| ==Phrack Inc.== |
|
|
| Volume Three, Issue 28, File #9 of 12 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN P h r a c k W o r l d N e w s PWN |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN |
| PWN Issue XXVIII/Part 1 PWN |
| PWN PWN |
| PWN October 7, 1989 PWN |
| PWN PWN |
| PWN Created, Written, and Edited PWN |
| PWN by Knight Lightning PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Welcome to Issue XXVIII of Phrack World News! |
|
|
| This issue of Phrack World News contains stories and articles |
| detailing events from June - October, 1989 and features Bellcore, |
| Chalisti, Chaos Computer Club, Clifford Stoll, The Disk Jockey, |
| Fry Guy, The Grim Phreaker, Legion of Doom, The Leftist, Major |
| Havoc, Kevin Mitnick, Robert Morris, Oryan QUEST, The Prophet, |
| Red Rebel, Shadow Stalker, Shadow 2600, Terra, The Urvile, and |
| much more so keep reading. |
|
|
| "The Real Future Is Behind You... And It's Only The |
| Beginning!" |
| _______________________________________________________________________________ |
|
|
| Judge Suggests Computer Hacker Undergo Counseling |
| July 17, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Karen E. Klein (New York Times) |
|
|
| LOS ANGELES -- A federal judge has suggested that Los Angeles |
| computer hacker Kevin Mitnick be sentenced to a one-year |
| residential treatment program to break his "computer addiction." |
|
|
| Although she did not finalize her sentence, U.S. District Judge |
| Mariana R. Pfaelzer said Monday that she thought Mitnick had |
| some problems that would |
| benefit from counseling. |
|
|
| Pfaelzer will actually pass sentence at a hearing set for |
| Tuesday, July 18. |
|
|
| The idea that a computer "junkie" who cannot control his urge to |
| break into computers could be helped with a program similar to |
| Alcoholics Anonymous is a new one, Harriet Rossetto, director of |
| the treatment program, told the judge. |
|
|
| "His behavior is an impulse disorder," Rossetto said. "The |
| disease is the addiction, whether it be drugs, alcohol, gambling, |
| hacking, money or power." |
|
|
| Rossetto, who was contacted by Mitnick's family, said Mitnick |
| would be the first person addicted to computer crime to be |
| treated in the Bet T'shuvah program , a 20-bed residential |
| treatment program for Jewish criminal offenders. |
|
|
| "It's not willful conduct, what Kevin does," she said. "He's |
| tried to control his behavior but hacking gives him a sense of |
| power, makes him feel like somebody when he's depressed or he's |
| lost a job." |
|
|
| Mitnick, age 25, has been in federal prison for seven months |
| since his arrest |
| last December on computer fraud charges. |
|
|
| He pleaded guilty in May to possessing 16 unauthorized MCI |
| long-distance codes and to stealing a computer security program |
| from the Digital Equipment Corporation in Massachusetts. |
|
|
| Mitnick has been described in court as a computer whiz who could |
| break into secured systems and change telephone or school records |
| at will. He told the judge on Monday, July 17 that he wants to |
| stop hacking. |
|
|
| "I sincerely want to change my life around and be productive |
| rather than destructive," Mitnick said. |
|
|
| "With counseling to break the addictive pattern I feel I have |
| towards computer hacking, I can take an active role and I don't |
| have to have the compulsive behavior again." |
|
|
| Assistant U.S. Attorney James R. Asperger said that the |
| government does not oppose Mitnick's release from prison to be |
| treated at Bet T'shuvah. |
|
|
| "The judge has taken this case very seriously. It shows computer |
| hacking is not like a Nintendo game," Asperger said. |
|
|
| Mitnick has cooperated with FBI investigators since his pleaded |
| guilty and helped bring charges against his former best friend, |
| Leonard DiCicco, 23, of Calabasas, Asperger said. |
|
|
| DiCicco, who initially tipped the FBI to Mitnick's crimes, has |
| agreed to plead guilty to a charge of aiding and abetting the |
| transportation of a stolen computer program. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Authorities Backed Away From Original Allegations |
| July 23, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Karen E. Klein (New York Times) |
|
|
| LOS ANGELES -- Shortly after computer hacker Kevin Mitnick was |
| arrested last December (1988), he was characterized as an extreme |
| threat who could wreak electronic chaos if he got near so much as |
| a telephone without supervision. |
|
|
| Police and FBI agents started trying to corroborate the flurry of |
| rumors that arose about the malicious actions of the computer |
| whiz from suburban Panorama City, whose case attracted national |
| attention. |
|
|
| Three judges denied Mitnick, age 25, bail on the ground that he |
| was a danger to society and ordered him held in a high-security |
| jail cell. |
|
|
| But after separating the Mitnick myth from the reality, |
| authorities backed away from many of their original allegations. |
|
|
| "A lot of the stories we originally heard just didn't pan out, so |
| we had to give him the benefit of the doubt," said James R. |
| Asperger, the assistant U.S. attorney who handled Mitnick's case. |
|
|
| Mitnick, pudgy and nervous, appeared in court last week to |
| apologize for his crimes and to ask for treatment to help break |
| his compulsive "addiction" to computers. |
|
|
| U.S. District Judge Mariana R. Pfaelzer sentenced him to serve |
| one year in |
| prison -- including the nearly eight months he already has served |
| -- and then to undergo six months of counseling and treatment |
| similar to that given to alcoholics or drug addicts. |
|
|
| "I think he has problems that would benefit greatly from this |
| kind of therapy," Pfaelzer said. "I want him to spend as much |
| time as possible in counseling." |
|
|
| The case that began with a bang ended with Asperger pointing out |
| that the one-year prison term is the stiffest sentence ever |
| handed out in a computer fraud case. |
|
|
| Mitnick originally was accused of using unauthorized MCI |
| long-distance codes to tap into Leeds University computers in |
| England and of stealing a $4 million computer security system |
| from the Digital Equipment Corporation in Massachusetts. |
|
|
| He ultimately agreed to plead guilty to possessing 16 |
| unauthorized MCI long-distance codes and to stealing the computer |
| security program. The other charges were dismissed. |
|
|
| Alan Rubin, Mitnick's lawyer, said he felt vindicated by the |
| outcome of the case. |
|
|
| Rubin contended from the start that computerphobia and adolescent |
| exaggeration led authorities to mistakenly brand Mitnick a |
| malicious criminal. |
|
|
| "Once the snowball starts rolling, you can't stop it," said |
| Rubin, who waged an unsuccessful campaign up to the federal |
| appeals court to get bail for his client. |
|
|
| Far from being serious, Rubin said, Mitnick's actions were mostly |
| immature, adolescent pranks. |
|
|
| He pointed to evidence that Mitnick was able to electronically |
| cut off telephone service to people he was angry with and once |
| sent an enemy a $30,000 hospital telephone bill. |
|
|
| "It was the computer equivalent of sending your friend 14 |
| pizzas," he said. |
|
|
| Many of the legends surrounding Mitnick came from the subculture |
| of computer hackers -- and specifically from a man who was once |
| Mitnick's best friend, Leonard Mitchell DiCicco, age 23, of |
| Calabasas, California. |
|
|
| DiCicco, who had a falling out with Mitnick over a $100 bet, told |
| computer security specialists at the Digital Equipment |
| Corporation that Mitnick had been trespassing on their system. |
|
|
| They in turn contacted the FBI agents, who arrested Mitnick. |
|
|
| What DiCicco told investigators may or may not have been entirely |
| truthful, Rubin said. |
|
|
| "I have no idea what his motives were," Rubin said. |
|
|
| But DiCicco, who alerted authorities to Mitnick's crime, had the |
| tables turned on him after the government refused to grant him |
| absolute immunity for his testimony against Mitnick. |
|
|
| When the prosecution said they might charge him with a crime, |
| DiCicco clammed up and refused to cooperate any further. But |
| from his prison cell, Mitnick agreed to cooperate and provided |
| enough incriminating evidence for the government to charge |
| DiCicco. |
|
|
| DiCicco is expected to plead guilty to a charge of aiding and |
| abetting the interstate transportation of stolen property -- the |
| computer security program -- on Monday. |
|
|
| Asperger said he was not sure whether DiCicco would get a |
| sentence similar to Mitnick's. |
|
|
| "Although they were friends and partners in computer hacking, |
| (DiCicco) appeared to play a subordinate role (in the crime)," |
| Asperger said. |
|
|
| Other rumors about Mitnick's conduct came from fellow hackers, |
| who may have blown the stories out of proportion. |
|
|
| "It's a very strange sub-culture, with a lot of jealousies," |
| Rubin said. "Part of it is bragging about how macho you are and |
| what systems you've broken into. It's very immature in a lot of |
| ways." |
|
|
| But prosecutors, citing Mitnick's various scrapes with computer |
| misconduct since he was 13, aren't willing to let him off the |
| hook entirely. |
|
|
| "I think there's some substance to these things (the rumors that |
| arose in Mitnick's case), an awful lot of them," said Los Angeles |
| FBI chief Lawrence Lawler, who is a computer buff himself and |
| followed Mitnick's case closely. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| If you are looking for other articles about Kevin David Mitnick aka Condor |
| please refer to; |
|
|
| "Pacific Bell Means Business" (10/06/88) PWN XXI. . .Part 1 |
| "Dangerous Hacker Is Captured" (No Date ) PWN XXII . .Part 1 |
| "Ex-Computer Whiz Kid Held On New Fraud Counts" (12/16/88) PWN XXII . .Part 1 |
| "Dangerous Keyboard Artist" (12/20/88) PWN XXII . .Part 1 |
| "Armed With A Keyboard And Considered Dangerous" (12/28/88) PWN XXIII. .Part 1 |
| "Dark Side Hacker Seen As Electronic Terrorist" (01/08/89) PWN XXIII. .Part 1 |
| "Mitnick Plea Bargains" (03/16/89) PWN XXV. . .Part 1 |
| "Mitnick Plea Bargain Rejected As Too Lenient" (04/25/89) PWN XXVII. .Part 1 |
| "Computer Hacker Working On Another Plea Bargain" (05/06/89) PWN XXVII. .Part 1 |
| "Mitnick Update" (05/10/89) PWN XXVII. .Part 1 |
| "Kenneth Siani Speaks Out About Kevin Mitnick" (05/23/89) PWN XXVII. .Part 1 |
| _______________________________________________________________________________ |
|
|
| BITNET/CSNET Announce Merger and Formation of CREN August 18, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Washington, DC |
| -- Two of the nation's leading academic and research computer |
| networks announced today that final steps are being taken to |
| merge their organizations. |
|
|
| Ira Fuchs, President of BITNET, and Bernard Galler, Chairman of |
| CSNET, jointly reported that the two networks, which together |
| include 600 colleges, universities, government agencies, and |
| private sector research organizations, will unite to form the |
| Corporation for Research and Educational Networking, CREN. |
|
|
| Galler, a Professor of Electrical Engineering and Computer |
| Science at the University of Michigan, commented: "The aims of |
| CSNET and BITNET -- to support and promote the use of computer |
| networks on campuses and within research organizations -- have |
| converged over the last several years. We believe that by |
| bringing these two networks into a single organization, we will |
| be able to provide better service to our network users and more |
| effectively participate in the fast-changing national network |
| environment." |
|
|
| Fuchs, Vice President for Computing and Information Technology at |
| Princeton University, sees the move as a strengthening factor: |
| "The need for campus networks and the introduction of new |
| technology make it necessary to build a common base of network |
| services using the most progressive technology available. By |
| eliminating overlap between our two organizations, we will |
| become more efficient, and more importantly, we can take a |
| stronger role in the the formation of the national education and |
| research network. We can achieve this goal faster and at lower |
| cost by leveraging the efforts of the two major academic |
| networking organizations." |
|
|
| The merger of CSNET and BITNET has been studied for more than a |
| year by a planning group consisting of representatives from both |
| networks. CSNET currently lists 145 institutional and corporate |
| members, and BITNET 480 members. Together, the two networks |
| cover all 50 states and 32 foreign countries, including Japan, |
| Brazil, Mexico, and Argentina. Both maintain gateways to EARN |
| (European Academic Research Network), NetNorth (Canada), and the |
| National Internet. |
|
|
| The planning group's recommendations to merge were approved by |
| the BITNET, Inc. Trustees and the Directors of the University |
| Corporation for Atmospheric Research, operators of CSNET for the |
| last five years. An information packet on the merger is being |
| mailed to all members of both networks this week, with a ballot |
| for BITNET members, who must approve the final legal steps under |
| the provisions of BITNET By-Laws. In an advisory vote last |
| winter, BITNET members approved the merger in principle by more |
| than 90% of those voting. |
|
|
| A gradual transition period is planned to bring together CSNET |
| and BITNET services. CREN plans to continue use of EDUCOM and |
| Bolt, Beranek and Newman (BBN) to provide technical and general |
| management services to its members. |
|
|
| EDUCOM President Kenneth M. King commented, "We are entering a |
| particularly challenging period in the creation of an advanced |
| national network infrastructure for research and education. CREN |
| will play a major role in the future of these computer networks, |
| which are becoming more and more important to the conduct of |
| research and the quality of education. EDUCOM is pleased to have |
| an opportunity to support the services and activities of CREN. " |
|
|
| Frank Heart, Senior Vice President, BBN Systems and Technologies |
| Corporation, said, "In keeping with its long involvement in the |
| development of networking technologies, BBN is pleased to play a |
| major supporting role in the evolution of BITNET and CSNET." |
|
|
| The proposed CREN Board includes Fuchs and Galler; |
|
|
| Douglas Bigelow. . . . . Wesleyan University |
| William Curtis . . . . . University Corporation for Atmospheric Research |
| David Farber . . . . . . University of Pennsylvania |
| Suzanne Johnson. . . . . INTEL Corporation |
| Mark Laubach . . . . . . Hewlett-Packard Corporation |
| Philip Long. . . . . . . Yale University |
| Dennis Ritchie . . . . . AT&T Bell Laboratories |
| Martin Solomon . . . . . University of South Carolina |
| Douglas Van Houweling. . University of Michigan |
| William Yundt. . . . . . Stanford University |
|
|
| For more information, contact |
|
|
| Corporation for Research and Educational Networking |
| Suite 600 |
| 1112 16th Street NW |
| Washington, DC 20036 |
|
|
| (202) 872-4215 |
|
|
| [Obviously they decided not to call it ONEnet --KL] |
| _______________________________________________________________________________ |
|
|
| CERT Internet Security Advisory August 16, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From Kenneth R. van Wyk |
|
|
| Many computers connected to the Internet have recently |
| experienced unauthorized system activity. Investigation shows |
| that the activity has occurred for several months and is |
| spreading. Several UNIX computers have had their "telnet" |
| programs illicitly replaced with versions of "telnet" which log |
| outgoing login sessions (including usernames and passwords to |
| remote systems). It appears that access has been gained to many |
| of the machines which have appeared in some of these session |
| logs. (As a first step, frequent telnet users should change |
| their passwords immediately.) While there is no cause for panic, |
| there are a number of things that system administrators can do to |
| detect whether the security on their machines has been |
| compromised using this approach and to tighten security on their |
| systems where necessary. At a minimum, all UNIX site |
| administrators should do the following: |
|
|
| o Test telnet for unauthorized changes by using the UNIX |
| "strings" command to search for path/filenames of possible log |
| files. Affected sites have noticed that their telnet programs |
| were logging information in user accounts under directory names |
| such as "..." and ".mail". |
|
|
| In general, we suggest that site administrators be attentive to |
| configuration management issues. These include the following: |
|
|
|
|
| o Test authenticity of critical programs - Any program with |
| access to the network (e.g., the TCP/IP suite) or with access |
| to usernames and passwords should be periodically tested for |
| unauthorized changes. Such a test can be done by comparing |
| checksums of on-line copies of these programs to checksums of |
| original copies. (Checksums can be calculated with the UNIX |
| "sum" command.) Alternatively, these programs can be |
| periodically reloaded from original tapes. |
|
|
| o Privileged programs - Programs that grant privileges to users |
| (e.g., setuid root programs/shells in UNIX) can be exploited to |
| gain unrestricted access to systems. System administrators |
| should watch for such programs being placed in places such as |
| /tmp and /usr/tmp (on UNIX systems). A common malicious |
| practice is to place a setuid shell (sh or csh) in the /tmp |
| directory, thus creating a "back door" whereby any user can |
| gain privileged system access. |
|
|
| o Monitor system logs - System access logs should be periodically |
| scanned (e.g., via UNIX "last" command) for suspicious or |
| unlikely system activity. |
|
|
| o Terminal servers - Terminal servers with unrestricted network |
| access (that is, terminal servers which allow users to connect |
| to and from any system on the Internet) are frequently used to |
| camouflage network connections, making it difficult to track |
| unauthorized activity. Most popular terminal servers can be |
| configured to restrict network access to and from local hosts. |
|
|
| o Passwords - Guest accounts and accounts with trivial passwords |
| (e.g., username=password, password=none) are common targets. |
| System administrators should make sure that all accounts are |
| password protected and encourage users to use acceptable |
| passwords as well as to change their passwords periodically, as |
| a general practice. For more information on passwords, see |
| Federal Information Processing Standard Publication (FIPS PUB) |
| 112, available from the National Technical Information Service, |
| U.S. Department of Commerce, Springfield, VA 22161. |
|
|
| o Anonymous file transfer - Unrestricted file transfer access to |
| a system can be exploited to obtain sensitive files such as the |
| UNIX /etc/passwd file. If used, TFTP (Trivial File Transfer |
| Protocol - which requires no username/password authentication) |
| should always be configured to run as a non-privileged user and |
| "chroot" to a file structure where the remote user cannot |
| transfer the system /etc/passwd file. Anonymous FTP, too, |
| should not allow the remote user to access this file, or any |
| other critical system file. Configuring these facilities to |
| "chroot" limits file access to a localized directory structure. |
|
|
| o Apply fixes - Many of the old "holes" in UNIX have been closed. |
| Check with your vendor and install all of the latest fixes. |
|
|
| If system administrators do discover any unauthorized system |
| activity, they are urged to contact the Computer Emergency |
| Response Team (CERT). |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| - - - - - - - |
|
|
| Internet Cracker On The Loose: Who Is He? |
| October 2, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ There |
| is a cracker on the loose in the Internet. This is the |
| information made public so far. Traces of the cracker were found |
| at the Institute for Advanced Studies in Princeton. He also left |
| traces at one of the Super computer centers. Both CERT and the |
| FBI have been called. |
|
|
| The technique that is being used is as follows: |
|
|
| 1) He has a modified telnet that tries a list passwords on |
| accounts. Username forwards and backwards, username + pw, |
| etc. |
|
|
| 2) He seems to have a program call "ret", that is breaking into |
| root. |
|
|
| 3) He seems to be getting a list of victim machines via people's |
| .rhosts files. |
|
|
| 4) He copies password files to the machines that he is currently |
| working from. |
|
|
| 5) He is good about cleaning up after himself. He zeros out log |
| files and other traces of himself. |
|
|
| 6) The breakins are occurring between 10 PM Sunday nights and 8 |
| AM Monday mornings. |
|
|
| 7) He seems to bring along a text file of security holes to the |
| machines he breaks into. |
|
|
| 8) Backtracing the network connections seem to point to the |
| Boston area as a base of operations. |
|
|
| The system administrator at IAS found a directory with the name |
| ".. " (dot dot space space). The files mentioned above were |
| found in this directory. |
| _______________________________________________________________________________ |
|
|
| Worried Firms Pay Hush Money To "Hackers" June 12, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Richard Caseby (London Times) |
|
|
| "Are London Firms Offering Amnesty To Hacker Thieves?" |
|
|
| Firms in the City of London are buying the silence of hackers who |
| break into their computers and steal millions of pounds. |
|
|
| At least six London firms have signed agreements with criminals, |
| offering them amnesty if they return part of the money. The |
| firms fear that if they prosecute they will lose business when |
| customers learn that their computer security is flawed. |
|
|
| In several of the case the losses exceeded 1 million pounds, but |
| only a tenth of the total was returned. |
|
|
| The Computer Industry Research Unit (CIRU) which uncovered the deals and which |
| is advising the Department of Trade and Industry in data security, believes the |
| practice of offering amnesties is widespread. |
|
|
| "Companies who feel vulnerable are running scared by agreeing to these immoral |
| deals. Their selfishness is storing up serious problems for everyone else," |
| said Peter Nancarrow, a senior consultant. |
|
|
| Police have warned that deals struck with criminals could |
| possibly lead to an employer being prosecuted for perverting the |
| course of justice. |
|
|
| Detective Inspector John Austin, of Scotland Yard's computer |
| fraud squad, said, "Employers could find themselves in very deep |
| water by such strenuous efforts to protect the credibility of |
| their image." |
|
|
| Legal experts say the firms are making use of section five of the |
| Criminal Law Act 1967 which allows them to keep silent on crimes |
| and privately agree on compensation. However, an employer |
| becomes a witness to the offense by taking evidence from a |
| criminal when the deal is drawn up. |
|
|
| Hackers steal by electronically transferring funds or by |
| programming a computer to round off all transactions by a tiny |
| amount and diverting the money to a separate account. |
|
|
| In one case, an assistant programmer at a merchant bank diverted |
| 8 million pounds to a Swiss bank account and then gave back 7 |
| million in return for a non-disclosure agreement protecting him |
| against prosecution. |
|
|
| Such thefts have spread alarm throughout London, with consultants |
| offering to penetrate the computer networks of banks and finance |
| houses to pinpoint loopholes before a hacker does. |
|
|
| The biggest contracts cost up to 50,000 pounds and can involve a |
| four month investigation in which every weakness is explored. |
|
|
| Detectives have found that computer security at many London |
| institutions is riddled with loopholes. A city of London police |
| operation, codenamed Comcheck, revealed wide spread weaknesses. |
| Firms were asked to track the number of unauthorized logons over |
| Easter bank holiday. |
|
|
| Some companies unable to tell whether hackers had penetrated |
| their network, while others lacked any security defenses. |
|
|
| In addition to theft, companies are vulnerable to blackmail. |
| Hackers can threaten to sabotage computers by inserting "viruses" |
| and "logic bombs" --rogue programs which can paralyze a system. |
|
|
| This type of threat has prompted the offer of a new insurance |
| policy underwritten by Lloyd's which specifically covers viruses |
| and other computer catastrophes. |
| ______________________________________________________________________ |
|
|