Log In


Reset Password
Archive

Date: Fri 01-May-1998

Print

Tweet

Text Size


Date: Fri 01-May-1998

Publication: Bee

Author: CURT

Quick Words:

iinfo-Internet-Brand-hackers

Full Text:

INTERNET INFO FOR REAL PEOPLE: Hack Attack

By Bob Brand

Breaking into computer systems is called hacking. Unless the "perp" has

permission, it is a crime. The Feds are turning up the heat. In March 1997, a

Massachusetts teenager successfully slipped past security barricades at Bell

Atlantic, brought down the airport control tower at the Worcester, Mass.,

airport for six hours, disrupted the telephone service in Rutland and broke

into a Worcester pharmacy computer. This kid accepted a plea bargain. He is

currently serving two years' probation and is forbidden to access computer

networks. In addition, he must complete 250 hours of community service, pay

Bell Atlantic $5,000 restitution and forfeit the hardware and software used in

the attack.

The good news is that Bell Atlantic has now shored up its defenses so that

this invasion cannot occur again.

The Double-Edged Sword

Attacks by hackers on government, university and corporate systems are on the

rise. Just recently MOD ("Masters of Downloading") broke into Pentagon

computers. Frequently, the press sensationalizes these incidents with a

portrait of a self-styled MacGyver who can break into large, secure

super-computers with a paper clip, a butane cigarette lighter and a Swiss Army

knife. This plays on the image of Matthew Broderick nearly starting World War

III in the 1983 movie War Games or Tom Cruise hanging from the wires

reprogramming a computer in Mission Impossible. While some of these "teenage"

hacks have been disruptive (even potentially life threatening), they often

uncover severe security breaches in systems that terrorists or

country-sponsored espionage agents can exploit for much greater damage.

In any event, law enforcement agencies are sending a strong and clear message

to both current and future hackers: "If you break in and we catch you, be

prepared to pay."

Kevin Mitnick

The super-heated media-hyped notorious serial cracker (a hacker who breaks in

to commit malicious acts) is 34-year-old hacker Kevin Mitnick. He has become

the poster boy for teen hackers. After a three-year chase, he was captured in

North Carolina in February 1995. He has attained folk hero status, in part,

because of sensationalized reporting in The New York Times . He is cooling his

keyboard in a Los Angeles jail awaiting trial. He faces 25 counts of wire and

computer fraud and a host of other charges. Mitnick has been immortalized in

Takedown , written by New York Times reporter John Markoff and The Fugitive

Game by Jonathan Littman. Some hackers get caught, change their ways and move

on to more productive lives. Not Mitnick. This latest series of charges, if

the government can provide the evidence, could put him behind bars for a long

time.

The Good Guys

In a secret warehouse somewhere outside of Boston, a seven member techno-nerd

squad of hackers often works until dawn. These guys work by day and hack by

night. Unlike Mitnick and his ilk, the seven members of LOpht (pronounced

loft), break into systems for the purpose of finding security flaws. In a 1997

"Mudge, " a professional cryptographer teamed up with another LOpft colleague

to steal the entire registry of Windows NT passwords. This was done with

software they created. They, now, sell the program that performs this dubious

achievement from their website. The $50 program, LopftCrack 2.0, can be given

a free test drive for 15 days. Scary! Once loaded on a network, LopftCrack 2.0

lays in wait, like a deadly predator, for a password (pw) to travel across the

wire. It takes a digital "picture" of the pw as it passes by and stores the

prize for the hacker to retrieve. The website boasts 48,000 downloads to date.

The software is made available to computer system administrators so they can

protect their networks.

Wild Growth

Jack Rickard of Boardwatch Magazine states there are now over 4,500 ISPs

(Internet Service Providers) in North America alone. With so many newcomers to

the ranks of the ISP marketplace, security against sophisticated intrusion is

a problem. Malicious hackers can break into unsuspecting networks and launch

attacks to other parts of the Internet. The flaws found by the LOpft group can

only be neutralized if the software manufacturers promptly plug the security

holes and the network administrators install the patches. Sadly, the hectic

growth of the Internet and other networks combined with overworked and often

understaffed ISPs and network administrators means that fresh holes in

security open as quickly as others are closed. We will continue to hear about

break-ins from hackers and crackers.

URLs (Uniform Resource Locators) of interest:

http://www.l0pht.com/

http://www.washingtonpost.com/wp-srv/frompost/april98/hacker4.htm

http://www.chicago.tribune.com/splash/article/0,1051,SAV-9804120386,00.html

http://us.imdb.com/Title?WarGames+(1983)

http://us.imdb.com/Title?Mission%3A+Impossible+(1996)

(This is the 101st of a series of elementary articles designed for surfing the

Internet. Next, "Juno and John Dvorak" is the subject on tap. Stay tuned.

Until next week, happy travels through cyberspace. Previous issues of Internet

Info for Real People (including links to sites mentioned in this article) can

be found: http://www.thebee.com. Please e-mail comments and suggestions to:

rbrand@JUNO.com or editor@thebee.com.)

Comments
Comments are open. Be civil.
0 comments

Leave a Reply