| ==Phrack Inc.== | |
| Volume Three, Issue 28, File #9 of 12 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXVIII/Part 1 PWN | |
| PWN PWN | |
| PWN October 7, 1989 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Welcome to Issue XXVIII of Phrack World News! | |
| This issue of Phrack World News contains stories and articles | |
| detailing events from June - October, 1989 and features Bellcore, | |
| Chalisti, Chaos Computer Club, Clifford Stoll, The Disk Jockey, | |
| Fry Guy, The Grim Phreaker, Legion of Doom, The Leftist, Major | |
| Havoc, Kevin Mitnick, Robert Morris, Oryan QUEST, The Prophet, | |
| Red Rebel, Shadow Stalker, Shadow 2600, Terra, The Urvile, and | |
| much more so keep reading. | |
| "The Real Future Is Behind You... And It's Only The | |
| Beginning!" | |
| _______________________________________________________________________________ | |
| Judge Suggests Computer Hacker Undergo Counseling | |
| July 17, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Karen E. Klein (New York Times) | |
| LOS ANGELES -- A federal judge has suggested that Los Angeles | |
| computer hacker Kevin Mitnick be sentenced to a one-year | |
| residential treatment program to break his "computer addiction." | |
| Although she did not finalize her sentence, U.S. District Judge | |
| Mariana R. Pfaelzer said Monday that she thought Mitnick had | |
| some problems that would | |
| benefit from counseling. | |
| Pfaelzer will actually pass sentence at a hearing set for | |
| Tuesday, July 18. | |
| The idea that a computer "junkie" who cannot control his urge to | |
| break into computers could be helped with a program similar to | |
| Alcoholics Anonymous is a new one, Harriet Rossetto, director of | |
| the treatment program, told the judge. | |
| "His behavior is an impulse disorder," Rossetto said. "The | |
| disease is the addiction, whether it be drugs, alcohol, gambling, | |
| hacking, money or power." | |
| Rossetto, who was contacted by Mitnick's family, said Mitnick | |
| would be the first person addicted to computer crime to be | |
| treated in the Bet T'shuvah program , a 20-bed residential | |
| treatment program for Jewish criminal offenders. | |
| "It's not willful conduct, what Kevin does," she said. "He's | |
| tried to control his behavior but hacking gives him a sense of | |
| power, makes him feel like somebody when he's depressed or he's | |
| lost a job." | |
| Mitnick, age 25, has been in federal prison for seven months | |
| since his arrest | |
| last December on computer fraud charges. | |
| He pleaded guilty in May to possessing 16 unauthorized MCI | |
| long-distance codes and to stealing a computer security program | |
| from the Digital Equipment Corporation in Massachusetts. | |
| Mitnick has been described in court as a computer whiz who could | |
| break into secured systems and change telephone or school records | |
| at will. He told the judge on Monday, July 17 that he wants to | |
| stop hacking. | |
| "I sincerely want to change my life around and be productive | |
| rather than destructive," Mitnick said. | |
| "With counseling to break the addictive pattern I feel I have | |
| towards computer hacking, I can take an active role and I don't | |
| have to have the compulsive behavior again." | |
| Assistant U.S. Attorney James R. Asperger said that the | |
| government does not oppose Mitnick's release from prison to be | |
| treated at Bet T'shuvah. | |
| "The judge has taken this case very seriously. It shows computer | |
| hacking is not like a Nintendo game," Asperger said. | |
| Mitnick has cooperated with FBI investigators since his pleaded | |
| guilty and helped bring charges against his former best friend, | |
| Leonard DiCicco, 23, of Calabasas, Asperger said. | |
| DiCicco, who initially tipped the FBI to Mitnick's crimes, has | |
| agreed to plead guilty to a charge of aiding and abetting the | |
| transportation of a stolen computer program. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Authorities Backed Away From Original Allegations | |
| July 23, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Karen E. Klein (New York Times) | |
| LOS ANGELES -- Shortly after computer hacker Kevin Mitnick was | |
| arrested last December (1988), he was characterized as an extreme | |
| threat who could wreak electronic chaos if he got near so much as | |
| a telephone without supervision. | |
| Police and FBI agents started trying to corroborate the flurry of | |
| rumors that arose about the malicious actions of the computer | |
| whiz from suburban Panorama City, whose case attracted national | |
| attention. | |
| Three judges denied Mitnick, age 25, bail on the ground that he | |
| was a danger to society and ordered him held in a high-security | |
| jail cell. | |
| But after separating the Mitnick myth from the reality, | |
| authorities backed away from many of their original allegations. | |
| "A lot of the stories we originally heard just didn't pan out, so | |
| we had to give him the benefit of the doubt," said James R. | |
| Asperger, the assistant U.S. attorney who handled Mitnick's case. | |
| Mitnick, pudgy and nervous, appeared in court last week to | |
| apologize for his crimes and to ask for treatment to help break | |
| his compulsive "addiction" to computers. | |
| U.S. District Judge Mariana R. Pfaelzer sentenced him to serve | |
| one year in | |
| prison -- including the nearly eight months he already has served | |
| -- and then to undergo six months of counseling and treatment | |
| similar to that given to alcoholics or drug addicts. | |
| "I think he has problems that would benefit greatly from this | |
| kind of therapy," Pfaelzer said. "I want him to spend as much | |
| time as possible in counseling." | |
| The case that began with a bang ended with Asperger pointing out | |
| that the one-year prison term is the stiffest sentence ever | |
| handed out in a computer fraud case. | |
| Mitnick originally was accused of using unauthorized MCI | |
| long-distance codes to tap into Leeds University computers in | |
| England and of stealing a $4 million computer security system | |
| from the Digital Equipment Corporation in Massachusetts. | |
| He ultimately agreed to plead guilty to possessing 16 | |
| unauthorized MCI long-distance codes and to stealing the computer | |
| security program. The other charges were dismissed. | |
| Alan Rubin, Mitnick's lawyer, said he felt vindicated by the | |
| outcome of the case. | |
| Rubin contended from the start that computerphobia and adolescent | |
| exaggeration led authorities to mistakenly brand Mitnick a | |
| malicious criminal. | |
| "Once the snowball starts rolling, you can't stop it," said | |
| Rubin, who waged an unsuccessful campaign up to the federal | |
| appeals court to get bail for his client. | |
| Far from being serious, Rubin said, Mitnick's actions were mostly | |
| immature, adolescent pranks. | |
| He pointed to evidence that Mitnick was able to electronically | |
| cut off telephone service to people he was angry with and once | |
| sent an enemy a $30,000 hospital telephone bill. | |
| "It was the computer equivalent of sending your friend 14 | |
| pizzas," he said. | |
| Many of the legends surrounding Mitnick came from the subculture | |
| of computer hackers -- and specifically from a man who was once | |
| Mitnick's best friend, Leonard Mitchell DiCicco, age 23, of | |
| Calabasas, California. | |
| DiCicco, who had a falling out with Mitnick over a $100 bet, told | |
| computer security specialists at the Digital Equipment | |
| Corporation that Mitnick had been trespassing on their system. | |
| They in turn contacted the FBI agents, who arrested Mitnick. | |
| What DiCicco told investigators may or may not have been entirely | |
| truthful, Rubin said. | |
| "I have no idea what his motives were," Rubin said. | |
| But DiCicco, who alerted authorities to Mitnick's crime, had the | |
| tables turned on him after the government refused to grant him | |
| absolute immunity for his testimony against Mitnick. | |
| When the prosecution said they might charge him with a crime, | |
| DiCicco clammed up and refused to cooperate any further. But | |
| from his prison cell, Mitnick agreed to cooperate and provided | |
| enough incriminating evidence for the government to charge | |
| DiCicco. | |
| DiCicco is expected to plead guilty to a charge of aiding and | |
| abetting the interstate transportation of stolen property -- the | |
| computer security program -- on Monday. | |
| Asperger said he was not sure whether DiCicco would get a | |
| sentence similar to Mitnick's. | |
| "Although they were friends and partners in computer hacking, | |
| (DiCicco) appeared to play a subordinate role (in the crime)," | |
| Asperger said. | |
| Other rumors about Mitnick's conduct came from fellow hackers, | |
| who may have blown the stories out of proportion. | |
| "It's a very strange sub-culture, with a lot of jealousies," | |
| Rubin said. "Part of it is bragging about how macho you are and | |
| what systems you've broken into. It's very immature in a lot of | |
| ways." | |
| But prosecutors, citing Mitnick's various scrapes with computer | |
| misconduct since he was 13, aren't willing to let him off the | |
| hook entirely. | |
| "I think there's some substance to these things (the rumors that | |
| arose in Mitnick's case), an awful lot of them," said Los Angeles | |
| FBI chief Lawrence Lawler, who is a computer buff himself and | |
| followed Mitnick's case closely. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| If you are looking for other articles about Kevin David Mitnick aka Condor | |
| please refer to; | |
| "Pacific Bell Means Business" (10/06/88) PWN XXI. . .Part 1 | |
| "Dangerous Hacker Is Captured" (No Date ) PWN XXII . .Part 1 | |
| "Ex-Computer Whiz Kid Held On New Fraud Counts" (12/16/88) PWN XXII . .Part 1 | |
| "Dangerous Keyboard Artist" (12/20/88) PWN XXII . .Part 1 | |
| "Armed With A Keyboard And Considered Dangerous" (12/28/88) PWN XXIII. .Part 1 | |
| "Dark Side Hacker Seen As Electronic Terrorist" (01/08/89) PWN XXIII. .Part 1 | |
| "Mitnick Plea Bargains" (03/16/89) PWN XXV. . .Part 1 | |
| "Mitnick Plea Bargain Rejected As Too Lenient" (04/25/89) PWN XXVII. .Part 1 | |
| "Computer Hacker Working On Another Plea Bargain" (05/06/89) PWN XXVII. .Part 1 | |
| "Mitnick Update" (05/10/89) PWN XXVII. .Part 1 | |
| "Kenneth Siani Speaks Out About Kevin Mitnick" (05/23/89) PWN XXVII. .Part 1 | |
| _______________________________________________________________________________ | |
| BITNET/CSNET Announce Merger and Formation of CREN August 18, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Washington, DC | |
| -- Two of the nation's leading academic and research computer | |
| networks announced today that final steps are being taken to | |
| merge their organizations. | |
| Ira Fuchs, President of BITNET, and Bernard Galler, Chairman of | |
| CSNET, jointly reported that the two networks, which together | |
| include 600 colleges, universities, government agencies, and | |
| private sector research organizations, will unite to form the | |
| Corporation for Research and Educational Networking, CREN. | |
| Galler, a Professor of Electrical Engineering and Computer | |
| Science at the University of Michigan, commented: "The aims of | |
| CSNET and BITNET -- to support and promote the use of computer | |
| networks on campuses and within research organizations -- have | |
| converged over the last several years. We believe that by | |
| bringing these two networks into a single organization, we will | |
| be able to provide better service to our network users and more | |
| effectively participate in the fast-changing national network | |
| environment." | |
| Fuchs, Vice President for Computing and Information Technology at | |
| Princeton University, sees the move as a strengthening factor: | |
| "The need for campus networks and the introduction of new | |
| technology make it necessary to build a common base of network | |
| services using the most progressive technology available. By | |
| eliminating overlap between our two organizations, we will | |
| become more efficient, and more importantly, we can take a | |
| stronger role in the the formation of the national education and | |
| research network. We can achieve this goal faster and at lower | |
| cost by leveraging the efforts of the two major academic | |
| networking organizations." | |
| The merger of CSNET and BITNET has been studied for more than a | |
| year by a planning group consisting of representatives from both | |
| networks. CSNET currently lists 145 institutional and corporate | |
| members, and BITNET 480 members. Together, the two networks | |
| cover all 50 states and 32 foreign countries, including Japan, | |
| Brazil, Mexico, and Argentina. Both maintain gateways to EARN | |
| (European Academic Research Network), NetNorth (Canada), and the | |
| National Internet. | |
| The planning group's recommendations to merge were approved by | |
| the BITNET, Inc. Trustees and the Directors of the University | |
| Corporation for Atmospheric Research, operators of CSNET for the | |
| last five years. An information packet on the merger is being | |
| mailed to all members of both networks this week, with a ballot | |
| for BITNET members, who must approve the final legal steps under | |
| the provisions of BITNET By-Laws. In an advisory vote last | |
| winter, BITNET members approved the merger in principle by more | |
| than 90% of those voting. | |
| A gradual transition period is planned to bring together CSNET | |
| and BITNET services. CREN plans to continue use of EDUCOM and | |
| Bolt, Beranek and Newman (BBN) to provide technical and general | |
| management services to its members. | |
| EDUCOM President Kenneth M. King commented, "We are entering a | |
| particularly challenging period in the creation of an advanced | |
| national network infrastructure for research and education. CREN | |
| will play a major role in the future of these computer networks, | |
| which are becoming more and more important to the conduct of | |
| research and the quality of education. EDUCOM is pleased to have | |
| an opportunity to support the services and activities of CREN. " | |
| Frank Heart, Senior Vice President, BBN Systems and Technologies | |
| Corporation, said, "In keeping with its long involvement in the | |
| development of networking technologies, BBN is pleased to play a | |
| major supporting role in the evolution of BITNET and CSNET." | |
| The proposed CREN Board includes Fuchs and Galler; | |
| Douglas Bigelow. . . . . Wesleyan University | |
| William Curtis . . . . . University Corporation for Atmospheric Research | |
| David Farber . . . . . . University of Pennsylvania | |
| Suzanne Johnson. . . . . INTEL Corporation | |
| Mark Laubach . . . . . . Hewlett-Packard Corporation | |
| Philip Long. . . . . . . Yale University | |
| Dennis Ritchie . . . . . AT&T Bell Laboratories | |
| Martin Solomon . . . . . University of South Carolina | |
| Douglas Van Houweling. . University of Michigan | |
| William Yundt. . . . . . Stanford University | |
| For more information, contact | |
| Corporation for Research and Educational Networking | |
| Suite 600 | |
| 1112 16th Street NW | |
| Washington, DC 20036 | |
| (202) 872-4215 | |
| [Obviously they decided not to call it ONEnet --KL] | |
| _______________________________________________________________________________ | |
| CERT Internet Security Advisory August 16, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From Kenneth R. van Wyk | |
| Many computers connected to the Internet have recently | |
| experienced unauthorized system activity. Investigation shows | |
| that the activity has occurred for several months and is | |
| spreading. Several UNIX computers have had their "telnet" | |
| programs illicitly replaced with versions of "telnet" which log | |
| outgoing login sessions (including usernames and passwords to | |
| remote systems). It appears that access has been gained to many | |
| of the machines which have appeared in some of these session | |
| logs. (As a first step, frequent telnet users should change | |
| their passwords immediately.) While there is no cause for panic, | |
| there are a number of things that system administrators can do to | |
| detect whether the security on their machines has been | |
| compromised using this approach and to tighten security on their | |
| systems where necessary. At a minimum, all UNIX site | |
| administrators should do the following: | |
| o Test telnet for unauthorized changes by using the UNIX | |
| "strings" command to search for path/filenames of possible log | |
| files. Affected sites have noticed that their telnet programs | |
| were logging information in user accounts under directory names | |
| such as "..." and ".mail". | |
| In general, we suggest that site administrators be attentive to | |
| configuration management issues. These include the following: | |
| o Test authenticity of critical programs - Any program with | |
| access to the network (e.g., the TCP/IP suite) or with access | |
| to usernames and passwords should be periodically tested for | |
| unauthorized changes. Such a test can be done by comparing | |
| checksums of on-line copies of these programs to checksums of | |
| original copies. (Checksums can be calculated with the UNIX | |
| "sum" command.) Alternatively, these programs can be | |
| periodically reloaded from original tapes. | |
| o Privileged programs - Programs that grant privileges to users | |
| (e.g., setuid root programs/shells in UNIX) can be exploited to | |
| gain unrestricted access to systems. System administrators | |
| should watch for such programs being placed in places such as | |
| /tmp and /usr/tmp (on UNIX systems). A common malicious | |
| practice is to place a setuid shell (sh or csh) in the /tmp | |
| directory, thus creating a "back door" whereby any user can | |
| gain privileged system access. | |
| o Monitor system logs - System access logs should be periodically | |
| scanned (e.g., via UNIX "last" command) for suspicious or | |
| unlikely system activity. | |
| o Terminal servers - Terminal servers with unrestricted network | |
| access (that is, terminal servers which allow users to connect | |
| to and from any system on the Internet) are frequently used to | |
| camouflage network connections, making it difficult to track | |
| unauthorized activity. Most popular terminal servers can be | |
| configured to restrict network access to and from local hosts. | |
| o Passwords - Guest accounts and accounts with trivial passwords | |
| (e.g., username=password, password=none) are common targets. | |
| System administrators should make sure that all accounts are | |
| password protected and encourage users to use acceptable | |
| passwords as well as to change their passwords periodically, as | |
| a general practice. For more information on passwords, see | |
| Federal Information Processing Standard Publication (FIPS PUB) | |
| 112, available from the National Technical Information Service, | |
| U.S. Department of Commerce, Springfield, VA 22161. | |
| o Anonymous file transfer - Unrestricted file transfer access to | |
| a system can be exploited to obtain sensitive files such as the | |
| UNIX /etc/passwd file. If used, TFTP (Trivial File Transfer | |
| Protocol - which requires no username/password authentication) | |
| should always be configured to run as a non-privileged user and | |
| "chroot" to a file structure where the remote user cannot | |
| transfer the system /etc/passwd file. Anonymous FTP, too, | |
| should not allow the remote user to access this file, or any | |
| other critical system file. Configuring these facilities to | |
| "chroot" limits file access to a localized directory structure. | |
| o Apply fixes - Many of the old "holes" in UNIX have been closed. | |
| Check with your vendor and install all of the latest fixes. | |
| If system administrators do discover any unauthorized system | |
| activity, they are urged to contact the Computer Emergency | |
| Response Team (CERT). | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| - - - - - - - | |
| Internet Cracker On The Loose: Who Is He? | |
| October 2, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ There | |
| is a cracker on the loose in the Internet. This is the | |
| information made public so far. Traces of the cracker were found | |
| at the Institute for Advanced Studies in Princeton. He also left | |
| traces at one of the Super computer centers. Both CERT and the | |
| FBI have been called. | |
| The technique that is being used is as follows: | |
| 1) He has a modified telnet that tries a list passwords on | |
| accounts. Username forwards and backwards, username + pw, | |
| etc. | |
| 2) He seems to have a program call "ret", that is breaking into | |
| root. | |
| 3) He seems to be getting a list of victim machines via people's | |
| .rhosts files. | |
| 4) He copies password files to the machines that he is currently | |
| working from. | |
| 5) He is good about cleaning up after himself. He zeros out log | |
| files and other traces of himself. | |
| 6) The breakins are occurring between 10 PM Sunday nights and 8 | |
| AM Monday mornings. | |
| 7) He seems to bring along a text file of security holes to the | |
| machines he breaks into. | |
| 8) Backtracing the network connections seem to point to the | |
| Boston area as a base of operations. | |
| The system administrator at IAS found a directory with the name | |
| ".. " (dot dot space space). The files mentioned above were | |
| found in this directory. | |
| _______________________________________________________________________________ | |
| Worried Firms Pay Hush Money To "Hackers" June 12, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Richard Caseby (London Times) | |
| "Are London Firms Offering Amnesty To Hacker Thieves?" | |
| Firms in the City of London are buying the silence of hackers who | |
| break into their computers and steal millions of pounds. | |
| At least six London firms have signed agreements with criminals, | |
| offering them amnesty if they return part of the money. The | |
| firms fear that if they prosecute they will lose business when | |
| customers learn that their computer security is flawed. | |
| In several of the case the losses exceeded 1 million pounds, but | |
| only a tenth of the total was returned. | |
| The Computer Industry Research Unit (CIRU) which uncovered the deals and which | |
| is advising the Department of Trade and Industry in data security, believes the | |
| practice of offering amnesties is widespread. | |
| "Companies who feel vulnerable are running scared by agreeing to these immoral | |
| deals. Their selfishness is storing up serious problems for everyone else," | |
| said Peter Nancarrow, a senior consultant. | |
| Police have warned that deals struck with criminals could | |
| possibly lead to an employer being prosecuted for perverting the | |
| course of justice. | |
| Detective Inspector John Austin, of Scotland Yard's computer | |
| fraud squad, said, "Employers could find themselves in very deep | |
| water by such strenuous efforts to protect the credibility of | |
| their image." | |
| Legal experts say the firms are making use of section five of the | |
| Criminal Law Act 1967 which allows them to keep silent on crimes | |
| and privately agree on compensation. However, an employer | |
| becomes a witness to the offense by taking evidence from a | |
| criminal when the deal is drawn up. | |
| Hackers steal by electronically transferring funds or by | |
| programming a computer to round off all transactions by a tiny | |
| amount and diverting the money to a separate account. | |
| In one case, an assistant programmer at a merchant bank diverted | |
| 8 million pounds to a Swiss bank account and then gave back 7 | |
| million in return for a non-disclosure agreement protecting him | |
| against prosecution. | |
| Such thefts have spread alarm throughout London, with consultants | |
| offering to penetrate the computer networks of banks and finance | |
| houses to pinpoint loopholes before a hacker does. | |
| The biggest contracts cost up to 50,000 pounds and can involve a | |
| four month investigation in which every weakness is explored. | |
| Detectives have found that computer security at many London | |
| institutions is riddled with loopholes. A city of London police | |
| operation, codenamed Comcheck, revealed wide spread weaknesses. | |
| Firms were asked to track the number of unauthorized logons over | |
| Easter bank holiday. | |
| Some companies unable to tell whether hackers had penetrated | |
| their network, while others lacked any security defenses. | |
| In addition to theft, companies are vulnerable to blackmail. | |
| Hackers can threaten to sabotage computers by inserting "viruses" | |
| and "logic bombs" --rogue programs which can paralyze a system. | |
| This type of threat has prompted the offer of a new insurance | |
| policy underwritten by Lloyd's which specifically covers viruses | |
| and other computer catastrophes. | |
| ______________________________________________________________________ | |