No, his machine is on a NAT based network. That means you can have 500 machines on the inside but on the outside it only appears as one machine. So if you installed a Trojan or "remote control" software on one of those 500 machines you couldn't connect with it. All the 'hacker' would be able to see is the external node. That is why it is hard to understand, you MUST have something to bridge the gap between the internal and external network, like a exploit in some software that bridges that gap in normal operations, such as the e-mail server, web-server, software that is on the external node etc etc. I seriously doubt his machine wasn't going though the NAT interface and that is why it leaves questions.
----- Original Message ----- From: "Stan Bubrouski" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, October 03, 2003 10:56 PM Subject: Re: [hlcoders] Re: HL2 Source Leaked > Manip wrote: > > > No, his e-mail was access while he was away. His computer was broken into > > when he was there reading an e-mail. I understand all that, the only part I > > don't understand is how they got the source OUT the internal network. I > > The payload of the e-mail exploit was a program that allows > basicallty remote control of the PC. With this access he > could easily gain access to others and using Gabe's access > to the source grabbing the latest source and sending it > back to themselves any way they wanted. Once they were > in the network, the rest was easy I'm sure. > > > think the e-mail hack and the source code being take are NOT related even if > > they think they are. To get at the internal network they would have to > > You didn't understand Gabe's message, see above, a remote > attacker had control over his pc. > > > exploit some piece of software to link the gap, but I doubt it had anything > > to do with e-mail (unless it was the e-mail system its self ...) The key > > logging software could have been installed after they had access to the > > Once they had they had the software on Gabe's computer > they wouldn't need to log keys to get his password, they > could get it from his outlook settings or by other means. > > > internal network and used to THEN get his password and read his e-mail, but > > if they had that kind of access then they could just as easily take them off > > his local machine cache. As I said I don't think they are linked but I'm > > basing this off all the information I have read. > > > > Gabe said the source tree was copied then stolen, if > it were copied it probably would have been copied from > version control. > > > MyG0t group (www.myg0t.com) has got an internal e-mail which is odd (Got > > that info from a forum post). > > myg0t does not seem to realize the magnitude of the > things they are posting in their forums. I'd expect > they are already suspects, given they were among the > first to announce the public release of the code. As > far as that e-mail goes who knows whats real and whats > fake without a statement from Valve on the matter. > > -sb > > > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, please visit: > http://list.valvesoftware.com/mailman/listinfo/hlcoders _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlcoders