Copy Link
Add to Bookmark
Report

Chaos Digest Volume 01 Numero 12

eZine's profile picture
Published in 
Chaos Digest
 · 4 years ago

  

Chaos Digest Lundi 1 Mars 1993 Volume 1 : Numero 12

Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
Archiviste: Yves-Marie Crabbe
Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.12 (1 Mars 1993)
File 1--Re: Des adolescents anglais transformes en hackers
File 2--Piratage sur le reseau Janet
File 3--Hackers en Coree du Sud
File 4--Guide d'Utilisation d'un Outil de Securite PC (manuel)

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from jbcondat@attmail.com. The editors may be
contacted by voice (+33 1 47874083), fax (+33 1 47877070) or S-mail at:
Jean-Bernard Condat, Chaos Computer Club France [CCCF], 47 rue des Rosiers,
93400 St-Ouen, France

Issues of Chaos-D can also be found on some French BBS. Back issues of
ChaosD can be found on the Internet as part of the Computer underground
Digest archives. They're accessible using anonymous FTP from:

* ftp.eff.org (192.88.144.4) in /pub/cud
* red.css.itd.umich.edu (141.211.182.91) in /cud
* halcyon.com (192.135.191.2) in /pub/mirror/cud
* ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD
* nic.funet.fi (128.214.6.100) in /pub/doc/cud

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission. Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications. Articles are preferred to short responses. Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Chaos Digest contributors
assume all responsibility for ensuring that articles
submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Tue Feb 23 20:06:14 CST 1993
From: jp-sorlat@altern.com (jp-sorlat )
Subject: File 1--Re: Des adolescents anglais transformes en hackers


NEWS RELEASE
Press Officer: Martin Herrema: 071 911 5101

February 24, 1993
Statement on Hacking at PCL


The Polytechnic of Central London (now the University of Westminster) was
affected by a 'hacker' on April 23, 1990. The 'hacker' gained access to
the polytechnic's computer teaching systems via the academic joint computer
network JANET, which serves all British universities.

The 'hacker' made some changes to the system, mainly to the on-screen
start-up messages. These were spotted very quickly on the morning of April
23 by staff, who then changeg the public access messages back to the
correct wording. The University of London Computer Centre, which provides
network support for JANET, was informed of the situation.

The teaching systems contained a variety of information concerned with
course administration and delivery, but there was no evidence thet the
hacker achieved anything other than a change of message. The systems were
turned completely to normal within a few days, and the incident caused
minimal disruption to the work of the polytechnic. Since the incident
further security measures have been built into the University's computer
systems.

------------------------------

Date: Wed Feb 24 13:19:23 1993
From: S15810@PRIME-A.PLYMOUTH.AC.UK (Stuart Wyatt )
Subject: File 2--Piratage sur le reseau Janet


ENGLISH HACKER PROSECUTED
+++++++++++++++++++++++++

Unlike America and most other countries, England does not have too much to
show for arresting hackers and bringing them to justice. This means that
each time a hacker is caught, it makes headline news and creates the same
foreboding atmosphere that hacking reports created in the early 1980's.
The latest story is of a young hacker, Paul Bedworth.

Bedworth started hacking at the age of 17, and through the many computers
he accessed, he teamed up with 2 other hackers 10 years his senior. From
his bedroom, using his #200 computer he dialed into pad-ports at
Universities and from there, penetrated Internet. By spending hours at a
time hacking, he amassed huge telephone bills (one was 34 pages long). Due
to the BT bills, his parents banned him from using their telephone. This
however did not stop his antics - He soldered a link from the BT socket
and ran the wire under the carpet into his bedroom.

By using Janet (The Joint Academic Network) he hacked into many University
computers with the main intent to delete sensitive files and crash the
system. His idea of hacking was to disrupt as many computer systems as
possible. Other computers he attacked were the Financial Times network,
Lloyds bank, and a whole host of computers spanning France, Germany and
Luxenbourg.

He got around the problem of running up huge telephone bills by accessing
the billing computer, and transfering large segments of the bill to
innocent users at Manchester University.

Bedworth was arrested after another University put a trace on his calls.
He was charged with three dishonesty charges, which he pleaded not guilty
in court. The case is continuing at the moment (24 Feb 1993) and I will
forward any news as and when I get it.

In the U.K., there is a law which prohibits hacking, and hackers can be
charged with gaining unlawful access to a machine and if any data is
altered or destroyed, then that is also a criminal offence. It seems
strange that Bedworth was not charged with gaining unlawful access and
the destruction of data - But then, unlike the rumours that circulate the
world, the British judicial system is not all its cracked up to be.
________
-Stuart Wyatt ( )____
( Alas, life )
P.S. I am currently collating information on hacking and( is but an )
hackers for a forthcoming book. If anyone wishes ( Aardvaark.. )
to contact me IN THE STRICTEST OF CONFIDENCE then ( __ )
feel free to email me. . (_____) (____)
* * * * * * * * * * * * * * * * . ? . ()
* CHEERS_ THEN - _ _ * __ ()
* ___/_/______|_|___| |__ * / \ ()
* |________ _______| |__| * |_ _|
* / / | | | | | | * |(0)||(0)|
* / /___ | | | | | | * /|_ \/ _|\
* /___ / | | | | | | * || | == | ||
* / / | | \ \__/ / * || \____/ ||
* / / |_| \____/ * ///\ !! /\\\
*-*-/_/-*-*-*-*-*-*-*-*-*-*-*-*-=-=-=-=-=-=-=-=-!!!-!-=-=-!-!!!-=-=-=-=-=-=
>From : Stuart Wyatt (Student, HNDCS1)
Faculty of Technology, *> Be excellent to everyone - dude <*
University of Plymouth,
Drake Circus, Email: S15810@uk.ac.plym.pa (PRIME)
Plymouth, England. stuartw@uk.ac.plym.cd.zeus (SUN)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

------------------------------

Date: 20 Feb 93 06:17:14 GMT
From: kafka@desert.hacktic.nl (Kafka )
Subject: File 3--Hackers en Coree du Sud
Repost from: alt.security

+++++
COMPUTER HACKER HELD FOR FORING PAPERS

Seoul, Feb. 18 (AFP) - South Korean prosecuters
have arrested a computer hacker on charges of
falsifying presidential Blue House documents to
demand classified data from a dozen financial
institutions, authorities said today. Prosecuters
arrested Kim Jae-yol, 23 late yesterday in the
first such hacker case here on multiple charges of
forgery of official documents and attempted fraud.
Kim, an unemployed, self-taught computer wizzard,
allegedly falsified the Blue House's secret
computer password and presidential facsimiles to
demand classified computer information from 12
financial institutions, includang several
commercial banks.
+++++

Mmmm, I wonder how you 'falsify (....) a password'.

(P)

==== Kafka ======= kafka@desert.hacktic.nl ===== 1st class l00zur =========
"The Techno Rebels are, whether we recognize it or not, agents of the Third
Wave. They will not vanish but multiply in the years ahead."
- The Third Wave, Alvan Toffler

------------------------------

Date: Mon Feb 8 08:51:00 CST 1993
From: Cerasela Tanasescu
Subject: File 4--Guide d'Utilisation d'un Outil de Securite PC (manuel)
Copyright: DCSIS SA, 1993


KHEOPS
The confidentiality of your PC

USER GUIDE--Version 2.1


S.A. DCSIS, Avenue de Cambridge, Technopole CITIS
14200 HEROUVILLE SAINT CLAIR, FRANCE
Phone: (33) 31.06.00.06, Fax :(33) 31.43.79.95


WARNING

The DCSIS Company may not be held responsible for the damage that may be
caused directly or indirectly by this software.


PRECAUTION

Any manual installation or uninstallation together with any illegal copy of
KHEOPS may damage the data on your hard disk.

We strongly recommend performing a backup of your data before installing
KHEOPS. This backup should be renewed frequently as a prevention against
fraudulent intrusion attempts which might affect the right functionning of
KHEOPS.

If this was the case, DCSIS could not be held responsible for any damage.



1. PRESENTATION OF KHEOPS

Nowadays, all micro-computers contain sensitive data: client files,
production figures, programs, payrolls etc... Besides, all this data and
knowhow are stored on computers that more and more people know how to use,
whether they are entitled or not. The risk of information leak and file
copy is growing. Companies must therefore protect themselves.

DCSIS has developped KHEOPS with this in mind. This is an access control
software for all PC/AT micro-computers running MS/DOS(Versions 3.2x and
5.0). This program ensures the safety of the PC whether mono or multi
users, connected to a network or not, so that maximum confidentiality is
guaranteed.

Main Functions

- computer access control;
- computer locking up when the user gets away from his PC;
- boot control with a diskette.

Besides, with the diskette administrator program:

- users management (up to 31 + administrator)
- logbook consultation
- computer unlocking
- program customization


2. MAIN FUNCTIONS

The security ensured by KHEOPS is strictly software, i.e. there is no need
of any hardware device.

2.1. Access control

Computer security conventions specify two terms: user identifier and
password. Every user is given: (1) a user identifier, hereafter user id,
which may be structured around the notion of user group, (2) a password.
This pair user id/password must be unique and known only to the user. The
password must obviously never be written or communicated to anyone.

Procedure

Access control is carried out by the only program that can run when the hard
disk is locked up. This program prompts the user to type his user id. and
password. Once this is done, the pair user id/password is looked up by
KHEOPS in a user list stored on the disk. This list is coded and is unknown
to the operating system.

If this control is successful and the password is recognized as valid
(validity date), then the hard disk is made available and the user can make
full use of his PC.

On the other hand, if the authentification fails, the user is invited to
start again. After 'n' unsuccessful attempts, keyboard and hard disk are
locked up: hard disk reboot is impossible. Diskette boot will not give
access to hard disk. Only the administrator can put things in order again
thanks to his KHEOPS diskette.

Hard disk locking will also occur if a user tries to log in with an outdated
password.

The user list can hold up to 32 entries, that is an administrator plus 31
users. This makes it possible to share a PC between several users, every
one of them being answerable for his session.


2.2. Hard disk locking

When the disk is locked up, it is apparently empty. The only response to
the DIR command is: "NO FILE FOUND". The disk and all its partitions
(virtual disks D:\, U:\, V:\...) are also locked up. It is impossible to
copy or delete files, to create directories of to execute programs. Last
but not least, neither NORTON nor PCTOOLS are able to retrieve the files.


2.3. Resident program

When the PC remains unused for a certain period of time, a small resident
program is activated after a given period of time. This program locks up
screen and keyboard, and displays the standard login window. The only
action that remains possible is to enter user id. and password. The
resident program is activated due to a temporization or upon user request,
e.g. by pressing right SHIFT/left SHIFT.


3. SECURITY MANAGEMENT

3.1. User Identifier and Password

Both user id. and password must be 7 characters long. But contrary to the
user id. which is permanent, the password must be renewed regularly.

Let us explain the procedure: when anyone runs the access control for the
first time, he is invited to enter his password twice (to make sure the
spelling is correct).

This password has a three months validity. During the last 15 days of
validity the user will be prompted to change his password. A message will
display the deadline and explain that this change is compulsory. The user
is free to take no notice of this warning but once the deadline is reached
the computer disk will be locked up and only the security administrator
will have power to straighten things up.

If the user decides to change his password, again KHEOPS will invite him
to type it twice. The new password will only be accepted if it is found to
be different from the user's last 6 passwords.

The procedure explained above is only valid for "standard users". There
are two exceptions:

- the administrator for whom there is no password time restriction;

- temporary users. The validity deadline is decided upon by the
administrator. These password are not renewable. This option allows
people to work on the PC on a temporary basis.


3.2. Logbook

Like in the case of the user id/password list, the logbook is coded. Only
the administrator is entitled to consult it. This book is updated at the
time of access control.

The following information is available:

- successful connexions (and number of attempts);
- disconnexions and duration of session;
- PC lock up following 'n' unsuccessful password presentations;
- PC lock up due to outdated password presentation.

Every entry in the logbook also includes date, time and user id. In the
case of a system locked up due to 'n' unsuccessful attempts, only the last
user id. is kept.

The logbook contains up to 127 entries. Once the file is full, new entries
replace the oldest records.


4. KHEOPS IMPLEMENTATION (Administrator)

4.1. Installation

KHEOPS installation imperatively requires a floppy disk drive. Use a KHEOPS
diskette with the adequat format (3.5' or 5.25').

- Insert the KHEOPS diskette into drive a;
- Boot the PC again (on a:).

The following pull-down menu will then be displayed on the screen:

| MAIN MENU |
| - Install KHEOPS |
| - Modify present system |
| - Uninstall KHEOPS |

On every screen the following warning is displayed for information:

| On all menu |
| ESC: quit |
| : preceding item |
| : next |
| : item(un)select |

- Validate every option by pressing the ENTER key;

- Choose option "INSTALL KHEOPS". The program will display the following
message:

"Installation under way. Please wait".

- Another window will pop up:

| Administrator characteristics |
| User identifier : |
| Password : |

- Enter administrator user id. and password (7 characters). Both must be
validated by pressing ENTER key. They will be required on every use of
the KHEOPS diskette;

- Confirm the password.

Installation will then proceed. Wait for the message:

"KHEOPS is installed"

Program customization is now necessary.

| SYSTEM CUSTOMIZATION |
| Resident program activation delay (mn) : 5 |
| Background tasks authorized : 0 |
| Debugging authorized : 0 |
| New hot-key : N |
| Screen backup drive : C |
| Number of attempts before lock up : 3 |
| Windows utilization : N |

The administrator can now "add a user".

- Press "ENTER" to type a user id, or
- Press "ESC" if the user list is complete.

The first user that is created in the list is the administrator.

In order to put an end to KHEOPS installation :

- Press "ESC" key on Main Menu;
- Remove the KHEOPS diskette (KHEOPS will prompt you to do so);

PC will reboot automatically. On PC reboot, the screen will display the
standard login screen. Two situations may now occur:

Case #1: The administrator attempts to log in. He can type his id. and
password,

Case #2: A new user logs in. The program then displays the following
message:

"Enter new password"

The password must be 7-characters long. This password must be checked as
typing errors are easily made. This is why the user is prompted to type
his password once again.

If the two secret codes are identical, access to the PC is authorized.

"KHEOPS installation is complete"


4.2. System Modification

- Insert KHEOPS diskette into drive a:.
- Type the following, then press "ENTER":

"A:KHEOPS"

A window invites the administrator to type his id. and password.

| Administrator characteristics |
| User identifier : |
| Password : |

Following which the main pull-down menu is displayed on the screen:

| MAIN MENU |
| - Install KHEOPS |
| - Modify current system |
| - Uninstall KHEOPS |

Upon selection of "Modify current system" another pull-down menu is
displayed:

| SYSTEM MODIFICATION |
| Work on the list |
| Unlock hard disk |
| Logbook consultation |
| System customization |

Work on the list
++++++++++++++++

| WORK ON THE LIST |
| Cancel a user |
| Add a user |
| Add a temporary user |
| Unlock a user |
| User list consultation |

"Add a user"

This option is used to allow a new user to use the micro-computer. The
administrator is invited to type the user's name:

| User characteristics |
| Name : Doherty |

This name is the user id. and must imperatively be 7-characters long.

"Cancel a user"

This option is used to disable a user. The administrator is invited to
type the user's name:

| User Removal |
| Name : |

Once the administrator has pressed ENTER, the user no longer stands in the
list.

"Add a temporary user"

This option makes it possible to add a user to those who have access to the
PC on a temporary basis.

| Temporary user |
| Name : |

- Type his user id. and press "ENTER".


The program will then invite the administrator to type the user's time limit
of access to the PC.

| TEMPORARY ACCESS |
| Validity deadline : |
| Year : 91 |
| Month : 07 |
| Day : 15 |
| |
| Confirmation (Y/N) : o |

- Type two digits for year, month and day, then validate your data by
pressing "Y"es of "N"o.

"Unlock a user"

When a password is outdated (3 months validity period), the PC is
temporarily locked up. Only the administrator can unlock it thanks to
this option.

"Display user list"

This option is used to display the list of all users entitled to use the PC.

Unlock Hard Disk
++++++++++++++++

After 'n' unsuccessful login attempts the hard disk is locked up. Only the
administrator has the possibility to unlock it thanks to this function.

Logbook Consultation
++++++++++++++++++++

A cyclic logbook containing the last 127 entries is displayed with the
following data:

- user id.;
- date and time;
- action: login, logout, PC locking;
- description: number of login attempts, duration of connexion, number
of unsuccessful attempts.

This option makes it possible for the administrator to check who uses the
micro-computer and for how long.


System Customization
++++++++++++++++++++

Thanks to this option the administrator can adapt KHEOPS to users need.

| SYSTEM CUSTOMIZATION |
| Resident program activation delay (mn): 5 |
| Background tasks authorized : o |
| Debugging authorized : o |
| New hot-key : o |
| Screen backup drive : c |
| Number of attempts before lock up : 3 |
| Windows utilization : n |

* "Resident program activation delay"
The administrator should type the temporization that is desirable before
the login screen is displayed when the PC remains unused.

* "Background task authorization"
We strongly recommend using this option in case of intensive use of the
hard disk (e.g. compilation, printing). Keyboard will be locked up, but
background tasks will carry on their job. In case your reply is No,
keyboard, screen and hard disk will be subject to access control.
Remark: "Background tasks" must be authorized in the case of a network
server.

* "Debugging authorized"
The administrator indicates whether or not the use of a debugging tool is
authorized.
Remark: Debugging should be authorized in case the PC shows uncontrollable
reboot problems.

* "New hot-key"
The hot-key activates the resident program at any time. The default hot-
key value is "left shift/right shift". Nevertheless the administrator is
free to change the hot-key value.

* "Screen storage disk"
This option enables screen backup on a hard or virtual disk (200 KB are
necessary). The default disk drive is c:.

* "Number of attempts before system lock-up"
This function makes it possible to customize the number of user id/
password presentation attempts before hard disk lock-up.

REMARK: Any modification of one of these options will only be taken into
account once reboot has been performed.

4.3. Uninstalling

- Insert KHEOPS diskette into drive a:;
- Type: "A:KHEOPS";

The following window pops up:

| Administrator characteristics |
| User identifier : |
| Password : |

Once the administrator id. and password have been validated and checked
KHEOPS displays the main menu.

| MAIN MENU |
| - Install KHEOPS |
| - Modify present system |
| - Uninstall KHEOPS |

- Choose "Uninstall";

After a few seconds the following message is displayed on the screen:

"The system must be reset"

- Take the KHEOPS diskette out of the drive as the PC will reboot
automatically.

"KHEOPS has been totally uninstalled"

4.4. Hard Disk Unlocking

After 'n' unsuccessful user id/password presentations, the following
message is displayed on the screen:

| Hard disk and keyboard are locked up. |
| Please phone the administrator. |

The PC will be unable to boot on hard disk. Any attempt to do so will
result in the screen to display the following message:

"Non system disk".

- Insert KHEOPS diskette into drive a:;
- Reset the PC so that it boots on the diskette;
- Type adminitrator id. and password.

The following message is then displayed:

"The system must be reset"

- Leave the diskette in drive a: and reboot. Then, when prompted to, type
administrator id. and password.

The PC is unlocked.


5. KHEOPS IMPLEMENTATION (Users)

Now that KHEOPS has been installed, your data on the PC's hard disk is
protected.

5.1. PC Reset

At boot time, the user is invited to type his id. and password. Having
done that, he has free access to the resources of the PC.

5.2. Resident Program Activation

The function of the resident program is to lock up screen, if background
tasks are not authorized, and keyboard either due to temporization or upon
user request:

- Temporization: in case the PC has remained unused for 'n' minutes (as
set up by the administrator in the customization session, screen (if
background tasks are not authorized) and keyboard action is automatically
suspended.

KHEOPS displays the standard login window and invites the user to type his
id. and password. If the same user logs in again, his application is
restaured. In case another user attempts to connect himself then the PC
reboots.

- User request: the resident program can be deliberately activated by the
user by pressing the hot-key.

KHEOPS then displays the following message:

"End of session (Y/N) ?"

* By pressing the letter "Y" the user will ensure that the PC is
automatically rebooted if another user logs in;

* The user answers "N". This means that he wants to suspend his job
temporarily. KHEOPS displays the following message:

"Computer in use"

The only id/password acceptable are those of the user who pressed the hot-
key. Any other user will be rejected.


6. KHEOPS COMPATIBILITY

6.1. Hardware

KHEOPS can be installed on IBM PC/AT, PS/2 or compatible micro-computers
running MS/DOS version 3.2 to 5.0. DCSIS has tested this program on the
following computers: IBM PC/AT & PS/2, COMPAQ DeskPro (286S and 386S) and
LTE 286, SLT 286 and 386, EPSON EL2 and EL3S, GOUPIL G5 286, HP VECTRA 486,
OLIVETTI PC 310

6.2. Software

6.2.1. Standard software

KHEOPS has been tested and validated by DCSIS with the following programs:
MICROSOFT C, TURBO C, TURBO PASCAL, PCTOOLS, NORTON, DBASE, LOTUS 1.2.3...

6.2.2. Graphic software

KHEOPS can handle mouse and keyboard, which ensures compatibility with the
following programs: WORD 4 and 5, WINDOWS 2 and 3, PAINTBRUSH, PAGE MAKER

6.2.3. Antivirus software

KHEOPS is compatible with VIRUSAFE+, trademark registered by Eliashim
Microcomputers, which has been recognized as one of the best antivirus
programs on the market (VIRUSAFE+ can handle 1400 virus and is wellknown
for its preventive and curative vocation). The joint use of KHEOPS and
VIRUSAFE+ ensures maximum micro-computer safety. Install Virusafe+ first
then KHEOPS (this is imperative).

6.2.4. Network

It is possible to install KHEOPS on every workstation of a local area
network (e.g. NOVELL network) so that every station is protected locally.

------------------------------

End of Chaos Digest #1.12
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT