Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-09 Thread Stilgherrian

Robert, to comment on the first half of your posting at least (the maths
of cryptography is still something I haven't explored)...

On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote:
 Last summer  my PC was attacked by a malicious hacker who used a Trojan
 Horse NetBus. My Norton Personal Firewall alerted me about all five
 attacks, but I panicked, shut down and rebooted, but by doing that,
 somehow the malicious hacker got my username and password and even my
 email address (all replaced). He even took over my Norton firewall
 somehow and shut me out so that I could not reconfigure it or even do
 anything at all in my MSDOS screen to find mysterious or renamed Windows
 files. I was terrified that somehow this malicious hacker would get into
 the computer network at the university I am affiliated with.

Knowing universities, chances are the attacker was *already* inside
the network. Universities are chock full of unattended computers, all
inside the firewall defences, and all capable of being used maliciously.
The statistics show that 80%-ish of informaton security incidents come
from insiders. And it's almost a rite of passage for a computing science
student to break open a system.

In the case of NetBus, at some point someone actually had to install
the trojan on your computer. This is easier than you might imagine. Is
your computer *always* under lock and key when not in use? Do you
*never* run software downloaded from anywhere except official sources,
and then only after thorough scanning with today's anti-virus software?
Have you religiously installed *every* security update for your
operating system and application software? Really? :)

Once NetBus is on your machine, the attacker has complete control.
Literally anything can be done with your computer at that point, so
it's no surprise to hear that the machine was very weird thereafter.
Sending your usernames and passwords to some external site is trivial.


 I know hackers use what is known as spoofing IP addresses. But in
 spite of that I was wondering is there any way law enforcement experts
 or computer security specialists can trace a hacker's whereabouts?

Even packets with spoofed origins have to come from somewhere. And if
the attacker is actually wanting to *use* your computer (as opposed to
just flooding it with garbage that could literally come from anywhere)
then they need to use a real IP address so they can interact.

Assuming that they *are* using a real IP address, yes, they can be
traced. Or at least the computer can be traced. It's harder to prove
that some specific individual was sitting in front of it.

Every IP address belongs to someone, and that information is stored in
the globally-distributed WHOIS database. If it's a typical connection
through an ISP, then the ISP will have logs showing which customer
account was using that IP address the time. If it's a dial-up line and
the ISP logs caller ID info, then they can also match it to a specific
telephone line.

The issues aren't so much whether the information is *possible* to
obtain but whether it's *practical* to obtain and *useful* when you
get it.

Even if a real IP address is being used, consider:

  * ISPs generally protect the privacy of their users, and will
probably only release logs to law enforcement agencies. Are
the police (probably under-resourced for Internet work) at
all interested in your case?

  * The ISP says the IP address in question belongs to an Internet
cafe which uses Network Address Translation (NAT), allowing them
to put 100 computers on the Internet through one IP address. So
which of those machines was used for the attack? Who knows! Who
was sitting at that computer? I dunno, they just came in and
paid cash for a half-hour session.

  * The IP address belongs to a dial-up customer, but when the
customer is asked he says he doesn't know anything about what
you're claiming. Besides, the kids use the computer -- and
they're all such *good* boys...

  * The IP address belongs to some generic ISP in China or Uzbekistan
or Bolivia or somewhere else where they don't give a toss about
following up Internet crime. End of investigation.

[Important note for American readers: Most Internet users
are somewhere other than the United States. Most websites
are in languages other than English. The FBI is a *US*
law-enforcement body. US law doesn't apply outside the US.
Sorry to whinge, but it's an important point and often
completely overlooked.]

  * Attackers will sometimes (often?) use multiple trans-national
links to cover their tracks further. Yep, the machine that
attacked you was in, say, Florida. But looking closer reveals
that *that* machine was itself attacked and under control of
a machine in France. That machine was hacked from Moscow, and
that one from ... you get the idea.

  * Due to some miracle, the attack can be traced to a specific
   

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-09 Thread Bill Hinton



Yes it is possible to track 
a hacker but unless you have proof and can trace it to someone in the US it's a 
moot point. If you want to trace an attacker you should have the 
following:
1. An active intrusion 
detection system (IDS) that can perform a trace back to the source regardless of 
spoofing.
2. 
Detailedlogging of your perimeter router, firewall and intrusion detection 
system.
3. Daily review of the 
log filesand immediate actionif any penetrations are detected. 
Immediate action is required because most ISPs do not maintain adequate records. 

4. Proof that a crime 
was actually committed, i.e., server, firewall, ids logs. The DOJ will not 
prosecutedoor knocking. (Most ISPs have abusepolicies and will 
terminate service for door knockers.) . To aid in the prosecution of 
perpetrators security banners should also be in place.
Most of our attack attempts come from Eastern Europe 
and China. In this case finding that an attack came from Chinese university is 
useless. Since the key to security is prevention I use the IDS to dynamically 
block sites once a hack attempt is detected. While you may not have an IDS, 
youshould monitor your log files and place access lists on you perimeter 
router and firewall.Also,security patches,updated software, 
and browser and system security settingsmight have prevented your Netbus 
attack.








  - Original Message - 
  From: 
  [EMAIL PROTECTED] 
  To: [EMAIL PROTECTED] 
  Sent: Sunday, January 06, 2002 5:30 
  PM
  Subject: Is It possible to trace a 
  hacker, and on Diffie-Hellman
  
  My background is not computer security, but 
  mathematics, and I was wondering if I might be humbly allowed to ask a 
  question:
  
  Last summer my PC was attacked by a 
  malicious hacker who used a Trojan Horse NetBus. My Norton Personal Firewall 
  alerted me about all five attacks, but I panicked, shut down and rebooted, but 
  by doing that, somehow the malicious hacker got my username and password and 
  even my email address (all replaced). He even took over my Norton firewall 
  somehow and shut me out so that I could not reconfigure it or even do anything 
  at all in my MSDOS screen to find mysterious or renamed Windows files. I was 
  terrified that somehow this malicious hacker would get into the computer 
  network at the university I am affiliated with. Incidentally, two months ago a 
  hacker got into the Apple computer of one of the professor's in the 
  Mathematics Department. I learned after he gave me a research paper to read, 
  because there was a computer technician there working on his PC to help him 
  reinstall his backed up files. 
  
  I know hackers use what is known as "spoofing" IP 
  addresses. But in spite of that I was wondering is there any way law 
  enforcement experts or computer security specialists can trace a hacker's 
  whereabouts? Some years back there wereseveral Scientific American 
  articles in one issue on these matters, that is, firewalls, malicious 
  hackers, attacks on networks, denial of service attacks, etc. But I could not 
  follow very well the peculiar, nearly "fictional narrative" one of the 
  contributors to these Scientific American articles gave to show how the 
  network administrator and the FBI caught the fictitious hacker in the article. 
  
  
  If there presently is no way at all for 
  someone in authority, network administrators, or computer security specialists 
  to locate a hacker's whereabouts, then perhaps research should best be 
  focused in this area. 
  
  Incidentally someone posted some information 
  about the Diffie-Hellman algorithm (actually called in Number Theorya 
  certain kind of exponentiation cipher), saying that the keys are found 
  by using elements of a finite group (a finite field, actually), which is quite 
  true.
  
  Suppose parties A and B want a common key. Then 
  if they use a cryptosystem like DES, they take two elements h and k from that 
  finite field, multiply them together, then raise the integer b to the power 
  hk, or b^hk. This is the common key, and A sends b^h to B, B sends b^k to A, 
  and both are able to decipher the encrypted messages. Usually the integers h 
  and k are very large prime numbers, too large for a malicious hacker to 
  guess.
  
  Thanking you for your patience in advance, 
  
  
  Robert 
Betts


Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Stilgherrian

Robert, to comment on the first half of your posting at least (the maths
of cryptography is still something I haven't explored)...

On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote:
 Last summer  my PC was attacked by a malicious hacker who used a Trojan
 Horse NetBus. My Norton Personal Firewall alerted me about all five
 attacks, but I panicked, shut down and rebooted, but by doing that,
 somehow the malicious hacker got my username and password and even my
 email address (all replaced). He even took over my Norton firewall
 somehow and shut me out so that I could not reconfigure it or even do
 anything at all in my MSDOS screen to find mysterious or renamed Windows
 files. I was terrified that somehow this malicious hacker would get into
 the computer network at the university I am affiliated with.

Knowing universities, chances are the attacker was *already* inside
the network. Universities are chock full of unattended computers, all
inside the firewall defences, and all capable of being used maliciously.
The statistics show that 80%-ish of informaton security incidents come
from insiders. And it's almost a rite of passage for a computing science
student to break open a system.

In the case of NetBus, at some point someone actually had to install
the trojan on your computer. This is easier than you might imagine. Is
your computer *always* under lock and key when not in use? Do you
*never* run software downloaded from anywhere except official sources,
and then only after thorough scanning with today's anti-virus software?
Have you religiously installed *every* security update for your
operating system and application software? Really? :)

Once NetBus is on your machine, the attacker has complete control.
Literally anything can be done with your computer at that point, so
it's no surprise to hear that the machine was very weird thereafter.
Sending your usernames and passwords to some external site is trivial.


 I know hackers use what is known as spoofing IP addresses. But in
 spite of that I was wondering is there any way law enforcement experts
 or computer security specialists can trace a hacker's whereabouts?

Even packets with spoofed origins have to come from somewhere. And if
the attacker is actually wanting to *use* your computer (as opposed to
just flooding it with garbage that could literally come from anywhere)
then they need to use a real IP address so they can interact.

Assuming that they *are* using a real IP address, yes, they can be
traced. Or at least the computer can be traced. It's harder to prove
that some specific individual was sitting in front of it.

Every IP address belongs to someone, and that information is stored in
the globally-distributed WHOIS database. If it's a typical connection
through an ISP, then the ISP will have logs showing which customer
account was using that IP address the time. If it's a dial-up line and
the ISP logs caller ID info, then they can also match it to a specific
telephone line.

The issues aren't so much whether the information is *possible* to
obtain but whether it's *practical* to obtain and *useful* when you
get it.

Even if a real IP address is being used, consider:

  * ISPs generally protect the privacy of their users, and will
probably only release logs to law enforcement agencies. Are
the police (probably under-resourced for Internet work) at
all interested in your case?

  * The ISP says the IP address in question belongs to an Internet
cafe which uses Network Address Translation (NAT), allowing them
to put 100 computers on the Internet through one IP address. So
which of those machines was used for the attack? Who knows! Who
was sitting at that computer? I dunno, they just came in and
paid cash for a half-hour session.

  * The IP address belongs to a dial-up customer, but when the
customer is asked he says he doesn't know anything about what
you're claiming. Besides, the kids use the computer -- and
they're all such *good* boys...

  * The IP address belongs to some generic ISP in China or Uzbekistan
or Bolivia or somewhere else where they don't give a toss about
following up Internet crime. End of investigation.

[Important note for American readers: Most Internet users
are somewhere other than the United States. Most websites
are in languages other than English. The FBI is a *US*
law-enforcement body. US law doesn't apply outside the US.
Sorry to whinge, but it's an important point and often
completely overlooked.]

  * Attackers will sometimes (often?) use multiple trans-national
links to cover their tracks further. Yep, the machine that
attacked you was in, say, Florida. But looking closer reveals
that *that* machine was itself attacked and under control of
a machine in France. That machine was hacked from Moscow, and
that one from ... you get the idea.

  * Due to some miracle, the attack can be traced to a specific
   

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Ron DuFresne

 
 In the case of NetBus, at some point someone actually had to install
 the trojan on your computer. This is easier than you might imagine. Is
 your computer *always* under lock and key when not in use? Do you
 *never* run software downloaded from anywhere except official sources,
 and then only after thorough scanning with today's anti-virus software?
 Have you religiously installed *every* security update for your
 operating system and application software? Really? :)
 

Given that it was most likely the user himself that 'installed' the
trojan.  Most likely by clicking on an attachment of accepting a trojan
via the irc system or any of the messaging systems such asAOL instant
messanger AIM, msn messanger, or the other variants.  Though an
unattended PC or laptop could well have been trojaned while he was away
from it.  And given this, it's likely the intruder was a fellow student.
Doesn't that make one feel safe?!

In fact, it's very likely the prof's pc he mentioned was hacked by a local
stdent, as likely as it being an outside intrusion...students do love to
play and test what they learn in class and from 'pals'...

Thanks,

Ron DuFresne
~~
Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation. -- Johnny Hart
***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls



Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Muenzinger, Karl



Robert Betts wrote:  I learned after he 
gave me a research paper to read, because there was a computer technician there 
working on his PC to help him reinstall his backed up files. 


How do you know this technician isnt the 
hacker in question? Which underscores the next point

Stilgherrian wrote:  If you wish to pursue some legal sanction, consider the 
legalconcept of "chain of custody" that applies to 
evidence.

The hacker will get off based on the 
following:
1) 
Chain of custody: any evidence you have (logs, reports, disk files, etc) 
can not be proven to reflect the changes you indicate because these records 
could have been manufactured or tampered with after the fact
2) 
Direct evidence vs. hearsay evidence: The physical hard disk is the only 
direct source of evidence. Any report derived from hard disk records can be 
challenged. For a report to be admissible it must either be reproducible from a 
physical source that has had a proven chain of custody or else the report must 
have been created in the standard course of doing business and have been 
regularly audited (mitigating controls)
3) 
Glorification of the hacker: the jury/judge/police/etc lack of awareness 
that what has taken place is a serious crime 

The very act of responding and recovering 
from an attack will usually compromise both the chain of custody and direct 
evidence, and the ad-hock nature of printed reports will also undermine their 
weight in court. 
SOLUTION
To catch and successfully prosecute an 
attacker you must take proactive steps including:
1) Have an incident response policy and 
security awareness training so that people know how to preserve evidence and 
chain of custody
2) Set up intrusion detection procedures 
that are regularly checked so that printed reports can be admissible in 
court

Better yet, prevent the intrusion. In 
addition to applying you regular security patches, consider internal firewalls 
and personal firewalls. In a university setting the internal network is rife 
with hacking. Apply a firewall right in your office or local subnet. This can be 
done very inexpensively with an old Pentium 75 and Linux/IPCHAINS.

-Karl Muenzinger, CISSP







 

ADDENDUM: 

The Tokai Bank Limited disclaims all liability for the views and content of this message, except where the message states otherwise and the sender is authorized to make this statement on behalf of the bank.

The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, transmission, dissemination or other use of or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited. If you receive this in error please contact the sender and delete the material from any computer.

Unless otherwise stated, any pricing information given in this message is indicative only, is subject to change and does not constitute an offer to deal at any price quoted. Any reference to the terms of executed transactions should be treated as preliminary only and subject to our formal written confirmation. 


Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-06 Thread Alvin Oga


hi robert

it's not good that your pc was hacked..etc...

if you didnt save your log files...before they erased it.. its lots harder
to track your 'friends

if you didn record the network activity as soon as you unpluged your
hacked machine to see where they are coming from and trying to
re-connect to your hacked machine... again its hard to track down

if you want to track down hackers.. you might wanna prepare your
servers and network for them to attack those honeypots while
keeping all you rmain data and servers securely monitored
behind a very secure network and network policy

if this happened 2 months back... and have not seen any
recurrance, consider yourself lucky... esp if there was no data loss

if it is a university, call your local FBI office or local computer
crime dept of your local police dept and they'd help track down
the hacker...
- they esp like it when the damanges are in excess of $10K or was
it $15K when it gets their attention

have fun
alvin
http://www.Linux-Sec.net/Tracking



On Sun, 6 Jan 2002 [EMAIL PROTECTED] wrote:

 My background is not computer security, but mathematics, and I was wondering if I 
might be humbly allowed to ask a question:
 
 Last summer  my PC was attacked by a malicious hacker who used a Trojan Horse 
NetBus. My Norton Personal Firewall alerted me about all five attacks, but I 
panicked, shut down and rebooted, but by doing that, somehow the malicious hacker got 
my username and password and even my email address (all replaced). He even took over 
my Norton firewall somehow and shut me out so that I could not reconfigure it or even 
do anything at all in my MSDOS screen to find mysterious or renamed Windows files. I 
was terrified that somehow this malicious hacker would get into the computer network 
at the university I am affiliated with. Incidentally, two months ago a hacker got 
into the Apple computer of one of the professor's in the Mathematics Department. I 
learned after he gave me a research paper to read, because there was a computer 
technician there working on his PC to help him reinstall his backed up files. 
 
 I know hackers use what is known as spoofing IP addresses. But in spite of that I 
was wondering is there any way law enforcement experts or computer security 
specialists can trace a hacker's whereabouts? Some years back there were several 
Scientific American articles in one issue  on these matters, that is, firewalls, 
malicious hackers, attacks on networks, denial of service attacks, etc. But I could 
not follow very well the peculiar, nearly fictional narrative one of the 
contributors to these Scientific American articles gave to show how the network 
administrator and the FBI caught the fictitious hacker in the article. 
 
 If there presently is no way at all for someone in authority, network 
administrators, or computer security specialists  to locate a hacker's whereabouts, 
then perhaps research should best be focused in this area. 
 
 Incidentally someone posted some information about the Diffie-Hellman algorithm 
(actually called in Number Theory a certain kind of  exponentiation cipher), saying 
that the keys are found by using elements of a finite group (a finite field, 
actually), which is quite true. 
 
 Suppose parties A and B want a common key. Then if they use a cryptosystem like DES, 
they take two elements h and k from that finite field, multiply them together, then 
raise the integer b to the power hk, or b^hk. This is the common key, and A sends b^h 
to B, B sends b^k to A, and both are able to decipher the encrypted messages. Usually 
the integers h and k are very large prime numbers, too large for a malicious hacker 
to guess. 
 
 Thanking you for your patience in advance, 
 
 Robert Betts
 

___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls