💾 Archived View for aphrack.org › issues › phrack42 › 4.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
==Phrack Magazine== Volume Four, Issue Forty-Two, File 4 of 14 Prelude to a Kiss - Lessons Unlearned Are Doomed To Bring Misery Ad-Infinitum - The following is an article I wrote for a mainstream computer security periodical called ISPNews. At the time, I had been discussing the idea of a bi-monthly column with the editor at that time, Len Spitz. (Now the editor is Michael Alexander, ex-of Computerworld) The following article, although very, very tame by my standards, and admittedly lacking in enough hardcore information to help security professionals to apply a quick fix to their many problems, caused quite a stir among the folks at ISPNews. Since this article was from me, a self-proclaimed hacker, it underwent an extraordinary amount of scrutiny. Rather than be accepted or denied by the editor, my article got the dubious honor of being sent before an editorial advisory board. I checked every back issue of ISPNews and could find no mention of such an entity until the November/December 1991 issue, the issue immediately following an length interview with none other than myself. When I questioned Len Spitz about this rather odd fact, he maintained that this committee had indeed existed, but stammered his way through my question to name any other article that they had convened to judge in the past, and to explain the duties of such a group. He could not give me any answers. The group itself was obviously geared to be a type of kangaroo-court. It consisted of: William J. Cook -- The man who less than two years prior had ordered my privacy and civil rights violated by the Secret Service solely on the basis of two bulletin board posts and my association with members of the Legion of Doom and the Phrack Magazine staff. William H. Murray -- A senior consultant with Deloitte & Touche who had two weeks prior stood up before my presentation to the MIS Training Institute's 11th Annual Conference and said loudly "I can't take this any more, I'm leaving," to the astounded audience. The man who went on to state in his own column in ISPNews, "Can we lie down with dogs and get up without fleas?" and "Ask yourself if you wish to work in a profession populated by rogues. Ask yourself if you want your reputation mixed with theirs." Winn Schwartau -- A security consultant with a broad view and an open mind, undoubtedly resulting from his background in the music industry, as opposed to the bean-counting world of MIS. David J. Stang -- Director of research, NCSA. Noted virus specialist. This was the group. Here is what they said about my article: Bill Cook -- "It's very well-written and informative, but shouldn't be published for legal reasons." (What those reasons might have been were not stated, nor did Mr. Cook return my call to his office.) Bill Murray -- Was not even given the file to read, as his response was deemed to predictable. Winn Schwartau -- "Publish it. This is valuable information." David Stang -- Was not given the file because, according to Len Spitz "David is just a virus expert, and this isn't in his arena, so we gave it to Ray Kaplan." Ray Kaplan -- Did not want to comment on it because he said, "It's not my expertise, so I gave it to a friend." I believe Ray did not want to get involved with anything having to do with hackers after the reactionary attitudes of the DECUS attendees towards his defense of Kevin Mitnik that nearly left him in bankruptcy. I cannot blame him at all. (Hell, I like the guy...he's certainly more brazen with attitude these days, I mean, he went to HoHoCon for God's-sake!) Ray's Friend -- "This is of absolutely no use to the information security professional, but of great use to the hacker community." I still do not know who Ray's "friend" was. I hope his Alzeheimer's has subsided since this comment. Needless to say, the article went unpublished. Shortly thereafter I received a letter from Robert Fox, an assistant vice-president at Sprint. Somehow my little article had snaked its way over to Kansas City. It's amazing how one faxed copy of an article could have reached so many people in such a short period of time. Mr. Fox had the following to say: ------------------------------------------------------------------------ United Telecom/US Sprint 9221 Ward Parkway Kansas City, Missouri 64114 816-822-6262 Robert F. Fox January 13, 1992 Assistant Vice President Corporate Security VIA AIRBORNE EXPRESS Mr. Chris Goggans COMSEC Suite 1470 7322 Southwest Freeway Houston, TX 77074 Re: Your Article "Packet-switched Networks Security Begins With Configuration" Dear Mr. Goggans: A copy of the referenced unpublished article, which is enclosed with this letter, has come to our attention. After review, we believe the article is inaccurate and libelous. If published the contents of the article could cause damage to Sprint customers, Sprint and our reputation, and we request that you not publish or otherwise disseminate it. In addition, we believe some of the information contained in the article has been obtained through violation of the property rights of Sprint and/or our customers and we demand that you cease any efforts or attempts to violate or otherwise compromise our property whether or not for you personal financial gain. Sincerely, Robert F. Fox Enclosure ------------------------------------------------------------------------ Regardless of how Mr. Fox came into possession of this article, i have to question his letter based on his comments. First he states that the information is almost criminally incorrect and could cause harm to Sprint's reputation. Then he states that information in the article has come to be known through the violation of the security of Sprintnet and/or clients of Sprintnet. In effect, I am both a thief and a liar according to Mr. Fox. Well, if I were a thief the information could not possibly be inaccurate if it were obtained from Sprintnet or its clients. If I was a liar, why would they think the information came from themselves and/or their clients? Mr. Fox's thinly veiled threat caused me great amusement. I then decided no mainstream publication would touch this article. I don't know why everyone is so scared of the truth. Perhaps if the truth were known people would have to work, and perhaps if the truth were known some people would be out of work. None of this is of concern to me anymore. I am here to speak the truth and to provide uncensored information gathered from a variety of sources to provide readers of this magazine the facts they need to quench their thirst for knowledge. This article is included as a prelude to a series of articles all based on packet switched networks as related to information merely alluded to in my harmless little article. To our readers, "enjoy." To the cowering so-called security experts, "kiss my ass." ------------------------------------------------------------------------ Packet-switched Networks Security Begins with Configuration For many companies the use of packet-switched networks has allowed for increased interconnectivity of systems and easy remote access. Connection to a major public packet-switched network brings increased access points with local dialups in many cities around the nation as well as access points from foreign countries. With the many obvious benefits provided by this service, improper configuration of either the host's connection to the network or of the network itself can lead to extreme security problems. The very connection to a public packet-switched network immediately increases the exposure of that particular system. America's two major commercial networks, BT-Tymnet and Sprintnet, are probably the most popular US targets for hackers around the world. The wealth of systems available on these two networks has provided hackers with a seemly endless supply of sites on which to sharpen their skills. The ease of use inherent in both networks makes them popular for legitimate users as well as illegitimate users. The Telenet software utilized in the Sprintnet network allows users to enter a network user address (NUA) in the standard format as outlined in the X.121 numbering standard: DDDDAAAHHHHHPP Where D = the four digit data network identifier code (DNIC) A = the three digit area code corresponding to the host H = the host address P = the port or (sub) address On domestic calls the DNIC for Sprintnet (3110) is stored in all Sprintnet equipment and is used as the default. By merely picking an area code, most often corresponding to the standard area codes of the North American Numbering Plan, and an additional one to five digits a would-be intruder can connect to any number of systems while looking for targets. In the past many software packages have been written to automate this process, and large scans of the network have been published in a variety of underground media. The Tymnet II software utilized in BT's Tymnet prompts the user for a mnemonic which corresponds to a host or number of hosts. The mnemonic, or username, is referenced to a fixed host address in the network's Master User Directory (MUD). This username may allow the caller to connect to a variety of sites, as opposed to merely one, by entering additional information in separate fields after the username. It may also correspond to a network gateway thereby allowing the user to enter a number in the X.121 format and connect to that specific site. This particular network, with its primary use of words as opposed to numbers, has been compromised by intruders who guess common words or names in their attempts to connect to remote sites. Each network has its own particular set of problems but solutions to these problems are both simple and quick in implementation. SPRINTNET The first deterrence in securing a host on this network is to restrict access to the site. This can be accomplished in a number of ways. The most obvious is to have the site refuse collect calls. All calls on Sprintnet are reverse-billed, unless the site has specifically asked that they not be billed for incoming calls. This makes the site accessible only through the use of a Network User Identifier (NUI). Another method of restricting access from intruders is to place the host in a closed user group (CUG). By electing to have the host in a CUG, the administrator can allow only certain NUIs to connect, and can also restrict the actual addresses from which access is allowed. For example: A site is placed in a CUG that will allow only calls from the company's remote branch in Dallas to access the host and only with the NUI created specifically for that branch. All attempts to access the site from an address outside the 214 area will result in an error message indicating an invalid source address. All attempts to connect with an invalid NUI will result in an error indicating an invalid ID. This information is maintained in the networks main TAMS (TP Access Management System) database, and is not subject to manipulation under normal circumstances. Many sites on the Sprintnet network have specific subaddresses connecting to a debug port. This is usually at subaddress 99. All connections to debug ports should be restricted. Allowing users access to this port will allow them the ability to load and display memory registers of the Sprintnet equipment connected to the port, and even reset as well as enable or disable the host. Most debug ports are equipped with preset passwords from the vendor, but should be changed. These ports should also restrict connection from all addresses except those specified by the company. An additional measure that may foil intruders relying on software programs to find all addresses in a given area code is to request that the host be given an address above 10000. The time involved in scanning the network is extensive and most casual intruders will not look past the 10000 range. In fact, many will not venture past 2000. BT-TYMNET Any company having a host on the Tymnet network should choose a username that is not easily associated with the company or one that is not a common word or name. If an intruder is aware that XYZ Inc. has a UNIX based system on TYMNET he or she would begin attempts to find this system with the obvious usernames: XYZ, XYZINC, XYZNET, XYZ1, XYZUNIX, UNIX, etc. BT-Tymnet allows for these usernames to have additional password security as well. All hosts should have this option enabled, and passwords should be changed frequently. The password should always be a minimum of six digits, should include letters, numbers and at least one symbol character, and should not be associated in any way with the corresponding username. Many clients of BT-Tymnet have purchased the Tymnet II software and have individual sub-networks that are linked to the public network through gateways. Each subnet is personally configured and maintained through the use of a package of utilities provided by Tymnet. These utilities each perform a specific task and are highly important to the smooth operation of the network. These utilities may be accessed either directly from the host-end or remotely through the network by entering a corresponding username. Some of these utilities are: XRAY : a monitoring utility DDT : a debugging utility NETVAL : a database of username to host correspondence PROBE : a monitoring utility TMCS : a monitoring utility Under NO CIRCUMSTANCES should these utilities be left without a password on the company's subnet. These utilities should also never be named similarly to their given name. Should an intruder gain access to any of these utilities the integrity of your network will be at risk. For example: Allowing an outsider access to the XRAY utility, would give he or she the ability to monitor both incoming and outgoing data from the host using the "TA" command (display trace data table in ASCII). Use of certain XRAY commands are restricted by a security function that allows only certain usernames to execute commands on the basis of their existence in a "Goodguy" list, which can be displayed by any XRAY user. Should a user be of the highest privilege, (2), he or she can add or delete from the "Goodguy" list, reset connections, and display trace data on channels other than the default channel. Allowing a user access to DDT can result in complete disruption of the network. DDT allows the user the ability to write directly to the network controller "node code" and alter its configuration. Allowing a user access to NETVAL will allow the user to display all usernames active on the network and the corresponding host addresses. OTHER PROBLEMS EXAMPLE ONE On many networks users have the ability to connect to the packet assembler/disassembler (PAD) of the network dial-ups. This has led to significant problems in the past. In the mid-1980's two American hackers were exploring the German packet network DATEX-P. One connected to a host in Berlin and was immediately disconnected by the remote site. Before the hacker could react, the German host connected to the NUA corresponding to his Sprintnet PAD and sent him a login prompt. This alarmed the hacker greatly, as he assumed that the proprietors of the German host had somehow noticed his attempt to access their system. He contacted his partner and told him of the occurrence. The two concluded that since the NUA of the origination point is sent in the packet-header, the remote site must have been programed to recognize the NUA and then return the call. The fact that it had returned a call to a public PAD was intriguing to the pair, so they decided to attempt to recreate the event by calling each other. Both individuals connected to the network and one entered the NUA corresponding to the others PAD. A connection resulted and the two were able to interact with one another. They then decided that they would periodically meet in this fashion and discuss their findings from Germany. At the time of the next meeting, the connection did not occur as planned. One hacker quickly received a telephone call from the second who exclaimed rather excitedly that he had attempted to connect to his partner as planned, but accidentally connected to another PAD and intercepted a legitimate user typing his NUI. Further investigation proved that one could connect to public PADs during the idle period when the user was in network mode, prior to making a connection to a remote site. This discovery was intended to remain secret, because of its extremely dangerous applications. Nevertheless, word of this discovery soon reached the entire hacker community and what came to be known as "PAD to PAD" was born. The "PAD to PAD" technique became so wide-spread that hackers were soon writing software to intercept data and emulate hosts and capture login names and passwords from unsuspecting network users. Hackers were intercepting thousands of calls every day from users connecting to systems ranging from banking and credit to the Fortune 500 to government sites. After nearly two years of "PAD to PAD" Sprintnet became alerted to the crisis and disallowed all connections to public PADs. When Sprintnet expanded its service overseas they once again left access to the overseas PADs unrestricted. The problem went unnoticed again until their attention was brought to it by a hacker who called Sprintnet security and told them that they ought to fix it quickly before it became as wide-spread as before. The problem was resolved much quicker this time. This particular technique was not limited to Sprintnet. All networks using the Telenet software are at risk to this type of manipulation. This type of network manipulation was integral in the recent compromise of a large Bell Company's packet network in a much-publicized case. Certain foreign networks in countries such as Israel, England, Chile, Panama, Peru and Brazil are also at risk. EXAMPLE TWO In the late 1980's hackers stumbled onto a packet network owned and maintained by a large facilities maintenance company. This particular network had a huge flaw in its setup. It connected all calls placed through it as if they were placed with an NUI. This allowed hackers to place calls to addresses that refused collect connections on networks around the world. This became a popular method for hackers to access underground chat systems in Europe. Additionally, this network contained a score of computers belonging to a major automobile manufacturer. Most of these systems were highly insecure. The network also allowed unrestricted access to network debug ports. This particular network also had a toll-free number on an MCI exchange. At the time, MCI was having some difficulty getting their equipment to accept the ANI information to provide customers with a full call- detail report on their monthly statement. The hackers were well aware of this fact and made frequent use of the network with no fear of prosecution. Eventually MCI was able to fix their translation problem and were able to provide their clients with full call-detail reports. When this was learned, many hackers abandoned use of the network, but several others were later prosecuted for its usage when their number turned up on the bill. EXAMPLE THREE Until quite recently intimate knowledge of the utilities driving various packet-switched networks were known by an exclusive few. While investigating a network owned by an extremely large Cleveland-based conglomerate hackers came across a system where documentation on the usage of every utility was kept online. The hackers quickly downloaded all the information and it soon became somewhat wide-spread among the underground community. With less-skilled and more unscrupulous individuals in possession of this information many networks began experiencing disruptions and system integrity was quickly lost as hackers began monitoring data traffic. No information on the usage of packet networks or their utilities should ever be kept online. Hard copies should be kept in the possession of the network administrator, and when updated, obsolete versions must be destroyed. WHAT TO DO When a security violation stemming from a connection through the packet network is noticed, Network Security should be notified. Clients of BT-Tymnet should notify Steve Matthews at 408-922-7384. Clients of Sprintnet should notify Pat Sisson at 703-689-6913. Once changes have been enacted in the network to prevent further break-ins, the host computer should be checked thoroughly for any changes or damages, and all individual account passwords should be changed. CONCLUSION It is critical that the packet network be configured properly and that all measures are taken to ensure its security. Even the most secure host computer can be easily compromised if it is connected to an insecure packet network. ----------------------------------------------------------------------