ECN Electrical Forum - Discussion Forums for Electricians, Inspectors and Related Professionals
ECN Shout Chat
ShoutChat
Recent Posts
Safety at heights?
by gfretwell - 04/23/24 03:03 PM
Old low volt E10 sockets - supplier or alternative
by gfretwell - 04/21/24 11:20 AM
Do we need grounding?
by gfretwell - 04/06/24 08:32 PM
UL 508A SPACING
by tortuga - 03/30/24 07:39 PM
Increasing demand factors in residential
by tortuga - 03/28/24 05:57 PM
New in the Gallery:
This is a new one
This is a new one
by timmp, September 24
Few pics I found
Few pics I found
by timmp, August 15
Who's Online Now
0 members (), 516 guests, and 17 robots.
Key: Admin, Global Mod, Mod
Previous Thread
Next Thread
Print Thread
Rate Thread
Page 2 of 2 1 2
#131556 09/27/03 02:26 AM
Joined: Oct 2000
Posts: 2,723
Likes: 1
Broom Pusher and
Member
Along the lines of what Paul is talking about, it's obvious that the target of many disgruntled (or wannabe) hackers is the OS of the Pacific Northwest - which came about from a marketing angle (mostly fueled by the "new end user" market structure).
Marketing Angle includes the entire story - from the IBM proposal, to the IT Media craze.
(this would make a nice threaded story, very interresting events involved in those early days - including Xerox PARC, Apple II, and the cloning of the ROM BIOS!).

I have yet to hear of hard core WORMS and Trojan Horses that affect machines running Linux, but maybe the info is kept quiet? <enter X-Files mode>

Very seldomly is anything heard which targets the Mac OS.

The last few (and very crippling) WORMS were hacked to target and abuse the holes in the "Not-Mentioned" OS's Security, and work via backdoor.

This really sucks, because it takes advantage of innocent unsuspecting end users- the ones which are not responsible for whatever anger is being vented; and they end up either being totally screwed over with rampant Viral scripts, unwillingly adding to the problem via E-Mail or being the infected host on a LAN (which screws up the whole LAN), along with requiring the services of Technical Personnel to fix everything!

It also makes everything for us power users very difficult! WORMS clogging up the already thin pipelines connecting E-Mail Robots; all the trouble from Harvesters, Spambots; and on and on!

Even worse is the trendy Virus Scanning Software, and the needs of Firewalls! Everyone is getting rich from clowns sending out annoying applets, however it's us who suffer!

Sent a .zip file to work (work uses AOL), and when I went to download it, the default Virus Scanning Applet killed my zip attachment!
All that was left were parameters in the zip file!
Extremely irritating! Also a major PITA since I needed the files that day early AM, and had to get them during Lunch!
It's easy to get the attachment without the Virus check, but I wanted to see what would happen.

This experiment answered a ton of "Whaddaheck???" questions I had, from similar situations of E-Mailed attached zip files to co-workers (and others using AOL). Still cannot get most of them to bypass the Virus Alert - no matter how much security I include!
(security being file size(s), name, sig files, indicating text, and "pre" messages which described following message with attachment).
They will not bypass the virus scan because they are afraid to "catch a virus".

Oh well, that's what "Sneakernet" is for, huh? [Linked Image]

Said it once, and will say it again:
If I had the talent and scripting skills of the "pro" hackers, I would write so many kick butt apps for daily use!
Not one of them would be malicious at all!

Scott35


Scott " 35 " Thompson
Just Say NO To Green Eggs And Ham!
#131557 09/28/03 12:25 PM
Joined: Dec 2002
Posts: 228
J
Member
I feel that the os vendors should be held accountable for major security holes left by inattentive programmers and simple apathy, win 2k was released with ms having over 1000 KNOW security issues and bugs, not to mention how many have come to light over the last three years since its release. MS is also slow to respond to any issues, and even ignoring some. If you take a look at open source software, mainly Linux and some Unix, when there is a security issue discovered it is usually patched within a day or two, especially the linux community.
Most people who write the viruses are bored programmers that want to see if they can, most have no payload and go unnoticed, but there are quite a few with nasty payloads and can go undetected. The software is out there to allow somebody with minimal programming experience to download a virus creation suite and wreak havoc on a company, college, or school lan/man/wan. I agree that it is sad that we all have to have, at a minium, firewall software and anti-virus running at all times. To equate it to the real world we all have locks on our front doors and most people get a flu or mumps shot. The only way to stay on top of all of it is to get in the "hacker community", or watch from a safe distance, just as there is this board for electrical questions and problems there are several boards and thousands of web sites with hacking resources. I spent six months as a network administrator and one of my biggest issues was network security, staying on top of current issues and threats and making sure that my firewalls could hold up to an attack, I follow this at home as well, I have one linux PC sitting next to me that its only job is to filter all my network traffic, the equivelent of having a deadbolt on the front door, but keeping up on the current issues you make sure that the back doo and side door are locked as well. There are a number of resources for helping you stay on top, CERT (Computer emergency response team)sends out e-mails any time they find a security issue in anything, most anti-virus vendors have their own "labs" and most send out notifications if you sign up for them. If anybody has any questions feel free to e-mail me directly.

Jim

#131558 09/30/03 03:42 PM
Joined: Aug 2001
Posts: 7,520
P
Member
Most hackers (I'm using this term in its original, non-malicious meaning) like to play around with systems to see what can be done and how security can be defeated. I certainly did that years ago, although I hasten to add that I never did so with any intent to cause havoc, it was just the fun of "Beating the system."

Here's my confession: [Linked Image]

Back when I was around 13 (that would have been 1979) my school had an account with the local technical college to use their PDP-11/40. The PDP had numerous terminals around the building, including a large number of ASR33 teletypes in one room where we could go most evenings, plus about a dozen dial-up lines used for the schools and other remote sites.

Under the operating system they used, all the TTY lines were assigned numbers which could be opened as files if not already in use. In that big TTY room at the college, all the 25-way D-connector outlets that the teletypes plugged into were very conveniently Dymo-taped with the KB numbers, and it didn't take long to sketch out a map of the room. Similarly, it didn't take too long to deduce the KB numbers assigned to the modems.

I wrote a short program which would open a channel to any unlocked TTY port and send appropriate messages, written to imitate the standard OS responses ("WELCOME TO RSTS/E" etc.).

When at the college, I'd pick a vacant terminal (all could be seen from anywhere else in the room), seize it with my program and then wait for someone to sit down and start to log in. The messages they got looked just like the real system prompts, so they would enter their account number and password. To avoid suspicions, my program gave some sort of response along the lines of "SYSTEM ERROR -- PLEASE REPEAT LOGIN" and then drop the link so that they would then log in for real. By that time I already had their password, of course. [Linked Image]

As I said, it was never used for mischief, mostly just for the fun of seeing what the guys at rival high schools were doing!

It's amazing also how much security can be compromised by just a little social engineering. A few years later I put the college computer center staff to the test. I was living 300 miles away by then, and thought it would be fun to see what the new students at my old school were up to.

I called the computer center voice line: "Hello, this is Mr. ---- from ---- High School. I'm having trouble getting into account 37,0. Th password used to be ----, but I think our department head might have just changed it and unfortunately he's not here today. Any chance you could check for me?"

"Just a moment.... The current password is ----."

It really was that simple, although I guess the response might have been different had I not given the correct account number for the school. And that was 20 odd years ago, before computer security became a big issue.

Page 2 of 2 1 2

Link Copied to Clipboard
Powered by UBB.threads™ PHP Forum Software 7.7.5