| ==Phrack Magazine== | |
| Volume Four, Issue Forty-Two, File 4 of 14 | |
| Prelude to a Kiss | |
| - Lessons Unlearned Are Doomed To Bring Misery Ad-Infinitum - | |
| The following is an article I wrote for a mainstream computer security | |
| periodical called ISPNews. At the time, I had been discussing the idea | |
| of a bi-monthly column with the editor at that time, Len Spitz. (Now the | |
| editor is Michael Alexander, ex-of Computerworld) | |
| The following article, although very, very tame by my standards, and | |
| admittedly lacking in enough hardcore information to help security | |
| professionals to apply a quick fix to their many problems, caused quite | |
| a stir among the folks at ISPNews. | |
| Since this article was from me, a self-proclaimed hacker, it | |
| underwent an extraordinary amount of scrutiny. Rather than be | |
| accepted or denied by the editor, my article got the dubious honor of | |
| being sent before an editorial advisory board. I checked every back | |
| issue of ISPNews and could find no mention of such an entity until the | |
| November/December 1991 issue, the issue immediately following an length | |
| interview with none other than myself. | |
| When I questioned Len Spitz about this rather odd fact, he maintained | |
| that this committee had indeed existed, but stammered his way through my | |
| question to name any other article that they had convened to judge in | |
| the past, and to explain the duties of such a group. He could not give | |
| me any answers. | |
| The group itself was obviously geared to be a type of kangaroo-court. | |
| It consisted of: | |
| William J. Cook -- The man who less than two years prior had ordered my | |
| privacy and civil rights violated by the Secret | |
| Service solely on the basis of two bulletin board | |
| posts and my association with members of the Legion | |
| of Doom and the Phrack Magazine staff. | |
| William H. Murray -- A senior consultant with Deloitte & Touche who had | |
| two weeks prior stood up before my presentation to | |
| the MIS Training Institute's 11th Annual Conference | |
| and said loudly "I can't take this any more, I'm leaving," | |
| to the astounded audience. The man who went on to | |
| state in his own column in ISPNews, "Can we lie | |
| down with dogs and get up without fleas?" and "Ask | |
| yourself if you wish to work in a profession | |
| populated by rogues. Ask yourself if you want your | |
| reputation mixed with theirs." | |
| Winn Schwartau -- A security consultant with a broad view and an open | |
| mind, undoubtedly resulting from his background in the | |
| music industry, as opposed to the bean-counting world | |
| of MIS. | |
| David J. Stang -- Director of research, NCSA. Noted virus specialist. | |
| This was the group. Here is what they said about my article: | |
| Bill Cook -- "It's very well-written and informative, but shouldn't be | |
| published for legal reasons." (What those reasons might have been were | |
| not stated, nor did Mr. Cook return my call to his office.) | |
| Bill Murray -- Was not even given the file to read, as his response was | |
| deemed to predictable. | |
| Winn Schwartau -- "Publish it. This is valuable information." | |
| David Stang -- Was not given the file because, according to Len Spitz | |
| "David is just a virus expert, and this isn't in his arena, so we gave | |
| it to Ray Kaplan." | |
| Ray Kaplan -- Did not want to comment on it because he said, "It's | |
| not my expertise, so I gave it to a friend." I believe Ray did not | |
| want to get involved with anything having to do with hackers after | |
| the reactionary attitudes of the DECUS attendees towards his defense | |
| of Kevin Mitnik that nearly left him in bankruptcy. I cannot blame | |
| him at all. (Hell, I like the guy...he's certainly more brazen with | |
| attitude these days, I mean, he went to HoHoCon for God's-sake!) | |
| Ray's Friend -- "This is of absolutely no use to the information | |
| security professional, but of great use to the hacker community." | |
| I still do not know who Ray's "friend" was. I hope his | |
| Alzeheimer's has subsided since this comment. | |
| Needless to say, the article went unpublished. | |
| Shortly thereafter I received a letter from Robert Fox, an assistant | |
| vice-president at Sprint. Somehow my little article had snaked its | |
| way over to Kansas City. It's amazing how one faxed copy of an article | |
| could have reached so many people in such a short period of time. | |
| Mr. Fox had the following to say: | |
| ------------------------------------------------------------------------ | |
| United Telecom/US Sprint | |
| 9221 Ward Parkway | |
| Kansas City, Missouri 64114 | |
| 816-822-6262 | |
| Robert F. Fox January 13, 1992 | |
| Assistant Vice President | |
| Corporate Security | |
| VIA AIRBORNE EXPRESS | |
| Mr. Chris Goggans | |
| COMSEC | |
| Suite 1470 | |
| 7322 Southwest Freeway | |
| Houston, TX 77074 | |
| Re: Your Article "Packet-switched Networks | |
| Security Begins With Configuration" | |
| Dear Mr. Goggans: | |
| A copy of the referenced unpublished article, which is | |
| enclosed with this letter, has come to our attention. After | |
| review, we believe the article is inaccurate and libelous. If | |
| published the contents of the article could cause damage to Sprint | |
| customers, Sprint and our reputation, and we request that you not | |
| publish or otherwise disseminate it. | |
| In addition, we believe some of the information contained in | |
| the article has been obtained through violation of the property | |
| rights of Sprint and/or our customers and we demand that you cease | |
| any efforts or attempts to violate or otherwise compromise our | |
| property whether or not for you personal financial gain. | |
| Sincerely, | |
| Robert F. Fox | |
| Enclosure | |
| ------------------------------------------------------------------------ | |
| Regardless of how Mr. Fox came into possession of this article, i have to | |
| question his letter based on his comments. First he states that | |
| the information is almost criminally incorrect and could cause harm to | |
| Sprint's reputation. Then he states that information in the article has | |
| come to be known through the violation of the security of Sprintnet and/or | |
| clients of Sprintnet. In effect, I am both a thief and a liar according | |
| to Mr. Fox. Well, if I were a thief the information could not possibly | |
| be inaccurate if it were obtained from Sprintnet or its clients. If I | |
| was a liar, why would they think the information came from themselves | |
| and/or their clients? Mr. Fox's thinly veiled threat caused me great | |
| amusement. | |
| I then decided no mainstream publication would touch this article. I | |
| don't know why everyone is so scared of the truth. Perhaps if the truth | |
| were known people would have to work, and perhaps if the truth were | |
| known some people would be out of work. None of this is of concern to | |
| me anymore. I am here to speak the truth and to provide uncensored | |
| information gathered from a variety of sources to provide readers of | |
| this magazine the facts they need to quench their thirst for knowledge. | |
| This article is included as a prelude to a series of articles all based | |
| on packet switched networks as related to information merely alluded to | |
| in my harmless little article. To our readers, "enjoy." To the cowering | |
| so-called security experts, "kiss my ass." | |
| ------------------------------------------------------------------------ | |
| Packet-switched Networks | |
| Security Begins with Configuration | |
| For many companies the use of packet-switched networks has | |
| allowed for increased interconnectivity of systems and easy | |
| remote access. Connection to a major public packet-switched | |
| network brings increased access points with local dialups in | |
| many cities around the nation as well as access | |
| points from foreign countries. | |
| With the many obvious benefits provided by this service, | |
| improper configuration of either the host's connection to the | |
| network or of the network itself can lead to extreme security | |
| problems. | |
| The very connection to a public packet-switched network | |
| immediately increases the exposure of that particular system. | |
| America's two major commercial networks, BT-Tymnet and | |
| Sprintnet, are probably the most popular US targets for hackers | |
| around the world. The wealth of systems available on | |
| these two networks has provided hackers with a seemly endless | |
| supply of sites on which to sharpen their skills. The ease of use | |
| inherent in both networks makes them popular for legitimate | |
| users as well as illegitimate users. | |
| The Telenet software utilized in the Sprintnet network allows | |
| users to enter a network user address (NUA) in the standard | |
| format as outlined in the X.121 numbering standard: | |
| DDDDAAAHHHHHPP | |
| Where D = the four digit data network identifier code (DNIC) | |
| A = the three digit area code corresponding to the host | |
| H = the host address | |
| P = the port or (sub) address | |
| On domestic calls the DNIC for Sprintnet (3110) is stored in | |
| all Sprintnet equipment and is used as the default. By | |
| merely picking an area code, most often corresponding to the standard | |
| area codes of the North American Numbering Plan, and an | |
| additional one to five digits a would-be intruder can | |
| connect to any number of systems while looking for targets. | |
| In the past many software packages have been written to | |
| automate this process, and large scans of the network have | |
| been published in a variety of underground media. | |
| The Tymnet II software utilized in BT's Tymnet | |
| prompts the user for a mnemonic which corresponds to a host | |
| or number of hosts. The mnemonic, or username, is referenced | |
| to a fixed host address in the network's Master User | |
| Directory (MUD). This username may allow the caller to | |
| connect to a variety of sites, as opposed to merely one, by | |
| entering additional information in separate fields after the username. | |
| It may also correspond to a network gateway thereby allowing | |
| the user to enter a number in the X.121 format and connect to that | |
| specific site. | |
| This particular network, with its primary use of words as | |
| opposed to numbers, has been compromised by intruders who | |
| guess common words or names in their attempts to connect to | |
| remote sites. | |
| Each network has its own particular set of problems but | |
| solutions to these problems are both simple and quick in | |
| implementation. | |
| SPRINTNET | |
| The first deterrence in securing a host on this | |
| network is to restrict access to the site. This can be | |
| accomplished in a number of ways. The most obvious is to | |
| have the site refuse collect calls. All calls on Sprintnet | |
| are reverse-billed, unless the site has specifically asked | |
| that they not be billed for incoming calls. This makes the | |
| site accessible only through the use of a Network User | |
| Identifier (NUI). | |
| Another method of restricting access from intruders is to | |
| place the host in a closed user group (CUG). By electing to | |
| have the host in a CUG, the administrator can allow only | |
| certain NUIs to connect, and can also restrict the actual | |
| addresses from which access is allowed. For example: A site | |
| is placed in a CUG that will allow only calls from the | |
| company's remote branch in Dallas to access the host and only | |
| with the NUI created specifically for that branch. All | |
| attempts to access the site from an address outside the 214 | |
| area will result in an error message indicating an invalid | |
| source address. All attempts to connect with an invalid NUI | |
| will result in an error indicating an invalid ID. This | |
| information is maintained in the networks main TAMS (TP | |
| Access Management System) database, and is not subject to | |
| manipulation under normal circumstances. | |
| Many sites on the Sprintnet network have specific | |
| subaddresses connecting to a debug port. This is usually at | |
| subaddress 99. All connections to debug ports should be | |
| restricted. Allowing users access to this port will allow | |
| them the ability to load and display memory registers of the | |
| Sprintnet equipment connected to the port, and even reset | |
| as well as enable or disable the host. Most debug ports are | |
| equipped with preset passwords from the vendor, but should be | |
| changed. These ports should also restrict connection from | |
| all addresses except those specified by the company. | |
| An additional measure that may foil intruders relying on | |
| software programs to find all addresses in a given area code | |
| is to request that the host be given an address above 10000. | |
| The time involved in scanning the network is extensive and | |
| most casual intruders will not look past the 10000 range. In | |
| fact, many will not venture past 2000. | |
| BT-TYMNET | |
| Any company having a host on the Tymnet network should choose | |
| a username that is not easily associated with the company or | |
| one that is not a common word or name. If an intruder is aware that | |
| XYZ Inc. has a UNIX based system on TYMNET he or she would | |
| begin attempts to find this system with the obvious | |
| usernames: XYZ, XYZINC, XYZNET, XYZ1, XYZUNIX, UNIX, etc. | |
| BT-Tymnet allows for these usernames to have additional | |
| password security as well. All hosts should have this option | |
| enabled, and passwords should be changed frequently. | |
| The password should always be a minimum of six | |
| digits, should include letters, numbers and at least one symbol | |
| character, and should not be associated in any way with the | |
| corresponding username. | |
| Many clients of BT-Tymnet have purchased the Tymnet II | |
| software and have individual sub-networks that are linked to | |
| the public network through gateways. Each subnet is | |
| personally configured and maintained through the use of a | |
| package of utilities provided by Tymnet. These utilities | |
| each perform a specific task and are highly important to the | |
| smooth operation of the network. These utilities may be | |
| accessed either directly from the host-end or remotely | |
| through the network by entering a corresponding username. | |
| Some of these utilities are: | |
| XRAY : a monitoring utility | |
| DDT : a debugging utility | |
| NETVAL : a database of username to host correspondence | |
| PROBE : a monitoring utility | |
| TMCS : a monitoring utility | |
| Under NO CIRCUMSTANCES should these utilities be left | |
| without a password on the company's subnet. These utilities should | |
| also never be named similarly to their given name. Should an | |
| intruder gain access to any of these utilities the integrity | |
| of your network will be at risk. | |
| For example: | |
| Allowing an outsider access to the XRAY utility, would give | |
| he or she the ability to monitor both incoming and outgoing | |
| data from the host using the "TA" command (display trace data | |
| table in ASCII). Use of certain XRAY commands are restricted | |
| by a security function that allows only certain usernames to | |
| execute commands on the basis of their existence in a | |
| "Goodguy" list, which can be displayed by any XRAY user. | |
| Should a user be of the highest privilege, (2), he or she can | |
| add or delete from the "Goodguy" list, reset connections, and | |
| display trace data on channels other than the default | |
| channel. | |
| Allowing a user access to DDT can result in complete | |
| disruption of the network. DDT allows the user the ability | |
| to write directly to the network controller "node code" and | |
| alter its configuration. | |
| Allowing a user access to NETVAL will allow the user to | |
| display all usernames active on the network and the | |
| corresponding host addresses. | |
| OTHER PROBLEMS | |
| EXAMPLE ONE | |
| On many networks users have the ability to connect to the | |
| packet assembler/disassembler (PAD) of the network dial-ups. | |
| This has led to significant problems in the past. | |
| In the mid-1980's two American hackers were exploring the | |
| German packet network DATEX-P. One connected to a host in | |
| Berlin and was immediately disconnected by the remote site. | |
| Before the hacker could react, the German host connected to | |
| the NUA corresponding to his Sprintnet PAD and sent him a | |
| login prompt. This alarmed the hacker greatly, as he assumed | |
| that the proprietors of the German host had somehow noticed | |
| his attempt to access their system. He contacted his partner | |
| and told him of the occurrence. The two concluded that since | |
| the NUA of the origination point is sent in the packet-header, | |
| the remote site must have been programed to recognize the NUA and | |
| then return the call. The fact that it had returned a call to a | |
| public PAD was intriguing to the pair, so they decided to | |
| attempt to recreate the event by calling each other. Both | |
| individuals connected to the network and one entered the NUA | |
| corresponding to the others PAD. A connection resulted and | |
| the two were able to interact with one another. They then | |
| decided that they would periodically meet in this fashion and | |
| discuss their findings from Germany. At the time of the next | |
| meeting, the connection did not occur as planned. One hacker | |
| quickly received a telephone call from the second who | |
| exclaimed rather excitedly that he had attempted to connect | |
| to his partner as planned, but accidentally connected to | |
| another PAD and intercepted a legitimate user typing his NUI. | |
| Further investigation proved that one could connect to public | |
| PADs during the idle period when the user was in network | |
| mode, prior to making a connection to a remote site. This | |
| discovery was intended to remain secret, because of its | |
| extremely dangerous applications. Nevertheless, word of this | |
| discovery soon reached the entire hacker community and what | |
| came to be known as "PAD to PAD" was born. | |
| The "PAD to PAD" technique became so wide-spread that hackers | |
| were soon writing software to intercept data and emulate | |
| hosts and capture login names and passwords from unsuspecting | |
| network users. Hackers were intercepting thousands of calls | |
| every day from users connecting to systems ranging from | |
| banking and credit to the Fortune 500 to government sites. | |
| After nearly two years of "PAD to PAD" Sprintnet became | |
| alerted to the crisis and disallowed all connections to | |
| public PADs. When Sprintnet expanded its service overseas | |
| they once again left access to the overseas PADs | |
| unrestricted. The problem went unnoticed again until | |
| their attention was brought to it by a hacker who called | |
| Sprintnet security and told them that they ought to fix it | |
| quickly before it became as wide-spread as before. | |
| The problem was resolved much quicker this time. | |
| This particular technique was not limited to Sprintnet. All | |
| networks using the Telenet software are at risk to this type | |
| of manipulation. This type of network manipulation was | |
| integral in the recent compromise of a large Bell Company's packet | |
| network in a much-publicized case. Certain foreign | |
| networks in countries such as Israel, England, Chile, Panama, | |
| Peru and Brazil are also at risk. | |
| EXAMPLE TWO | |
| In the late 1980's hackers stumbled onto a packet network | |
| owned and maintained by a large facilities maintenance | |
| company. This particular network had a huge flaw in its | |
| setup. It connected all calls placed through it as if they | |
| were placed with an NUI. This allowed hackers to place calls | |
| to addresses that refused collect connections on networks | |
| around the world. This became a popular method for hackers | |
| to access underground chat systems in Europe. Additionally, | |
| this network contained a score of computers belonging to a | |
| major automobile manufacturer. Most of these systems were | |
| highly insecure. The network also allowed unrestricted | |
| access to network debug ports. This particular network also | |
| had a toll-free number on an MCI exchange. At the time, MCI | |
| was having some difficulty getting their equipment to accept | |
| the ANI information to provide customers with a full call- | |
| detail report on their monthly statement. The hackers were | |
| well aware of this fact and made frequent use of the network | |
| with no fear of prosecution. Eventually MCI was able to fix | |
| their translation problem and were able to provide their | |
| clients with full call-detail reports. When this was | |
| learned, many hackers abandoned use of the network, but | |
| several others were later prosecuted for its usage when their | |
| number turned up on the bill. | |
| EXAMPLE THREE | |
| Until quite recently intimate knowledge of the utilities | |
| driving various packet-switched networks were known by an | |
| exclusive few. While investigating a network owned by an | |
| extremely large Cleveland-based conglomerate hackers came | |
| across a system where documentation on the usage of every | |
| utility was kept online. The hackers quickly downloaded all | |
| the information and it soon became somewhat wide-spread among | |
| the underground community. With less-skilled and more | |
| unscrupulous individuals in possession of this information | |
| many networks began experiencing disruptions and system | |
| integrity was quickly lost as hackers began monitoring data | |
| traffic. | |
| No information on the usage of packet networks or their | |
| utilities should ever be kept online. Hard copies should be | |
| kept in the possession of the network administrator, and when | |
| updated, obsolete versions must be destroyed. | |
| WHAT TO DO | |
| When a security violation stemming from a connection through | |
| the packet network is noticed, Network Security should be | |
| notified. Clients of BT-Tymnet should notify Steve Matthews | |
| at 408-922-7384. Clients of Sprintnet should notify | |
| Pat Sisson at 703-689-6913. | |
| Once changes have been enacted in the network to prevent | |
| further break-ins, the host computer should be checked | |
| thoroughly for any changes or damages, and all individual | |
| account passwords should be changed. | |
| CONCLUSION | |
| It is critical that the packet network be configured properly | |
| and that all measures are taken to ensure its security. Even | |
| the most secure host computer can be easily compromised if it | |
| is connected to an insecure packet network. | |
| ---------------------------------------------------------------------- | |