| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Two, File 4 of 14 |
|
|
| Prelude to a Kiss |
|
|
| - Lessons Unlearned Are Doomed To Bring Misery Ad-Infinitum - |
|
|
|
|
| The following is an article I wrote for a mainstream computer security |
| periodical called ISPNews. At the time, I had been discussing the idea |
| of a bi-monthly column with the editor at that time, Len Spitz. (Now the |
| editor is Michael Alexander, ex-of Computerworld) |
|
|
| The following article, although very, very tame by my standards, and |
| admittedly lacking in enough hardcore information to help security |
| professionals to apply a quick fix to their many problems, caused quite |
| a stir among the folks at ISPNews. |
|
|
| Since this article was from me, a self-proclaimed hacker, it |
| underwent an extraordinary amount of scrutiny. Rather than be |
| accepted or denied by the editor, my article got the dubious honor of |
| being sent before an editorial advisory board. I checked every back |
| issue of ISPNews and could find no mention of such an entity until the |
| November/December 1991 issue, the issue immediately following an length |
| interview with none other than myself. |
|
|
| When I questioned Len Spitz about this rather odd fact, he maintained |
| that this committee had indeed existed, but stammered his way through my |
| question to name any other article that they had convened to judge in |
| the past, and to explain the duties of such a group. He could not give |
| me any answers. |
|
|
| The group itself was obviously geared to be a type of kangaroo-court. |
| It consisted of: |
|
|
| William J. Cook -- The man who less than two years prior had ordered my |
| privacy and civil rights violated by the Secret |
| Service solely on the basis of two bulletin board |
| posts and my association with members of the Legion |
| of Doom and the Phrack Magazine staff. |
|
|
| William H. Murray -- A senior consultant with Deloitte & Touche who had |
| two weeks prior stood up before my presentation to |
| the MIS Training Institute's 11th Annual Conference |
| and said loudly "I can't take this any more, I'm leaving," |
| to the astounded audience. The man who went on to |
| state in his own column in ISPNews, "Can we lie |
| down with dogs and get up without fleas?" and "Ask |
| yourself if you wish to work in a profession |
| populated by rogues. Ask yourself if you want your |
| reputation mixed with theirs." |
|
|
| Winn Schwartau -- A security consultant with a broad view and an open |
| mind, undoubtedly resulting from his background in the |
| music industry, as opposed to the bean-counting world |
| of MIS. |
|
|
| David J. Stang -- Director of research, NCSA. Noted virus specialist. |
|
|
| This was the group. Here is what they said about my article: |
|
|
| Bill Cook -- "It's very well-written and informative, but shouldn't be |
| published for legal reasons." (What those reasons might have been were |
| not stated, nor did Mr. Cook return my call to his office.) |
|
|
| Bill Murray -- Was not even given the file to read, as his response was |
| deemed to predictable. |
|
|
| Winn Schwartau -- "Publish it. This is valuable information." |
|
|
| David Stang -- Was not given the file because, according to Len Spitz |
| "David is just a virus expert, and this isn't in his arena, so we gave |
| it to Ray Kaplan." |
|
|
| Ray Kaplan -- Did not want to comment on it because he said, "It's |
| not my expertise, so I gave it to a friend." I believe Ray did not |
| want to get involved with anything having to do with hackers after |
| the reactionary attitudes of the DECUS attendees towards his defense |
| of Kevin Mitnik that nearly left him in bankruptcy. I cannot blame |
| him at all. (Hell, I like the guy...he's certainly more brazen with |
| attitude these days, I mean, he went to HoHoCon for God's-sake!) |
|
|
| Ray's Friend -- "This is of absolutely no use to the information |
| security professional, but of great use to the hacker community." |
| I still do not know who Ray's "friend" was. I hope his |
| Alzeheimer's has subsided since this comment. |
|
|
| Needless to say, the article went unpublished. |
|
|
| Shortly thereafter I received a letter from Robert Fox, an assistant |
| vice-president at Sprint. Somehow my little article had snaked its |
| way over to Kansas City. It's amazing how one faxed copy of an article |
| could have reached so many people in such a short period of time. |
| Mr. Fox had the following to say: |
|
|
| ------------------------------------------------------------------------ |
|
|
| United Telecom/US Sprint |
| 9221 Ward Parkway |
| Kansas City, Missouri 64114 |
| 816-822-6262 |
|
|
| Robert F. Fox January 13, 1992 |
| Assistant Vice President |
| Corporate Security |
|
|
|
|
| VIA AIRBORNE EXPRESS |
|
|
| Mr. Chris Goggans |
| COMSEC |
| Suite 1470 |
| 7322 Southwest Freeway |
| Houston, TX 77074 |
|
|
| Re: Your Article "Packet-switched Networks |
| Security Begins With Configuration" |
|
|
| Dear Mr. Goggans: |
|
|
| A copy of the referenced unpublished article, which is |
| enclosed with this letter, has come to our attention. After |
| review, we believe the article is inaccurate and libelous. If |
| published the contents of the article could cause damage to Sprint |
| customers, Sprint and our reputation, and we request that you not |
| publish or otherwise disseminate it. |
|
|
| In addition, we believe some of the information contained in |
| the article has been obtained through violation of the property |
| rights of Sprint and/or our customers and we demand that you cease |
| any efforts or attempts to violate or otherwise compromise our |
| property whether or not for you personal financial gain. |
|
|
| Sincerely, |
|
|
| Robert F. Fox |
|
|
|
|
| Enclosure |
|
|
|
|
| ------------------------------------------------------------------------ |
|
|
|
|
| Regardless of how Mr. Fox came into possession of this article, i have to |
| question his letter based on his comments. First he states that |
| the information is almost criminally incorrect and could cause harm to |
| Sprint's reputation. Then he states that information in the article has |
| come to be known through the violation of the security of Sprintnet and/or |
| clients of Sprintnet. In effect, I am both a thief and a liar according |
| to Mr. Fox. Well, if I were a thief the information could not possibly |
| be inaccurate if it were obtained from Sprintnet or its clients. If I |
| was a liar, why would they think the information came from themselves |
| and/or their clients? Mr. Fox's thinly veiled threat caused me great |
| amusement. |
|
|
| I then decided no mainstream publication would touch this article. I |
| don't know why everyone is so scared of the truth. Perhaps if the truth |
| were known people would have to work, and perhaps if the truth were |
| known some people would be out of work. None of this is of concern to |
| me anymore. I am here to speak the truth and to provide uncensored |
| information gathered from a variety of sources to provide readers of |
| this magazine the facts they need to quench their thirst for knowledge. |
|
|
| This article is included as a prelude to a series of articles all based |
| on packet switched networks as related to information merely alluded to |
| in my harmless little article. To our readers, "enjoy." To the cowering |
| so-called security experts, "kiss my ass." |
|
|
| ------------------------------------------------------------------------ |
|
|
| Packet-switched Networks |
|
|
| Security Begins with Configuration |
|
|
|
|
| For many companies the use of packet-switched networks has |
| allowed for increased interconnectivity of systems and easy |
| remote access. Connection to a major public packet-switched |
| network brings increased access points with local dialups in |
| many cities around the nation as well as access |
| points from foreign countries. |
|
|
| With the many obvious benefits provided by this service, |
| improper configuration of either the host's connection to the |
| network or of the network itself can lead to extreme security |
| problems. |
|
|
| The very connection to a public packet-switched network |
| immediately increases the exposure of that particular system. |
| America's two major commercial networks, BT-Tymnet and |
| Sprintnet, are probably the most popular US targets for hackers |
| around the world. The wealth of systems available on |
| these two networks has provided hackers with a seemly endless |
| supply of sites on which to sharpen their skills. The ease of use |
| inherent in both networks makes them popular for legitimate |
| users as well as illegitimate users. |
|
|
| The Telenet software utilized in the Sprintnet network allows |
| users to enter a network user address (NUA) in the standard |
| format as outlined in the X.121 numbering standard: |
|
|
| DDDDAAAHHHHHPP |
|
|
| Where D = the four digit data network identifier code (DNIC) |
| A = the three digit area code corresponding to the host |
| H = the host address |
| P = the port or (sub) address |
|
|
| On domestic calls the DNIC for Sprintnet (3110) is stored in |
| all Sprintnet equipment and is used as the default. By |
| merely picking an area code, most often corresponding to the standard |
| area codes of the North American Numbering Plan, and an |
| additional one to five digits a would-be intruder can |
| connect to any number of systems while looking for targets. |
|
|
| In the past many software packages have been written to |
| automate this process, and large scans of the network have |
| been published in a variety of underground media. |
|
|
| The Tymnet II software utilized in BT's Tymnet |
| prompts the user for a mnemonic which corresponds to a host |
| or number of hosts. The mnemonic, or username, is referenced |
| to a fixed host address in the network's Master User |
| Directory (MUD). This username may allow the caller to |
| connect to a variety of sites, as opposed to merely one, by |
| entering additional information in separate fields after the username. |
| It may also correspond to a network gateway thereby allowing |
| the user to enter a number in the X.121 format and connect to that |
| specific site. |
|
|
| This particular network, with its primary use of words as |
| opposed to numbers, has been compromised by intruders who |
| guess common words or names in their attempts to connect to |
| remote sites. |
|
|
| Each network has its own particular set of problems but |
| solutions to these problems are both simple and quick in |
| implementation. |
|
|
| SPRINTNET |
|
|
| The first deterrence in securing a host on this |
| network is to restrict access to the site. This can be |
| accomplished in a number of ways. The most obvious is to |
| have the site refuse collect calls. All calls on Sprintnet |
| are reverse-billed, unless the site has specifically asked |
| that they not be billed for incoming calls. This makes the |
| site accessible only through the use of a Network User |
| Identifier (NUI). |
|
|
| Another method of restricting access from intruders is to |
| place the host in a closed user group (CUG). By electing to |
| have the host in a CUG, the administrator can allow only |
| certain NUIs to connect, and can also restrict the actual |
| addresses from which access is allowed. For example: A site |
| is placed in a CUG that will allow only calls from the |
| company's remote branch in Dallas to access the host and only |
| with the NUI created specifically for that branch. All |
| attempts to access the site from an address outside the 214 |
| area will result in an error message indicating an invalid |
| source address. All attempts to connect with an invalid NUI |
| will result in an error indicating an invalid ID. This |
| information is maintained in the networks main TAMS (TP |
| Access Management System) database, and is not subject to |
| manipulation under normal circumstances. |
|
|
| Many sites on the Sprintnet network have specific |
| subaddresses connecting to a debug port. This is usually at |
| subaddress 99. All connections to debug ports should be |
| restricted. Allowing users access to this port will allow |
| them the ability to load and display memory registers of the |
| Sprintnet equipment connected to the port, and even reset |
| as well as enable or disable the host. Most debug ports are |
| equipped with preset passwords from the vendor, but should be |
| changed. These ports should also restrict connection from |
| all addresses except those specified by the company. |
|
|
| An additional measure that may foil intruders relying on |
| software programs to find all addresses in a given area code |
| is to request that the host be given an address above 10000. |
| The time involved in scanning the network is extensive and |
| most casual intruders will not look past the 10000 range. In |
| fact, many will not venture past 2000. |
|
|
| BT-TYMNET |
|
|
| Any company having a host on the Tymnet network should choose |
| a username that is not easily associated with the company or |
| one that is not a common word or name. If an intruder is aware that |
| XYZ Inc. has a UNIX based system on TYMNET he or she would |
| begin attempts to find this system with the obvious |
| usernames: XYZ, XYZINC, XYZNET, XYZ1, XYZUNIX, UNIX, etc. |
|
|
| BT-Tymnet allows for these usernames to have additional |
| password security as well. All hosts should have this option |
| enabled, and passwords should be changed frequently. |
| The password should always be a minimum of six |
| digits, should include letters, numbers and at least one symbol |
| character, and should not be associated in any way with the |
| corresponding username. |
|
|
| Many clients of BT-Tymnet have purchased the Tymnet II |
| software and have individual sub-networks that are linked to |
| the public network through gateways. Each subnet is |
| personally configured and maintained through the use of a |
| package of utilities provided by Tymnet. These utilities |
| each perform a specific task and are highly important to the |
| smooth operation of the network. These utilities may be |
| accessed either directly from the host-end or remotely |
| through the network by entering a corresponding username. |
| Some of these utilities are: |
|
|
| XRAY : a monitoring utility |
| DDT : a debugging utility |
| NETVAL : a database of username to host correspondence |
| PROBE : a monitoring utility |
| TMCS : a monitoring utility |
|
|
| Under NO CIRCUMSTANCES should these utilities be left |
| without a password on the company's subnet. These utilities should |
| also never be named similarly to their given name. Should an |
| intruder gain access to any of these utilities the integrity |
| of your network will be at risk. |
|
|
| For example: |
|
|
| Allowing an outsider access to the XRAY utility, would give |
| he or she the ability to monitor both incoming and outgoing |
| data from the host using the "TA" command (display trace data |
| table in ASCII). Use of certain XRAY commands are restricted |
| by a security function that allows only certain usernames to |
| execute commands on the basis of their existence in a |
| "Goodguy" list, which can be displayed by any XRAY user. |
| Should a user be of the highest privilege, (2), he or she can |
| add or delete from the "Goodguy" list, reset connections, and |
| display trace data on channels other than the default |
| channel. |
|
|
| Allowing a user access to DDT can result in complete |
| disruption of the network. DDT allows the user the ability |
| to write directly to the network controller "node code" and |
| alter its configuration. |
|
|
| Allowing a user access to NETVAL will allow the user to |
| display all usernames active on the network and the |
| corresponding host addresses. |
|
|
| OTHER PROBLEMS |
|
|
| EXAMPLE ONE |
|
|
| On many networks users have the ability to connect to the |
| packet assembler/disassembler (PAD) of the network dial-ups. |
| This has led to significant problems in the past. |
|
|
| In the mid-1980's two American hackers were exploring the |
| German packet network DATEX-P. One connected to a host in |
| Berlin and was immediately disconnected by the remote site. |
| Before the hacker could react, the German host connected to |
| the NUA corresponding to his Sprintnet PAD and sent him a |
| login prompt. This alarmed the hacker greatly, as he assumed |
| that the proprietors of the German host had somehow noticed |
| his attempt to access their system. He contacted his partner |
| and told him of the occurrence. The two concluded that since |
| the NUA of the origination point is sent in the packet-header, |
| the remote site must have been programed to recognize the NUA and |
| then return the call. The fact that it had returned a call to a |
| public PAD was intriguing to the pair, so they decided to |
| attempt to recreate the event by calling each other. Both |
| individuals connected to the network and one entered the NUA |
| corresponding to the others PAD. A connection resulted and |
| the two were able to interact with one another. They then |
| decided that they would periodically meet in this fashion and |
| discuss their findings from Germany. At the time of the next |
| meeting, the connection did not occur as planned. One hacker |
| quickly received a telephone call from the second who |
| exclaimed rather excitedly that he had attempted to connect |
| to his partner as planned, but accidentally connected to |
| another PAD and intercepted a legitimate user typing his NUI. |
| Further investigation proved that one could connect to public |
| PADs during the idle period when the user was in network |
| mode, prior to making a connection to a remote site. This |
| discovery was intended to remain secret, because of its |
| extremely dangerous applications. Nevertheless, word of this |
| discovery soon reached the entire hacker community and what |
| came to be known as "PAD to PAD" was born. |
|
|
| The "PAD to PAD" technique became so wide-spread that hackers |
| were soon writing software to intercept data and emulate |
| hosts and capture login names and passwords from unsuspecting |
| network users. Hackers were intercepting thousands of calls |
| every day from users connecting to systems ranging from |
| banking and credit to the Fortune 500 to government sites. |
|
|
| After nearly two years of "PAD to PAD" Sprintnet became |
| alerted to the crisis and disallowed all connections to |
| public PADs. When Sprintnet expanded its service overseas |
| they once again left access to the overseas PADs |
| unrestricted. The problem went unnoticed again until |
| their attention was brought to it by a hacker who called |
| Sprintnet security and told them that they ought to fix it |
| quickly before it became as wide-spread as before. |
| The problem was resolved much quicker this time. |
|
|
| This particular technique was not limited to Sprintnet. All |
| networks using the Telenet software are at risk to this type |
| of manipulation. This type of network manipulation was |
| integral in the recent compromise of a large Bell Company's packet |
| network in a much-publicized case. Certain foreign |
| networks in countries such as Israel, England, Chile, Panama, |
| Peru and Brazil are also at risk. |
|
|
| EXAMPLE TWO |
|
|
| In the late 1980's hackers stumbled onto a packet network |
| owned and maintained by a large facilities maintenance |
| company. This particular network had a huge flaw in its |
| setup. It connected all calls placed through it as if they |
| were placed with an NUI. This allowed hackers to place calls |
| to addresses that refused collect connections on networks |
| around the world. This became a popular method for hackers |
| to access underground chat systems in Europe. Additionally, |
| this network contained a score of computers belonging to a |
| major automobile manufacturer. Most of these systems were |
| highly insecure. The network also allowed unrestricted |
| access to network debug ports. This particular network also |
| had a toll-free number on an MCI exchange. At the time, MCI |
| was having some difficulty getting their equipment to accept |
| the ANI information to provide customers with a full call- |
| detail report on their monthly statement. The hackers were |
| well aware of this fact and made frequent use of the network |
| with no fear of prosecution. Eventually MCI was able to fix |
| their translation problem and were able to provide their |
| clients with full call-detail reports. When this was |
| learned, many hackers abandoned use of the network, but |
| several others were later prosecuted for its usage when their |
| number turned up on the bill. |
|
|
| EXAMPLE THREE |
|
|
| Until quite recently intimate knowledge of the utilities |
| driving various packet-switched networks were known by an |
| exclusive few. While investigating a network owned by an |
| extremely large Cleveland-based conglomerate hackers came |
| across a system where documentation on the usage of every |
| utility was kept online. The hackers quickly downloaded all |
| the information and it soon became somewhat wide-spread among |
| the underground community. With less-skilled and more |
| unscrupulous individuals in possession of this information |
| many networks began experiencing disruptions and system |
| integrity was quickly lost as hackers began monitoring data |
| traffic. |
|
|
| No information on the usage of packet networks or their |
| utilities should ever be kept online. Hard copies should be |
| kept in the possession of the network administrator, and when |
| updated, obsolete versions must be destroyed. |
|
|
| WHAT TO DO |
|
|
| When a security violation stemming from a connection through |
| the packet network is noticed, Network Security should be |
| notified. Clients of BT-Tymnet should notify Steve Matthews |
| at 408-922-7384. Clients of Sprintnet should notify |
| Pat Sisson at 703-689-6913. |
|
|
| Once changes have been enacted in the network to prevent |
| further break-ins, the host computer should be checked |
| thoroughly for any changes or damages, and all individual |
| account passwords should be changed. |
|
|
| CONCLUSION |
|
|
| It is critical that the packet network be configured properly |
| and that all measures are taken to ensure its security. Even |
| the most secure host computer can be easily compromised if it |
| is connected to an insecure packet network. |
| ---------------------------------------------------------------------- |
|
|