Literary Collections
Read books online » Literary Collections » Underground by Suelette Dreyfus (books to get back into reading txt) 📖

Book online «Underground by Suelette Dreyfus (books to get back into reading txt) 📖». Author Suelette Dreyfus



1 ... 32 33 34 35 36 37 38 39 40 ... 79
Go to page:
else’s computers to delete the copied file. Choosing overseas sites would make it even harder for the admin to reach the admins of those machines and warn them in time. Then, once Zardoz was safely tucked away in a few back-up sites, Phoenix could download it over the Internet from one of those with less risk of being booted off the machine halfway through the process.

Sitting at his home in Kelvin Grove, Thornbury, just two suburbs north of the CSIRO machine, Ian Mathieson watched the hacker break into his computer again. Awoken by a phone call at 2.30 a.m. telling him there was a suspected hacker in his computer, Mathieson immediately logged in to his work system, DITMELA, via his home computer and modem. The call, from David Hornsby of the Melbourne University Computer Science Department, was no false alarm.

After watching the unknown hacker, who had logged in through a Melbourne University machine terminal server, for about twenty minutes, Mathieson booted the hacker off his system. Afterwards he noticed that the DITMELA computer was still trying to execute a command issued by the hacker. He looked a little closer, and discovered DITMELA was trying to deliver mail to two Melbourne University accounts.

The mail, however, hadn’t been completely delivered. It was still sitting in the mail spool, a temporary holding pen for undelivered mail. Curious as to what the hacker would want so much from his system, Mathieson moved the file into a subdirectory to look at it. He was horrified to find the entire Zardoz archive, and he knew exactly what it meant. These were no ordinary hackers—they were precision fliers. Fortunately, Mathieson consoled himself, he had stopped the mail before it had been sent out and secured it.

Unfortunately, however, Mathieson had missed Electron’s original file—the bundle of Zardoz copies. When Electron had mailed the file, he had copied it, leaving the original intact. They were still sitting on DITMELA under the unassuming name .t. Mailing a file didn’t delete it—the computer only sent a copy of the original. Mathieson was an intelligent man, a medical doctor with a master’s degree in computer science, but he had forgotten to check the temporary directory, one of the few places a hacker could store files on a Unix system if he didn’t have root privileges.

At exactly 3.30 a.m. Phoenix logged into DITMELA from the University of Texas. He quickly looked in the temporary directory. The .t file was there, just as Electron had said it would be. The hacker quickly began transferring it back to the University of Texas.

He was feeling good. It looked like the Australians were going to get the entire Zardoz collection after all. Everything was going extremely well—until the transfer suddenly died. Phoenix had forgotten to check that there was enough disk space available on the University of Texas account to download the sizeable Zardoz bundle. Now, as he was logged into a very hot machine, a machine where the admin could well be watching his every move, he discovered there wasn’t enough room for the Zardoz file.

Aware that every second spent on-line to DITMELA posed a serious risk, Phoenix logged off the CSIRO machine immediately. Still connected to the Texas computer, he fiddled around with it, deleting other files and making enough room to pull the whole 500 k Zardoz file across.

At 3.37 a.m. Phoenix entered DITMELA again. This time, he vowed, nothing would go wrong. He started up the file transfer and waited. Less than ten minutes later, he logged off the CSIRO computer and nervously checked the University of Texas system. It was there. Zardoz, in all its glory. And it was his! Phoenix was ecstatic.

He wasn’t done yet and there was no time for complacency. Swiftly, he began compressing and encrypting Zardoz. He compressed it because a smaller file was less obvious on the Texas machine and was faster to send to a back-up machine. He encrypted it so no-one nosing around the file would be able to see what was in it. He wasn’t just worried about system admins; the Texas system was riddled with hackers, in part because it was home to his friend, Legion of Doom hacker Erik Bloodaxe, a student at the university.

After Phoenix was satisfied Zardoz was safe, he rang Electron just before 4 a.m. with the good news. By 8.15, Phoenix had downloaded Zardoz from the Texas computer onto his own machine. By 1.15 p.m., Electron had downloaded it from Phoenix’s machine to his own.

Zardoz had been a difficult conquest, but Deszip would prove to be even more so. While dozens of security experts possessed complete Zardoz archives, far fewer people had Deszip. And, at least officially, all of them were in the US.

The US government banned the export of cryptography algorithms. To send a copy of Deszip, or DES or indeed any other encryption program outside the US was a crime. It was illegal because the US State Department’s Office of Defense Trade Controls considered any encryption program to be a weapon. ITAR, the International Traffic in Arms Regulations stemming from the US Arms Export Control Act 1977, restricted publication of and trad in `defense articles’. It didn’t matter whether you flew to Europe with a disk in your pocket, or you sent the material over the Internet. If you violated ITAR, you faced the prospect of prison.

Occasionally, American computer programmers discreetly slipped copies of encryption programs to specialists in their field outside the US. Once the program was outside the US, it was fair game—there was nothing US authorities could do about someone in Norway sending Deszip to a colleague in Australia. But even so, the comp-sec and cryptography communities outside the US still held programs such as Deszip very tightly within their own inner sanctums.

All of which meant that Electron and Phoenix would almost certainly have to target a site in the US. Electron continued to compile a hit list, based on the Zardoz mailing list, which he gave to Phoenix. The two hackers then began searching the growing Internet for computers belonging to the targets.

It was an impressive hit list. Matthew Bishop, author of Deszip. Russell Brand, of the Lawrence Livermore National Labs, a research laboratory funded by the US Department of Energy. Dan Farmer, an author of the computer program COPS, a popular security-testing program which included a password cracking program. There were others. And, at the top of the list, Eugene Spafford, or Spaf, as the hackers called him.

By 1990, the computer underground viewed Spaf not just as security guru, but also as an anti-hacker zealot. Spaf was based at Purdue University, a hotbed of computer security experts. Bishop had earned his PhD at Purdue and Dan Farmer was still there. Spaf was also one of the founders of usenet, the Internet newsgroups service. While working as a computer scientist at the university, he had made a name for himself by, among other things, writing a technical analysis of the RTM worm. The worm, authored by Cornell University student Robert T. Morris Jr in 1988, proved to be a boon for Spaf’s career.

Prior to the RTM worm, Spaf had been working in software engineering. After the worm, he became a computer ethicist and a very public spokesman for the conservatives in the computer security industry. Spaf went on tour across the US, lecturing the public and the media on worms, viruses and the ethics of hacking. During the Morris case, hacking became a hot topic in the United States, and Spaf fed the flames. When Judge Howard G. Munson refused to sentence Morris to prison, instead ordering him to complete 400 hours community service, pay a $10000 fine and submit to three years probation, Spaf publicly railed against the decision. The media reported that he had called on the computer industry to boycott any company which chose to employ Robert T. Morris Jr.

Targeting Spaf therefore served a dual purpose for the Australian hackers. He was undoubtedly a repository of treasures such as Deszip, and he was also a tall poppy.

One night, Electron and Phoenix decided to break into Spaf’s machine at Purdue to steal a copy of Deszip. Phoenix would do the actual hacking, since he had the fast modem, but he would talk to Electron simultaneously on the other phone line. Electron would guide him at each step. That way, when Phoenix hit a snag, he wouldn’t have to retreat to regroup and risk discovery.

Both hackers had managed to break into another computer at Purdue, called Medusa. But Spaf had a separate machine, Uther, which was connected to Medusa.

Phoenix poked and prodded at Uther, trying to open a hole wide enough for him to crawl through. At Electron’s suggestion, he tried to use the CHFN bug. The CHFN command lets users change the information provided—such as their name, work address or office phone number—when someone `fingers’ their accounts. The bug had appeared in one of the Zardoz files and Phoenix and Electron had already used it to break into several other machines.

Electron wanted to use the CHFN bug because, if the attack was successful, Phoenix would be able to make a root account for himself on Spaf’s machine. That would be the ultimate slap in the face to a high-profile computer security guru.

But things weren’t going well for Phoenix. The frustrated Australian hacker kept telling Electron that the bug should work, but it wouldn’t, and he couldn’t figure out why. The problem, Electron finally concluded, was that Spaf’s machine was a Sequent. The CHFN bug depended on a particular Unix password file structure, but Sequents used a different structure. It didn’t help that Phoenix didn’t know that much about Sequents—they were one of Gandalf’s specialties.

After a few exasperating hours struggling to make the CHFN bug work, Phoenix gave up and turned to another security flaw suggested by Electron: the FTP bug. Phoenix ran through the bug in his mind. Normally, someone used FTP, or file transfer protocol, to transfer files over a network, such as the Internet, from one computer to another. FTPing to another machine was a bit like telnetting, but the user didn’t need a password to login and the commands he could execute once in the other computer were usually very limited.

If it worked, the FTP bug would allow Phoenix to slip in an extra command during the FTP login process. That command would force Spaf’s machine to allow Phoenix to login as anyone he wanted—and what he wanted was to login as someone who had root privileges. The `root’ account might be a little obvious if anyone was watching, and it didn’t always have remote access anyway. So he chose `daemon’, another commonly root-privileged account, instead.

It was a shot in the dark. Phoenix was fairly sure Spaf would have secured his machine against such an obvious attack, but Electron urged him to give it a try anyway. The FTP bug had been announced throughout the computer security community long ago, appearing in an early issue of Zardoz. Phoenix hesitated, but he had run out of ideas, and time.

Phoenix typed:

FTP -i uther.purdue.edu

quote user anonymous

quote cd ~daemon

quote pass anything

The few seconds it took for his commands to course from his suburban home in Melbourne and race deep into the Midwest felt like a lifetime. He wanted Spaf’s machine, wanted Deszip, and wanted this attack to work. If he could just get Deszip, he felt the Australians would be unstoppable.

Spaf’s machine opened its door as politely as a doorman at the Ritz Carlton. Phoenix smiled at his computer. He was in.

It was like being in Aladdin’s cave. Phoenix just sat there, stunned at the bounty which lay before him. It was his, all his. Spaf had megabytes of security files in his directories. Source code for the RTM Internet worm. Source code for the WANK worm.

1 ... 32 33 34 35 36 37 38 39 40 ... 79
Go to page:

Free ebook «Underground by Suelette Dreyfus (books to get back into reading txt) 📖» - read online now

Comments (0)

There are no comments yet. You can be the first!
Add a comment