📄 ch03.htm
字号:
<P>For example, Schwartz once installed a shell script that allowed him to accessthe Intel network from other locations. This script reportedly opened a hole in Intel'sfirewall. Another system administrator discovered this program, froze Schwartz'saccount, and confronted him. Schwartz agreed that installing the script was not agood idea and further agreed to refrain from implementing that program again. Sometime later, that same system administrator found that Schwartz had re-installed theprogram. (Schwartz apparently renamed the program, thus throwing the system administratoroff the trail.) What does all this mean? From my point of view, Randal Schwartz probablybroke Intel policy a number of times. What complicates the situation is that testimonyreveals that such policy was never explicitly laid out to Schwartz. At least, hewas given no document that expressly prohibited his activity. Equally, however, itseems clear that Schwartz overstepped his authority.</P><P>Looking at the case objectively, some conclusions can immediately be made. Oneis that most administrators charged with maintaining network security use a toollike Crack. This is a common procedure by which to identify weak passwords or thosethat can be easily cracked by crackers from the void. At the time of the Schwartzcase, however, such tools were relatively new to the security scene. Hence, the practiceof cracking your own passwords was not so universally accepted as a beneficial procedure.However, Intel's response was, in my opinion, a bit reactionary. For example, whywasn't the matter handled internally?</P><P>The Schwartz case angered many programmers and security experts across the country.As Jeffrey Kegler wrote in his analysis paper, "Intel <I>v.</I> Randal Schwartz:Why Care?" the Schwartz case was an ominous development:<DL> <DD>Clearly, Randal was someone who should have known better. And in fact, Randal would be the first Internet expert already well known for legitimate activities to turn to crime. Previous computer criminals have been teenagers or wannabes. Even the relatively sophisticated Kevin Mitnick never made any name except as a criminal. Never before Randal would anyone on the `light side of the force' have answered the call of the 'dark side.'</DL><BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>You can find Kegler's paper online at <A HREF="http://www.lightlink.com/spacenka/fors/intro.html"><B>http://www.lightlink.com/spacenka/fors/intro.html</B></A>. <HR></P></BLOCKQUOTE><P>I want you to think about the Schwartz case for a moment. Do you have or administratea network? If so, have you ever cracked passwords from that network without explicitauthorization to do so? If you have, you know exactly what this entails. In youropinion, do you believe this constitutes an offense? If you were writing the laws,would this type of offense be a felony?</P><P>In any event, as stated, Randal Schwartz is unfortunate enough to be the firstlegitimate computer security expert to be called a cracker. Thankfully, the experienceproved beneficial, even if only in a very small way. Schwartz managed to revitalizehis career, touring the country giving great talks as Just Another Convicted PerlHacker. The notoriety has served him well as of late.<BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>TIP:</B></FONT><B> </B>The transcripts of this trial are available on the Internet in zipped format. The entire distribution is 13 days of testimony and argument. It is available at <A HREF="http://www.lightlink.com/spacenka/fors/court/court.html"><B>http://www.lightlink.com/spacenka/fors/court/court.html</B></A>. <HR></BLOCKQUOTE><H2><FONT COLOR="#000077"><B>Why Do Crackers Exist?</B></FONT></H2><P>Crackers exist because they must. Because human nature is just so, frequentlydriven by a desire to destroy instead of create. No more complex explanation needbe given. The only issue here is what type of cracker we are talking about.</P><P>Some crackers crack for profit. These may land on the battlefield, squarely betweentwo competing companies. Perhaps Company A wants to disable the site of Company B.There are crackers for hire. They will break into almost any type of system you like,for a price. Some of these crackers get involved with criminal schemes, such as retrievinglists of TRW profiles. These are then used to apply for credit cards under the namesof those on the list. Other common pursuits are cell-phone cloning, piracy schemes,and garden-variety fraud. Other crackers are kids who demonstrate an extraordinaryability to assimilate highly technical computer knowledge. They may just be gettingtheir kicks at the expense of their targets.<H2><FONT COLOR="#000077"><B>Where Did This All Start?</B></FONT></H2><P>A complete historical account of cracking is beyond the scope of this book. However,a little background couldn't hurt. It started with telephone technology. Originally,a handful of kids across the nation were cracking the telephone system. This practicewas referred to as <I>phreaking</I>. Phreaking is now recognized as any act by whichto circumvent the security of the telephone company. (Although, in reality, phreakingis more about learning how the telephone system works and then manipulating it.)</P><P>Telephone phreaks employed different methods to accomplish this task. Early implementationsinvolved the use of ratshack dialers, or red boxes. (<I>Ratshack</I> was a term torefer to the popular electronics store Radio Shack.) These were hand-held electronicdevices that transmitted digital sounds or tones. Phreakers altered these off-the-shelftone dialers by replacing the internal crystals with Radio Shack part #43-146.<BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>Part #43-146 was a crystal, available at many neighborhood electronics stores throughout the country. One could use either a 6.5MHz or 6.5536 crystal. This was used to replace the crystal that shipped with the dialer (3.579545MHz). The alteration process took approximately 5 minutes. <HR></BLOCKQUOTE><P>Having made these modifications, they programmed in the sounds of quarters beinginserted into a pay telephone. From there, the remaining steps were simple. Phreakswent to a pay telephone and dialed a number. The telephone would request paymentfor the call. In response, the phreak would use the red box to emulate money beinginserted into the machine. This resulted in obtaining free telephone service at mostpay telephones.</P><P>Schematics and very precise instructions for constructing such devices are atthousands of sites on the Internet. The practice became so common that in many states,the mere possession of a tone dialer altered in such a manner was grounds for search,seizure, and arrest. As time went on, the technology in this area became more andmore advanced. New boxes like the red box were developed. The term <I>boxing</I>came to replace the term <I>phreaking</I>, at least in general conversation, andboxing became exceedingly popular. This resulted in even further advances, untilan entire suite of boxes was developed. Table 3.1 lists a few of these boxes.<H4><FONT COLOR="#000077"><B>Table 3.1. Boxes and their uses.</B></FONT></H4><P><TABLE BORDER="1"> <TR ALIGN="LEFT" rowspan="1"> <TD ALIGN="LEFT" VALIGN="TOP"><I>Box</I></TD> <TD ALIGN="LEFT" VALIGN="TOP"><I>What It Does</I></TD> </TR> <TR ALIGN="LEFT" rowspan="1"> <TD ALIGN="LEFT" VALIGN="TOP">Blue</TD> <TD ALIGN="LEFT" VALIGN="TOP">Seizes trunk lines using a 2600MHz tone, thereby granting the boxer the same privileges as the average operator</TD> </TR> <TR ALIGN="LEFT" rowspan="1"> <TD ALIGN="LEFT" VALIGN="TOP">Dayglo</TD> <TD ALIGN="LEFT" VALIGN="TOP">Allows the user to connect to and utilize his or her neighbor's telephone line</TD> </TR> <TR ALIGN="LEFT" rowspan="1"> <TD ALIGN="LEFT" VALIGN="TOP">Aqua</TD> <TD ALIGN="LEFT" VALIGN="TOP">Reportedly circumvents FBI taps and traces by draining the voltage on the line</TD> </TR> <TR ALIGN="LEFT" rowspan="1"> <TD ALIGN="LEFT" VALIGN="TOP">Mauve</TD> <TD ALIGN="LEFT" VALIGN="TOP">Used to tap another telephone line</TD> </TR> <TR ALIGN="LEFT" rowspan="1"> <TD ALIGN="LEFT" VALIGN="TOP">Chrome</TD> <TD ALIGN="LEFT" VALIGN="TOP">Seizes control of traffic signals</TD> </TR></TABLE></P><P>There are at least 40 different boxes or devices within this class. Each was designedto perform a different function. Many of the techniques employed are no longer effective.For example, blue boxing has been seriously curtailed because of new electronicallyswitched telephone systems. (Although reportedly, one can still blue box in partsof the country where older trunk lines can be found.) At a certain stage of the proceedings,telephone phreaking and computer programming were combined; this marriage producedsome powerful tools. One example is BlueBEEP, an all-purpose phreaking/hacking tool.BlueBEEP combines many different aspects of the phreaking trade, including the redbox. Essentially, in an area where the local telephone lines are old style, BlueBEEPprovides the user with awesome power over the telephone system. Have a look at theopening screen of BlueBEEP in Figure 3.1.</P><P><A NAME="01"></A><A HREF="01.htm"><B>Figure 3.1.</B></A><B><BR></B><I>The BlueBEEP opening screen.</I></P><P>It looks a lot like any legitimate application, the type anyone might buy at hisor her local software outlet. To its author's credit, it operates as well as or betterthan most commercial software. BlueBEEP runs in a DOS environment, or through a DOSshell window in either Windows 95 or Windows NT. I should say this before continuing:To date, BlueBEEP is the most finely programmed phreaking tool ever coded. The author,then a resident of Germany, reported that the application was written primarily inPASCAL and assembly language. In any event, contained within the program are many,many options for control of trunk lines, generation of digital tones, scanning oftelephone exchanges, and so on. It is probably the most comprehensive tool of itskind. However, I am getting ahead of the time. BlueBEEP was actually created quitelate in the game. We must venture back several years to see how telephone phreakingled to Internet cracking. The process was a natural one. Phone phreaks tried almostanything they could to find new systems. Phreaks often searched telephone lines forinteresting tones or connections. Some of those connections turned out to be modems.</P><P>No one can tell when it was--that instant when a telephone phreak first loggedon to the Internet. However, the process probably occurred more by chance than skill.Years ago, Point- to-Point Protocol (PPP) was not available. Therefore, the way aphreak would have found the Internet is debatable. It probably happened after oneof them, by direct-dial connection, logged in to a mainframe or workstation somewherein the void. This machine was likely connected to the Internet via Ethernet, a secondmodem, or another port. Thus, the targeted machine acted as a bridge between thephreak and the Internet. After the phreak crossed that bridge, he or she was droppedinto a world teeming with computers, most of which had poor or sometimes no security.Imagine that for a moment: an unexplored frontier.</P><P>What remains is history. Since then, crackers have broken their way into everytype of system imaginable. During the 1980s, truly gifted programmers began croppingup as crackers. It was during this period that the distinction between hackers andcrackers was first confused, and it has remained so every since. By the late 1980s,these individuals were becoming newsworthy and the media dubbed those who breachedsystem security as hackers.</P><P>Then an event occurred that would forever focus America's computing communityon these hackers. On November 2, 1988, someone released a worm into the network.This worm was a self-replicating program that sought out vulnerable machines andinfected them. Having infected a vulnerable machine, the worm would go into the wild,searching for additional targets. This process continued until thousands of machines
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -