💾 Archived View for aphrack.org › issues › phrack28 › 9.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content

View Raw

More Information

-=-=-=-=-=-=-

                                ==Phrack Inc.==

                     Volume Three, Issue 28, File #9 of 12

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN               Issue XXVIII/Part 1               PWN
            PWN                                                 PWN
            PWN                 October 7, 1989                 PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


                 Welcome to Issue XXVIII of Phrack World News!

This issue of Phrack World News contains stories and articles
detailing events from June - October, 1989 and features Bellcore,
Chalisti, Chaos Computer Club, Clifford Stoll, The Disk Jockey,
Fry Guy, The Grim Phreaker, Legion of Doom, The Leftist, Major
Havoc, Kevin Mitnick, Robert Morris, Oryan QUEST, The Prophet,
Red Rebel, Shadow Stalker, Shadow 2600, Terra, The Urvile, and
much more so keep reading.

        "The Real Future Is Behind You... And It's Only The
Beginning!"
_______________________________________________________________________________

Judge Suggests Computer Hacker Undergo Counseling
July 17, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Karen E. Klein (New York Times)

LOS ANGELES -- A federal judge has suggested that Los Angeles
computer hacker Kevin Mitnick be sentenced to a one-year
residential treatment program to break his "computer addiction."

Although she did not finalize her sentence, U.S. District Judge
Mariana R.  Pfaelzer said Monday that she thought Mitnick had
some problems that would
benefit from counseling.

Pfaelzer will actually pass sentence at a hearing set for
Tuesday, July 18.

The idea that a computer "junkie" who cannot control his urge to
break into computers could be helped with a program similar to
Alcoholics Anonymous is a new one, Harriet Rossetto, director of
the treatment program, told the judge.

"His behavior is an impulse disorder," Rossetto said.  "The
disease is the addiction, whether it be drugs, alcohol, gambling,
hacking, money or power."

Rossetto, who was contacted by Mitnick's family, said Mitnick
would be the first person addicted to computer crime to be
treated in the Bet T'shuvah program , a 20-bed residential
treatment program for Jewish criminal offenders.

"It's not willful conduct, what Kevin does," she said.  "He's
tried to control his behavior but hacking gives him a sense of
power, makes him feel like somebody when he's depressed or he's
lost a job."

Mitnick, age 25, has been in federal prison for seven months
since his arrest
last December on computer fraud charges.

He pleaded guilty in May to possessing 16 unauthorized MCI
long-distance codes and to stealing a computer security program
from the Digital Equipment Corporation in Massachusetts.

Mitnick has been described in court as a computer whiz who could
break into secured systems and change telephone or school records
at will.  He told the judge on Monday, July 17 that he wants to
stop hacking.

"I sincerely want to change my life around and be productive
rather than destructive," Mitnick said.

"With counseling to break the addictive pattern I feel I have
towards computer hacking, I can take an active role and I don't
have to have the compulsive behavior again."

Assistant U.S. Attorney James R. Asperger said that the
government does not oppose Mitnick's release from prison to be
treated at Bet T'shuvah.

"The judge has taken this case very seriously.  It shows computer
hacking is not like a Nintendo game," Asperger said.

Mitnick has cooperated with FBI investigators since his pleaded
guilty and helped bring charges against his former best friend,
Leonard DiCicco, 23, of Calabasas, Asperger said.

DiCicco, who initially tipped the FBI to Mitnick's crimes, has
agreed to plead guilty to a charge of aiding and abetting the
transportation of a stolen computer program.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Authorities Backed Away From Original Allegations
July 23, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Karen E. Klein (New York Times)

LOS ANGELES -- Shortly after computer hacker Kevin Mitnick was
arrested last December (1988), he was characterized as an extreme
threat who could wreak electronic chaos if he got near so much as
a telephone without supervision.

Police and FBI agents started trying to corroborate the flurry of
rumors that arose about the malicious actions of the computer
whiz from suburban Panorama City, whose case attracted national
attention.

Three judges denied Mitnick, age 25, bail on the ground that he
was a danger to society and ordered him held in a high-security
jail cell.

But after separating the Mitnick myth from the reality,
authorities backed away from many of their original allegations.

"A lot of the stories we originally heard just didn't pan out, so
we had to give him the benefit of the doubt," said James R.
Asperger, the assistant U.S. attorney who handled Mitnick's case.

Mitnick, pudgy and nervous, appeared in court last week to
apologize for his crimes and to ask for treatment to help break
his compulsive "addiction" to computers.

U.S. District Judge Mariana R. Pfaelzer sentenced him to serve
one year in
prison -- including the nearly eight months he already has served
-- and then to undergo six months of counseling and treatment
similar to that given to alcoholics or drug addicts.

"I think he has problems that would benefit greatly from this
kind of therapy," Pfaelzer said.  "I want him to spend as much
time as possible in counseling."

The case that began with a bang ended with Asperger pointing out
that the one-year prison term is the stiffest sentence ever
handed out in a computer fraud case.

Mitnick originally was accused of using unauthorized MCI
long-distance codes to tap into Leeds University computers in
England and of stealing a $4 million computer security system
from the Digital Equipment Corporation in Massachusetts.

He ultimately agreed to plead guilty to possessing 16
unauthorized MCI long-distance codes and to stealing the computer
security program.  The other charges were dismissed.

Alan Rubin, Mitnick's lawyer, said he felt vindicated by the
outcome of the case.

Rubin contended from the start that computerphobia and adolescent
exaggeration led authorities to mistakenly brand Mitnick a
malicious criminal.

"Once the snowball starts rolling, you can't stop it," said
Rubin, who waged an unsuccessful campaign up to the federal
appeals court to get bail for his client.

Far from being serious, Rubin said, Mitnick's actions were mostly
immature, adolescent pranks.

He pointed to evidence that Mitnick was able to electronically
cut off telephone service to people he was angry with and once
sent an enemy a $30,000 hospital telephone bill.

"It was the computer equivalent of sending your friend 14
pizzas," he said.

Many of the legends surrounding Mitnick came from the subculture
of computer hackers -- and specifically from a man who was once
Mitnick's best friend, Leonard Mitchell DiCicco, age 23, of
Calabasas, California.

DiCicco, who had a falling out with Mitnick over a $100 bet, told
computer security specialists at the Digital Equipment
Corporation that Mitnick had been trespassing on their system.

They in turn contacted the FBI agents, who arrested Mitnick.

What DiCicco told investigators may or may not have been entirely
truthful, Rubin said.

"I have no idea what his motives were," Rubin said.

But DiCicco, who alerted authorities to Mitnick's crime, had the
tables turned on him after the government refused to grant him
absolute immunity for his testimony against Mitnick.

When the prosecution said they might charge him with a crime,
DiCicco clammed up and refused to cooperate any further.  But
from his prison cell, Mitnick agreed to cooperate and provided
enough incriminating evidence for the government to charge
DiCicco.

DiCicco is expected to plead guilty to a charge of aiding and
abetting the interstate transportation of stolen property -- the
computer security program -- on Monday.

Asperger said he was not sure whether DiCicco would get a
sentence similar to Mitnick's.

"Although they were friends and partners in computer hacking,
(DiCicco) appeared to play a subordinate role (in the crime),"
Asperger said.

Other rumors about Mitnick's conduct came from fellow hackers,
who may have blown the stories out of proportion.

"It's a very strange sub-culture, with a lot of jealousies,"
Rubin said.  "Part of it is bragging about how macho you are and
what systems you've broken into.  It's very immature in a lot of
ways."

But prosecutors, citing Mitnick's various scrapes with computer
misconduct since he was 13, aren't willing to let him off the
hook entirely.

"I think there's some substance to these things (the rumors that
arose in Mitnick's case), an awful lot of them," said Los Angeles
FBI chief Lawrence Lawler, who is a computer buff himself and
followed Mitnick's case closely.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

If you are looking for other articles about Kevin David Mitnick aka Condor
please refer to;

"Pacific Bell Means Business"                     (10/06/88) PWN XXI. . .Part 1
"Dangerous Hacker Is Captured"                    (No Date ) PWN XXII . .Part 1
"Ex-Computer Whiz Kid Held On New Fraud Counts"   (12/16/88) PWN XXII . .Part 1
"Dangerous Keyboard Artist"                       (12/20/88) PWN XXII . .Part 1
"Armed With A Keyboard And Considered Dangerous"  (12/28/88) PWN XXIII. .Part 1
"Dark Side Hacker Seen As Electronic Terrorist"   (01/08/89) PWN XXIII. .Part 1
"Mitnick Plea Bargains"                           (03/16/89) PWN XXV. . .Part 1
"Mitnick Plea Bargain Rejected As Too Lenient"    (04/25/89) PWN XXVII. .Part 1
"Computer Hacker Working On Another Plea Bargain" (05/06/89) PWN XXVII. .Part 1
"Mitnick Update"                                  (05/10/89) PWN XXVII. .Part 1
"Kenneth Siani Speaks Out About Kevin Mitnick"    (05/23/89) PWN XXVII. .Part 1
_______________________________________________________________________________

BITNET/CSNET Announce Merger and Formation of CREN              August 18, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Washington, DC
-- Two of the nation's leading academic and research computer
networks announced today that final steps are being taken to
merge their organizations.

Ira Fuchs, President of BITNET, and Bernard Galler, Chairman of
CSNET, jointly reported that the two networks, which together
include 600 colleges, universities, government agencies, and
private sector research organizations, will unite to form the
Corporation for Research and Educational Networking, CREN.

Galler, a Professor of Electrical Engineering and Computer
Science at the University of Michigan, commented:  "The aims of
CSNET and BITNET -- to support and promote the use of computer
networks on campuses and within research organizations -- have
converged over the last several years.  We believe that by
bringing these two networks into a single organization, we will
be able to provide better service to our network users and more
effectively participate in the fast-changing national network
environment."

Fuchs, Vice President for Computing and Information Technology at
Princeton University, sees the move as a strengthening factor:
"The need for campus networks and the introduction of new
technology make it necessary to build a common base of network
services using the most progressive technology available.  By
eliminating overlap between our two organizations, we will
become more efficient, and more importantly, we can take a
stronger role in the the formation of the national education and
research network.  We can achieve this goal faster and at lower
cost by leveraging the efforts of the two major academic
networking organizations."

The merger of CSNET and BITNET has been studied for more than a
year by a planning group consisting of representatives from both
networks.  CSNET currently lists 145 institutional and corporate
members, and BITNET 480 members.  Together, the two networks
cover all 50 states and 32 foreign countries, including Japan,
Brazil, Mexico, and Argentina.  Both maintain gateways to EARN
(European Academic Research Network), NetNorth (Canada), and the
National Internet.

The planning group's recommendations to merge were approved by
the BITNET, Inc.  Trustees and the Directors of the University
Corporation for Atmospheric Research, operators of CSNET for the
last five years.  An information packet on the merger is being
mailed to all members of both networks this week, with a ballot
for BITNET members, who must approve the final legal steps under
the provisions of BITNET By-Laws.  In an advisory vote last
winter, BITNET members approved the merger in principle by more
than 90% of those voting.

A gradual transition period is planned to bring together CSNET
and BITNET services.  CREN plans to continue use of EDUCOM and
Bolt, Beranek and Newman (BBN) to provide technical and general
management services to its members.

EDUCOM President Kenneth M. King commented, "We are entering a
particularly challenging period in the creation of an advanced
national network infrastructure for research and education.  CREN
will play a major role in the future of these computer networks,
which are becoming more and more important to the conduct of
research and the quality of education.  EDUCOM is pleased to have
an opportunity to support the services and activities of CREN. "

Frank Heart, Senior Vice President, BBN Systems and Technologies
Corporation, said, "In keeping with its long involvement in the
development of networking technologies, BBN is pleased to play a
major supporting role in the evolution of BITNET and CSNET."

The proposed CREN Board includes Fuchs and Galler;

Douglas Bigelow. . . . . Wesleyan University
William Curtis . . . . . University Corporation for Atmospheric Research
David Farber . . . . . . University of Pennsylvania
Suzanne Johnson. . . . . INTEL Corporation
Mark Laubach . . . . . . Hewlett-Packard Corporation
Philip Long. . . . . . . Yale University
Dennis Ritchie . . . . . AT&T Bell Laboratories
Martin Solomon . . . . . University of South Carolina
Douglas Van Houweling. . University of Michigan
William Yundt. . . . . . Stanford University

For more information, contact

              Corporation for Research and Educational Networking
                                   Suite 600
                              1112 16th Street NW
                             Washington, DC  20036

                                (202) 872-4215

              [Obviously they decided not to call it ONEnet --KL]
_______________________________________________________________________________

CERT Internet Security Advisory                                 August 16, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Kenneth R. van Wyk

Many computers connected to the Internet have recently
experienced unauthorized system activity.  Investigation shows
that the activity has occurred for several months and is
spreading.  Several UNIX computers have had their "telnet"
programs illicitly replaced with versions of "telnet" which log
outgoing login sessions (including usernames and passwords to
remote systems).  It appears that access has been gained to many
of the machines which have appeared in some of these session
logs.  (As a first step, frequent telnet users should change
their passwords immediately.)  While there is no cause for panic,
there are a number of things that system administrators can do to
detect whether the security on their machines has been
compromised using this approach and to tighten security on their
systems where necessary.  At a minimum, all UNIX site
administrators should do the following:

o Test telnet for unauthorized changes by using the UNIX
  "strings" command to search for path/filenames of possible log
  files.  Affected sites have noticed that their telnet programs
  were logging information in user accounts under directory names
  such as "..." and ".mail".

In general, we suggest that site administrators be attentive to
configuration management issues.  These include the following:


o Test authenticity of critical programs - Any program with
  access to the network (e.g., the TCP/IP suite) or with access
  to usernames and passwords should be periodically tested for
  unauthorized changes.  Such a test can be done by comparing
  checksums of on-line copies of these programs to checksums of
  original copies.  (Checksums can be calculated with the UNIX
  "sum" command.)  Alternatively, these programs can be
  periodically reloaded from original tapes.

o Privileged programs - Programs that grant privileges to users
  (e.g., setuid root programs/shells in UNIX) can be exploited to
  gain unrestricted access to systems.  System administrators
  should watch for such programs being placed in places such as
  /tmp and /usr/tmp (on UNIX systems).  A common malicious
  practice is to place a setuid shell (sh or csh) in the /tmp
  directory, thus creating a "back door" whereby any user can
  gain privileged system access.

o Monitor system logs - System access logs should be periodically
  scanned (e.g., via UNIX "last" command) for suspicious or
  unlikely system activity.

o Terminal servers - Terminal servers with unrestricted network
  access (that is, terminal servers which allow users to connect
  to and from any system on the Internet) are frequently used to
  camouflage network connections, making it difficult to track
  unauthorized activity.  Most popular terminal servers can be
  configured to restrict network access to and from local hosts.

o Passwords - Guest accounts and accounts with trivial passwords
  (e.g., username=password, password=none) are common targets.
  System administrators should make sure that all accounts are
  password protected and encourage users to use acceptable
  passwords as well as to change their passwords periodically, as
  a general practice.  For more information on passwords, see
  Federal Information Processing Standard Publication (FIPS PUB)
  112, available from the National Technical Information Service,
  U.S. Department of Commerce, Springfield, VA 22161.

o Anonymous file transfer - Unrestricted file transfer access to
  a system can be exploited to obtain sensitive files such as the
  UNIX /etc/passwd file.  If used, TFTP (Trivial File Transfer
  Protocol - which requires no username/password authentication)
  should always be configured to run as a non-privileged user and
  "chroot" to a file structure where the remote user cannot
  transfer the system /etc/passwd file.  Anonymous FTP, too,
  should not allow the remote user to access this file, or any
  other critical system file.  Configuring these facilities to
  "chroot" limits file access to a localized directory structure.

o Apply fixes - Many of the old "holes" in UNIX have been closed.
  Check with your vendor and install all of the latest fixes.

If system administrators do discover any unauthorized system
activity, they are urged to contact the Computer Emergency
Response Team (CERT).

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - -

Internet Cracker On The Loose:  Who Is He?
October 2, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ There
is a cracker on the loose in the Internet.  This is the
information made public so far.  Traces of the cracker were found
at the Institute for Advanced Studies in Princeton.  He also left
traces at one of the Super computer centers.  Both CERT and the
FBI have been called.

The technique that is being used is as follows:

1) He has a modified telnet that tries a list passwords on
   accounts.  Username forwards and backwards, username + pw,
   etc.

2) He seems to have a program call "ret", that is breaking into
root.

3) He seems to be getting a list of victim machines via people's
.rhosts files.

4) He copies password files to the machines that he is currently
working from.

5) He is good about cleaning up after himself.  He zeros out log
   files and other traces of himself.

6) The breakins are occurring between 10 PM Sunday nights and 8
   AM Monday mornings.

7) He seems to bring along a text file of security holes to the
   machines he breaks into.

8) Backtracing the network connections seem to point to the
   Boston area as a base of operations.

The system administrator at IAS found a directory with the name
"..  " (dot dot space space).  The files mentioned above were
found in this directory.
_______________________________________________________________________________

Worried Firms Pay Hush Money To "Hackers"                         June 12, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Richard Caseby (London Times)

            "Are London Firms Offering Amnesty To Hacker Thieves?"

Firms in the City of London are buying the silence of hackers who
break into their computers and steal millions of pounds.

At least six London firms have signed agreements with criminals,
offering them amnesty if they return part of the money.  The
firms fear that if they prosecute they will lose business when
customers learn that their computer security is flawed.

In several of the case the losses exceeded 1 million pounds, but
only a tenth of the total was returned.

The Computer Industry Research Unit (CIRU) which uncovered the deals and which
is advising the Department of Trade and Industry in data security, believes the
practice of offering amnesties is widespread.

"Companies who feel vulnerable are running scared by agreeing to these immoral
deals.  Their selfishness is storing up serious problems for everyone else,"
said Peter Nancarrow, a senior consultant.

Police have warned that deals struck with criminals could
possibly lead to an employer being prosecuted for perverting the
course of justice.

Detective Inspector John Austin, of Scotland Yard's computer
fraud squad, said, "Employers could find themselves in very deep
water by such strenuous efforts to protect the credibility of
their image."

Legal experts say the firms are making use of section five of the
Criminal Law Act 1967 which allows them to keep silent on crimes
and privately agree on compensation.  However, an employer
becomes a witness to the offense by taking evidence from a
criminal when the deal is drawn up.

Hackers steal by electronically transferring funds or by
programming a computer to round off all transactions by a tiny
amount and diverting the money to a separate account.

In one case, an assistant programmer at a merchant bank diverted
8 million pounds to a Swiss bank account and then gave back 7
million in return for a non-disclosure agreement protecting him
against prosecution.

Such thefts have spread alarm throughout London, with consultants
offering to penetrate the computer networks of banks and finance
houses to pinpoint loopholes before a hacker does.

The biggest contracts cost up to 50,000 pounds and can involve a
four month investigation in which every weakness is explored.

Detectives have found that computer security at many London
institutions is riddled with loopholes.  A city of London police
operation, codenamed Comcheck, revealed wide spread weaknesses.
Firms were asked to track the number of unauthorized logons over
Easter bank holiday.

Some companies unable to tell whether hackers had penetrated
their network, while others lacked any security defenses.

In addition to theft, companies are vulnerable to blackmail.
Hackers can threaten to sabotage computers by inserting "viruses"
and "logic bombs" --rogue programs which can paralyze a system.

This type of threat has prompted the offer of a new insurance
policy underwritten by Lloyd's which specifically covers viruses
and other computer catastrophes.
______________________________________________________________________