|
|
\ \ \ /\ / / / /\ \ | \ \ | | | | / / /
|
|
\ \ \ / \ / / / /__\ \ | |\ \ | | | |/ / /
|
|
\ \ \/ /\ \/ / / ______ \ | | \ \| | | |\ \ /
|
|
\_\ /__\ /____/ /______\ \____| |__\ | |____| |_\ \_/
|
|
\___________________________________________________/
|
|
\ /
|
|
\ Your System Has Been Officically WANKed /
|
|
\_____________________________________________/
|
|
|
|
You talk of times of peace for all, and then prepare for war.
|
|
|
|
7. If it has SYSPRV, it disables mail to the SYSTEM account.
|
|
|
|
8. If it has SYSPRV, it modifies the system login command procedure to
|
|
APPEAR to delete all of a user's file. (It really does nothing.)
|
|
|
|
9. The program then scans the accounts logical name table for command
|
|
procedures and tries to modify the FIELD account to a known password with
|
|
login form any source and all privs. This is a primitive virus, but very
|
|
effective IF it should get into a privileged account.
|
|
|
|
10. It proceeds to attempt to access other systems by picking node numbers at
|
|
random. It then used PHONE to get a list of active users on the remote
|
|
system. It proceeds to irritate them by using PHONE to ring them.
|
|
|
|
11. The program then tries to access the RIGHTSLIST file and attempts to access
|
|
some remote system using the users found and a list of "standard" users
|
|
included with the worm. It looks for passwords which are the same as that
|
|
of the account or are blank. It records all such accounts.
|
|
|
|
12. It looks for an account that has access to SYSUAF.DAT.
|
|
|
|
13. If a priv. account is found, the program is copied to that account and
|
|
started. If no priv account was found, it is copied to other accounts
|
|
found on the random system.
|
|
|
|
14. As soon as it finishes with a system, it picks another random system and
|
|
repeats (forever).
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Computer Network At NASA Attacked By Rogue Program October 18, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
A rogue computer program attacked a worldwide network of the National
|
|
Aeronautics and Space Administration on Monday, October 16, inflicting no
|
|
damage but forcing officials to disconnect the network from sensitive military
|
|
and space systems.
|
|
|
|
Security experts speculated that the program was written by someone who opposed
|
|
Tuesday's (October 17) scheduled launching of the space shuttle Atlantis, which
|
|
was to carry a nuclear-powered satellite into orbit. The launching was
|
|
postponed because of bad weather.
|
|
|
|
NASA officials said the rogue program attacked an academic and research
|
|
network, the Space Physics Analysis Network, which is not used for space
|
|
shuttle mission control.
|
|
|
|
But a NASA official said the agency felt compelled to disconnect several links
|
|
between the network and an operational space shuttle network as a precaution.
|
|
|
|
Computer security experts at several national laboratories said the Department
|
|
of Defense had also severed the connection between commercial and research
|
|
networks and nonclassified network that connects United States military
|
|
installations and contractors around the world.
|
|
|
|
The program was designed to copy itself secretly and send unwanted, sometimes
|
|
vulgar messages to users of the NASA network. It also tricks users into
|
|
thinking that data have been destroyed, although no data are damaged.
|
|
|
|
Like similar programs that have been sent into computer networks by pranksters
|
|
and saboteurs, it exploited a flaw in the security system designed to protect
|
|
the computers on the network.
|
|
|
|
Computer security experts said Tuesday that they knew of about 60 computers
|
|
that had been affected by the program. A NASA spokesman said the program was
|
|
still spreading.
|
|
|
|
While the network is widely available to academic researchers with personal
|
|
computers, the rogue program was designed to attack only 6,000 computers
|
|
manufactured by the Digital Equipment Corporation.
|
|
|
|
The flaw in the security of the Digital Equipment computers had been widely
|
|
publicized over a year ago even before a similar rogue program jammed a group
|
|
of interconnected international networks known as the Internet. NASA officials
|
|
said the program was only able to attack computers in which the necessary steps
|
|
had not been taken to correct the flaw.
|
|
|
|
Among the messages the program displayed on all infected computers was one that
|
|
read: "Worms Against Nuclear Killers. You talk of times of peace for all, and
|
|
then prepare for war."
|
|
|
|
Computer scientists call this kind of program a worm, a reference to a program
|
|
first described in the novel "Shockwave Rider" by a science fiction writer,
|
|
John Brunner.
|
|
_______________________________________________________________________________
|
|
|
|
Virus Controversies Again October 6, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
"The issue has also sparked interest among computer scientists."
|
|
|
|
Harold Highland, editor of Computers & Security, a professional journal, said
|
|
he had received two research papers describing how to create such anti-virus
|
|
programs.
|
|
|
|
He has not decided whether to publish them.
|
|
|
|
"No one has raised the obvious ethical questions," he added. "I would hate to
|
|
see a virus released to fight viruses. Until it's tested you don't know
|
|
whether it's going to do more damage than the program it is designed to fight."
|
|
|
|
A number of these programs have already been written, computer researchers
|
|
said.
|
|
|
|
The one that destroyed the data on business and governmental personal computers
|
|
in the United States was reportedly designed by a Venezuelan programmer. How
|
|
many computers were affected and where they were is unclear.
|
|
|
|
That program is called Den Zuk, or Search. It was intended to attack a
|
|
destructive program known as the Brain Virus that was distributed in 1986 by
|
|
two brothers who owned a small computer store in Pakistan.
|
|
|
|
Errors in the design of the program illustrate the potential danger of such
|
|
viruses, critics say. Fridrik Skulason, a microcomputer specialist at the
|
|
University of Iceland in Reykjavik, who has disassembled the program, said the
|
|
author of Den Zuk had failed to take into account the different capacities of
|
|
disks available for IBM and IBM-compatible machines.
|
|
|
|
Because of that simple error, when the program infects a higher-capacity disk
|
|
it destroys data.
|
|
|
|
"They probably wrote with good intention," he said. "The only problem is that
|
|
the programmers were not able to do their job correctly."
|
|
|
|
At least two other anti-viral viruses have already been devised, said Russell
|
|
Brand, a computer security researcher at Lawrence Livermore.
|
|
|
|
He said programmers at one company, which he would not identify, had written
|
|
the programs to combat the Scores virus, a program that infected Macintosh
|
|
computers last year.
|
|
|
|
He added that even though the programs were designed so they could not go
|
|
beyond the company's own computers, there had been a heated debate over whether
|
|
to deploy the programs. He said he did not know how it was decided.
|
|
|
|
Brand said a group of computer researchers he works with at Lawrence Livermore
|
|
had written several self-replicating programs after the appearance of the rogue
|
|
program that Morris of Cornell is accused of writing. But he added that the
|
|
group had never given permission to release the programs.
|
|
|
|
The debate over vigilante viruses is part of a broader discussion now taking
|
|
place among some computer researchers and programmers over what is being termed
|
|
"forbidden knowledge."
|
|
|
|
"There are ethical questions any time you send something out there that may
|
|
find itself invited on to somebody else's computer," said Pamela Kane, author
|
|
of a book on computer virus protection.
|
|
|
|
In California this month a group of computer hackers plans to hold a forum on
|
|
"forbidden knowledge in a technological society."
|
|
|
|
While the role of the computer hacker has been viewed as mischievous in a
|
|
negative way, hackers have consistently played a role as innovators, said Lee
|
|
Felsenstein, a Berkeley, California, computer expert who designed several early
|
|
personal computers.
|
|
|
|
"Computer hacking was originally a response to the perception of a priesthood's
|
|
control over immensely powerful technological resources," he said. "Informed
|
|
individuals were able to break the power of this priesthood through gaining and
|
|
spreading the body of forbidden knowledge."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Dreaded Personal Computer Virus May Be Only A Cold October 6, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Don Clark (New York Times)
|
|
|
|
It won't be much of a plague. But the hysteria anticipating it has been
|
|
world-class.
|
|
|
|
Those observations come from computer-security experts as they await Datacrime,
|
|
a virus program set to attack IBM-compatible personal computers starting
|
|
Thursday, October 12, 1989.
|
|
|
|
Analyses of the program, also called the Columbus Day Virus, show that it is
|
|
indeed destructive. It just hasn't spread very far.
|
|
|
|
"It's going to be the week of the non-event," predicted John McAfee, a Santa
|
|
Clara, California, consultant who serves as chairman of the Computer Virus
|
|
Industry Association. "You have more chance of being hit by a meteor than
|
|
getting this virus."
|
|
|
|
McAfee Associates, which acts as a clearinghouse for virus information, has
|
|
received just seven confirmed reports of Datacrime in six months -- compared
|
|
with three to 50 reports per day about another virus that originated in Israel
|
|
in 1987. He thinks only 50 copies of Datacrime exist, and 40 of those are in
|
|
the hands of researchers.
|
|
|
|
"It's gotten more publicity than it deserves," agreed Russell Brand, another
|
|
virus expert, who advises Lawrence Livermore National Laboratory.
|
|
|
|
Brand expects to find just 20 copies among the 75,000 computers he monitors at
|
|
1,000 sites.
|
|
|
|
Such projections are disputed by some. They are based on how often Datacrime
|
|
has been detected by computer users using special software that scans their
|
|
systems for the virus.
|
|
|
|
The virus could have infected many users who have not bothered to scan their
|
|
systems, McAfee concedes.
|
|
|
|
Fears have been whipped up by the news media and computer managers at companies
|
|
and government agencies. Companies promoting products to eradicate viruses
|
|
also have played a role -- understandably.
|
|
|
|
Staid IBM Corporation this week took the unusual step of offering a program
|
|
that checks systems for viruses. The company hasn't detected the virus in its
|
|
own operations, but concedes that many customers are worried. "They are asking
|
|
us how we protect our software-development operations from viruses," said Bill
|
|
Vance, who was appointed a year ago as IBM's director of secure systems.
|
|
|
|
Bank of America, a huge IBM customer with 15,000 PCs, recently put out a
|
|
company-wide notice advising users to make backup copies of their computer data
|
|
by Wednesday, the day before the virus is programmed to strike.
|
|
|
|
Three different government agencies have panicked and sent out multiple
|
|
versions of incorrect advice," Brand said.
|
|
|
|
Worried calls have deluged McAfee's office, which has just three lines for
|
|
computer communications and three for voice.
|
|
|
|
"We put the phone down and it's 30 seconds before it rings again," he said.
|
|
|
|
Computer sleuths detected Datacrime -- and have detected other viruses -- by
|
|
looking for changes in the size of data files and in the way programs operate.
|
|
The underlying code used to write the program, once disassembled by experts,
|
|
indicates when the program will activate itself.
|
|
|
|
The identity of Datacrime's author isn't known, although some reports have
|
|
linked the virus to an anonymous hacker in Austria. It first began showing up
|
|
in March, McAfee said, and gained notoriety after it was discussed at the
|
|
midsummer Galactic Hackers Conference in Amsterdam.
|
|
|
|
It appears to be relatively prevalent in the Netherlands and other European
|
|
countries. Dutch computer users have reportedly bought hundreds of programs
|
|
that are said to detect and destroy the program.
|
|
|
|
Like other viruses, Datacrime rides along with innocuous programs when they are
|
|
exchanged over a computer network or computer bulletin board or through
|
|
exchange of infected disks. Unlike many viruses, it has been designed to later
|
|
insert itself in data files that users don't often examine.
|
|
|
|
If one of the programs is executed after the target date, Datacrime proceeds
|
|
with its dirty work -- destroying the directory used to keep track of files on
|
|
a computer's hard disk. The crime is analogous to destroying a card file in
|
|
the library.
|
|
|
|
"By destroying this one table you can't find where any of your data is," said
|
|
Brand.
|
|
|
|
But no one should really be in a fix if he makes backup copies of data, experts
|
|
say. The data, once safely stored on another disk drive or on magnetic tape,
|
|
can be restored by computer professionals even if the virus has infected the
|
|
backup files.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
"Vaccines" To Hunt Down Rogue Programs October 6, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
Ever since a rogue program created by a graduate student jammed a nationwide
|
|
computer network last year, the rapid spread of such disruptive software, often
|
|
known as viruses, has caused growing alarm among computer users.
|
|
|
|
Now, to fight fire with fire, some companies, individuals and even a government
|
|
research laboratory are crafting a new breed of what have been called
|
|
anti-viruses to hunt down intruders.
|
|
|
|
The trouble is, some computer security experts say, the problem of viruses may
|
|
be exaggerated -- and the new crime fighter may do even more damage than the
|
|
criminal.
|
|
|
|
Much like an infection, a well-intended but badly designed program to stop
|
|
viruses can run amok, knocking out thousands of computers or destroying vast
|
|
amounts of data.
|
|
|
|
Indeed, one of the anti-virus programs intended to defeat a known virus has
|
|
already destroyed data on business and governmental personal computers in the
|
|
United States.
|
|
|
|
The issue has touched off a heated debate over whether the creation of these
|
|
high-technology vigilantes is a responsible action. "The risks are just
|
|
enormous," said Peter Neumann, a computer security expert at SRI International,
|
|
a technology research center in Menlo Park, California. "It's an unbelievably
|
|
unsafe thing to do."
|
|
|
|
But Chris Traynor, a programmer at Divine Axis, a software development company
|
|
in Yonkers, New York, argues that anti-virus programs can be contained so that
|
|
they do not spread out of control, reaching and possibly damaging data in other
|
|
computers. His company is now trying to design such a program.
|
|
|
|
Computer researchers at the Lawrence Livermore Laboratory, a federal weapons
|
|
center in Livermore, California, have designed similar programs that patrol
|
|
computer networks in search of breaches through which viruses could enter the
|
|
system.
|
|
|
|
Viruses, which got their name because they mimic in the computer world the
|
|
behavior of biological viruses, are programs, or sets of instructions, that can
|
|
secretly be spread among computers.
|
|
|
|
Viruses can travel either over a computer network or on an infected disk passed
|
|
by hand between computer users.
|
|
|
|
Once the infection has spread, the virus might do something as benign as
|
|
displaying a simple message on a computer screen or as destructive as erasing
|
|
the data on an entire disk.
|
|
|
|
Computer security experts have been concerned for several years by the
|
|
emergence of vandals and mischief makers who deliberately plant the destructive
|
|
programs.
|
|
|
|
But in recent weeks international alarm has reached new heights as rumors have
|
|
spread that a virus program will destroy data on thousands of computers this
|
|
month, on Friday the 13th.
|
|
|
|
Computer security researchers said the virus, known as Datacrime, was one of at
|
|
least three clandestine programs with internal clocks set to destroy data on
|
|
that date.
|
|
|
|
As is usually the case, no one knows who wrote the program, but U.S. military
|
|
officials have mentioned as possible suspects a European group linked to West
|
|
German terrorists and a Norwegian group displeased with the fame of Christopher
|
|
Columbus, who is honored next week.
|
|
|
|
Largely in response to customer concerns, IBM said on Monday that it was
|
|
offering programs for its personal computers that would scan for viruses.
|
|
|
|
But several computer security experts say public fears are largely exaggerated.
|
|
|
|
They note that there have been fewer than a dozen reported appearances of the
|
|
Datacrime virus in the United States, and contend that the whole issue is
|
|
overblown.
|
|
|
|
Still, in the personal computer world, where many users have little knowledge
|
|
of the technical workings of their machines, concern over computer viruses has
|
|
become widespread.
|
|
|
|
The issue got the most attention last November, when, it is charged, Robert
|
|
Morris, a graduate student at Cornell, unleashed a rogue program that because
|
|
of a small programming error, ran wildly out of control, copying itself
|
|
hundreds of times on thousands of computers, overloading a national network,
|
|
|
|
As a result of the mounting concern, a new industry has blossomed offering
|
|
users protective programs known as vaccines, or anti-viral software.
|
|
|
|
These programs either alert users that a virus is attempting to tamper with
|
|
their computer or scan a computer disk and erase any rogue program that is
|
|
detected.
|
|
|
|
These conventional programs do not automatically migrate from computer to
|
|
computer, but now some experts are exploring fashioning programs that graft the
|
|
powers of the vaccines onto viruses in order to pursue and stop them wherever
|
|
they go.
|
|
|
|
Designing and spreading such programs was proposed in August by several people
|
|
attending an international gathering of computer hobbyists, or "hackers," in
|
|
Amsterdam.
|
|
|
|
They suggested that it was a good way for members of the computer underground
|
|
to make a positive contribution.
|
|
|
|
But many researchers believe the idea is dangerously flawed because of the
|
|
possibility of accidentally doing great damage.
|
|
|
|
Some computer security researchers worry that writing an infectious program to
|
|
stop viruses may be taken as an intellectual challenge by hackers who are well
|
|
meaning but do not grasp what problems they could create.
|
|
|
|
"One of the questions that the hacker community is now addressing is what you
|
|
do about young hackers," said Stewart Brand, a writer in Sausalito, California,
|
|
who is working on a book on outlaw cultures and high technology.
|
|
|
|
"They don't have a sense of responsibility; they have a sense of curiosity.
|
|
These are deliciously debatable issues, and I don't see them going away."
|
|
|
|
>--------=====END=====--------<
|