How servers are cracked, by R a v e N.

Session Start: Sat Jan 22 18:04:06 2000
[18:04] *** Now talking in #bsrf
[18:04] *** Topic is 'Welcome to #bsrf | Our Website: http://blacksun.box.sk | Next IRC lecture: 'How Servers are Cracked' | See http://blacksun.box.sk/irc.html | Alright, I know the bot is down most of the time now, and that the channel is ultra insecure, so please don't abuse this... heh, yeah right'
[18:04] *** Set by Raven on Wed Jan 19 07:22:58
[18:04] * #bsrf is being logged
[18:04] <INTJ> okie
[18:05] <INTJ> ready?
[18:05] <Raven> alright
[18:05] <Raven> is everyone ready?
[18:05] <c0c0> yep
[18:05] <Chaotic_Thought> Yes sir...
[18:05] <Seeker> yup
[18:05] <squiler> yup
[18:05] <INTJ> 9 ppl overall
[18:05] <SnIpEr_WoLf_> yeah
[18:05] <Seeker> that good?
[18:05] <Raven> including me
[18:05] <Raven> :-)
[18:05] <Raven> alright
[18:05] <Raven> On your marks.
[18:05] <Raven> Get set.
[18:05] <Raven> Go!
[18:05] <Raven> okay, so today's topic is...
[18:06] <Raven> how servers are hacked
[18:06] <Raven> basically, of course
[18:06] <INTJ> cracked
[18:06] <Raven> yeah, cracked
[18:06] <Raven> terminology...
[18:06] <Raven> hehe
[18:06] <Raven> :-)
[18:06] <INTJ> that's what you wrote on your website ;p
[18:06] <squiler> :)
[18:06] <Raven> anyway, most of those website defacements...
[18:06] <Raven> dns cracks
[18:06] <Raven> email cracks
[18:06] <Raven> ftp cracks
[18:06] <Raven> etc' etc'
[18:06] <Raven> they're usually done in fairly easy and simple ways
[18:06] <Raven> that do not require much knowledge
[18:07] <Raven> they're usually done by little kids
[18:07] <Raven> mostly little kids in "hacking" groups
[18:07] <Raven> who want to show the world how smart they are
[18:07] <Raven> Phase I
[18:07] <Raven> --------
[18:07] <Raven> oops...
[18:07] <Raven> -------
[18:07] <Raven> DAMN!
[18:07] <Raven> lol
[18:07] <Raven> okay, all over again
[18:07] <Raven> Phase I
[18:07] <Raven> -------
[18:07] <Raven> ahh...
[18:07] <Raven> that's better
[18:07] <Raven> any questions so far?
[18:07] <Raven> okay, so phase one is...
[18:07] <Raven> intelligence gathering
[18:07] <TheJoker> why is it so easy?
[18:08] <Raven> we'll get to that
[18:08] <INTJ> because of ./i-0wn3d-u <server> <port> ;p
[18:08] <Raven> exactly
[18:08] <Raven> if some of u don't understand, don't worry
[18:08] <Raven> we'll get to that
[18:08] <Raven> so anyway, stage one is intelligence gathering
[18:08] <Raven> this is the most important stage
[18:08] <Raven> why?
[18:08] <squiler> ...
[18:09] <Raven> because otherwise you'll find yourself trying thousands of sunos 3.4 exploits
[18:09] <Seeker> need to know what os
[18:09] <TheJoker> you have to know what exploits apply
[18:09] <Raven> while you're actually attacking an nt4.0 server
[18:09] <Raven> what os...
[18:09] <Raven> and what is the host running
[18:09] *** c0c0_ has joined #bsrf
[18:09] <Raven> those are the two most important phases in intelligence gathering
[18:09] <c0c0_> damn i've disconnected
[18:09] <Raven> getting them is fairly easy
[18:09] *** c0c0 has quit IRC (Ping timeout)
[18:09] <INTJ> welcome c0c0_, we're in the middle of the lecture
[18:09] *** c0c0_ is now known as c0c0
[18:09] <Raven> poor soul
[18:09] <TheJoker> nmap?
[18:09] <Raven> :-)
[18:10] <Raven> that's two
[18:10] <Raven> nmap is too "advanced" for most script kiddies
[18:10] <TheJoker> advanced?
[18:10] <Raven> most people use really amateurish methods
[18:10] <Raven> such as reading daemon banners
[18:10] <Raven> (yes, it requires the "cracker" to have unix... ooh)
[18:10] <TheJoker> hehe
[18:10] <Seeker> whats a daemon banner?
[18:10] <Raven> and to know how to install new software
[18:10] <squiler> ha
[18:10] <Raven> alright, i'll show u
[18:10] <squiler> oo me oo me!
[18:10] <Raven> everyone, do telnet mailgw.netvision.net.il
[18:10] <Raven> this is my isp's smtp server
[18:11] <Raven> smtp = simple mail transfer protocol
[18:11] <INTJ> but daemon banner is trivial to be spoofed
[18:11] <Raven> for outgoing mail
[18:11] <Raven> yes, of course
[18:11] <Raven> first, let's explain to those who don't know what daemon banners are
[18:11] <Raven> what do u get when u telnet to mailgw.netvision.net.il?
[18:11] <Seeker> oh, i think i know what you mean
[18:11] <c0c0> Trying 194.90.1.14...
[18:11] <squiler> "could not connect"
[18:11] <squiler> :-)
[18:11] <c0c0> telnet: connect to address 194.90.1.14: Connection refused
[18:11] <c0c0> telnet: Unable to connect to remote host: Connection refused
[18:11] <Raven> oops
[18:11] *** SnIpEr_WoLf_ has left #bsrf
[18:11] <Raven> telnet mailgw.netvision.net.il 25
[18:11] *** SnIpEr_WoLf_ has joined #bsrf
[18:11] <Raven> telnet mailgw.netvision.net.il 25
[18:12] <Raven> port 25, this is important
[18:12] <Raven> smtp runs on port 25
[18:12] <c0c0> yea
[18:12] <Chaotic_Thought> I'm on...
[18:12] <squiler> we get like sendmail version etc...
[18:12] <TheJoker> running sendmail
[18:12] <Chaotic_Thought> 8.9.3 sendmail
[18:12] <Raven> yup
[18:12] <Raven> 220 alpha.netvision.net.il ESMTP Sendmail 8.9.3/8.8.6; Sat, 22 Jan 2000 19:14:41 +0200 (IST)
[18:12] <TheJoker> a linux/unix?
[18:12] <Raven> this is what u get
[18:12] *** Sniper_wolf__ has joined #bsrf
[18:12] <Raven> this is a daemon banner
[18:13] <c0c0> hmmmm, oki
[18:13] <Raven> btw check blacksun.box.sk/ports.txt for a list of standard ports
[18:13] <Raven> now, what does it tell us?
[18:13] <Raven> ooh, sendmail
[18:13] <Raven> the dumbest daemon ever
[18:13] <Raven> it just gave us the version of the daemon that is running
[18:13] <TheJoker> it's a unix type sys
[18:13] <Raven> usually, in sendmail holes, the OS doesn't matter much
[18:13] <Raven> yup
[18:13] <Raven> now, suppose we're some script kiddie
[18:14] <Raven> so we have the version
[18:14] <Raven> of the daemon
[18:14] <Raven> now we go to, say, packetstorm.securify.com
[18:14] <Raven> or neworder.box.sk
[18:14] <Raven> and we search
[18:14] <INTJ> bugtraq
[18:14] <INTJ> technotronic
[18:14] <INTJ> ;p
[18:14] <Raven> we use keywords such as "sendmail 8.9.3"
[18:14] <Raven> yes, bugtraq is good too
[18:14] <Chaotic_Thought> look for a crack/bug
[18:14] <Raven> yup
[18:14] <INTJ> ntbugtraq.com
[18:14] <Raven> now, here is what we'll find
[18:14] <Raven> we could find:
[18:15] <TheJoker> that's pathetic!
[18:15] <Raven> a) advisories
[18:15] <Raven> these hardly mean anything to crackers
[18:15] <Raven> they only explain to u how to fix the hole
[18:15] <Raven> and a little technical backgruond
[18:15] <Raven> and a little technical background
[18:15] <Raven> which the common script kiddie won't be interested in
[18:15] <Raven> b) texts
[18:15] <Raven> texts will detail the hole
[18:15] <Raven> how to exploit it
[18:16] <Raven> and a workaround, if any
[18:16] <Raven> c) an exploit
[18:16] <Raven> BINGO!
[18:16] <Raven> an exploit is a premade program
[18:16] <Raven> that exploits a certain hole
[18:16] <Raven> all the cracker has to do is to compile it
[18:16] <Raven> (unless it's written in perl)
[18:16] <Raven> (or another interpreted programming language)
[18:16] <INTJ> bash
[18:16] <Raven> ('cause they run in the form of source code)
[18:16] <Chaotic_Thought> So crackers are usally lazy punks...
[18:16] <Raven> yes, or a shell script
[18:16] <Raven> although u'll hardly ever found exploits in the form of shell scripts
[18:16] <INTJ> pamslam.sh
[18:16] <INTJ> heheh ;p
[18:17] <Raven> sniperwolf missed everything from phase one 'till "the dumbest daemon ever"
[18:17] <INTJ> redhat and mandrake rooter
[18:17] <Raven> can anyone plz help him?
[18:17] <Raven> i'm kinda busy here with the lecture and everything
[18:17] <Raven> :-)
[18:17] <Raven> other daemons a cracker might want to look at:
[18:17] <Raven> ftp
[18:17] <Raven> by logging into ftp servers
[18:17] <Raven> when logging into ftp servers
[18:17] <Raven> u usually get technical information about the system
[18:18] <Raven> u could also try to issue the syst command
[18:18] <Raven> which will also give away some information
[18:18] <Raven> webservers
[18:18] <Raven> if u issue a bad url request
[18:18] <Raven> it'll give u some info
[18:18] <Raven> for example: try surfing to http://blacksun.box.sk/some-dead-link.html
[18:18] <c0c0> like they are usun apache
[18:18] <Raven> it'll give u an error msg
[18:18] <Raven> and the name and version of the webserver program
[18:18] <Raven> fairly easy
[18:18] <Raven> all u need is a browser
[18:19] <Raven> crackers can also utilize newsgroups daemons
[18:19] <TheJoker> how bout pop mail?
[18:19] <Raven> and others
[18:19] <Raven> pop mail too
[18:19] <Chaotic_Thought> Apache 1.3.6 port 80
[18:19] <Raven> pop3 usually reveals information
[18:19] <Raven> ftp port 21
[18:19] <Raven> news port...
[18:19] <Raven> 119, i think
[18:19] <Raven> pop is...
[18:19] <TheJoker> telnet
[18:19] <Raven> uhh, damn
[18:19] <INTJ> 110 = pop
[18:19] <TheJoker> 110
[18:19] <Raven> yeah
[18:19] <Raven> telnet too
[18:19] <Raven> telnet to port 23
[18:19] <c0c0> yep 119 if it is not a secure connection
[18:19] <Raven> go ahead and telnet to blacksun.box.sk on port 23
[18:19] <Raven> u'll get some info on the system
[18:20] <Raven> but what if we change this information?
[18:20] *** Sniper_wolf__ has quit IRC (IL.Quit: I was using Ghost_Rider Script version 2.0)
[18:20] <Raven> most of today's server programs let u do it
[18:20] <TheJoker> most admins do it.
[18:20] <squiler> redhat linux 5.2 --- you learn the os
[18:20] <c0c0> Kernel 2.0.36 on an i586
[18:20] <squiler> and the system
[18:20] <Raven> so suppose we've changed the daemon banner
[18:20] <TheJoker> Red Hat Linux release 1.2 (Apollo)
[18:20] <Raven> but what if...
[18:20] <squiler> ...
[18:20] <Raven> we're dealing with a smarter script kiddie?
[18:21] <Raven> (ph33r)
[18:21] <squiler> they exist?
[18:21] <Raven> yeah
[18:21] <squiler> :)
[18:21] <Raven> there are some
[18:21] <TheJoker> nmap!
[18:21] <INTJ> yes, unfortunately ;p
[18:21] <Raven> yup
[18:21] <Raven> www.insecure.org
[18:21] <Raven> download nmap
[18:21] <c0c0> queso may be?
[18:21] <Raven> how does nmap work?
[18:21] <INTJ> winfingerptint.exe
[18:21] <Raven> queso too
[18:21] <Raven> winfingerprint too
[18:21] <Raven> winfingerprint is for windows
[18:21] <Raven> the others are for unix
[18:21] <Raven> get them all at packetstorm.securify.com
[18:21] <INTJ> windows nt
[18:21] <Raven> how do they work?
[18:21] <Raven> pretty simple
[18:21] <Raven> each OS has what we call tcp/ip fingerprints
[18:21] <Raven> why?
[18:22] <TheJoker> it trys all these same techniques don't it?
[18:22] <Raven> because each os implements tcp/ip in a different way
[18:22] <Raven> kinda
[18:22] <Raven> yeah
[18:22] <Raven> basically, nmap and the others are just port scanners
[18:22] <TheJoker> ya now I remember
[18:22] <Raven> but they do more
[18:22] <Raven> they can detect these fingerprints
[18:22] <Raven> and give definitive information
[18:22] <INTJ> this irc server gives a lot if advertising msgs..
[18:22] <TheJoker> the win tcp/ip stack is easy to detect
[18:22] <Raven> yes, it's the easiest
[18:22] <Raven> windows is the easiest to detect
[18:23] <Raven> detecting the difference between two similar unix distributions is harder
[18:23] <Raven> detecting the differences between, say, some unix and windows
[18:23] <Raven> or mac and windows
[18:23] <Raven> is fairly easy
[18:23] <Seeker> could you spoof fingerprints? as an admin i mean
[18:23] <Raven> so our smart and elite script kiddie grabs his copy of nmap
[18:23] <INTJ> how bout between linux distro or *bsd?
[18:23] <TheJoker> but nmap uses a combo of all the techniques.
[18:23] <Raven> technically, u can, but it takes a lot of messing around with code and stuff
[18:24] <Raven> and u probably won't be able to do it well
[18:24] <Raven> nor hide from all techniques
[18:24] <Raven> also, nmap does other things
[18:24] <Raven> it's a portscanner that can also scan through firewalls
[18:24] <TheJoker> but do your really have too hide?
[18:24] <Raven> more on nmap's website and nmap's man pages
[18:24] <Raven> (it installs a manpage)
[18:24] <Raven> (so u type man nmap after u install it)
[18:24] <Raven> (and it explains everything)
[18:24] <Raven> www.insecure.org/nmap
[18:25] <TheJoker> arent your lost in say ftp trafic when ftping?
[18:25] <Raven> well, if u reveal critical information about ur system
[18:25] <Raven> u might be helping a cracker
[18:25] <Raven> TheJoker: say again plz?
[18:25] <TheJoker> does the cracker have to worry about hiding?
[18:26] <Raven> yes
[18:26] <Raven> so the cracker would implement some techniques
[18:26] <TheJoker> wont' he/she be lost in trafic?
[18:26] <Raven> such as the ones described in blacksun.box.sk/anonymity.txt
[18:26] <Raven> generally, yes
[18:26] <Raven> but there are IDSs
[18:26] <Raven> IDS = Intrusion Detection System
[18:26] <TheJoker> dynamic IPs now days
[18:26] <Raven> they go over traffic
[18:26] <Raven> and highlight several parts in the logs
[18:26] <squiler> is a proxy enough to hide?
[18:26] <Raven> which might mean a cracking attempt
[18:26] *** c0c0 has quit IRC (Ping timeout)
[18:26] <Raven> bouncing ur connection would usually suffice
[18:27] <Raven> okay, that's it. if u miss something, just wait for the logs to come out
[18:27] <INTJ> if the proxy party cooperate w/ us ;p
[18:27] <Raven> or...
[18:27] <Raven> suppose we telnet to nether.net
[18:27] <Raven> and get a free shell account
[18:27] <Raven> and then break out
[18:27] <Raven> and manage to get root
[18:27] <Raven> (suppose we do it from a public place so they can't trace us back home)
[18:27] <Raven> now we have a root shell on nether.net
[18:27] <Raven> and we can run exploits and hack from them
[18:27] <TheJoker>  http://freebooks.hypermart.net/proxy/proxiesn.htm
[18:28] <Raven> :-)
[18:28] <TheJoker> free proxies worldwide
[18:28] <squiler> nether.net is the best free shell provider
[18:28] <Raven> okay, so these were phase one and two
[18:28] <Raven> phase one - info gathering
[18:28] <Raven> two - searching online databases
[18:28] <Raven> now, suppose we're in
[18:28] <Raven> now comes phase three
[18:28] <Raven> no, not defacing the website!
[18:28] <Raven> or dns database
[18:28] <Raven> we have some other things to worry about
[18:29] <Raven> first we need to clean out presence from the logs
[18:29] <TheJoker> logs?
[18:29] <Raven> or the admin might realize he got cracked
[18:29] <squiler> thats what i'm doing right now
[18:29] <Raven> and put more effort into security
[18:29] <squiler> :)
[18:29] <Raven> :-)
[18:29] <INTJ> this is where rootkit comes in ;p
[18:29] <Raven> not these logs!
[18:29] <squiler> hahaha
[18:29] <Raven> yeah, rootkits automate such processes
[18:29] <TheJoker> :p)
[18:29] *** INTJ has quit IRC (No route to host)
[18:29] * Chaotic_Thought grins
[18:29] <Raven> fun for the whole family
[18:29] <squiler> how does a rootkit actaully work?
[18:29] <Raven> so now that we've cleaned our presence from the logs
[18:30] <Raven> it's just an automated script
[18:30] <Raven> it automates some tasks for u
[18:30] <Raven> they only work on specific configurations
[18:30] *** INTJ has joined #bsrf
[18:30] <Raven> of course, if we only clean the standard logs like klog (kernel logger) and syslog (system logger)
[18:30] <INTJ> shoot, israel.net closed me
[18:30] <Raven> it might now be enough
[18:30] <Raven> don't worry, just get someone to give u the logs at the end of the lecture
[18:31] <Raven> okay, so if we only cleaned syslog and klog
[18:31] <Raven> we might have still left some trace
[18:31] <Raven> maybe the admin is using an external logging system?
[18:31] <Raven> could be...
[18:31] <TheJoker> in being rooted?
[18:31] <Raven> hey, when ur done with the lecture, plz send the logs to tplec@zipmail.com.br (sniper wolf) and to me (barakirs@netvision.net.il)
[18:31] <Raven> now, suppose we're a cracker
[18:31] <Raven> and we've cleaned syslog and klog
[18:32] <Raven> but the admin was using some external logger
[18:32] <Raven> WHOOPS!
[18:32] <Raven> we've left some presence
[18:32] <TheJoker> dead
[18:32] <Seeker> wed be screwed..
[18:32] <Raven> now, phase 4
[18:32] <Chaotic_Thought> Do u want logs edited somewhat?
[18:32] *** SnIpEr_WoLf_ has quit IRC (IL.Quit: 12Delta 3.4 15,1- 14Dark15 Il16lu15mina14tion 15- - [ http://delta.cjb.net ])
[18:32] <squiler> how do you get around that?
[18:32] <Raven> so u need to do some research on the machine
[18:32] <Raven> browse around in it's directories
[18:32] <Raven> see what u can find
[18:32] <Raven> and of course, u must have a lot of experience
[18:32] <Seeker> can one practice that?
[18:32] <Raven> install some log cleaners on urself
[18:33] <Raven> mess around with external logging programs
[18:33] <Raven> etc' etc'
[18:33] <TheJoker> skript kiddies dont though
[18:33] <INTJ> rootkit
[18:33] <Raven> that's right
[18:33] <Raven> u can practice that on ur own box
[18:33] <Raven> script kiddies hardly ever practice
[18:33] <Raven> the average script kiddie would skip phases 3 and 4
[18:33] <Raven> phase 3 - deleting urself from the logs
[18:33] <INTJ> rootkit can make logging exclude our doings
[18:33] <Raven> phase 4 - installing a backdoor
[18:33] <Raven> (we'll get to that)
[18:34] <Raven> btw, DO NOT just delete the logs!
[18:34] <Raven> this will surely get the admin to notice
[18:34] <Raven> DUH!!
[18:34] <Raven> that's the dumbest thing u could possibly do
[18:34] <TheJoker> just your intries!
[18:34] <Raven> exactly
[18:34] <Raven> u can also change ur entries
[18:34] <Raven> and make them look like something more legitimate
[18:34] <Raven> of course, u have to make sure they look authentic
[18:34] <TheJoker> skript kiddies would'nt know thier entries form others would they?
[18:35] <Raven> yup - experience with loggers
[18:35] <Raven> yeah
[18:35] <Raven> okay, let's move on
[18:35] <Raven> suppose this whole process of cracking into the machine and cleaning the logs
[18:35] <Raven> took u...
[18:35] <Raven> 5 minutes...
[18:35] <Raven> 30 minutes...
[18:35] <Raven> maybe a couple of hours
[18:35] <Raven> a day?
[18:35] <Raven> ;-)
[18:35] <Seeker> *g*
[18:35] <Raven> u wouldn't want to repeat that whenever u step in, would u?
[18:36] <Raven> this is what backdoors are for
[18:36] <squiler> hell no
[18:36] <TheJoker> no
[18:36] <TheJoker> ya!
[18:36] <Raven> the most basic one is:
[18:36] <Raven> useradd my-backdoor
[18:36] <Raven> password my-backdoor my-new-pass
[18:36] <Raven> we've just added a new user
[18:36] <INTJ> passwd
[18:36] <Raven> oops
[18:36] <TheJoker> you would'nt use my-backdoor!
[18:36] <Raven> passwd my-backdoor my-new-pass
[18:36] <Raven> sorry
[18:36] <Raven> yes, of course
[18:37] <INTJ> adduser
[18:37] <Raven> or useradd
[18:37] <TheJoker> haha
[18:37] <Raven> :-)
[18:37] <Raven> depends on the system
[18:37] <Raven> and on...
[18:37] <Raven> nevermind!
[18:37] <Raven> off-topic
[18:37] <TheJoker> hehe
[18:37] <Raven> it really doesn't matter
[18:37] <INTJ> you wanna do clickings in win ;p
[18:37] <Raven> now we edit the passwd file
[18:37] <Raven> and give the new account uid 0 and gid 0
[18:37] <Raven> user id 0 = root access!
[18:37] <Raven> access to ANYTHING
[18:37] <Seeker> not always
[18:37] <Raven> group id 0 = root's group
[18:38] <Raven> yes, of course
[18:38] <Raven> but usually
[18:38] <Raven> u can change anything on unix boxes
[18:38] <Seeker> SuSE has extreme restrictions, then you cant do some stuff
[18:38] <TheJoker> the admin would notice a new god mode user!
[18:38] <Raven> exactly!
[18:38] <Raven> that's why it's the most obvious backdoor
[18:38] <INTJ> there's a program for unix that can restrict uid 0 guid 0 permissions
[18:38] <Raven> a new god user would fire up some alarms, now wouldn't it?
[18:38] <Raven> that's also true
[18:38] <TheJoker> ya!
[18:39] <Raven> so no smart cracker would use this method
[18:39] <Raven> another possible method:
[18:39] <Raven> taking some backdoor noone uses
[18:39] <Raven> and trojan it
[18:39] <Raven> oops, i mean daemon
[18:39] <Raven> taking some daemon
[18:39] <Raven> and trojaning it
[18:39] <TheJoker> what about cracking the passwd file?
[18:39] <Raven> no, we already have root access
[18:39] <INTJ> sshd daemon is a good one
[18:39] <Raven> usually u won't need root's password
[18:40] <Raven> u'll just run an exploit and get a root shell
[18:40] <TheJoker> but after your in
[18:40] <Raven> another possible backdoor:
[18:40] <Raven> trojaning some daemon
[18:40] <TheJoker> crack it and then you'll be able to get back in
[18:40] <Raven> so the daemon would appear to be working just fine
[18:40] <Raven> and will do everything naturally
[18:40] <Raven> but will also allow the cracker to get a root shell
[18:40] <Raven> but...
[18:40] <Raven> what if the admin is running checksum checks?
[18:41] <INTJ> tripwire
[18:41] <Seeker> change them too... only problem left: time stamps
[18:41] <Raven> there are programs out there, such as tripwire, which check the file sizes of files
[18:41] <Raven> and let's the admin know when they're changed
[18:41] <Raven> critical files
[18:41] <Raven> that's true too
[18:41] <Raven> the file's "last changed date" would also change
[18:41] <Raven> sure, u can go around all of this...
[18:41] <Raven> but this only means more variables
[18:41] <Raven> more places where u can fail
[18:41] <Raven> or make a mistake
[18:41] <TheJoker> you could change sys time before you mod the file :p)
[18:42] <Raven> and reveal urself
[18:42] <Raven> of course, but that would be noticed
[18:42] *** [S]hun has joined #bsrf
[18:42] <Raven> this is one of the main reasons that u need to make sure the admin is not present when u crack
[18:42] <Raven> using finger
[18:42] <Raven> if finger is available
[18:42] <Raven> finger @target-host.com
[18:42] <TheJoker> not much anymore.
[18:42] <Raven> yeah
[18:42] <Raven> it's hard to find an admin
[18:42] <Raven> that is dumb enough
[18:42] <Raven> to run finger!
[18:43] <INTJ> who
[18:43] <Raven> suppose netvision.net.il (my isp) was running fingerd (finger daemon)
[18:43] <INTJ> run 'who'
[18:43] <Raven> ppl would just be able to do finger barakirs@netvision.net.il
[18:43] <Raven> and get tons of information about me
[18:43] <Raven> yes, of course, once you're in, u can use commands such as who
[18:43] <squiler> you would have to be on the system to use who
[18:43] <INTJ> ps aux
[18:43] <Raven> exactly
[18:43] <Raven> ps -aux
[18:43] <Raven> this will show ALL running processes
[18:43] <Raven> useful too
[18:43] <Raven> sometimes to find loggers
[18:44] <Raven> but the admin can change the process names of the loggers
[18:44] <INTJ> we can send the admin xxx passwd to distract him ;p
[18:44] <Raven> now, here's another method
[18:44] <Raven> using the r services
[18:44] <Raven> especially rlogin
[18:44] <Raven> go read rlogin's man page
[18:44] <Raven> wait, lemme quote it
[18:44] <Raven> okay, nm, lemme write something of my own
[18:45] <Raven> rlogin is based on trust systems
[18:45] <Raven> for example:
[18:45] <Raven> suppose u require anyone who comes over to ur house to give a password
[18:45] <Raven> three knocks or something
[18:45] <Raven> some password...
[18:45] <Raven> but suddenly, ur best friends comes over
[18:45] <TheJoker> 4 is better
[18:45] <Raven> and he doesn't know the password
[18:45] <Raven> :-)
[18:45] <Raven> will u let him in?
[18:45] <Raven> of course u will!
[18:45] <Seeker> no
[18:45] <Raven> u trust him
[18:45] <Raven> lol
[18:45] <TheJoker> heck no!
[18:45] <Raven> u wouldn't
[18:45] <Raven> trust systems would
[18:46] <TheJoker> they suck!
[18:46] <Raven> they're also good for more user-friendlyness
[18:46] <TheJoker> I don't want my ps to be friendly
[18:46] <squiler> send me the log please i must go
[18:46] <Raven> so dumb clerks won't have to type in passwords all the time
[18:46] <TheJoker> sorry pc
[18:46] <Seeker> micro$oft? *eg*
[18:46] *** squiler has quit IRC (IL.Quit: Leaving)
[18:46] <Raven> now, trust systems are also serious security hazards
[18:47] <Raven> go to blacksun.box.sk/books.html and read 'IP Spoofing Demystified' later
[18:47] <Raven> now, let's take rlogin for example
[18:47] <TheJoker> it was good.
[18:47] <Raven> suppose u put a file:
[18:47] <Raven> called /etc/rhosts
[18:47] <Raven> put a file called rhosts in /etc
[18:47] <Raven> which will look like this:
[18:48] <Raven> somehost.com someuser
[18:48] <Raven> the user someuser from somehost.com will be able to do:
[18:48] <TheJoker> loggers would catch it?
[18:48] <Raven> just a sec
[18:48] <Raven> he'll be able to use rlogin
[18:48] <Raven> to remotely login to this bx
[18:48] <Raven> to remotely login to this box
[18:48] <Raven> as ANY user
[18:48] <Raven> or if u put an .rhosts file in a user's home directory
[18:48] <Raven> he'll be able to log in as that user
[18:48] <Raven> ANOTHER POSSIBLE BACKDOOR!
[18:48] <Raven> but wait...
[18:49] <Raven> that's fairly noticable, isn't it?
[18:49] <TheJoker> ya
[18:49] <Raven> most backdoors are
[18:49] <Raven> so we need to put a lot of thought into it
[18:49] <Raven> and some luck
[18:49] <Raven> and make sure the admin is as dumb as possible
[18:49] <TheJoker> should you make backup back doors?
[18:49] <Raven> yes
[18:49] <Raven> always
[18:49] <Raven> on the other hand
[18:49] <Raven> more backdoors
[18:49] <Raven> would mean more chances
[18:49] <Raven> that the admin will notice something wrong
[18:49] <Raven> suppose u were an admin
[18:50] <TheJoker> like a stupid one to make them think that they got you?
[18:50] <Raven> and u would have suddenly noticed a backdoor
[18:50] <Raven> u would panic, right?
[18:50] <Raven> and put a lot more effort into security
[18:50] <Raven> download every scanner u can find
[18:50] <Raven> roam your system for backdoors and holes
[18:50] <Raven> perhaps
[18:50] <Raven> but they might find the stupid backdoor
[18:50] <Raven> and then go crazy
[18:50] <Raven> search the system
[18:50] <Raven> and find ur other backdoors
[18:50] <TheJoker> ya it's all luck,
[18:50] <INTJ> but a very smart admin had setup a honeypot ;p
[18:50] <Raven> exactly
[18:50] <Raven> yup
[18:50] <Raven> honeypots are kewl
[18:51] <Raven> he would attract a cracker
[18:51] <Raven> and then...
[18:51] <Raven> KABOOM!!
[18:51] <[S]hun> Whats honeypot ?
[18:51] <TheJoker> ;P)
[18:51] <Raven> or something...
[18:51] <TheJoker> boobie trap
[18:51] <Raven> a honeypot is a host or a certain situation that will attract crackers
[18:51] <INTJ> KABOOM? the mail bomber? ;p hahaha
[18:51] <Raven> the admin will monitor his honeypot
[18:51] <Raven> see if there are any bees trapped inside
[18:52] <Raven> and then, once he sees something...
[18:52] <Raven> he would realize that he's being attacked
[18:52] <Raven> and maybe call the police
[18:52] <Raven> or Robert Frost!!
[18:52] <Raven> MWHAHAHAHA!!
[18:52] <Raven> (the poet)
[18:52] <Raven> nevermind, forget it
[18:52] <Chaotic_Thought> :)
[18:52] <Raven> private joke
[18:52] <TheJoker> sounds like a personal problem
[18:52] <Raven> so that was phase 4
[18:53] <Raven> now, we're in
[18:53] <Raven> we've cleaned the logs
[18:53] <Raven> we have a backdoor
[18:53] <Raven> now we only have one thing left to do:
[18:53] <INTJ> inflate ego in irc
[18:53] <Raven> utilize the box
[18:53] <Raven> perhaps for mailbombing someone
[18:53] <Raven> perhaps for installing bots on it
[18:53] <Raven> or flooding
[18:53] <INTJ> vhost
[18:53] <Raven> or defacing the website on the box
[18:53] <INTJ> hack another box
[18:53] *** rekaerf has joined #bsrf
[18:53] <Raven> yup, u can also set a virtual host on this box
[18:53] <rekaerf> hey
[18:54] <Raven> yes, or start other attacks against other hosts from this newly cracked one
[18:54] <TheJoker> or just screw the system and kill a business
[18:54] <Raven> yes, that's also true
[18:54] <Raven> or...
[18:54] <Raven> corporate espionage
[18:54] <TheJoker> yummy!
[18:54] <Raven> if ur a corporate spy
[18:54] <INTJ> credit card numbers ;p
[18:54] <Raven> u could get info and stuff
[18:54] *** blu3h4z3 has joined #bsrf
[18:54] <Raven> or maybe acccess credit card databases
[18:54] <Raven> or other sensitive information
[18:54] <Raven> so that was phase 5
[18:55] <Raven> which is...
[18:55] <Raven> well, the last phase
[18:55] <Seeker> LOL
[18:55] <Raven> thank u all for coming over to the lecture
[18:55] <[S]hun> hmm, I think I missed the first few parts
[18:55] <[S]hun> where can I get the logs ?
[18:55] <blu3h4z3> argh, I missed the whole thing@
[18:55] <Chaotic_Thought> it was cool
[18:55] <Raven> ouch
[18:55] <[S]hun> on blacksun/ ?
[18:55] <TheJoker> na ni na na boo boo!
[18:55] <Seeker> it was good yes
[18:55] <Raven> someone send me his logs plz
[18:55] <INTJ> hahaha
[18:55] <Seeker> interesting
[18:55] <TheJoker> nice job Raven
[18:56] <Chaotic_Thought> RaveN, u want logs sorta edited?
[18:56] <INTJ> edit the personal joke!!! hahaha ;p
[18:56] <Raven> sorta edited?
[18:56] <Raven> whaddya mean?
[18:56] <Chaotic_Thought> Like, I was talking before lecture
[18:56] <Raven> seeker, u didn't miss any parts of the lecture, right?
[18:56] <blu3h4z3> no uncut and unedited
[18:56] <Chaotic_Thought> Want that out?
[18:56] <Raven> nm, seeker is sending me his logs
[18:57] *** rekaerf has quit IRC (IL.Quit: I was using Ghost_Rider Script version 2.0)
[18:57] <Raven> in a whopping 0.6429k per second speed
[18:57] <[S]hun> haha
[18:57] <Raven> #  ³ Type  ³ Nick      ³ Percent Complete        ³ K/s   ³ File
[18:57] <Raven> ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
[18:57] <Raven> 1#   GET     seeker      ±²Û²±° °±° 94.6%      00:02  0.6395  #bsrf_20000122.log
[18:57] <Raven> ùíù DCC Warning: incoming file is larger than the handshake said
[18:57] <Raven> ùíù DCC Warning: GET: closing connection
[18:57] * Seeker grins
[18:57] <Raven> send again plz
Session Close: Sat Jan 22 18:57:32 2000