Yup.  Good book.  The ending is a bit "preachy", though.

 -- Barrett

-----Original Message-----
From: Ben Diss [mailto:[EMAIL PROTECTED]]
Sent: Monday, April 23, 2001 12:08 PM
To: [EMAIL PROTECTED]
Cc: 'Steven Bixby'; 'Dave Seay';
Subject: Re: [RCSE] Anti-virus software - a "tale of woe"


Have you read the book "The Cuckoos Egg"?  Great story about tracking down
hackers.

http://www.amazon.com/exec/obidos/ASIN/0743411463/

-Ben


Barrett Stridiron wrote:
>
> > What is really surprising is how often I am alerted that someone is
trying
> > to break in to my computer, even with a modem connection. Subseven
Trojan
> > is the usual warning. It seems there are a lot of junior hackers out
> there...
>
> "Script Kiddies" is the technical term for these folks.
> "Bastards" works, too.
>
> > The average internet user's setup does not run any servers, so there are
> no
> > real break-in points to exploit even.  I suspect the gross majority of
> > hackers don't even bother with sites that aren't known commercial or
> > government entities.
>
> > We need to clear up a point.  There is Anti-Virus software and Firewall
> > software.  Norton security 2001 has both (I believe).  The attempts you
> are
> > talking about are being thwarted by the firewall.  If anyone is running
a
> > cable modem or DSL modem and does not have a firewall, they are asking
for
> > trouble.
>
> Funny this subject should come up now... modem users can be at risk.
>
> The linux box in the basement at my home, which is a DHCP server, firewall
> and gateway for my home network, got hacked recently.  I'm running Red Hat
> 6.2 on it.  Since my internet connection is dialup (the local phone
company
> wants $1200/month for a 128K DSL connection! Pass.) with no fixed IP
> address, I assumed there would be no major security problems, and didn't
> lock it down.
>
> Saturday night, I was in the basement finishing a plane when I heard the
> modem fire up.  Not unusual, as windows machines on the LAN sometimes
cause
> the gateway to dial for their "who has" requests.  These will normally
time
> out within two minutes.
>
> Twenty minutes later, I happened to glance at the modem.  The "SD" (send)
> light was on, steady.
>
> WTF?
>
> Something on the LAN is sending a lot of data, but what?  All the Windows
> machines were either switched off or asleep; the only machines active were
> my Powermac G3 (playing MP3s), the Linux file server, and the Linux
gateway.
>
> A check of the traffic out of the gateway revealed a perl script was
> scanning external IP addresses, and logging the results to a hidden file.
>
> Shit!
>
> I killed the offending process, shut down the modem connection, and
started
> digging.
>
> Thanks to my hidden security logs (the standard system logs had all been
> scrupulously cleaned by the invader), I discovered the following:
>  - In early March, someone polled my machine and discovered its security
> holes.
>  - Shortly afterward, my (encrypted) password file was transferred out via
> ftp.
>  - User OPERATOR logged in remotely, added two new user accounts ISHII and
> OBREGON.
>  - ISHII and OBREGON each logged in and transferred a single file to their
> account.
>  - Three rootkits were installed and activated.
>
> One ran the IP address scanner/logger.
>
> Another tracked how many users were logged in, relisted the password file
> and all known internal LAN connections at regular intervals.  The culled
> information was (supposed) to be sent via email.  (No working email on the
> firewall box - this may have saved other machines on my LAN from
discovery)
>
> The most insidious (and frankly, ingenious) one "sniffed" all IP traffic
> passing through the firewall and logged the most interesting tidbits to a
> hidden file.  This script caught damn near every unencrypted
> username/password combination that came by.  This includes my ISP account
> info, my multiple email accounts and my login info for *many* websites,
> INCLUDING PAYPAL.  =:^o
>
> I finished cleaning up the machine.  For now, it is running a slightly
> modified version of the firewall script I use on the servers here in the
> office.  Tonight, I plan to slay and rebuild the firewall at home, as I
> can't be sure that I caught everything.
>
> In the meanwhile, I'm changing every current password I have.
>
>  -- Barrett
>
> RCSE-List facilities provided by Model Airplane News.  Send "subscribe"
and "unsubscribe" requests to [EMAIL PROTECTED]

RCSE-List facilities provided by Model Airplane News.  Send "subscribe" and 
"unsubscribe" requests to [EMAIL PROTECTED]

Reply via email to